A ____ is an optical code that represents data with bars of varying widths or heights.
Note: This Question is unanswered, help us to find answer for this one
###### in a cell means that the ____.
Answer
Correct Answer:
Column is too narrow to display the
Note: This Question is unanswered, help us to find answer for this one
In the formula =int(average(a1:a100)), which would occur first? ____
Answer
Correct Answer:
The average of the values in the range A1:A100 is added to the integer.
Note: This Question is unanswered, help us to find answer for this one
Local variables must be ________.
Answer
Correct Answer:
Initialized when they're declared
Note: This Question is unanswered, help us to find answer for this one
After experiencing a loss, it's important to take care of yourself by __________.
Answer
Correct Answer:
Focusing on life before the loss
Note: This Question is unanswered, help us to find answer for this one
In the acronym ada, the d stands for ______.
Answer
Correct Answer:
Disabilities
Note: This Question is unanswered, help us to find answer for this one
Printer ____ is measured by ppm
Note: This Question is unanswered, help us to find answer for this one
One of the primary causes of eyestrain is ____.
Answer
Correct Answer:
A display screen that reflects light
Note: This Question is unanswered, help us to find answer for this one
Each time you click the increase indent button, the paragraph is indented ____ inch.
Note: This Question is unanswered, help us to find answer for this one
Another name for needs analysis is ____.
Answer
Correct Answer:
Needs assessment.
Note: This Question is unanswered, help us to find answer for this one
Adding a ____ to text adds depth and helps the letters display prominently.
Note: This Question is unanswered, help us to find answer for this one
A(n) _______ password is difficult to hack.
Note: This Question is unanswered, help us to find answer for this one
A(n) _____ is essentially a flash-based replacement for an internal hard drive.
Note: This Question is unanswered, help us to find answer for this one
A computer lab is an example of a(n) ________ type of network.
Note: This Question is unanswered, help us to find answer for this one
A byte is formed by a group of _____.
Note: This Question is unanswered, help us to find answer for this one
A backup utility can write copies of important data files and folders on ____.
Answer
Correct Answer:
Any of these
Note: This Question is unanswered, help us to find answer for this one
A ________ is a personal journal posted on the web
Note: This Question is unanswered, help us to find answer for this one
A _____ is the software that acts as an intermediary between two systems.
Answer
Correct Answer:
Proxy server
Note: This Question is unanswered, help us to find answer for this one
__________ software may be freely copied, distributed, and even resold.
Answer
Correct Answer:
Public domain
Note: This Question is unanswered, help us to find answer for this one
Most of today's processors are housed in a ____ chip package.
Note: This Question is unanswered, help us to find answer for this one
A(n) _____ is the equivalent to a subsystem.
Answer
Correct Answer:
Partition
Note: This Question is unanswered, help us to find answer for this one
When you connect to a wi-fi hotspot, your digital device is classified as a(n) _______________.
Note: This Question is unanswered, help us to find answer for this one
In most cases, a file deleted from a usb drive ____.
Answer
Correct Answer:
Goes to the Recycle Bin
Note: This Question is unanswered, help us to find answer for this one
Windows can create partitions using the _______________ disk.
Note: This Question is unanswered, help us to find answer for this one
A(n) _____ represents a single dot on an output device.
Note: This Question is unanswered, help us to find answer for this one
All of the following are tips for professional e-mail etiquette except ________.
Answer
Correct Answer:
Use abbreviations such as "u," "r," and "BRB" to keep the e-mail message shorter
Note: This Question is unanswered, help us to find answer for this one
All of the following are terms related to part of the boot process except ________.
Note: This Question is unanswered, help us to find answer for this one
A(n) ____________________ device is a computing device small enough to hold in your hand.
Note: This Question is unanswered, help us to find answer for this one
A(n) ________ is used as an index to pinpoint a specific element within an array.
Answer
Correct Answer:
Subscript
Note: This Question is unanswered, help us to find answer for this one
A(n) ________ converts your voice's sound waves into digital signals.
Answer
Correct Answer:
Analog-to-digital converter chip
Note: This Question is unanswered, help us to find answer for this one
A(n) ____ statement is a statement that returns a value to the statement that called the function.
Note: This Question is unanswered, help us to find answer for this one
A(n) ____ is an element's numeric position within an array.
Note: This Question is unanswered, help us to find answer for this one
A virus __________ usually arrives as an email message that contains warnings about a fake virus.
Note: This Question is unanswered, help us to find answer for this one
A variable's unknown value is commonly called ____.
Note: This Question is unanswered, help us to find answer for this one
A unique number called a(n) ____ identifies each item in a collection.
Note: This Question is unanswered, help us to find answer for this one
A social security number which appears in the format 123-456-7891 is an example of a(n) ____.
Answer
Correct Answer:
Predefined input mask
Note: This Question is unanswered, help us to find answer for this one
There are four basic categories of software: commercial software, shareware, freeware, and ____.
Answer
Correct Answer:
Public domain software
Note: This Question is unanswered, help us to find answer for this one
A hard drive that uses fde is often referred to as a(n) ____.
Answer
Correct Answer:
Self-encrypting hard drive.
Note: This Question is unanswered, help us to find answer for this one
You can select multiple paragraphs by using the ____ key repeatedly.
Answer
Correct Answer:
CTRL+ END
Note: This Question is unanswered, help us to find answer for this one
Windows 10 stores compressed files in a special type of folder called a(n) ____.
Note: This Question is unanswered, help us to find answer for this one
All of the following are guidelines about the appearance of letterhead elements except ____.
Answer
Correct Answer:
Make the font size of your name the same size as the rest of the text in the letterhead
Note: This Question is unanswered, help us to find answer for this one
A(n) ____ is a software package that provides an editor, a compiler, and other programming tools.
Note: This Question is unanswered, help us to find answer for this one
A reading level that is appropriate for most technical documentation is ____.
Answer
Correct Answer:
10th grade
Note: This Question is unanswered, help us to find answer for this one
You represent a decision in a flowchart by drawing a decision symbol, which is shaped like a ____.
Note: This Question is unanswered, help us to find answer for this one
To speed up magnetic hard drive performance, ____ is often used.
Answer
Correct Answer:
Disk caching
Note: This Question is unanswered, help us to find answer for this one
To redirect the list of the files in a directory to a file called homedir.list, you enter ____.
Answer
Correct Answer:
Ls > homedir.list
Note: This Question is unanswered, help us to find answer for this one
The purpose of a ups backup battery is to permit a pc or server to ____.
Answer
Correct Answer:
Shutdown normally
Note: This Question is unanswered, help us to find answer for this one
Solid ____ is one color used throughout the entire slide.
Note: This Question is unanswered, help us to find answer for this one
Pmt(rate, nper, pv [, fv=0] [, type=0]) in the figure above, fv and type are ____.
Answer
Correct Answer:
Present value of the loan
Note: This Question is unanswered, help us to find answer for this one
Instead of reading a large text file into php, you can use the ____ to iterate through a text file.
Answer
Correct Answer:
File pointer
Note: This Question is unanswered, help us to find answer for this one
Each hard disk is divided into pie-shaped groups of ____.
Note: This Question is unanswered, help us to find answer for this one
An uninterruptable power supply contains a ____.
Note: This Question is unanswered, help us to find answer for this one
An extension of .sys designates a ____ type of file.
Answer
Correct Answer:
Configuration
Note: This Question is unanswered, help us to find answer for this one
A photo's color intensity can be modified by changing the brightness and ____.
Answer
Correct Answer:
Contrast.
Note: This Question is unanswered, help us to find answer for this one
Root cause analysis is an iterative process that asks a series of ____ questions.
Note: This Question is unanswered, help us to find answer for this one
To find duplicate records in a table, use the _____ query wizard.
Answer
Correct Answer:
Find Duplicates
Note: This Question is unanswered, help us to find answer for this one
Excel remembers the last ____ actions you have completed.
Note: This Question is unanswered, help us to find answer for this one
Deleting a record in a form will also delete it from the underlying ________.
Note: This Question is unanswered, help us to find answer for this one
Today's widescreen devices, such as laptops and smartphones, are designed for the 16:9 __________.
Answer
Correct Answer:
Aspect ratio
Note: This Question is unanswered, help us to find answer for this one
Color ____ indicates that one color is dominating a picture.
Note: This Question is unanswered, help us to find answer for this one
Widespread use of the internet by business and home users first occurred in the ____.
Note: This Question is unanswered, help us to find answer for this one
When a subscript is not within the range of acceptable subscripts, it is said to be ____.
Answer
Correct Answer:
A superscript
Note: This Question is unanswered, help us to find answer for this one
To sort by a second column, click the ____ arrow and click a column header.
Note: This Question is unanswered, help us to find answer for this one
To filter records in a report, use the filter buttons on the ____ tab.
Note: This Question is unanswered, help us to find answer for this one
The prefix ____ should be used for naming a textbox object.
Note: This Question is unanswered, help us to find answer for this one
The output of the statement: cout << pow(3.0, 2.0) + 5 << endl; is ____.
Note: This Question is unanswered, help us to find answer for this one
The main circuits on the system board that carry data are called the _________.
Note: This Question is unanswered, help us to find answer for this one
The concept that similar items should be handled consistently throughout a document is called ____.
Answer
Correct Answer:
Parallel structure
Note: This Question is unanswered, help us to find answer for this one
Set the ____ property to no to prevent users from using the tab key to navigate to a control.
Answer
Correct Answer:
Tab Stop.
Note: This Question is unanswered, help us to find answer for this one
Print all, pages, and selected record(s) are options available from the ____ for printing forms.
Answer
Correct Answer:
Print dialog box
Note: This Question is unanswered, help us to find answer for this one
Most software problems that impact end users occur ____.
Answer
Correct Answer:
During the installation and configuration of the software.
Note: This Question is unanswered, help us to find answer for this one
Media that allow random access are sometimes referred to as ____ media.
Answer
Correct Answer:
Addressable
Note: This Question is unanswered, help us to find answer for this one
In dolby digital 7.1, the 1 indicates a ________ speaker.
Answer
Correct Answer:
Subwoofer
Note: This Question is unanswered, help us to find answer for this one
In a count-controlled loop, the counter performs ________ action(s).
Note: This Question is unanswered, help us to find answer for this one
If the navigation pane is not open, click the _____ to open it and view the database objects.
Answer
Correct Answer:
Shutter Bar Open/Close Button
Note: This Question is unanswered, help us to find answer for this one
Gabrielle is planning to connect selected devices to the network wirelessly with a wireless ____.
Answer
Correct Answer:
Access point
Note: This Question is unanswered, help us to find answer for this one
Employees who provide informal peer support to other users in an organization ____.
Answer
Correct Answer:
Often have little or no training in user support.
Note: This Question is unanswered, help us to find answer for this one
C:\windows\system32\drivers\etc\protocol is an example of a file ________.
Note: This Question is unanswered, help us to find answer for this one
As programs become larger and more complicated, the need for good planning and design ____ .
Answer
Correct Answer:
Increases
Note: This Question is unanswered, help us to find answer for this one
An example of software most commonly associated with productivity software is ____.
Answer
Correct Answer:
Word processing
Note: This Question is unanswered, help us to find answer for this one
All of the following are tips for a great presentation except ________.
Answer
Correct Answer:
Use a variety of animations on most slides to keep your audience's attention.
Note: This Question is unanswered, help us to find answer for this one
After adding a shape to a slide, you can change its default characteristics by adding ____.
Answer
Correct Answer:
Numbers bullets . text . styles.
Note: This Question is unanswered, help us to find answer for this one
A(n) ______ machine enables you to install a second operating system on a computer.
Note: This Question is unanswered, help us to find answer for this one
A(n) ____ is a flat, touch-sensitive device used in conjunction with a digital pen.
Answer
Correct Answer:
Graphics table
Note: This Question is unanswered, help us to find answer for this one
A unique feature of ____ is that users can easily add enhancements to the operating system.
Note: This Question is unanswered, help us to find answer for this one
A two-dimensional array is like ______________ put together.
Answer
Correct Answer:
The correct answer is: several identical arrays
Note: This Question is unanswered, help us to find answer for this one
Computer programmers often refer to memory addresses using ____ notation
Answer
Correct Answer:
Hexadecimal.
Note: This Question is unanswered, help us to find answer for this one
In most programming languages, before you can use any variable, you must include a ____ for it.
Answer
Correct Answer:
Declaration
Note: This Question is unanswered, help us to find answer for this one
A usb flash drive is a(n) ____ disk
Answer
Correct Answer:
Removable.
Note: This Question is unanswered, help us to find answer for this one
Solid-state storage is quickly replacing _____ for storing data on small devices like the ipod.
Answer
Correct Answer:
Microdrives.
Note: This Question is unanswered, help us to find answer for this one
In order to allocate the needed memory for an object, you must use the ____ operator.
Note: This Question is unanswered, help us to find answer for this one
If your computer is thrashing, increase ________ to solve the problem.
Note: This Question is unanswered, help us to find answer for this one
If you open a field list and the tables do not appear in the field list, click ____.
Answer
Correct Answer:
Show all tables
Note: This Question is unanswered, help us to find answer for this one
Color _____ changes the intensity of colors
Answer
Correct Answer:
Saturation
Note: This Question is unanswered, help us to find answer for this one
By default a word document generally displays in ____ view
Answer
Correct Answer:
Print layout
Note: This Question is unanswered, help us to find answer for this one
All of the following are tasks for network administration of a large organization except ________.
Answer
Correct Answer:
Purchasing initial equipment for the network
Note: This Question is unanswered, help us to find answer for this one
A(n) ________________ is an informal web site of time-stamped articles written in a journal format.
Note: This Question is unanswered, help us to find answer for this one
A(n) ____ is a software program that helps programmers develop software.
Answer
Correct Answer:
Application generator
Note: This Question is unanswered, help us to find answer for this one
A violation of the holder's rights is known as copyright ________.
Answer
Correct Answer:
Infringement
Note: This Question is unanswered, help us to find answer for this one
A type of spyware known as _________ can record the individual keystrokes of a user.
Answer
Correct Answer:
Keylogger
Note: This Question is unanswered, help us to find answer for this one
A row-and-column subset ____ consists of a subset of the rows and columns in some individual table.
Note: This Question is unanswered, help us to find answer for this one
A form's object name appears on the tab for the form in the access window. ____________________
Note: This Question is unanswered, help us to find answer for this one
A __________ cookie is set by a site other than the one you connected to.
Answer
Correct Answer:
Third-party.
Note: This Question is unanswered, help us to find answer for this one
________ a site means to take extraordinary measures to reduce a system's vulnerability.
Answer
Correct Answer:
Hardening
Note: This Question is unanswered, help us to find answer for this one
Cache memory levels are based on proximity to ________.
Answer
Correct Answer:
The processor.
Note: This Question is unanswered, help us to find answer for this one
The calculated expression =city & ?,? & state & ? ? & zipcode is an example of ____.
Answer
Correct Answer:
Concatenation
Note: This Question is unanswered, help us to find answer for this one
The bullets button is located in the ____ group.
Answer
Correct Answer:
Paragraph
Note: This Question is unanswered, help us to find answer for this one
The arrangement of keys on a keyboard, qwerty reflects the keyboard layout by _______.
Answer
Correct Answer:
Taking the letters of the first six alphabetic characters found on the top row of keys
Note: This Question is unanswered, help us to find answer for this one
The arguments in ____ in the screentip for a function are optional.
Note: This Question is unanswered, help us to find answer for this one
The appropriate software to use for creating research papers is ________ software.
Answer
Correct Answer:
Word processing
Note: This Question is unanswered, help us to find answer for this one
The apple logo would be considered a(n) ________.
Answer
Correct Answer:
Trademark
Note: This Question is unanswered, help us to find answer for this one
The access window consists of a variety of components. these include the ____.
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
The ________ element configures dynamic graphics.
Note: This Question is unanswered, help us to find answer for this one
Suppose str = "abcdefghi". the output of the statement cout << str.length() << endl; is ____.
Note: This Question is unanswered, help us to find answer for this one
Activex controls are identified using the ____ attribute.
Note: This Question is unanswered, help us to find answer for this one
When data is processed into a meaningful form, it becomes ____.
Answer
Correct Answer:
Information
Note: This Question is unanswered, help us to find answer for this one
Spreadsheet software creates a ____, composed of a grid of columns and rows.
Answer
Correct Answer:
Worksheet
Note: This Question is unanswered, help us to find answer for this one
____ area networks can cover large geographic distances, including the entire earth.
Note: This Question is unanswered, help us to find answer for this one
Some 3d projectors are designed to project ____.
Answer
Correct Answer:
Holograms
Note: This Question is unanswered, help us to find answer for this one
Web pages are viewed using a web ____.
Note: This Question is unanswered, help us to find answer for this one
Visitors to a web site are sometimes called web ____.
Note: This Question is unanswered, help us to find answer for this one
The sentence ?larry will present a tutorial on excel macros on tuesday next week? is in ____ voice.
Note: This Question is unanswered, help us to find answer for this one
The first pcs were used in businesses and homes in the ____.
Note: This Question is unanswered, help us to find answer for this one
The color orange denotes ____.
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
The default importance level for all new messages is ____ importance.
Note: This Question is unanswered, help us to find answer for this one
Emptying the recycle bin frees up ____ on your computer
Answer
Correct Answer:
Storage space
Note: This Question is unanswered, help us to find answer for this one
Javascript and vbscript are _____, which provide commands that are executed on the client.
Answer
Correct Answer:
Scripting languages
Note: This Question is unanswered, help us to find answer for this one
In the url http://www.microsoft.com/surface, the portion labeled ""http"" is the ________.
Note: This Question is unanswered, help us to find answer for this one
____ utilities scan incoming and outgoing files to be sure they are safe.
Note: This Question is unanswered, help us to find answer for this one
The length ____ contains the number of elements in the array.
Note: This Question is unanswered, help us to find answer for this one
The base class's ________ affects the way its members are inherited by the derived class.
Answer
Correct Answer:
Access specification
Note: This Question is unanswered, help us to find answer for this one
The actionlistener interface contains the ____ method specification.
Answer
Correct Answer:
ActionPerformed(ActionEvent e)
Note: This Question is unanswered, help us to find answer for this one
If i simplify the address 2001:0000:0000:00fe:0000:0000:0000:cdef, i get ________.
Answer
Correct Answer:
2001:::fe::::cdef
Note: This Question is unanswered, help us to find answer for this one
The _________ , also known as the address operator, returns the memory address of a variable.
Answer
Correct Answer:
Ampersand ( & )
Note: This Question is unanswered, help us to find answer for this one
The ____ attribute lets you control how the internal table gridlines are drawn.
Note: This Question is unanswered, help us to find answer for this one
Function strcmp returns __________ if its first argument is equal to its second argument.
Answer
Correct Answer:
Specifically O
Note: This Question is unanswered, help us to find answer for this one
Four-pair utp uses ________ connectors.
Answer
Correct Answer:
None of the above
Note: This Question is unanswered, help us to find answer for this one
C++ requires that a copy constructor's parameter be a(n) ________.
Answer
Correct Answer:
Reference object
Note: This Question is unanswered, help us to find answer for this one
Arrays must be ________ at the time they are ________.
Answer
Correct Answer:
Initialized, declared
Note: This Question is unanswered, help us to find answer for this one
Ajax takes advantage of ________ scripting to make applications more responsive.
Answer
Correct Answer:
Client-side
Note: This Question is unanswered, help us to find answer for this one
A class and its members can be described graphically using a notation known as the ____ notation.
Note: This Question is unanswered, help us to find answer for this one
Is a consultative function of the mis department.
Answer
Correct Answer:
Educating the non-MIS managers about IT
Note: This Question is unanswered, help us to find answer for this one
________ are an intangible benefit of information systems.
Answer
Correct Answer:
Lower operational costs,
Note: This Question is unanswered, help us to find answer for this one
Comparing a variable to a list of values in an array is a process called ____ an array.
Answer
Correct Answer:
Searching
Note: This Question is unanswered, help us to find answer for this one
The instruction myanswer = mynumber*2 is an example of a(n) ____ operation.
Answer
Correct Answer:
Processing
Note: This Question is unanswered, help us to find answer for this one
Each task in a systems development project should culminate in one or more ________.
Answer
Correct Answer:
Deliverables.
Note: This Question is unanswered, help us to find answer for this one
Major coding mistakes made by programmers when they write software are called ____.
Note: This Question is unanswered, help us to find answer for this one
The _______________ element was widely used but never part of the w3c standard until html5.
Note: This Question is unanswered, help us to find answer for this one
Software designed specifically for managing real estate is an example of ________ software.
Answer
Correct Answer:
Vertical market
Note: This Question is unanswered, help us to find answer for this one
Using ________ searches the spreadsheet for one value and replaces it with another.
Answer
Correct Answer:
Find and Replace
Note: This Question is unanswered, help us to find answer for this one
The ________ operator performs string concatenation.
Answer
Correct Answer:
Ampersand (&)
Note: This Question is unanswered, help us to find answer for this one
With respect to computer networks, a typical ________ network has a bandwidth of 10 mbps to 1 gbps.
Answer
Correct Answer:
Local Area
Note: This Question is unanswered, help us to find answer for this one
With an enumerated data type, the enumerators are stored in memory as ________.
Answer
Correct Answer:
Integers.
Note: This Question is unanswered, help us to find answer for this one
When you schedule an appointment, outlook adds the appointment to the ____ folder by default.
Note: This Question is unanswered, help us to find answer for this one
When you ask multiple questions before an outcome is determined, you create a ____ condition.
Note: This Question is unanswered, help us to find answer for this one
When computer users ____________________ a project, they change its appearance.
Note: This Question is unanswered, help us to find answer for this one
When a variable ceases to exist at the end of a method, programmers say the variable ____.
Answer
Correct Answer:
Goes out of scope
Note: This Question is unanswered, help us to find answer for this one
Transistors are constructed from ____, such as silicon and gallium arsenide.
Answer
Correct Answer:
Semiconductors
Note: This Question is unanswered, help us to find answer for this one
To view the preview pane, click the ____ tab, and click print on the navigation bar.
Note: This Question is unanswered, help us to find answer for this one
To use the predefined function tolower, the program must include the header file ____.
Note: This Question is unanswered, help us to find answer for this one
To ungroup an illustration, press ____.
Answer
Correct Answer:
CTRL+SHIFT+G
Note: This Question is unanswered, help us to find answer for this one
To select adjacent worksheets, you use the ____ key.
Note: This Question is unanswered, help us to find answer for this one
To resize an image without changing its proportions simply drag ____ of the image
Answer
Correct Answer:
Any corner.
Note: This Question is unanswered, help us to find answer for this one
To remove a total row that appears in a datasheet, tap or click the ____ button on the home tab.
Note: This Question is unanswered, help us to find answer for this one
To re-use saved export steps, tap or click the saved exports button on the ____ tab on the ribbon.
Answer
Correct Answer:
EXTERNAL DATA
Note: This Question is unanswered, help us to find answer for this one
To organize entries in the navigation pane by table, click ____ on the navigation pane menu.
Answer
Correct Answer:
Tables and Related Views
Note: This Question is unanswered, help us to find answer for this one
To move a field in the query design grid, click its ____, and then drag it left or right.
Answer
Correct Answer:
Field selector.
Note: This Question is unanswered, help us to find answer for this one
To import data to a table, tap or click the ____ tab on the ribbon.
Answer
Correct Answer:
EXTERNAL DATA
Note: This Question is unanswered, help us to find answer for this one
To change the caption for a form, use the ____ property in the property sheet.
Note: This Question is unanswered, help us to find answer for this one
To add totals or other statistics to a report, use the ____ button on the design tab.
Note: This Question is unanswered, help us to find answer for this one
To add a record to a table, tap or click the ____ record button
Answer
Correct Answer:
New (blank)
Note: This Question is unanswered, help us to find answer for this one
Though an invitee can propose a new meeting time, only the ____ can change or delete the meeting.
Answer
Correct Answer:
Originator
Note: This Question is unanswered, help us to find answer for this one
There are ____ stable states in a bistable environment.
Note: This Question is unanswered, help us to find answer for this one
The type of media that uses laser technology to store data and programs is _______.
Answer
Correct Answer:
Optical disc
Note: This Question is unanswered, help us to find answer for this one
The purpose of a preinstallation site visit is to ____.
Answer
Correct Answer:
Anticipate possible installation problems
Note: This Question is unanswered, help us to find answer for this one
The most significant internal data sources for an mis are the organization?s _____.
Answer
Correct Answer:
Various DSS and GSS systems and users
Note: This Question is unanswered, help us to find answer for this one
The module definition comprises the module header and the module ________.
Note: This Question is unanswered, help us to find answer for this one
Another name for the weighted point evaluation method is the ____ method.
Answer
Correct Answer:
Kepner-Tregoe
Note: This Question is unanswered, help us to find answer for this one
Many desktops have a(n) ____________________ tower that is a separate device from a monitor.
Answer
Correct Answer:
System Unit
Note: This Question is unanswered, help us to find answer for this one
Long passwords that use several types of keyboard characters are called ________ passwords.
Note: This Question is unanswered, help us to find answer for this one
A profile in a social networking site consists of ________.
Answer
Correct Answer:
A photo or information about the person or organization
Note: This Question is unanswered, help us to find answer for this one
The ____________________ of a function consists of the function name and its formal parameter list.
Answer
Correct Answer:
Signature
Note: This Question is unanswered, help us to find answer for this one
In 802.11i ________, hosts must know a shared initial key.
Answer
Correct Answer:
PSK mode.
Note: This Question is unanswered, help us to find answer for this one
Closing a file causes any unsaved information still held in the file buffer to be ________.
Answer
Correct Answer:
Saved to the file
Note: This Question is unanswered, help us to find answer for this one
Each outlook folder displays the items it contains in a layout called a(n) ____.
Note: This Question is unanswered, help us to find answer for this one
An input mask may be created for any field with the ____ or ____ data type.
Answer
Correct Answer:
Short Text, Number
Note: This Question is unanswered, help us to find answer for this one
An array is a(n) ____ of values in computer memory.
Note: This Question is unanswered, help us to find answer for this one
A unique identifier is most likely used as a ____ key in a database.
Note: This Question is unanswered, help us to find answer for this one
A query based on more than one table is a(n) ____ query
Answer
Correct Answer:
Multitable
Note: This Question is unanswered, help us to find answer for this one
A help desk structured into levels or tiers of support uses a ____.
Answer
Correct Answer:
Multilevel support model
Note: This Question is unanswered, help us to find answer for this one
A hardware component that has its jumper pins set incorrectly is an example of a hardware ____.
Answer
Correct Answer:
Configuration problem
Note: This Question is unanswered, help us to find answer for this one
A file that stays in memory after it executes is a(n) _____________.
Answer
Correct Answer:
Executable
Note: This Question is unanswered, help us to find answer for this one
A ____ consists of a selection of colors and fonts for the various sections in a report or form.
Note: This Question is unanswered, help us to find answer for this one
________ software lets you perform calculations and numerical analyses.
Answer
Correct Answer:
Spreadsheet
Note: This Question is unanswered, help us to find answer for this one
________ allows only limited use of media that have been legally purchased.
Answer
Correct Answer:
Digital rights management.
Note: This Question is unanswered, help us to find answer for this one
A(n) ________ cable carries all audio and video information from devices to a connected tv.
Note: This Question is unanswered, help us to find answer for this one
A distributed computing system usually includes ____.
Answer
Correct Answer:
All of these.
Note: This Question is unanswered, help us to find answer for this one
A _____ page is an unchanging page retrieved from a file on a web server.
Note: This Question is unanswered, help us to find answer for this one
Catfishing is ________.
Answer
Correct Answer:
Creating fake profiles on a dating site and developing a fabricated online and phone relationship
Note: This Question is unanswered, help us to find answer for this one
A(n) ____ layout arranges controls vertically with the labels to the left of the control.
Note: This Question is unanswered, help us to find answer for this one
A three-tier, or multitier, client/server system consists of three distinct pieces: these are ____.
Answer
Correct Answer:
The client tier, the processing tier, and the data storage tier
Note: This Question is unanswered, help us to find answer for this one
A method?s name and parameter list constitute the method?s ____.
Answer
Correct Answer:
Signature
Note: This Question is unanswered, help us to find answer for this one
A calculated field is formatted using the ____ for the field.
Answer
Correct Answer:
Property Sheet
Note: This Question is unanswered, help us to find answer for this one
____ loops are called posttest loops.
Answer
Correct Answer:
Do...while loop
Note: This Question is unanswered, help us to find answer for this one
____ is currently the most popular technology for connecting peripherals
Note: This Question is unanswered, help us to find answer for this one
Suppose str = ""xyzw"";. after the statement str[2] = 'y'; the value of str is ""____"".
Note: This Question is unanswered, help us to find answer for this one
Fine lines that extend from the top and bottom of a font's letters are called ____.
Note: This Question is unanswered, help us to find answer for this one
To create an update query, create a new query and then click the ____ button on the design tab.
Note: This Question is unanswered, help us to find answer for this one
The personal assistant application on apple's iphone is an example of a ________.
Answer
Correct Answer:
Natural language processing (NLP) system
Note: This Question is unanswered, help us to find answer for this one
To speed up the display of graphics, a(n) ________ is integrated into some video cards.
Note: This Question is unanswered, help us to find answer for this one
The navigation pane includes two panes: the ____ panes.
Answer
Correct Answer:
Date Navigator and my calendars
Note: This Question is unanswered, help us to find answer for this one
The navigation pane contains the headings tab, the results tab, and the _____ tab.
Note: This Question is unanswered, help us to find answer for this one
The internet data transfer speed for your computer might be stated in ____ per second.
Note: This Question is unanswered, help us to find answer for this one
The appearance of fields in a report that is created using the report wizard is determined by ____.
Answer
Correct Answer:
The order the fields are selected in the
Note: This Question is unanswered, help us to find answer for this one
Press and hold the ____ key as you click a link on a webpage to open a new webpage in a new tab.
Note: This Question is unanswered, help us to find answer for this one
Most music for portable media players is stored in _______ audio file formats.
Answer
Correct Answer:
Compressed
Note: This Question is unanswered, help us to find answer for this one
Modern motherboards use a 20- or 24-pin _______________.
Note: This Question is unanswered, help us to find answer for this one
Pixels is short for _____ and is a measure of _____.
Answer
Correct Answer:
Picture elements; resolution
Note: This Question is unanswered, help us to find answer for this one
Internet explorer inserts the flash shockwave player as a(n) ____ control.
Note: This Question is unanswered, help us to find answer for this one
To connect multiple usb devices to a single usb port, a ____ can be used.
Note: This Question is unanswered, help us to find answer for this one
The purpose of ___ is to hold data permanently, even when the computer is turned off.
Note: This Question is unanswered, help us to find answer for this one
The internet connects millions of computers connected through millions of ____ worldwide.
Note: This Question is unanswered, help us to find answer for this one
One common way to deal with spam that makes it to your computer is to use a(n) ____.
Answer
Correct Answer:
Email filter
Note: This Question is unanswered, help us to find answer for this one
Most keyboards today are arranged in a(n) _______ layout.
Note: This Question is unanswered, help us to find answer for this one
Main memory is called ____.
Answer
Correct Answer:
Primary memory
Note: This Question is unanswered, help us to find answer for this one
Like any other processor, a graphics processor needs _______________.
Note: This Question is unanswered, help us to find answer for this one
The line most commonly used by corporate, government, and academic sites is ________.
Note: This Question is unanswered, help us to find answer for this one
When installing new software, it is recommended to install it in/on ____.
Answer
Correct Answer:
C:\Programs
Note: This Question is unanswered, help us to find answer for this one
To save a document with a new name, click _______ in the navigation bar and enter a new filename.
Note: This Question is unanswered, help us to find answer for this one
A reason to overload the ________ is to write classes that have array-like behaviors.
Answer
Correct Answer:
Square brackets [ ] operator
Note: This Question is unanswered, help us to find answer for this one
For downloaded software, the details of the software license usually appear during ______.
Answer
Correct Answer:
Installation
Note: This Question is unanswered, help us to find answer for this one
A(n) ____ is a set of values together with a set of operations.
Answer
Correct Answer:
Data type
Note: This Question is unanswered, help us to find answer for this one
Current computer programs are able to identify some objects _____.
Answer
Correct Answer:
But they often make errors that a human would never make
Note: This Question is unanswered, help us to find answer for this one
A ______ is a symbol used to represent a location in memory.
Note: This Question is unanswered, help us to find answer for this one
A string with delimiters can be parsed into separate fields using the _____ class.
Answer
Correct Answer:
StringTokenizer
Note: This Question is unanswered, help us to find answer for this one
A method that is associated with an individual object is called ________.
Answer
Correct Answer:
An instance method
Note: This Question is unanswered, help us to find answer for this one
A loop that continues to execute endlessly is called a(n) ____ loop.
Note: This Question is unanswered, help us to find answer for this one
A function includes its ____, which are values used by the function.
Answer
Correct Answer:
Parameters
Note: This Question is unanswered, help us to find answer for this one
A data item is ____ when it cannot be changed while a program is running
Note: This Question is unanswered, help us to find answer for this one
A class ____ automatically executes whenever a class object goes out of scope.
Answer
Correct Answer:
Destructor
Note: This Question is unanswered, help us to find answer for this one
________ functions may have the same name, as long as their parameter lists are different.
Answer
Correct Answer:
Two or more
Note: This Question is unanswered, help us to find answer for this one
____ a data item means you override incorrect data by setting the variable to a specific value.
Note: This Question is unanswered, help us to find answer for this one
You create a named constant using the ____ statement.
Note: This Question is unanswered, help us to find answer for this one
You can break up a long statement into multiple lines as long as you don't break up a ________.
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
The goal of _____ is to build a system that is effective, reliable, and maintainable.
Answer
Correct Answer:
System design
Note: This Question is unanswered, help us to find answer for this one
In addition to using loops to validate data, ________ can also be used to validate data.
Answer
Correct Answer:
Boolean Function
Note: This Question is unanswered, help us to find answer for this one
In a computer, each_____ can represent one letter, number, or symbol.
Note: This Question is unanswered, help us to find answer for this one
____ error messages indicate coding errors detected by the compiler.
Note: This Question is unanswered, help us to find answer for this one
A ________ a string of bits used to encrypt the data.
Note: This Question is unanswered, help us to find answer for this one
A ____ is a variable that you set to indicate whether some event has occurred.
Note: This Question is unanswered, help us to find answer for this one
______ data consists of numbers that can be used in arithmetic operations.
Note: This Question is unanswered, help us to find answer for this one
A locally declared variable always ____ another variable with the same name elsewhere in the class.
Note: This Question is unanswered, help us to find answer for this one
Assigning initial values to an array is often referred to as ____.
Answer
Correct Answer:
Populating
Note: This Question is unanswered, help us to find answer for this one
____ are the characteristics that define an object as part of a class.
Answer
Correct Answer:
Behaviors
Note: This Question is unanswered, help us to find answer for this one
A ________ value in a loop can be either a positive or a negative number.
Note: This Question is unanswered, help us to find answer for this one
A special character that is used to substitute for a character or many characters is a(n) ________.
Note: This Question is unanswered, help us to find answer for this one
A situation where two software packages use resources in incompatible ways is called a(n) ____.
Note: This Question is unanswered, help us to find answer for this one
A method can receive ____ arguments, even if it is defined as needing double arguments.
Note: This Question is unanswered, help us to find answer for this one
A literal string can be assigned a zero-length string value called a(n) ____ string.
Note: This Question is unanswered, help us to find answer for this one
A condition is a ________ expression
Note: This Question is unanswered, help us to find answer for this one
A comparison is correct only when the correct ____ and operator are used
Note: This Question is unanswered, help us to find answer for this one
A class ____ is a collection of classes that can be made available for developers to use. class library
Note: This Question is unanswered, help us to find answer for this one
A ____ loop is best used when the specific number of iterations required is known.
Note: This Question is unanswered, help us to find answer for this one
A ____ is a named memory location that you can use to store a value.
Note: This Question is unanswered, help us to find answer for this one
A ____ exception occurs when code attempts to divide a number by zero.
Answer
Correct Answer:
Divide by Zero
Note: This Question is unanswered, help us to find answer for this one
____ occurs when both of the operands are integers.
Answer
Correct Answer:
Both operands are true
Note: This Question is unanswered, help us to find answer for this one
Each data type is a class from which a variable can be ____.
Answer
Correct Answer:
Instantiated
Note: This Question is unanswered, help us to find answer for this one
________ property is work that is the result of someone's creativity and knowledge.
Answer
Correct Answer:
Intellectual property
Note: This Question is unanswered, help us to find answer for this one
John's height is 6 feet 3 inches. this is an example of ________.
Note: This Question is unanswered, help us to find answer for this one
For maximum efficiency, a good rule of thumb in an and decision is to ____.
Answer
Correct Answer:
First ask the question that is more likely to be false.
Note: This Question is unanswered, help us to find answer for this one
Compared to traditional advertising, an effective business use of social media tools is to _____.
Answer
Correct Answer:
Engage customers
Note: This Question is unanswered, help us to find answer for this one
A digital certificate usually contains all of the following except ____.
Answer
Correct Answer:
a keycode that destroys all evidence of the certificate upon use
Note: This Question is unanswered, help us to find answer for this one
_____ measures the amount of space between words.
Note: This Question is unanswered, help us to find answer for this one
The ____ is the device or substance that actually holds data.
Answer
Correct Answer:
Storage medium
Note: This Question is unanswered, help us to find answer for this one
Tables are similar in design to ____.
Answer
Correct Answer:
Spreadsheets
Note: This Question is unanswered, help us to find answer for this one
In 1982, the percentage of households that had a computer was closest to ____ percent.
Note: This Question is unanswered, help us to find answer for this one
An internal user is one who is a ____.
Answer
Correct Answer:
Worker in the same organization that provides support services
Note: This Question is unanswered, help us to find answer for this one
A ________ combines the functionality of a smartphone with a screen the size of a tablet.
Note: This Question is unanswered, help us to find answer for this one
The basis of an xp plan is a set of ____ that users develop.
Answer
Correct Answer:
User stories
Note: This Question is unanswered, help us to find answer for this one
The arguments sent to a method in a method call are often referred to as ____ parameters.
Note: This Question is unanswered, help us to find answer for this one
Creative commons licenses are ________.
Answer
Correct Answer:
Irrevocable
Note: This Question is unanswered, help us to find answer for this one
A variation of the content model is sometimes called the ____ model.
Answer
Correct Answer:
Information
Note: This Question is unanswered, help us to find answer for this one
____ input data from special forms to score or tally exams, questionnaires, ballots, and so forth.
Answer
Correct Answer:
Optical mark readers (OMRs)
Note: This Question is unanswered, help us to find answer for this one
A ____ is information presented on a physical medium, such as paper.
Answer
Correct Answer:
Hard copy
Note: This Question is unanswered, help us to find answer for this one
_____ is the imitation of the operation of a real-world process or system over time.
Answer
Correct Answer:
Simulation
Note: This Question is unanswered, help us to find answer for this one
Statistical information such as totals and averages is calculated using ____.
Answer
Correct Answer:
Aggregate functions
Note: This Question is unanswered, help us to find answer for this one
The introduction of _____ on cell phones was the first step toward realizing augmented reality.
Answer
Correct Answer:
Geographic positioning systems
Note: This Question is unanswered, help us to find answer for this one
Robotic cameras used by television stations for sports events require a ________ operating system.
Answer
Correct Answer:
Real-time
Note: This Question is unanswered, help us to find answer for this one
In the url http://www.cengage.com/index.html, http: is the ____.
Note: This Question is unanswered, help us to find answer for this one
If your time is limited, consider using a logical acquisition or ____ acquisition data copy method.
Note: This Question is unanswered, help us to find answer for this one
Classifying end users as internal versus external is a classification by ____.
Answer
Correct Answer:
Relationship
Note: This Question is unanswered, help us to find answer for this one
Business reports that list only totals, with no individual item details, are called ____.
Answer
Correct Answer:
Summary reports
Note: This Question is unanswered, help us to find answer for this one
An sd card is an example of a(n) ________ card.
Note: This Question is unanswered, help us to find answer for this one
A(n) ________ search is more efficient than a ________ search.
Answer
Correct Answer:
Binary, linear
Note: This Question is unanswered, help us to find answer for this one
A(n) ________ is a worksheet where totals from other worksheets are summarized and displayed.
Answer
Correct Answer:
Summarysheet
Note: This Question is unanswered, help us to find answer for this one
A(n) _____ provides access for customers, employees, suppliers, and the public.
Answer
Correct Answer:
Corporate portal
Note: This Question is unanswered, help us to find answer for this one
A subscript is a(n) _____.
Answer
Correct Answer:
Number that indicates the position of an array element
Note: This Question is unanswered, help us to find answer for this one
A software package used to prepare budgets, reports, forecasts, and financial statements is a ____.
Answer
Correct Answer:
Spreadsheet program
Note: This Question is unanswered, help us to find answer for this one
A ____ object forces the user to select only one option from a group of options.
Answer
Correct Answer:
RadioButton
Note: This Question is unanswered, help us to find answer for this one
Computing components are designed to last 18 to ____ months in normal business operations.
Note: This Question is unanswered, help us to find answer for this one
____ are common examples of e-marketplaces.
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
____ a file places a duplicate version of the file in a new location that you specify.
Note: This Question is unanswered, help us to find answer for this one
____ uses a number of hard drives to store information across multiple drive units.
Note: This Question is unanswered, help us to find answer for this one
____ is registering, selling, or using a domain name to profit from someone else?s trademark.
Answer
Correct Answer:
Cybersquatting
Note: This Question is unanswered, help us to find answer for this one
____ consists of full-motion images played back at various speeds.
Note: This Question is unanswered, help us to find answer for this one
A file not within a subfolder is said to be in the _______________.
Answer
Correct Answer:
Root directory
Note: This Question is unanswered, help us to find answer for this one
_____ is what you put into a computer; _____ is what you get out of it.
Answer
Correct Answer:
Data; information
Note: This Question is unanswered, help us to find answer for this one
A monitor is a(n) ____ device
Note: This Question is unanswered, help us to find answer for this one
In the chicago style, the ________ is displayed using hanging indent.
Answer
Correct Answer:
Bibliography
Note: This Question is unanswered, help us to find answer for this one
A ____ virus is a virus that infects a piece of executable code such as an .exe or .com file.
Answer
Correct Answer:
File infector
Note: This Question is unanswered, help us to find answer for this one
Each element in a two-dimensional array requires ____ subscript(s) to reference it.
Note: This Question is unanswered, help us to find answer for this one
An array whose elements you can access using a single subscript is a ____ array.
Answer
Correct Answer:
One dimensional
Note: This Question is unanswered, help us to find answer for this one
The ____ is the user interface to the os.
Note: This Question is unanswered, help us to find answer for this one
In a function template, the programmer substitutes ________ for ________.
Answer
Correct Answer:
Parameters, data types
Note: This Question is unanswered, help us to find answer for this one
Apa-style papers use ________ as the title of the list of sources.
Answer
Correct Answer:
References
Note: This Question is unanswered, help us to find answer for this one
Cartoonists create animated films by drawing a sequence of ____ or cells.
Note: This Question is unanswered, help us to find answer for this one
The ________ of a secondary storage device indicates how much data the storage medium can hold.
Note: This Question is unanswered, help us to find answer for this one
The sequential search algorithm uses a(n) ____ variable to track whether the item is found.
Note: This Question is unanswered, help us to find answer for this one
Computer-integrated manufacturing integrates ______________ with manufacturing.
Answer
Correct Answer:
Information from across the organization
Note: This Question is unanswered, help us to find answer for this one
To hide field codes on the screen, press the ____ keys.
Note: This Question is unanswered, help us to find answer for this one
Desktop, laptop, and tablet computers, and mobile devices are classified as _______.
Answer
Correct Answer:
Personal computers
Note: This Question is unanswered, help us to find answer for this one
In a cd-r, the r stands for ____ technology.
Answer
Correct Answer:
Recordable
Note: This Question is unanswered, help us to find answer for this one
Tables queries and forms are examples of access ____
Note: This Question is unanswered, help us to find answer for this one
Use the ________ method to write text to a web page.
Answer
Correct Answer:
Document.write()
Note: This Question is unanswered, help us to find answer for this one
During the early years of computing, a mainframe computer was called the ____.
Note: This Question is unanswered, help us to find answer for this one
Analysts often refer to the three ____’s when describing characteristics of big data
Note: This Question is unanswered, help us to find answer for this one
To create a module you write its ________.
Answer
Correct Answer:
Definition
Note: This Question is unanswered, help us to find answer for this one
When working in the navigation pane, you ____ a folder to open it.
Answer
Correct Answer:
Double-click
Note: This Question is unanswered, help us to find answer for this one
Which of the following is not a comparison operator ____
Note: This Question is unanswered, help us to find answer for this one
Personal ethics deals with ____.
Answer
Correct Answer:
The choices and behaviors made by individuals
Note: This Question is unanswered, help us to find answer for this one
To watch video on a computer, you need special hardware plus software known as a _____.
Answer
Correct Answer:
Media player
Note: This Question is unanswered, help us to find answer for this one
A race condition ____.
Answer
Correct Answer:
Results when several threads try to access and modify the same data concurrently
Note: This Question is unanswered, help us to find answer for this one
The number of colors a monitor can display is referred to as ____
Answer
Correct Answer:
Color depth
Note: This Question is unanswered, help us to find answer for this one
The process of accessing information from secondary storage devices is referred to as _______.
Note: This Question is unanswered, help us to find answer for this one
Implicit memory is to _____ as explicit memory is to _____.
Answer
Correct Answer:
Priming; episodic memory
Note: This Question is unanswered, help us to find answer for this one
When a user prints a report for class, the report would be ________.
Note: This Question is unanswered, help us to find answer for this one
The most basic file ____ are characteristics such as filename, creation date, and modified date.
Note: This Question is unanswered, help us to find answer for this one
The term for a collection of website files stored on a web server is ____.
Answer
Correct Answer:
remote website
Note: This Question is unanswered, help us to find answer for this one
The ____________________ of relational and logical operators is said to be from left to right.
Answer
Correct Answer:
Associativity
Note: This Question is unanswered, help us to find answer for this one
The ________ operator is used in c++ to test for equality.
Note: This Question is unanswered, help us to find answer for this one
The ________ operator is a unary operator, as it works with only one operand.
Note: This Question is unanswered, help us to find answer for this one
The ________ of a local variable is the function in which that variable is created.
Note: This Question is unanswered, help us to find answer for this one
The ____ command can be used to provide a long listing for each file in a certain directory.
Note: This Question is unanswered, help us to find answer for this one
Digital wallet transactions occur ____.
Answer
Correct Answer:
either a. or b
Note: This Question is unanswered, help us to find answer for this one
Cloud computing provides ____ on demand, which matches resources to needs at any given time.
Note: This Question is unanswered, help us to find answer for this one
Before using the data type string, the program must include the header file ____.
Note: This Question is unanswered, help us to find answer for this one
A(n) _____ is an input device used to grade multiple-choice and true/false tests.
Answer
Correct Answer:
Optical mark recognition system
Note: This Question is unanswered, help us to find answer for this one
A search can be performed on an array of ________ .
Note: This Question is unanswered, help us to find answer for this one
A _____ is the size of a character.
Answer
Correct Answer:
Fixed, variable
Note: This Question is unanswered, help us to find answer for this one
A _____ allows data to be stored in multiple places to improve a system’s reliability.
Answer
Correct Answer:
A redundant array of independent disks
Note: This Question is unanswered, help us to find answer for this one
One of the most popular ____ options is netflix.
Answer
Correct Answer:
Video on demand
Note: This Question is unanswered, help us to find answer for this one
Objects in an array are accessed with ________, just like any other data type in an array.
Answer
Correct Answer:
Subscripts
Note: This Question is unanswered, help us to find answer for this one
The ____ feature automatically locates specific text and then replaces it with desired text.
Answer
Correct Answer:
Find and Replace
Note: This Question is unanswered, help us to find answer for this one
The \ operator is the arithmetic operator for ____ division.
Note: This Question is unanswered, help us to find answer for this one
The _____ keyword is required to use relational operators in a case statement.
Note: This Question is unanswered, help us to find answer for this one
In c++, ____ is a reserved word.
Note: This Question is unanswered, help us to find answer for this one
When you return an array from a method, the method returns __________.
Answer
Correct Answer:
The reference of the array
Note: This Question is unanswered, help us to find answer for this one
When you copy data from a file on a storage device into ram, you ____ from the file.
Note: This Question is unanswered, help us to find answer for this one
Raid 0 uses disk ____, which spreads files over several disk drives.
Answer
Correct Answer:
Stripping
Note: This Question is unanswered, help us to find answer for this one
Programming style is important, because ________.
Answer
Correct Answer:
Good programming style makes a program more readable
Good programming style helps reduce programming errors
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
Data types that are created by the programmer are known as ________.
Answer
Correct Answer:
Abstract data types
Note: This Question is unanswered, help us to find answer for this one
A sorting ____ is a field position within each line.
Answer
Correct Answer:
Sorting key
Note: This Question is unanswered, help us to find answer for this one
A simple text file is called a ____ file.
Answer
Correct Answer:
Sequential
Note: This Question is unanswered, help us to find answer for this one
________ happens when an input operation attempts to read data, but there is no data to read.
Answer
Correct Answer:
Empty Input
Note: This Question is unanswered, help us to find answer for this one
A destructor has the character ____, followed by the name of the class.
Note: This Question is unanswered, help us to find answer for this one
The relationship created with composition is called a(n) ____ relationship.
Note: This Question is unanswered, help us to find answer for this one
Virtualization is the process by which ________.
Answer
Correct Answer:
One physical computer hosts many different virtual computers within it
Note: This Question is unanswered, help us to find answer for this one
The two major types of system software programs are utility programs and the ________.
Answer
Correct Answer:
Operating system
Note: This Question is unanswered, help us to find answer for this one
The first step in building an entity-relationship diagram (erd) is _____.
Answer
Correct Answer:
Identifying the attributes and primary keys that adequately describe the entities
Note: This Question is unanswered, help us to find answer for this one
The bullets button is available on the home tab of the ribbon in the ____ group.
Answer
Correct Answer:
Paragraph
Note: This Question is unanswered, help us to find answer for this one
The ________ of the operating system enables users to communicate with the computer system.
Answer
Correct Answer:
User Interface
Note: This Question is unanswered, help us to find answer for this one
The ________ has the largest capacity of any storage device
Answer
Correct Answer:
Mechanical Hard Drive
Note: This Question is unanswered, help us to find answer for this one
Many programming languages include a string operation called __________.
Answer
Correct Answer:
Concatenation
Note: This Question is unanswered, help us to find answer for this one
A _____ enables communication by defining the format of data and rules for exchange.
Note: This Question is unanswered, help us to find answer for this one
The components of a struct are called the ____ of the struct.
Note: This Question is unanswered, help us to find answer for this one
The base case ________ the recursion.
Note: This Question is unanswered, help us to find answer for this one
The application gateway is also known as a(n) ____
Answer
Correct Answer:
Application level firewall
Note: This Question is unanswered, help us to find answer for this one
The 802.11 frame contains the _____ field.
Answer
Correct Answer:
Protocol version
Note: This Question is unanswered, help us to find answer for this one
Parsedouble is a method in the ________ class.
Note: This Question is unanswered, help us to find answer for this one
When they have the same name, variables within ____ of a class override the class’s fields.
Note: This Question is unanswered, help us to find answer for this one
A user ____ is what the user sees and interacts with while an application is running.
Answer
Correct Answer:
Interface
Note: This Question is unanswered, help us to find answer for this one
The most common type of database used on pcs today is a(n) ____.
Answer
Correct Answer:
Relational database
Note: This Question is unanswered, help us to find answer for this one
A ____ is a shared electrical or optical channel that connects two or more devices.
Note: This Question is unanswered, help us to find answer for this one
Many display devices are _____ monitors.
Answer
Correct Answer:
Flat panel
Note: This Question is unanswered, help us to find answer for this one
According to the value chain model, technology is considered a ________ of the firm.
Answer
Correct Answer:
Support activity
Note: This Question is unanswered, help us to find answer for this one
The class ____ is the base of the classes designed to handle exceptions.
Answer
Correct Answer:
Exception
Note: This Question is unanswered, help us to find answer for this one
Most commercial ________ include(s) an online catalog, a shopping cart, and a secure order form.
Answer
Correct Answer:
E-commerce hosting packages
Note: This Question is unanswered, help us to find answer for this one
Metadata are ________.
Answer
Correct Answer:
Data that describe data
Note: This Question is unanswered, help us to find answer for this one
The ethernet length field gives the length of the ________.
Answer
Correct Answer:
Data field
Note: This Question is unanswered, help us to find answer for this one
Rad relies heavily on ____
Answer
Correct Answer:
Prototyping
Note: This Question is unanswered, help us to find answer for this one
Xlsx and gif are examples of file ____.
Answer
Correct Answer:
Extensions
Note: This Question is unanswered, help us to find answer for this one
With ____, macintosh moved to the intel processor and became unix based.
Note: This Question is unanswered, help us to find answer for this one
Wary bidders in low-price auctions can check the_____ to protect themselves from being cheated.
Answer
Correct Answer:
Seller's records
Note: This Question is unanswered, help us to find answer for this one
Two pioneers of usability testing are _____ and jakob nielsen.
Answer
Correct Answer:
Ben Shneiderman
Note: This Question is unanswered, help us to find answer for this one
Traditionally, large companies distribute excess inventory through _____.
Answer
Correct Answer:
Their own Web auction sites
Note: This Question is unanswered, help us to find answer for this one
To declare a constant max_length inside a method with value 99.98, you write ________.
Answer
Correct Answer:
Final double MAX_LENGTH = 99.98;
Note: This Question is unanswered, help us to find answer for this one
The process of converting human-readable data into machine-readable form is called _____.
Answer
Correct Answer:
Data entry
Note: This Question is unanswered, help us to find answer for this one
Flatbed, sheet-fed, pen, and handheld are types of _____.
Note: This Question is unanswered, help us to find answer for this one
To increase a paragraph indent use the _____ shortcut keys
Note: This Question is unanswered, help us to find answer for this one
A structure that has a loop that is inside another loop is called a(n) ________ loop
Note: This Question is unanswered, help us to find answer for this one
The type of software used widely in businesses to complete specific tasks is _____.
Answer
Correct Answer:
Application software
Note: This Question is unanswered, help us to find answer for this one
Information systems improve process quality by ________.
Answer
Correct Answer:
Controlling process flow
Note: This Question is unanswered, help us to find answer for this one
Information entered into a field is called the field ____.
Note: This Question is unanswered, help us to find answer for this one
A(n) ____________________ is a memory location whose contents can be changed.
Note: This Question is unanswered, help us to find answer for this one
A(n) _____ provides rapid access to timely information and direct access to management reports.
Answer
Correct Answer:
Digital dashboard
Note: This Question is unanswered, help us to find answer for this one
A type of memory whose contents are not lost if the power is turned off is said to be _____.
Answer
Correct Answer:
Nonvolatile
Note: This Question is unanswered, help us to find answer for this one
A protocol analyzer is also known as ____.
Note: This Question is unanswered, help us to find answer for this one
A market pay line _____.
Answer
Correct Answer:
Links a company's benchmark jobs with market rates paid by competitors
Note: This Question is unanswered, help us to find answer for this one
A digital computer uses _____ that represent data in the form of code.
Note: This Question is unanswered, help us to find answer for this one
A digital _____ is a digital code or stream embedded undetectably in a digital image or audio file.
Answer
Correct Answer:
Watermark
Note: This Question is unanswered, help us to find answer for this one
A computer with a quad-processor has ________ cpus.
Note: This Question is unanswered, help us to find answer for this one
A computer that supports 10/100/1000 ethernet allows for 10, 100, or 1000 ________ per second.
Note: This Question is unanswered, help us to find answer for this one
A computer bus consists of data lines, __________, control lines, and power lines.
Answer
Correct Answer:
Address lines
Note: This Question is unanswered, help us to find answer for this one
A _____ is a program hidden inside another program or web page that masks its true purpose.
Answer
Correct Answer:
Trojan Horse
Note: This Question is unanswered, help us to find answer for this one
A _____ is a private network connecting servers and storage units.
Answer
Correct Answer:
Storage-area network
Note: This Question is unanswered, help us to find answer for this one
A ____ should be used to provide visual indication that option buttons belong in the same group.
Note: This Question is unanswered, help us to find answer for this one
________ is the worldwide leader of erp vendors
Note: This Question is unanswered, help us to find answer for this one
________ is the worldwide leader of enterprise resource planning (erp) vendors.
Note: This Question is unanswered, help us to find answer for this one
________ duplicates data across databases.
Answer
Correct Answer:
Data propagation
Note: This Question is unanswered, help us to find answer for this one
_______ provide additional information and request user input.
Answer
Correct Answer:
Dialog boxes
Note: This Question is unanswered, help us to find answer for this one
______ is a form of database processing that supports top-down, query-driven data analysis.
Answer
Correct Answer:
Online analytical processing (OLAP)
Note: This Question is unanswered, help us to find answer for this one
_____ is the use of interpersonal connections online to promote or sell goods and services.
Answer
Correct Answer:
Social commerce
Note: This Question is unanswered, help us to find answer for this one
Clicking the show/hide button on the home tab of the ribbon displays ________.
Answer
Correct Answer:
Formatting marks
Note: This Question is unanswered, help us to find answer for this one
Loops are frequently used to ____; that is, to make sure it is meaningful and useful.
Answer
Correct Answer:
Validate data
Note: This Question is unanswered, help us to find answer for this one
Note that the unicode for character a is 65. the expression ""a"" + 1 evaluates to ________.
Note: This Question is unanswered, help us to find answer for this one
In the accompanying figure, the text “click to add title” is the title ____.
Answer
Correct Answer:
Placeholder.
Note: This Question is unanswered, help us to find answer for this one
In the accompanying figure, the split double arrow mouse pointer ____.
Answer
Correct Answer:
Is the result of moving the mouse pointer to the boundary between column heading A and column
Note: This Question is unanswered, help us to find answer for this one
A(n) ______ is a request for specific data from a database.
Note: This Question is unanswered, help us to find answer for this one
You may hear programmers refer to looping as ____.
Answer
Correct Answer:
Iteration
Note: This Question is unanswered, help us to find answer for this one
To securely erase data, the u.s. department of defense suggests that data be ________.
Answer
Correct Answer:
Overwritten multiple times
Note: This Question is unanswered, help us to find answer for this one
To declare a constant max_length as a member of the class, you write ________.
Answer
Correct Answer:
Final static double MAX_LENGTH = 99.98
Note: This Question is unanswered, help us to find answer for this one
The true benefit of using an array lies in your ability to use a ____ as a subscript to the array.
Note: This Question is unanswered, help us to find answer for this one
The leads online web-based service system is used by law enforcement to ____.
Answer
Correct Answer:
Recover stolen property
Note: This Question is unanswered, help us to find answer for this one
The last step in a while loop is usually to ____.
Answer
Correct Answer:
Increment the loop control variable
Note: This Question is unanswered, help us to find answer for this one
The amount by which a for loop control variable changes is often called a ____ value.
Note: This Question is unanswered, help us to find answer for this one
The action or actions that occur within a loop are known as a(n) ____.
Answer
Correct Answer:
Loop body
Note: This Question is unanswered, help us to find answer for this one
Many programming languages allow you to use ____ to force an expression to evaluate first.
Answer
Correct Answer:
Parentheses
Note: This Question is unanswered, help us to find answer for this one
Antiglare screens are sometimes called ____.
Answer
Correct Answer:
Eye protectors
Note: This Question is unanswered, help us to find answer for this one
A(n) ____ is a data element containing the address of another data element.
Note: This Question is unanswered, help us to find answer for this one
When calling this() from a constructor, it must be the ____ statement within the constructor.
Note: This Question is unanswered, help us to find answer for this one
Usually, when you create nested loops, each loop has its own ____.
Answer
Correct Answer:
Loop control variable
Note: This Question is unanswered, help us to find answer for this one
The mac computer employs the ____ system to encrypt its file data.
Answer
Correct Answer:
FireVault
Note: This Question is unanswered, help us to find answer for this one
The ________ and ________ operators can be used to increment or decrement a pointer variable.
Note: This Question is unanswered, help us to find answer for this one
One advantage of proprietary software versus off-the-shelf software is that _____.
Answer
Correct Answer:
Being involved in the development offers control over the results
Note: This Question is unanswered, help us to find answer for this one
Once your logic enters the body of a structured loop, ____.
Answer
Correct Answer:
The entire loop must execute
Note: This Question is unanswered, help us to find answer for this one
Every array has a(n) ____ size.
Note: This Question is unanswered, help us to find answer for this one
Comparison operators are also referred to as ____ operators.
Answer
Correct Answer:
Relational
Note: This Question is unanswered, help us to find answer for this one
Class ________ represents an image that can be displayed on a jlabel.
Answer
Correct Answer:
ImageIcon.
Note: This Question is unanswered, help us to find answer for this one
A dvd-rom uses all of the following to achieve a higher storage capacity than a cd-rom except ____.
Answer
Correct Answer:
Making the disc single-session
Note: This Question is unanswered, help us to find answer for this one
Encryption that uses 16-character keys is known as ____.
Answer
Correct Answer:
Strong 128-bit encryption
Note: This Question is unanswered, help us to find answer for this one
An attribute of an entity in a table is called a ________.
Note: This Question is unanswered, help us to find answer for this one
All of the following are examples of software packages except ________.
Answer
Correct Answer:
Microsoft OneNote
Note: This Question is unanswered, help us to find answer for this one
The ________ operator performs division and returns the remainder.
Note: This Question is unanswered, help us to find answer for this one
The ____ of a variable specifies where a variable can be referenced within a program.
Note: This Question is unanswered, help us to find answer for this one
File management capabilities available from application software include ____ files.
Answer
Correct Answer:
ALL OF THE ABOVE
Note: This Question is unanswered, help us to find answer for this one
A pointer variable may be initialized with ________.
Answer
Correct Answer:
Any address in the computer's memory
Note: This Question is unanswered, help us to find answer for this one
A member function that is declared ________ cannot use the this pointer.
Note: This Question is unanswered, help us to find answer for this one
A function ________ return a structure.
Note: This Question is unanswered, help us to find answer for this one
____ is freeware software.
Answer
Correct Answer:
Internet Explorer (Web browser)
Note: This Question is unanswered, help us to find answer for this one
________ is not one of the five primary activities in the value chain.
Answer
Correct Answer:
Firm infrastructure (accounting, finance, management)
Note: This Question is unanswered, help us to find answer for this one
________ is free software created and updated by a worldwide community of programmers.
Answer
Correct Answer:
Open-source software
Note: This Question is unanswered, help us to find answer for this one
________ is a standard way of drawing diagrams that describe object-oriented systems.
Note: This Question is unanswered, help us to find answer for this one
________ is a set of commands used to control a database, which includes security.
Note: This Question is unanswered, help us to find answer for this one
A(n) _____ describes information about an object.
Answer
Correct Answer:
Attribute
Note: This Question is unanswered, help us to find answer for this one
A _____ can be as powerful as a desktop computer.
Note: This Question is unanswered, help us to find answer for this one
A ____ virus is a common type of virus that is programmed into an attached macro file.
Note: This Question is unanswered, help us to find answer for this one
A ____ symbol is another name for a dot symbol
Note: This Question is unanswered, help us to find answer for this one
A ____ storage device stores and retrieves data items in a linear, or sequential, order.
Answer
Correct Answer:
Serial Access
Note: This Question is unanswered, help us to find answer for this one
________ is sometimes the term used for input validation.
Answer
Correct Answer:
Error trap
Note: This Question is unanswered, help us to find answer for this one
____ software controls the flow of data, provides data security, and manages network operations.
Note: This Question is unanswered, help us to find answer for this one
____ is a shareware program
Answer
Correct Answer:
WinZip (file compression program
Note: This Question is unanswered, help us to find answer for this one
____ is a process that hides encrypted messages within different types of files.
Answer
Correct Answer:
Steganography
Note: This Question is unanswered, help us to find answer for this one
____ also is called looping.
Answer
Correct Answer:
Iteration
Note: This Question is unanswered, help us to find answer for this one
To insert data into an ole object field, use ____ command on the ole?s shortcut menu.
Answer
Correct Answer:
Insert Object
Note: This Question is unanswered, help us to find answer for this one
Winload loads into memory the ________________ but does not start it yet.
Note: This Question is unanswered, help us to find answer for this one
To delete data from a disk in such a way that no one can ever read it, you should ____.
Answer
Correct Answer:
Use special file shredder software
Note: This Question is unanswered, help us to find answer for this one
The four functions of the computer include input, process, output, and ________.
Note: This Question is unanswered, help us to find answer for this one
The two main categories of home and office printers are ________ and laser printers.
Note: This Question is unanswered, help us to find answer for this one
To include the total row in the design grid, click the ____ button on the design tab.
Note: This Question is unanswered, help us to find answer for this one
Usb drives can store up to ____ of data
Note: This Question is unanswered, help us to find answer for this one
The first basic step in the development process of a multimedia web site is ____.
Answer
Correct Answer:
Creating the multimedia elements
Note: This Question is unanswered, help us to find answer for this one
The characteristics of an entity are called ____.
Answer
Correct Answer:
Attributes
Note: This Question is unanswered, help us to find answer for this one
The number of bits used to store color information about each pixel is called ____.
Answer
Correct Answer:
Bit depth
Note: This Question is unanswered, help us to find answer for this one
The traditional keyboard layout is called _________.
Note: This Question is unanswered, help us to find answer for this one
Use ____ references when you want different formulas to refer to the same cell
Note: This Question is unanswered, help us to find answer for this one
When an html document includes a script, it is included the ____ section.
Note: This Question is unanswered, help us to find answer for this one
When an array is passed to a function, it is actually ________ the array that is/are passed.
Answer
Correct Answer:
A copy of all the values in
Note: This Question is unanswered, help us to find answer for this one
When an application is run, the method that must be executed first must be named ____.
Note: This Question is unanswered, help us to find answer for this one
You may use a pointer to a structure as a ________.
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
The primary input devices for smartphones are ________.
Answer
Correct Answer:
Microphone and touch pad
Note: This Question is unanswered, help us to find answer for this one
You specify 2d colors by using the ____ method.
Note: This Question is unanswered, help us to find answer for this one
When reading words using a scanner object's next method, ____.
Answer
Correct Answer:
Any characters at the beginning of the input that are considered to be white space are consumed and become part of the word being read.
Note: This Question is unanswered, help us to find answer for this one
When preparing a case, you can apply ____ to problem solving.
Answer
Correct Answer:
Standard systems analysis steps
Note: This Question is unanswered, help us to find answer for this one
Web based application software is software that ________
Answer
Correct Answer:
Is stored completely on a web server instead of your hard drive
Note: This Question is unanswered, help us to find answer for this one
Vector graphics is the use of ____ to represent images in computer graphics
Note: This Question is unanswered, help us to find answer for this one
Variety-based positioning refers to __________.
Answer
Correct Answer:
Serving few needs of many customers
Note: This Question is unanswered, help us to find answer for this one
Variety can ________ a design
Answer
Correct Answer:
Invigorate
Note: This Question is unanswered, help us to find answer for this one
Variables defined in the method header are called ________.
Answer
Correct Answer:
Formal parameters
Note: This Question is unanswered, help us to find answer for this one
Use the ________ property to configure rounded corners with css.
Answer
Correct Answer:
Border-radius
Note: This Question is unanswered, help us to find answer for this one
Unwanted or junk e-mail is called ________.
Note: This Question is unanswered, help us to find answer for this one
Unix and linux are ____ systems, which allow one user to execute more than one program at a time.
Answer
Correct Answer:
Multitasking
Note: This Question is unanswered, help us to find answer for this one
Thousands of computers working in parallel to deliver services is called a ________.
Answer
Correct Answer:
Server farm
Note: This Question is unanswered, help us to find answer for this one
This piece is entitled _______(1)_______. it is attributed to the _______(2)_______.
Answer
Correct Answer:
(1) Hunter’s Mural; (2) Freemont people
Note: This Question is unanswered, help us to find answer for this one
The way a network is designed to communicate is known as its ____.
Answer
Correct Answer:
Architecture
Note: This Question is unanswered, help us to find answer for this one
The statement, ____, removes the table smaller from a dbms.
Answer
Correct Answer:
DROP TABLE Smaller ;
Note: This Question is unanswered, help us to find answer for this one
The sql ________ statement allows you to combine two different tables.
Note: This Question is unanswered, help us to find answer for this one
The special operator used to check whether a subquery returns any rows is ____.
Note: This Question is unanswered, help us to find answer for this one
The section of an inode that stores permissions is called the ____ of the file.
Note: This Question is unanswered, help us to find answer for this one
The primary outcome of the systems analysis phase is ____.
Answer
Correct Answer:
A prioritized list of system requirements
Note: This Question is unanswered, help us to find answer for this one
The order of operations for _____________ is not first, then and, then or.
Answer
Correct Answer:
Logical operators
Note: This Question is unanswered, help us to find answer for this one
The optical _________ is the most common pointing device for desktop computers.
Note: This Question is unanswered, help us to find answer for this one
You use the ____ method to select all of the text contained in a text box.
Answer
Correct Answer:
SelectAll
Note: This Question is unanswered, help us to find answer for this one
You should use a ____ control to provide keyboard access to a list box.
Note: This Question is unanswered, help us to find answer for this one
The part of the data bus that runs between the microprocessor and ram is called the _______ bus.
Answer
Correct Answer:
Local (A)
Note: This Question is unanswered, help us to find answer for this one
When you need to sort data on two columns, the less important column is called the ____ sort key.
Note: This Question is unanswered, help us to find answer for this one
Unencrypted information is called ____.
Answer
Correct Answer:
Plain text
Note: This Question is unanswered, help us to find answer for this one
When the ________ is placed in front of a variable name, it returns the address of that variable.
Answer
Correct Answer:
Ampersand ( & )
Note: This Question is unanswered, help us to find answer for this one
When defining a variable, the keyword ____ appears at the beginning of the statement.
Note: This Question is unanswered, help us to find answer for this one
"to select and set properties for an entire section, click on the ____.
Answer
Correct Answer:
Section selector
Note: This Question is unanswered, help us to find answer for this one
When you store data records, they exist in ____.
Answer
Correct Answer:
Some type of order
Note: This Question is unanswered, help us to find answer for this one
Use the ______ value for the css display property to configure an element to not display.
Note: This Question is unanswered, help us to find answer for this one
When functions are nested, the ____ function is solved first.
Note: This Question is unanswered, help us to find answer for this one
To quit access, click the ____ button on the right side of the access title bar.
Note: This Question is unanswered, help us to find answer for this one
Podcasts enable you to ________
Answer
Correct Answer:
Deliver audio/video files via RSS
Note: This Question is unanswered, help us to find answer for this one
Only positive scenarios are validated in ___________ testing.
Answer
Correct Answer:
Build verification
Note: This Question is unanswered, help us to find answer for this one
One type of mobile phone that is not commonly used is the ____.
Answer
Correct Answer:
Satellite phone
Note: This Question is unanswered, help us to find answer for this one
One of the reasons the apple ii computer was popular was that ________.
Answer
Correct Answer:
The operating system was stored in ROM
Note: This Question is unanswered, help us to find answer for this one
One of the most common painting programs is ____.
Answer
Correct Answer:
Microsoft paint
Note: This Question is unanswered, help us to find answer for this one
In the tag, the ____ attribute indicates the type of data to be embedded.
Note: This Question is unanswered, help us to find answer for this one
In excel, the clipboard task pane opens ____ the worksheet window.
Answer
Correct Answer:
To the left of
Note: This Question is unanswered, help us to find answer for this one
If your device will not display a pdf in your browser, you may need to install a browser ________ .
Note: This Question is unanswered, help us to find answer for this one
Frequently-accessed information is held in _____.
Answer
Correct Answer:
Cache memory
Note: This Question is unanswered, help us to find answer for this one
File names cannot contain a(n) ____.
Answer
Correct Answer:
Question mark (?), colon (:)
Note: This Question is unanswered, help us to find answer for this one
Every complete c++ program must have a __________.
Answer
Correct Answer:
Function named main
Note: This Question is unanswered, help us to find answer for this one
Each device connected to a computer must have a _______.
Note: This Question is unanswered, help us to find answer for this one
Declaring a starting value for a variable is known as ____ the variable.
Answer
Correct Answer:
Initializing
Note: This Question is unanswered, help us to find answer for this one
Data files are often called ____.
Answer
Correct Answer:
Documents
Note: This Question is unanswered, help us to find answer for this one
Crt monitors use ____.
Answer
Correct Answer:
Analog signals
Note: This Question is unanswered, help us to find answer for this one
Copying a file can be accomplished using the ____ command.
Note: This Question is unanswered, help us to find answer for this one
Cookie files contain ____.
Note: This Question is unanswered, help us to find answer for this one
Computers gather data, which means that they allow users to ________ data.
Note: This Question is unanswered, help us to find answer for this one
Computers characterized by their use of vacuum tubes are considered ____-generation.
Note: This Question is unanswered, help us to find answer for this one
Computer speech recognition is _____.
Answer
Correct Answer:
Poorer than human speech recognition
Note: This Question is unanswered, help us to find answer for this one
Complete the formula for processor frequency. system bus frequency x________ = processor frequency
Answer
Correct Answer:
Multiplier
Note: This Question is unanswered, help us to find answer for this one
Complete loss of power for a moment is known as a ____.
Note: This Question is unanswered, help us to find answer for this one
Comparison shopping web sites are sometimes called ____
Answer
Correct Answer:
Shopping bots
Note: This Question is unanswered, help us to find answer for this one
Companies that deliver saas are sometimes referred to as ____.
Answer
Correct Answer:
Application service providers
Note: This Question is unanswered, help us to find answer for this one
Applications that are processed across multiple computing devices is known as a ________.
Answer
Correct Answer:
Distributed system
Note: This Question is unanswered, help us to find answer for this one
Another name for a sniffer is a(n) ________ analyzer.
Note: This Question is unanswered, help us to find answer for this one
A ________ query is used to summarize data organized by field values.
Note: This Question is unanswered, help us to find answer for this one
An electronic component that can be programmed to perform tasks is a ____.
Answer
Correct Answer:
Microprocessor
Note: This Question is unanswered, help us to find answer for this one
A(n) _____ system relies on artificial intelligence.
Note: This Question is unanswered, help us to find answer for this one
A script to handle a support incident has ____.
Answer
Correct Answer:
Several sequences of questions with multiple decision points or paths
Note: This Question is unanswered, help us to find answer for this one
A rewritable ____ is a replacement for a hard drive
Answer
Correct Answer:
None of the above
Note: This Question is unanswered, help us to find answer for this one
A program must __________ without any errors before it can be run.
Note: This Question is unanswered, help us to find answer for this one
A member function that is declared ________ may not access any non-static data members in the class
Note: This Question is unanswered, help us to find answer for this one
A file that tells a computer how to perform a specific task is called a(n) ____ file.
Answer
Correct Answer:
Executable
Note: This Question is unanswered, help us to find answer for this one
A display screen should be positioned so that it ____.
Answer
Correct Answer:
Is at a 90-degree angle to the light source
Note: This Question is unanswered, help us to find answer for this one
A dfd shows ____.
Answer
Correct Answer:
How a system transforms input data into useful information
Note: This Question is unanswered, help us to find answer for this one
A device's cache and main memory are ________.
Note: This Question is unanswered, help us to find answer for this one
A cryptographic __________ is a procedure for encryption or decryption.
Answer
Correct Answer:
Algorithm
Note: This Question is unanswered, help us to find answer for this one
A client server network is an example of ________ administration
Note: This Question is unanswered, help us to find answer for this one
A browser __________ adds features to a browser.
Answer
Correct Answer:
Extension
Note: This Question is unanswered, help us to find answer for this one
A _____ is a pathway on a circuit board through which data moves.
Note: This Question is unanswered, help us to find answer for this one
A ____ procedure returns a single value to the calling procedure.
Note: This Question is unanswered, help us to find answer for this one
A ____ is an electronic circuit
Answer
Correct Answer:
Voltage limiter
Note: This Question is unanswered, help us to find answer for this one
A ____ is a separate piece of hardware containing multiple high-speed hard drives.
Answer
Correct Answer:
Storage server
Note: This Question is unanswered, help us to find answer for this one
A ____ is a question, or, in database terms, a request for specific information from the database.
Note: This Question is unanswered, help us to find answer for this one
A ____ is a collection of computers and users that are identified by a common security database.
Note: This Question is unanswered, help us to find answer for this one
A ____ chip holds software that is used to start the computer.
Note: This Question is unanswered, help us to find answer for this one
_____, a coding method that uses one byte per character, is used on most personal computers.
Answer
Correct Answer:
ASCII (American Standard Code for Information Interchange)
Note: This Question is unanswered, help us to find answer for this one
________ is a term relating to sending data to a satellite.
Note: This Question is unanswered, help us to find answer for this one
________ are data items whose values cannot change while the program is running.
Note: This Question is unanswered, help us to find answer for this one
_______ is a tool for developing a virtual representation of any three-dimensional object.
Answer
Correct Answer:
3D modeling software
Note: This Question is unanswered, help us to find answer for this one
______ output provides the user with a physical response from the input device.
Note: This Question is unanswered, help us to find answer for this one
______ is most famous for making central processing units (cpu's).
Answer
Correct Answer:
Intel- they invented the first microprocessor
Note: This Question is unanswered, help us to find answer for this one
_____ means saving data in computer memory.
Note: This Question is unanswered, help us to find answer for this one
_____ are programs that test code to ensure that it contains no syntax errors.
Answer
Correct Answer:
Validators
Note: This Question is unanswered, help us to find answer for this one
____ variables and constants are known to the entire program.
Note: This Question is unanswered, help us to find answer for this one
____ usually involves having a software program that monitors every transaction within a system.
Answer
Correct Answer:
Computer auditing
Note: This Question is unanswered, help us to find answer for this one
____ transmissions are used with cell phones and are sent and received via cellular (cell) towers.
Answer
Correct Answer:
Cellular radio
Note: This Question is unanswered, help us to find answer for this one
____ threats are network security threats that originate from within a network.
Note: This Question is unanswered, help us to find answer for this one
____ software helps you carry out tasks using a computer, such as editing a photo.
Answer
Correct Answer:
Application
Note: This Question is unanswered, help us to find answer for this one
____ servers can store files that internet users can download, or transfer, to their computers.
Note: This Question is unanswered, help us to find answer for this one
____ occurs when data is entered into the computer.
Note: This Question is unanswered, help us to find answer for this one
____ networks use a central device to connect each device directly to the network.
Note: This Question is unanswered, help us to find answer for this one
____ is the use of networking technology to provide medical information and services.
Answer
Correct Answer:
Telemedicine
Note: This Question is unanswered, help us to find answer for this one
____ is the fastest and most current wi-fi standard.
Answer
Correct Answer:
Telemedicine
Note: This Question is unanswered, help us to find answer for this one
____ is not a valid file name.
Answer
Correct Answer:
Mary*Jon.doc
Note: This Question is unanswered, help us to find answer for this one
____ is one of the primary operations of a computer
Answer
Correct Answer:
C:Processing
Note: This Question is unanswered, help us to find answer for this one
____ is not one of the five critical questions suggested in the chapter.
Answer
Correct Answer:
How much experience do you have using this system?
Note: This Question is unanswered, help us to find answer for this one
____ is not a common source of job stress among user support workers.
Answer
Correct Answer:
All of these are common sources
Note: This Question is unanswered, help us to find answer for this one
____ is data before any encryption has been performed.
Answer
Correct Answer:
Plaintext
Note: This Question is unanswered, help us to find answer for this one
____ is an example of a web crawler.
Answer
Correct Answer:
Googlebot
Note: This Question is unanswered, help us to find answer for this one
____ is a scripting language that does not create standalone applications.
Answer
Correct Answer:
JavaScript
Note: This Question is unanswered, help us to find answer for this one
____ is a relational set operator.
Note: This Question is unanswered, help us to find answer for this one
____ is a packet-switched network that was designed for transmitting data over fixed lines.
Answer
Correct Answer:
Frame relay
Note: This Question is unanswered, help us to find answer for this one
____ help users establish a connection to another computer, mobile device, or network.
Answer
Correct Answer:
Communications software
Note: This Question is unanswered, help us to find answer for this one
____ files involves combining two or more files while maintaining the sequential order.
Note: This Question is unanswered, help us to find answer for this one
____ cookies remain available only for the current browser session.
Answer
Correct Answer:
Temporary
Note: This Question is unanswered, help us to find answer for this one
____ can tell more about a person than all other kinds of electronic surveillance.
Answer
Correct Answer:
Data mining
Note: This Question is unanswered, help us to find answer for this one
____ browsing allows you to open multiple web pages at one time.
Note: This Question is unanswered, help us to find answer for this one
____ are used to display data that is calculated from other data, such as a total.
Answer
Correct Answer:
Calculated Controls
Note: This Question is unanswered, help us to find answer for this one
____ applications require that a record be accessed immediately while a client is waiting.
Answer
Correct Answer:
Real-time
Note: This Question is unanswered, help us to find answer for this one
The statement select * from t1, t2 produces a(n) _____ join.
Note: This Question is unanswered, help us to find answer for this one
The size, or _______, is measured by the diagonal length of a monitor's viewing area.
Answer
Correct Answer:
Active display area
Note: This Question is unanswered, help us to find answer for this one
The setonaction method is defined in ________.
Answer
Correct Answer:
ButtonBase
Note: This Question is unanswered, help us to find answer for this one
The ____ file is typically saved with a prefix of inc_.
Note: This Question is unanswered, help us to find answer for this one
Suppose integer x = new integer(3); x holds ________.
Answer
Correct Answer:
A reference value to an Integer object
Note: This Question is unanswered, help us to find answer for this one
Steganalysis tools are also called ____.
Answer
Correct Answer:
Steg tools
Note: This Question is unanswered, help us to find answer for this one
Ram is an example of ____ storage
Note: This Question is unanswered, help us to find answer for this one
Pointers are variables that contain __________ as their values.
Answer
Correct Answer:
Memory addresses
Note: This Question is unanswered, help us to find answer for this one
Multiple inheritance is when a ________ class has ________ base classes.
Answer
Correct Answer:
Derived, two or more
Note: This Question is unanswered, help us to find answer for this one
Methods that set values are called ____ methods.
Note: This Question is unanswered, help us to find answer for this one
Metacognition involves a troubleshooter asking all these questions except ____.
Answer
Correct Answer:
What recent change in configuration caused the user to experience a problem?
Note: This Question is unanswered, help us to find answer for this one
Linux is an example of a(n) ______.
Answer
Correct Answer:
Operating system
Note: This Question is unanswered, help us to find answer for this one
In a helpstar dashboard, throughput measures ____.
Answer
Correct Answer:
The volume of incidents in various categories
Note: This Question is unanswered, help us to find answer for this one
If a recursive function does not contain a base case, it ________.
Answer
Correct Answer:
Uses up all available stack memory, causing the program to crash
Note: This Question is unanswered, help us to find answer for this one
Gui components have a set of ________ that determine how the component appears on the screen.
Answer
Correct Answer:
Properties
Note: This Question is unanswered, help us to find answer for this one
Function is another name for ________.
Note: This Question is unanswered, help us to find answer for this one
As with any research paper, write the ___________________ last.
Note: This Question is unanswered, help us to find answer for this one
All of the following are types of multimedia and entertainment software except ________.
Answer
Correct Answer:
Productivity software
Note: This Question is unanswered, help us to find answer for this one
All of the following are formats accepted for picture files except ____.
Note: This Question is unanswered, help us to find answer for this one
All of the following are examples of software suites except ________.
Answer
Correct Answer:
Microsoft OneNote
Note: This Question is unanswered, help us to find answer for this one
All of the following are examples of database software except ________.
Note: This Question is unanswered, help us to find answer for this one
A struct is a(n) ____________________, not a declaration.
Answer
Correct Answer:
Definition
Note: This Question is unanswered, help us to find answer for this one
A specific formula for solving a problem is called ________.
Answer
Correct Answer:
An algorithm
Note: This Question is unanswered, help us to find answer for this one
A relation is a(n) ____.
Note: This Question is unanswered, help us to find answer for this one
A join line is also called a(n) ____ line.
Note: This Question is unanswered, help us to find answer for this one
____ measures image clarity
Answer
Correct Answer:
DOT PITCH
Note: This Question is unanswered, help us to find answer for this one