428. A ____ is an optical code that represents data with bars of varying widths or heights.
Note: This Question is unanswered, help us to find answer for this one
429. ###### in a cell means that the ____.
Answer
Correct Answer:
Column is too narrow to display the
Note: This Question is unanswered, help us to find answer for this one
430. In the formula =int(average(a1:a100)), which would occur first? ____
Answer
Correct Answer:
The average of the values in the range A1:A100 is added to the integer.
Note: This Question is unanswered, help us to find answer for this one
431. Local variables must be ________.
Answer
Correct Answer:
Initialized when they're declared
Note: This Question is unanswered, help us to find answer for this one
432. After experiencing a loss, it's important to take care of yourself by __________.
Answer
Correct Answer:
Focusing on life before the loss
Note: This Question is unanswered, help us to find answer for this one
433. In the acronym ada, the d stands for ______.
Answer
Correct Answer:
Disabilities
Note: This Question is unanswered, help us to find answer for this one
434. Printer ____ is measured by ppm
Note: This Question is unanswered, help us to find answer for this one
435. One of the primary causes of eyestrain is ____.
Answer
Correct Answer:
A display screen that reflects light
Note: This Question is unanswered, help us to find answer for this one
436. Each time you click the increase indent button, the paragraph is indented ____ inch.
Note: This Question is unanswered, help us to find answer for this one
437. Another name for needs analysis is ____.
Answer
Correct Answer:
Needs assessment.
Note: This Question is unanswered, help us to find answer for this one
438. Adding a ____ to text adds depth and helps the letters display prominently.
Note: This Question is unanswered, help us to find answer for this one
439. A(n) _______ password is difficult to hack.
Note: This Question is unanswered, help us to find answer for this one
440. A(n) _____ is essentially a flash-based replacement for an internal hard drive.
Note: This Question is unanswered, help us to find answer for this one
441. A computer lab is an example of a(n) ________ type of network.
Note: This Question is unanswered, help us to find answer for this one
442. A byte is formed by a group of _____.
Note: This Question is unanswered, help us to find answer for this one
443. A backup utility can write copies of important data files and folders on ____.
Answer
Correct Answer:
Any of these
Note: This Question is unanswered, help us to find answer for this one
444. A ________ is a personal journal posted on the web
Note: This Question is unanswered, help us to find answer for this one
445. A _____ is the software that acts as an intermediary between two systems.
Answer
Correct Answer:
Proxy server
Note: This Question is unanswered, help us to find answer for this one
446. __________ software may be freely copied, distributed, and even resold.
Answer
Correct Answer:
Public domain
Note: This Question is unanswered, help us to find answer for this one
447. Most of today's processors are housed in a ____ chip package.
Note: This Question is unanswered, help us to find answer for this one
448. A(n) _____ is the equivalent to a subsystem.
Answer
Correct Answer:
Partition
Note: This Question is unanswered, help us to find answer for this one
449. When you connect to a wi-fi hotspot, your digital device is classified as a(n) _______________.
Note: This Question is unanswered, help us to find answer for this one
450. In most cases, a file deleted from a usb drive ____.
Answer
Correct Answer:
Goes to the Recycle Bin
Note: This Question is unanswered, help us to find answer for this one
451. Windows can create partitions using the _______________ disk.
Note: This Question is unanswered, help us to find answer for this one
452. A(n) _____ represents a single dot on an output device.
Note: This Question is unanswered, help us to find answer for this one
453. All of the following are tips for professional e-mail etiquette except ________.
Answer
Correct Answer:
Use abbreviations such as "u," "r," and "BRB" to keep the e-mail message shorter
Note: This Question is unanswered, help us to find answer for this one
454. All of the following are terms related to part of the boot process except ________.
Note: This Question is unanswered, help us to find answer for this one
455. A(n) ____________________ device is a computing device small enough to hold in your hand.
Note: This Question is unanswered, help us to find answer for this one
456. A(n) ________ is used as an index to pinpoint a specific element within an array.
Answer
Correct Answer:
Subscript
Note: This Question is unanswered, help us to find answer for this one
457. A(n) ________ converts your voice's sound waves into digital signals.
Answer
Correct Answer:
Analog-to-digital converter chip
Note: This Question is unanswered, help us to find answer for this one
458. A(n) ____ statement is a statement that returns a value to the statement that called the function.
Note: This Question is unanswered, help us to find answer for this one
459. A(n) ____ is an element's numeric position within an array.
Note: This Question is unanswered, help us to find answer for this one
460. A virus __________ usually arrives as an email message that contains warnings about a fake virus.
Note: This Question is unanswered, help us to find answer for this one
461. A variable's unknown value is commonly called ____.
Note: This Question is unanswered, help us to find answer for this one
462. A unique number called a(n) ____ identifies each item in a collection.
Note: This Question is unanswered, help us to find answer for this one
463. A social security number which appears in the format 123-456-7891 is an example of a(n) ____.
Answer
Correct Answer:
Predefined input mask
Note: This Question is unanswered, help us to find answer for this one
464. There are four basic categories of software: commercial software, shareware, freeware, and ____.
Answer
Correct Answer:
Public domain software
Note: This Question is unanswered, help us to find answer for this one
465. A hard drive that uses fde is often referred to as a(n) ____.
Answer
Correct Answer:
Self-encrypting hard drive.
Note: This Question is unanswered, help us to find answer for this one
466. You can select multiple paragraphs by using the ____ key repeatedly.
Answer
Correct Answer:
CTRL+ END
Note: This Question is unanswered, help us to find answer for this one
467. Windows 10 stores compressed files in a special type of folder called a(n) ____.
Note: This Question is unanswered, help us to find answer for this one
468. All of the following are guidelines about the appearance of letterhead elements except ____.
Answer
Correct Answer:
Make the font size of your name the same size as the rest of the text in the letterhead
Note: This Question is unanswered, help us to find answer for this one
469. A(n) ____ is a software package that provides an editor, a compiler, and other programming tools.
Note: This Question is unanswered, help us to find answer for this one
470. A reading level that is appropriate for most technical documentation is ____.
Answer
Correct Answer:
10th grade
Note: This Question is unanswered, help us to find answer for this one
471. You represent a decision in a flowchart by drawing a decision symbol, which is shaped like a ____.
Note: This Question is unanswered, help us to find answer for this one
472. To speed up magnetic hard drive performance, ____ is often used.
Answer
Correct Answer:
Disk caching
Note: This Question is unanswered, help us to find answer for this one
473. To redirect the list of the files in a directory to a file called homedir.list, you enter ____.
Answer
Correct Answer:
Ls > homedir.list
Note: This Question is unanswered, help us to find answer for this one
474. The purpose of a ups backup battery is to permit a pc or server to ____.
Answer
Correct Answer:
Shutdown normally
Note: This Question is unanswered, help us to find answer for this one
475. Solid ____ is one color used throughout the entire slide.
Note: This Question is unanswered, help us to find answer for this one
476. Pmt(rate, nper, pv [, fv=0] [, type=0]) in the figure above, fv and type are ____.
Answer
Correct Answer:
Present value of the loan
Note: This Question is unanswered, help us to find answer for this one
477. Instead of reading a large text file into php, you can use the ____ to iterate through a text file.
Answer
Correct Answer:
File pointer
Note: This Question is unanswered, help us to find answer for this one
478. Each hard disk is divided into pie-shaped groups of ____.
Note: This Question is unanswered, help us to find answer for this one
479. An uninterruptable power supply contains a ____.
Note: This Question is unanswered, help us to find answer for this one
480. An extension of .sys designates a ____ type of file.
Answer
Correct Answer:
Configuration
Note: This Question is unanswered, help us to find answer for this one
481. A photo's color intensity can be modified by changing the brightness and ____.
Answer
Correct Answer:
Contrast.
Note: This Question is unanswered, help us to find answer for this one
482. Root cause analysis is an iterative process that asks a series of ____ questions.
Note: This Question is unanswered, help us to find answer for this one
483. To find duplicate records in a table, use the _____ query wizard.
Answer
Correct Answer:
Find Duplicates
Note: This Question is unanswered, help us to find answer for this one
484. Excel remembers the last ____ actions you have completed.
Note: This Question is unanswered, help us to find answer for this one
485. Deleting a record in a form will also delete it from the underlying ________.
Note: This Question is unanswered, help us to find answer for this one
486. Today's widescreen devices, such as laptops and smartphones, are designed for the 16:9 __________.
Answer
Correct Answer:
Aspect ratio
Note: This Question is unanswered, help us to find answer for this one
487. Color ____ indicates that one color is dominating a picture.
Note: This Question is unanswered, help us to find answer for this one
488. Widespread use of the internet by business and home users first occurred in the ____.
Note: This Question is unanswered, help us to find answer for this one
489. When a subscript is not within the range of acceptable subscripts, it is said to be ____.
Answer
Correct Answer:
A superscript
Note: This Question is unanswered, help us to find answer for this one
490. To sort by a second column, click the ____ arrow and click a column header.
Note: This Question is unanswered, help us to find answer for this one
491. To filter records in a report, use the filter buttons on the ____ tab.
Note: This Question is unanswered, help us to find answer for this one
492. The prefix ____ should be used for naming a textbox object.
Note: This Question is unanswered, help us to find answer for this one
493. The output of the statement: cout << pow(3.0, 2.0) + 5 << endl; is ____.
Note: This Question is unanswered, help us to find answer for this one
494. The main circuits on the system board that carry data are called the _________.
Note: This Question is unanswered, help us to find answer for this one
495. The concept that similar items should be handled consistently throughout a document is called ____.
Answer
Correct Answer:
Parallel structure
Note: This Question is unanswered, help us to find answer for this one
496. Set the ____ property to no to prevent users from using the tab key to navigate to a control.
Answer
Correct Answer:
Tab Stop.
Note: This Question is unanswered, help us to find answer for this one
497. Print all, pages, and selected record(s) are options available from the ____ for printing forms.
Answer
Correct Answer:
Print dialog box
Note: This Question is unanswered, help us to find answer for this one
498. Most software problems that impact end users occur ____.
Answer
Correct Answer:
During the installation and configuration of the software.
Note: This Question is unanswered, help us to find answer for this one
499. Media that allow random access are sometimes referred to as ____ media.
Answer
Correct Answer:
Addressable
Note: This Question is unanswered, help us to find answer for this one
500. In dolby digital 7.1, the 1 indicates a ________ speaker.
Answer
Correct Answer:
Subwoofer
Note: This Question is unanswered, help us to find answer for this one
501. In a count-controlled loop, the counter performs ________ action(s).
Note: This Question is unanswered, help us to find answer for this one
502. If the navigation pane is not open, click the _____ to open it and view the database objects.
Answer
Correct Answer:
Shutter Bar Open/Close Button
Note: This Question is unanswered, help us to find answer for this one
503. Gabrielle is planning to connect selected devices to the network wirelessly with a wireless ____.
Answer
Correct Answer:
Access point
Note: This Question is unanswered, help us to find answer for this one
504. Employees who provide informal peer support to other users in an organization ____.
Answer
Correct Answer:
Often have little or no training in user support.
Note: This Question is unanswered, help us to find answer for this one
505. C:\windows\system32\drivers\etc\protocol is an example of a file ________.
Note: This Question is unanswered, help us to find answer for this one
506. As programs become larger and more complicated, the need for good planning and design ____ .
Answer
Correct Answer:
Increases
Note: This Question is unanswered, help us to find answer for this one
507. An example of software most commonly associated with productivity software is ____.
Answer
Correct Answer:
Word processing
Note: This Question is unanswered, help us to find answer for this one
508. All of the following are tips for a great presentation except ________.
Answer
Correct Answer:
Use a variety of animations on most slides to keep your audience's attention.
Note: This Question is unanswered, help us to find answer for this one
509. After adding a shape to a slide, you can change its default characteristics by adding ____.
Answer
Correct Answer:
Numbers bullets . text . styles.
Note: This Question is unanswered, help us to find answer for this one
510. A(n) ______ machine enables you to install a second operating system on a computer.
Note: This Question is unanswered, help us to find answer for this one
511. A(n) ____ is a flat, touch-sensitive device used in conjunction with a digital pen.
Answer
Correct Answer:
Graphics table
Note: This Question is unanswered, help us to find answer for this one
512. A unique feature of ____ is that users can easily add enhancements to the operating system.
Note: This Question is unanswered, help us to find answer for this one
513. A two-dimensional array is like ______________ put together.
Answer
Correct Answer:
The correct answer is: several identical arrays
Note: This Question is unanswered, help us to find answer for this one
514. Computer programmers often refer to memory addresses using ____ notation
Answer
Correct Answer:
Hexadecimal.
Note: This Question is unanswered, help us to find answer for this one
515. In most programming languages, before you can use any variable, you must include a ____ for it.
Answer
Correct Answer:
Declaration
Note: This Question is unanswered, help us to find answer for this one
516. A usb flash drive is a(n) ____ disk
Answer
Correct Answer:
Removable.
Note: This Question is unanswered, help us to find answer for this one
517. Solid-state storage is quickly replacing _____ for storing data on small devices like the ipod.
Answer
Correct Answer:
Microdrives.
Note: This Question is unanswered, help us to find answer for this one
518. In order to allocate the needed memory for an object, you must use the ____ operator.
Note: This Question is unanswered, help us to find answer for this one
519. If your computer is thrashing, increase ________ to solve the problem.
Note: This Question is unanswered, help us to find answer for this one
520. If you open a field list and the tables do not appear in the field list, click ____.
Answer
Correct Answer:
Show all tables
Note: This Question is unanswered, help us to find answer for this one
521. Color _____ changes the intensity of colors
Answer
Correct Answer:
Saturation
Note: This Question is unanswered, help us to find answer for this one
522. By default a word document generally displays in ____ view
Answer
Correct Answer:
Print layout
Note: This Question is unanswered, help us to find answer for this one
523. All of the following are tasks for network administration of a large organization except ________.
Answer
Correct Answer:
Purchasing initial equipment for the network
Note: This Question is unanswered, help us to find answer for this one
524. A(n) ________________ is an informal web site of time-stamped articles written in a journal format.
Note: This Question is unanswered, help us to find answer for this one
525. A(n) ____ is a software program that helps programmers develop software.
Answer
Correct Answer:
Application generator
Note: This Question is unanswered, help us to find answer for this one
526. A violation of the holder's rights is known as copyright ________.
Answer
Correct Answer:
Infringement
Note: This Question is unanswered, help us to find answer for this one
527. A type of spyware known as _________ can record the individual keystrokes of a user.
Answer
Correct Answer:
Keylogger
Note: This Question is unanswered, help us to find answer for this one
528. A row-and-column subset ____ consists of a subset of the rows and columns in some individual table.
Note: This Question is unanswered, help us to find answer for this one
529. A form's object name appears on the tab for the form in the access window. ____________________
Note: This Question is unanswered, help us to find answer for this one
530. A __________ cookie is set by a site other than the one you connected to.
Answer
Correct Answer:
Third-party.
Note: This Question is unanswered, help us to find answer for this one
531. ________ a site means to take extraordinary measures to reduce a system's vulnerability.
Answer
Correct Answer:
Hardening
Note: This Question is unanswered, help us to find answer for this one
532. Cache memory levels are based on proximity to ________.
Answer
Correct Answer:
The processor.
Note: This Question is unanswered, help us to find answer for this one
533. The calculated expression =city & ?,? & state & ? ? & zipcode is an example of ____.
Answer
Correct Answer:
Concatenation
Note: This Question is unanswered, help us to find answer for this one
534. The bullets button is located in the ____ group.
Answer
Correct Answer:
Paragraph
Note: This Question is unanswered, help us to find answer for this one
535. The arrangement of keys on a keyboard, qwerty reflects the keyboard layout by _______.
Answer
Correct Answer:
Taking the letters of the first six alphabetic characters found on the top row of keys
Note: This Question is unanswered, help us to find answer for this one
536. The arguments in ____ in the screentip for a function are optional.
Note: This Question is unanswered, help us to find answer for this one
537. The appropriate software to use for creating research papers is ________ software.
Answer
Correct Answer:
Word processing
Note: This Question is unanswered, help us to find answer for this one
538. The apple logo would be considered a(n) ________.
Answer
Correct Answer:
Trademark
Note: This Question is unanswered, help us to find answer for this one
539. The access window consists of a variety of components. these include the ____.
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
540. The ________ element configures dynamic graphics.
Note: This Question is unanswered, help us to find answer for this one
541. Suppose str = "abcdefghi". the output of the statement cout << str.length() << endl; is ____.
Note: This Question is unanswered, help us to find answer for this one
542. Activex controls are identified using the ____ attribute.
Note: This Question is unanswered, help us to find answer for this one
543. When data is processed into a meaningful form, it becomes ____.
Answer
Correct Answer:
Information
Note: This Question is unanswered, help us to find answer for this one
544. Spreadsheet software creates a ____, composed of a grid of columns and rows.
Answer
Correct Answer:
Worksheet
Note: This Question is unanswered, help us to find answer for this one
545. ____ area networks can cover large geographic distances, including the entire earth.
Note: This Question is unanswered, help us to find answer for this one
546. Some 3d projectors are designed to project ____.
Answer
Correct Answer:
Holograms
Note: This Question is unanswered, help us to find answer for this one
547. Web pages are viewed using a web ____.
Note: This Question is unanswered, help us to find answer for this one
548. Visitors to a web site are sometimes called web ____.
Note: This Question is unanswered, help us to find answer for this one
549. The sentence ?larry will present a tutorial on excel macros on tuesday next week? is in ____ voice.
Note: This Question is unanswered, help us to find answer for this one
550. The first pcs were used in businesses and homes in the ____.
Note: This Question is unanswered, help us to find answer for this one
551. The color orange denotes ____.
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
552. The default importance level for all new messages is ____ importance.
Note: This Question is unanswered, help us to find answer for this one
553. Emptying the recycle bin frees up ____ on your computer
Answer
Correct Answer:
Storage space
Note: This Question is unanswered, help us to find answer for this one
554. Javascript and vbscript are _____, which provide commands that are executed on the client.
Answer
Correct Answer:
Scripting languages
Note: This Question is unanswered, help us to find answer for this one
555. In the url http://www.microsoft.com/surface, the portion labeled ""http"" is the ________.
Note: This Question is unanswered, help us to find answer for this one
556. ____ utilities scan incoming and outgoing files to be sure they are safe.
Note: This Question is unanswered, help us to find answer for this one
557. The length ____ contains the number of elements in the array.
Note: This Question is unanswered, help us to find answer for this one
558. The base class's ________ affects the way its members are inherited by the derived class.
Answer
Correct Answer:
Access specification
Note: This Question is unanswered, help us to find answer for this one
559. The actionlistener interface contains the ____ method specification.
Answer
Correct Answer:
ActionPerformed(ActionEvent e)
Note: This Question is unanswered, help us to find answer for this one
560. If i simplify the address 2001:0000:0000:00fe:0000:0000:0000:cdef, i get ________.
Answer
Correct Answer:
2001:::fe::::cdef
Note: This Question is unanswered, help us to find answer for this one
561. The _________ , also known as the address operator, returns the memory address of a variable.
Answer
Correct Answer:
Ampersand ( & )
Note: This Question is unanswered, help us to find answer for this one
562. The ____ attribute lets you control how the internal table gridlines are drawn.
Note: This Question is unanswered, help us to find answer for this one
563. Function strcmp returns __________ if its first argument is equal to its second argument.
Answer
Correct Answer:
Specifically O
Note: This Question is unanswered, help us to find answer for this one
564. Four-pair utp uses ________ connectors.
Answer
Correct Answer:
None of the above
Note: This Question is unanswered, help us to find answer for this one
565. C++ requires that a copy constructor's parameter be a(n) ________.
Answer
Correct Answer:
Reference object
Note: This Question is unanswered, help us to find answer for this one
566. Arrays must be ________ at the time they are ________.
Answer
Correct Answer:
Initialized, declared
Note: This Question is unanswered, help us to find answer for this one
567. Ajax takes advantage of ________ scripting to make applications more responsive.
Answer
Correct Answer:
Client-side
Note: This Question is unanswered, help us to find answer for this one
568. A class and its members can be described graphically using a notation known as the ____ notation.
Note: This Question is unanswered, help us to find answer for this one
569. Is a consultative function of the mis department.
Answer
Correct Answer:
Educating the non-MIS managers about IT
Note: This Question is unanswered, help us to find answer for this one
570. ________ are an intangible benefit of information systems.
Answer
Correct Answer:
Lower operational costs,
Note: This Question is unanswered, help us to find answer for this one
571. Comparing a variable to a list of values in an array is a process called ____ an array.
Answer
Correct Answer:
Searching
Note: This Question is unanswered, help us to find answer for this one
572. The instruction myanswer = mynumber*2 is an example of a(n) ____ operation.
Answer
Correct Answer:
Processing
Note: This Question is unanswered, help us to find answer for this one
573. Each task in a systems development project should culminate in one or more ________.
Answer
Correct Answer:
Deliverables.
Note: This Question is unanswered, help us to find answer for this one
574. Major coding mistakes made by programmers when they write software are called ____.
Note: This Question is unanswered, help us to find answer for this one
575. The _______________ element was widely used but never part of the w3c standard until html5.
Note: This Question is unanswered, help us to find answer for this one
576. Software designed specifically for managing real estate is an example of ________ software.
Answer
Correct Answer:
Vertical market
Note: This Question is unanswered, help us to find answer for this one
577. Using ________ searches the spreadsheet for one value and replaces it with another.
Answer
Correct Answer:
Find and Replace
Note: This Question is unanswered, help us to find answer for this one
578. The ________ operator performs string concatenation.
Answer
Correct Answer:
Ampersand (&)
Note: This Question is unanswered, help us to find answer for this one
579. With respect to computer networks, a typical ________ network has a bandwidth of 10 mbps to 1 gbps.
Answer
Correct Answer:
Local Area
Note: This Question is unanswered, help us to find answer for this one
580. With an enumerated data type, the enumerators are stored in memory as ________.
Answer
Correct Answer:
Integers.
Note: This Question is unanswered, help us to find answer for this one
581. When you schedule an appointment, outlook adds the appointment to the ____ folder by default.
Note: This Question is unanswered, help us to find answer for this one
582. When you ask multiple questions before an outcome is determined, you create a ____ condition.
Note: This Question is unanswered, help us to find answer for this one
583. When computer users ____________________ a project, they change its appearance.
Note: This Question is unanswered, help us to find answer for this one
584. When a variable ceases to exist at the end of a method, programmers say the variable ____.
Answer
Correct Answer:
Goes out of scope
Note: This Question is unanswered, help us to find answer for this one
585. Transistors are constructed from ____, such as silicon and gallium arsenide.
Answer
Correct Answer:
Semiconductors
Note: This Question is unanswered, help us to find answer for this one
586. To view the preview pane, click the ____ tab, and click print on the navigation bar.
Note: This Question is unanswered, help us to find answer for this one
587. To use the predefined function tolower, the program must include the header file ____.
Note: This Question is unanswered, help us to find answer for this one
588. To ungroup an illustration, press ____.
Answer
Correct Answer:
CTRL+SHIFT+G
Note: This Question is unanswered, help us to find answer for this one
589. To select adjacent worksheets, you use the ____ key.
Note: This Question is unanswered, help us to find answer for this one
590. To resize an image without changing its proportions simply drag ____ of the image
Answer
Correct Answer:
Any corner.
Note: This Question is unanswered, help us to find answer for this one
591. To remove a total row that appears in a datasheet, tap or click the ____ button on the home tab.
Note: This Question is unanswered, help us to find answer for this one
592. To re-use saved export steps, tap or click the saved exports button on the ____ tab on the ribbon.
Answer
Correct Answer:
EXTERNAL DATA
Note: This Question is unanswered, help us to find answer for this one
593. To organize entries in the navigation pane by table, click ____ on the navigation pane menu.
Answer
Correct Answer:
Tables and Related Views
Note: This Question is unanswered, help us to find answer for this one
594. To move a field in the query design grid, click its ____, and then drag it left or right.
Answer
Correct Answer:
Field selector.
Note: This Question is unanswered, help us to find answer for this one
595. To import data to a table, tap or click the ____ tab on the ribbon.
Answer
Correct Answer:
EXTERNAL DATA
Note: This Question is unanswered, help us to find answer for this one
596. To change the caption for a form, use the ____ property in the property sheet.
Note: This Question is unanswered, help us to find answer for this one
597. To add totals or other statistics to a report, use the ____ button on the design tab.
Note: This Question is unanswered, help us to find answer for this one
598. To add a record to a table, tap or click the ____ record button
Answer
Correct Answer:
New (blank)
Note: This Question is unanswered, help us to find answer for this one
599. Though an invitee can propose a new meeting time, only the ____ can change or delete the meeting.
Answer
Correct Answer:
Originator
Note: This Question is unanswered, help us to find answer for this one
600. There are ____ stable states in a bistable environment.
Note: This Question is unanswered, help us to find answer for this one
601. The type of media that uses laser technology to store data and programs is _______.
Answer
Correct Answer:
Optical disc
Note: This Question is unanswered, help us to find answer for this one
602. The purpose of a preinstallation site visit is to ____.
Answer
Correct Answer:
Anticipate possible installation problems
Note: This Question is unanswered, help us to find answer for this one
603. The most significant internal data sources for an mis are the organization?s _____.
Answer
Correct Answer:
Various DSS and GSS systems and users
Note: This Question is unanswered, help us to find answer for this one
604. The module definition comprises the module header and the module ________.
Note: This Question is unanswered, help us to find answer for this one
605. Another name for the weighted point evaluation method is the ____ method.
Answer
Correct Answer:
Kepner-Tregoe
Note: This Question is unanswered, help us to find answer for this one
606. Many desktops have a(n) ____________________ tower that is a separate device from a monitor.
Answer
Correct Answer:
System Unit
Note: This Question is unanswered, help us to find answer for this one
607. Long passwords that use several types of keyboard characters are called ________ passwords.
Note: This Question is unanswered, help us to find answer for this one
608. A profile in a social networking site consists of ________.
Answer
Correct Answer:
A photo or information about the person or organization
Note: This Question is unanswered, help us to find answer for this one
609. The ____________________ of a function consists of the function name and its formal parameter list.
Answer
Correct Answer:
Signature
Note: This Question is unanswered, help us to find answer for this one
610. In 802.11i ________, hosts must know a shared initial key.
Answer
Correct Answer:
PSK mode.
Note: This Question is unanswered, help us to find answer for this one
611. Closing a file causes any unsaved information still held in the file buffer to be ________.
Answer
Correct Answer:
Saved to the file
Note: This Question is unanswered, help us to find answer for this one
612. Each outlook folder displays the items it contains in a layout called a(n) ____.
Note: This Question is unanswered, help us to find answer for this one
613. An input mask may be created for any field with the ____ or ____ data type.
Answer
Correct Answer:
Short Text, Number
Note: This Question is unanswered, help us to find answer for this one
614. An array is a(n) ____ of values in computer memory.
Note: This Question is unanswered, help us to find answer for this one
615. A unique identifier is most likely used as a ____ key in a database.
Note: This Question is unanswered, help us to find answer for this one
616. A query based on more than one table is a(n) ____ query
Answer
Correct Answer:
Multitable
Note: This Question is unanswered, help us to find answer for this one
617. A help desk structured into levels or tiers of support uses a ____.
Answer
Correct Answer:
Multilevel support model
Note: This Question is unanswered, help us to find answer for this one
618. A hardware component that has its jumper pins set incorrectly is an example of a hardware ____.
Answer
Correct Answer:
Configuration problem
Note: This Question is unanswered, help us to find answer for this one
619. A file that stays in memory after it executes is a(n) _____________.
Answer
Correct Answer:
Executable
Note: This Question is unanswered, help us to find answer for this one
620. A ____ consists of a selection of colors and fonts for the various sections in a report or form.
Note: This Question is unanswered, help us to find answer for this one
621. ________ software lets you perform calculations and numerical analyses.
Answer
Correct Answer:
Spreadsheet
Note: This Question is unanswered, help us to find answer for this one
622. ________ allows only limited use of media that have been legally purchased.
Answer
Correct Answer:
Digital rights management.
Note: This Question is unanswered, help us to find answer for this one
623. A(n) ________ cable carries all audio and video information from devices to a connected tv.
Note: This Question is unanswered, help us to find answer for this one
624. A distributed computing system usually includes ____.
Answer
Correct Answer:
All of these.
Note: This Question is unanswered, help us to find answer for this one
625. A _____ page is an unchanging page retrieved from a file on a web server.
Note: This Question is unanswered, help us to find answer for this one
626. Catfishing is ________.
Answer
Correct Answer:
Creating fake profiles on a dating site and developing a fabricated online and phone relationship
Note: This Question is unanswered, help us to find answer for this one
627. A(n) ____ layout arranges controls vertically with the labels to the left of the control.
Note: This Question is unanswered, help us to find answer for this one
628. A three-tier, or multitier, client/server system consists of three distinct pieces: these are ____.
Answer
Correct Answer:
The client tier, the processing tier, and the data storage tier
Note: This Question is unanswered, help us to find answer for this one
629. A method?s name and parameter list constitute the method?s ____.
Answer
Correct Answer:
Signature
Note: This Question is unanswered, help us to find answer for this one
630. A calculated field is formatted using the ____ for the field.
Answer
Correct Answer:
Property Sheet
Note: This Question is unanswered, help us to find answer for this one
631. ____ loops are called posttest loops.
Answer
Correct Answer:
Do...while loop
Note: This Question is unanswered, help us to find answer for this one
632. ____ is currently the most popular technology for connecting peripherals
Note: This Question is unanswered, help us to find answer for this one
633. Suppose str = ""xyzw"";. after the statement str[2] = 'y'; the value of str is ""____"".
Note: This Question is unanswered, help us to find answer for this one
634. Fine lines that extend from the top and bottom of a font's letters are called ____.
Note: This Question is unanswered, help us to find answer for this one
635. To create an update query, create a new query and then click the ____ button on the design tab.
Note: This Question is unanswered, help us to find answer for this one
636. The personal assistant application on apple's iphone is an example of a ________.
Answer
Correct Answer:
Natural language processing (NLP) system
Note: This Question is unanswered, help us to find answer for this one
637. To speed up the display of graphics, a(n) ________ is integrated into some video cards.
Note: This Question is unanswered, help us to find answer for this one
638. The navigation pane includes two panes: the ____ panes.
Answer
Correct Answer:
Date Navigator and my calendars
Note: This Question is unanswered, help us to find answer for this one
639. The navigation pane contains the headings tab, the results tab, and the _____ tab.
Note: This Question is unanswered, help us to find answer for this one
640. The internet data transfer speed for your computer might be stated in ____ per second.
Note: This Question is unanswered, help us to find answer for this one
641. The appearance of fields in a report that is created using the report wizard is determined by ____.
Answer
Correct Answer:
The order the fields are selected in the
Note: This Question is unanswered, help us to find answer for this one
642. Press and hold the ____ key as you click a link on a webpage to open a new webpage in a new tab.
Note: This Question is unanswered, help us to find answer for this one
643. Most music for portable media players is stored in _______ audio file formats.
Answer
Correct Answer:
Compressed
Note: This Question is unanswered, help us to find answer for this one
644. Modern motherboards use a 20- or 24-pin _______________.
Note: This Question is unanswered, help us to find answer for this one
645. Pixels is short for _____ and is a measure of _____.
Answer
Correct Answer:
Picture elements; resolution
Note: This Question is unanswered, help us to find answer for this one
646. Internet explorer inserts the flash shockwave player as a(n) ____ control.
Note: This Question is unanswered, help us to find answer for this one
647. To connect multiple usb devices to a single usb port, a ____ can be used.
Note: This Question is unanswered, help us to find answer for this one
648. The purpose of ___ is to hold data permanently, even when the computer is turned off.
Note: This Question is unanswered, help us to find answer for this one
649. The internet connects millions of computers connected through millions of ____ worldwide.
Note: This Question is unanswered, help us to find answer for this one
650. One common way to deal with spam that makes it to your computer is to use a(n) ____.
Answer
Correct Answer:
Email filter
Note: This Question is unanswered, help us to find answer for this one
651. Most keyboards today are arranged in a(n) _______ layout.
Note: This Question is unanswered, help us to find answer for this one
652. Main memory is called ____.
Answer
Correct Answer:
Primary memory
Note: This Question is unanswered, help us to find answer for this one
653. Like any other processor, a graphics processor needs _______________.
Note: This Question is unanswered, help us to find answer for this one
654. The line most commonly used by corporate, government, and academic sites is ________.
Note: This Question is unanswered, help us to find answer for this one
655. When installing new software, it is recommended to install it in/on ____.
Answer
Correct Answer:
C:\Programs
Note: This Question is unanswered, help us to find answer for this one
656. To save a document with a new name, click _______ in the navigation bar and enter a new filename.
Note: This Question is unanswered, help us to find answer for this one
657. A reason to overload the ________ is to write classes that have array-like behaviors.
Answer
Correct Answer:
Square brackets [ ] operator
Note: This Question is unanswered, help us to find answer for this one
658. For downloaded software, the details of the software license usually appear during ______.
Answer
Correct Answer:
Installation
Note: This Question is unanswered, help us to find answer for this one
659. A(n) ____ is a set of values together with a set of operations.
Answer
Correct Answer:
Data type
Note: This Question is unanswered, help us to find answer for this one
660. Current computer programs are able to identify some objects _____.
Answer
Correct Answer:
But they often make errors that a human would never make
Note: This Question is unanswered, help us to find answer for this one
661. A ______ is a symbol used to represent a location in memory.
Note: This Question is unanswered, help us to find answer for this one
662. A string with delimiters can be parsed into separate fields using the _____ class.
Answer
Correct Answer:
StringTokenizer
Note: This Question is unanswered, help us to find answer for this one
663. A method that is associated with an individual object is called ________.
Answer
Correct Answer:
An instance method
Note: This Question is unanswered, help us to find answer for this one
664. A loop that continues to execute endlessly is called a(n) ____ loop.
Note: This Question is unanswered, help us to find answer for this one
665. A function includes its ____, which are values used by the function.
Answer
Correct Answer:
Parameters
Note: This Question is unanswered, help us to find answer for this one
666. A data item is ____ when it cannot be changed while a program is running
Note: This Question is unanswered, help us to find answer for this one
667. A class ____ automatically executes whenever a class object goes out of scope.
Answer
Correct Answer:
Destructor
Note: This Question is unanswered, help us to find answer for this one
668. ________ functions may have the same name, as long as their parameter lists are different.
Answer
Correct Answer:
Two or more
Note: This Question is unanswered, help us to find answer for this one
669. ____ a data item means you override incorrect data by setting the variable to a specific value.
Note: This Question is unanswered, help us to find answer for this one
670. You create a named constant using the ____ statement.
Note: This Question is unanswered, help us to find answer for this one
671. You can break up a long statement into multiple lines as long as you don't break up a ________.
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
672. The goal of _____ is to build a system that is effective, reliable, and maintainable.
Answer
Correct Answer:
System design
Note: This Question is unanswered, help us to find answer for this one
673. In addition to using loops to validate data, ________ can also be used to validate data.
Answer
Correct Answer:
Boolean Function
Note: This Question is unanswered, help us to find answer for this one
674. In a computer, each_____ can represent one letter, number, or symbol.
Note: This Question is unanswered, help us to find answer for this one
675. ____ error messages indicate coding errors detected by the compiler.
Note: This Question is unanswered, help us to find answer for this one
676. A ________ a string of bits used to encrypt the data.
Note: This Question is unanswered, help us to find answer for this one
677. A ____ is a variable that you set to indicate whether some event has occurred.
Note: This Question is unanswered, help us to find answer for this one
678. ______ data consists of numbers that can be used in arithmetic operations.
Note: This Question is unanswered, help us to find answer for this one
679. A locally declared variable always ____ another variable with the same name elsewhere in the class.
Note: This Question is unanswered, help us to find answer for this one
680. Assigning initial values to an array is often referred to as ____.
Answer
Correct Answer:
Populating
Note: This Question is unanswered, help us to find answer for this one
681. ____ are the characteristics that define an object as part of a class.
Answer
Correct Answer:
Behaviors
Note: This Question is unanswered, help us to find answer for this one
682. A ________ value in a loop can be either a positive or a negative number.
Note: This Question is unanswered, help us to find answer for this one
683. A special character that is used to substitute for a character or many characters is a(n) ________.
Note: This Question is unanswered, help us to find answer for this one
684. A situation where two software packages use resources in incompatible ways is called a(n) ____.
Note: This Question is unanswered, help us to find answer for this one
685. A method can receive ____ arguments, even if it is defined as needing double arguments.
Note: This Question is unanswered, help us to find answer for this one
686. A literal string can be assigned a zero-length string value called a(n) ____ string.
Note: This Question is unanswered, help us to find answer for this one
687. A condition is a ________ expression
Note: This Question is unanswered, help us to find answer for this one
688. A comparison is correct only when the correct ____ and operator are used
Note: This Question is unanswered, help us to find answer for this one
689. A class ____ is a collection of classes that can be made available for developers to use. class library
Note: This Question is unanswered, help us to find answer for this one
690. A ____ loop is best used when the specific number of iterations required is known.
Note: This Question is unanswered, help us to find answer for this one
691. A ____ is a named memory location that you can use to store a value.
Note: This Question is unanswered, help us to find answer for this one
692. A ____ exception occurs when code attempts to divide a number by zero.
Answer
Correct Answer:
Divide by Zero
Note: This Question is unanswered, help us to find answer for this one
693. ____ occurs when both of the operands are integers.
Answer
Correct Answer:
Both operands are true
Note: This Question is unanswered, help us to find answer for this one
694. Each data type is a class from which a variable can be ____.
Answer
Correct Answer:
Instantiated
Note: This Question is unanswered, help us to find answer for this one
695. ________ property is work that is the result of someone's creativity and knowledge.
Answer
Correct Answer:
Intellectual property
Note: This Question is unanswered, help us to find answer for this one
696. John's height is 6 feet 3 inches. this is an example of ________.
Note: This Question is unanswered, help us to find answer for this one
697. For maximum efficiency, a good rule of thumb in an and decision is to ____.
Answer
Correct Answer:
First ask the question that is more likely to be false.
Note: This Question is unanswered, help us to find answer for this one
698. Compared to traditional advertising, an effective business use of social media tools is to _____.
Answer
Correct Answer:
Engage customers
Note: This Question is unanswered, help us to find answer for this one
699. A digital certificate usually contains all of the following except ____.
Answer
Correct Answer:
a keycode that destroys all evidence of the certificate upon use
Note: This Question is unanswered, help us to find answer for this one
700. _____ measures the amount of space between words.
Note: This Question is unanswered, help us to find answer for this one
701. The ____ is the device or substance that actually holds data.
Answer
Correct Answer:
Storage medium
Note: This Question is unanswered, help us to find answer for this one
702. Tables are similar in design to ____.
Answer
Correct Answer:
Spreadsheets
Note: This Question is unanswered, help us to find answer for this one
703. In 1982, the percentage of households that had a computer was closest to ____ percent.
Note: This Question is unanswered, help us to find answer for this one
704. An internal user is one who is a ____.
Answer
Correct Answer:
Worker in the same organization that provides support services
Note: This Question is unanswered, help us to find answer for this one
705. A ________ combines the functionality of a smartphone with a screen the size of a tablet.
Note: This Question is unanswered, help us to find answer for this one
706. The basis of an xp plan is a set of ____ that users develop.
Answer
Correct Answer:
User stories
Note: This Question is unanswered, help us to find answer for this one
707. The arguments sent to a method in a method call are often referred to as ____ parameters.
Note: This Question is unanswered, help us to find answer for this one
708. Creative commons licenses are ________.
Answer
Correct Answer:
Irrevocable
Note: This Question is unanswered, help us to find answer for this one
709. A variation of the content model is sometimes called the ____ model.
Answer
Correct Answer:
Information
Note: This Question is unanswered, help us to find answer for this one
710. ____ input data from special forms to score or tally exams, questionnaires, ballots, and so forth.
Answer
Correct Answer:
Optical mark readers (OMRs)
Note: This Question is unanswered, help us to find answer for this one
711. A ____ is information presented on a physical medium, such as paper.
Answer
Correct Answer:
Hard copy
Note: This Question is unanswered, help us to find answer for this one
712. _____ is the imitation of the operation of a real-world process or system over time.
Answer
Correct Answer:
Simulation
Note: This Question is unanswered, help us to find answer for this one
713. Statistical information such as totals and averages is calculated using ____.
Answer
Correct Answer:
Aggregate functions
Note: This Question is unanswered, help us to find answer for this one
714. The introduction of _____ on cell phones was the first step toward realizing augmented reality.
Answer
Correct Answer:
Geographic positioning systems
Note: This Question is unanswered, help us to find answer for this one
715. Robotic cameras used by television stations for sports events require a ________ operating system.
Answer
Correct Answer:
Real-time
Note: This Question is unanswered, help us to find answer for this one
716. In the url http://www.cengage.com/index.html, http: is the ____.
Note: This Question is unanswered, help us to find answer for this one
717. If your time is limited, consider using a logical acquisition or ____ acquisition data copy method.
Note: This Question is unanswered, help us to find answer for this one
718. Classifying end users as internal versus external is a classification by ____.
Answer
Correct Answer:
Relationship
Note: This Question is unanswered, help us to find answer for this one
719. Business reports that list only totals, with no individual item details, are called ____.
Answer
Correct Answer:
Summary reports
Note: This Question is unanswered, help us to find answer for this one
720. An sd card is an example of a(n) ________ card.
Note: This Question is unanswered, help us to find answer for this one
721. A(n) ________ search is more efficient than a ________ search.
Answer
Correct Answer:
Binary, linear
Note: This Question is unanswered, help us to find answer for this one
722. A(n) ________ is a worksheet where totals from other worksheets are summarized and displayed.
Answer
Correct Answer:
Summarysheet
Note: This Question is unanswered, help us to find answer for this one
723. A(n) _____ provides access for customers, employees, suppliers, and the public.
Answer
Correct Answer:
Corporate portal
Note: This Question is unanswered, help us to find answer for this one
724. A subscript is a(n) _____.
Answer
Correct Answer:
Number that indicates the position of an array element
Note: This Question is unanswered, help us to find answer for this one
725. A software package used to prepare budgets, reports, forecasts, and financial statements is a ____.
Answer
Correct Answer:
Spreadsheet program
Note: This Question is unanswered, help us to find answer for this one
726. A ____ object forces the user to select only one option from a group of options.
Answer
Correct Answer:
RadioButton
Note: This Question is unanswered, help us to find answer for this one
727. Computing components are designed to last 18 to ____ months in normal business operations.
Note: This Question is unanswered, help us to find answer for this one
728. ____ are common examples of e-marketplaces.
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
729. ____ a file places a duplicate version of the file in a new location that you specify.
Note: This Question is unanswered, help us to find answer for this one
730. ____ uses a number of hard drives to store information across multiple drive units.
Note: This Question is unanswered, help us to find answer for this one
731. ____ is registering, selling, or using a domain name to profit from someone else?s trademark.
Answer
Correct Answer:
Cybersquatting
Note: This Question is unanswered, help us to find answer for this one
732. ____ consists of full-motion images played back at various speeds.
Note: This Question is unanswered, help us to find answer for this one
733. A file not within a subfolder is said to be in the _______________.
Answer
Correct Answer:
Root directory
Note: This Question is unanswered, help us to find answer for this one
734. _____ is what you put into a computer; _____ is what you get out of it.
Answer
Correct Answer:
Data; information
Note: This Question is unanswered, help us to find answer for this one
735. A monitor is a(n) ____ device
Note: This Question is unanswered, help us to find answer for this one
736. In the chicago style, the ________ is displayed using hanging indent.
Answer
Correct Answer:
Bibliography
Note: This Question is unanswered, help us to find answer for this one
737. A ____ virus is a virus that infects a piece of executable code such as an .exe or .com file.
Answer
Correct Answer:
File infector
Note: This Question is unanswered, help us to find answer for this one
738. Each element in a two-dimensional array requires ____ subscript(s) to reference it.
Note: This Question is unanswered, help us to find answer for this one
739. An array whose elements you can access using a single subscript is a ____ array.
Answer
Correct Answer:
One dimensional
Note: This Question is unanswered, help us to find answer for this one
740. The ____ is the user interface to the os.
Note: This Question is unanswered, help us to find answer for this one
741. In a function template, the programmer substitutes ________ for ________.
Answer
Correct Answer:
Parameters, data types
Note: This Question is unanswered, help us to find answer for this one
742. Apa-style papers use ________ as the title of the list of sources.
Answer
Correct Answer:
References
Note: This Question is unanswered, help us to find answer for this one
743. Cartoonists create animated films by drawing a sequence of ____ or cells.
Note: This Question is unanswered, help us to find answer for this one
744. The ________ of a secondary storage device indicates how much data the storage medium can hold.
Note: This Question is unanswered, help us to find answer for this one
745. The sequential search algorithm uses a(n) ____ variable to track whether the item is found.
Note: This Question is unanswered, help us to find answer for this one
746. Computer-integrated manufacturing integrates ______________ with manufacturing.
Answer
Correct Answer:
Information from across the organization
Note: This Question is unanswered, help us to find answer for this one
747. To hide field codes on the screen, press the ____ keys.
Note: This Question is unanswered, help us to find answer for this one
748. Desktop, laptop, and tablet computers, and mobile devices are classified as _______.
Answer
Correct Answer:
Personal computers
Note: This Question is unanswered, help us to find answer for this one
749. In a cd-r, the r stands for ____ technology.
Answer
Correct Answer:
Recordable
Note: This Question is unanswered, help us to find answer for this one
750. Tables queries and forms are examples of access ____
Note: This Question is unanswered, help us to find answer for this one
751. Use the ________ method to write text to a web page.
Answer
Correct Answer:
Document.write()
Note: This Question is unanswered, help us to find answer for this one
752. During the early years of computing, a mainframe computer was called the ____.
Note: This Question is unanswered, help us to find answer for this one
753. Analysts often refer to the three ____’s when describing characteristics of big data
Note: This Question is unanswered, help us to find answer for this one
754. To create a module you write its ________.
Answer
Correct Answer:
Definition
Note: This Question is unanswered, help us to find answer for this one
755. When working in the navigation pane, you ____ a folder to open it.
Answer
Correct Answer:
Double-click
Note: This Question is unanswered, help us to find answer for this one
756. Which of the following is not a comparison operator ____
Note: This Question is unanswered, help us to find answer for this one
757. Personal ethics deals with ____.
Answer
Correct Answer:
The choices and behaviors made by individuals
Note: This Question is unanswered, help us to find answer for this one
758. To watch video on a computer, you need special hardware plus software known as a _____.
Answer
Correct Answer:
Media player
Note: This Question is unanswered, help us to find answer for this one
759. A race condition ____.
Answer
Correct Answer:
Results when several threads try to access and modify the same data concurrently
Note: This Question is unanswered, help us to find answer for this one
760. The number of colors a monitor can display is referred to as ____
Answer
Correct Answer:
Color depth
Note: This Question is unanswered, help us to find answer for this one
761. The process of accessing information from secondary storage devices is referred to as _______.
Note: This Question is unanswered, help us to find answer for this one
762. Implicit memory is to _____ as explicit memory is to _____.
Answer
Correct Answer:
Priming; episodic memory
Note: This Question is unanswered, help us to find answer for this one
763. When a user prints a report for class, the report would be ________.
Note: This Question is unanswered, help us to find answer for this one
764. The most basic file ____ are characteristics such as filename, creation date, and modified date.
Note: This Question is unanswered, help us to find answer for this one
765. The term for a collection of website files stored on a web server is ____.
Answer
Correct Answer:
remote website
Note: This Question is unanswered, help us to find answer for this one
766. The ____________________ of relational and logical operators is said to be from left to right.
Answer
Correct Answer:
Associativity
Note: This Question is unanswered, help us to find answer for this one
767. The ________ operator is used in c++ to test for equality.
Note: This Question is unanswered, help us to find answer for this one
768. The ________ operator is a unary operator, as it works with only one operand.
Note: This Question is unanswered, help us to find answer for this one
769. The ________ of a local variable is the function in which that variable is created.
Note: This Question is unanswered, help us to find answer for this one
770. The ____ command can be used to provide a long listing for each file in a certain directory.
Note: This Question is unanswered, help us to find answer for this one
771. Digital wallet transactions occur ____.
Answer
Correct Answer:
either a. or b
Note: This Question is unanswered, help us to find answer for this one
772. Cloud computing provides ____ on demand, which matches resources to needs at any given time.
Note: This Question is unanswered, help us to find answer for this one
773. Before using the data type string, the program must include the header file ____.
Note: This Question is unanswered, help us to find answer for this one
774. A(n) _____ is an input device used to grade multiple-choice and true/false tests.
Answer
Correct Answer:
Optical mark recognition system
Note: This Question is unanswered, help us to find answer for this one
775. A search can be performed on an array of ________ .
Note: This Question is unanswered, help us to find answer for this one
776. A _____ is the size of a character.
Answer
Correct Answer:
Fixed, variable
Note: This Question is unanswered, help us to find answer for this one
777. A _____ allows data to be stored in multiple places to improve a system’s reliability.
Answer
Correct Answer:
A redundant array of independent disks
Note: This Question is unanswered, help us to find answer for this one
778. One of the most popular ____ options is netflix.
Answer
Correct Answer:
Video on demand
Note: This Question is unanswered, help us to find answer for this one
779. Objects in an array are accessed with ________, just like any other data type in an array.
Answer
Correct Answer:
Subscripts
Note: This Question is unanswered, help us to find answer for this one
780. The ____ feature automatically locates specific text and then replaces it with desired text.
Answer
Correct Answer:
Find and Replace
Note: This Question is unanswered, help us to find answer for this one
781. The \ operator is the arithmetic operator for ____ division.
Note: This Question is unanswered, help us to find answer for this one
782. The _____ keyword is required to use relational operators in a case statement.
Note: This Question is unanswered, help us to find answer for this one
783. In c++, ____ is a reserved word.
Note: This Question is unanswered, help us to find answer for this one
784. When you return an array from a method, the method returns __________.
Answer
Correct Answer:
The reference of the array
Note: This Question is unanswered, help us to find answer for this one
785. When you copy data from a file on a storage device into ram, you ____ from the file.
Note: This Question is unanswered, help us to find answer for this one
786. Raid 0 uses disk ____, which spreads files over several disk drives.
Answer
Correct Answer:
Stripping
Note: This Question is unanswered, help us to find answer for this one
787. Programming style is important, because ________.
Answer
Correct Answer:
Good programming style makes a program more readable
Good programming style helps reduce programming errors
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
788. Data types that are created by the programmer are known as ________.
Answer
Correct Answer:
Abstract data types
Note: This Question is unanswered, help us to find answer for this one
789. A sorting ____ is a field position within each line.
Answer
Correct Answer:
Sorting key
Note: This Question is unanswered, help us to find answer for this one
790. A simple text file is called a ____ file.
Answer
Correct Answer:
Sequential
Note: This Question is unanswered, help us to find answer for this one
791. ________ happens when an input operation attempts to read data, but there is no data to read.
Answer
Correct Answer:
Empty Input
Note: This Question is unanswered, help us to find answer for this one
792. A destructor has the character ____, followed by the name of the class.
Note: This Question is unanswered, help us to find answer for this one
793. The relationship created with composition is called a(n) ____ relationship.
Note: This Question is unanswered, help us to find answer for this one
794. Virtualization is the process by which ________.
Answer
Correct Answer:
One physical computer hosts many different virtual computers within it
Note: This Question is unanswered, help us to find answer for this one
795. The two major types of system software programs are utility programs and the ________.
Answer
Correct Answer:
Operating system
Note: This Question is unanswered, help us to find answer for this one
796. The first step in building an entity-relationship diagram (erd) is _____.
Answer
Correct Answer:
Identifying the attributes and primary keys that adequately describe the entities
Note: This Question is unanswered, help us to find answer for this one
797. The bullets button is available on the home tab of the ribbon in the ____ group.
Answer
Correct Answer:
Paragraph
Note: This Question is unanswered, help us to find answer for this one
798. The ________ of the operating system enables users to communicate with the computer system.
Answer
Correct Answer:
User Interface
Note: This Question is unanswered, help us to find answer for this one
799. The ________ has the largest capacity of any storage device
Answer
Correct Answer:
Mechanical Hard Drive
Note: This Question is unanswered, help us to find answer for this one
800. Many programming languages include a string operation called __________.
Answer
Correct Answer:
Concatenation
Note: This Question is unanswered, help us to find answer for this one
801. A _____ enables communication by defining the format of data and rules for exchange.
Note: This Question is unanswered, help us to find answer for this one
802. The components of a struct are called the ____ of the struct.
Note: This Question is unanswered, help us to find answer for this one
803. The base case ________ the recursion.
Note: This Question is unanswered, help us to find answer for this one
804. The application gateway is also known as a(n) ____
Answer
Correct Answer:
Application level firewall
Note: This Question is unanswered, help us to find answer for this one
805. The 802.11 frame contains the _____ field.
Answer
Correct Answer:
Protocol version
Note: This Question is unanswered, help us to find answer for this one
806. Parsedouble is a method in the ________ class.
Note: This Question is unanswered, help us to find answer for this one
807. When they have the same name, variables within ____ of a class override the class’s fields.
Note: This Question is unanswered, help us to find answer for this one
808. A user ____ is what the user sees and interacts with while an application is running.
Answer
Correct Answer:
Interface
Note: This Question is unanswered, help us to find answer for this one
809. The most common type of database used on pcs today is a(n) ____.
Answer
Correct Answer:
Relational database
Note: This Question is unanswered, help us to find answer for this one
810. A ____ is a shared electrical or optical channel that connects two or more devices.
Note: This Question is unanswered, help us to find answer for this one
811. Many display devices are _____ monitors.
Answer
Correct Answer:
Flat panel
Note: This Question is unanswered, help us to find answer for this one
812. According to the value chain model, technology is considered a ________ of the firm.
Answer
Correct Answer:
Support activity
Note: This Question is unanswered, help us to find answer for this one
813. The class ____ is the base of the classes designed to handle exceptions.
Answer
Correct Answer:
Exception
Note: This Question is unanswered, help us to find answer for this one
814. Most commercial ________ include(s) an online catalog, a shopping cart, and a secure order form.
Answer
Correct Answer:
E-commerce hosting packages
Note: This Question is unanswered, help us to find answer for this one
815. Metadata are ________.
Answer
Correct Answer:
Data that describe data
Note: This Question is unanswered, help us to find answer for this one
816. The ethernet length field gives the length of the ________.
Answer
Correct Answer:
Data field
Note: This Question is unanswered, help us to find answer for this one
817. Rad relies heavily on ____
Answer
Correct Answer:
Prototyping
Note: This Question is unanswered, help us to find answer for this one
818. Xlsx and gif are examples of file ____.
Answer
Correct Answer:
Extensions
Note: This Question is unanswered, help us to find answer for this one
819. With ____, macintosh moved to the intel processor and became unix based.
Note: This Question is unanswered, help us to find answer for this one
820. Wary bidders in low-price auctions can check the_____ to protect themselves from being cheated.
Answer
Correct Answer:
Seller's records
Note: This Question is unanswered, help us to find answer for this one
821. Two pioneers of usability testing are _____ and jakob nielsen.
Answer
Correct Answer:
Ben Shneiderman
Note: This Question is unanswered, help us to find answer for this one
822. Traditionally, large companies distribute excess inventory through _____.
Answer
Correct Answer:
Their own Web auction sites
Note: This Question is unanswered, help us to find answer for this one
823. To declare a constant max_length inside a method with value 99.98, you write ________.
Answer
Correct Answer:
Final double MAX_LENGTH = 99.98;
Note: This Question is unanswered, help us to find answer for this one
824. The process of converting human-readable data into machine-readable form is called _____.
Answer
Correct Answer:
Data entry
Note: This Question is unanswered, help us to find answer for this one
825. Flatbed, sheet-fed, pen, and handheld are types of _____.
Note: This Question is unanswered, help us to find answer for this one
826. To increase a paragraph indent use the _____ shortcut keys
Note: This Question is unanswered, help us to find answer for this one
827. A structure that has a loop that is inside another loop is called a(n) ________ loop
Note: This Question is unanswered, help us to find answer for this one
828. The type of software used widely in businesses to complete specific tasks is _____.
Answer
Correct Answer:
Application software
Note: This Question is unanswered, help us to find answer for this one
829. Information systems improve process quality by ________.
Answer
Correct Answer:
Controlling process flow
Note: This Question is unanswered, help us to find answer for this one
830. Information entered into a field is called the field ____.
Note: This Question is unanswered, help us to find answer for this one
831. A(n) ____________________ is a memory location whose contents can be changed.
Note: This Question is unanswered, help us to find answer for this one
832. A(n) _____ provides rapid access to timely information and direct access to management reports.
Answer
Correct Answer:
Digital dashboard
Note: This Question is unanswered, help us to find answer for this one
833. A type of memory whose contents are not lost if the power is turned off is said to be _____.
Answer
Correct Answer:
Nonvolatile
Note: This Question is unanswered, help us to find answer for this one
834. A protocol analyzer is also known as ____.
Note: This Question is unanswered, help us to find answer for this one
835. A market pay line _____.
Answer
Correct Answer:
Links a company's benchmark jobs with market rates paid by competitors
Note: This Question is unanswered, help us to find answer for this one
836. A digital computer uses _____ that represent data in the form of code.
Note: This Question is unanswered, help us to find answer for this one
837. A digital _____ is a digital code or stream embedded undetectably in a digital image or audio file.
Answer
Correct Answer:
Watermark
Note: This Question is unanswered, help us to find answer for this one
838. A computer with a quad-processor has ________ cpus.
Note: This Question is unanswered, help us to find answer for this one
839. A computer that supports 10/100/1000 ethernet allows for 10, 100, or 1000 ________ per second.
Note: This Question is unanswered, help us to find answer for this one
840. A computer bus consists of data lines, __________, control lines, and power lines.
Answer
Correct Answer:
Address lines
Note: This Question is unanswered, help us to find answer for this one
841. A _____ is a program hidden inside another program or web page that masks its true purpose.
Answer
Correct Answer:
Trojan Horse
Note: This Question is unanswered, help us to find answer for this one
842. A _____ is a private network connecting servers and storage units.
Answer
Correct Answer:
Storage-area network
Note: This Question is unanswered, help us to find answer for this one
843. A ____ should be used to provide visual indication that option buttons belong in the same group.
Note: This Question is unanswered, help us to find answer for this one
844. ________ is the worldwide leader of erp vendors
Note: This Question is unanswered, help us to find answer for this one
845. ________ is the worldwide leader of enterprise resource planning (erp) vendors.
Note: This Question is unanswered, help us to find answer for this one
846. ________ duplicates data across databases.
Answer
Correct Answer:
Data propagation
Note: This Question is unanswered, help us to find answer for this one
847. _______ provide additional information and request user input.
Answer
Correct Answer:
Dialog boxes
Note: This Question is unanswered, help us to find answer for this one
848. ______ is a form of database processing that supports top-down, query-driven data analysis.
Answer
Correct Answer:
Online analytical processing (OLAP)
Note: This Question is unanswered, help us to find answer for this one
849. _____ is the use of interpersonal connections online to promote or sell goods and services.
Answer
Correct Answer:
Social commerce
Note: This Question is unanswered, help us to find answer for this one
850. Clicking the show/hide button on the home tab of the ribbon displays ________.
Answer
Correct Answer:
Formatting marks
Note: This Question is unanswered, help us to find answer for this one
851. Loops are frequently used to ____; that is, to make sure it is meaningful and useful.
Answer
Correct Answer:
Validate data
Note: This Question is unanswered, help us to find answer for this one
852. Note that the unicode for character a is 65. the expression ""a"" + 1 evaluates to ________.
Note: This Question is unanswered, help us to find answer for this one
853. In the accompanying figure, the text “click to add title” is the title ____.
Answer
Correct Answer:
Placeholder.
Note: This Question is unanswered, help us to find answer for this one
854. In the accompanying figure, the split double arrow mouse pointer ____.
Answer
Correct Answer:
Is the result of moving the mouse pointer to the boundary between column heading A and column
Note: This Question is unanswered, help us to find answer for this one
855. A(n) ______ is a request for specific data from a database.
Note: This Question is unanswered, help us to find answer for this one
856. You may hear programmers refer to looping as ____.
Answer
Correct Answer:
Iteration
Note: This Question is unanswered, help us to find answer for this one
857. To securely erase data, the u.s. department of defense suggests that data be ________.
Answer
Correct Answer:
Overwritten multiple times
Note: This Question is unanswered, help us to find answer for this one
858. To declare a constant max_length as a member of the class, you write ________.
Answer
Correct Answer:
Final static double MAX_LENGTH = 99.98
Note: This Question is unanswered, help us to find answer for this one
859. The true benefit of using an array lies in your ability to use a ____ as a subscript to the array.
Note: This Question is unanswered, help us to find answer for this one
860. The leads online web-based service system is used by law enforcement to ____.
Answer
Correct Answer:
Recover stolen property
Note: This Question is unanswered, help us to find answer for this one
861. The last step in a while loop is usually to ____.
Answer
Correct Answer:
Increment the loop control variable
Note: This Question is unanswered, help us to find answer for this one
862. The amount by which a for loop control variable changes is often called a ____ value.
Note: This Question is unanswered, help us to find answer for this one
863. The action or actions that occur within a loop are known as a(n) ____.
Answer
Correct Answer:
Loop body
Note: This Question is unanswered, help us to find answer for this one
864. Many programming languages allow you to use ____ to force an expression to evaluate first.
Answer
Correct Answer:
Parentheses
Note: This Question is unanswered, help us to find answer for this one
865. Antiglare screens are sometimes called ____.
Answer
Correct Answer:
Eye protectors
Note: This Question is unanswered, help us to find answer for this one
866. A(n) ____ is a data element containing the address of another data element.
Note: This Question is unanswered, help us to find answer for this one
867. When calling this() from a constructor, it must be the ____ statement within the constructor.
Note: This Question is unanswered, help us to find answer for this one
868. Usually, when you create nested loops, each loop has its own ____.
Answer
Correct Answer:
Loop control variable
Note: This Question is unanswered, help us to find answer for this one
869. The mac computer employs the ____ system to encrypt its file data.
Answer
Correct Answer:
FireVault
Note: This Question is unanswered, help us to find answer for this one
870. The ________ and ________ operators can be used to increment or decrement a pointer variable.
Note: This Question is unanswered, help us to find answer for this one
871. One advantage of proprietary software versus off-the-shelf software is that _____.
Answer
Correct Answer:
Being involved in the development offers control over the results
Note: This Question is unanswered, help us to find answer for this one
872. Once your logic enters the body of a structured loop, ____.
Answer
Correct Answer:
The entire loop must execute
Note: This Question is unanswered, help us to find answer for this one
873. Every array has a(n) ____ size.
Note: This Question is unanswered, help us to find answer for this one
874. Comparison operators are also referred to as ____ operators.
Answer
Correct Answer:
Relational
Note: This Question is unanswered, help us to find answer for this one
875. Class ________ represents an image that can be displayed on a jlabel.
Answer
Correct Answer:
ImageIcon.
Note: This Question is unanswered, help us to find answer for this one
876. A dvd-rom uses all of the following to achieve a higher storage capacity than a cd-rom except ____.
Answer
Correct Answer:
Making the disc single-session
Note: This Question is unanswered, help us to find answer for this one
877. Encryption that uses 16-character keys is known as ____.
Answer
Correct Answer:
Strong 128-bit encryption
Note: This Question is unanswered, help us to find answer for this one
878. An attribute of an entity in a table is called a ________.
Note: This Question is unanswered, help us to find answer for this one
879. All of the following are examples of software packages except ________.
Answer
Correct Answer:
Microsoft OneNote
Note: This Question is unanswered, help us to find answer for this one
880. The ________ operator performs division and returns the remainder.
Note: This Question is unanswered, help us to find answer for this one
881. The ____ of a variable specifies where a variable can be referenced within a program.
Note: This Question is unanswered, help us to find answer for this one
882. File management capabilities available from application software include ____ files.
Answer
Correct Answer:
ALL OF THE ABOVE
Note: This Question is unanswered, help us to find answer for this one
883. A pointer variable may be initialized with ________.
Answer
Correct Answer:
Any address in the computer's memory
Note: This Question is unanswered, help us to find answer for this one
884. A member function that is declared ________ cannot use the this pointer.
Note: This Question is unanswered, help us to find answer for this one
885. A function ________ return a structure.
Note: This Question is unanswered, help us to find answer for this one
886. ____ is freeware software.
Answer
Correct Answer:
Internet Explorer (Web browser)
Note: This Question is unanswered, help us to find answer for this one
887. ________ is not one of the five primary activities in the value chain.
Answer
Correct Answer:
Firm infrastructure (accounting, finance, management)
Note: This Question is unanswered, help us to find answer for this one
888. ________ is free software created and updated by a worldwide community of programmers.
Answer
Correct Answer:
Open-source software
Note: This Question is unanswered, help us to find answer for this one
889. ________ is a standard way of drawing diagrams that describe object-oriented systems.
Note: This Question is unanswered, help us to find answer for this one
890. ________ is a set of commands used to control a database, which includes security.
Note: This Question is unanswered, help us to find answer for this one
891. A(n) _____ describes information about an object.
Answer
Correct Answer:
Attribute
Note: This Question is unanswered, help us to find answer for this one
892. A _____ can be as powerful as a desktop computer.
Note: This Question is unanswered, help us to find answer for this one
893. A ____ virus is a common type of virus that is programmed into an attached macro file.
Note: This Question is unanswered, help us to find answer for this one
894. A ____ symbol is another name for a dot symbol
Note: This Question is unanswered, help us to find answer for this one
895. A ____ storage device stores and retrieves data items in a linear, or sequential, order.
Answer
Correct Answer:
Serial Access
Note: This Question is unanswered, help us to find answer for this one
896. ________ is sometimes the term used for input validation.
Answer
Correct Answer:
Error trap
Note: This Question is unanswered, help us to find answer for this one
897. ____ software controls the flow of data, provides data security, and manages network operations.
Note: This Question is unanswered, help us to find answer for this one
898. ____ is a shareware program
Answer
Correct Answer:
WinZip (file compression program
Note: This Question is unanswered, help us to find answer for this one
899. ____ is a process that hides encrypted messages within different types of files.
Answer
Correct Answer:
Steganography
Note: This Question is unanswered, help us to find answer for this one
900. ____ also is called looping.
Answer
Correct Answer:
Iteration
Note: This Question is unanswered, help us to find answer for this one
901. To insert data into an ole object field, use ____ command on the ole?s shortcut menu.
Answer
Correct Answer:
Insert Object
Note: This Question is unanswered, help us to find answer for this one
902. Winload loads into memory the ________________ but does not start it yet.
Note: This Question is unanswered, help us to find answer for this one
903. To delete data from a disk in such a way that no one can ever read it, you should ____.
Answer
Correct Answer:
Use special file shredder software
Note: This Question is unanswered, help us to find answer for this one
904. The four functions of the computer include input, process, output, and ________.
Note: This Question is unanswered, help us to find answer for this one
905. The two main categories of home and office printers are ________ and laser printers.
Note: This Question is unanswered, help us to find answer for this one
906. To include the total row in the design grid, click the ____ button on the design tab.
Note: This Question is unanswered, help us to find answer for this one
907. Usb drives can store up to ____ of data
Note: This Question is unanswered, help us to find answer for this one
908. The first basic step in the development process of a multimedia web site is ____.
Answer
Correct Answer:
Creating the multimedia elements
Note: This Question is unanswered, help us to find answer for this one
909. The characteristics of an entity are called ____.
Answer
Correct Answer:
Attributes
Note: This Question is unanswered, help us to find answer for this one
910. The number of bits used to store color information about each pixel is called ____.
Answer
Correct Answer:
Bit depth
Note: This Question is unanswered, help us to find answer for this one
911. The traditional keyboard layout is called _________.
Note: This Question is unanswered, help us to find answer for this one
912. Use ____ references when you want different formulas to refer to the same cell
Note: This Question is unanswered, help us to find answer for this one
913. When an html document includes a script, it is included the ____ section.
Note: This Question is unanswered, help us to find answer for this one
914. When an array is passed to a function, it is actually ________ the array that is/are passed.
Answer
Correct Answer:
A copy of all the values in
Note: This Question is unanswered, help us to find answer for this one
915. When an application is run, the method that must be executed first must be named ____.
Note: This Question is unanswered, help us to find answer for this one
916. You may use a pointer to a structure as a ________.
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
917. The primary input devices for smartphones are ________.
Answer
Correct Answer:
Microphone and touch pad
Note: This Question is unanswered, help us to find answer for this one
918. You specify 2d colors by using the ____ method.
Note: This Question is unanswered, help us to find answer for this one
919. When reading words using a scanner object's next method, ____.
Answer
Correct Answer:
Any characters at the beginning of the input that are considered to be white space are consumed and become part of the word being read.
Note: This Question is unanswered, help us to find answer for this one
920. When preparing a case, you can apply ____ to problem solving.
Answer
Correct Answer:
Standard systems analysis steps
Note: This Question is unanswered, help us to find answer for this one
921. Web based application software is software that ________
Answer
Correct Answer:
Is stored completely on a web server instead of your hard drive
Note: This Question is unanswered, help us to find answer for this one
922. Vector graphics is the use of ____ to represent images in computer graphics
Note: This Question is unanswered, help us to find answer for this one
923. Variety-based positioning refers to __________.
Answer
Correct Answer:
Serving few needs of many customers
Note: This Question is unanswered, help us to find answer for this one
924. Variety can ________ a design
Answer
Correct Answer:
Invigorate
Note: This Question is unanswered, help us to find answer for this one
925. Variables defined in the method header are called ________.
Answer
Correct Answer:
Formal parameters
Note: This Question is unanswered, help us to find answer for this one
926. Use the ________ property to configure rounded corners with css.
Answer
Correct Answer:
Border-radius
Note: This Question is unanswered, help us to find answer for this one
927. Unwanted or junk e-mail is called ________.
Note: This Question is unanswered, help us to find answer for this one
928. Unix and linux are ____ systems, which allow one user to execute more than one program at a time.
Answer
Correct Answer:
Multitasking
Note: This Question is unanswered, help us to find answer for this one
929. Thousands of computers working in parallel to deliver services is called a ________.
Answer
Correct Answer:
Server farm
Note: This Question is unanswered, help us to find answer for this one
930. This piece is entitled _______(1)_______. it is attributed to the _______(2)_______.
Answer
Correct Answer:
(1) Hunter’s Mural; (2) Freemont people
Note: This Question is unanswered, help us to find answer for this one
931. The way a network is designed to communicate is known as its ____.
Answer
Correct Answer:
Architecture
Note: This Question is unanswered, help us to find answer for this one
932. The statement, ____, removes the table smaller from a dbms.
Answer
Correct Answer:
DROP TABLE Smaller ;
Note: This Question is unanswered, help us to find answer for this one
933. The sql ________ statement allows you to combine two different tables.
Note: This Question is unanswered, help us to find answer for this one
934. The special operator used to check whether a subquery returns any rows is ____.
Note: This Question is unanswered, help us to find answer for this one
935. The section of an inode that stores permissions is called the ____ of the file.
Note: This Question is unanswered, help us to find answer for this one
936. The primary outcome of the systems analysis phase is ____.
Answer
Correct Answer:
A prioritized list of system requirements
Note: This Question is unanswered, help us to find answer for this one
937. The order of operations for _____________ is not first, then and, then or.
Answer
Correct Answer:
Logical operators
Note: This Question is unanswered, help us to find answer for this one
938. The optical _________ is the most common pointing device for desktop computers.
Note: This Question is unanswered, help us to find answer for this one
939. You use the ____ method to select all of the text contained in a text box.
Answer
Correct Answer:
SelectAll
Note: This Question is unanswered, help us to find answer for this one
940. You should use a ____ control to provide keyboard access to a list box.
Note: This Question is unanswered, help us to find answer for this one
941. The part of the data bus that runs between the microprocessor and ram is called the _______ bus.
Answer
Correct Answer:
Local (A)
Note: This Question is unanswered, help us to find answer for this one
942. When you need to sort data on two columns, the less important column is called the ____ sort key.
Note: This Question is unanswered, help us to find answer for this one
943. Unencrypted information is called ____.
Answer
Correct Answer:
Plain text
Note: This Question is unanswered, help us to find answer for this one
944. When the ________ is placed in front of a variable name, it returns the address of that variable.
Answer
Correct Answer:
Ampersand ( & )
Note: This Question is unanswered, help us to find answer for this one
945. When defining a variable, the keyword ____ appears at the beginning of the statement.
Note: This Question is unanswered, help us to find answer for this one
946. "to select and set properties for an entire section, click on the ____.
Answer
Correct Answer:
Section selector
Note: This Question is unanswered, help us to find answer for this one
947. When you store data records, they exist in ____.
Answer
Correct Answer:
Some type of order
Note: This Question is unanswered, help us to find answer for this one
948. Use the ______ value for the css display property to configure an element to not display.
Note: This Question is unanswered, help us to find answer for this one
949. When functions are nested, the ____ function is solved first.
Note: This Question is unanswered, help us to find answer for this one
950. To quit access, click the ____ button on the right side of the access title bar.
Note: This Question is unanswered, help us to find answer for this one
951. Podcasts enable you to ________
Answer
Correct Answer:
Deliver audio/video files via RSS
Note: This Question is unanswered, help us to find answer for this one
952. Only positive scenarios are validated in ___________ testing.
Answer
Correct Answer:
Build verification
Note: This Question is unanswered, help us to find answer for this one
953. One type of mobile phone that is not commonly used is the ____.
Answer
Correct Answer:
Satellite phone
Note: This Question is unanswered, help us to find answer for this one
954. One of the reasons the apple ii computer was popular was that ________.
Answer
Correct Answer:
The operating system was stored in ROM
Note: This Question is unanswered, help us to find answer for this one
955. One of the most common painting programs is ____.
Answer
Correct Answer:
Microsoft paint
Note: This Question is unanswered, help us to find answer for this one
956. In the tag, the ____ attribute indicates the type of data to be embedded.
Note: This Question is unanswered, help us to find answer for this one
957. In excel, the clipboard task pane opens ____ the worksheet window.
Answer
Correct Answer:
To the left of
Note: This Question is unanswered, help us to find answer for this one
958. If your device will not display a pdf in your browser, you may need to install a browser ________ .
Note: This Question is unanswered, help us to find answer for this one
959. Frequently-accessed information is held in _____.
Answer
Correct Answer:
Cache memory
Note: This Question is unanswered, help us to find answer for this one
960. File names cannot contain a(n) ____.
Answer
Correct Answer:
Question mark (?), colon (:)
Note: This Question is unanswered, help us to find answer for this one
961. Every complete c++ program must have a __________.
Answer
Correct Answer:
Function named main
Note: This Question is unanswered, help us to find answer for this one
962. Each device connected to a computer must have a _______.
Note: This Question is unanswered, help us to find answer for this one
963. Declaring a starting value for a variable is known as ____ the variable.
Answer
Correct Answer:
Initializing
Note: This Question is unanswered, help us to find answer for this one
964. Data files are often called ____.
Answer
Correct Answer:
Documents
Note: This Question is unanswered, help us to find answer for this one
965. Crt monitors use ____.
Answer
Correct Answer:
Analog signals
Note: This Question is unanswered, help us to find answer for this one
966. Copying a file can be accomplished using the ____ command.
Note: This Question is unanswered, help us to find answer for this one
967. Cookie files contain ____.
Note: This Question is unanswered, help us to find answer for this one
968. Computers gather data, which means that they allow users to ________ data.
Note: This Question is unanswered, help us to find answer for this one
969. Computers characterized by their use of vacuum tubes are considered ____-generation.
Note: This Question is unanswered, help us to find answer for this one
970. Computer speech recognition is _____.
Answer
Correct Answer:
Poorer than human speech recognition
Note: This Question is unanswered, help us to find answer for this one
971. Complete the formula for processor frequency. system bus frequency x________ = processor frequency
Answer
Correct Answer:
Multiplier
Note: This Question is unanswered, help us to find answer for this one
972. Complete loss of power for a moment is known as a ____.
Note: This Question is unanswered, help us to find answer for this one
973. Comparison shopping web sites are sometimes called ____
Answer
Correct Answer:
Shopping bots
Note: This Question is unanswered, help us to find answer for this one
974. Companies that deliver saas are sometimes referred to as ____.
Answer
Correct Answer:
Application service providers
Note: This Question is unanswered, help us to find answer for this one
975. Applications that are processed across multiple computing devices is known as a ________.
Answer
Correct Answer:
Distributed system
Note: This Question is unanswered, help us to find answer for this one
976. Another name for a sniffer is a(n) ________ analyzer.
Note: This Question is unanswered, help us to find answer for this one
977. A ________ query is used to summarize data organized by field values.
Note: This Question is unanswered, help us to find answer for this one
978. An electronic component that can be programmed to perform tasks is a ____.
Answer
Correct Answer:
Microprocessor
Note: This Question is unanswered, help us to find answer for this one
979. A(n) _____ system relies on artificial intelligence.
Note: This Question is unanswered, help us to find answer for this one
980. A script to handle a support incident has ____.
Answer
Correct Answer:
Several sequences of questions with multiple decision points or paths
Note: This Question is unanswered, help us to find answer for this one
981. A rewritable ____ is a replacement for a hard drive
Answer
Correct Answer:
None of the above
Note: This Question is unanswered, help us to find answer for this one
982. A program must __________ without any errors before it can be run.
Note: This Question is unanswered, help us to find answer for this one
983. A member function that is declared ________ may not access any non-static data members in the class
Note: This Question is unanswered, help us to find answer for this one
984. A file that tells a computer how to perform a specific task is called a(n) ____ file.
Answer
Correct Answer:
Executable
Note: This Question is unanswered, help us to find answer for this one
985. A display screen should be positioned so that it ____.
Answer
Correct Answer:
Is at a 90-degree angle to the light source
Note: This Question is unanswered, help us to find answer for this one
986. A dfd shows ____.
Answer
Correct Answer:
How a system transforms input data into useful information
Note: This Question is unanswered, help us to find answer for this one
987. A device's cache and main memory are ________.
Note: This Question is unanswered, help us to find answer for this one
988. A cryptographic __________ is a procedure for encryption or decryption.
Answer
Correct Answer:
Algorithm
Note: This Question is unanswered, help us to find answer for this one
989. A client server network is an example of ________ administration
Note: This Question is unanswered, help us to find answer for this one
990. A browser __________ adds features to a browser.
Answer
Correct Answer:
Extension
Note: This Question is unanswered, help us to find answer for this one
991. A _____ is a pathway on a circuit board through which data moves.
Note: This Question is unanswered, help us to find answer for this one
992. A ____ procedure returns a single value to the calling procedure.
Note: This Question is unanswered, help us to find answer for this one
993. A ____ is an electronic circuit
Answer
Correct Answer:
Voltage limiter
Note: This Question is unanswered, help us to find answer for this one
994. A ____ is a separate piece of hardware containing multiple high-speed hard drives.
Answer
Correct Answer:
Storage server
Note: This Question is unanswered, help us to find answer for this one
995. A ____ is a question, or, in database terms, a request for specific information from the database.
Note: This Question is unanswered, help us to find answer for this one
996. A ____ is a collection of computers and users that are identified by a common security database.
Note: This Question is unanswered, help us to find answer for this one
997. A ____ chip holds software that is used to start the computer.
Note: This Question is unanswered, help us to find answer for this one
998. _____, a coding method that uses one byte per character, is used on most personal computers.
Answer
Correct Answer:
ASCII (American Standard Code for Information Interchange)
Note: This Question is unanswered, help us to find answer for this one
999. ________ is a term relating to sending data to a satellite.
Note: This Question is unanswered, help us to find answer for this one
1000. ________ are data items whose values cannot change while the program is running.
Note: This Question is unanswered, help us to find answer for this one
1001. _______ is a tool for developing a virtual representation of any three-dimensional object.
Answer
Correct Answer:
3D modeling software
Note: This Question is unanswered, help us to find answer for this one
1002. ______ output provides the user with a physical response from the input device.
Note: This Question is unanswered, help us to find answer for this one
1003. ______ is most famous for making central processing units (cpu's).
Answer
Correct Answer:
Intel- they invented the first microprocessor
Note: This Question is unanswered, help us to find answer for this one
1004. _____ means saving data in computer memory.
Note: This Question is unanswered, help us to find answer for this one
1005. _____ are programs that test code to ensure that it contains no syntax errors.
Answer
Correct Answer:
Validators
Note: This Question is unanswered, help us to find answer for this one
1006. ____ variables and constants are known to the entire program.
Note: This Question is unanswered, help us to find answer for this one
1007. ____ usually involves having a software program that monitors every transaction within a system.
Answer
Correct Answer:
Computer auditing
Note: This Question is unanswered, help us to find answer for this one
1008. ____ transmissions are used with cell phones and are sent and received via cellular (cell) towers.
Answer
Correct Answer:
Cellular radio
Note: This Question is unanswered, help us to find answer for this one
1009. ____ threats are network security threats that originate from within a network.
Note: This Question is unanswered, help us to find answer for this one
1010. ____ software helps you carry out tasks using a computer, such as editing a photo.
Answer
Correct Answer:
Application
Note: This Question is unanswered, help us to find answer for this one
1011. ____ servers can store files that internet users can download, or transfer, to their computers.
Note: This Question is unanswered, help us to find answer for this one
1012. ____ occurs when data is entered into the computer.
Note: This Question is unanswered, help us to find answer for this one
1013. ____ networks use a central device to connect each device directly to the network.
Note: This Question is unanswered, help us to find answer for this one
1014. ____ is the use of networking technology to provide medical information and services.
Answer
Correct Answer:
Telemedicine
Note: This Question is unanswered, help us to find answer for this one
1015. ____ is the fastest and most current wi-fi standard.
Answer
Correct Answer:
Telemedicine
Note: This Question is unanswered, help us to find answer for this one
1016. ____ is not a valid file name.
Answer
Correct Answer:
Mary*Jon.doc
Note: This Question is unanswered, help us to find answer for this one
1017. ____ is one of the primary operations of a computer
Answer
Correct Answer:
C:Processing
Note: This Question is unanswered, help us to find answer for this one
1018. ____ is not one of the five critical questions suggested in the chapter.
Answer
Correct Answer:
How much experience do you have using this system?
Note: This Question is unanswered, help us to find answer for this one
1019. ____ is not a common source of job stress among user support workers.
Answer
Correct Answer:
All of these are common sources
Note: This Question is unanswered, help us to find answer for this one
1020. ____ is data before any encryption has been performed.
Answer
Correct Answer:
Plaintext
Note: This Question is unanswered, help us to find answer for this one
1021. ____ is an example of a web crawler.
Answer
Correct Answer:
Googlebot
Note: This Question is unanswered, help us to find answer for this one
1022. ____ is a scripting language that does not create standalone applications.
Answer
Correct Answer:
JavaScript
Note: This Question is unanswered, help us to find answer for this one
1023. ____ is a relational set operator.
Note: This Question is unanswered, help us to find answer for this one
1024. ____ is a packet-switched network that was designed for transmitting data over fixed lines.
Answer
Correct Answer:
Frame relay
Note: This Question is unanswered, help us to find answer for this one
1025. ____ help users establish a connection to another computer, mobile device, or network.
Answer
Correct Answer:
Communications software
Note: This Question is unanswered, help us to find answer for this one
1026. ____ files involves combining two or more files while maintaining the sequential order.
Note: This Question is unanswered, help us to find answer for this one
1027. ____ cookies remain available only for the current browser session.
Answer
Correct Answer:
Temporary
Note: This Question is unanswered, help us to find answer for this one
1028. ____ can tell more about a person than all other kinds of electronic surveillance.
Answer
Correct Answer:
Data mining
Note: This Question is unanswered, help us to find answer for this one
1029. ____ browsing allows you to open multiple web pages at one time.
Note: This Question is unanswered, help us to find answer for this one
1030. ____ are used to display data that is calculated from other data, such as a total.
Answer
Correct Answer:
Calculated Controls
Note: This Question is unanswered, help us to find answer for this one
1031. ____ applications require that a record be accessed immediately while a client is waiting.
Answer
Correct Answer:
Real-time
Note: This Question is unanswered, help us to find answer for this one
1032. The statement select * from t1, t2 produces a(n) _____ join.
Note: This Question is unanswered, help us to find answer for this one
1033. The size, or _______, is measured by the diagonal length of a monitor's viewing area.
Answer
Correct Answer:
Active display area
Note: This Question is unanswered, help us to find answer for this one
1034. The setonaction method is defined in ________.
Answer
Correct Answer:
ButtonBase
Note: This Question is unanswered, help us to find answer for this one
1035. The ____ file is typically saved with a prefix of inc_.
Note: This Question is unanswered, help us to find answer for this one
1036. Suppose integer x = new integer(3); x holds ________.
Answer
Correct Answer:
A reference value to an Integer object
Note: This Question is unanswered, help us to find answer for this one
1037. Steganalysis tools are also called ____.
Answer
Correct Answer:
Steg tools
Note: This Question is unanswered, help us to find answer for this one
1038. Ram is an example of ____ storage
Note: This Question is unanswered, help us to find answer for this one
1039. Pointers are variables that contain __________ as their values.
Answer
Correct Answer:
Memory addresses
Note: This Question is unanswered, help us to find answer for this one
1040. Multiple inheritance is when a ________ class has ________ base classes.
Answer
Correct Answer:
Derived, two or more
Note: This Question is unanswered, help us to find answer for this one
1041. Methods that set values are called ____ methods.
Note: This Question is unanswered, help us to find answer for this one
1042. Metacognition involves a troubleshooter asking all these questions except ____.
Answer
Correct Answer:
What recent change in configuration caused the user to experience a problem?
Note: This Question is unanswered, help us to find answer for this one
1043. Linux is an example of a(n) ______.
Answer
Correct Answer:
Operating system
Note: This Question is unanswered, help us to find answer for this one
1044. In a helpstar dashboard, throughput measures ____.
Answer
Correct Answer:
The volume of incidents in various categories
Note: This Question is unanswered, help us to find answer for this one
1045. If a recursive function does not contain a base case, it ________.
Answer
Correct Answer:
Uses up all available stack memory, causing the program to crash
Note: This Question is unanswered, help us to find answer for this one
1046. Gui components have a set of ________ that determine how the component appears on the screen.
Answer
Correct Answer:
Properties
Note: This Question is unanswered, help us to find answer for this one
1047. Function is another name for ________.
Note: This Question is unanswered, help us to find answer for this one
1048. As with any research paper, write the ___________________ last.
Note: This Question is unanswered, help us to find answer for this one
1049. All of the following are types of multimedia and entertainment software except ________.
Answer
Correct Answer:
Productivity software
Note: This Question is unanswered, help us to find answer for this one
1050. All of the following are formats accepted for picture files except ____.
Note: This Question is unanswered, help us to find answer for this one
1051. All of the following are examples of software suites except ________.
Answer
Correct Answer:
Microsoft OneNote
Note: This Question is unanswered, help us to find answer for this one
1052. All of the following are examples of database software except ________.
Note: This Question is unanswered, help us to find answer for this one
1053. A struct is a(n) ____________________, not a declaration.
Answer
Correct Answer:
Definition
Note: This Question is unanswered, help us to find answer for this one
1054. A specific formula for solving a problem is called ________.
Answer
Correct Answer:
An algorithm
Note: This Question is unanswered, help us to find answer for this one
1055. A relation is a(n) ____.
Note: This Question is unanswered, help us to find answer for this one
1056. A join line is also called a(n) ____ line.
Note: This Question is unanswered, help us to find answer for this one
1057. ____ measures image clarity
Answer
Correct Answer:
DOT PITCH
Note: This Question is unanswered, help us to find answer for this one
Computer Science MCQs | Topic-wise