What would be the postfix expression of the given infix expression?
((AtBI'C-(D-E))$(F+G)
AB-C“DE+-FG+$
AB+C'D--EFG+$
AB+C*DE--FG+$
AB-C-DE’+FG+$
Answer:
1. An address generated by a cpu is referred to as a ____.
2. A software utility designed to clean up after a failed software installation is ____.
3. The primary advantage of storing programs in noncontiguous locations is that ____.
4. Total productive maintenance (tpm) seeks to do all of the following except ____.
5. With ____ connections, polling is not necessary because there is only one terminal per line.
6. The program segment that catches a possible by zero is known as a(n) ______.
7. The smallest amount of memory the vm can use at any time is called _______.
8. The linux page replacement algorithm is an expanded version of the ____ replacement policy.
9. One approach to performing compaction is to do it when a certain ____ of memory becomes busy.
10. No movement between queues is a very simple policy that rewards those who have ____ jobs.
11. A utility tool that can change the software that is launched automatically during start-up is ____.
12. Mac os x includes a backup utility called ________.
13. A(n) _______ refers to where a process is accessing/updating shared data.
14. In unix/linux, text files and binary files are considered to be ____ files.
15. Cortana stores personalized information about you in a local database called the __________.
16. The three standard classes of devices supported by linux are ____.
17. ________ refers to the leasing of hardware with pre-installed operating systems.
18. Bing, google, and yahoo! are all examples of web ____________________.
19. Remote access to a user's pc can be implemented with a ____.
20. The ________ operating system(s) treat uppercase and lowercase letters differently.
21. ____ is processing that involves performing the same tasks with many records, one after the other.
22. A(n) ______ key is a special key programmed to issue commands to a computer.
23. Virtual sans allow you to _______.
24. All of the following word groups show parallelism except __________.
25. All of the following are categories of a computer security threat except ____.
26. The internal part of an operating system is called the ______.
27. The first personal computer operating system was named ___________.
28. The cpu stores the results of computations in ________.
29. The ________ software makes the computer run.
30. Placing data in a buffer so it can be retrieved later is called _______.
31. Deadlock can occur on a printer when ____.
32. Software for pcs contains a _________ program that guides you through the installation process.
33. Of the following, the ____ operating system was developed the earliest.
34. Microsoft _____ is the new microsoft web browser that lets you display and interact with webpages.
35. If a user turns on a computer that is currently turned off, it is referred to as a __________.
36. A(n) ____ is a flat, touch-sensitive device used in conjunction with a digital pen.
37. ____ are utility programs that search for documents and other files on a users hard drives.
38. Running the disk cleanup utility is a quick way to ________.
39. Ronald runs both windows 7 and linux on his desktop computer. this process is called ________.
40. One advantage of proprietary software versus off-the-shelf software is that _____.
41. If a pc fails its initial nac health assessment, it may be ________.
42. Disk cleanup, file history, and disk defragmenter are all examples of _____ programs.
43. Disk ________ realigns separated data so that related file pieces are unified.
44. C: denotes a ________ directory that is at the top of the filing structure of a computer.
45. Use the windows ________ to check on a nonresponsive program.
46. The vast majority of smartphones use the ________ or ________ operating systems.
47. Freebsd is a(n) _____-based operating system.
48. The small circuit boards that hold a series of ram chips are called ________.
49. The means by which you interact with any program on a computer is called the user ____.
50. The main directory on a storage device is referred to as the ________ directory.
51. The ____ shows the name and location of the item you have open.
52. Smartphone operating systems are a type of _____ operating system.
53. The ________ statement can cause other program statements to execute only under certain conditions.
54. To develop software you need all these except ________.
55. The root of a file system is denoted by the ____.
56. The process that launched a given process is known as the ________ process.
57. All of the following are examples of someone using personal productivity software except _________.
58. All of the following are examples of activities performed by an operating system except ________.
59. A ___________ is any known starting point.
60. A _________ is a mobile device that typically ranges from seven to ten inches in size.
61. A(n) _______________ is a fix for a single problem within an operating system.
62. ____ manage the system resources of a computer so programs can run properly.
63. Buttons act as ____, which instruct windows to perform tasks.
64. Compressed files sometimes are called ______ files.
65. Clicking a _____ name opens a drop-down list of commands and options.
66. An icon on your desktop is a component of a ____ interface.
67. A(n) ______ expands the capability of a portable computer.
68. A(n) ____ view of data is the way a user thinks about data.
69. A(n) ____ operating system is required to perform a command within a certain time frame.
70. A(n) ____ is system software
71. A(n) ____ is a set of instructions or statements to the computer.
72. A(n) ____ file consists of several time entries, each marked with a time stamp.
73. A printer requires a ____ installed on the computer in order to operate.
74. A disadvantage of software monitoring tools is that they ____.
75. A ______ is a program that runs in the background.
76. A _____ is a link between devices connected to a computer.
77. A ____ chip holds software that is used to start the computer.
78. _____ provide(s) an interface to the services provided by an operating system.
79. A(n) ____ is a computer program that coordinates all the activities of computer hardware.
80. ______ is a set of applications that manages the activities and resources of a computer.
81. Some important touch gestures begin at the _______________ of the screen.
82. Memory is said to be ________ if contents are lost when power is off.
83. A _____ provides content that is accessible on the world wide web.
84. Software can be divided into two major categories: ____ and ____.
85. By default, all print jobs have a priority of ____.
86. The ________ of the operating system enables users to communicate with the computer system
87. Clicking or tapping on a(n) ____ file will start up a program.
88. You cannot boot a computer from ____________.
89. Microsoft windows and mac os use a ________ interface
90. In most cases, the word "software" is interchangeable with the word _______.
91. In linux, the three levels of file access are ____, ____, and ____.
92. Current versions of windows support file names up to ____ characters long.
93. All of the following are examples of desktop operating systems except ______.
94. A file ____ shows the location of a file or folder.
95. A ____ allows the operating system to store and organize files on a hard disk.
96. To clean up the registry in windows, you should ______________.
97. Cd-roms typically use the ____ filesystem type.
98. In a linux script, the line ____ is important because it identifies the file as a script.
99. Chrome os is the first ____.
100. Odbc works on the _____ operating system.