MCQs > IT & Programming > Computer Science MCQs > Basic Computer Science MCQs

Basic Computer Science MCQ

1. In binary, adding 0 to _________ results in 0.

Answer

Correct Answer: Onezero

Note: This Question is unanswered, help us to find answer for this one

2. The architecture of the world wide web is largely based on ___________s original design.

Answer

Correct Answer: Tim Berners-Lee

Note: This Question is unanswered, help us to find answer for this one

3. The major carriers of network traffic are known collectively as the internet ______.

Answer

Correct Answer: Conductors

Note: This Question is unanswered, help us to find answer for this one

4. When a computer is first started, its ____ firmware is responsible for initializing the computer.

Answer

Correct Answer: BIOSB

Note: This Question is unanswered, help us to find answer for this one

5. Users can change their own passwords by typing passwd with ____ to specify the username.

Answer

Correct Answer: No argument

Note: This Question is unanswered, help us to find answer for this one

6. A(n) ________ is an intent and method to exploit a vulnerability.

Answer

Correct Answer: Threat source

Note: This Question is unanswered, help us to find answer for this one

7. Fonts, colors, and cell styles are organized in _____ categories.

Answer

Correct Answer: Theme and non-theme

Note: This Question is unanswered, help us to find answer for this one

8. In the mac os, the resource ____ stores information about the data.

Answer

Correct Answer: Fork

Note: This Question is unanswered, help us to find answer for this one

9. In the fhs, the _____ directory contains the linux kernel and files used by the boot loader.

Answer

Correct Answer: /boot

Note: This Question is unanswered, help us to find answer for this one

10. In the dining philosophers problem, a philosopher can pick up a fork when ____.

Answer

Correct Answer: There are two available

Note: This Question is unanswered, help us to find answer for this one

11. In order to accomplish serial processing of updates, many dbmss use ____.

Answer

Correct Answer: Locking

Note: This Question is unanswered, help us to find answer for this one

12. In navigation mode, press [tab] or ____ to move to the next field within the same record.

Answer

Correct Answer: [Enter]

Note: This Question is unanswered, help us to find answer for this one

13. The ca periodically distributes a(n) ____ to all users that identifies all revoked certificates.

Answer

Correct Answer: CRL

Note: This Question is unanswered, help us to find answer for this one

14. Perhaps the most common form of protection from unauthorized use of a computer system is the ____.

Answer

Correct Answer: Password

Note: This Question is unanswered, help us to find answer for this one

15. In the ssh suite, the ____________________ command allows a user to log on to a remote computer.

Answer

Correct Answer: Slogin

Note: This Question is unanswered, help us to find answer for this one

16. Possibly the earliest example of a polyalphabetic cipher is the ____ cipher.

Answer

Correct Answer: Vigenére

Note: This Question is unanswered, help us to find answer for this one

17. The contents of query datasheet are permanent. ____________________

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

18. The command, ____ , will copy the contents of chapt1 and chapt2 into a file named section_a.

Answer

Correct Answer: Cat chapt1 chapt2>section_a

Note: This Question is unanswered, help us to find answer for this one

19. The choice to enforce referential integrity is indicated in design view by a thick ____

Answer

Correct Answer: Join line

Note: This Question is unanswered, help us to find answer for this one

20. The branch, publisher, and ____ tables are part of the henry books database.

Answer

Correct Answer: AUTHOR

Note: This Question is unanswered, help us to find answer for this one

21. Oracle recommends _____ for creating audit logs.

Answer

Correct Answer: Triggers

Note: This Question is unanswered, help us to find answer for this one

22. Partial completeness is symbolized by ____.

Answer

Correct Answer: A dotted line

Note: This Question is unanswered, help us to find answer for this one

23. The environment subsystems and the applications run in ____ mode.

Answer

Correct Answer: User

Note: This Question is unanswered, help us to find answer for this one

24. The easiest method for monitoring free space by mounted filesystems is to use the ____ command.

Answer

Correct Answer: Df -

Note: This Question is unanswered, help us to find answer for this one

25. It is the job of the ____ to oversee the removal of software programs on a computer.

Answer

Correct Answer: Operating system

Note: This Question is unanswered, help us to find answer for this one

26. In windows the guest account ________________.

Answer

Correct Answer: All choices apply

Note: This Question is unanswered, help us to find answer for this one

27. In traditional programming, probably the most often used error-handling outcome was to ____.

Answer

Correct Answer: Terminate the program in which the offending statement occurred

Note: This Question is unanswered, help us to find answer for this one

28. The biggest challenge posed by big data is ____.

Answer

Correct Answer: Developing software to analyze the massive amount of data

Note: This Question is unanswered, help us to find answer for this one

29. Ports that are generally used to establish outbound connections are known as ______ ports.

Answer

Correct Answer: Ephemeral

Note: This Question is unanswered, help us to find answer for this one

30. A _______ is a shortcut to a web page saved in a list in the internet explorer desktop application.

Answer

Correct Answer: Favorite

Note: This Question is unanswered, help us to find answer for this one

31. Wireless lans and public hotspots use ____ technology to connect to the internet.

Answer

Correct Answer: WI-FI

Note: This Question is unanswered, help us to find answer for this one

32. A ________ is a network located in your residence that connects to all your digital devices.

Answer

Correct Answer: HAN

Note: This Question is unanswered, help us to find answer for this one

33. A _____ is a permanent telephone connection between two points.

Answer

Correct Answer: Leased line

Note: This Question is unanswered, help us to find answer for this one

34. All of the following are main areas of research in artificial intelligence, except ________.

Answer

Correct Answer: Data mining

Note: This Question is unanswered, help us to find answer for this one

35. All of the following are elements of a database application except ________.

Answer

Correct Answer: Data

Note: This Question is unanswered, help us to find answer for this one

36. All fields in a database should be contained in one table. _________________________

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

37. All devices attached to a network are identified as ____

Answer

Correct Answer: Nodes

Note: This Question is unanswered, help us to find answer for this one

38. All applications operate over a uniform _________.

Answer

Correct Answer: API

Note: This Question is unanswered, help us to find answer for this one

39. A job scheduler based on process priorities and durations is an example of ____.

Answer

Correct Answer: Estimation theory

Note: This Question is unanswered, help us to find answer for this one

40. A forms object name appears on the tab for the form in the access window. ____________________

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

41. A field is a(n) ____ field if it is not part of the primary key.

Answer

Correct Answer: Nonkey Field or Nonkey Attribute

Note: This Question is unanswered, help us to find answer for this one

42. A dropped packet is often referred to as a _____________.

Answer

Correct Answer: Discard

Note: This Question is unanswered, help us to find answer for this one

43. A disk ____ is a bit-by-bit copy of the data from all sectors of a disk.

Answer

Correct Answer: Image

Note: This Question is unanswered, help us to find answer for this one

44. A counter tracks specific information about a(n) ________________.

Answer

Correct Answer: Object

Note: This Question is unanswered, help us to find answer for this one

45. A counter is a(n) ________ that can be incremented or decremented each time a loop runs.

Answer

Correct Answer: Integer variable

Note: This Question is unanswered, help us to find answer for this one

46. A controversial topic today regarding the cost and flow of internet traffic is ________.

Answer

Correct Answer: Net neutrality

Note: This Question is unanswered, help us to find answer for this one

47. A command center should have at least __________ security officers (or command center officers):

Answer

Correct Answer: 3

Note: This Question is unanswered, help us to find answer for this one

48. A (n) _____ travels from computer to computer in a network, but it does not usually erase data.

Answer

Correct Answer: Worm

Note: This Question is unanswered, help us to find answer for this one

49. A ______________ is a worker who work occasionally or regularly from a home office.

Answer

Correct Answer: Telecommuter

Note: This Question is unanswered, help us to find answer for this one

50. A ________ is used to travel through a linked list and search for data.

Answer

Correct Answer: Traversal operator

Note: This Question is unanswered, help us to find answer for this one

51. A ________ is used to receive and process thousands of requests from a large number of users.

Answer

Correct Answer: Server farm

Note: This Question is unanswered, help us to find answer for this one

52. A ________ is represented by a 0 or 1. eight together make a byte (i.e., 00101100).

Answer

Correct Answer: Bit

Note: This Question is unanswered, help us to find answer for this one

53. A ____ is several programs simultaneously processing the same i/o stream.

Answer

Correct Answer: Pipeline

Note: This Question is unanswered, help us to find answer for this one

54. A ____ is a workstation that accesses software and data through the network on another computer.

Answer

Correct Answer: Client

Note: This Question is unanswered, help us to find answer for this one

55. A ____ intelligently forwards messages between two or more networks.

Answer

Correct Answer: Router

Note: This Question is unanswered, help us to find answer for this one

56. A ____ connects all lan central nodes in a group of buildings.

Answer

Correct Answer: Zone network

Note: This Question is unanswered, help us to find answer for this one

57. A ____ aggregates multiple dsl subscriber lines and connects them to the carriers co.

Answer

Correct Answer: DSLAM

Note: This Question is unanswered, help us to find answer for this one

58. < b>is an example of an html ________. quizlet

Answer

Correct Answer: Tag

Note: This Question is unanswered, help us to find answer for this one

59. _______________ databases are by far the most popular type of database on the market today.

Answer

Correct Answer: Relational

Note: This Question is unanswered, help us to find answer for this one

60. __________ is a term that refers to the time delay in converting input packets to output packets.

Answer

Correct Answer: Latency

Note: This Question is unanswered, help us to find answer for this one

61. ________ problems are encountered when removing data with transitive dependencies.

Answer

Correct Answer: Deletion

Note: This Question is unanswered, help us to find answer for this one

62. _____ relationships occur when there are multiple relationship paths between related entities.

Answer

Correct Answer: Redundant

Note: This Question is unanswered, help us to find answer for this one

63. _____ refers to the range of frequencies available in any communications channel.

Answer

Correct Answer: Bandwidth

Note: This Question is unanswered, help us to find answer for this one

64. _____ refers to a situation in which keys are managed by a third party, such as a trusted ca.

Answer

Correct Answer: Key escrow

Note: This Question is unanswered, help us to find answer for this one

65. _____ provide(s) companies with a single version of the truth for their data.

Answer

Correct Answer: Master data management

Note: This Question is unanswered, help us to find answer for this one

66. _____ is the body of information and facts about a specific subject.

Answer

Correct Answer: Knowledge

Note: This Question is unanswered, help us to find answer for this one

67. _____ is an open-source operating system whose source code is freely available to everyone.

Answer

Correct Answer: Linux

Note: This Question is unanswered, help us to find answer for this one

68. _____ is a good site to develop your professional network.

Answer

Correct Answer: Linkedin

Note: This Question is unanswered, help us to find answer for this one

69. _____ is a computer crime that involves destroying or disrupting computer services.

Answer

Correct Answer: Sabotage

Note: This Question is unanswered, help us to find answer for this one

70. _____ does not allow changing service or bandwidth because a web site allows illegal media sharing.

Answer

Correct Answer: Net neutrality

Note: This Question is unanswered, help us to find answer for this one

71. ________ is a data structure to store data in sequential order.

Answer

Correct Answer: A list

Note: This Question is unanswered, help us to find answer for this one

72. _____ are conducted media that can be used for both data and voice transmissions.

Answer

Correct Answer: Coaxial cables

Note: This Question is unanswered, help us to find answer for this one

73. _____ allows the linking of devices running on many different platforms.

Answer

Correct Answer: Transmission Control Protocol/Internet Protocol

Note: This Question is unanswered, help us to find answer for this one

74. ____ transmissions are radio signals sent to and from cell phones via cellular (cell) towers.

Answer

Correct Answer: Cellular radio

Note: This Question is unanswered, help us to find answer for this one

75. ____ service offered slightly faster service than dial-up but has today been replaced by dsl.

Answer

Correct Answer: ISDN

Note: This Question is unanswered, help us to find answer for this one

76. ____ routing involves storing all the routing information at one central location.

Answer

Correct Answer: Centralized

Note: This Question is unanswered, help us to find answer for this one

77. ____ published a visual tool to show how deadlock conditions can be modeled using directed graphs.

Answer

Correct Answer: Holt

Note: This Question is unanswered, help us to find answer for this one

78. ____ is the glue that binds private networks together to form the internet and the world wide web.

Answer

Correct Answer: TCP/IP

Note: This Question is unanswered, help us to find answer for this one

79. ____ is a queue reordering technique that can help optimize i/o times.

Answer

Correct Answer: Rescheduling

Note: This Question is unanswered, help us to find answer for this one

80. ____ involves the creation of mathematical equations to calculate various network values.

Answer

Correct Answer: Analytical modeling

Note: This Question is unanswered, help us to find answer for this one

81. ____ implies that no site should depend on another site to perform its database functions.

Answer

Correct Answer: Local autonomy

Note: This Question is unanswered, help us to find answer for this one

82. ____ handles outgoing email messages, determining the paths an email message takes on the internet.

Answer

Correct Answer: SMTP

Note: This Question is unanswered, help us to find answer for this one

83. To stay with the current wi-fi standard, make sure your device is compatible with ____.

Answer

Correct Answer: 802.11n

Note: This Question is unanswered, help us to find answer for this one

84. The traffic sent by devices connected to a hub can be captured and decoded by a _________________.

Answer

Correct Answer: Protocol analyzer

Note: This Question is unanswered, help us to find answer for this one

85. The ____ paging policy determines when the pager copies a page from disk to memory.

Answer

Correct Answer: Fetch

Note: This Question is unanswered, help us to find answer for this one

86. The ____ layer forwards messages to their correct destinations.

Answer

Correct Answer: Network

Note: This Question is unanswered, help us to find answer for this one

87. Synchronous communication means that everyone who is communicating must be _____ at the same time.

Answer

Correct Answer: Online

Note: This Question is unanswered, help us to find answer for this one

88. Sustainable mis is a critical part of ________ within a company.

Answer

Correct Answer: Corporate social responsibility

Note: This Question is unanswered, help us to find answer for this one

89. In a paged memory allocation scheme, a page size that is too small will generate ____.

Answer

Correct Answer: Very long Page Map Tables

Note: This Question is unanswered, help us to find answer for this one

90. In ____________________ design, the final program is a collection of interacting objects.

Answer

Correct Answer: Object oriented

Note: This Question is unanswered, help us to find answer for this one

91. If networked, ____ can be accessed by an authorized lan user.

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

92. If a user restarts a computer that is already turned on, it is referred to as a __________.

Answer

Correct Answer: Warm boot

Note: This Question is unanswered, help us to find answer for this one

93. If a tcp socket is ready and listening for incoming connections, it's in the ______ state.

Answer

Correct Answer: LISTEN

Note: This Question is unanswered, help us to find answer for this one

94. If a switch has eight 100-mbps ports, the backplane has to support a total of ____ mbps.

Answer

Correct Answer: 800

Note: This Question is unanswered, help us to find answer for this one

95. If a security warning appears when you open a database, tap or click the ____ option button.

Answer

Correct Answer: Enable Content

Note: This Question is unanswered, help us to find answer for this one

96. If 2.5 minutes is the maximum access time for a magnetic tape, ____ is the average access time.

Answer

Correct Answer: 1.25 minutes

Note: This Question is unanswered, help us to find answer for this one

97. High speed ________ communication lines use fiber optics

Answer

Correct Answer: OC

Note: This Question is unanswered, help us to find answer for this one

98. By default, windows does not display ____________________ in windows explorer.

Answer

Correct Answer: File extension

Note: This Question is unanswered, help us to find answer for this one

99. Bottlenecks tend to develop ____.

Answer

Correct Answer: When resources reach their capacity

Note: This Question is unanswered, help us to find answer for this one

100. Bcnf can be violated only if the table contains more than one _____ key.

Answer

Correct Answer: Candidate

Note: This Question is unanswered, help us to find answer for this one

101. At tal distributors, there is a ____ relationship between sales reps and customers.

Answer

Correct Answer: One-to-many

Note: This Question is unanswered, help us to find answer for this one

102. As jack explains to kate, a database is a collection of _____ records.

Answer

Correct Answer: Integrated

Note: This Question is unanswered, help us to find answer for this one

103. Arrays are most efficiently processed using _____.

Answer

Correct Answer: Loops 6

Note: This Question is unanswered, help us to find answer for this one

104. Any line that starts with a(n) ____ character is a comment in the /etc/rsyslog.conf file.

Answer

Correct Answer: #

Note: This Question is unanswered, help us to find answer for this one

105. Andrea advises dean to remove unnecessary programs from his computer by using a(n) ____ utility.

Answer

Correct Answer: Uninstall

Note: This Question is unanswered, help us to find answer for this one

106. An operating systems ____ capability supports a division of labor among all the processing units.

Answer

Correct Answer: Multiprocessing

Note: This Question is unanswered, help us to find answer for this one

107. An online drugstore such as drugstore.com is an example of a(n) ________.

Answer

Correct Answer: E-commerce database application

Note: This Question is unanswered, help us to find answer for this one

108. An ip address in the form 197.169.100.1 is called a(n) ________.

Answer

Correct Answer: Dotted quad

Note: This Question is unanswered, help us to find answer for this one

109. An integer format uses ____ bits to represent the number 12,345 in binary form.

Answer

Correct Answer: 16
20

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

110. An i/o request is called a(n) ____ wait in multiprogramming environments.

Answer

Correct Answer: Natural

Note: This Question is unanswered, help us to find answer for this one

111. An essential tool in linux for technicians is the command line, called _______________.

Answer

Correct Answer: Terminal

Note: This Question is unanswered, help us to find answer for this one

112. An e-mail program creates a(n) ____ document and attaches it to the e-mail message.

Answer

Correct Answer: Multipurpose Internet Mail Extensions (MIME)

Note: This Question is unanswered, help us to find answer for this one

113. An api called ____ is used to pass i/o requests structured in the smb format to a remote computer.

Answer

Correct Answer: NetBIOS

Note: This Question is unanswered, help us to find answer for this one

114. An alternative to the primary key of a table is listed with the ____ abbreviation in dbdl.

Answer

Correct Answer: PK
AK

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

115. An administrator can discover the host name assigned to a client by using the ____ utility.

Answer

Correct Answer: Hostname

Note: This Question is unanswered, help us to find answer for this one

116. An _____ shows the objects and how they interact to perform business functions and transactions.

Answer

Correct Answer: Object relationship diagram

Note: This Question is unanswered, help us to find answer for this one

117. An ____ is a data structure that controls how the i/o operation is processed at each step.

Answer

Correct Answer: IRP

Note: This Question is unanswered, help us to find answer for this one

118. Among all video over ip applications ____is perhaps the simplest

Answer

Correct Answer: Streaming video

Note: This Question is unanswered, help us to find answer for this one

119. Almost all mans are based on one of two basic forms of supporting technology: ____ or ethernet.

Answer

Correct Answer: SONET

Note: This Question is unanswered, help us to find answer for this one

120. All primary key entries are unique, and no part of a primary key may be ____.

Answer

Correct Answer: Null

Note: This Question is unanswered, help us to find answer for this one

121. All of the following can be used in an os x file name except ________.

Answer

Correct Answer: :

Note: This Question is unanswered, help us to find answer for this one

122. After a successful compile, you can run the class file on any computer that has a ____.

Answer

Correct Answer: Java language interpreter

Note: This Question is unanswered, help us to find answer for this one

123. Adobe reader works with files stored in standard ____ format.

Answer

Correct Answer: PDF

Note: This Question is unanswered, help us to find answer for this one

124. Actions or schedules that start a program are called _______________ in task scheduler.

Answer

Correct Answer: Triggers

Note: This Question is unanswered, help us to find answer for this one

125. According to moore's law (1965), the ratio of price to performance has ________.

Answer

Correct Answer: Fallen

Note: This Question is unanswered, help us to find answer for this one

126. Access the individual elements in an array by using their ________.

Answer

Correct Answer: Subscripts

Note: This Question is unanswered, help us to find answer for this one

127. Access does not require a table to have a(n) primary key. _________________________

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

128. A(n)_____ is a combination of a hardware configuration and systems software.

Answer

Correct Answer: Computer system platform

Note: This Question is unanswered, help us to find answer for this one

129. The ______ displays by default at the top of the navigation pane when you open file explorer.

Answer

Correct Answer: Quick access list

Note: This Question is unanswered, help us to find answer for this one

130. Virtual environments are stored as _______________.

Answer

Correct Answer: A set of files

Note: This Question is unanswered, help us to find answer for this one

131. Unicode represents more than ____ unique, multilingual characters.

Answer

Correct Answer: 65,000

Note: This Question is unanswered, help us to find answer for this one

132. When you copy data from a file on a storage device into ram, you are ____ from the file.

Answer

Correct Answer: Reading

Note: This Question is unanswered, help us to find answer for this one

133. Software companies typically perform _____before releasing a product.

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

134. Translating an algorithm into a programming language is called ________.

Answer

Correct Answer: Coding

Note: This Question is unanswered, help us to find answer for this one

135. Within an event-driven program, a component from which an event is generated is the ____.

Answer

Correct Answer: Source of the event

Note: This Question is unanswered, help us to find answer for this one

136. With ____, users are able to store data on internet servers housed in data centers.

Answer

Correct Answer: Cloud computing

Note: This Question is unanswered, help us to find answer for this one

137. Windows task scheduler divides tasks into actions, conditions, and ______________.

Answer

Correct Answer: Triggers

Note: This Question is unanswered, help us to find answer for this one

138. Windows 7 and vista providess a new 3d user interface called the ____ user interface.

Answer

Correct Answer: Aero

Note: This Question is unanswered, help us to find answer for this one

139. When you assign a ____ to a field access

Answer

Correct Answer: Caption

Note: This Question is unanswered, help us to find answer for this one

140. When saving a new database in access 2007-2016 databases, the file extension should be ________.

Answer

Correct Answer: Accdb.

Note: This Question is unanswered, help us to find answer for this one

141. When properly used, inheritance always involves a ____ relationship.

Answer

Correct Answer: Specific-to-specific

Note: This Question is unanswered, help us to find answer for this one

142. When multiple parameters appear in a method header, they constitute a(n) ____.

Answer

Correct Answer: Parameter list

Note: This Question is unanswered, help us to find answer for this one

143. Virtually all dbmss include a ____ for easy data input, modification, and retrieval.

Answer

Correct Answer: User interface

Note: This Question is unanswered, help us to find answer for this one

144. Using moores law, we can gauge how fast ____________ might be in the coming years.

Answer

Correct Answer: Processors

Note: This Question is unanswered, help us to find answer for this one

145. Using a wireless network without the network owner's permission is known as ________.

Answer

Correct Answer: Piggybacking

Note: This Question is unanswered, help us to find answer for this one

146. Using a ______________, packets are delivered to a single node on a network

Answer

Correct Answer: Unicast address

Note: This Question is unanswered, help us to find answer for this one

147. Users in motion, wireless connectivity, and a cloud-based resource are the elements in a ________.

Answer

Correct Answer: Mobile system

Note: This Question is unanswered, help us to find answer for this one

148. Users in motion require all of the following cloud resources except __________.

Answer

Correct Answer: Wireless connectivity

Note: This Question is unanswered, help us to find answer for this one

149. Use _______________ to load minimal, generic and trusted drivers for troubleshooting purposes.

Answer

Correct Answer: Safe mode

Note: This Question is unanswered, help us to find answer for this one

150. Unix/linux systems interpret ____ to mean the parent directory.

Answer

Correct Answer: Dot (..)

Note: This Question is unanswered, help us to find answer for this one

151. Traditional mainframe networks use a ____ topology.

Answer

Correct Answer: Hierarchical

Note: This Question is unanswered, help us to find answer for this one

152. To transfer data packets between two or more networks, a ________ is used.

Answer

Correct Answer: Router

Note: This Question is unanswered, help us to find answer for this one

153. To modify the structure of an existing table, you use the _______________________ statement.

Answer

Correct Answer: Alter table

Note: This Question is unanswered, help us to find answer for this one

154. To generate a surrogate key, microsoft access uses a(n) _____ data type.

Answer

Correct Answer: AutoNumber

Note: This Question is unanswered, help us to find answer for this one

155. Ticket machines, atms, digital cameras, and robotics all use ______ operating systems.

Answer

Correct Answer: Embedded

Note: This Question is unanswered, help us to find answer for this one

156. There are ____ different kill signals that the kill command can send to a certain process.

Answer

Correct Answer: 64

Note: This Question is unanswered, help us to find answer for this one

157. The windows task manager can be opened by pressing and holding the ____ keys together.

Answer

Correct Answer: Ctrl, Alt, and Delete

Note: This Question is unanswered, help us to find answer for this one

158. The two operations defined by dijkstra to be performed on a semaphore are ____.

Answer

Correct Answer: P and V

Note: This Question is unanswered, help us to find answer for this one

159. The term ____ is used to label any condition in which one or more optional relationships exist.

Answer

Correct Answer: Optionality

Note: This Question is unanswered, help us to find answer for this one

160. The tcp/ip reference model has ____ layers that roughly correlate to the osis seven layers.

Answer

Correct Answer: Four

Note: This Question is unanswered, help us to find answer for this one

161. The strengths of mac os do not include ____.

Answer

Correct Answer: Its use of resource forks

Note: This Question is unanswered, help us to find answer for this one

162. The start menu includes variously-sized shaded rectangles, called ____ .

Answer

Correct Answer: Tiles

Note: This Question is unanswered, help us to find answer for this one

163. The standard method of specifying the format of web pages is called ________.

Answer

Correct Answer: Hypertext Markup Language (HTML)

Note: This Question is unanswered, help us to find answer for this one

164. The sql command for deleting the storehouse field from the item table is ____.

Answer

Correct Answer: ALTER TABLE Item DROP COLUMN Storehouse ;

Note: This Question is unanswered, help us to find answer for this one

165. The specific content of a field is referred to as the ____.

Answer

Correct Answer: Field value

Note: This Question is unanswered, help us to find answer for this one

166. The siri personal assistant application on apple's iphone 5s is an example of a ________.

Answer

Correct Answer: Natural language processing (NLP) system. data mining.

Note: This Question is unanswered, help us to find answer for this one

167. The secure connection between a vpn server and a vpn client is often referred to as a ________.

Answer

Correct Answer: Tunnel.

Note: This Question is unanswered, help us to find answer for this one

168. The relationship between record types can be depicted graphically with a(n) _________.

Answer

Correct Answer: ERD

Note: This Question is unanswered, help us to find answer for this one

169. The relational models creator, e. f. codd, used the term relation as a synonym for ____.

Answer

Correct Answer: . Table. Attribute

Note: This Question is unanswered, help us to find answer for this one

170. The protocols used to encrypt account names and passwords are called _____ protocols.

Answer

Correct Answer: Authentication

Note: This Question is unanswered, help us to find answer for this one

171. The proper use of ____________________ keys is crucial to controlling data redundancy.

Answer

Correct Answer: Foreign

Note: This Question is unanswered, help us to find answer for this one

172. The process of normalization constructs tables such that every table has a ________.

Answer

Correct Answer: Single theme

Note: This Question is unanswered, help us to find answer for this one

173. The performance tab displays summary usage information for all of the following except ________.

Answer

Correct Answer: Services

Note: This Question is unanswered, help us to find answer for this one

174. The network layer header identifies sending and receiving hosts by their _________________.

Answer

Correct Answer: IP Addreases

Note: This Question is unanswered, help us to find answer for this one

175. The most common technology used with an egocentric virtual environment is _____.

Answer

Correct Answer: A head-mounted display (HMD)

Note: This Question is unanswered, help us to find answer for this one

176. The most common home network is a ________.

Answer

Correct Answer: A token ring LAN

Note: This Question is unanswered, help us to find answer for this one

177. The internet is ________

Answer

Correct Answer: Large network of networks

Note: This Question is unanswered, help us to find answer for this one

178. The internet talks only ____, so users must use software that supports this protocol.

Answer

Correct Answer: IPX/SPX

Note: This Question is unanswered, help us to find answer for this one

179. The international organization for standardization (iso) helps set standards for _____ countries.

Answer

Correct Answer: 163

Note: This Question is unanswered, help us to find answer for this one

180. The instantiation of an endpoint in a potential tcp connection is known as a ______.

Answer

Correct Answer: Socket.

Note: This Question is unanswered, help us to find answer for this one

181. The ieee 802.3z standards are also known as ____ ethernet.

Answer

Correct Answer: Switch

Note: This Question is unanswered, help us to find answer for this one

182. The highest level that a satellite can occupy in space is known as ________.

Answer

Correct Answer: Geostationary earth orbit (GEO)

Note: This Question is unanswered, help us to find answer for this one

183. The global positioning system is a network of 21 ________ plus 3 working spares.

Answer

Correct Answer: Satellites

Note: This Question is unanswered, help us to find answer for this one

184. The following is not on the security checklist for installing a wireless router: ____.

Answer

Correct Answer: ​Change the SSID frequently because SSIDs are not case sensitive

Note: This Question is unanswered, help us to find answer for this one

185. The flowchart shape for a process is a(n) ________.

Answer

Correct Answer: Rectangle

Note: This Question is unanswered, help us to find answer for this one

186. The fixed ipv6 header makes up the first ____ octets or 320 bits of the ipv6 packet.

Answer

Correct Answer: 40

Note: This Question is unanswered, help us to find answer for this one

187. The first window displayed when you install opensuse is the ____ window.

Answer

Correct Answer: Boot Options

Note: This Question is unanswered, help us to find answer for this one

188. The first thing to do upon notification of a new software patch is to____.

Answer

Correct Answer: Identify the criticality of the patch

Note: This Question is unanswered, help us to find answer for this one

189. The first task of disk cleanup is to ______________.

Answer

Correct Answer: Calculate the space to be freed up.

Note: This Question is unanswered, help us to find answer for this one

190. The first and simplest recovery method, and the most drastic, is to ____.

Answer

Correct Answer: Terminate every job that's active in the system and restart them from the beginning

Note: This Question is unanswered, help us to find answer for this one

191. The file management program incorporated into recent versions of windows is ____.

Answer

Correct Answer: File Explorer.

Note: This Question is unanswered, help us to find answer for this one

192. The __________ command can be used to quickly catalog a suspect drive.

Answer

Correct Answer: Ls

Note: This Question is unanswered, help us to find answer for this one

193. The _______ process is assigned as the parent to orphan processes.

Answer

Correct Answer: Init

Note: This Question is unanswered, help us to find answer for this one

194. The _____ relationship should be rare in any relational database design.

Answer

Correct Answer: 1:1

Note: This Question is unanswered, help us to find answer for this one

195. The _____ pseudo-column is used to select the next value from a sequence.

Answer

Correct Answer: NEXTVAL

Note: This Question is unanswered, help us to find answer for this one

196. The ____ topology consists of a simple cable, or bus, to which all devices attach.

Answer

Correct Answer: Bus/tree

Note: This Question is unanswered, help us to find answer for this one

197. The ____ option to the lpstat command causes a list of printers that are enabled to be displayed.

Answer

Correct Answer: -p

Note: This Question is unanswered, help us to find answer for this one

198. The ____ of an object is an adjective that describes the objects current status.

Answer

Correct Answer: Resemblance

Note: This Question is unanswered, help us to find answer for this one

199. The ____ is cited as a disadvantage of web-based training and distance learning by some educators.

Answer

Correct Answer: Lack of face-to-face contact

Note: This Question is unanswered, help us to find answer for this one

200. The ____ is a fixed number associated with a devices nic.

Answer

Correct Answer: Physical Address

Note: This Question is unanswered, help us to find answer for this one

201. The ____ check box indicates that a file has changed since the last backup.

Answer

Correct Answer: File is ready for archiving

Note: This Question is unanswered, help us to find answer for this one

202. Suppose a new tech startup wants to define the data model. they would then ____.

Answer

Correct Answer: Create the entity-relationship model

Note: This Question is unanswered, help us to find answer for this one

203. Space on the disk is marked as ____________________ if it has not yet been partitioned.

Answer

Correct Answer: Unallocated

Note: This Question is unanswered, help us to find answer for this one

204. Soon more companies may use ________ to help analyze the mountains of big data they're collecting.

Answer

Correct Answer: AaaS

Note: This Question is unanswered, help us to find answer for this one

205. Sonet rings typically have a failover time of ____ milliseconds.

Answer

Correct Answer: 50

Note: This Question is unanswered, help us to find answer for this one

206. Software that helps manage a checkbook or prepare taxes is called ________ software.

Answer

Correct Answer: Personal finance

Note: This Question is unanswered, help us to find answer for this one

207. One of the most obvious initial changes in windows vista was the ____ interface.

Answer

Correct Answer: Aero

Note: This Question is unanswered, help us to find answer for this one

208. One advantage of _____ printers is their ability to output realistic objects.

Answer

Correct Answer: 3D

Note: This Question is unanswered, help us to find answer for this one

209. Of the three components of access time in a movable-head dasd, ____ is the slowest.

Answer

Correct Answer: Seek time

Note: This Question is unanswered, help us to find answer for this one

210. Of the following normal forms, _____ is mostly of theoretical interest.

Answer

Correct Answer: DKNF

Note: This Question is unanswered, help us to find answer for this one

211. Object attributes are often called ____ to help distinguish them from other variables you might use

Answer

Correct Answer: Constructors

Note: This Question is unanswered, help us to find answer for this one

212. No data entry at all is known as a(n) ____.

Answer

Correct Answer: Null

Note: This Question is unanswered, help us to find answer for this one

213. Network administrators and it managers use network ____ to expose network vulnerabilities.

Answer

Correct Answer: Security audits

Note: This Question is unanswered, help us to find answer for this one

214. Nasa uses _________ to conduct complex modeling and simulations for upcoming missions.

Answer

Correct Answer: Supercomputers

Note: This Question is unanswered, help us to find answer for this one

215. Microsofts ____ technology uses internet explorer as the verification client.

Answer

Correct Answer: Flash

Note: This Question is unanswered, help us to find answer for this one

216. Microsoft's most powerful dbms is ________.

Answer

Correct Answer: SQL Server

Note: This Question is unanswered, help us to find answer for this one

217. Locating and repairing all syntax errors is part of the process of ____ a program.

Answer

Correct Answer: Debugging.

Note: This Question is unanswered, help us to find answer for this one

218. Linux updates are issued free to the public about every ____ months.

Answer

Correct Answer: Six

Note: This Question is unanswered, help us to find answer for this one

219. Linux terminal management conforms to ____ standards, and it also supports pseudo-terminals.

Answer

Correct Answer: POSIX

Note: This Question is unanswered, help us to find answer for this one

220. Linux provides ____ queues and semaphores to allow two processes to synchronize with each other.

Answer

Correct Answer: Wait

Note: This Question is unanswered, help us to find answer for this one

221. A(n) ____________________ is a filtering program that stops pop-up ads from displaying on webpages.

Answer

Correct Answer: Blocker

Note: This Question is unanswered, help us to find answer for this one

222. A(n) ____________________ contains a specific piece of information within a record.

Answer

Correct Answer: Field

Note: This Question is unanswered, help us to find answer for this one

223. A(n) _______________ includes one or more statements that can potentially raise an exception.

Answer

Correct Answer: Try block

Note: This Question is unanswered, help us to find answer for this one

224. A(n) ______________ allows several unrelated processes to use the pipe for communication.

Answer

Correct Answer: Anonymous pipe.

Note: This Question is unanswered, help us to find answer for this one

225. A(n) _________ is a connection point in a network.

Answer

Correct Answer: Node

Note: This Question is unanswered, help us to find answer for this one

226. A(n) ________ improves over time by learning from its interactions.

Answer

Correct Answer: Cognitive computing system.

Note: This Question is unanswered, help us to find answer for this one

227. A(n) _______ is a collection of related data organized in a way that facilitates data searches.

Answer

Correct Answer: Database

Note: This Question is unanswered, help us to find answer for this one

228. A(n) _______ broadcasts messages to all devices connected to a lan.

Answer

Correct Answer: Hub.

Note: This Question is unanswered, help us to find answer for this one

229. A(n) _____ is a set of rules for how data is handled as it travels along a communications channel.

Answer

Correct Answer: Protocol.

Note: This Question is unanswered, help us to find answer for this one

230. A(n) ____ method is a method that creates and initializes class objects.

Answer

Correct Answer: Arguments.

Note: This Question is unanswered, help us to find answer for this one

231. A(n) ____ is an ordered arrangement of keys and pointers.

Answer

Correct Answer: Index.

Note: This Question is unanswered, help us to find answer for this one

232. A(n) ____ is a system-generated primary key that is usually hidden from users.

Answer

Correct Answer: Weak entity

Note: This Question is unanswered, help us to find answer for this one

233. A(n) ____ consists of rows that contain consolidated and summarized data.

Answer

Correct Answer: Fact table

Note: This Question is unanswered, help us to find answer for this one

234. A typical ________ is made up of one or more network switches to which isps connect to each other.

Answer

Correct Answer: Internet exchange point (IXP

Note: This Question is unanswered, help us to find answer for this one

235. All of the following are ways to avoid injuries when working on computers except ________.

Answer

Correct Answer: Placing a monitor at least 12

Note: This Question is unanswered, help us to find answer for this one

236. A password _______________ policy forces users to select a new password periodically.

Answer

Correct Answer: Expiration

Note: This Question is unanswered, help us to find answer for this one

237. When drawing erds, a line that terminates is either a _________.

Answer

Correct Answer: Identifying or non-identifying relationship

Note: This Question is unanswered, help us to find answer for this one

238. Sip and h.323 regulate ____ for voip or video-over-ip clients and servers.

Answer

Correct Answer: Call Signaling and Control

Note: This Question is unanswered, help us to find answer for this one

239. Sequence diagrams include symbols that represent all of the following except ____.

Answer

Correct Answer: Indices

Note: This Question is unanswered, help us to find answer for this one

240. Global supply management companies assist businesses in finding the best _____ relationships.

Answer

Correct Answer: B2B

Note: This Question is unanswered, help us to find answer for this one

241. Gartner, inc. predicts that by 2015 saas revenue will grow to ____.

Answer

Correct Answer: $22.1 billion

Note: This Question is unanswered, help us to find answer for this one

242. Fourth-generation languages are commonly used to access ____.

Answer

Correct Answer: Databases

Note: This Question is unanswered, help us to find answer for this one

243. Filenames typically include a ____ at the end of the filename.

Answer

Correct Answer: File extension

Note: This Question is unanswered, help us to find answer for this one

244. Connecting your computers or devices to the ________ immediately exposes them to attack.

Answer

Correct Answer: Internet

Note: This Question is unanswered, help us to find answer for this one

245. Combining the various sources of outgoing data into a single output data stream is called ____.

Answer

Correct Answer: Multiplexing

Note: This Question is unanswered, help us to find answer for this one

246. A subtype is called a(n) ____ in idef1x terminology.

Answer

Correct Answer: Category

Note: This Question is unanswered, help us to find answer for this one

247. A software-based _________ is dedicated to examining and blocking internet traffic.

Answer

Correct Answer: Firewall

Note: This Question is unanswered, help us to find answer for this one

248. A relationship that is necessary for identification is called a(n) ____.

Answer

Correct Answer: Identifying relationship

Note: This Question is unanswered, help us to find answer for this one

249. A persons social security number would be an example of a(n) ____________________ attribute.

Answer

Correct Answer: Single-valued

Note: This Question is unanswered, help us to find answer for this one

250. A network's ____ is the arrangement of computers and mobile devices, printers, and other devices.

Answer

Correct Answer: Physical topology

Note: This Question is unanswered, help us to find answer for this one

251. A network that expands beyond a metropolitan area is a ____ area network.

Answer

Correct Answer: Wide

Note: This Question is unanswered, help us to find answer for this one

252. A network that covers a city or a suburb is called a ________.

Answer

Correct Answer: MAN

Note: This Question is unanswered, help us to find answer for this one

253. A negative consequence of the expanding use of the cloud will be ______.

Answer

Correct Answer: Fewer local jobs that focus on the installation and support of email and other servers

Note: This Question is unanswered, help us to find answer for this one

254. A multidimensional array in php is essentially ____.

Answer

Correct Answer: An array of arrays

Note: This Question is unanswered, help us to find answer for this one

255. ________ cable is not subject to electromagnetic interference or radio frequency interference.

Answer

Correct Answer: Fiber-optic

Note: This Question is unanswered, help us to find answer for this one

256. _______ is a javascript library intended to simplify client-side scripting:

Answer

Correct Answer: JQuery

Note: This Question is unanswered, help us to find answer for this one

257. _______ is a collaborative document web-based editing program stored in the cloud.

Answer

Correct Answer: Google Docs

Note: This Question is unanswered, help us to find answer for this one

258. _______ do not use streaming technology and are used to download media files to your computer.

Answer

Correct Answer: Podcasts

Note: This Question is unanswered, help us to find answer for this one

259. _______ agreements ensure that communications carriers exchange traffic on their networks freely.

Answer

Correct Answer: Peering

Note: This Question is unanswered, help us to find answer for this one

260. For windows 7, the ____________________ tracks problems with applications, hardware, and windows.

Answer

Correct Answer: Action center

Note: This Question is unanswered, help us to find answer for this one

261. A(n) _____ chart uses bars to compare separate (noncontinuous) items as they vary over time.

Answer

Correct Answer: Column

Note: This Question is unanswered, help us to find answer for this one

262. Function(argument1, argument2, ...) is ____.

Answer

Correct Answer: The general syntax of all functions

Note: This Question is unanswered, help us to find answer for this one

263. A well-defined, descriptive table will have ____ general characteristics.

Answer

Correct Answer: Three

Note: This Question is unanswered, help us to find answer for this one

264. A dual-layer, single-sided dvd can hold the equivalent of ____ cds.

Answer

Correct Answer: 13
19

Note: This question has more than 1 correct answers

Note: This Question is unanswered, help us to find answer for this one

265. The _____ pseudo-class represents the exact instant in which a link is activated.

Answer

Correct Answer: ​active

Note: This Question is unanswered, help us to find answer for this one

266. To set the color of a row, you use the ____ style.

Answer

Correct Answer: Background-color

Note: This Question is unanswered, help us to find answer for this one

267. To delete the item, right-click it and click ____ on the shortcut menu.

Answer

Correct Answer: Clear Content

Note: This Question is unanswered, help us to find answer for this one

268. To add the comment, welcome john smith, the syntax would be _____.

Answer

Correct Answer:

Note: This Question is unanswered, help us to find answer for this one

269. A(n) ______ test measures the performance of hardware or software.

Answer

Correct Answer: Benchmark

Note: This Question is unanswered, help us to find answer for this one

270. When technology is available, the next step in dr. cattolicos research will be _______.

Answer

Correct Answer: Technological diffusion

Note: This Question is unanswered, help us to find answer for this one

271. To deselect a single file in a list of selected files, you make use of the ____ key.

Answer

Correct Answer: Ctrl

Note: This Question is unanswered, help us to find answer for this one

272. The operating system and other tools are collectively known as ______ software.

Answer

Correct Answer: System

Note: This Question is unanswered, help us to find answer for this one

273. The ____ act implements regulations for unsolicited email messages

Answer

Correct Answer: CAN-SPAM

Note: This Question is unanswered, help us to find answer for this one

274. An appointment becomes a(n) ____ when people and other resources are invited.

Answer

Correct Answer: Meeting

Note: This Question is unanswered, help us to find answer for this one

275. ___________________ make use of baselines to identify changes in the behavior of the network.

Answer

Correct Answer: Anomaly-based intrusion detection systems

Note: This Question is unanswered, help us to find answer for this one

276. The ____ microprocessor affected the technological revolution of the 1970s.

Answer

Correct Answer: Intel

Note: This Question is unanswered, help us to find answer for this one

277. _______ storage devices do not lose data or programs after the electrical power is turned off.

Answer

Correct Answer: Secondary

Note: This Question is unanswered, help us to find answer for this one

278. There are default tab stops every one inch on the horizontal ruler. _________________________

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

279. A gray scale comprised only of black and white with no color is called a(an) ________ scale.

Answer

Correct Answer: Achromatic

Note: This Question is unanswered, help us to find answer for this one

280. (int)(math.random() * (65535 + 1)) returns a random number ________.

Answer

Correct Answer: Between 0 and 65535

Note: This Question is unanswered, help us to find answer for this one

281. ________ printers produce lab-quality prints of your photos.

Answer

Correct Answer: Dye-sublimation

Note: This Question is unanswered, help us to find answer for this one

282. Ftp is a _________ that is utilized to copy and manage files over the internet.

Answer

Correct Answer: Protocol

Note: This Question is unanswered, help us to find answer for this one

283. Characters created by computer-generated imagery are known as _____.

Answer

Correct Answer: Synthespians

Note: This Question is unanswered, help us to find answer for this one

284. With ____, processing tasks are shared by servers and workstations.

Answer

Correct Answer: Distributed processing

Note: This Question is unanswered, help us to find answer for this one

285. The amount of memory that should be allocated to the vm when it starts is called _________.

Answer

Correct Answer: Startup RAM

Note: This Question is unanswered, help us to find answer for this one

286. The acronym ____________ refers to software that manages data stored in a database.

Answer

Correct Answer: DBMS

Note: This Question is unanswered, help us to find answer for this one

287. The ability to use digital video and audio tools is a component of __________ literacy.

Answer

Correct Answer: Computer.

Note: This Question is unanswered, help us to find answer for this one

288. The abbreviation cpu for central processing unit is an example of a(n) _____.

Answer

Correct Answer: Initialism

Note: This Question is unanswered, help us to find answer for this one

289. The "3v's" used to characterize big data include volume, variety, and _______.

Answer

Correct Answer: Velocity

Note: This Question is unanswered, help us to find answer for this one

290. If the visible property of a control is set to false, it ________ in the designer window.

Answer

Correct Answer: Continues to be shown

Note: This Question is unanswered, help us to find answer for this one

291. Http is considered to be a(n) ___________ protocol.

Answer

Correct Answer: Stateless

Note: This Question is unanswered, help us to find answer for this one

292. Copyright and patent protection was established through _____.

Answer

Correct Answer: The U.S. Constitution

Note: This Question is unanswered, help us to find answer for this one

293. Constraints are always enforced at the ____ level.

Answer

Correct Answer: Table

Note: This Question is unanswered, help us to find answer for this one

294. Before the it security group can begin an eradication effort, it must _____.

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

295. Assume stringbuilder strbuf is "abcdefg", after invoking ________, strbuf contains "aefg".

Answer

Correct Answer: StrBuf.delete(1, 4)

Note: This Question is unanswered, help us to find answer for this one

296. Any element in outlook that contains information is called a(n) ____.

Answer

Correct Answer: Item

Note: This Question is unanswered, help us to find answer for this one

297. An item such as a smart card is an example of the ____ form of authentication.

Answer

Correct Answer: Something you have

Note: This Question is unanswered, help us to find answer for this one

298. An h-1b worker can work for a u.s. employer for a maximum continuous period of _____ years.

Answer

Correct Answer: Six

Note: This Question is unanswered, help us to find answer for this one

299. An email account is an electronic mailbox you receive from an ____.

Answer

Correct Answer: Email service provider

Note: This Question is unanswered, help us to find answer for this one

300. An abiotic effect that restricts tree growth at high elevations is __________.

Answer

Correct Answer: Ultraviolet radiation

Note: This Question is unanswered, help us to find answer for this one

301. Alternative country star lyle lovett says that he makes almost all of his income from ______.

Answer

Correct Answer: Performing and Touring

Note: This Question is unanswered, help us to find answer for this one

302. All ethernet networks, independent of their speed or frame type, use an access method called ____.

Answer

Correct Answer: CSMA/CD

Note: This Question is unanswered, help us to find answer for this one

303. Air gestures are used in ______.

Answer

Correct Answer: Motion input

Note: This Question is unanswered, help us to find answer for this one

304. A(n) paragraph border frames the contents of a single page. _________________________

Answer

Correct Answer: False

Note: This Question is unanswered, help us to find answer for this one

305. A(n) ____ path provides a precise location for a file.

Answer

Correct Answer: Absolute

Note: This Question is unanswered, help us to find answer for this one

306. A tool that database designers use to show the logical relationships among data is a(n) _____.

Answer

Correct Answer: All of the these

Note: This Question is unanswered, help us to find answer for this one

307. A result from a search engine search is called a(n) ______.

Answer

Correct Answer: Hit

Note: This Question is unanswered, help us to find answer for this one

308. A general rule for printing is to use _____ fonts for headlines and serif fonts for body text.

Answer

Correct Answer: Sans-serif

Note: This Question is unanswered, help us to find answer for this one

309. A _______ file is a type of vector graphics file created specifically for windows.

Answer

Correct Answer: .wmf

Note: This Question is unanswered, help us to find answer for this one

310. A _____ is an internal or external entity that could endanger an asset.

Answer

Correct Answer: Threat

Note: This Question is unanswered, help us to find answer for this one

311. A _____ is a series of events and activities with no slack time.

Answer

Correct Answer: ​critical path

Note: This Question is unanswered, help us to find answer for this one

312. A ____ http connection reuses the same http connection to send and receive multiple requests.

Answer

Correct Answer: Persistent

Note: This Question is unanswered, help us to find answer for this one

313. _____ is not one of the "3 vs" of big data.

Answer

Correct Answer: Validation

Note: This Question is unanswered, help us to find answer for this one

314. _____ is common in airplane and spacecraft control systems.

Answer

Correct Answer: Triple version programming

Note: This Question is unanswered, help us to find answer for this one

315. A(n) _______________ symptom is the most difficult symptom to diagnose.

Answer

Correct Answer: RAM

Note: This Question is unanswered, help us to find answer for this one

316. The minimum recommended cpu requirements for a windows 64-bit thick client are _______________.

Answer

Correct Answer: 1 gigahertz (GHz) processor.

Note: This Question is unanswered, help us to find answer for this one

317. The hewlett-packard system for controlling printers is _______________.

Answer

Correct Answer: PCL

Note: This Question is unanswered, help us to find answer for this one

318. The rate of ___________ has been fluctuating wildly this week.

Answer

Correct Answer: Money

Note: This Question is unanswered, help us to find answer for this one

319. With the help of _____ software, new housing developments can be easily planned and analyzed.

Answer

Correct Answer: Geographic information system

Note: This Question is unanswered, help us to find answer for this one

320. There are ____ common vulnerability assessment processes

Answer

Correct Answer: 5

Note: This Question is unanswered, help us to find answer for this one

321. The software that a companys it department makes, builds, and develops is called ____ software.

Answer

Correct Answer: In-house

Note: This Question is unanswered, help us to find answer for this one

322. The microwave used to heat your food and the cell phones you use are part of the ____.

Answer

Correct Answer: Electromagnetic spectrum

Note: This Question is unanswered, help us to find answer for this one

323. Many of todays cell phones come equipped with ____ text technology keyboards to enhance texting.

Answer

Correct Answer: Predictive

Note: This Question is unanswered, help us to find answer for this one

324. Wikis are designed for ________, allowing people to contribute more than just posting a response.

Answer

Correct Answer: Collaboration

Note: This Question is unanswered, help us to find answer for this one

325. When choosing a cellular phone service, you should consider the ____.

Answer

Correct Answer: Service plan

Note: This Question is unanswered, help us to find answer for this one

326. Voip is a type of ______ output.

Answer

Correct Answer: Audio

Note: This Question is unanswered, help us to find answer for this one

327. Today's broadband in households allows for connections of up to 15 ________________ per second.

Answer

Correct Answer: Million bits

Note: This Question is unanswered, help us to find answer for this one

328. To read a quick response (qr) code using a smartphone, one must have the _____ app.

Answer

Correct Answer: Scanner

Note: This Question is unanswered, help us to find answer for this one

329. The total information awareness tracking information system was created by ____.

Answer

Correct Answer: Us federal government

Note: This Question is unanswered, help us to find answer for this one

330. The recovery point objective (rpo) identifies the amount of _________ that is acceptable.

Answer

Correct Answer: Data loss

Note: This Question is unanswered, help us to find answer for this one

331. The process of managing the baseline settings of a system device is called ________.

Answer

Correct Answer: Configuration control

Note: This Question is unanswered, help us to find answer for this one

332. The objective of _____ is to gather data about project usability, costs, benefits, and schedules.

Answer

Correct Answer: Fact-finding

Note: This Question is unanswered, help us to find answer for this one

333. The number of mobile websites worldwide is expected to grow rapidly because of ______________.

Answer

Correct Answer: The development of new and useful applications.

Note: This Question is unanswered, help us to find answer for this one

334. The most common wireless technology for tv and dvd remote control devices is _______.

Answer

Correct Answer: Bluetooth

Note: This Question is unanswered, help us to find answer for this one

335. The language of telecommunications is governed by rules called ____

Answer

Correct Answer: Protocols.

Note: This Question is unanswered, help us to find answer for this one

336. The information security function can be placed within the __________.

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

337. The four ms of resources in information systems are _____.

Answer

Correct Answer: Manpower, machinery, materials, and money.

Note: This Question is unanswered, help us to find answer for this one

338. The __________ commercial site focuses on current security tool resources.

Answer

Correct Answer: Packet Storm

Note: This Question is unanswered, help us to find answer for this one

339. The _____ support of a global information system involves broad and long-term goals.

Answer

Correct Answer: Strategic

Note: This Question is unanswered, help us to find answer for this one

340. The ____ team is responsible for reestablishing connectivity between systems and to the internet.

Answer

Correct Answer: Network recovery

Note: This Question is unanswered, help us to find answer for this one

341. The ____ help desk position is normally staffed by an entry-level employee.

Answer

Correct Answer: Incident Screener

Note: This Question is unanswered, help us to find answer for this one

342. The ____ component of a dss manages and coordinates the other major components.

Answer

Correct Answer: DSS engine

Note: This Question is unanswered, help us to find answer for this one

343. Syndication feeds are one way of announcing the availability of a _____.

Answer

Correct Answer: Podcast

Note: This Question is unanswered, help us to find answer for this one

344. Subsystems for the marketing mis and their outputs help marketing managers and executives to _____.

Answer

Correct Answer: Reduce marketing expenses

Note: This Question is unanswered, help us to find answer for this one

345. Storage that is wiped clean when power is cut off from a device is known as _____.

Answer

Correct Answer: Volatile memory

Note: This Question is unanswered, help us to find answer for this one

346. Some netiquette rules to consider when using social media include all of the following except ____.

Answer

Correct Answer: Freely tag friends in your photos

Note: This Question is unanswered, help us to find answer for this one

347. Sending customers to a website for a referral fee is called the _____________ model.

Answer

Correct Answer: Affiliate revenue

Note: This Question is unanswered, help us to find answer for this one

348. Risk __________ is the practice of identifying, assessing, controlling, and mitigating risks.

Answer

Correct Answer: Management

Note: This Question is unanswered, help us to find answer for this one

349. Objective measures of the user support or help desk operation are called ____.

Answer

Correct Answer: Performance statistics

Note: This Question is unanswered, help us to find answer for this one

350. Most system requests include all of the following except _____.

Answer

Correct Answer: Project manager

Note: This Question is unanswered, help us to find answer for this one

351. Most risk identifications include a brief description of ____.

Answer

Correct Answer: Who would be responsible for responding to a given risk

Note: This Question is unanswered, help us to find answer for this one

352. Most organizations use a(n) ____ form to propose and document a maintenance change.

Answer

Correct Answer: Change request

Note: This Question is unanswered, help us to find answer for this one

353. Most organizations agree that __________ become their worst security problem.

Answer

Correct Answer: Managers.

Note: This Question is unanswered, help us to find answer for this one

354. Microwave transmission systems are used for ______ volume, ______ distance, ______ communications.

Answer

Correct Answer: High, long, line-of-sight

Note: This Question is unanswered, help us to find answer for this one

355. Many information security professionals enter the field from traditional ____ assignments.

Answer

Correct Answer: IT

Note: This Question is unanswered, help us to find answer for this one

356. Many companies implement _____ systems that integrate all customer-related events and transactions.

Answer

Correct Answer: CRM (Customer relationship management)

Note: This Question is unanswered, help us to find answer for this one

357. Lbe helpdesk, featured in this chapter, is an example of a(n) ____.

Answer

Correct Answer: A commercial help desk package

Note: This Question is unanswered, help us to find answer for this one

358. Knowledge management systems are called expert systems because they ____.

Answer

Correct Answer: Simulate human reasoning by combining a knowledge base and inference rules that determine how the knowledge is applied

Note: This Question is unanswered, help us to find answer for this one

359. A(n) ____________________ is an a potential risk to an information asset.

Answer

Correct Answer: Threat

Note: This Question is unanswered, help us to find answer for this one

360. A(n) _____ is a bank that does business with sellers that want to accept payment cards.

Answer

Correct Answer: Acquiring bank

Note: This Question is unanswered, help us to find answer for this one

361. A(n) ____ version is a system that is stable enough to be tested by end users.

Answer

Correct Answer: Beta.

Note: This Question is unanswered, help us to find answer for this one

362. A(n) ____ network includes transmission towers that connect to area handsets.

Answer

Correct Answer: Cellular

Note: This Question is unanswered, help us to find answer for this one

363. A(n) ____ is an unauthorized attempt to increase permission levels.

Answer

Correct Answer: Privilege escalation attack.

Note: This Question is unanswered, help us to find answer for this one

364. A wimax access point has a ____ range.

Answer

Correct Answer: 31-mile

Note: This Question is unanswered, help us to find answer for this one

365. A(n) ____________________ is a potential weakness in an asset or its defensive control(s).

Answer

Correct Answer: Vulnerability.

Note: This Question is unanswered, help us to find answer for this one

366. A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own.

Answer

Correct Answer: Worm

Note: This Question is unanswered, help us to find answer for this one

367. A(n) _____ requires a user to transport it from one computer to another.

Answer

Correct Answer: Virus

Note: This Question is unanswered, help us to find answer for this one

368. A(n) ____ version is a system version created for long-term release to users.

Answer

Correct Answer: Production

Note: This Question is unanswered, help us to find answer for this one

369. A(n) ____ version is a system that is incomplete but ready for some level of rigorous testing.

Answer

Correct Answer: Alpha

Note: This Question is unanswered, help us to find answer for this one

370. A(n) ____ is a named set of code that performs a given task.

Answer

Correct Answer: Procedure

Note: This Question is unanswered, help us to find answer for this one

371. The front _____________ connectors lead from the front of the computer case to the motherboard.

Answer

Correct Answer: Panel REF. PAGE: 55

Note: This Question is unanswered, help us to find answer for this one

372. An ins would most likely be found in a(n) _________________.

Answer

Correct Answer: Autonomous vehicle

Note: This Question is unanswered, help us to find answer for this one

373. An external hard disk _______.

Answer

Correct Answer: Usually connects to a USB or Thunderbolt port

Note: This Question is unanswered, help us to find answer for this one

374. A(n) ______ is the gradual changing of one object into another using computer animation software.

Answer

Correct Answer: Morph

Note: This Question is unanswered, help us to find answer for this one

375. From 1997 to 2010, internet use in __________ increased from 18% to 71.1%.

Answer

Correct Answer: Households

Note: This Question is unanswered, help us to find answer for this one

376. On a linux computer, ____ represents file systems exported to remote hosts.

Answer

Correct Answer: /etc/exports

Note: This Question is unanswered, help us to find answer for this one

377. Most code division multiple access (cdma) networks conform to is-95, created by the ____.

Answer

Correct Answer: Telecommunications Industry Association (TIA)

Note: This Question is unanswered, help us to find answer for this one

378. One bitcoin could be divided down to ____ decimal point

Answer

Correct Answer: 8

Note: This Question is unanswered, help us to find answer for this one

379. On mac oss, the ____ stores any file information not in the mdb or volume control block (vcb).

Answer

Correct Answer: Extents overflow file.

Note: This Question is unanswered, help us to find answer for this one

380. Mandiant ____ lists all open network sockets, including those hidden by rootkits.

Answer

Correct Answer: Memoryze

Note: This Question is unanswered, help us to find answer for this one

381. The sale of sensitive or confidential company information to a competitor is known as _______.

Answer

Correct Answer: Industrial espionage

Note: This Question is unanswered, help us to find answer for this one

382. Magnet ____ enables you to acquire the forensic image and process it in the same step.

Answer

Correct Answer: AXIOM

Note: This Question is unanswered, help us to find answer for this one

383. One minute of cdda music requires in excess of ____ of storage space.

Answer

Correct Answer: 10 MB

Note: This Question is unanswered, help us to find answer for this one

384. The ____ dialog box launcher allows you to navigate to a specific date.

Answer

Correct Answer: Go To Date

Note: This Question is unanswered, help us to find answer for this one

385. Most tracking software do not ____.

Answer

Correct Answer: Automatically send videos and photos of possible suspects to law enforcement

Note: This Question is unanswered, help us to find answer for this one

386. The default value for both kerning and tracking is _____ pixels.

Answer

Correct Answer: ​0

Note: This Question is unanswered, help us to find answer for this one

387. In m2m communication, such as with the internet of things trend, the m stands for ______.

Answer

Correct Answer: Machine

Note: This Question is unanswered, help us to find answer for this one

388. Personalization tokens and list segmentation are both examples of using _____ in email.

Answer

Correct Answer: Context

Note: This Question is unanswered, help us to find answer for this one

389. The basic input/output system is stored on a ________ chip.

Answer

Correct Answer: Task Manager

Note: This Question is unanswered, help us to find answer for this one

390. The bankers algorithm is an example of a(n) ____ policy.

Answer

Correct Answer: Avoidance

Note: This Question is unanswered, help us to find answer for this one

391. Relationships between tables can be illustrated through a(n) ____ relationship diagram.

Answer

Correct Answer: Entity

Note: This Question is unanswered, help us to find answer for this one

392. Query wizards and ____ automate the process of writing sql commands in a relational database.

Answer

Correct Answer: Query by example (QBE)

Note: This Question is unanswered, help us to find answer for this one

393. Public key encryption utilizes a pair of encryption keys obtained through ____ .

Answer

Correct Answer: A Certificate Authority.

Note: This Question is unanswered, help us to find answer for this one

394. Programming is a __________ process because, after each step it may be necessary to revise.

Answer

Correct Answer: Cyclical

Note: This Question is unanswered, help us to find answer for this one

395. Printers, monitors, tablets, cpus, and laptops are examples of ____________.

Answer

Correct Answer: Hardware

Note: This Question is unanswered, help us to find answer for this one

396. Printers typically understand either ____ or printer control language (pcl).

Answer

Correct Answer: Postscript

Note: This Question is unanswered, help us to find answer for this one

397. Printer manufacturers advertise the quality of their products by stating how many ___ they produce.

Answer

Correct Answer: DPI

Note: This Question is unanswered, help us to find answer for this one

398. In the tag, an alignment value of ____ places the caption below the table.

Answer

Correct Answer: Bottom

Note: This Question is unanswered, help us to find answer for this one

399. In the threat model stride, the s stands for ____ or pretending to be someone else.

Answer

Correct Answer: Spoofing

Note: This Question is unanswered, help us to find answer for this one

400. Intel's sandy bridge chipsets move the graphics and memory controller to the ________.

Answer

Correct Answer: Processor

Note: This Question is unanswered, help us to find answer for this one

401. In presenter view, the next slide in the presentation appears in the ____ corner of the screen.

Answer

Correct Answer: Upper-right

Note: This Question is unanswered, help us to find answer for this one

402. Playboy magazine stopped running photos of fully nude women in 2015 because ______.

Answer

Correct Answer: Explicit photos interfered with Playboy's ability to promote their brand

Note: This Question is unanswered, help us to find answer for this one

403. Peripherals such as the scanner pictured here are considered _____ devices.

Answer

Correct Answer: Input

Note: This Question is unanswered, help us to find answer for this one

404. The colspan attribute of the ____ tag sets a number of columns spanned by a cell.

Answer

Correct Answer: (both) (a) and (b)

Note: This Question is unanswered, help us to find answer for this one

405. A key feature of the apple lisa was its use of _______________.

Answer

Correct Answer: Graphical user interface

Note: This Question is unanswered, help us to find answer for this one

406. The table marked 3 in the accompanying figure has a rules value of ____.

Answer

Correct Answer: All

Note: This Question is unanswered, help us to find answer for this one

407. After the information-level design is completed, ____ is the next step.

Answer

Correct Answer: The physical-level design

Note: This Question is unanswered, help us to find answer for this one

408. A(n) _____ uses various symbols and shapes to represent data flow, processing, and storage.

Answer

Correct Answer: Data flow diagram

Note: This Question is unanswered, help us to find answer for this one

409. Dirt on pc keyboards can be cleaned with ____.

Answer

Correct Answer: Isopropyl alcohol

Note: This Question is unanswered, help us to find answer for this one

410. An apple ipad and a microsoft surface are examples of ________ computers.

Answer

Correct Answer: Tablet

Note: This Question is unanswered, help us to find answer for this one

411. A partially filled array is normally used with ________.

Answer

Correct Answer: An accompanying integer variable that holds the number of items that are actually stored in the array

Note: This Question is unanswered, help us to find answer for this one

412. A disk on which you can write multiple times sometimes is called a _____ disc.

Answer

Correct Answer: Multisession

Note: This Question is unanswered, help us to find answer for this one

413. An xml database supports the storage and management of _____ xml data.

Answer

Correct Answer: Semistructured

Note: This Question is unanswered, help us to find answer for this one

414. An object belongs to a group or category called a(n) ____.

Answer

Correct Answer: Class

Note: This Question is unanswered, help us to find answer for this one

415. A(n) ________ uses the internet to create the appearance of private, secure connections.

Answer

Correct Answer: VPN

Note: This Question is unanswered, help us to find answer for this one

416. A(n) ____ path begins at the root level and lists all subdirectories to the destination file.

Answer

Correct Answer: Absolute

Note: This Question is unanswered, help us to find answer for this one

417. A(n) ____ is a compiler embedded with a collection of supporting software.

Answer

Correct Answer: Integrated development environment (IDE)

Note: This Question is unanswered, help us to find answer for this one

418. A variable defined inside a method is referred to as ________.

Answer

Correct Answer: Local variables

Note: This Question is unanswered, help us to find answer for this one

419. A schema illustrates the ____ and ____ in a database and the relationships among them.

Answer

Correct Answer: Tables and fields

Note: This Question is unanswered, help us to find answer for this one

420. The uml symbol for a use case is a(n) ____ with a label that describes the action or event.

Answer

Correct Answer: OvalA.

Note: This Question is unanswered, help us to find answer for this one

421. Another name for a nonkey column is a ____.

Answer

Correct Answer: Nonkey attribute

Note: This Question is unanswered, help us to find answer for this one

422. Tensional stress is the dominant force at ___.

Answer

Correct Answer: The Basin and Range Province

Note: This Question is unanswered, help us to find answer for this one

423. Rhyolitic lavas ________.

Answer

Correct Answer: Do not flow as far from the vent as basaltic lavas do

Note: This Question is unanswered, help us to find answer for this one

424. Wind-blown sand deposits would most likely be __________ and __________.

Answer

Correct Answer: Very well-sorted; well-rounded

Note: This Question is unanswered, help us to find answer for this one

425. When oceanic lithosphere collides with another plate, the ________ in the process of subduction.

Answer

Correct Answer: All of these

Note: This Question is unanswered, help us to find answer for this one

426. Proofreading of newly-synthesized dna is important because __________.

Answer

Correct Answer: A high fidelity in the copying of DNA is necessary for good heredity

Note: This Question is unanswered, help us to find answer for this one

427. The rate of data arriving at your computer is ____.

Answer

Correct Answer: Downstream speed

Note: This Question is unanswered, help us to find answer for this one

428. The ________ causes the contents of another file to be inserted into a program.

Answer

Correct Answer: #include directive

Note: This Question is unanswered, help us to find answer for this one

429. Quickbooks is an example of ________ software.

Answer

Correct Answer: Accounting

Note: This Question is unanswered, help us to find answer for this one

430. Programmers create ____ and compilers turn it/them into ____.

Answer

Correct Answer: Source code, object code

Note: This Question is unanswered, help us to find answer for this one

431. On most modern wans, a ring topology relies on ____ rings to carry data.

Answer

Correct Answer: Redundant

Note: This Question is unanswered, help us to find answer for this one

432. In comparison with a flat file system, _____ in a database.

Answer

Correct Answer: Storage space is reduced

Note: This Question is unanswered, help us to find answer for this one

433. In a database, when data items disagree with one another, it leads to a(n) ________.

Answer

Correct Answer: Data integrity problem

Note: This Question is unanswered, help us to find answer for this one

434. A ________ check would be used to restrict the fines for speeding violations from $50 to $250.

Answer

Correct Answer: Range

Note: This Question is unanswered, help us to find answer for this one

435. The _________ sort usually performs fewer exchanges than the ________ sort.

Answer

Correct Answer: ANSI, ASCII

Note: This Question is unanswered, help us to find answer for this one

436. You must have a ________ for every variable you intend to use in a program.

Answer

Correct Answer: Definition

Note: This Question is unanswered, help us to find answer for this one

437. You can use the windows ________ to check on a nonresponsive program.

Answer

Correct Answer: Task Manager

Note: This Question is unanswered, help us to find answer for this one

438. You can place an insertion point by tapping or clicking in the field or by pressing ____.

Answer

Correct Answer: F2

Note: This Question is unanswered, help us to find answer for this one

439. Windows cleaners maintain the ____ for more effective system operation.

Answer

Correct Answer: Registry

Note: This Question is unanswered, help us to find answer for this one

440. While triggers run automatically, ________ do not and have to be called.

Answer

Correct Answer: Routines

Note: This Question is unanswered, help us to find answer for this one

441. When using the relational model to represent two tables, one must ________.

Answer

Correct Answer: Add a foreign key to one of the tables

Note: This Question is unanswered, help us to find answer for this one

442. When renaming columns, you include the new column names in ____ following the name of the view.

Answer

Correct Answer: Parentheses

Note: This Question is unanswered, help us to find answer for this one

443. When designing a database, you should ____.

Answer

Correct Answer: Make sure entities are in normal form before table structures are created

Note: This Question is unanswered, help us to find answer for this one

444. When choosing field names, it is best to choose names that ____.

Answer

Correct Answer: Describe the content or purpose of the field

Note: This Question is unanswered, help us to find answer for this one

445. Sonets extraordinary ____ results from its use of a double-ring topology over fiber-optic cable.

Answer

Correct Answer: Fault tolerance

Note: This Question is unanswered, help us to find answer for this one

446. The physical address assigned each network adapter is called its ________.

Answer

Correct Answer: Media access control (MAC)

Note: This Question is unanswered, help us to find answer for this one

447. Power users often work with ______ because of its flexibility and capabilities.

Answer

Correct Answer: UNIX

Note: This Question is unanswered, help us to find answer for this one

448. A table is in 4nf if it is in 3nf, and _____.

Answer

Correct Answer: It has no multivalued dependencies

Note: This Question is unanswered, help us to find answer for this one

449. The sonet network topology is a ____.

Answer

Correct Answer: Ring

Note: This Question is unanswered, help us to find answer for this one

450. In structured analysis, _____ are transformed into data structures and program code.

Answer

Correct Answer: ​keys

Note: This Question is unanswered, help us to find answer for this one

451. A ____ displays table information with a more formal, businesslike appearance.

Answer

Correct Answer: Report

Note: This Question is unanswered, help us to find answer for this one

452. When a procedure finishes execution, ________.

Answer

Correct Answer: Control returns to the point where the procedure was called and continues with the next statement

Note: This Question is unanswered, help us to find answer for this one

453. To insert a new field in a table, the ____ keyword should be used with the alter table command.

Answer

Correct Answer: ADD

Note: This Question is unanswered, help us to find answer for this one

454. Through the use of ____, one physical server can run several server operating systems.

Answer

Correct Answer: Virtual servers

Note: This Question is unanswered, help us to find answer for this one

455. The two most popular hard disk interfaces are ide and ____.

Answer

Correct Answer: SCSI

Note: This Question is unanswered, help us to find answer for this one

456. The most likely data type for a surrogate key is ____.

Answer

Correct Answer: Numeric

Note: This Question is unanswered, help us to find answer for this one

457. The major difficulty in designing a layered operating system approach is ____.

Answer

Correct Answer: Appropriately defining the various layers

Note: This Question is unanswered, help us to find answer for this one

458. The main reason for offshore outsourcing is to _____.

Answer

Correct Answer: ​lower bottom-line costs

Note: This Question is unanswered, help us to find answer for this one

459. The main directory maintained by your computers operating system is the ____ directory.

Answer

Correct Answer: Root.

Note: This Question is unanswered, help us to find answer for this one

460. The final step of the system development life cycle (sdlc) is ________.

Answer

Correct Answer: Maintenance and evaluation

Note: This Question is unanswered, help us to find answer for this one

461. The explosive growth in data expected through 2027 means that ________ is even more important.

Answer

Correct Answer: Business intelligence

Note: This Question is unanswered, help us to find answer for this one

462. The entity relationship diagram (erd) represents the _____ database as viewed by the end user.

Answer

Correct Answer: Conceptual

Note: This Question is unanswered, help us to find answer for this one

463. The data type that allows both sequential and random numbering is the ____ data type.

Answer

Correct Answer: AutoNumber

Note: This Question is unanswered, help us to find answer for this one

464. The basic form of an sql retrieval command is ____.

Answer

Correct Answer: SELECT-FROM-WHERE

Note: This Question is unanswered, help us to find answer for this one

465. The advantage of a wireless mesh network is that ____.

Answer

Correct Answer: Each new node automatically configures itself to work without the use of cables

Note: This Question is unanswered, help us to find answer for this one

466. The ____________ command displays the route packets take between two computers.

Answer

Correct Answer: Tracert

Note: This Question is unanswered, help us to find answer for this one

467. The ________ is the smallest unit of data the computer can store in a database.

Answer

Correct Answer: Bit

Note: This Question is unanswered, help us to find answer for this one

468. The ____ utility manages a firewall and packet filtering.

Answer

Correct Answer: Iptables

Note: This Question is unanswered, help us to find answer for this one

469. The ____ utility gathers statistics and information about ip communications on a computer.

Answer

Correct Answer: Netstat

Note: This Question is unanswered, help us to find answer for this one

470. The ____ layer is the bridge between logical and physical views of secondary storage.

Answer

Correct Answer: File control

Note: This Question is unanswered, help us to find answer for this one

471. The ____ command will create an application program's or individual user's picture of the database.

Answer

Correct Answer: CREATE VIEW

Note: This Question is unanswered, help us to find answer for this one

472. Switches can create ____ by grouping a number of ports into a broadcast domain.

Answer

Correct Answer: VLANs

Note: This Question is unanswered, help us to find answer for this one

473. Regarding enumerations, the ____ method returns the name of the calling constant object.

Answer

Correct Answer: ToString

Note: This Question is unanswered, help us to find answer for this one

474. Records in the mft are called ____.

Answer

Correct Answer: Metadata

Note: This Question is unanswered, help us to find answer for this one

475. Organizations can dynamically reuse servers that use web services internally by ________.

Answer

Correct Answer: Creating a private cloud

Note: This Question is unanswered, help us to find answer for this one

476. On a client/server system, most of the powerful processing is handled by the ________.

Answer

Correct Answer: Server

Note: This Question is unanswered, help us to find answer for this one

477. Most wireless networks transport data as ____ signals.

Answer

Correct Answer: RF (radio frequency)

Note: This Question is unanswered, help us to find answer for this one

478. Managing your calendar and emails can be easily accomplished through ____ software.

Answer

Correct Answer: Personal information management

Note: This Question is unanswered, help us to find answer for this one

479. In the sliding windows mechanism for flow control, the ____ before waiting for an acknowledgment

Answer

Correct Answer: Sender sends as much data as specified by the receiver in the window size field

Note: This Question is unanswered, help us to find answer for this one

480. In north america, a t1 circuit has ______ 64kbps channels.

Answer

Correct Answer: 24

Note: This Question is unanswered, help us to find answer for this one

481. In indexed storage, when a file is created, the pointers in the index block are all set to ____.

Answer

Correct Answer: Null

Note: This Question is unanswered, help us to find answer for this one

482. In an entity-relationship (e-r) diagram, ____ are used to represent an entity.

Answer

Correct Answer: Rectangles

Note: This Question is unanswered, help us to find answer for this one

483. In a data model, a(n) ________ is something that a user wants to track.

Answer

Correct Answer: Entity

Note: This Question is unanswered, help us to find answer for this one

484. In a client/server system, the database resides on a computer called the ____.

Answer

Correct Answer: Server

Note: This Question is unanswered, help us to find answer for this one

485. If falcon security chooses to use a sql dbms such as access, it will be able to __________.

Answer

Correct Answer: Store only the metadata about each video in the database

Note: This Question is unanswered, help us to find answer for this one

486. Horizontal scaling of client/server architecture means _____.

Answer

Correct Answer: Adding more workstations

Note: This Question is unanswered, help us to find answer for this one

487. Formatting date/time fields changes only the way data is displayed, not the field ____.

Answer

Correct Answer: Values

Note: This Question is unanswered, help us to find answer for this one

488. Every normalized table has ________.

Answer

Correct Answer: A single theme

Note: This Question is unanswered, help us to find answer for this one

489. Each class on an class diagram is represented by a(n) ____ in a relational database.

Answer

Correct Answer: Table

Note: This Question is unanswered, help us to find answer for this one

490. Dns operates at the _________________ layer of the osi model.

Answer

Correct Answer: Application

Note: This Question is unanswered, help us to find answer for this one

491. Design view is used to ____ a table.

Answer

Correct Answer: Create or modify the structure of

Note: This Question is unanswered, help us to find answer for this one

492. Date attributes contain calendar dates stored in a special format known as the _____ date format.

Answer

Correct Answer: Julian

Note: This Question is unanswered, help us to find answer for this one

493. Data warehouse contains historical data obtained from the _____.

Answer

Correct Answer: Operational databases

Note: This Question is unanswered, help us to find answer for this one

494. Data may be sorted in a table datasheet, a form, and a ____.

Answer

Correct Answer: Query datasheet

Note: This Question is unanswered, help us to find answer for this one

495. Data in a multidimensional database is organized in a ________ format.

Answer

Correct Answer: Cube

Note: This Question is unanswered, help us to find answer for this one

496. Cellular services use _______ to provide wireless connectivity to the internet.

Answer

Correct Answer: 3G and 4G cellular networks

Note: This Question is unanswered, help us to find answer for this one

497. Bits are grouped into 8-bit chunks called ________.

Answer

Correct Answer: Bytes

Note: This Question is unanswered, help us to find answer for this one

498. Apple understood the importance of usability when it designed its ________.

Answer

Correct Answer: Fault tolerance system iPod and iTunes system

Note: This Question is unanswered, help us to find answer for this one

499. An organization that hires cloud services ________.

Answer

Correct Answer: Can limit the response time of its Web pages

Note: This Question is unanswered, help us to find answer for this one

500. An extension of .wav designates a ____ type of file.

Answer

Correct Answer: Sound

Note: This Question is unanswered, help us to find answer for this one

501. An arraylists ____ is the number of items it can hold without having to increase its size.

Answer

Correct Answer: Capacity

Note: This Question is unanswered, help us to find answer for this one

502. An advantage of ____ software is its ability to run more than one operating system on a computer.

Answer

Correct Answer: Virtual machine (VM)

Note: This Question is unanswered, help us to find answer for this one

503. A(n) _____ is often used, so remote users have a secure connection to an organizations network.

Answer

Correct Answer: Virtual private network

Note: This Question is unanswered, help us to find answer for this one

504. A tcp three-way handshake is used to establish a ___________ messaging method.

Answer

Correct Answer: Connection-oriented

Note: This Question is unanswered, help us to find answer for this one

505. A table ___________________ can be used when you want to assign a temporary name to a table.

Answer

Correct Answer: Alias

Note: This Question is unanswered, help us to find answer for this one

506. A protocol known as ____ is designed to automatically distribute ip addresses.

Answer

Correct Answer: Dhcp

Note: This Question is unanswered, help us to find answer for this one

507. A database maintains information on ___________.

Answer

Correct Answer: Inventory, Transactions, Employees

Note: This Question is unanswered, help us to find answer for this one

508. A chart created with the access chart wizard is ____ in access.

Answer

Correct Answer: Embedded

Note: This Question is unanswered, help us to find answer for this one

509. A ____ is a network device that extends a wired network by adding additional ports.

Answer

Correct Answer: Hub

Note: This Question is unanswered, help us to find answer for this one

510. __________ are high speed central networks to which multiple smaller networks connect

Answer

Correct Answer: Corporate Backbone Networks

Note: This Question is unanswered, help us to find answer for this one

511. _________ converts an audio broadcast to a digital music player.

Answer

Correct Answer: Podcasting

Note: This Question is unanswered, help us to find answer for this one

512. _____ technology is a broadband technology that can use the wires of a local telephone network.

Answer

Correct Answer: Digital Subscriber Line (DSL)

Note: This Question is unanswered, help us to find answer for this one

513. _____ serve as the intermediary between the user and the database.

Answer

Correct Answer: DBMSs

Note: This Question is unanswered, help us to find answer for this one

514. _____ is a high-speed carrier service that uses ordinary phone lines to send and receive data.

Answer

Correct Answer: Digital subscriber line

Note: This Question is unanswered, help us to find answer for this one

515. _____ is a commonly used encryption protocol that manages transmission security on the internet.

Answer

Correct Answer: Secure Sockets Layer

Note: This Question is unanswered, help us to find answer for this one

516. ____ data are the result of formatting to facilitate storage, use and generation of information.

Answer

Correct Answer: Structured

Note: This Question is unanswered, help us to find answer for this one

517. ____ combines all rows from two tables, excluding duplicate rows.

Answer

Correct Answer: Union

Note: This Question is unanswered, help us to find answer for this one

518. If a one-dimensional array contains five elements, its highest subscript is ____.

Answer

Correct Answer: 4

Note: This Question is unanswered, help us to find answer for this one

519. Changing the order of fields in a database table is an example of changing a tables ____.

Answer

Correct Answer: Structure

Note: This Question is unanswered, help us to find answer for this one

520. A 1 kg balloon at equilibrium in the air is buoyed up with a force of __________.

Answer

Correct Answer: 10 newtons

Note: This Question is unanswered, help us to find answer for this one

521. The ________ operator performs string concatenation.

Answer

Correct Answer: Ampersand (&)

Note: This Question is unanswered, help us to find answer for this one

522. You can quickly find any file, folder, or program using ____.

Answer

Correct Answer: Windows Search

Note: This Question is unanswered, help us to find answer for this one

523. A(n) _____ is a temporary storage space used to speed computing tasks.

Answer

Correct Answer: Cache

Note: This Question is unanswered, help us to find answer for this one

524. A(n) _________ resolves top-level domains such as .com, .org, and .edu.

Answer

Correct Answer: Root DNS

Note: This Question is unanswered, help us to find answer for this one

525. The optical _________ is the most common pointing device for desktop computers.

Answer

Correct Answer: Mouse

Note: This Question is unanswered, help us to find answer for this one

526. You can radically change how a smartart graphic looks by applying a smartart ____.

Answer

Correct Answer: Style

Note: This Question is unanswered, help us to find answer for this one

527. You can insert pictures via either the pictures button or the _______ button.

Answer

Correct Answer: Online Pictures

Note: This Question is unanswered, help us to find answer for this one

528. You can insert ____ different kinds of pictures into powerpoint.

Answer

Correct Answer: 14

Note: This Question is unanswered, help us to find answer for this one

529. You can assign the value of one struct variable to another struct variable of ____ type.

Answer

Correct Answer: The same

Note: This Question is unanswered, help us to find answer for this one

530. You can add a text box using the chart tools ____ tab.

Answer

Correct Answer: Format

Note: This Question is unanswered, help us to find answer for this one

531. You can ____ the chart title text to select it.

Answer

Correct Answer: Triple-click

Note: This Question is unanswered, help us to find answer for this one

532. Wordart is considered a(n) _______ that can be manipulated independently of the text.

Answer

Correct Answer: Object

Note: This Question is unanswered, help us to find answer for this one

533. When working with a table, press ____ to move to the next line within the same cell.

Answer

Correct Answer: Enter

Note: This Question is unanswered, help us to find answer for this one

534. When combination charts have data series with vastly different values, you can create ____ charts.

Answer

Correct Answer: Dual axis

Note: This Question is unanswered, help us to find answer for this one

535. Preceding a condition by the ____ operator reverses the truth of the original condition.

Answer

Correct Answer: NOT

Note: This Question is unanswered, help us to find answer for this one

536. An example of software most commonly associated with productivity software is ____.

Answer

Correct Answer: Word processing software

Note: This Question is unanswered, help us to find answer for this one

537. ________ occurs when a hacker looks through your trash to find personal information.

Answer

Correct Answer: Trash retrieval

Note: This Question is unanswered, help us to find answer for this one

538. The first step in testing a patch is ____.

Answer

Correct Answer: Verify whether or not the system restarts after the patch is installed

Note: This Question is unanswered, help us to find answer for this one

539. A(n) ____ is a temporary view of the data that is removed when you close the datasheet.

Answer

Correct Answer: Filter

Note: This Question is unanswered, help us to find answer for this one

540. Which of the following operators cannot be overloaded in C++ language?

Answer

Correct Answer: ::

Note: This Question is unanswered, help us to find answer for this one

541. Which of the following are false about the web.config configuration f‌ile?

Answer

Correct Answer: It can be used for session settings in applications.

Note: This Question is unanswered, help us to find answer for this one

542.

Consider a software that calculates cube-roots of integer values that are in the range of O to 3,000. If the black-box testing technique is used, then for boundary-value analysis, which of the following values  must be there in the test cases?


Answer

Correct Answer:

6.000


Note: This Question is unanswered, help us to find answer for this one

543.

Which of the given Enterprise JavaBeans (EJB) transaction attributes ensures that all transactions are always demarcated by the container?


Answer

Correct Answer:

TX_REQUIRES_NEW  


Note: This Question is unanswered, help us to find answer for this one

544.

Suppose that Pk, OK and Rk denote the coefficients of yk in the expansions of (1 + y)1°, (1 + y)20 and (1 + y)3°. Then the expression given in the image will be equal to which of the following options?

Answer

Correct Answer:

R10 - Q10


Note: This Question is unanswered, help us to find answer for this one

545.

If the relations R1(A, B) and R2(C, D) are union compatible relations, then what would be the result of the following relation?

R1 A = C A B = D R2

Answer

Correct Answer:

R1 n R2


Note: This Question is unanswered, help us to find answer for this one

546.

What would be the root, correct to three decimal places, of the given equation by the Newton-Raphson method?

sin x =1 - x     

Answer

Correct Answer:

0.511


Note: This Question is unanswered, help us to find answer for this one

547.

What would be the maximum value of 'k', if a terminal multiplexer has six 1,200 bits per second (bps) terminals and 'k' number of terminals with 300 bps are connected to it.
Note:lt is given that the outgoing line is 9,600 bps.

Answer

Correct Answer:



Note: This Question is unanswered, help us to find answer for this one

548.

In a class of 100 students 39 students play basketball; 58 play volleyball; 32 play hockey; 10 play volley ball and hockey; 11 play hockey and basketball; and 13 play basketball and volleyball. Find the number of students who plays all the games?


Answer

Correct Answer:



Note: This Question is unanswered, help us to find answer for this one

549.

Consider 3 Winchester magnetic disc with density 30 x106 bits per square inch of surface. The inner and outer diameters of the recording area are two and six inches, respectively. The radial track spacing

density is 1.500 tracks/inches. If the rotational speed is 3.200 RPM. then what is the approximate value of the data transfer rate?


Answer

Correct Answer:

0.84 Mbytes/sec


Note: This Question is unanswered, help us to find answer for this one

550. Which of the following is a 16-bit microprocessor?

Answer

Correct Answer: Intel 8086

Note: This Question is unanswered, help us to find answer for this one

551.

For the following page reference string, which of the given options is the correct number of page faults in the optimal page replacement algorithm with f‌ive frames?

Page referencestring:(1,2,3,4.2,1,5.6,2,1,2,3,7,6,3.2,1,2,3,6)


Answer

Correct Answer:



Note: This Question is unanswered, help us to find answer for this one

552. What is the use of the friend function in C++?

Answer

Correct Answer: It is used to access the private and protected members of the class.

Note: This Question is unanswered, help us to find answer for this one

553.

Which of the given options is the correct time complexity to build the heap of input array in the following algorithm?

CREATE-HEAP(B)

size := size(B);

forj := floor(size/2) d0wnto1

do HEAP(B, j);

and for

END


Answer

Correct Answer:

o(n)


Note: This Question is unanswered, help us to find answer for this one

554. Which of the following models should be preferred for creating a small project/projects whose requirements are very well-known?

Answer

Correct Answer: Waterfall Model

Note: This Question is unanswered, help us to find answer for this one

555.

Which of the options would be the correct inf‌ix expression of the given prefix expression?

+-‘$ABCD//EF+GH


Answer

Correct Answer:

 [(A$B)‘C-D]+[(E/F)/(G+H)] 


Note: This Question is unanswered, help us to find answer for this one

556.

Which of the following statements is/are true about triggers and routines?

1. Both run automatically

2. Both are stored in the database

3. Both consist of procedural code


Answer

Correct Answer:

3 only


Note: This Question is unanswered, help us to find answer for this one

557. Which of the following statements is true?

Answer

Correct Answer: The sum of degrees of all the nodes in any un-directed graph is twice the number of edges.

Note: This Question is unanswered, help us to find answer for this one

558.

Which of the following satisf‌ies the given recurrence relation?

T(k)=mT(k/2)+ak2


Answer

Correct Answer:

T(k)=O(k log m)


Note: This Question is unanswered, help us to find answer for this one

559.


Fill in the blank:

Image number is the image of 'Mac OS X' structure.

Answer

Correct Answer:



Note: This Question is unanswered, help us to find answer for this one

560.

Assume that your magnetic-tape drive has a transport speed of 200 inches per second and a recording density of 1,600 bytes per inch. How long would it take to write 6.00.000 bytes of data grouped in 100

characters record with a blocking factor of 10?


Answer

Correct Answer:

2.0625 sec 


Note: This Question is unanswered, help us to find answer for this one

561.

Which of the following frame-tagging methods can be used for creating a trunk-link between Cisco and non-Cisco switches?


Answer

Correct Answer:

IEEE 802.10 


Note: This Question is unanswered, help us to find answer for this one

562.

The given image shows two cases of processes that follow the

Answer

Correct Answer:

14.6 milliseconds


Note: This Question is unanswered, help us to find answer for this one

563.

A function is given as:

f(A.B.C.D) = Z(0.1.3.4.8.9.15)

A is the Most Significant Bit and D is the Least Signif‌icant Bit. By using the above minterms of the given

function in the table (given in Figure-1), implement it with a multiplexer and choose the correct implementation from Figure-2 (given in the image).



Answer

Correct Answer:



Note: This Question is unanswered, help us to find answer for this one

564.

Choose the correct algorithm from the following options that solves the problem of all pairs shortest paths.


Answer

Correct Answer:

 Floyd-Warshall algorithm


Note: This Question is unanswered, help us to find answer for this one

565.

Which of the given options will be generated by the following grammar?

A={{ Q }.{ 0-1 } P,Q}

where P=(Q->O 0,0->OQ1,0->1O O, O-> empty}]


Answer

Correct Answer:

Context free language 


Note: This Question is unanswered, help us to find answer for this one

566. Which of the given methods is used for sending data over a "serial communication link"?

Answer

Correct Answer: Full duplex

Note: This Question is unanswered, help us to find answer for this one

567.

What would be the output of the circuit that is shown in the image, if all the inputs given to the circuit are zeros?

Answer

Correct Answer:



Note: This Question is unanswered, help us to find answer for this one

568.

Two regular languages are given as:

L1 = (a+b)'a

L2 = b(a+b)‘b

Which of the following options is an intersection of the above given languages?

Answer

Correct Answer:

b (a + b )’ a


Note: This Question is unanswered, help us to find answer for this one

569. Which of the following is a regular expression for a regular grammar S -> aS/a?

Answer

Correct Answer: Both 1 and 2

Note: This Question is unanswered, help us to find answer for this one

570.

Which of the following statements is/are true about Shadows in ASP.net 4.0?

1. It is always used with inheritance.

2. It is a combination of overloading and overriding.

3. We can change signatures of functions.


Answer

Correct Answer:

1. 2. and 3 


Note: This Question is unanswered, help us to find answer for this one

571.

Simplify the given Boolean function using the K—map and select the correct answer from the options.

F(a,b,c,d)=2(0,1,2,4,5,6,8,9,12,13,14)


Answer

Correct Answer:

c' + a'd' + bd'


Note: This Question is unanswered, help us to find answer for this one

572.

Suppose you are working on a highly complex project, which involves several kinds of risks. Which software-life-cycle model you should use in such a situation so that the best product can be obtained?

Answer

Correct Answer:

Spiral Model 


Note: This Question is unanswered, help us to find answer for this one

573.

Consider the example of four processes given in the image, with their arrival time (in milliseconds) in the ready queue for execution. and their CPU burst time. Find the difference of average waiting time between preemptive and non-preemptive SJF scheduling.

Answer

Correct Answer:

2.25 milliseconds


Note: This Question is unanswered, help us to find answer for this one

574. If a relational schema is in the Boyce-Codd Normal Form (BCNF). then it is also in the .

Answer

Correct Answer: 3rd normal form

Note: This Question is unanswered, help us to find answer for this one

575.

Consider the table given in the image and f‌ind the value of "f(9)" by using Lagrange

Answer

Correct Answer:

180 


Note: This Question is unanswered, help us to find answer for this one

576.

Analyze the following information and identify the correct scheme.

It is a scheme in which the thread library schedules user-level threads to run on an available light-weight process (LWP).


Answer

Correct Answer:

Process-contention scope (PCS)


Note: This Question is unanswered, help us to find answer for this one

577.

Which of the following COMPOSITE DATABOUND controls was not available in ASP.net 3.5, but is available in ASP.net 4.0?


Answer

Correct Answer:

Chart control


Note: This Question is unanswered, help us to find answer for this one

578.

Consider the schema. R = (ABCD) and the dependencies A -> B. B -> C. C -> D. and D -> A. Let R = (R1 and R2) be a decomposition, such that R1 (1 R2 = (D. The decomposition is in .


Answer

Correct Answer:

both 2 NF and 3 NF 


Note: This Question is unanswered, help us to find answer for this one

579. If the three regular expressions: p=1(1+0)‘, q=11‘0, r=1'0 are given, then which of the following options is true?

Answer

Correct Answer:

L (q)<=Llp)andL(ql<=l-(r)


Note: This Question is unanswered, help us to find answer for this one

580.

What would be the rank of the matrix that is given in the image?

Answer

Correct Answer:



Note: This Question is unanswered, help us to find answer for this one

581. What would be the probability of getting 8 as the sum if three dices are rolled simultaneously?

Answer

Correct Answer: 21/216

Note: This Question is unanswered, help us to find answer for this one

582.

The signal to noise ratio for a voice trade line is 30.1 db, or a power ratio of 1023:1. What would be the maximum achievable data rate on this line whose spectrum ranges from 300-4300 Hz?


Answer

Correct Answer:

31,000 bits/sec 


Note: This Question is unanswered, help us to find answer for this one

583.

The use of 'V.42' compression with a 'V.32' bits per second (bps) modem operating at 14,440 bps can result in a maximum throughput of bps.

Answer

Correct Answer:

57,600 


Note: This Question is unanswered, help us to find answer for this one

584.

Consider a 9-bit digital-to-analog converter that uses a ladder network. What would be the approximate resolution, in volts, if the full-scale output voltage of this converter is +5v?


Answer

Correct Answer:

10 mV approximate 


Note: This Question is unanswered, help us to find answer for this one

585.

Which of the following options implements the divide-and-conquer algorithm.

1. Insertion sort

2. Bubble sort

3. Quick sort


Answer

Correct Answer:

3 only


Note: This Question is unanswered, help us to find answer for this one

586. Which of the following languages is generated byK=[[S],[a,b),[S-> aSlelalb],S]?

Answer

Correct Answer: [a b }+

Note: This Question is unanswered, help us to find answer for this one

587.

What number of swapping is required to sort the given series in ascending order, if the bubble sort is used for sorting?


8,22.6,9,31,19,5,13


Answer

Correct Answer:

14 


Note: This Question is unanswered, help us to find answer for this one

588.

What would be the output string, if the bitstring "0111101111101111110" is subjected to bit-stuff‌ing for the flag string "01 1111 1 0"?


Answer

Correct Answer:

011110111110011111010


Note: This Question is unanswered, help us to find answer for this one