1. What would be the output string, if the bitstring '0111101111101111110' is subjected to bit-stuffing for the flag string '01 1111 1 0'?
2. What number of swapping is required to sort the given series in ascending order, if the bubble sort is used for sorting? 8,22.6,9,31,19,5,13
3. If the input string in 'Moore' machine is of length 'm', the output string would be of the length
4. A deterministic finite automation 'F' is given in the image. having 'start‘ state and accepting state (S). Select the regular expression from the following options that denotes the set of all words accepted by ‘F'-
5. What would be the postfix expression of the given infix expression? ((AtBI'C-(D-E))$(F+G)
6. Which of the following languages is generated byK=[[S],[a,b),[S-> aSlelalb],S]?
7. Which of the following options implements the divide-and-conquer algorithm. 1. Insertion sort 2. Bubble sort 3. Quick sort
8. Which of the following regular expressions have all strings in which any number of 9's is followed by any number of 5's, followed by any number of 2's?
9. Consider a 9-bit digital-to-analog converter that uses a ladder network. What would be the approximate resolution, in volts, if the full-scale output voltage of this converter is +5v?
10. Which of the given network IDs of Classes A, B. and C can exist?
11. The use of 'V.42' compression with a 'V.32' bits per second (bps) modem operating at 14,440 bps can result in a maximum throughput of bps.
12. Which of the following options is not in the set 'S', if 'S' is given as ( ab \ abb )* bb ab?
13. If the mean arrival rate of packets into a packet switch is 1,000 packets per second (PPS), and the mean service rate is 1.025 packets per second, then what would be the total waiting time. including the service time?
14. The signal to noise ratio for a voice trade line is 30.1 db, or a power ratio of 1023:1. What would be the maximum achievable data rate on this line whose spectrum ranges from 300-4300 Hz?
15. What would be the probability of getting 8 as the sum if three dices are rolled simultaneously?
16. What would be the rank of the matrix that is given in the image?
17. Which of the following is not a feature of a good software requirements specification (SRS) document?
18. If the three regular expressions: p=1(1+0)‘, q=11‘0, r=1'0 are given, then which of the following options is true?
19. Consider the schema. R = (ABCD) and the dependencies A -> B. B -> C. C -> D. and D -> A. Let R = (R1 and R2) be a decomposition, such that R1 (1 R2 = (D. The decomposition is in .
20. Which of the following COMPOSITE DATABOUND controls was not available in ASP.net 3.5, but is available in ASP.net 4.0?
21. There are two modules in a programming code. It is given that the probability of success of modules in 'Unit testing' is 0.9 for each. If the probability of success of 'Integration testing' is also 0.9. then what would be the joint probability of success?
22. It is a scheme in which the thread library schedules user-level threads to run on an available light-weight process (LWP).
23. What would be the labels of the nodes (numbered from 1 to 7) in the given image. if the post order traversal of the tree gives the below-given expression? x y - z w
24. Consider the table given in the image and find the value of "f(9)" by using Lagrange
25. If a relational schema is in the Boyce-Codd Normal Form (BCNF). then it is also in the .
26. Consider the example of four processes given in the image, with their arrival time (in milliseconds) in the ready queue for execution. and their CPU burst time. Find the difference of average waiting time between preemptive and non-preemptive SJF scheduling.
27. Suppose you are working on a highly complex project, which involves several kinds of risks. Which software-life-cycle model you should use in such a situation so that the best product can be obtained?
28. Simplify the given Boolean function using the K—map and select the correct answer from the options. F(a,b,c,d)=2(0,1,2,4,5,6,8,9,12,13,14)
29. Which is true about Shadows in ASP.net? 1. It is always used with inheritance. 2. It is a combination of overloading and overriding. 3. We can change signatures of functions.
30. Which of the following is a regular expression for a regular grammar S -> aS/a?
31. Two regular languages are given as: L1 = (a+b)'a L2 = b(a+b)‘b Which of the following options is an intersection of the above given languages?
32. SELECT last_name. salary. hire_date FROM EMPLOYEES ORDER BY salary DESC SELECT last_name, salary, hire_date FROM EMPLOYEES ORDER BY 2 DESC Which of the answer options is true?
33. What would be the output of the circuit that is shown in the image, if all the inputs given to the circuit are zeros?
34. In the ModeI-View-Controller(MVC) mode, JSP generally belongs to .
35. Suppose there are two relations: 'R1' and 'R2'. lf 'C1' and 'C2' are the selection conditions, and 'A1' and 'A2‘ are the attributes of the relation 'R1‘, then which of the given query transformations is/are correct? 1- 0C1 (0C1 (R11) '> Ocz (Gc2 1R1) 2- 0C1 ('A1 1R1) 7' 'A1 (0c1 (R11)
36. Which of the given methods is used for sending data over a 'serial communication link'?
37. In the 'Baudot code', which of the given numbers of bits per symbol are used?
38. Which of the following is an automation in which the output only depends on the states of the machine?
39.
Which of the given options will be generated by the following grammar?
A={{ Q }.{ 0-1 } P,Q}
where P=(Q->O 0,0->OQ1,0->1O O, O-> empty}]
40. What would be the correct time required to search an element in 'binary search tree‘ with 'k‘ elements?
41. Choose the correct algorithm from the following options that solves the problem of all pairs shortest paths.
42. Consider the example, in the given image, with five processes and their CPU burst time (in milliseconds). Which of the following scheduling algorithms will give the lowest average waiting time
43. A function is given as: f(A.B.C.D) = Z(0.1.3.4.8.9.15) A is the Most Significant Bit and D is the Least Significant Bit. By using the above minterms of the given function in the table (given in Figure-1), implement it with a multiplexer and choose the correct implementation from Figure-2 (given in the image).
44. The given image shows two cases of processes that follow the
45. Which of the following frame-tagging methods can be used for creating a trunk-link between Cisco and non-Cisco switches?
46. Assume that your magnetic-tape drive has a transport speed of 200 inches per second and a recording density of 1,600 bytes per inch. How long would it take to write 6.00.000 bytes of data grouped in 100 characters record with a blocking factor of 10?
47. Image number is the image of 'Mac OS X' structure.
48. Which of the following satisfies the given recurrence relation? T(k)=mT(k/2)+ak2
49. Which of the following statements is true?
50. Which of the following statements is/are true about triggers and routines? 1. Both run automatically 2. Both are stored in the database 3. Both consist of procedural code
51. Which of the options would be the correct infix expression of the given prefix expression? +-‘$ABCD//EF+GH
52. Which of the following models should be preferred for creating a small project/projects whose requirements are very well-known?
53. Which of the given options is the correct time complexity to build the heap of input array in the following algorithm? CREATE-HEAP(B) size := size(B); forj := floor(size/2) d0wnto1 do HEAP(B, j); and for END
54. Which of the following protocols does not support routing?
55. What is the use of the friend function in C++?
56. For the following page reference string, which of the given options is the correct number of page faults in the optimal page replacement algorithm with five frames? Page referencestring:(1,2,3,4.2,1,5.6,2,1,2,3,7,6,3.2,1,2,3,6)
57. Which of the following options is used to embody business objects?
58. Which of the following is a 16-bit microprocessor?
59. Consider 3 Winchester magnetic disc with density 30 x106 bits per square inch of surface. The inner and outer diameters of the recording area are two and six inches, respectively. The radial track spacing density is 1.500 tracks/inches. If the rotational speed is 3.200 RPM. then what is the approximate value of the data transfer rate?
60. In a class of 100 students 39 students play basketball; 58 play volleyball; 32 play hockey; 10 play volley ball and hockey; 11 play hockey and basketball; and 13 play basketball and volleyball. Find the number of students who plays all the games?
61. What would be the maximum value of 'k', if a terminal multiplexer has six 1,200 bits per second (bps) terminals and 'k' number of terminals with 300 bps are connected to it. Note:lt is given that the outgoing line is 9,600 bps.
62. What would be the root, correct to three decimal places, of the given equation by the Newton-Raphson method? sin x =1 - x
63. If the relations R1(A, B) and R2(C, D) are union compatible relations, then what would be the result of the following relation? R1 A = C A B = D R2
64. Suppose that Pk, OK and Rk denote the coefficients of yk in the expansions of (1 + y)1°, (1 + y)20 and (1 + y)3°. Then the expression given in the image will be equal to which of the following options?
65. Which of the given Enterprise JavaBeans (EJB) transaction attributes ensures that all transactions are always demarcated by the container?
66. Which of the given frequency ranges is mostly affected by precipitation and fog?
67. Which two of the following are true about data flow diagrams (DFDs) used in a software development process?
68. Consider a software that calculates cube-roots of integer values that are in the range of O to 3,000. If the black-box testing technique is used, then for boundary-value analysis, which of the following values must be there in the test cases?
69. Which of the following are false about the web.config configuration file?
70. Which of the following operators cannot be overloaded in C++ language?
71. A(n) ____ is a temporary view of the data that is removed when you close the datasheet.
72. The first step in testing a patch is ____.
73. ________ occurs when a hacker looks through your trash to find personal information.
74. An example of software most commonly associated with productivity software is ____.
75. Preceding a condition by the ____ operator reverses the truth of the original condition.
76. Social media (sm) providers host the sm presence using ________ in the cloud.
77. When combination charts have data series with vastly different values, you can create ____ charts.
78. When working with a table, press ____ to move to the next line within the same cell.
79. Wordart is considered a(n) _______ that can be manipulated independently of the text.
80. You can ____ the chart title text to select it.
81. You can add a text box using the chart tools ____ tab.
82. You can assign the value of one struct variable to another struct variable of ____ type.
83. You can insert ____ different kinds of pictures into powerpoint.
84. You can insert pictures via either the pictures button or the _______ button.
85. You can radically change how a smartart graphic looks by applying a smartart ____.
86. The optical _________ is the most common pointing device for desktop computers.
87. A(n) _________ resolves top-level domains such as .com, .org, and .edu.
88. A(n) _____ is a temporary storage space used to speed computing tasks.
89. You can quickly find any file, folder, or program using ____.
90. The ________ operator performs string concatenation.
91. A 1 kg balloon at equilibrium in the air is buoyed up with a force of __________.
92. Changing the order of fields in a database table is an example of changing a tables ____.
93. If a one-dimensional array contains five elements, its highest subscript is ____.
94. ____ combines all rows from two tables, excluding duplicate rows.
95. ____ data are the result of formatting to facilitate storage, use and generation of information.
96. _____ is a commonly used encryption protocol that manages transmission security on the internet.
97. _____ is a high-speed carrier service that uses ordinary phone lines to send and receive data.
98. _____ serve as the intermediary between the user and the database.
99. _____ technology is a broadband technology that can use the wires of a local telephone network.
100. _________ converts an audio broadcast to a digital music player.
101. __________ are high speed central networks to which multiple smaller networks connect
102. A ____ is a network device that extends a wired network by adding additional ports.
103. A chart created with the access chart wizard is ____ in access.
104. A database maintains information on ___________.
105. A protocol known as ____ is designed to automatically distribute ip addresses.
106. A table ___________________ can be used when you want to assign a temporary name to a table.
107. A tcp three-way handshake is used to establish a ___________ messaging method.
108. A(n) _____ is often used, so remote users have a secure connection to an organizations network.
109. An advantage of ____ software is its ability to run more than one operating system on a computer.
110. An arraylists ____ is the number of items it can hold without having to increase its size.
111. An extension of .wav designates a ____ type of file.
112. An organization that hires cloud services ________.
113. Apple understood the importance of usability when it designed its ________.
114. Bits are grouped into 8-bit chunks called ________.
115. Cellular services use _______ to provide wireless connectivity to the internet.
116. Data in a multidimensional database is organized in a ________ format.
117. Data may be sorted in a table datasheet, a form, and a ____.
118. Data warehouse contains historical data obtained from the _____.
119. Date attributes contain calendar dates stored in a special format known as the _____ date format.
120. Design view is used to ____ a table.
121. Dns operates at the _________________ layer of the osi model.
122. Each class on an class diagram is represented by a(n) ____ in a relational database.
123. Every normalized table has ________.
124. Formatting date/time fields changes only the way data is displayed, not the field ____.
125. Horizontal scaling of client/server architecture means _____.
126. If falcon security chooses to use a sql dbms such as access, it will be able to __________.
127. In a client/server system, the database resides on a computer called the ____.
128. In a data model, a(n) ________ is something that a user wants to track.
129. In an entity-relationship (e-r) diagram, ____ are used to represent an entity.
130. In indexed storage, when a file is created, the pointers in the index block are all set to ____.
131. In north america, a t1 circuit has ______ 64kbps channels.
132. In the sliding windows mechanism for flow control, the ____ before waiting for an acknowledgment
133. Managing your calendar and emails can be easily accomplished through ____ software.
134. Most wireless networks transport data as ____ signals.
135. On a client/server system, most of the powerful processing is handled by the ________.
136. Organizations can dynamically reuse servers that use web services internally by ________.
137. Records in the mft are called ____.
138. Regarding enumerations, the ____ method returns the name of the calling constant object.
139. Switches can create ____ by grouping a number of ports into a broadcast domain.
140. The ____ command will create an application program's or individual user's picture of the database.
141. The ____ layer is the bridge between logical and physical views of secondary storage.
142. The ____ utility gathers statistics and information about ip communications on a computer.
143. The ____ utility manages a firewall and packet filtering.
144. The ________ is the smallest unit of data the computer can store in a database.
145. The ____________ command displays the route packets take between two computers.
146. The advantage of a wireless mesh network is that ____.
147. The basic form of an sql retrieval command is ____.
148. The data type that allows both sequential and random numbering is the ____ data type.
149. The entity relationship diagram (erd) represents the _____ database as viewed by the end user.
150. The explosive growth in data expected through 2027 means that ________ is even more important.
151. The final step of the system development life cycle (sdlc) is ________.
152. The main directory maintained by your computers operating system is the ____ directory.
153. The main reason for offshore outsourcing is to _____.
154. The major difficulty in designing a layered operating system approach is ____.
155. The most likely data type for a surrogate key is ____.
156. The two most popular hard disk interfaces are ide and ____.
157. Through the use of ____, one physical server can run several server operating systems.
158. To insert a new field in a table, the ____ keyword should be used with the alter table command.
159. When a procedure finishes execution, ________.
160. A ____ displays table information with a more formal, businesslike appearance.
161. In structured analysis, _____ are transformed into data structures and program code.
162. The sonet network topology is a ____.
163. A table is in 4nf if it is in 3nf, and _____.
164. Power users often work with ______ because of its flexibility and capabilities.
165. The physical address assigned each network adapter is called its ________.
166. Sonets extraordinary ____ results from its use of a double-ring topology over fiber-optic cable.
167. When choosing field names, it is best to choose names that ____.
168. When designing a database, you should ____.
169. When renaming columns, you include the new column names in ____ following the name of the view.
170. When using the relational model to represent two tables, one must ________.
171. While triggers run automatically, ________ do not and have to be called.
172. Windows cleaners maintain the ____ for more effective system operation.
173. You can place an insertion point by tapping or clicking in the field or by pressing ____.
174. You can use the windows ________ to check on a nonresponsive program.
175. You must have a ________ for every variable you intend to use in a program.
176. The _________ sort usually performs fewer exchanges than the ________ sort.
177. A ________ check would be used to restrict the fines for speeding violations from $50 to $250.
178. In a database, when data items disagree with one another, it leads to a(n) ________.
179. In comparison with a flat file system, _____ in a database.
180. On most modern wans, a ring topology relies on ____ rings to carry data.
181. Programmers create ____ and compilers turn it/them into ____.
182. Quickbooks is an example of ________ software.
183. The ________ causes the contents of another file to be inserted into a program.
184. The rate of data arriving at your computer is ____.
185. Proofreading of newly-synthesized dna is important because __________.
186. When oceanic lithosphere collides with another plate, the ________ in the process of subduction.
187. Wind-blown sand deposits would most likely be __________ and __________.
188. Rhyolitic lavas ________.
189. Tensional stress is the dominant force at ___.
190. Another name for a nonkey column is a ____.
191. The uml symbol for a use case is a(n) ____ with a label that describes the action or event.
192. A schema illustrates the ____ and ____ in a database and the relationships among them.
193. A variable defined inside a method is referred to as ________.
194. A(n) ____ is a compiler embedded with a collection of supporting software.
195. A(n) ____ path begins at the root level and lists all subdirectories to the destination file.
196. A(n) ________ uses the internet to create the appearance of private, secure connections.
197. An object belongs to a group or category called a(n) ____.
198. An xml database supports the storage and management of _____ xml data.
199. A disk on which you can write multiple times sometimes is called a _____ disc.
200. A partially filled array is normally used with ________.
201. An apple ipad and a microsoft surface are examples of ________ computers.
202. Dirt on pc keyboards can be cleaned with ____.
203. A(n) _____ uses various symbols and shapes to represent data flow, processing, and storage.
204. After the information-level design is completed, ____ is the next step.
205. The table marked 3 in the accompanying figure has a rules value of ____.
206. A key feature of the apple lisa was its use of _______________.
207. The colspan attribute of the ____ tag sets a number of columns spanned by a cell.
208. Peripherals such as the scanner pictured here are considered _____ devices.
209. Playboy magazine stopped running photos of fully nude women in 2015 because ______.
210. In presenter view, the next slide in the presentation appears in the ____ corner of the screen.
211. Intel's sandy bridge chipsets move the graphics and memory controller to the ________.
212. In the threat model stride, the s stands for ____ or pretending to be someone else.
213. In the tag, an alignment value of ____ places the caption below the table.
214. Printer manufacturers advertise the quality of their products by stating how many ___ they produce.
215. Printers typically understand either ____ or printer control language (pcl).
216. Printers, monitors, tablets, cpus, and laptops are examples of ____________.
217. Programming is a __________ process because, after each step it may be necessary to revise.
218. Public key encryption utilizes a pair of encryption keys obtained through ____ .
219. Query wizards and ____ automate the process of writing sql commands in a relational database.
220. Relationships between tables can be illustrated through a(n) ____ relationship diagram.
221. The bankers algorithm is an example of a(n) ____ policy.
222. The basic input/output system is stored on a ________ chip.
223. Personalization tokens and list segmentation are both examples of using _____ in email.
224. In m2m communication, such as with the internet of things trend, the m stands for ______.
225. The default value for both kerning and tracking is _____ pixels.
226. Most tracking software do not ____.
227. The ____ dialog box launcher allows you to navigate to a specific date.
228. One minute of cdda music requires in excess of ____ of storage space.
229. Magnet ____ enables you to acquire the forensic image and process it in the same step.
230. The sale of sensitive or confidential company information to a competitor is known as _______.
231. Mandiant ____ lists all open network sockets, including those hidden by rootkits.
232. On mac oss, the ____ stores any file information not in the mdb or volume control block (vcb).
233. One bitcoin could be divided down to ____ decimal point
234. Most code division multiple access (cdma) networks conform to is-95, created by the ____.
235. On a linux computer, ____ represents file systems exported to remote hosts.
236. From 1997 to 2010, internet use in __________ increased from 18% to 71.1%.
237. A(n) ______ is the gradual changing of one object into another using computer animation software.
238. An external hard disk _______.
239. An ins would most likely be found in a(n) _________________.
240. The front _____________ connectors lead from the front of the computer case to the motherboard.
241. A(n) ____ is a named set of code that performs a given task.
242. A(n) ____ version is a system that is incomplete but ready for some level of rigorous testing.
243. A(n) ____ version is a system version created for long-term release to users.
244. A(n) _____ requires a user to transport it from one computer to another.
245. A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.
246. A(n) ____________________ is a potential weakness in an asset or its defensive control(s).
247. A wimax access point has a ____ range.
248. A(n) ____ is an unauthorized attempt to increase permission levels.
249. A(n) ____ network includes transmission towers that connect to area handsets.
250. A(n) ____ version is a system that is stable enough to be tested by end users.
251. A(n) _____ is a bank that does business with sellers that want to accept payment cards.
252. A(n) ____________________ is an a potential risk to an information asset.
253. Knowledge management systems are called expert systems because they ____.
254. Lbe helpdesk, featured in this chapter, is an example of a(n) ____.
255. Many companies implement _____ systems that integrate all customer-related events and transactions.
256. Many information security professionals enter the field from traditional ____ assignments.
257. Microwave transmission systems are used for ______ volume, ______ distance, ______ communications.
258. Most organizations agree that __________ become their worst security problem.
259. Most organizations use a(n) ____ form to propose and document a maintenance change.
260. Most risk identifications include a brief description of ____.
261. Most system requests include all of the following except _____.
262. Objective measures of the user support or help desk operation are called ____.
263. Risk __________ is the practice of identifying, assessing, controlling, and mitigating risks.
264. Sending customers to a website for a referral fee is called the _____________ model.
265. Some netiquette rules to consider when using social media include all of the following except ____.
266. Storage that is wiped clean when power is cut off from a device is known as _____.
267. Subsystems for the marketing mis and their outputs help marketing managers and executives to _____.
268. Syndication feeds are one way of announcing the availability of a _____.
269. The ____ component of a dss manages and coordinates the other major components.
270. The ____ help desk position is normally staffed by an entry-level employee.
271. The ____ team is responsible for reestablishing connectivity between systems and to the internet.
272. The _____ support of a global information system involves broad and long-term goals.
273. The __________ commercial site focuses on current security tool resources.
274. The four ms of resources in information systems are _____.
275. The information security function can be placed within the __________.
276. The language of telecommunications is governed by rules called ____
277. The most common wireless technology for tv and dvd remote control devices is _______.
278. The number of mobile websites worldwide is expected to grow rapidly because of ______________.
279. The objective of _____ is to gather data about project usability, costs, benefits, and schedules.
280. The process of managing the baseline settings of a system device is called ________.
281. The recovery point objective (rpo) identifies the amount of _________ that is acceptable.
282. The total information awareness tracking information system was created by ____.
283. To read a quick response (qr) code using a smartphone, one must have the _____ app.
284. Today's broadband in households allows for connections of up to 15 ________________ per second.
285. Voip is a type of ______ output.
286. When choosing a cellular phone service, you should consider the ____.
287. Wikis are designed for ________, allowing people to contribute more than just posting a response.
288. Many of todays cell phones come equipped with ____ text technology keyboards to enhance texting.
289. The microwave used to heat your food and the cell phones you use are part of the ____.
290. The software that a companys it department makes, builds, and develops is called ____ software.
291. There are ____ common vulnerability assessment processes
292. With the help of _____ software, new housing developments can be easily planned and analyzed.
293. The rate of ___________ has been fluctuating wildly this week.
294. The hewlett-packard system for controlling printers is _______________.
295. The minimum recommended cpu requirements for a windows 64-bit thick client are _______________.
296. A(n) _______________ symptom is the most difficult symptom to diagnose.
297. _____ is common in airplane and spacecraft control systems.
298. _____ is not one of the "3 vs" of big data.
299. A ____ http connection reuses the same http connection to send and receive multiple requests.
300. A _____ is a series of events and activities with no slack time.
301. A _____ is an internal or external entity that could endanger an asset.
302. A _______ file is a type of vector graphics file created specifically for windows.
303. A general rule for printing is to use _____ fonts for headlines and serif fonts for body text.
304. A result from a search engine search is called a(n) ______.
305. A tool that database designers use to show the logical relationships among data is a(n) _____.
306. A(n) ____ path provides a precise location for a file.
307. A(n) paragraph border frames the contents of a single page. _________________________
308. Air gestures are used in ______.
309. All ethernet networks, independent of their speed or frame type, use an access method called ____.
310. Alternative country star lyle lovett says that he makes almost all of his income from ______.
311. An abiotic effect that restricts tree growth at high elevations is __________.
312. An email account is an electronic mailbox you receive from an ____.
313. An h-1b worker can work for a u.s. employer for a maximum continuous period of _____ years.
314. An item such as a smart card is an example of the ____ form of authentication.
315. Any element in outlook that contains information is called a(n) ____.
316. Assume stringbuilder strbuf is "abcdefg", after invoking ________, strbuf contains "aefg".
317. Before the it security group can begin an eradication effort, it must _____.
318. Constraints are always enforced at the ____ level.
319. Copyright and patent protection was established through _____.
320. Http is considered to be a(n) ___________ protocol.
321. If the visible property of a control is set to false, it ________ in the designer window.
322. The "3v's" used to characterize big data include volume, variety, and _______.
323. The abbreviation cpu for central processing unit is an example of a(n) _____.
324. The ability to use digital video and audio tools is a component of __________ literacy.
325. The acronym ____________ refers to software that manages data stored in a database.
326. The amount of memory that should be allocated to the vm when it starts is called _________.
327. With ____, processing tasks are shared by servers and workstations.
328. Characters created by computer-generated imagery are known as _____.
329. Ftp is a _________ that is utilized to copy and manage files over the internet.
330. ________ printers produce lab-quality prints of your photos.
331. (int)(math.random() * (65535 + 1)) returns a random number ________.
332. A gray scale comprised only of black and white with no color is called a(an) ________ scale.
333. There are default tab stops every one inch on the horizontal ruler. _________________________
334. _______ storage devices do not lose data or programs after the electrical power is turned off.
335. The ____ microprocessor affected the technological revolution of the 1970s.
336. ___________________ make use of baselines to identify changes in the behavior of the network.
337. An appointment becomes a(n) ____ when people and other resources are invited.
338. The ____ act implements regulations for unsolicited email messages
339. The operating system and other tools are collectively known as ______ software.
340. To deselect a single file in a list of selected files, you make use of the ____ key.
341. When technology is available, the next step in dr. cattolicos research will be _______.
342. A(n) ______ test measures the performance of hardware or software.
343. To add the comment, welcome john smith, the syntax would be _____.
344. To delete the item, right-click it and click ____ on the shortcut menu.
345. To set the color of a row, you use the ____ style.
346. The _____ pseudo-class represents the exact instant in which a link is activated.
347. A dual-layer, single-sided dvd can hold the equivalent of ____ cds.
348. A well-defined, descriptive table will have ____ general characteristics.
349. Function(argument1, argument2, ...) is ____.
350. A(n) _____ chart uses bars to compare separate (noncontinuous) items as they vary over time.
351. For windows 7, the ____________________ tracks problems with applications, hardware, and windows.
352. _______ agreements ensure that communications carriers exchange traffic on their networks freely.
353. _______ do not use streaming technology and are used to download media files to your computer.
354. _______ is a collaborative document web-based editing program stored in the cloud.
355. _______ is a javascript library intended to simplify client-side scripting:
356. ________ cable is not subject to electromagnetic interference or radio frequency interference.
357. A multidimensional array in php is essentially ____.
358. A negative consequence of the expanding use of the cloud will be ______.
359. A network that covers a city or a suburb is called a ________.
360. A network that expands beyond a metropolitan area is a ____ area network.
361. A network's ____ is the arrangement of computers and mobile devices, printers, and other devices.
362. A persons social security number would be an example of a(n) ____________________ attribute.
363. A relationship that is necessary for identification is called a(n) ____.
364. A software-based _________ is dedicated to examining and blocking internet traffic.
365. A subtype is called a(n) ____ in idef1x terminology.
366. Combining the various sources of outgoing data into a single output data stream is called ____.
367. Connecting your computers or devices to the ________ immediately exposes them to attack.
368. Filenames typically include a ____ at the end of the filename.
369. Fourth-generation languages are commonly used to access ____.
370. Gartner, inc. predicts that by 2015 saas revenue will grow to ____.
371. Global supply management companies assist businesses in finding the best _____ relationships.
372. Sequence diagrams include symbols that represent all of the following except ____.
373. Sip and h.323 regulate ____ for voip or video-over-ip clients and servers.
374. When drawing erds, a line that terminates is either a _________.
375. A password _______________ policy forces users to select a new password periodically.
376. All of the following are ways to avoid injuries when working on computers except ________.
377. A typical ________ is made up of one or more network switches to which isps connect to each other.
378. A(n) ____ consists of rows that contain consolidated and summarized data.
379. A(n) ____ is a system-generated primary key that is usually hidden from users.
380. A(n) ____ is an ordered arrangement of keys and pointers.
381. A(n) ____ method is a method that creates and initializes class objects.
382. A(n) _____ is a set of rules for how data is handled as it travels along a communications channel.
383. A(n) _______ broadcasts messages to all devices connected to a lan.
384. A(n) _______ is a collection of related data organized in a way that facilitates data searches.
385. A(n) ________ improves over time by learning from its interactions.
386. A(n) _________ is a connection point in a network.
387. A(n) ______________ allows several unrelated processes to use the pipe for communication.
388. A(n) _______________ includes one or more statements that can potentially raise an exception.
389. A(n) ____________________ contains a specific piece of information within a record.
390. A(n) ____________________ is a filtering program that stops pop-up ads from displaying on webpages.
391. Linux provides ____ queues and semaphores to allow two processes to synchronize with each other.
392. Linux terminal management conforms to ____ standards, and it also supports pseudo-terminals.
393. Linux updates are issued free to the public about every ____ months.
394. Locating and repairing all syntax errors is part of the process of ____ a program.
395. Microsoft's most powerful dbms is ________.
396. Microsofts ____ technology uses internet explorer as the verification client.
397. Nasa uses _________ to conduct complex modeling and simulations for upcoming missions.
398. Network administrators and it managers use network ____ to expose network vulnerabilities.
399. No data entry at all is known as a(n) ____.
400. Object attributes are often called ____ to help distinguish them from other variables you might use
401. Of the following normal forms, _____ is mostly of theoretical interest.
402. Of the three components of access time in a movable-head dasd, ____ is the slowest.
403. One advantage of _____ printers is their ability to output realistic objects.
404. One of the most obvious initial changes in windows vista was the ____ interface.
405. Software that helps manage a checkbook or prepare taxes is called ________ software.
406. Sonet rings typically have a failover time of ____ milliseconds.
407. Soon more companies may use ________ to help analyze the mountains of big data they're collecting.
408. Space on the disk is marked as ____________________ if it has not yet been partitioned.
409. Suppose a new tech startup wants to define the data model. they would then ____.
410. The ____ check box indicates that a file has changed since the last backup.
411. The ____ is a fixed number associated with a devices nic.
412. The ____ is cited as a disadvantage of web-based training and distance learning by some educators.
413. The ____ of an object is an adjective that describes the objects current status.
414. The ____ option to the lpstat command causes a list of printers that are enabled to be displayed.
415. The ____ topology consists of a simple cable, or bus, to which all devices attach.
416. The _____ pseudo-column is used to select the next value from a sequence.
417. The _____ relationship should be rare in any relational database design.
418. The _______ process is assigned as the parent to orphan processes.
419. The __________ command can be used to quickly catalog a suspect drive.
420. The file management program incorporated into recent versions of windows is ____.
421. The first and simplest recovery method, and the most drastic, is to ____.
422. The first task of disk cleanup is to ______________.
423. The first thing to do upon notification of a new software patch is to____.
424. The first window displayed when you install opensuse is the ____ window.
425. The fixed ipv6 header makes up the first ____ octets or 320 bits of the ipv6 packet.
426. The flowchart shape for a process is a(n) ________.
427. The following is not on the security checklist for installing a wireless router: ____.
428. The global positioning system is a network of 21 ________ plus 3 working spares.
429. The highest level that a satellite can occupy in space is known as ________.
430. The ieee 802.3z standards are also known as ____ ethernet.
431. The instantiation of an endpoint in a potential tcp connection is known as a ______.
432. The international organization for standardization (iso) helps set standards for _____ countries.
433. The internet talks only ____, so users must use software that supports this protocol.
434. The internet is ________
435. The most common home network is a ________.
436. The most common technology used with an egocentric virtual environment is _____.
437. The network layer header identifies sending and receiving hosts by their _________________.
438. The performance tab displays summary usage information for all of the following except ________.
439. The process of normalization constructs tables such that every table has a ________.
440. The proper use of ____________________ keys is crucial to controlling data redundancy.
441. The protocols used to encrypt account names and passwords are called _____ protocols.
442. The relational models creator, e. f. codd, used the term relation as a synonym for ____.
443. The relationship between record types can be depicted graphically with a(n) _________.
444. The secure connection between a vpn server and a vpn client is often referred to as a ________.
445. The siri personal assistant application on apple's iphone 5s is an example of a ________.
446. The specific content of a field is referred to as the ____.
447. The sql command for deleting the storehouse field from the item table is ____.
448. The standard method of specifying the format of web pages is called ________.
449. The start menu includes variously-sized shaded rectangles, called ____ .
450. The strengths of mac os do not include ____.
451. The tcp/ip reference model has ____ layers that roughly correlate to the osis seven layers.
452. The term ____ is used to label any condition in which one or more optional relationships exist.
453. The two operations defined by dijkstra to be performed on a semaphore are ____.
454. The windows task manager can be opened by pressing and holding the ____ keys together.
455. There are ____ different kill signals that the kill command can send to a certain process.
456. Ticket machines, atms, digital cameras, and robotics all use ______ operating systems.
457. To generate a surrogate key, microsoft access uses a(n) _____ data type.
458. To modify the structure of an existing table, you use the _______________________ statement.
459. To transfer data packets between two or more networks, a ________ is used.
460. Traditional mainframe networks use a ____ topology.
461. Unix/linux systems interpret ____ to mean the parent directory.
462. Use _______________ to load minimal, generic and trusted drivers for troubleshooting purposes.
463. Users in motion require all of the following cloud resources except __________.
464. Users in motion, wireless connectivity, and a cloud-based resource are the elements in a ________.
465. Using a ______________, packets are delivered to a single node on a network
466. Using a wireless network without the network owner's permission is known as ________.
467. Using moores law, we can gauge how fast ____________ might be in the coming years.
468. Virtually all dbmss include a ____ for easy data input, modification, and retrieval.
469. When multiple parameters appear in a method header, they constitute a(n) ____.
470. When properly used, inheritance always involves a ____ relationship.
471. When saving a new database in access 2007-2016 databases, the file extension should be ________.
472. When you assign a ____ to a field access
473. Windows 7 and vista providess a new 3d user interface called the ____ user interface.
474. Windows task scheduler divides tasks into actions, conditions, and ______________.
475. With ____, users are able to store data on internet servers housed in data centers.
476. Within an event-driven program, a component from which an event is generated is the ____.
477. Translating an algorithm into a programming language is called ________.
478. Software companies typically perform _____before releasing a product.
479. When you copy data from a file on a storage device into ram, you are ____ from the file.
480. Unicode represents more than ____ unique, multilingual characters.
481. Virtual environments are stored as _______________.
482. The ______ displays by default at the top of the navigation pane when you open file explorer.
483. A(n)_____ is a combination of a hardware configuration and systems software.
484. Access does not require a table to have a(n) primary key. _________________________
485. Access the individual elements in an array by using their ________.
486. According to moore's law (1965), the ratio of price to performance has ________.
487. Actions or schedules that start a program are called _______________ in task scheduler.
488. Adobe reader works with files stored in standard ____ format.
489. After a successful compile, you can run the class file on any computer that has a ____.
490. All of the following can be used in an os x file name except ________.
491. All primary key entries are unique, and no part of a primary key may be ____.
492. Almost all mans are based on one of two basic forms of supporting technology: ____ or ethernet.
493. Among all video over ip applications ____is perhaps the simplest
494. An ____ is a data structure that controls how the i/o operation is processed at each step.
495. An _____ shows the objects and how they interact to perform business functions and transactions.
496. An administrator can discover the host name assigned to a client by using the ____ utility.
497. An alternative to the primary key of a table is listed with the ____ abbreviation in dbdl.
498. An api called ____ is used to pass i/o requests structured in the smb format to a remote computer.
499. An e-mail program creates a(n) ____ document and attaches it to the e-mail message.
500. An essential tool in linux for technicians is the command line, called _______________.
501. An i/o request is called a(n) ____ wait in multiprogramming environments.
502. An integer format uses ____ bits to represent the number 12,345 in binary form.
503. An ip address in the form 197.169.100.1 is called a(n) ________.
504. An online drugstore such as drugstore.com is an example of a(n) ________.
505. An operating systems ____ capability supports a division of labor among all the processing units.
506. Andrea advises dean to remove unnecessary programs from his computer by using a(n) ____ utility.
507. Any line that starts with a(n) ____ character is a comment in the /etc/rsyslog.conf file.
508. Arrays are most efficiently processed using _____.
509. As jack explains to kate, a database is a collection of _____ records.
510. At tal distributors, there is a ____ relationship between sales reps and customers.
511. Bcnf can be violated only if the table contains more than one _____ key.
512. Bottlenecks tend to develop ____.
513. By default, windows does not display ____________________ in windows explorer.
514. High speed ________ communication lines use fiber optics
515. If 2.5 minutes is the maximum access time for a magnetic tape, ____ is the average access time.
516. If a security warning appears when you open a database, tap or click the ____ option button.
517. If a switch has eight 100-mbps ports, the backplane has to support a total of ____ mbps.
518. If a tcp socket is ready and listening for incoming connections, it's in the ______ state.
519. If a user restarts a computer that is already turned on, it is referred to as a __________.
520. If networked, ____ can be accessed by an authorized lan user.
521. In ____________________ design, the final program is a collection of interacting objects.
522. In a paged memory allocation scheme, a page size that is too small will generate ____.
523. Sustainable mis is a critical part of ________ within a company.
524. Synchronous communication means that everyone who is communicating must be _____ at the same time.
525. The ____ layer forwards messages to their correct destinations.
526. The ____ paging policy determines when the pager copies a page from disk to memory.
527. The traffic sent by devices connected to a hub can be captured and decoded by a _________________.
528. To stay with the current wi-fi standard, make sure your device is compatible with ____.
529. ____ handles outgoing email messages, determining the paths an email message takes on the internet.
530. ____ implies that no site should depend on another site to perform its database functions.
531. ____ involves the creation of mathematical equations to calculate various network values.
532. ____ is a queue reordering technique that can help optimize i/o times.
533. ____ is the glue that binds private networks together to form the internet and the world wide web.
534. ____ published a visual tool to show how deadlock conditions can be modeled using directed graphs.
535. ____ routing involves storing all the routing information at one central location.
536. ____ service offered slightly faster service than dial-up but has today been replaced by dsl.
537. ____ transmissions are radio signals sent to and from cell phones via cellular (cell) towers.
538. _____ allows the linking of devices running on many different platforms.
539. _____ are conducted media that can be used for both data and voice transmissions.
540. ________ is a data structure to store data in sequential order.
541. _____ does not allow changing service or bandwidth because a web site allows illegal media sharing.
542. _____ is a computer crime that involves destroying or disrupting computer services.
543. _____ is a good site to develop your professional network.
544. _____ is an open-source operating system whose source code is freely available to everyone.
545. _____ is the body of information and facts about a specific subject.
546. _____ provide(s) companies with a single version of the truth for their data.
547. _____ refers to a situation in which keys are managed by a third party, such as a trusted ca.
548. _____ refers to the range of frequencies available in any communications channel.
549. _____ relationships occur when there are multiple relationship paths between related entities.
550. ________ problems are encountered when removing data with transitive dependencies.
551. __________ is a term that refers to the time delay in converting input packets to output packets.
552. _______________ databases are by far the most popular type of database on the market today.
553. < b>is an example of an html ________. quizlet
554. A ____ aggregates multiple dsl subscriber lines and connects them to the carriers co.
555. A ____ connects all lan central nodes in a group of buildings.
556. A ____ intelligently forwards messages between two or more networks.
557. A ____ is a workstation that accesses software and data through the network on another computer.
558. A ____ is several programs simultaneously processing the same i/o stream.
559. A ________ is represented by a 0 or 1. eight together make a byte (i.e., 00101100).
560. A ________ is used to receive and process thousands of requests from a large number of users.
561. A ________ is used to travel through a linked list and search for data.
562. A ______________ is a worker who work occasionally or regularly from a home office.
563. A (n) _____ travels from computer to computer in a network, but it does not usually erase data.
564. A command center should have at least __________ security officers (or command center officers):
565. A controversial topic today regarding the cost and flow of internet traffic is ________.
566. A counter is a(n) ________ that can be incremented or decremented each time a loop runs.
567. A counter tracks specific information about a(n) ________________.
568. A disk ____ is a bit-by-bit copy of the data from all sectors of a disk.
569. A dropped packet is often referred to as a _____________.
570. A field is a(n) ____ field if it is not part of the primary key.
571. A forms object name appears on the tab for the form in the access window. ____________________
572. A job scheduler based on process priorities and durations is an example of ____.
573. All applications operate over a uniform _________.
574. All devices attached to a network are identified as ____
575. All fields in a database should be contained in one table. _________________________
576. All of the following are elements of a database application except ________.
577. All of the following are main areas of research in artificial intelligence, except ________.
578. A _____ is a permanent telephone connection between two points.
579. A ________ is a network located in your residence that connects to all your digital devices.
580. Wireless lans and public hotspots use ____ technology to connect to the internet.
581. A _______ is a shortcut to a web page saved in a list in the internet explorer desktop application.
582. Ports that are generally used to establish outbound connections are known as ______ ports.
583. The biggest challenge posed by big data is ____.
584. In traditional programming, probably the most often used error-handling outcome was to ____.
585. In windows the guest account ________________.
586. It is the job of the ____ to oversee the removal of software programs on a computer.
587. The easiest method for monitoring free space by mounted filesystems is to use the ____ command.
588. The environment subsystems and the applications run in ____ mode.
589. Partial completeness is symbolized by ____.
590. Oracle recommends _____ for creating audit logs.
591. The branch, publisher, and ____ tables are part of the henry books database.
592. The choice to enforce referential integrity is indicated in design view by a thick ____
593. The command, ____ , will copy the contents of chapt1 and chapt2 into a file named section_a.
594. The contents of query datasheet are permanent. ____________________
595. Possibly the earliest example of a polyalphabetic cipher is the ____ cipher.
596. In the ssh suite, the ____________________ command allows a user to log on to a remote computer.
597. Perhaps the most common form of protection from unauthorized use of a computer system is the ____.
598. The ca periodically distributes a(n) ____ to all users that identifies all revoked certificates.
599. In navigation mode, press [tab] or ____ to move to the next field within the same record.
600. In order to accomplish serial processing of updates, many dbmss use ____.
601. In the dining philosophers problem, a philosopher can pick up a fork when ____.
602. In the fhs, the _____ directory contains the linux kernel and files used by the boot loader.
603. In the mac os, the resource ____ stores information about the data.
604. Fonts, colors, and cell styles are organized in _____ categories.
605. A(n) ________ is an intent and method to exploit a vulnerability.
606. Users can change their own passwords by typing passwd with ____ to specify the username.
607. When a computer is first started, its ____ firmware is responsible for initializing the computer.
608. The major carriers of network traffic are known collectively as the internet ______.
609. The architecture of the world wide web is largely based on ___________s original design.
610. In binary, adding 0 to _________ results in 0.