1. The __________ mailing list includes announcements and discussion of an open-source idps.
2. All the following wires, plus ground, are used to make up a serial cable except ________?
3. Digital certificates can be used for each of these except _____.
4. When you turn on a computer, windows starts and displays a ____ consisting of the time and date.
5. ____ is an attempt by opposing attorneys to prevent you from serving on an important case.
6. A _____ printer heats specially coated paper to produce an image.
7. 5g standards are expected to have a target speed of _____ to mobile devices.
8. To round off any of the four corners of a border, the _____ property should be applied.
9. To erase an entire entry in a cell and then reenter the data from the beginning, press the ____ key
10. Server virtualization in windows server 2012 r2 is based on a module called the _________.
11. In the past 10 years, the digital divide in the united states has ____.
12. In pcdata, the ____ symbol is used to mark the beginning of an element tag.
13. Types of risky behaviors of free and paid mobile apps include all of the following except ________.
14. Software designed specifically for a highly specialized industry is called ____.
15. A keyblock is _____________________
16. ______________________ is the point of view that is most like a video camera recording events.
17. ________ is the process of sorting, grouping, summing, filtering, and formatting structured data.
18. ______ refers to the deliberate falsification of information.
19. ______ is data that is entered into a computer. ______ is the result produced by a computer.
20. _____ was invented to standardize computer interfaces around one type of connection.
21. A ________ divides presentation content into meaningful groups of slides.
22. ________ tools enable people to connect and exchange ideas.
23. If you are balancing a checkbook, you would most likely use ____ software.
24. An organization that provides a wide range of support services to users is called a(n) ____.
25. According to nist sp 800-14's security principles, security should ________.
26. A kindle ebook reader is an example of a(n) _____ computer.
27. A ____ can also indicate the encoding used in an xhtml document.
28. In scene 1, creon suspects __________ motivated the person who buried polyneices.
29. I am brave, i am _____ i am who i'm meant to be, this is me
30. If your hand is on the keyboard, use the ribbon for formatting. _________________________
31. The speed of a level of cache memory is impacted by ________.
32. Windows did not become popular until ___________ was released in 1992.
33. ___________ domain is reserved for the u.s. military.
34. A(n) _________ refers to a fixed cell location that never changes.
35. In 2015, around ____ percent of the worlds population had an internet connections.
36. Genetically modified papayas have been created to __________.
37. An economy that uses new technology _______.
38. A petaflop represents _____ floating-point operations.
39. A _____ is an audio output device that converts text to speech.
40. ______ information can be proved as correct or incorrect.
41. After a workers h-1b visa expires, the foreigner must _____.
42. _____ was one of the first to offer saas for crm software.
43. Businesses should consider twitter as a social network where the dominant focus is on ________.
44. The web page displayed when a user first visits a site is called a(n) _____.
45. The "fathers of the internet" are vinton cerf and ________.
46. Hr apps are leased in __________ arrangements.
47. Character entity references are inserted using the syntax _____.
48. Cd-rom is an example of a(n) _______ type of storage medium.
49. Border widths can be expressed using the keywords ____, medium, or thick.
50. An uninvited email solicitation to buy something is an example of ________.
51. An agency that offers accreditation for health-oriented websites is ____.
52. An ________________ modifies or further describes the function of an element.
53. All of the following are tips for professional e-mail etiquette except ________.
54. Airlines take advantage of ____ technology to inform users of flight delays and itinerary changes.
55. According to mcafee, ________ now pose the greatest security risks.
56. ________ can cause data to arrive at uneven intervals on wireless networks.
57. ____ allows you to specify multiple images and their properties in a comma-separated list.
58. ____ is the protocol for handling tcp traffic through a proxy server.
59. ____ generates and issues session keys in kerberos.
60. Sales, marketing, and manufacturing are all types of software typically used by a(n) ______.
61. In the _____, an organization uses e-commerce sites to sell digital products and services.
62. Subdividing the project deliverables into smaller pieces is known as _____.
63. Pmi uses the term _____ to describe each level of work in the wbs.
64. Rfid tags are typically used for ________.
65. Data warehouses are sometimes called hypercubes because they_____.
66. A key feature on an enterprise resource planning system is that _____.
67. Clerical workers using computers for word-processing tasks is an example of job _____.
68. Multifactor authentication is all of these except _____.
69. The modern ancestor of the typewriter is the _______.
70. Fair use allows individuals to break copyright so long as they ________.
71. The responsibilities of a computer technician include ________.
72. The buttons on the _____ toolbar are available anytime except when the file tab is active.
73. If it can be applied, the least-damaging recovery option is ________.
74. A(n) ____ causes a value to be sent from a called method back to the calling method.
75. A _____ links computer resources using either a wired or wireless connection.
76. Google.com, bing.com, and ask.com are examples of ____.
77. A computer program that imitates human thinking is a(n) ________.
78. The ____ print style prints a daily appointment schedule for a specific date.
79. A conditional comment uses ____ to specify the condition for Internet Explorer.
80. ________ tools and techniques process data and do statistical analysis for insight and discovery.
81. A loop within another loop is known as a(n) ____ loop.
82. One hundred percent complete and accurate information is _____________.
83. One concern about internet advertising is that viral marketing________.
84. Positive outcomes of continuous improvement include ________.
85. A computer with a domain name is called a ________.
86. A _________ is the place at which the isp provides services to its customers.
87. ____ is one of the primary operations of a computer
88. An element of a two-dimensional array is referred to by ________ followed by ________.
89. A(n) ____________________ in a hierarchical model is the equivalent of a record in a file system.
90. The memory allocated for a float value is ____ bytes.
91. The number of bytes in an array is always a multiple of the number of ____ in an array.
92. The ____ data type is considered compatible with varchar(35).
93. Simon wants to change the chart’s border. to do this, he should select the chart tools ____ tab.
94. Data that a computer accepts and processes is called ______.
95. Web pages are accessed through a software program called a _____.
96. You should suspect a kidney injury anytime the patient presents with _______.
97. When a patient stiffens the muscles of the abdomen, it is known as _______.
98. Injuries to the external male genitalia _______.
99. "using a web browser, you type the url you would like to visit into the ____.
100. A tag name is an identifier that links a(n) ____ to a source
Microsoft .Net Technologies
Object Oriented Programming (OOP)
OS (Operating System)
Oracle
Programming Languages
Security
Related MCQ's