1. To move files between drives, you can use all of the following except ________.
2. The period of time that exist between wireless frames is called __________.
3. The organizational structure of the files and folders on a computer is the _______,
4. You relate tables to one another by using _______ fields.
5. Your computer needs a(n) _____ to access a network.
6. The _____ system is used to represent rgb color in digital graphics.
7. The vga standard offers _______________ colors at a resolution of 640 × 480 pixels.
8. The set of possible values for an attribute is a ____.
9. The term big data refers to the ________.
10. The web was introduced in _______.
11. On a wiring diagram, s110 with a ".8 brn/blk" means ________.
12. A ________ is a personal journal posted on the web
13. A single spreadsheet document is often called a ____.
14. When loops are nested, _____.
15. The control variable of a counter-controlled loop should be declared as ________to prevent errors.
16. _______ are the fundamental activities that organizations use to do work and achieve their goals.
17. ________ information is information that directly pertains both to the context and to the subject.
18. The ____ query combines rows from two queries and excludes duplicates.
19. _____ is a relational set operator.
20. ________ is used to undo unwanted database changes.
21. A derived attribute ____.
22. A ____ should be a derived attribute
23. An example of a(n) _____ is unix.
24. _____ reduces the customer's need for software maintenance, operation, and support.
25. Todos los lunes yo ______________ la ropa. (planchar)
26. If an organization opts for software as a service (saas), it will have to ________.
27. ____ are the characteristics that define an object as part of a class.
28. A(n) ______ database is a huge database used to analyze transactions.
29. Isp stands for ________.
30. A computer program that imitates human thinking is a(n) ________.
31. Clerical workers using computers for word-processing tasks is an example of job _____.
32. ____ allows you to specify multiple images and their properties in a comma-separated list.
33. ________ can cause data to arrive at uneven intervals on wireless networks.
34. According to mcafee, ________ now pose the greatest security risks.
35. Airlines take advantage of ____ technology to inform users of flight delays and itinerary changes.
36. All of the following are tips for professional e-mail etiquette except ________.
37. An ________________ modifies or further describes the function of an element.
38. An agency that offers accreditation for health-oriented websites is ____.
39. An uninvited email solicitation to buy something is an example of ________.
40. Border widths can be expressed using the keywords ____, medium, or thick.
41. Cd-rom is an example of a(n) _______ type of storage medium.
42. Character entity references are inserted using the syntax _____.
43. Hr apps are leased in __________ arrangements.
44. The "fathers of the internet" are vinton cerf and ________.
45. The web page displayed when a user first visits a site is called a(n) _____.
46. Businesses should consider twitter as a social network where the dominant focus is on ________.
47. _____ was one of the first to offer saas for crm software.
48. After a workers h-1b visa expires, the foreigner must _____.
49. ______ information can be proved as correct or incorrect.
50. A _____ is an audio output device that converts text to speech.
51. A petaflop represents _____ floating-point operations.
52. An economy that uses new technology _______.
53. Genetically modified papayas have been created to __________.
54. In 2015, around ____ percent of the worlds population had an internet connections.
55. A(n) _________ refers to a fixed cell location that never changes.
56. ___________ domain is reserved for the u.s. military.
57. Windows did not become popular until ___________ was released in 1992.
58. The speed of a level of cache memory is impacted by ________.
59. If your hand is on the keyboard, use the ribbon for formatting. _________________________
60. I am brave, i am _____ i am who i'm meant to be, this is me
61. In scene 1, creon suspects __________ motivated the person who buried polyneices.
62. A ____ can also indicate the encoding used in an xhtml document.
63. A kindle ebook reader is an example of a(n) _____ computer.
64. According to nist sp 800-14's security principles, security should ________.
65. An organization that provides a wide range of support services to users is called a(n) ____.
66. If you are balancing a checkbook, you would most likely use ____ software.
67. ________ tools enable people to connect and exchange ideas.
68. A ________ divides presentation content into meaningful groups of slides.
69. _____ was invented to standardize computer interfaces around one type of connection.
70. ______ is data that is entered into a computer. ______ is the result produced by a computer.
71. ______ refers to the deliberate falsification of information.
72. ________ is the process of sorting, grouping, summing, filtering, and formatting structured data.
73. ______________________ is the point of view that is most like a video camera recording events.
74. A keyblock is _____________________
75. Software designed specifically for a highly specialized industry is called ____.
76. Types of risky behaviors of free and paid mobile apps include all of the following except ________.
77. In pcdata, the ____ symbol is used to mark the beginning of an element tag.
78. In the past 10 years, the digital divide in the united states has ____.
79. Server virtualization in windows server 2012 r2 is based on a module called the _________.
80. To erase an entire entry in a cell and then reenter the data from the beginning, press the ____ key
81. To round off any of the four corners of a border, the _____ property should be applied.
82. 5g standards are expected to have a target speed of _____ to mobile devices.
83. A _____ printer heats specially coated paper to produce an image.
84. ____ is an attempt by opposing attorneys to prevent you from serving on an important case.
85. When you turn on a computer, windows starts and displays a ____ consisting of the time and date.
86. Digital certificates can be used for each of these except _____.