Basic Computer Science MCQ
1. In binary, adding 0 to _________ results in 0.
Note: This Question is unanswered, help us to find answer for this one
2. The architecture of the world wide web is largely based on ___________s original design.
Answer
Correct Answer:
Tim Berners-Lee
Note: This Question is unanswered, help us to find answer for this one
3. The major carriers of network traffic are known collectively as the internet ______.
Answer
Correct Answer:
Conductors
Note: This Question is unanswered, help us to find answer for this one
4. When a computer is first started, its ____ firmware is responsible for initializing the computer.
Note: This Question is unanswered, help us to find answer for this one
5. Users can change their own passwords by typing passwd with ____ to specify the username.
Answer
Correct Answer:
No argument
Note: This Question is unanswered, help us to find answer for this one
6. A(n) ________ is an intent and method to exploit a vulnerability.
Answer
Correct Answer:
Threat source
Note: This Question is unanswered, help us to find answer for this one
7. Fonts, colors, and cell styles are organized in _____ categories.
Answer
Correct Answer:
Theme and non-theme
Note: This Question is unanswered, help us to find answer for this one
8. In the mac os, the resource ____ stores information about the data.
Note: This Question is unanswered, help us to find answer for this one
9. In the fhs, the _____ directory contains the linux kernel and files used by the boot loader.
Note: This Question is unanswered, help us to find answer for this one
10. In the dining philosophers problem, a philosopher can pick up a fork when ____.
Answer
Correct Answer:
There are two available
Note: This Question is unanswered, help us to find answer for this one
11. In order to accomplish serial processing of updates, many dbmss use ____.
Note: This Question is unanswered, help us to find answer for this one
12. In navigation mode, press [tab] or ____ to move to the next field within the same record.
Note: This Question is unanswered, help us to find answer for this one
13. The ca periodically distributes a(n) ____ to all users that identifies all revoked certificates.
Note: This Question is unanswered, help us to find answer for this one
14. Perhaps the most common form of protection from unauthorized use of a computer system is the ____.
Note: This Question is unanswered, help us to find answer for this one
15. In the ssh suite, the ____________________ command allows a user to log on to a remote computer.
Note: This Question is unanswered, help us to find answer for this one
16. Possibly the earliest example of a polyalphabetic cipher is the ____ cipher.
Note: This Question is unanswered, help us to find answer for this one
17. The contents of query datasheet are permanent. ____________________
Note: This Question is unanswered, help us to find answer for this one
18. The command, ____ , will copy the contents of chapt1 and chapt2 into a file named section_a.
Answer
Correct Answer:
Cat chapt1 chapt2>section_a
Note: This Question is unanswered, help us to find answer for this one
19. The choice to enforce referential integrity is indicated in design view by a thick ____
Answer
Correct Answer:
Join line
Note: This Question is unanswered, help us to find answer for this one
20. The branch, publisher, and ____ tables are part of the henry books database.
Note: This Question is unanswered, help us to find answer for this one
21. Oracle recommends _____ for creating audit logs.
Note: This Question is unanswered, help us to find answer for this one
22. Partial completeness is symbolized by ____.
Answer
Correct Answer:
A dotted line
Note: This Question is unanswered, help us to find answer for this one
23. The environment subsystems and the applications run in ____ mode.
Note: This Question is unanswered, help us to find answer for this one
24. The easiest method for monitoring free space by mounted filesystems is to use the ____ command.
Note: This Question is unanswered, help us to find answer for this one
25. It is the job of the ____ to oversee the removal of software programs on a computer.
Answer
Correct Answer:
Operating system
Note: This Question is unanswered, help us to find answer for this one
26. In windows the guest account ________________.
Answer
Correct Answer:
All choices apply
Note: This Question is unanswered, help us to find answer for this one
27. In traditional programming, probably the most often used error-handling outcome was to ____.
Answer
Correct Answer:
Terminate the program in which the offending statement occurred
Note: This Question is unanswered, help us to find answer for this one
28. The biggest challenge posed by big data is ____.
Answer
Correct Answer:
Developing software to analyze the massive amount of data
Note: This Question is unanswered, help us to find answer for this one
29. Ports that are generally used to establish outbound connections are known as ______ ports.
Answer
Correct Answer:
Ephemeral
Note: This Question is unanswered, help us to find answer for this one
30. A _______ is a shortcut to a web page saved in a list in the internet explorer desktop application.
Note: This Question is unanswered, help us to find answer for this one
31. Wireless lans and public hotspots use ____ technology to connect to the internet.
Note: This Question is unanswered, help us to find answer for this one
32. A ________ is a network located in your residence that connects to all your digital devices.
Note: This Question is unanswered, help us to find answer for this one
33. A _____ is a permanent telephone connection between two points.
Answer
Correct Answer:
Leased line
Note: This Question is unanswered, help us to find answer for this one
34. All of the following are main areas of research in artificial intelligence, except ________.
Answer
Correct Answer:
Data mining
Note: This Question is unanswered, help us to find answer for this one
35. All of the following are elements of a database application except ________.
Note: This Question is unanswered, help us to find answer for this one
36. All fields in a database should be contained in one table. _________________________
Note: This Question is unanswered, help us to find answer for this one
37. All devices attached to a network are identified as ____
Note: This Question is unanswered, help us to find answer for this one
38. All applications operate over a uniform _________.
Note: This Question is unanswered, help us to find answer for this one
39. A job scheduler based on process priorities and durations is an example of ____.
Answer
Correct Answer:
Estimation theory
Note: This Question is unanswered, help us to find answer for this one
40. A forms object name appears on the tab for the form in the access window. ____________________
Note: This Question is unanswered, help us to find answer for this one
41. A field is a(n) ____ field if it is not part of the primary key.
Answer
Correct Answer:
Nonkey Field or Nonkey Attribute
Note: This Question is unanswered, help us to find answer for this one
42. A dropped packet is often referred to as a _____________.
Note: This Question is unanswered, help us to find answer for this one
43. A disk ____ is a bit-by-bit copy of the data from all sectors of a disk.
Note: This Question is unanswered, help us to find answer for this one
44. A counter tracks specific information about a(n) ________________.
Note: This Question is unanswered, help us to find answer for this one
45. A counter is a(n) ________ that can be incremented or decremented each time a loop runs.
Answer
Correct Answer:
Integer variable
Note: This Question is unanswered, help us to find answer for this one
46. A controversial topic today regarding the cost and flow of internet traffic is ________.
Answer
Correct Answer:
Net neutrality
Note: This Question is unanswered, help us to find answer for this one
47. A command center should have at least __________ security officers (or command center officers):
Note: This Question is unanswered, help us to find answer for this one
48. A (n) _____ travels from computer to computer in a network, but it does not usually erase data.
Note: This Question is unanswered, help us to find answer for this one
49. A ______________ is a worker who work occasionally or regularly from a home office.
Answer
Correct Answer:
Telecommuter
Note: This Question is unanswered, help us to find answer for this one
50. A ________ is used to travel through a linked list and search for data.
Answer
Correct Answer:
Traversal operator
Note: This Question is unanswered, help us to find answer for this one
51. A ________ is used to receive and process thousands of requests from a large number of users.
Answer
Correct Answer:
Server farm
Note: This Question is unanswered, help us to find answer for this one
52. A ________ is represented by a 0 or 1. eight together make a byte (i.e., 00101100).
Note: This Question is unanswered, help us to find answer for this one
53. A ____ is several programs simultaneously processing the same i/o stream.
Note: This Question is unanswered, help us to find answer for this one
54. A ____ is a workstation that accesses software and data through the network on another computer.
Note: This Question is unanswered, help us to find answer for this one
55. A ____ intelligently forwards messages between two or more networks.
Note: This Question is unanswered, help us to find answer for this one
56. A ____ connects all lan central nodes in a group of buildings.
Answer
Correct Answer:
Zone network
Note: This Question is unanswered, help us to find answer for this one
57. A ____ aggregates multiple dsl subscriber lines and connects them to the carriers co.
Note: This Question is unanswered, help us to find answer for this one
58. < b>is an example of an html ________. quizlet
Note: This Question is unanswered, help us to find answer for this one
59. _______________ databases are by far the most popular type of database on the market today.
Answer
Correct Answer:
Relational
Note: This Question is unanswered, help us to find answer for this one
60. __________ is a term that refers to the time delay in converting input packets to output packets.
Note: This Question is unanswered, help us to find answer for this one
61. ________ problems are encountered when removing data with transitive dependencies.
Note: This Question is unanswered, help us to find answer for this one
62. _____ relationships occur when there are multiple relationship paths between related entities.
Answer
Correct Answer:
Redundant
Note: This Question is unanswered, help us to find answer for this one
63. _____ refers to the range of frequencies available in any communications channel.
Answer
Correct Answer:
Bandwidth
Note: This Question is unanswered, help us to find answer for this one
64. _____ refers to a situation in which keys are managed by a third party, such as a trusted ca.
Answer
Correct Answer:
Key escrow
Note: This Question is unanswered, help us to find answer for this one
65. _____ provide(s) companies with a single version of the truth for their data.
Answer
Correct Answer:
Master data management
Note: This Question is unanswered, help us to find answer for this one
66. _____ is the body of information and facts about a specific subject.
Answer
Correct Answer:
Knowledge
Note: This Question is unanswered, help us to find answer for this one
67. _____ is an open-source operating system whose source code is freely available to everyone.
Note: This Question is unanswered, help us to find answer for this one
68. _____ is a good site to develop your professional network.
Note: This Question is unanswered, help us to find answer for this one
69. _____ is a computer crime that involves destroying or disrupting computer services.
Note: This Question is unanswered, help us to find answer for this one
70. _____ does not allow changing service or bandwidth because a web site allows illegal media sharing.
Answer
Correct Answer:
Net neutrality
Note: This Question is unanswered, help us to find answer for this one
71. ________ is a data structure to store data in sequential order.
Note: This Question is unanswered, help us to find answer for this one
72. _____ are conducted media that can be used for both data and voice transmissions.
Answer
Correct Answer:
Coaxial cables
Note: This Question is unanswered, help us to find answer for this one
73. _____ allows the linking of devices running on many different platforms.
Answer
Correct Answer:
Transmission Control Protocol/Internet Protocol
Note: This Question is unanswered, help us to find answer for this one
74. ____ transmissions are radio signals sent to and from cell phones via cellular (cell) towers.
Answer
Correct Answer:
Cellular radio
Note: This Question is unanswered, help us to find answer for this one
75. ____ service offered slightly faster service than dial-up but has today been replaced by dsl.
Note: This Question is unanswered, help us to find answer for this one
76. ____ routing involves storing all the routing information at one central location.
Answer
Correct Answer:
Centralized
Note: This Question is unanswered, help us to find answer for this one
77. ____ published a visual tool to show how deadlock conditions can be modeled using directed graphs.
Note: This Question is unanswered, help us to find answer for this one
78. ____ is the glue that binds private networks together to form the internet and the world wide web.
Note: This Question is unanswered, help us to find answer for this one
79. ____ is a queue reordering technique that can help optimize i/o times.
Answer
Correct Answer:
Rescheduling
Note: This Question is unanswered, help us to find answer for this one
80. ____ involves the creation of mathematical equations to calculate various network values.
Answer
Correct Answer:
Analytical modeling
Note: This Question is unanswered, help us to find answer for this one
81. ____ implies that no site should depend on another site to perform its database functions.
Answer
Correct Answer:
Local autonomy
Note: This Question is unanswered, help us to find answer for this one
82. ____ handles outgoing email messages, determining the paths an email message takes on the internet.
Note: This Question is unanswered, help us to find answer for this one
83. To stay with the current wi-fi standard, make sure your device is compatible with ____.
Note: This Question is unanswered, help us to find answer for this one
84. The traffic sent by devices connected to a hub can be captured and decoded by a _________________.
Answer
Correct Answer:
Protocol analyzer
Note: This Question is unanswered, help us to find answer for this one
85. The ____ paging policy determines when the pager copies a page from disk to memory.
Note: This Question is unanswered, help us to find answer for this one
86. The ____ layer forwards messages to their correct destinations.
Note: This Question is unanswered, help us to find answer for this one
87. Synchronous communication means that everyone who is communicating must be _____ at the same time.
Note: This Question is unanswered, help us to find answer for this one
88. Sustainable mis is a critical part of ________ within a company.
Answer
Correct Answer:
Corporate social responsibility
Note: This Question is unanswered, help us to find answer for this one
89. In a paged memory allocation scheme, a page size that is too small will generate ____.
Answer
Correct Answer:
Very long Page Map Tables
Note: This Question is unanswered, help us to find answer for this one
90. In ____________________ design, the final program is a collection of interacting objects.
Answer
Correct Answer:
Object oriented
Note: This Question is unanswered, help us to find answer for this one
91. If networked, ____ can be accessed by an authorized lan user.
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
92. If a user restarts a computer that is already turned on, it is referred to as a __________.
Answer
Correct Answer:
Warm boot
Note: This Question is unanswered, help us to find answer for this one
93. If a tcp socket is ready and listening for incoming connections, it's in the ______ state.
Note: This Question is unanswered, help us to find answer for this one
94. If a switch has eight 100-mbps ports, the backplane has to support a total of ____ mbps.
Note: This Question is unanswered, help us to find answer for this one
95. If a security warning appears when you open a database, tap or click the ____ option button.
Answer
Correct Answer:
Enable Content
Note: This Question is unanswered, help us to find answer for this one
96. If 2.5 minutes is the maximum access time for a magnetic tape, ____ is the average access time.
Answer
Correct Answer:
1.25 minutes
Note: This Question is unanswered, help us to find answer for this one
97. High speed ________ communication lines use fiber optics
Note: This Question is unanswered, help us to find answer for this one
98. By default, windows does not display ____________________ in windows explorer.
Answer
Correct Answer:
File extension
Note: This Question is unanswered, help us to find answer for this one
99. Bottlenecks tend to develop ____.
Answer
Correct Answer:
When resources reach their capacity
Note: This Question is unanswered, help us to find answer for this one
100. Bcnf can be violated only if the table contains more than one _____ key.
Answer
Correct Answer:
Candidate
Note: This Question is unanswered, help us to find answer for this one
101. At tal distributors, there is a ____ relationship between sales reps and customers.
Answer
Correct Answer:
One-to-many
Note: This Question is unanswered, help us to find answer for this one
102. As jack explains to kate, a database is a collection of _____ records.
Answer
Correct Answer:
Integrated
Note: This Question is unanswered, help us to find answer for this one
103. Arrays are most efficiently processed using _____.
Note: This Question is unanswered, help us to find answer for this one
104. Any line that starts with a(n) ____ character is a comment in the /etc/rsyslog.conf file.
Note: This Question is unanswered, help us to find answer for this one
105. Andrea advises dean to remove unnecessary programs from his computer by using a(n) ____ utility.
Answer
Correct Answer:
Uninstall
Note: This Question is unanswered, help us to find answer for this one
106. An operating systems ____ capability supports a division of labor among all the processing units.
Answer
Correct Answer:
Multiprocessing
Note: This Question is unanswered, help us to find answer for this one
107. An online drugstore such as drugstore.com is an example of a(n) ________.
Answer
Correct Answer:
E-commerce database application
Note: This Question is unanswered, help us to find answer for this one
108. An ip address in the form 197.169.100.1 is called a(n) ________.
Answer
Correct Answer:
Dotted quad
Note: This Question is unanswered, help us to find answer for this one
109. An integer format uses ____ bits to represent the number 12,345 in binary form.
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
110. An i/o request is called a(n) ____ wait in multiprogramming environments.
Note: This Question is unanswered, help us to find answer for this one
111. An essential tool in linux for technicians is the command line, called _______________.
Note: This Question is unanswered, help us to find answer for this one
112. An e-mail program creates a(n) ____ document and attaches it to the e-mail message.
Answer
Correct Answer:
Multipurpose Internet Mail Extensions (MIME)
Note: This Question is unanswered, help us to find answer for this one
113. An api called ____ is used to pass i/o requests structured in the smb format to a remote computer.
Note: This Question is unanswered, help us to find answer for this one
114. An alternative to the primary key of a table is listed with the ____ abbreviation in dbdl.
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
115. An administrator can discover the host name assigned to a client by using the ____ utility.
Note: This Question is unanswered, help us to find answer for this one
116. An _____ shows the objects and how they interact to perform business functions and transactions.
Answer
Correct Answer:
Object relationship diagram
Note: This Question is unanswered, help us to find answer for this one
117. An ____ is a data structure that controls how the i/o operation is processed at each step.
Note: This Question is unanswered, help us to find answer for this one
118. Among all video over ip applications ____is perhaps the simplest
Answer
Correct Answer:
Streaming video
Note: This Question is unanswered, help us to find answer for this one
119. Almost all mans are based on one of two basic forms of supporting technology: ____ or ethernet.
Note: This Question is unanswered, help us to find answer for this one
120. All primary key entries are unique, and no part of a primary key may be ____.
Note: This Question is unanswered, help us to find answer for this one
121. All of the following can be used in an os x file name except ________.
Note: This Question is unanswered, help us to find answer for this one
122. After a successful compile, you can run the class file on any computer that has a ____.
Answer
Correct Answer:
Java language interpreter
Note: This Question is unanswered, help us to find answer for this one
123. Adobe reader works with files stored in standard ____ format.
Note: This Question is unanswered, help us to find answer for this one
124. Actions or schedules that start a program are called _______________ in task scheduler.
Note: This Question is unanswered, help us to find answer for this one
125. According to moore's law (1965), the ratio of price to performance has ________.
Note: This Question is unanswered, help us to find answer for this one
126. Access the individual elements in an array by using their ________.
Answer
Correct Answer:
Subscripts
Note: This Question is unanswered, help us to find answer for this one
127. Access does not require a table to have a(n) primary key. _________________________
Note: This Question is unanswered, help us to find answer for this one
128. A(n)_____ is a combination of a hardware configuration and systems software.
Answer
Correct Answer:
Computer system platform
Note: This Question is unanswered, help us to find answer for this one
129. The ______ displays by default at the top of the navigation pane when you open file explorer.
Answer
Correct Answer:
Quick access list
Note: This Question is unanswered, help us to find answer for this one
130. Virtual environments are stored as _______________.
Answer
Correct Answer:
A set of files
Note: This Question is unanswered, help us to find answer for this one
131. Unicode represents more than ____ unique, multilingual characters.
Note: This Question is unanswered, help us to find answer for this one
132. When you copy data from a file on a storage device into ram, you are ____ from the file.
Note: This Question is unanswered, help us to find answer for this one
133. Software companies typically perform _____before releasing a product.
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
134. Translating an algorithm into a programming language is called ________.
Note: This Question is unanswered, help us to find answer for this one
135. Within an event-driven program, a component from which an event is generated is the ____.
Answer
Correct Answer:
Source of the event
Note: This Question is unanswered, help us to find answer for this one
136. With ____, users are able to store data on internet servers housed in data centers.
Answer
Correct Answer:
Cloud computing
Note: This Question is unanswered, help us to find answer for this one
137. Windows task scheduler divides tasks into actions, conditions, and ______________.
Note: This Question is unanswered, help us to find answer for this one
138. Windows 7 and vista providess a new 3d user interface called the ____ user interface.
Note: This Question is unanswered, help us to find answer for this one
139. When you assign a ____ to a field access
Note: This Question is unanswered, help us to find answer for this one
140. When saving a new database in access 2007-2016 databases, the file extension should be ________.
Note: This Question is unanswered, help us to find answer for this one
141. When properly used, inheritance always involves a ____ relationship.
Answer
Correct Answer:
Specific-to-specific
Note: This Question is unanswered, help us to find answer for this one
142. When multiple parameters appear in a method header, they constitute a(n) ____.
Answer
Correct Answer:
Parameter list
Note: This Question is unanswered, help us to find answer for this one
143. Virtually all dbmss include a ____ for easy data input, modification, and retrieval.
Answer
Correct Answer:
User interface
Note: This Question is unanswered, help us to find answer for this one
144. Using moores law, we can gauge how fast ____________ might be in the coming years.
Answer
Correct Answer:
Processors
Note: This Question is unanswered, help us to find answer for this one
145. Using a wireless network without the network owner's permission is known as ________.
Answer
Correct Answer:
Piggybacking
Note: This Question is unanswered, help us to find answer for this one
146. Using a ______________, packets are delivered to a single node on a network
Answer
Correct Answer:
Unicast address
Note: This Question is unanswered, help us to find answer for this one
147. Users in motion, wireless connectivity, and a cloud-based resource are the elements in a ________.
Answer
Correct Answer:
Mobile system
Note: This Question is unanswered, help us to find answer for this one
148. Users in motion require all of the following cloud resources except __________.
Answer
Correct Answer:
Wireless connectivity
Note: This Question is unanswered, help us to find answer for this one
149. Use _______________ to load minimal, generic and trusted drivers for troubleshooting purposes.
Answer
Correct Answer:
Safe mode
Note: This Question is unanswered, help us to find answer for this one
150. Unix/linux systems interpret ____ to mean the parent directory.
Note: This Question is unanswered, help us to find answer for this one
151. Traditional mainframe networks use a ____ topology.
Answer
Correct Answer:
Hierarchical
Note: This Question is unanswered, help us to find answer for this one
152. To transfer data packets between two or more networks, a ________ is used.
Note: This Question is unanswered, help us to find answer for this one
153. To modify the structure of an existing table, you use the _______________________ statement.
Answer
Correct Answer:
Alter table
Note: This Question is unanswered, help us to find answer for this one
154. To generate a surrogate key, microsoft access uses a(n) _____ data type.
Answer
Correct Answer:
AutoNumber
Note: This Question is unanswered, help us to find answer for this one
155. Ticket machines, atms, digital cameras, and robotics all use ______ operating systems.
Note: This Question is unanswered, help us to find answer for this one
156. There are ____ different kill signals that the kill command can send to a certain process.
Note: This Question is unanswered, help us to find answer for this one
157. The windows task manager can be opened by pressing and holding the ____ keys together.
Answer
Correct Answer:
Ctrl, Alt, and Delete
Note: This Question is unanswered, help us to find answer for this one
158. The two operations defined by dijkstra to be performed on a semaphore are ____.
Note: This Question is unanswered, help us to find answer for this one
159. The term ____ is used to label any condition in which one or more optional relationships exist.
Answer
Correct Answer:
Optionality
Note: This Question is unanswered, help us to find answer for this one
160. The tcp/ip reference model has ____ layers that roughly correlate to the osis seven layers.
Note: This Question is unanswered, help us to find answer for this one
161. The strengths of mac os do not include ____.
Answer
Correct Answer:
Its use of resource forks
Note: This Question is unanswered, help us to find answer for this one
162. The start menu includes variously-sized shaded rectangles, called ____ .
Note: This Question is unanswered, help us to find answer for this one
163. The standard method of specifying the format of web pages is called ________.
Answer
Correct Answer:
Hypertext Markup Language (HTML)
Note: This Question is unanswered, help us to find answer for this one
164. The sql command for deleting the storehouse field from the item table is ____.
Answer
Correct Answer:
ALTER TABLE Item DROP COLUMN Storehouse ;
Note: This Question is unanswered, help us to find answer for this one
165. The specific content of a field is referred to as the ____.
Answer
Correct Answer:
Field value
Note: This Question is unanswered, help us to find answer for this one
166. The siri personal assistant application on apple's iphone 5s is an example of a ________.
Answer
Correct Answer:
Natural language processing (NLP) system. data mining.
Note: This Question is unanswered, help us to find answer for this one
167. The secure connection between a vpn server and a vpn client is often referred to as a ________.
Note: This Question is unanswered, help us to find answer for this one
168. The relationship between record types can be depicted graphically with a(n) _________.
Note: This Question is unanswered, help us to find answer for this one
169. The relational models creator, e. f. codd, used the term relation as a synonym for ____.
Answer
Correct Answer:
. Table. Attribute
Note: This Question is unanswered, help us to find answer for this one
170. The protocols used to encrypt account names and passwords are called _____ protocols.
Answer
Correct Answer:
Authentication
Note: This Question is unanswered, help us to find answer for this one
171. The proper use of ____________________ keys is crucial to controlling data redundancy.
Note: This Question is unanswered, help us to find answer for this one
172. The process of normalization constructs tables such that every table has a ________.
Answer
Correct Answer:
Single theme
Note: This Question is unanswered, help us to find answer for this one
173. The performance tab displays summary usage information for all of the following except ________.
Note: This Question is unanswered, help us to find answer for this one
174. The network layer header identifies sending and receiving hosts by their _________________.
Answer
Correct Answer:
IP Addreases
Note: This Question is unanswered, help us to find answer for this one
175. The most common technology used with an egocentric virtual environment is _____.
Answer
Correct Answer:
A head-mounted display (HMD)
Note: This Question is unanswered, help us to find answer for this one
176. The most common home network is a ________.
Answer
Correct Answer:
A token ring LAN
Note: This Question is unanswered, help us to find answer for this one
177. The internet is ________
Answer
Correct Answer:
Large network of networks
Note: This Question is unanswered, help us to find answer for this one
178. The internet talks only ____, so users must use software that supports this protocol.
Note: This Question is unanswered, help us to find answer for this one
179. The international organization for standardization (iso) helps set standards for _____ countries.
Note: This Question is unanswered, help us to find answer for this one
180. The instantiation of an endpoint in a potential tcp connection is known as a ______.
Note: This Question is unanswered, help us to find answer for this one
181. The ieee 802.3z standards are also known as ____ ethernet.
Note: This Question is unanswered, help us to find answer for this one
182. The highest level that a satellite can occupy in space is known as ________.
Answer
Correct Answer:
Geostationary earth orbit (GEO)
Note: This Question is unanswered, help us to find answer for this one
183. The global positioning system is a network of 21 ________ plus 3 working spares.
Answer
Correct Answer:
Satellites
Note: This Question is unanswered, help us to find answer for this one
184. The following is not on the security checklist for installing a wireless router: ____.
Answer
Correct Answer:
Change the SSID frequently because SSIDs are not case sensitive
Note: This Question is unanswered, help us to find answer for this one
185. The flowchart shape for a process is a(n) ________.
Answer
Correct Answer:
Rectangle
Note: This Question is unanswered, help us to find answer for this one
186. The fixed ipv6 header makes up the first ____ octets or 320 bits of the ipv6 packet.
Note: This Question is unanswered, help us to find answer for this one
187. The first window displayed when you install opensuse is the ____ window.
Answer
Correct Answer:
Boot Options
Note: This Question is unanswered, help us to find answer for this one
188. The first thing to do upon notification of a new software patch is to____.
Answer
Correct Answer:
Identify the criticality of the patch
Note: This Question is unanswered, help us to find answer for this one
189. The first task of disk cleanup is to ______________.
Answer
Correct Answer:
Calculate the space to be freed up.
Note: This Question is unanswered, help us to find answer for this one
190. The first and simplest recovery method, and the most drastic, is to ____.
Answer
Correct Answer:
Terminate every job that's active in the system and restart them from the beginning
Note: This Question is unanswered, help us to find answer for this one
191. The file management program incorporated into recent versions of windows is ____.
Answer
Correct Answer:
File Explorer.
Note: This Question is unanswered, help us to find answer for this one
192. The __________ command can be used to quickly catalog a suspect drive.
Note: This Question is unanswered, help us to find answer for this one
193. The _______ process is assigned as the parent to orphan processes.
Note: This Question is unanswered, help us to find answer for this one
194. The _____ relationship should be rare in any relational database design.
Note: This Question is unanswered, help us to find answer for this one
195. The _____ pseudo-column is used to select the next value from a sequence.
Note: This Question is unanswered, help us to find answer for this one
196. The ____ topology consists of a simple cable, or bus, to which all devices attach.
Note: This Question is unanswered, help us to find answer for this one
197. The ____ option to the lpstat command causes a list of printers that are enabled to be displayed.
Note: This Question is unanswered, help us to find answer for this one
198. The ____ of an object is an adjective that describes the objects current status.
Answer
Correct Answer:
Resemblance
Note: This Question is unanswered, help us to find answer for this one
199. The ____ is cited as a disadvantage of web-based training and distance learning by some educators.
Answer
Correct Answer:
Lack of face-to-face contact
Note: This Question is unanswered, help us to find answer for this one
200. The ____ is a fixed number associated with a devices nic.
Answer
Correct Answer:
Physical Address
Note: This Question is unanswered, help us to find answer for this one
201. The ____ check box indicates that a file has changed since the last backup.
Answer
Correct Answer:
File is ready for archiving
Note: This Question is unanswered, help us to find answer for this one
202. Suppose a new tech startup wants to define the data model. they would then ____.
Answer
Correct Answer:
Create the entity-relationship model
Note: This Question is unanswered, help us to find answer for this one
203. Space on the disk is marked as ____________________ if it has not yet been partitioned.
Answer
Correct Answer:
Unallocated
Note: This Question is unanswered, help us to find answer for this one
204. Soon more companies may use ________ to help analyze the mountains of big data they're collecting.
Note: This Question is unanswered, help us to find answer for this one
205. Sonet rings typically have a failover time of ____ milliseconds.
Note: This Question is unanswered, help us to find answer for this one
206. Software that helps manage a checkbook or prepare taxes is called ________ software.
Answer
Correct Answer:
Personal finance
Note: This Question is unanswered, help us to find answer for this one
207. One of the most obvious initial changes in windows vista was the ____ interface.
Note: This Question is unanswered, help us to find answer for this one
208. One advantage of _____ printers is their ability to output realistic objects.
Note: This Question is unanswered, help us to find answer for this one
209. Of the three components of access time in a movable-head dasd, ____ is the slowest.
Answer
Correct Answer:
Seek time
Note: This Question is unanswered, help us to find answer for this one
210. Of the following normal forms, _____ is mostly of theoretical interest.
Note: This Question is unanswered, help us to find answer for this one
211. Object attributes are often called ____ to help distinguish them from other variables you might use
Answer
Correct Answer:
Constructors
Note: This Question is unanswered, help us to find answer for this one
212. No data entry at all is known as a(n) ____.
Note: This Question is unanswered, help us to find answer for this one
213. Network administrators and it managers use network ____ to expose network vulnerabilities.
Answer
Correct Answer:
Security audits
Note: This Question is unanswered, help us to find answer for this one
214. Nasa uses _________ to conduct complex modeling and simulations for upcoming missions.
Answer
Correct Answer:
Supercomputers
Note: This Question is unanswered, help us to find answer for this one
215. Microsofts ____ technology uses internet explorer as the verification client.
Note: This Question is unanswered, help us to find answer for this one
216. Microsoft's most powerful dbms is ________.
Answer
Correct Answer:
SQL Server
Note: This Question is unanswered, help us to find answer for this one
217. Locating and repairing all syntax errors is part of the process of ____ a program.
Answer
Correct Answer:
Debugging.
Note: This Question is unanswered, help us to find answer for this one
218. Linux updates are issued free to the public about every ____ months.
Note: This Question is unanswered, help us to find answer for this one
219. Linux terminal management conforms to ____ standards, and it also supports pseudo-terminals.
Note: This Question is unanswered, help us to find answer for this one
220. Linux provides ____ queues and semaphores to allow two processes to synchronize with each other.
Note: This Question is unanswered, help us to find answer for this one
221. A(n) ____________________ is a filtering program that stops pop-up ads from displaying on webpages.
Note: This Question is unanswered, help us to find answer for this one
222. A(n) ____________________ contains a specific piece of information within a record.
Note: This Question is unanswered, help us to find answer for this one
223. A(n) _______________ includes one or more statements that can potentially raise an exception.
Answer
Correct Answer:
Try block
Note: This Question is unanswered, help us to find answer for this one
224. A(n) ______________ allows several unrelated processes to use the pipe for communication.
Answer
Correct Answer:
Anonymous pipe.
Note: This Question is unanswered, help us to find answer for this one
225. A(n) _________ is a connection point in a network.
Note: This Question is unanswered, help us to find answer for this one
226. A(n) ________ improves over time by learning from its interactions.
Answer
Correct Answer:
Cognitive computing system.
Note: This Question is unanswered, help us to find answer for this one
227. A(n) _______ is a collection of related data organized in a way that facilitates data searches.
Note: This Question is unanswered, help us to find answer for this one
228. A(n) _______ broadcasts messages to all devices connected to a lan.
Note: This Question is unanswered, help us to find answer for this one
229. A(n) _____ is a set of rules for how data is handled as it travels along a communications channel.
Answer
Correct Answer:
Protocol.
Note: This Question is unanswered, help us to find answer for this one
230. A(n) ____ method is a method that creates and initializes class objects.
Answer
Correct Answer:
Arguments.
Note: This Question is unanswered, help us to find answer for this one
231. A(n) ____ is an ordered arrangement of keys and pointers.
Note: This Question is unanswered, help us to find answer for this one
232. A(n) ____ is a system-generated primary key that is usually hidden from users.
Answer
Correct Answer:
Weak entity
Note: This Question is unanswered, help us to find answer for this one
233. A(n) ____ consists of rows that contain consolidated and summarized data.
Answer
Correct Answer:
Fact table
Note: This Question is unanswered, help us to find answer for this one
234. A typical ________ is made up of one or more network switches to which isps connect to each other.
Answer
Correct Answer:
Internet exchange point (IXP
Note: This Question is unanswered, help us to find answer for this one
235. All of the following are ways to avoid injuries when working on computers except ________.
Answer
Correct Answer:
Placing a monitor at least 12
Note: This Question is unanswered, help us to find answer for this one
236. A password _______________ policy forces users to select a new password periodically.
Answer
Correct Answer:
Expiration
Note: This Question is unanswered, help us to find answer for this one
237. When drawing erds, a line that terminates is either a _________.
Answer
Correct Answer:
Identifying or non-identifying relationship
Note: This Question is unanswered, help us to find answer for this one
238. Sip and h.323 regulate ____ for voip or video-over-ip clients and servers.
Answer
Correct Answer:
Call Signaling and Control
Note: This Question is unanswered, help us to find answer for this one
239. Sequence diagrams include symbols that represent all of the following except ____.
Note: This Question is unanswered, help us to find answer for this one
240. Global supply management companies assist businesses in finding the best _____ relationships.
Note: This Question is unanswered, help us to find answer for this one
241. Gartner, inc. predicts that by 2015 saas revenue will grow to ____.
Answer
Correct Answer:
$22.1 billion
Note: This Question is unanswered, help us to find answer for this one
242. Fourth-generation languages are commonly used to access ____.
Answer
Correct Answer:
Databases
Note: This Question is unanswered, help us to find answer for this one
243. Filenames typically include a ____ at the end of the filename.
Answer
Correct Answer:
File extension
Note: This Question is unanswered, help us to find answer for this one
244. Connecting your computers or devices to the ________ immediately exposes them to attack.
Note: This Question is unanswered, help us to find answer for this one
245. Combining the various sources of outgoing data into a single output data stream is called ____.
Answer
Correct Answer:
Multiplexing
Note: This Question is unanswered, help us to find answer for this one
246. A subtype is called a(n) ____ in idef1x terminology.
Note: This Question is unanswered, help us to find answer for this one
247. A software-based _________ is dedicated to examining and blocking internet traffic.
Note: This Question is unanswered, help us to find answer for this one
248. A relationship that is necessary for identification is called a(n) ____.
Answer
Correct Answer:
Identifying relationship
Note: This Question is unanswered, help us to find answer for this one
249. A persons social security number would be an example of a(n) ____________________ attribute.
Answer
Correct Answer:
Single-valued
Note: This Question is unanswered, help us to find answer for this one
250. A network's ____ is the arrangement of computers and mobile devices, printers, and other devices.
Answer
Correct Answer:
Physical topology
Note: This Question is unanswered, help us to find answer for this one
251. A network that expands beyond a metropolitan area is a ____ area network.
Note: This Question is unanswered, help us to find answer for this one
252. A network that covers a city or a suburb is called a ________.
Note: This Question is unanswered, help us to find answer for this one
253. A negative consequence of the expanding use of the cloud will be ______.
Answer
Correct Answer:
Fewer local jobs that focus on the installation and support of email and other servers
Note: This Question is unanswered, help us to find answer for this one
254. A multidimensional array in php is essentially ____.
Answer
Correct Answer:
An array of arrays
Note: This Question is unanswered, help us to find answer for this one
255. ________ cable is not subject to electromagnetic interference or radio frequency interference.
Answer
Correct Answer:
Fiber-optic
Note: This Question is unanswered, help us to find answer for this one
256. _______ is a javascript library intended to simplify client-side scripting:
Note: This Question is unanswered, help us to find answer for this one
257. _______ is a collaborative document web-based editing program stored in the cloud.
Answer
Correct Answer:
Google Docs
Note: This Question is unanswered, help us to find answer for this one
258. _______ do not use streaming technology and are used to download media files to your computer.
Note: This Question is unanswered, help us to find answer for this one
259. _______ agreements ensure that communications carriers exchange traffic on their networks freely.
Note: This Question is unanswered, help us to find answer for this one
260. For windows 7, the ____________________ tracks problems with applications, hardware, and windows.
Answer
Correct Answer:
Action center
Note: This Question is unanswered, help us to find answer for this one
261. A(n) _____ chart uses bars to compare separate (noncontinuous) items as they vary over time.
Note: This Question is unanswered, help us to find answer for this one
262. Function(argument1, argument2, ...) is ____.
Answer
Correct Answer:
The general syntax of all functions
Note: This Question is unanswered, help us to find answer for this one
263. A well-defined, descriptive table will have ____ general characteristics.
Note: This Question is unanswered, help us to find answer for this one
264. A dual-layer, single-sided dvd can hold the equivalent of ____ cds.
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
265. The _____ pseudo-class represents the exact instant in which a link is activated.
Note: This Question is unanswered, help us to find answer for this one
266. To set the color of a row, you use the ____ style.
Answer
Correct Answer:
Background-color
Note: This Question is unanswered, help us to find answer for this one
267. To delete the item, right-click it and click ____ on the shortcut menu.
Answer
Correct Answer:
Clear Content
Note: This Question is unanswered, help us to find answer for this one
268. To add the comment, welcome john smith, the syntax would be _____.
Note: This Question is unanswered, help us to find answer for this one
269. A(n) ______ test measures the performance of hardware or software.
Answer
Correct Answer:
Benchmark
Note: This Question is unanswered, help us to find answer for this one
270. When technology is available, the next step in dr. cattolicos research will be _______.
Answer
Correct Answer:
Technological diffusion
Note: This Question is unanswered, help us to find answer for this one
271. To deselect a single file in a list of selected files, you make use of the ____ key.
Note: This Question is unanswered, help us to find answer for this one
272. The operating system and other tools are collectively known as ______ software.
Note: This Question is unanswered, help us to find answer for this one
273. The ____ act implements regulations for unsolicited email messages
Note: This Question is unanswered, help us to find answer for this one
274. An appointment becomes a(n) ____ when people and other resources are invited.
Note: This Question is unanswered, help us to find answer for this one
275. ___________________ make use of baselines to identify changes in the behavior of the network.
Answer
Correct Answer:
Anomaly-based intrusion detection systems
Note: This Question is unanswered, help us to find answer for this one
276. The ____ microprocessor affected the technological revolution of the 1970s.
Note: This Question is unanswered, help us to find answer for this one
277. _______ storage devices do not lose data or programs after the electrical power is turned off.
Answer
Correct Answer:
Secondary
Note: This Question is unanswered, help us to find answer for this one
278. There are default tab stops every one inch on the horizontal ruler. _________________________
Note: This Question is unanswered, help us to find answer for this one
279. A gray scale comprised only of black and white with no color is called a(an) ________ scale.
Answer
Correct Answer:
Achromatic
Note: This Question is unanswered, help us to find answer for this one
280. (int)(math.random() * (65535 + 1)) returns a random number ________.
Answer
Correct Answer:
Between 0 and 65535
Note: This Question is unanswered, help us to find answer for this one
281. ________ printers produce lab-quality prints of your photos.
Answer
Correct Answer:
Dye-sublimation
Note: This Question is unanswered, help us to find answer for this one
282. Ftp is a _________ that is utilized to copy and manage files over the internet.
Note: This Question is unanswered, help us to find answer for this one
283. Characters created by computer-generated imagery are known as _____.
Answer
Correct Answer:
Synthespians
Note: This Question is unanswered, help us to find answer for this one
284. With ____, processing tasks are shared by servers and workstations.
Answer
Correct Answer:
Distributed processing
Note: This Question is unanswered, help us to find answer for this one
285. The amount of memory that should be allocated to the vm when it starts is called _________.
Answer
Correct Answer:
Startup RAM
Note: This Question is unanswered, help us to find answer for this one
286. The acronym ____________ refers to software that manages data stored in a database.
Note: This Question is unanswered, help us to find answer for this one
287. The ability to use digital video and audio tools is a component of __________ literacy.
Answer
Correct Answer:
Computer.
Note: This Question is unanswered, help us to find answer for this one
288. The abbreviation cpu for central processing unit is an example of a(n) _____.
Answer
Correct Answer:
Initialism
Note: This Question is unanswered, help us to find answer for this one
289. The "3v's" used to characterize big data include volume, variety, and _______.
Note: This Question is unanswered, help us to find answer for this one
290. If the visible property of a control is set to false, it ________ in the designer window.
Answer
Correct Answer:
Continues to be shown
Note: This Question is unanswered, help us to find answer for this one
291. Http is considered to be a(n) ___________ protocol.
Answer
Correct Answer:
Stateless
Note: This Question is unanswered, help us to find answer for this one
292. Copyright and patent protection was established through _____.
Answer
Correct Answer:
The U.S. Constitution
Note: This Question is unanswered, help us to find answer for this one
293. Constraints are always enforced at the ____ level.
Note: This Question is unanswered, help us to find answer for this one
294. Before the it security group can begin an eradication effort, it must _____.
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
295. Assume stringbuilder strbuf is "abcdefg", after invoking ________, strbuf contains "aefg".
Answer
Correct Answer:
StrBuf.delete(1, 4)
Note: This Question is unanswered, help us to find answer for this one
296. Any element in outlook that contains information is called a(n) ____.
Note: This Question is unanswered, help us to find answer for this one
297. An item such as a smart card is an example of the ____ form of authentication.
Answer
Correct Answer:
Something you have
Note: This Question is unanswered, help us to find answer for this one
298. An h-1b worker can work for a u.s. employer for a maximum continuous period of _____ years.
Note: This Question is unanswered, help us to find answer for this one
299. An email account is an electronic mailbox you receive from an ____.
Answer
Correct Answer:
Email service provider
Note: This Question is unanswered, help us to find answer for this one
300. An abiotic effect that restricts tree growth at high elevations is __________.
Answer
Correct Answer:
Ultraviolet radiation
Note: This Question is unanswered, help us to find answer for this one
301. Alternative country star lyle lovett says that he makes almost all of his income from ______.
Answer
Correct Answer:
Performing and Touring
Note: This Question is unanswered, help us to find answer for this one
302. All ethernet networks, independent of their speed or frame type, use an access method called ____.
Note: This Question is unanswered, help us to find answer for this one
303. Air gestures are used in ______.
Answer
Correct Answer:
Motion input
Note: This Question is unanswered, help us to find answer for this one
304. A(n) paragraph border frames the contents of a single page. _________________________
Note: This Question is unanswered, help us to find answer for this one
305. A(n) ____ path provides a precise location for a file.
Note: This Question is unanswered, help us to find answer for this one
306. A tool that database designers use to show the logical relationships among data is a(n) _____.
Answer
Correct Answer:
All of the these
Note: This Question is unanswered, help us to find answer for this one
307. A result from a search engine search is called a(n) ______.
Note: This Question is unanswered, help us to find answer for this one
308. A general rule for printing is to use _____ fonts for headlines and serif fonts for body text.
Answer
Correct Answer:
Sans-serif
Note: This Question is unanswered, help us to find answer for this one
309. A _______ file is a type of vector graphics file created specifically for windows.
Note: This Question is unanswered, help us to find answer for this one
310. A _____ is an internal or external entity that could endanger an asset.
Note: This Question is unanswered, help us to find answer for this one
311. A _____ is a series of events and activities with no slack time.
Answer
Correct Answer:
critical path
Note: This Question is unanswered, help us to find answer for this one
312. A ____ http connection reuses the same http connection to send and receive multiple requests.
Answer
Correct Answer:
Persistent
Note: This Question is unanswered, help us to find answer for this one
313. _____ is not one of the "3 vs" of big data.
Answer
Correct Answer:
Validation
Note: This Question is unanswered, help us to find answer for this one
314. _____ is common in airplane and spacecraft control systems.
Answer
Correct Answer:
Triple version programming
Note: This Question is unanswered, help us to find answer for this one
315. A(n) _______________ symptom is the most difficult symptom to diagnose.
Note: This Question is unanswered, help us to find answer for this one
316. The minimum recommended cpu requirements for a windows 64-bit thick client are _______________.
Answer
Correct Answer:
1 gigahertz (GHz) processor.
Note: This Question is unanswered, help us to find answer for this one
317. The hewlett-packard system for controlling printers is _______________.
Note: This Question is unanswered, help us to find answer for this one
318. The rate of ___________ has been fluctuating wildly this week.
Note: This Question is unanswered, help us to find answer for this one
319. With the help of _____ software, new housing developments can be easily planned and analyzed.
Answer
Correct Answer:
Geographic information system
Note: This Question is unanswered, help us to find answer for this one
320. There are ____ common vulnerability assessment processes
Note: This Question is unanswered, help us to find answer for this one
321. The software that a companys it department makes, builds, and develops is called ____ software.
Note: This Question is unanswered, help us to find answer for this one
322. The microwave used to heat your food and the cell phones you use are part of the ____.
Answer
Correct Answer:
Electromagnetic spectrum
Note: This Question is unanswered, help us to find answer for this one
323. Many of todays cell phones come equipped with ____ text technology keyboards to enhance texting.
Answer
Correct Answer:
Predictive
Note: This Question is unanswered, help us to find answer for this one
324. Wikis are designed for ________, allowing people to contribute more than just posting a response.
Answer
Correct Answer:
Collaboration
Note: This Question is unanswered, help us to find answer for this one
325. When choosing a cellular phone service, you should consider the ____.
Answer
Correct Answer:
Service plan
Note: This Question is unanswered, help us to find answer for this one
326. Voip is a type of ______ output.
Note: This Question is unanswered, help us to find answer for this one
327. Today's broadband in households allows for connections of up to 15 ________________ per second.
Answer
Correct Answer:
Million bits
Note: This Question is unanswered, help us to find answer for this one
328. To read a quick response (qr) code using a smartphone, one must have the _____ app.
Note: This Question is unanswered, help us to find answer for this one
329. The total information awareness tracking information system was created by ____.
Answer
Correct Answer:
Us federal government
Note: This Question is unanswered, help us to find answer for this one
330. The recovery point objective (rpo) identifies the amount of _________ that is acceptable.
Answer
Correct Answer:
Data loss
Note: This Question is unanswered, help us to find answer for this one
331. The process of managing the baseline settings of a system device is called ________.
Answer
Correct Answer:
Configuration control
Note: This Question is unanswered, help us to find answer for this one
332. The objective of _____ is to gather data about project usability, costs, benefits, and schedules.
Answer
Correct Answer:
Fact-finding
Note: This Question is unanswered, help us to find answer for this one
333. The number of mobile websites worldwide is expected to grow rapidly because of ______________.
Answer
Correct Answer:
The development of new and useful applications.
Note: This Question is unanswered, help us to find answer for this one
334. The most common wireless technology for tv and dvd remote control devices is _______.
Answer
Correct Answer:
Bluetooth
Note: This Question is unanswered, help us to find answer for this one
335. The language of telecommunications is governed by rules called ____
Answer
Correct Answer:
Protocols.
Note: This Question is unanswered, help us to find answer for this one
336. The information security function can be placed within the __________.
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
337. The four ms of resources in information systems are _____.
Answer
Correct Answer:
Manpower, machinery, materials, and money.
Note: This Question is unanswered, help us to find answer for this one
338. The __________ commercial site focuses on current security tool resources.
Answer
Correct Answer:
Packet Storm
Note: This Question is unanswered, help us to find answer for this one
339. The _____ support of a global information system involves broad and long-term goals.
Answer
Correct Answer:
Strategic
Note: This Question is unanswered, help us to find answer for this one
340. The ____ team is responsible for reestablishing connectivity between systems and to the internet.
Answer
Correct Answer:
Network recovery
Note: This Question is unanswered, help us to find answer for this one
341. The ____ help desk position is normally staffed by an entry-level employee.
Answer
Correct Answer:
Incident Screener
Note: This Question is unanswered, help us to find answer for this one
342. The ____ component of a dss manages and coordinates the other major components.
Answer
Correct Answer:
DSS engine
Note: This Question is unanswered, help us to find answer for this one
343. Syndication feeds are one way of announcing the availability of a _____.
Note: This Question is unanswered, help us to find answer for this one
344. Subsystems for the marketing mis and their outputs help marketing managers and executives to _____.
Answer
Correct Answer:
Reduce marketing expenses
Note: This Question is unanswered, help us to find answer for this one
345. Storage that is wiped clean when power is cut off from a device is known as _____.
Answer
Correct Answer:
Volatile memory
Note: This Question is unanswered, help us to find answer for this one
346. Some netiquette rules to consider when using social media include all of the following except ____.
Answer
Correct Answer:
Freely tag friends in your photos
Note: This Question is unanswered, help us to find answer for this one
347. Sending customers to a website for a referral fee is called the _____________ model.
Answer
Correct Answer:
Affiliate revenue
Note: This Question is unanswered, help us to find answer for this one
348. Risk __________ is the practice of identifying, assessing, controlling, and mitigating risks.
Answer
Correct Answer:
Management
Note: This Question is unanswered, help us to find answer for this one
349. Objective measures of the user support or help desk operation are called ____.
Answer
Correct Answer:
Performance statistics
Note: This Question is unanswered, help us to find answer for this one
350. Most system requests include all of the following except _____.
Answer
Correct Answer:
Project manager
Note: This Question is unanswered, help us to find answer for this one
351. Most risk identifications include a brief description of ____.
Answer
Correct Answer:
Who would be responsible for responding to a given risk
Note: This Question is unanswered, help us to find answer for this one
352. Most organizations use a(n) ____ form to propose and document a maintenance change.
Answer
Correct Answer:
Change request
Note: This Question is unanswered, help us to find answer for this one
353. Most organizations agree that __________ become their worst security problem.
Answer
Correct Answer:
Managers.
Note: This Question is unanswered, help us to find answer for this one
354. Microwave transmission systems are used for ______ volume, ______ distance, ______ communications.
Answer
Correct Answer:
High, long, line-of-sight
Note: This Question is unanswered, help us to find answer for this one
355. Many information security professionals enter the field from traditional ____ assignments.
Note: This Question is unanswered, help us to find answer for this one
356. Many companies implement _____ systems that integrate all customer-related events and transactions.
Answer
Correct Answer:
CRM (Customer relationship management)
Note: This Question is unanswered, help us to find answer for this one
357. Lbe helpdesk, featured in this chapter, is an example of a(n) ____.
Answer
Correct Answer:
A commercial help desk package
Note: This Question is unanswered, help us to find answer for this one
358. Knowledge management systems are called expert systems because they ____.
Answer
Correct Answer:
Simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied
Note: This Question is unanswered, help us to find answer for this one
359. A(n) ____________________ is an a potential risk to an information asset.
Note: This Question is unanswered, help us to find answer for this one
360. A(n) _____ is a bank that does business with sellers that want to accept payment cards.
Answer
Correct Answer:
Acquiring bank
Note: This Question is unanswered, help us to find answer for this one
361. A(n) ____ version is a system that is stable enough to be tested by end users.
Note: This Question is unanswered, help us to find answer for this one
362. A(n) ____ network includes transmission towers that connect to area handsets.
Note: This Question is unanswered, help us to find answer for this one
363. A(n) ____ is an unauthorized attempt to increase permission levels.
Answer
Correct Answer:
Privilege escalation attack.
Note: This Question is unanswered, help us to find answer for this one
364. A wimax access point has a ____ range.
Note: This Question is unanswered, help us to find answer for this one
365. A(n) ____________________ is a potential weakness in an asset or its defensive control(s).
Answer
Correct Answer:
Vulnerability.
Note: This Question is unanswered, help us to find answer for this one
366. A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.
Note: This Question is unanswered, help us to find answer for this one
367. A(n) _____ requires a user to transport it from one computer to another.
Note: This Question is unanswered, help us to find answer for this one
368. A(n) ____ version is a system version created for long-term release to users.
Answer
Correct Answer:
Production
Note: This Question is unanswered, help us to find answer for this one
369. A(n) ____ version is a system that is incomplete but ready for some level of rigorous testing.
Note: This Question is unanswered, help us to find answer for this one
370. A(n) ____ is a named set of code that performs a given task.
Answer
Correct Answer:
Procedure
Note: This Question is unanswered, help us to find answer for this one
371. The front _____________ connectors lead from the front of the computer case to the motherboard.
Answer
Correct Answer:
Panel REF. PAGE: 55
Note: This Question is unanswered, help us to find answer for this one
372. An ins would most likely be found in a(n) _________________.
Answer
Correct Answer:
Autonomous vehicle
Note: This Question is unanswered, help us to find answer for this one
373. An external hard disk _______.
Answer
Correct Answer:
Usually connects to a USB or Thunderbolt port
Note: This Question is unanswered, help us to find answer for this one
374. A(n) ______ is the gradual changing of one object into another using computer animation software.
Note: This Question is unanswered, help us to find answer for this one
375. From 1997 to 2010, internet use in __________ increased from 18% to 71.1%.
Answer
Correct Answer:
Households
Note: This Question is unanswered, help us to find answer for this one
376. On a linux computer, ____ represents file systems exported to remote hosts.
Answer
Correct Answer:
/etc/exports
Note: This Question is unanswered, help us to find answer for this one
377. Most code division multiple access (cdma) networks conform to is-95, created by the ____.
Answer
Correct Answer:
Telecommunications Industry Association (TIA)
Note: This Question is unanswered, help us to find answer for this one
378. One bitcoin could be divided down to ____ decimal point
Note: This Question is unanswered, help us to find answer for this one
379. On mac oss, the ____ stores any file information not in the mdb or volume control block (vcb).
Answer
Correct Answer:
Extents overflow file.
Note: This Question is unanswered, help us to find answer for this one
380. Mandiant ____ lists all open network sockets, including those hidden by rootkits.
Note: This Question is unanswered, help us to find answer for this one
381. The sale of sensitive or confidential company information to a competitor is known as _______.
Answer
Correct Answer:
Industrial espionage
Note: This Question is unanswered, help us to find answer for this one
382. Magnet ____ enables you to acquire the forensic image and process it in the same step.
Note: This Question is unanswered, help us to find answer for this one
383. One minute of cdda music requires in excess of ____ of storage space.
Note: This Question is unanswered, help us to find answer for this one
384. The ____ dialog box launcher allows you to navigate to a specific date.
Answer
Correct Answer:
Go To Date
Note: This Question is unanswered, help us to find answer for this one
385. Most tracking software do not ____.
Answer
Correct Answer:
Automatically send videos and photos of possible suspects to law enforcement
Note: This Question is unanswered, help us to find answer for this one
386. The default value for both kerning and tracking is _____ pixels.
Note: This Question is unanswered, help us to find answer for this one
387. In m2m communication, such as with the internet of things trend, the m stands for ______.
Note: This Question is unanswered, help us to find answer for this one
388. Personalization tokens and list segmentation are both examples of using _____ in email.
Note: This Question is unanswered, help us to find answer for this one
389. The basic input/output system is stored on a ________ chip.
Answer
Correct Answer:
Task Manager
Note: This Question is unanswered, help us to find answer for this one
390. The bankers algorithm is an example of a(n) ____ policy.
Answer
Correct Answer:
Avoidance
Note: This Question is unanswered, help us to find answer for this one
391. Relationships between tables can be illustrated through a(n) ____ relationship diagram.
Note: This Question is unanswered, help us to find answer for this one
392. Query wizards and ____ automate the process of writing sql commands in a relational database.
Answer
Correct Answer:
Query by example (QBE)
Note: This Question is unanswered, help us to find answer for this one
393. Public key encryption utilizes a pair of encryption keys obtained through ____ .
Answer
Correct Answer:
A Certificate Authority.
Note: This Question is unanswered, help us to find answer for this one
394. Programming is a __________ process because, after each step it may be necessary to revise.
Note: This Question is unanswered, help us to find answer for this one
395. Printers, monitors, tablets, cpus, and laptops are examples of ____________.
Note: This Question is unanswered, help us to find answer for this one
396. Printers typically understand either ____ or printer control language (pcl).
Answer
Correct Answer:
Postscript
Note: This Question is unanswered, help us to find answer for this one
397. Printer manufacturers advertise the quality of their products by stating how many ___ they produce.
Note: This Question is unanswered, help us to find answer for this one
398. In the tag, an alignment value of ____ places the caption below the table.
Note: This Question is unanswered, help us to find answer for this one
399. In the threat model stride, the s stands for ____ or pretending to be someone else.
Note: This Question is unanswered, help us to find answer for this one
400. Intel's sandy bridge chipsets move the graphics and memory controller to the ________.
Answer
Correct Answer:
Processor
Note: This Question is unanswered, help us to find answer for this one
401. In presenter view, the next slide in the presentation appears in the ____ corner of the screen.
Answer
Correct Answer:
Upper-right
Note: This Question is unanswered, help us to find answer for this one
402. Playboy magazine stopped running photos of fully nude women in 2015 because ______.
Answer
Correct Answer:
Explicit photos interfered with Playboy's ability to promote their brand
Note: This Question is unanswered, help us to find answer for this one
403. Peripherals such as the scanner pictured here are considered _____ devices.
Note: This Question is unanswered, help us to find answer for this one
404. The colspan attribute of the ____ tag sets a number of columns spanned by a cell.