Through the use of the ____ plug-in, a webpage can provide a user with an interactive experience.
Note: This Question is unanswered, help us to find answer for this one
The us anticybersquatting act makes ____ cybersquatting illegal
Answer
Correct Answer:
Domain name
Note: This Question is unanswered, help us to find answer for this one
The speed of a cpu is governed by a _____ that synchronizes all of its components.
Answer
Correct Answer:
Clock signal
Note: This Question is unanswered, help us to find answer for this one
The most popular attack toolkit, which has almost half of the attacker toolkit market is ____.
Note: This Question is unanswered, help us to find answer for this one
The maximum speed for wireless network standards is measured in ____.
Note: This Question is unanswered, help us to find answer for this one
The leftmost digit in a bit string is called the ____.
Answer
Correct Answer:
Least significant digit
Note: This Question is unanswered, help us to find answer for this one
The _________ of a monitor refers to the number of pixels that it can display on the screen.
Answer
Correct Answer:
Resolution
Note: This Question is unanswered, help us to find answer for this one
The ____ property of the location object contains a urls query or search parameters.
Note: This Question is unanswered, help us to find answer for this one
The ____ parameter can be used to make a flash window transparent.
Note: This Question is unanswered, help us to find answer for this one
The ____ has been successful in promoting legislation that protects its own content.
Note: This Question is unanswered, help us to find answer for this one
The ____ dictate the order in which operations in the same statement are carried out.
Answer
Correct Answer:
Order of operations
Note: This Question is unanswered, help us to find answer for this one
The ____ cards used with mobile phones today are a special type of smart card.
Note: This Question is unanswered, help us to find answer for this one
Rfid may replace _______ as the primary identification system for merchandise.
Answer
Correct Answer:
The bar code
Note: This Question is unanswered, help us to find answer for this one
One of the best defenses against attacks is to create ____ on a regular basis.
Answer
Correct Answer:
Data backups
Note: This Question is unanswered, help us to find answer for this one
Microsoft paint and adobe illustrator are examples of ____ software.
Note: This Question is unanswered, help us to find answer for this one
Magnetic ram (mram) uses ____ rather than an electrical charge to store data.
Answer
Correct Answer:
Magnetic polarization
Note: This Question is unanswered, help us to find answer for this one
Most packet analyzer tools can read anything captured in ____ format.
Note: This Question is unanswered, help us to find answer for this one
Most of todays processors are housed in a ____ chip package.
Note: This Question is unanswered, help us to find answer for this one
A(n) ____ operates with an electrical charge and the attraction of ink to this charge.
Answer
Correct Answer:
Laser printer
Note: This Question is unanswered, help us to find answer for this one
A wireless _________ is the device that all nodes connect to in order communicate wirelessly.
Answer
Correct Answer:
Access point
Note: This Question is unanswered, help us to find answer for this one
The proper ordering of coordinates in positions is ____.
Answer
Correct Answer:
Top, right, bottom, left
Note: This Question is unanswered, help us to find answer for this one
The ideal type of loop to use for repeating a menu is a(n) ________ loop.
Note: This Question is unanswered, help us to find answer for this one
Manipulating graphic images to perform a command has replaced the ____ user interface.
Answer
Correct Answer:
Command-based.
Note: This Question is unanswered, help us to find answer for this one
A(n) ____________________ card connects a computer to an ethernet port, for example.
Note: This Question is unanswered, help us to find answer for this one
Windows 8 uses a(n) ________ account for easy access and storage of online files.
Note: This Question is unanswered, help us to find answer for this one
Todays fast computers and ____ internet connections make web-based multimedia very feasible.
Answer
Correct Answer:
Broadband
Note: This Question is unanswered, help us to find answer for this one
To use a single image to access multiple targets, you must set up ____ within the image.
Note: This Question is unanswered, help us to find answer for this one
To clear a filter, click the ____ button on the home tab and then click clear all filters.
Note: This Question is unanswered, help us to find answer for this one
The user clicks _____ in a dialog box to provide information to an application.
Note: This Question is unanswered, help us to find answer for this one
The unicode encoding scheme is used to add support for _____ character sets.
Answer
Correct Answer:
International
Note: This Question is unanswered, help us to find answer for this one
Wireless signal range can be limited by ____.
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
To search all man pages name sections for the keyword less, you would type ______________ less.
Note: This Question is unanswered, help us to find answer for this one
To keep from overwriting existing fields with your lookup you can use the ____________ clause.
Answer
Correct Answer:
Outputnew
Note: This Question is unanswered, help us to find answer for this one
To delete a record, tap or click the record selector for the record, and then press the ____ key(s)
Note: This Question is unanswered, help us to find answer for this one
To create an action query, click the ____ button from the create tab in access 2016.
Answer
Correct Answer:
Query Design
Note: This Question is unanswered, help us to find answer for this one
To create a query string, you add a ____ immediately after a url, followed by the query string.
Note: This Question is unanswered, help us to find answer for this one
The time between a person pressing the button and the camera taking the picture is called ________.
Answer
Correct Answer:
Shutter lag
Note: This Question is unanswered, help us to find answer for this one
The first step in using the string class is to #include the ________ header file.
Note: This Question is unanswered, help us to find answer for this one
When you click the ellipsis (...) button in the settings box of the font property, ____.
Answer
Correct Answer:
A dialog box opens
Note: This Question is unanswered, help us to find answer for this one
When attackers use third-party ads to infect your computer with malware, it is called _________.
Answer
Correct Answer:
Malvertising
Note: This Question is unanswered, help us to find answer for this one
Using the ____ procedure will cause the application to pause a specific amount of time.
Note: This Question is unanswered, help us to find answer for this one
Using a preset value for the variable tested in a loop condition is a process called ____ the loop.
Note: This Question is unanswered, help us to find answer for this one
Use the __________ property to configure a minimum width for an element
Answer
Correct Answer:
Max-width
Note: This Question is unanswered, help us to find answer for this one
Use the _______ attribute on the object element to indicate the mime type of the media file.
Note: This Question is unanswered, help us to find answer for this one
Use the ____ command to rearrange parts of files on the drive so they are contiguous
Note: This Question is unanswered, help us to find answer for this one
Use ________ resolution when recording human speech in an audio file.
Note: This Question is unanswered, help us to find answer for this one
Tracing through ____ recursion is more tedious than tracing other recursive forms.
Note: This Question is unanswered, help us to find answer for this one
Tools such as microsofts ____ help to bridge different platforms and programming languages.
Answer
Correct Answer:
NET framework
Note: This Question is unanswered, help us to find answer for this one
Todays widescreen devices, such as laptops and smartphones, are designed for the 16:9 __________.
Answer
Correct Answer:
Aspect ratio
Note: This Question is unanswered, help us to find answer for this one
To verify that a solution has been closed, you can look in the ____.
Answer
Correct Answer:
Solution Explorer
Note: This Question is unanswered, help us to find answer for this one
To supplement backup procedures, businesses and other organizations should have a(n) ____.
Answer
Correct Answer:
Disaster recovery plan
Note: This Question is unanswered, help us to find answer for this one
To order the records in the account table by city in alphabetical order, use the ____ button.
Answer
Correct Answer:
Ascending
Note: This Question is unanswered, help us to find answer for this one
To move the insertion point left or right one character at a time, you would press _______.
Answer
Correct Answer:
The left or right arrow key
Note: This Question is unanswered, help us to find answer for this one
To link to a document, you must specify its ____.
Note: This Question is unanswered, help us to find answer for this one
To insert data into an ole object field, use ____ command on the oles shortcut menu.
Answer
Correct Answer:
Insert object
Note: This Question is unanswered, help us to find answer for this one
To get the number of items stored in a listbox, use the ________ property.
Answer
Correct Answer:
Items.Count
Note: This Question is unanswered, help us to find answer for this one
There are ____ main file formats involved in creating a flash video.
Note: This Question is unanswered, help us to find answer for this one
The usual sequence of incident escalation during help desk incident management is ____.
Answer
Correct Answer:
From incident screener to product specialist
Note: This Question is unanswered, help us to find answer for this one
The two most common network access methods are ____ and token ring.
Note: This Question is unanswered, help us to find answer for this one
The totality of interconnected hypertext documents became known as the _____.
Answer
Correct Answer:
​World Wide Web
Note: This Question is unanswered, help us to find answer for this one
The total zoom available on a camera is determined by digital zoom ________ optical zoom.
Answer
Correct Answer:
Multiplied by
Note: This Question is unanswered, help us to find answer for this one
The term _________________ refers to configuring a web page is optimally ranked by search engines
Answer
Correct Answer:
Search engine optimization
Note: This Question is unanswered, help us to find answer for this one
The term _____ originally referred to a particularly skilled programmer.
Note: This Question is unanswered, help us to find answer for this one
The process of finding and correcting program errors is called ____.
Answer
Correct Answer:
Debugging
Note: This Question is unanswered, help us to find answer for this one
The most popular printers for business use are ____ printers.
Answer
Correct Answer:
Dot-matrix
Note: This Question is unanswered, help us to find answer for this one
The most common type of monitor for laptops and desktop computers is a(n) ________.
Answer
Correct Answer:
Liquid crystal display (LCD)
Note: This Question is unanswered, help us to find answer for this one
The most common type of database used with personal computers today is a ____.
Answer
Correct Answer:
Relational database
Note: This Question is unanswered, help us to find answer for this one
The mac os reduces file fragmentation by using _______________.
Note: This Question is unanswered, help us to find answer for this one
The less precise way to move objects in report layout view is to ____.
Answer
Correct Answer:
Drag objects
Note: This Question is unanswered, help us to find answer for this one
The layout view or the design view may be used to create a ____ form.
Note: This Question is unanswered, help us to find answer for this one
The goal of the multi-level support model is to handle most support incidents at ____.
Answer
Correct Answer:
The lowest support level
Note: This Question is unanswered, help us to find answer for this one
The _________ element is a void element that specifies a media file and a mime type.
Note: This Question is unanswered, help us to find answer for this one
The ________ symbol indicates that some condition must be tested in a flowchart.
Note: This Question is unanswered, help us to find answer for this one
The _______ function takes only these arguments: cost, salvage, and life.
Note: This Question is unanswered, help us to find answer for this one
The _____ of a digital camera is measured in megapixels.
Answer
Correct Answer:
Resolution
Note: This Question is unanswered, help us to find answer for this one
The ____ sound file format is used primarily on unix workstations.
Note: This Question is unanswered, help us to find answer for this one
The ____ involves providing copies of the dr plan to all teams and team members for review.
Answer
Correct Answer:
DR plan desk check
Note: This Question is unanswered, help us to find answer for this one
The ____ component of an interface deals with items such as the connector or plug description.
Answer
Correct Answer:
Mechanical
Note: This Question is unanswered, help us to find answer for this one
Sub gridlines show the values between the tick marks in a chart. _________________________
Note: This Question is unanswered, help us to find answer for this one
Spam accounts for approximately ______ of all email.
Note: This Question is unanswered, help us to find answer for this one
Software such as ____ is used by both students and teachers to find plagiarism problems.
Note: This Question is unanswered, help us to find answer for this one
Software products such as microsoft office, adobe premiere, and quicken are also called ________.
Answer
Correct Answer:
Commercial off-the-shelf software
Note: This Question is unanswered, help us to find answer for this one
Software companies rely on ____ to fix problems in their programs related to bugs and flaws.
Note: This Question is unanswered, help us to find answer for this one
Smart cards and holographic drives are examples of ____ systems.
Answer
Correct Answer:
Satellite
Note: This Question is unanswered, help us to find answer for this one
Sites such as ebay are a popular target for ____.
Answer
Correct Answer:
Internet fraud
Note: This Question is unanswered, help us to find answer for this one
Services using drm technology usually include all of the following restrictions except ____.
Answer
Correct Answer:
Length of songs supported
Note: This Question is unanswered, help us to find answer for this one
Search engine ____ are pages containing content that matches your search words.
Note: This Question is unanswered, help us to find answer for this one
Sdram made its debut in 1996 on a stick called a(n) _______________.
Answer
Correct Answer:
DIMM(Dual In-line Memory Module)
Note: This Question is unanswered, help us to find answer for this one
Sas is a type of scsi that uses ______ signals to transfer data, instructions, and information.
Note: This Question is unanswered, help us to find answer for this one
One of the most common 2d barcodes, the ____ code represents data with a matrix of small squares.
Note: This Question is unanswered, help us to find answer for this one
One advantage of a dial-up connection is ____.
Note: This Question is unanswered, help us to find answer for this one
On the web, _____ are the primary way to navigate between web pages and among web sites.
Note: This Question is unanswered, help us to find answer for this one
Mp3, wma and flac are types of ______.
Answer
Correct Answer:
Digital audio formats
Note: This Question is unanswered, help us to find answer for this one
Most web designers use ____ pathnames in their hypertext links.
Note: This Question is unanswered, help us to find answer for this one
Most internal optical drives use _______________ and support the atapi standard.
Answer
Correct Answer:
Thunderbolt
Note: This Question is unanswered, help us to find answer for this one
Most hardware devices that malfunction today are ____.
Note: This Question is unanswered, help us to find answer for this one
Most digital forensic teams have a prepacked field kit, also known as a(n) ____.
Note: This Question is unanswered, help us to find answer for this one
Microsoft office online is an example of a(n) ________ productivity packages.
Note: This Question is unanswered, help us to find answer for this one
Many mobile devices include a mini- ________ port.
Note: This Question is unanswered, help us to find answer for this one
A user's first impression of a support agent comes from the ____.
Answer
Correct Answer:
Incident script used
Note: This Question is unanswered, help us to find answer for this one
A typeface in which a small ornamentation appears at the tail end of each character is _____.
Note: This Question is unanswered, help us to find answer for this one
A(n) _________ is a combination of mobile phone and handheld computer.
Answer
Correct Answer:
Smartphone
Note: This Question is unanswered, help us to find answer for this one
A(n) _____ is a computer application that contains records or files.
Note: This Question is unanswered, help us to find answer for this one
A virtual private network may include ________.
Answer
Correct Answer:
Any of these
Note: This Question is unanswered, help us to find answer for this one
A(n) ________ device facilitates file sharing and data backup.
Note: This Question is unanswered, help us to find answer for this one
A(n) ____ is a container that stores the projects and files for an entire application.
Note: This Question is unanswered, help us to find answer for this one
The principle concept in the multi-level support help desk model is ____.
Answer
Correct Answer:
Lower level help desk staff can refer difficult problems to higher levels
Note: This Question is unanswered, help us to find answer for this one
When using the box model, the _____ is always transparent.
Note: This Question is unanswered, help us to find answer for this one
The sim file structure begins with the root of the system (____).
Note: This Question is unanswered, help us to find answer for this one
The shaded space between the first and second pages of a document indicates a ____ break.
Note: This Question is unanswered, help us to find answer for this one
The saved version of a master file is the ____ file; the updated version is the child file.
Note: This Question is unanswered, help us to find answer for this one
The refs storage engine uses a __________ sort method for fast access to large data sets.
Note: This Question is unanswered, help us to find answer for this one
The reason online content cannot always be trusted is the lack of ____ on the web.
Answer
Correct Answer:
Quality control
Note: This Question is unanswered, help us to find answer for this one
The position description for the level 1 help desk agent in this chapter illustrates that ____.
Answer
Correct Answer:
Network support and user support may be combined in a single position
Note: This Question is unanswered, help us to find answer for this one
Many cities have adopted ____ technology to provide faster internet speed to their users.
Note: This Question is unanswered, help us to find answer for this one
Like shapes, you can rotate or ____ pictures using the rotate handle or the rotate button.
Note: This Question is unanswered, help us to find answer for this one
Lighting, hdmi, and thunderbolt are all types of ______.
Note: This Question is unanswered, help us to find answer for this one
A(n) ____ variable is known only within the boundaries of the method.
Note: This Question is unanswered, help us to find answer for this one
A(n) ____ is an elements numeric position within an array.
Note: This Question is unanswered, help us to find answer for this one
A(n) ____ consists of a label placed beside a small square.
Answer
Correct Answer:
Check box
Note: This Question is unanswered, help us to find answer for this one
The form wizard limits fields to be used in a form to one table or one query. ____________________
Note: This Question is unanswered, help us to find answer for this one
The six sigma approach is organized around a _______ plan known as ________.
Answer
Correct Answer:
Five step DMAIC
Note: This Question is unanswered, help us to find answer for this one
The purpose of prescreening an incident is to ____.
Answer
Correct Answer:
Determine the type of incident and how the help desk staff will handle it
Note: This Question is unanswered, help us to find answer for this one
The process of ____ is used to create an object from a class.
Answer
Correct Answer:
Instantiation
Note: This Question is unanswered, help us to find answer for this one
The prefix ____ is used for representing a quintillion.
Note: This Question is unanswered, help us to find answer for this one
Microsoft windows is installed on more than ____ of the worlds personal computers.
Note: This Question is unanswered, help us to find answer for this one
Microsoft onenote replaces physical _____, _____, and ______ with a searchable, digital notebook.
Answer
Correct Answer:
Notebooks.
Note: This Question is unanswered, help us to find answer for this one
Microsoft onenote is a __________________ app for your academic and professional life.
Answer
Correct Answer:
Notetaking
Note: This Question is unanswered, help us to find answer for this one
Many password recovery tools have a feature for generating potential lists for a ____ attack.
Answer
Correct Answer:
Password dictionary.
Note: This Question is unanswered, help us to find answer for this one
Lower range tones generally require ___ speakers.
Note: This Question is unanswered, help us to find answer for this one
Languages such as visual basic, basic, and cobol use ____ to refer to individual array elements.
Note: This Question is unanswered, help us to find answer for this one
A(n) ____ map lists the position of all hotspots within a particular image.
Note: This Question is unanswered, help us to find answer for this one
A(n) ____ decision is a decision in which two conditions must be true for an action to take place.
Note: This Question is unanswered, help us to find answer for this one
A write once, read many (worm) disc is a common type of _____.
Answer
Correct Answer:
Optical storage
Note: This Question is unanswered, help us to find answer for this one
The paragraph dialog box can be accessed from the ________ or the ________.
Answer
Correct Answer:
Home tab; Layout tab.
Note: This Question is unanswered, help us to find answer for this one
The phrase "never leave a decimal point naked" refers to ____.
Answer
Correct Answer:
Putting a zero in front of a decimal point
Note: This Question is unanswered, help us to find answer for this one
The original first-generation cell phones were ____ and designed for voice data only.
Note: This Question is unanswered, help us to find answer for this one
____ transfer printers use a ribbon that contains wax-based ink.
Note: This Question is unanswered, help us to find answer for this one
Direct internet connections are typically ____ connections.
Answer
Correct Answer:
Broadband
Note: This Question is unanswered, help us to find answer for this one
Wireless capability allows all of the following except ____.
Answer
Correct Answer:
Random sampling
Note: This Question is unanswered, help us to find answer for this one
____ creates a sense of touch by applying forces, vibration, or motion to the user
Answer
Correct Answer:
Haptronics
Note: This Question is unanswered, help us to find answer for this one
In a ____, the values of the outputs depend only on the current values of the inputs.
Note: This Question is unanswered, help us to find answer for this one
If youre sending an e-mail message from your laptop to a classmate, the laptop is the _____.
Note: This Question is unanswered, help us to find answer for this one
If you use a hexadecimal value for a color, you preface the hexadecimal string with a(n) ____.
Answer
Correct Answer:
Pound symbol
Note: This Question is unanswered, help us to find answer for this one
If you enter three values for border width, the values are applied in the order of ____.
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
If the text elements vary across paragraphs, a(n) ____ style is good to use.
Note: This Question is unanswered, help us to find answer for this one
If neither border is hidden, the style of the ____ border takes priority over the ____.
Answer
Correct Answer:
Wider, narrower
Note: This Question is unanswered, help us to find answer for this one
If borders are collapsed and either border style is hidden, the collapsed border is ____.
Note: This Question is unanswered, help us to find answer for this one
Any act or object that poses a danger to computer assets is known as a _____.
Note: This Question is unanswered, help us to find answer for this one
____ units define a font size using one of five standard units of measurement.
Note: This Question is unanswered, help us to find answer for this one
____ could set up an email account for you.
Answer
Correct Answer:
Your employer
Note: This Question is unanswered, help us to find answer for this one
Google relies on ____ to relay information related to its mapped software.
Answer
Correct Answer:
Satellites
Note: This Question is unanswered, help us to find answer for this one
Goal seek is an example of a ________ tool.
Answer
Correct Answer:
What-if analysis
Note: This Question is unanswered, help us to find answer for this one
General access to the internet via a broadband connections is made possible by _________.
Answer
Correct Answer:
Major internet service providers such as Comcast and AT&T
Note: This Question is unanswered, help us to find answer for this one
Full transparency is a scenario in which surveillance and information are ____.
Answer
Correct Answer:
Easily available to every law-abiding member of a society
Note: This Question is unanswered, help us to find answer for this one
Formulas created using the point-and-click method contain ____ references.
Note: This Question is unanswered, help us to find answer for this one
For group calculations microsoft access supports ____ built in statistics
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
Files indexed using the the upload input option get indexed _____.
Note: This Question is unanswered, help us to find answer for this one
Computer users who work at their machines for several hours a day, should ____.
Answer
Correct Answer:
Consider the use of artificial tears
Note: This Question is unanswered, help us to find answer for this one
Compressed files usually have ______ at the end of the file name.
Note: This Question is unanswered, help us to find answer for this one
Combining two or more selected cells into one cell is called ____ cells
Note: This Question is unanswered, help us to find answer for this one
A system that lets people exchange short messages while theyre online is called a(n) _____ system.
Answer
Correct Answer:
Real-time messaging
Note: This Question is unanswered, help us to find answer for this one
A system installation checklist is ____.
Answer
Correct Answer:
A tool for support specialists
Note: This Question is unanswered, help us to find answer for this one
A storage device or medium is ____ if it holds data without loss over long periods.
Answer
Correct Answer:
Nonvolatile
Note: This Question is unanswered, help us to find answer for this one
A snapshot of the system settings and configuration is called a ____.
Answer
Correct Answer:
Restore point
Note: This Question is unanswered, help us to find answer for this one
A portable media player can play files with all of the following file extensions except ________.
Note: This Question is unanswered, help us to find answer for this one
A popular encryption method used to protect data that travels over a wireless network is ____.
Note: This Question is unanswered, help us to find answer for this one
A marketing activity that can be considered a privacy risk is ____.
Answer
Correct Answer:
Electronic profiling
Note: This Question is unanswered, help us to find answer for this one
A logical structure called a(n) ____ structure is when one step follows another unconditionally.
Note: This Question is unanswered, help us to find answer for this one
A level 1 security system is used to protect _____ against unauthorized access.
Answer
Correct Answer:
Front-end servers
Note: This Question is unanswered, help us to find answer for this one
_______ is used for the design and drafting of objects, buildings, cars, etc in both 2d and 3d.
Answer
Correct Answer:
Computer aided design (CAD) software
Note: This Question is unanswered, help us to find answer for this one
_______ is keeping the same number of systems, but migrating each system to a larger system.
Answer
Correct Answer:
Scaling up
Note: This Question is unanswered, help us to find answer for this one
______ is the number of bytes (characters) a storage medium can hold.
Note: This Question is unanswered, help us to find answer for this one
_____ works on the same principle as a barcode reader but reads text instead of barcodes.
Answer
Correct Answer:
Optical Character Reader (OCR)
Note: This Question is unanswered, help us to find answer for this one
_____ software allows you to improve the look of your captured image.
Answer
Correct Answer:
Photo-editing
Note: This Question is unanswered, help us to find answer for this one
_____ server has dominated the web since 1996 because it is free and performs very efficiently.
Answer
Correct Answer:
Apache HTTP
Note: This Question is unanswered, help us to find answer for this one
The arguments in a method call are often referred to as ____.
Answer
Correct Answer:
Actual parameters
Note: This Question is unanswered, help us to find answer for this one
Ring networks use the ________ method to avoid data collisions.
Note: This Question is unanswered, help us to find answer for this one
Virtual memory is a portion of an hdd or ssd set aside as a page file or _______________ file.
Note: This Question is unanswered, help us to find answer for this one
Popular drawing programs include ____ and coreldraw
Answer
Correct Answer:
Adobe illustrator
Note: This Question is unanswered, help us to find answer for this one
An emotional health concern related to computer use is ____.
Answer
Correct Answer:
Addiction to the internet or another technology
Note: This Question is unanswered, help us to find answer for this one
A ____ uses the same wires that carry regular telephone signals into your home.
Answer
Correct Answer:
Digital subscriber line
Note: This Question is unanswered, help us to find answer for this one
Users employ ________ computers for word processing, spreadsheets, database access, and so forth.
Note: This Question is unanswered, help us to find answer for this one
Using analog-to-_____ conversion, we are able to digitize the things we see and hear.
Note: This Question is unanswered, help us to find answer for this one
The inputbox function always returns a ________ value.
Note: This Question is unanswered, help us to find answer for this one
The ________ method can be used to place a new item at any position in a listbox.
Answer
Correct Answer:
Items.Insert
Note: This Question is unanswered, help us to find answer for this one
The ____ operator is always evaluated before the or operator.
Note: This Question is unanswered, help us to find answer for this one
If you attempt to add an int, a byte, a long, and a float, the result will be a ________ value.
Note: This Question is unanswered, help us to find answer for this one
To prevent sore or stiff neck, ____.
Answer
Correct Answer:
Place the monitor directly in front of you
Note: This Question is unanswered, help us to find answer for this one
To delete unnecessary files on a hard disk, use ____________ software.
Answer
Correct Answer:
Disk cleanup
Note: This Question is unanswered, help us to find answer for this one
The standard header file for the abs(x)function is ____.
Answer
Correct Answer:
< cstdlib >
Note: This Question is unanswered, help us to find answer for this one
The rules that establish an orderly transfer of data between sender and receiver are called ____.
Answer
Correct Answer:
Protocols
Note: This Question is unanswered, help us to find answer for this one
The purpose of the ________ is to get the first input value for the validation of a loop.
Answer
Correct Answer:
Priming Read
Note: This Question is unanswered, help us to find answer for this one
The process of optimizing ram storage by borrowing hard drive space is called ________.
Answer
Correct Answer:
Virtual memory
Note: This Question is unanswered, help us to find answer for this one
The process of converting raw picture data to another format is referred to as ____.
Answer
Correct Answer:
Demosaicing
Note: This Question is unanswered, help us to find answer for this one
The keyword that is not included in a single-alternative selection is ____.
Note: This Question is unanswered, help us to find answer for this one
The code template for an event handler identifies it as a type of __________ procedure.
Note: This Question is unanswered, help us to find answer for this one
String variables are automatically initialized using ____.
Answer
Correct Answer:
The keyword Nothing (no data at all)
Note: This Question is unanswered, help us to find answer for this one
All of the following were top cybercrimes reported to the ic3 in 2013 except ________.
Answer
Correct Answer:
Theft of services
Note: This Question is unanswered, help us to find answer for this one
A(n) ________ is a small program that performs general housekeeping tasks for your computer.
Answer
Correct Answer:
Utility program
Note: This Question is unanswered, help us to find answer for this one
When a continue statement is executed in a ____, the update statement always executes.
Note: This Question is unanswered, help us to find answer for this one
Use the delete operator only on pointers that were ________.
Answer
Correct Answer:
Created with the new operator
Note: This Question is unanswered, help us to find answer for this one
The most effective fire extinguisher for computer equipment is ____.
Answer
Correct Answer:
Halon gas or a substitute
Note: This Question is unanswered, help us to find answer for this one
A ________ is the biggest power consumer on a computer.
Note: This Question is unanswered, help us to find answer for this one
With html, absolute pathnames begin with a ____.
Note: This Question is unanswered, help us to find answer for this one
You should _____ a function name in the formula autocomplete list to select the function.
Answer
Correct Answer:
Double-Click
Note: This Question is unanswered, help us to find answer for this one
You can split the worksheet window into ____ separate panes.
Answer
Correct Answer:
Two or four
Note: This Question is unanswered, help us to find answer for this one
When they have the same name, variables within ____ of a class override the classs fields.
Note: This Question is unanswered, help us to find answer for this one
Use the xnpv and xirr functions for cash flows that appear _______.
Answer
Correct Answer:
At unevenly spaced intervals
Note: This Question is unanswered, help us to find answer for this one
To show the navigation pane if it is hidden, click the ____ button.
Answer
Correct Answer:
Shutter Bar Open/Close
Note: This Question is unanswered, help us to find answer for this one
To move to the end of the document, press the ____ key(s).
Note: This Question is unanswered, help us to find answer for this one
The use of microfilm and microfiche provides all of the following advantages except ____.
Answer
Correct Answer:
They can be read without a reader
Note: This Question is unanswered, help us to find answer for this one
The simplest statement you can use to make a decision is the ____ statement.
Note: This Question is unanswered, help us to find answer for this one
The padding property uses the ____ property code.
Answer
Correct Answer:
Shorthand
Note: This Question is unanswered, help us to find answer for this one
________ a database rearranges data and objects in a database to make its size smaller.
Answer
Correct Answer:
Compacting
Note: This Question is unanswered, help us to find answer for this one
In access, table and field names can be up to ____ characters in length
Note: This Question is unanswered, help us to find answer for this one
A(n) ____ filename is the name that differentiates a file from other files in the same directory.
Note: This Question is unanswered, help us to find answer for this one
A files ____ filename includes all path information for that file.
Note: This Question is unanswered, help us to find answer for this one
Security keys are more ideal than otp generators because they're resistant to _______ attacks.
Answer
Correct Answer:
Phishing Attacks
Note: This Question is unanswered, help us to find answer for this one
A(n) _____ is bidirectional.
Answer
Correct Answer:
Relationship
Note: This Question is unanswered, help us to find answer for this one
A significant problem with priority scheduling algorithms is _____.
Answer
Correct Answer:
Starvation
Note: This Question is unanswered, help us to find answer for this one
If you see a black square when you insert a video, you can override this by setting a ____ frame.
Note: This Question is unanswered, help us to find answer for this one
Text-to-self connections are made when the reader connects something in the text to __________.
Answer
Correct Answer:
Something the reader has experienced
Note: This Question is unanswered, help us to find answer for this one
If you are going to print an iron-on t-shirt transfer, you likely will use a(n) ______ printer.
Note: This Question is unanswered, help us to find answer for this one
____ optical discs can be written to, erased, and overwritten just like magnetic hard disks.
Answer
Correct Answer:
Rewritable
Note: This Question is unanswered, help us to find answer for this one
Because a cd-r can be written on only one time, the format of these discs sometimes is called ____?
Note: This Question is unanswered, help us to find answer for this one
____ software can control which devices can be connected to an employee's computer.
Answer
Correct Answer:
Data leakage prevention
Note: This Question is unanswered, help us to find answer for this one
A ____ provides an area in the form for the user to enter data.
Note: This Question is unanswered, help us to find answer for this one
The term hard drive refers collectively to hard disks and ______.
Note: This Question is unanswered, help us to find answer for this one
When an activex component needs to be approved, a(n) _______ bar will appear.
Note: This Question is unanswered, help us to find answer for this one
Our networked society has raised a number of ____ concerns.
Answer
Correct Answer:
Software quality
Note: This Question is unanswered, help us to find answer for this one
An internet connectivity plan is also known as a ________ plan.
Note: This Question is unanswered, help us to find answer for this one
A storage medium is inserted into its corresponding ____ in order to be read from or written to.
Answer
Correct Answer:
Storage device
Note: This Question is unanswered, help us to find answer for this one
A(n) ______ drive is comparable to a cassette recorder.
Note: This Question is unanswered, help us to find answer for this one
Actions and ethics practiced on the sports field __________.
Answer
Correct Answer:
Often mirror our ethics in everyday life
Note: This Question is unanswered, help us to find answer for this one
On a linux computer, ____ contains group memberships for the local system.
Answer
Correct Answer:
/etc/group
Note: This Question is unanswered, help us to find answer for this one
One emerging type of trojan horse is called a ____-access trojan.
Note: This Question is unanswered, help us to find answer for this one
In a printer, the print ____ affects the quality of the printed output.
Answer
Correct Answer:
Resolution
Note: This Question is unanswered, help us to find answer for this one
The display device for a desktop computer is formally called a ____.
Note: This Question is unanswered, help us to find answer for this one
In ____ transmission, data can move in both directions at the same time, such as with a telephone.
Answer
Correct Answer:
Full-duplex transmission.
Note: This Question is unanswered, help us to find answer for this one
________ tools enable people to connect and exchange ideas.
Answer
Correct Answer:
Social networking
Note: This Question is unanswered, help us to find answer for this one
The majority of time on a project is usually spent on _____, as is most of the project's budget.
Answer
Correct Answer:
Execution
Note: This Question is unanswered, help us to find answer for this one
The ________ method copies the sourcearray to the targetarray.
Answer
Correct Answer:
System.arraycopy(sourceArray, 0, targetArray, 0, sourceArray.length)
Note: This Question is unanswered, help us to find answer for this one
The _____ model uses the term connectivity to label the relationship types.
Answer
Correct Answer:
Entity relationship
Note: This Question is unanswered, help us to find answer for this one
The ____ value of the display style tells the browser not the display the element.
Note: This Question is unanswered, help us to find answer for this one
The ____ statement can be used to eliminate the use of certain (flag) variables.
Note: This Question is unanswered, help us to find answer for this one
The ____ function is used to interchange the contents of two string variables.
Note: This Question is unanswered, help us to find answer for this one
A(n) ______ is a laptop computer that can convert into a tablet-like device.
Answer
Correct Answer:
2-in-1 PC
Note: This Question is unanswered, help us to find answer for this one
A(n) _____ is a common output device for hard copy.
Answer
Correct Answer:
Laser printer.
Note: This Question is unanswered, help us to find answer for this one
A supply chain driven by forecasts of consumer demand follows a ________ model.
Answer
Correct Answer:
Push-based
Note: This Question is unanswered, help us to find answer for this one
A relationship is an association between ____.
Answer
Correct Answer:
Databases.
Note: This Question is unanswered, help us to find answer for this one
If a programming language does not support ____, the language is not considered object-oriented.
Answer
Correct Answer:
Polymorphism
Note: This Question is unanswered, help us to find answer for this one
Rfm analysis is used to analyze and rank customers according to their ________.
Answer
Correct Answer:
Purchasing patterns
Note: This Question is unanswered, help us to find answer for this one
Consider the following statement: double alpha[10][5];. the number of components of alpha is ____.
Note: This Question is unanswered, help us to find answer for this one
In goal seek, the ________ box contains the formula that calculates the information you seek.
Note: This Question is unanswered, help us to find answer for this one
Email spoofing is a synonym for ________.
Note: This Question is unanswered, help us to find answer for this one
An array can easily be stepped through by using a ________.
Note: This Question is unanswered, help us to find answer for this one
A verb associating two nouns in a business rule translates to a(n) _____ in the data model.
Answer
Correct Answer:
Relationship
Note: This Question is unanswered, help us to find answer for this one
A _____ can be used as a hardware-based digital wallet.
Answer
Correct Answer:
Small phone
Note: This Question is unanswered, help us to find answer for this one
Rotating teams more frequently is an example of __________ of the game to keep things fair.
Answer
Correct Answer:
Modifying the rules
Note: This Question is unanswered, help us to find answer for this one
A(n) ______________ is an audio file distributed through downloads or feeds.
Note: This Question is unanswered, help us to find answer for this one
A file's ____ filename includes all path information for that file.
Note: This Question is unanswered, help us to find answer for this one
The ____________________ relationship is the relational database norm.
Note: This Question is unanswered, help us to find answer for this one
The ________ is adequate for searching through small arrays.
Answer
Correct Answer:
Linear search
Note: This Question is unanswered, help us to find answer for this one
____ create the menus, forms, and input screens used with a program or database.
Answer
Correct Answer:
User interface (UI) builders
Note: This Question is unanswered, help us to find answer for this one
_____ readers optically scan a set of lines to identify a product.
Note: This Question is unanswered, help us to find answer for this one
______ transmission often is called fixed wireless.
Answer
Correct Answer:
Microwave
Note: This Question is unanswered, help us to find answer for this one
_____ are essentially portable modems about the size of a usb drive.
Note: This Question is unanswered, help us to find answer for this one
A(n) _____ is something a person wants to get out of a job or that brings them job satisfaction.
Answer
Correct Answer:
Work value
Note: This Question is unanswered, help us to find answer for this one
You use ____ to view an xps file.
Answer
Correct Answer:
XPS Viewer.
Note: This Question is unanswered, help us to find answer for this one
You can set play options for a video clip with buttons in the video options group on the ____ tab.
Answer
Correct Answer:
VIDEO TOOLS PLAYBACK
Note: This Question is unanswered, help us to find answer for this one
You can change a column chart to a clustered bar chart using the ____ dialog box.
Answer
Correct Answer:
Change Chart Type
Note: This Question is unanswered, help us to find answer for this one
To open the navigation pane, tap or click the ____ button.
Answer
Correct Answer:
Shutter Bar Open/Close
Note: This Question is unanswered, help us to find answer for this one
Regardless of the algorithm being used, a search through an array is always performed ________.
Answer
Correct Answer:
None of these
Note: This Question is unanswered, help us to find answer for this one
If you want to conserve ink or toner, you can instruct powerpoint to print ____ documents.
Answer
Correct Answer:
Standard quality
Note: This Question is unanswered, help us to find answer for this one
Css supports styles to define both the text and ______ color for each element on your page.
Answer
Correct Answer:
Background
Note: This Question is unanswered, help us to find answer for this one
An operating system's ____ capability supports a division of labor among all the processing units.
Answer
Correct Answer:
Multiprocessing
Note: This Question is unanswered, help us to find answer for this one
An array's size declarator must be a(n)________ with a value greater than ________.
Answer
Correct Answer:
Constant integer expression
Note: This Question is unanswered, help us to find answer for this one
Transmission speeds are expressed in _______, whereas storage space is expressed in _______.
Answer
Correct Answer:
Bits, bytes
Note: This Question is unanswered, help us to find answer for this one
To eliminate the space between table cells, use the ___________ property.
Answer
Correct Answer:
Border-spacing: 0;
Note: This Question is unanswered, help us to find answer for this one
Less than (<), greater than (>), and not (not equal to) are examples of ____.
Answer
Correct Answer:
Comparison operators
Note: This Question is unanswered, help us to find answer for this one
It is common practice to use a ________ variable as a size declarator.