Note: This Question is unanswered, help us to find answer for this one
104. Through the use of the ____ plug-in, a webpage can provide a user with an interactive experience.
Note: This Question is unanswered, help us to find answer for this one
105. The us anticybersquatting act makes ____ cybersquatting illegal
Answer
Correct Answer:
Domain name
Note: This Question is unanswered, help us to find answer for this one
106. The speed of a cpu is governed by a _____ that synchronizes all of its components.
Answer
Correct Answer:
Clock signal
Note: This Question is unanswered, help us to find answer for this one
107. The most popular attack toolkit, which has almost half of the attacker toolkit market is ____.
Note: This Question is unanswered, help us to find answer for this one
108. The maximum speed for wireless network standards is measured in ____.
Note: This Question is unanswered, help us to find answer for this one
109. The leftmost digit in a bit string is called the ____.
Answer
Correct Answer:
Least significant digit
Note: This Question is unanswered, help us to find answer for this one
110. The _________ of a monitor refers to the number of pixels that it can display on the screen.
Answer
Correct Answer:
Resolution
Note: This Question is unanswered, help us to find answer for this one
111. The ____ property of the location object contains a urls query or search parameters.
Note: This Question is unanswered, help us to find answer for this one
112. The ____ parameter can be used to make a flash window transparent.
Note: This Question is unanswered, help us to find answer for this one
113. The ____ has been successful in promoting legislation that protects its own content.
Note: This Question is unanswered, help us to find answer for this one
114. The ____ dictate the order in which operations in the same statement are carried out.
Answer
Correct Answer:
Order of operations
Note: This Question is unanswered, help us to find answer for this one
115. The ____ cards used with mobile phones today are a special type of smart card.
Note: This Question is unanswered, help us to find answer for this one
116. Rfid may replace _______ as the primary identification system for merchandise.
Answer
Correct Answer:
The bar code
Note: This Question is unanswered, help us to find answer for this one
117. One of the best defenses against attacks is to create ____ on a regular basis.
Answer
Correct Answer:
Data backups
Note: This Question is unanswered, help us to find answer for this one
118. Microsoft paint and adobe illustrator are examples of ____ software.
Note: This Question is unanswered, help us to find answer for this one
119. Magnetic ram (mram) uses ____ rather than an electrical charge to store data.
Answer
Correct Answer:
Magnetic polarization
Note: This Question is unanswered, help us to find answer for this one
120. Most packet analyzer tools can read anything captured in ____ format.
Note: This Question is unanswered, help us to find answer for this one
121. Most of todays processors are housed in a ____ chip package.
Note: This Question is unanswered, help us to find answer for this one
122. A(n) ____ operates with an electrical charge and the attraction of ink to this charge.
Answer
Correct Answer:
Laser printer
Note: This Question is unanswered, help us to find answer for this one
123. A wireless _________ is the device that all nodes connect to in order communicate wirelessly.
Answer
Correct Answer:
Access point
Note: This Question is unanswered, help us to find answer for this one
124. The proper ordering of coordinates in positions is ____.
Answer
Correct Answer:
Top, right, bottom, left
Note: This Question is unanswered, help us to find answer for this one
125. The ideal type of loop to use for repeating a menu is a(n) ________ loop.
Note: This Question is unanswered, help us to find answer for this one
126. Manipulating graphic images to perform a command has replaced the ____ user interface.
Answer
Correct Answer:
Command-based.
Note: This Question is unanswered, help us to find answer for this one
127. A(n) ____________________ card connects a computer to an ethernet port, for example.
Note: This Question is unanswered, help us to find answer for this one
128. Windows 8 uses a(n) ________ account for easy access and storage of online files.
Note: This Question is unanswered, help us to find answer for this one
129. Todays fast computers and ____ internet connections make web-based multimedia very feasible.
Answer
Correct Answer:
Broadband
Note: This Question is unanswered, help us to find answer for this one
130. To use a single image to access multiple targets, you must set up ____ within the image.
Note: This Question is unanswered, help us to find answer for this one
131. To clear a filter, click the ____ button on the home tab and then click clear all filters.
Note: This Question is unanswered, help us to find answer for this one
132. The user clicks _____ in a dialog box to provide information to an application.
Note: This Question is unanswered, help us to find answer for this one
133. The unicode encoding scheme is used to add support for _____ character sets.
Answer
Correct Answer:
International
Note: This Question is unanswered, help us to find answer for this one
134. Wireless signal range can be limited by ____.
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
135. To search all man pages name sections for the keyword less, you would type ______________ less.
Note: This Question is unanswered, help us to find answer for this one
136. To keep from overwriting existing fields with your lookup you can use the ____________ clause.
Answer
Correct Answer:
Outputnew
Note: This Question is unanswered, help us to find answer for this one
137. To delete a record, tap or click the record selector for the record, and then press the ____ key(s)
Note: This Question is unanswered, help us to find answer for this one
138. To create an action query, click the ____ button from the create tab in access 2016.
Answer
Correct Answer:
Query Design
Note: This Question is unanswered, help us to find answer for this one
139. To create a query string, you add a ____ immediately after a url, followed by the query string.
Note: This Question is unanswered, help us to find answer for this one
140. The time between a person pressing the button and the camera taking the picture is called ________.
Answer
Correct Answer:
Shutter lag
Note: This Question is unanswered, help us to find answer for this one
141. The first step in using the string class is to #include the ________ header file.
Note: This Question is unanswered, help us to find answer for this one
142. When you click the ellipsis (...) button in the settings box of the font property, ____.
Answer
Correct Answer:
A dialog box opens
Note: This Question is unanswered, help us to find answer for this one
143. When attackers use third-party ads to infect your computer with malware, it is called _________.
Answer
Correct Answer:
Malvertising
Note: This Question is unanswered, help us to find answer for this one
144. Using the ____ procedure will cause the application to pause a specific amount of time.
Note: This Question is unanswered, help us to find answer for this one
145. Using a preset value for the variable tested in a loop condition is a process called ____ the loop.
Note: This Question is unanswered, help us to find answer for this one
146. Use the __________ property to configure a minimum width for an element
Answer
Correct Answer:
Max-width
Note: This Question is unanswered, help us to find answer for this one
147. Use the _______ attribute on the object element to indicate the mime type of the media file.
Note: This Question is unanswered, help us to find answer for this one
148. Use the ____ command to rearrange parts of files on the drive so they are contiguous
Note: This Question is unanswered, help us to find answer for this one
149. Use ________ resolution when recording human speech in an audio file.
Note: This Question is unanswered, help us to find answer for this one
150. Tracing through ____ recursion is more tedious than tracing other recursive forms.
Note: This Question is unanswered, help us to find answer for this one
151. Tools such as microsofts ____ help to bridge different platforms and programming languages.
Answer
Correct Answer:
NET framework
Note: This Question is unanswered, help us to find answer for this one
152. Todays widescreen devices, such as laptops and smartphones, are designed for the 16:9 __________.
Answer
Correct Answer:
Aspect ratio
Note: This Question is unanswered, help us to find answer for this one
153. To verify that a solution has been closed, you can look in the ____.
Answer
Correct Answer:
Solution Explorer
Note: This Question is unanswered, help us to find answer for this one
154. To supplement backup procedures, businesses and other organizations should have a(n) ____.
Answer
Correct Answer:
Disaster recovery plan
Note: This Question is unanswered, help us to find answer for this one
155. To order the records in the account table by city in alphabetical order, use the ____ button.
Answer
Correct Answer:
Ascending
Note: This Question is unanswered, help us to find answer for this one
156. To move the insertion point left or right one character at a time, you would press _______.
Answer
Correct Answer:
The left or right arrow key
Note: This Question is unanswered, help us to find answer for this one
157. To link to a document, you must specify its ____.
Note: This Question is unanswered, help us to find answer for this one
158. To insert data into an ole object field, use ____ command on the oles shortcut menu.
Answer
Correct Answer:
Insert object
Note: This Question is unanswered, help us to find answer for this one
159. To get the number of items stored in a listbox, use the ________ property.
Answer
Correct Answer:
Items.Count
Note: This Question is unanswered, help us to find answer for this one
160. There are ____ main file formats involved in creating a flash video.
Note: This Question is unanswered, help us to find answer for this one
161. The usual sequence of incident escalation during help desk incident management is ____.
Answer
Correct Answer:
From incident screener to product specialist
Note: This Question is unanswered, help us to find answer for this one
162. The two most common network access methods are ____ and token ring.
Note: This Question is unanswered, help us to find answer for this one
163. The totality of interconnected hypertext documents became known as the _____.
Answer
Correct Answer:
World Wide Web
Note: This Question is unanswered, help us to find answer for this one
164. The total zoom available on a camera is determined by digital zoom ________ optical zoom.
Answer
Correct Answer:
Multiplied by
Note: This Question is unanswered, help us to find answer for this one
165. The term _________________ refers to configuring a web page is optimally ranked by search engines
Answer
Correct Answer:
Search engine optimization
Note: This Question is unanswered, help us to find answer for this one
166. The term _____ originally referred to a particularly skilled programmer.
Note: This Question is unanswered, help us to find answer for this one
167. The process of finding and correcting program errors is called ____.
Answer
Correct Answer:
Debugging
Note: This Question is unanswered, help us to find answer for this one
168. The most popular printers for business use are ____ printers.
Answer
Correct Answer:
Dot-matrix
Note: This Question is unanswered, help us to find answer for this one
169. The most common type of monitor for laptops and desktop computers is a(n) ________.
Answer
Correct Answer:
Liquid crystal display (LCD)
Note: This Question is unanswered, help us to find answer for this one
170. The most common type of database used with personal computers today is a ____.
Answer
Correct Answer:
Relational database
Note: This Question is unanswered, help us to find answer for this one
171. The mac os reduces file fragmentation by using _______________.
Note: This Question is unanswered, help us to find answer for this one
172. The less precise way to move objects in report layout view is to ____.
Answer
Correct Answer:
Drag objects
Note: This Question is unanswered, help us to find answer for this one
173. The layout view or the design view may be used to create a ____ form.
Note: This Question is unanswered, help us to find answer for this one
174. The goal of the multi-level support model is to handle most support incidents at ____.
Answer
Correct Answer:
The lowest support level
Note: This Question is unanswered, help us to find answer for this one
175. The _________ element is a void element that specifies a media file and a mime type.
Note: This Question is unanswered, help us to find answer for this one
176. The ________ symbol indicates that some condition must be tested in a flowchart.
Note: This Question is unanswered, help us to find answer for this one
177. The _______ function takes only these arguments: cost, salvage, and life.
Note: This Question is unanswered, help us to find answer for this one
178. The _____ of a digital camera is measured in megapixels.
Answer
Correct Answer:
Resolution
Note: This Question is unanswered, help us to find answer for this one
179. The ____ sound file format is used primarily on unix workstations.
Note: This Question is unanswered, help us to find answer for this one
180. The ____ involves providing copies of the dr plan to all teams and team members for review.
Answer
Correct Answer:
DR plan desk check
Note: This Question is unanswered, help us to find answer for this one
181. The ____ component of an interface deals with items such as the connector or plug description.
Answer
Correct Answer:
Mechanical
Note: This Question is unanswered, help us to find answer for this one
182. Sub gridlines show the values between the tick marks in a chart. _________________________
Note: This Question is unanswered, help us to find answer for this one
183. Spam accounts for approximately ______ of all email.
Note: This Question is unanswered, help us to find answer for this one
184. Software such as ____ is used by both students and teachers to find plagiarism problems.
Note: This Question is unanswered, help us to find answer for this one
185. Software products such as microsoft office, adobe premiere, and quicken are also called ________.
Answer
Correct Answer:
Commercial off-the-shelf software
Note: This Question is unanswered, help us to find answer for this one
186. Software companies rely on ____ to fix problems in their programs related to bugs and flaws.
Note: This Question is unanswered, help us to find answer for this one
187. Smart cards and holographic drives are examples of ____ systems.
Answer
Correct Answer:
Satellite
Note: This Question is unanswered, help us to find answer for this one
188. Sites such as ebay are a popular target for ____.
Answer
Correct Answer:
Internet fraud
Note: This Question is unanswered, help us to find answer for this one
189. Services using drm technology usually include all of the following restrictions except ____.
Answer
Correct Answer:
Length of songs supported
Note: This Question is unanswered, help us to find answer for this one
190. Search engine ____ are pages containing content that matches your search words.
Note: This Question is unanswered, help us to find answer for this one
191. Sdram made its debut in 1996 on a stick called a(n) _______________.
Answer
Correct Answer:
DIMM(Dual In-line Memory Module)
Note: This Question is unanswered, help us to find answer for this one
192. Sas is a type of scsi that uses ______ signals to transfer data, instructions, and information.
Note: This Question is unanswered, help us to find answer for this one
193. One of the most common 2d barcodes, the ____ code represents data with a matrix of small squares.
Note: This Question is unanswered, help us to find answer for this one
194. One advantage of a dial-up connection is ____.
Note: This Question is unanswered, help us to find answer for this one
195. On the web, _____ are the primary way to navigate between web pages and among web sites.
Note: This Question is unanswered, help us to find answer for this one
196. Mp3, wma and flac are types of ______.
Answer
Correct Answer:
Digital audio formats
Note: This Question is unanswered, help us to find answer for this one
197. Most web designers use ____ pathnames in their hypertext links.
Note: This Question is unanswered, help us to find answer for this one
198. Most internal optical drives use _______________ and support the atapi standard.
Answer
Correct Answer:
Thunderbolt
Note: This Question is unanswered, help us to find answer for this one
199. Most hardware devices that malfunction today are ____.
Note: This Question is unanswered, help us to find answer for this one
200. Most digital forensic teams have a prepacked field kit, also known as a(n) ____.
Note: This Question is unanswered, help us to find answer for this one
201. Microsoft office online is an example of a(n) ________ productivity packages.
Note: This Question is unanswered, help us to find answer for this one
202. Many mobile devices include a mini- ________ port.
Note: This Question is unanswered, help us to find answer for this one
203. A user's first impression of a support agent comes from the ____.
Answer
Correct Answer:
Incident script used
Note: This Question is unanswered, help us to find answer for this one
204. A typeface in which a small ornamentation appears at the tail end of each character is _____.
Note: This Question is unanswered, help us to find answer for this one
205. A(n) _________ is a combination of mobile phone and handheld computer.
Answer
Correct Answer:
Smartphone
Note: This Question is unanswered, help us to find answer for this one
206. A(n) _____ is a computer application that contains records or files.
Note: This Question is unanswered, help us to find answer for this one
207. A virtual private network may include ________.
Answer
Correct Answer:
Any of these
Note: This Question is unanswered, help us to find answer for this one
208. A(n) ________ device facilitates file sharing and data backup.
Note: This Question is unanswered, help us to find answer for this one
209. A(n) ____ is a container that stores the projects and files for an entire application.
Note: This Question is unanswered, help us to find answer for this one
210. The principle concept in the multi-level support help desk model is ____.
Answer
Correct Answer:
Lower level help desk staff can refer difficult problems to higher levels
Note: This Question is unanswered, help us to find answer for this one
211. When using the box model, the _____ is always transparent.
Note: This Question is unanswered, help us to find answer for this one
212. The sim file structure begins with the root of the system (____).
Note: This Question is unanswered, help us to find answer for this one
213. The shaded space between the first and second pages of a document indicates a ____ break.
Note: This Question is unanswered, help us to find answer for this one
214. The saved version of a master file is the ____ file; the updated version is the child file.
Note: This Question is unanswered, help us to find answer for this one
215. The refs storage engine uses a __________ sort method for fast access to large data sets.
Note: This Question is unanswered, help us to find answer for this one
216. The reason online content cannot always be trusted is the lack of ____ on the web.
Answer
Correct Answer:
Quality control
Note: This Question is unanswered, help us to find answer for this one
217. The position description for the level 1 help desk agent in this chapter illustrates that ____.
Answer
Correct Answer:
Network support and user support may be combined in a single position
Note: This Question is unanswered, help us to find answer for this one
218. Many cities have adopted ____ technology to provide faster internet speed to their users.
Note: This Question is unanswered, help us to find answer for this one
219. Like shapes, you can rotate or ____ pictures using the rotate handle or the rotate button.
Note: This Question is unanswered, help us to find answer for this one
220. Lighting, hdmi, and thunderbolt are all types of ______.
Note: This Question is unanswered, help us to find answer for this one
221. A(n) ____ variable is known only within the boundaries of the method.
Note: This Question is unanswered, help us to find answer for this one
222. A(n) ____ is an elements numeric position within an array.
Note: This Question is unanswered, help us to find answer for this one
223. A(n) ____ consists of a label placed beside a small square.
Answer
Correct Answer:
Check box
Note: This Question is unanswered, help us to find answer for this one
224. The form wizard limits fields to be used in a form to one table or one query. ____________________
Note: This Question is unanswered, help us to find answer for this one
225. The six sigma approach is organized around a _______ plan known as ________.
Answer
Correct Answer:
Five step DMAIC
Note: This Question is unanswered, help us to find answer for this one
226. The purpose of prescreening an incident is to ____.
Answer
Correct Answer:
Determine the type of incident and how the help desk staff will handle it
Note: This Question is unanswered, help us to find answer for this one
227. The process of ____ is used to create an object from a class.
Answer
Correct Answer:
Instantiation
Note: This Question is unanswered, help us to find answer for this one
228. The prefix ____ is used for representing a quintillion.
Note: This Question is unanswered, help us to find answer for this one
229. Microsoft windows is installed on more than ____ of the worlds personal computers.
Note: This Question is unanswered, help us to find answer for this one
230. Microsoft onenote replaces physical _____, _____, and ______ with a searchable, digital notebook.
Answer
Correct Answer:
Notebooks.
Note: This Question is unanswered, help us to find answer for this one
231. Microsoft onenote is a __________________ app for your academic and professional life.
Answer
Correct Answer:
Notetaking
Note: This Question is unanswered, help us to find answer for this one
232. Many password recovery tools have a feature for generating potential lists for a ____ attack.
Answer
Correct Answer:
Password dictionary.
Note: This Question is unanswered, help us to find answer for this one
233. Lower range tones generally require ___ speakers.
Note: This Question is unanswered, help us to find answer for this one
234. Languages such as visual basic, basic, and cobol use ____ to refer to individual array elements.
Note: This Question is unanswered, help us to find answer for this one
235. A(n) ____ map lists the position of all hotspots within a particular image.
Note: This Question is unanswered, help us to find answer for this one
236. A(n) ____ decision is a decision in which two conditions must be true for an action to take place.
Note: This Question is unanswered, help us to find answer for this one
237. A write once, read many (worm) disc is a common type of _____.
Answer
Correct Answer:
Optical storage
Note: This Question is unanswered, help us to find answer for this one
238. The paragraph dialog box can be accessed from the ________ or the ________.
Answer
Correct Answer:
Home tab; Layout tab.
Note: This Question is unanswered, help us to find answer for this one
239. The phrase "never leave a decimal point naked" refers to ____.
Answer
Correct Answer:
Putting a zero in front of a decimal point
Note: This Question is unanswered, help us to find answer for this one
240. The original first-generation cell phones were ____ and designed for voice data only.
Note: This Question is unanswered, help us to find answer for this one
241. ____ transfer printers use a ribbon that contains wax-based ink.
Note: This Question is unanswered, help us to find answer for this one
242. Direct internet connections are typically ____ connections.
Answer
Correct Answer:
Broadband
Note: This Question is unanswered, help us to find answer for this one
243. Wireless capability allows all of the following except ____.
Answer
Correct Answer:
Random sampling
Note: This Question is unanswered, help us to find answer for this one
244. ____ creates a sense of touch by applying forces, vibration, or motion to the user
Answer
Correct Answer:
Haptronics
Note: This Question is unanswered, help us to find answer for this one
245. In a ____, the values of the outputs depend only on the current values of the inputs.
Note: This Question is unanswered, help us to find answer for this one
246. If youre sending an e-mail message from your laptop to a classmate, the laptop is the _____.
Note: This Question is unanswered, help us to find answer for this one
247. If you use a hexadecimal value for a color, you preface the hexadecimal string with a(n) ____.
Answer
Correct Answer:
Pound symbol
Note: This Question is unanswered, help us to find answer for this one
248. If you enter three values for border width, the values are applied in the order of ____.
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
249. If the text elements vary across paragraphs, a(n) ____ style is good to use.
Note: This Question is unanswered, help us to find answer for this one
250. If neither border is hidden, the style of the ____ border takes priority over the ____.
Answer
Correct Answer:
Wider, narrower
Note: This Question is unanswered, help us to find answer for this one
251. If borders are collapsed and either border style is hidden, the collapsed border is ____.
Note: This Question is unanswered, help us to find answer for this one
252. Any act or object that poses a danger to computer assets is known as a _____.
Note: This Question is unanswered, help us to find answer for this one
253. ____ units define a font size using one of five standard units of measurement.
Note: This Question is unanswered, help us to find answer for this one
254. ____ could set up an email account for you.
Answer
Correct Answer:
Your employer
Note: This Question is unanswered, help us to find answer for this one
255. Google relies on ____ to relay information related to its mapped software.
Answer
Correct Answer:
Satellites
Note: This Question is unanswered, help us to find answer for this one
256. Goal seek is an example of a ________ tool.
Answer
Correct Answer:
What-if analysis
Note: This Question is unanswered, help us to find answer for this one
257. General access to the internet via a broadband connections is made possible by _________.
Answer
Correct Answer:
Major internet service providers such as Comcast and AT&T
Note: This Question is unanswered, help us to find answer for this one
258. Full transparency is a scenario in which surveillance and information are ____.
Answer
Correct Answer:
Easily available to every law-abiding member of a society
Note: This Question is unanswered, help us to find answer for this one
259. Formulas created using the point-and-click method contain ____ references.
Note: This Question is unanswered, help us to find answer for this one
260. For group calculations microsoft access supports ____ built in statistics
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
261. Files indexed using the the upload input option get indexed _____.
Note: This Question is unanswered, help us to find answer for this one
262. Computer users who work at their machines for several hours a day, should ____.
Answer
Correct Answer:
Consider the use of artificial tears
Note: This Question is unanswered, help us to find answer for this one
263. Compressed files usually have ______ at the end of the file name.
Note: This Question is unanswered, help us to find answer for this one
264. Combining two or more selected cells into one cell is called ____ cells
Note: This Question is unanswered, help us to find answer for this one
265. A system that lets people exchange short messages while theyre online is called a(n) _____ system.
Answer
Correct Answer:
Real-time messaging
Note: This Question is unanswered, help us to find answer for this one
266. A system installation checklist is ____.
Answer
Correct Answer:
A tool for support specialists
Note: This Question is unanswered, help us to find answer for this one
267. A storage device or medium is ____ if it holds data without loss over long periods.
Answer
Correct Answer:
Nonvolatile
Note: This Question is unanswered, help us to find answer for this one
268. A snapshot of the system settings and configuration is called a ____.
Answer
Correct Answer:
Restore point
Note: This Question is unanswered, help us to find answer for this one
269. A portable media player can play files with all of the following file extensions except ________.
Note: This Question is unanswered, help us to find answer for this one
270. A popular encryption method used to protect data that travels over a wireless network is ____.
Note: This Question is unanswered, help us to find answer for this one
271. A marketing activity that can be considered a privacy risk is ____.
Answer
Correct Answer:
Electronic profiling
Note: This Question is unanswered, help us to find answer for this one
272. A logical structure called a(n) ____ structure is when one step follows another unconditionally.
Note: This Question is unanswered, help us to find answer for this one
273. A level 1 security system is used to protect _____ against unauthorized access.
Answer
Correct Answer:
Front-end servers
Note: This Question is unanswered, help us to find answer for this one
274. _______ is used for the design and drafting of objects, buildings, cars, etc in both 2d and 3d.
Answer
Correct Answer:
Computer aided design (CAD) software
Note: This Question is unanswered, help us to find answer for this one
275. _______ is keeping the same number of systems, but migrating each system to a larger system.
Answer
Correct Answer:
Scaling up
Note: This Question is unanswered, help us to find answer for this one
276. ______ is the number of bytes (characters) a storage medium can hold.
Note: This Question is unanswered, help us to find answer for this one
277. _____ works on the same principle as a barcode reader but reads text instead of barcodes.
Answer
Correct Answer:
Optical Character Reader (OCR)
Note: This Question is unanswered, help us to find answer for this one
278. _____ software allows you to improve the look of your captured image.
Answer
Correct Answer:
Photo-editing
Note: This Question is unanswered, help us to find answer for this one
279. _____ server has dominated the web since 1996 because it is free and performs very efficiently.
Answer
Correct Answer:
Apache HTTP
Note: This Question is unanswered, help us to find answer for this one
280. The arguments in a method call are often referred to as ____.
Answer
Correct Answer:
Actual parameters
Note: This Question is unanswered, help us to find answer for this one
281. Ring networks use the ________ method to avoid data collisions.
Note: This Question is unanswered, help us to find answer for this one
282. Virtual memory is a portion of an hdd or ssd set aside as a page file or _______________ file.
Note: This Question is unanswered, help us to find answer for this one
283. Popular drawing programs include ____ and coreldraw
Answer
Correct Answer:
Adobe illustrator
Note: This Question is unanswered, help us to find answer for this one
284. An emotional health concern related to computer use is ____.
Answer
Correct Answer:
Addiction to the internet or another technology
Note: This Question is unanswered, help us to find answer for this one
285. A ____ uses the same wires that carry regular telephone signals into your home.
Answer
Correct Answer:
Digital subscriber line
Note: This Question is unanswered, help us to find answer for this one
286. Users employ ________ computers for word processing, spreadsheets, database access, and so forth.
Note: This Question is unanswered, help us to find answer for this one
287. Using analog-to-_____ conversion, we are able to digitize the things we see and hear.
Note: This Question is unanswered, help us to find answer for this one
288. The inputbox function always returns a ________ value.
Note: This Question is unanswered, help us to find answer for this one
289. The ________ method can be used to place a new item at any position in a listbox.
Answer
Correct Answer:
Items.Insert
Note: This Question is unanswered, help us to find answer for this one
290. The ____ operator is always evaluated before the or operator.
Note: This Question is unanswered, help us to find answer for this one
291. If you attempt to add an int, a byte, a long, and a float, the result will be a ________ value.
Note: This Question is unanswered, help us to find answer for this one
292. To prevent sore or stiff neck, ____.
Answer
Correct Answer:
Place the monitor directly in front of you
Note: This Question is unanswered, help us to find answer for this one
293. To delete unnecessary files on a hard disk, use ____________ software.
Answer
Correct Answer:
Disk cleanup
Note: This Question is unanswered, help us to find answer for this one
294. The standard header file for the abs(x)function is ____.
Answer
Correct Answer:
< cstdlib >
Note: This Question is unanswered, help us to find answer for this one
295. The rules that establish an orderly transfer of data between sender and receiver are called ____.
Answer
Correct Answer:
Protocols
Note: This Question is unanswered, help us to find answer for this one
296. The purpose of the ________ is to get the first input value for the validation of a loop.
Answer
Correct Answer:
Priming Read
Note: This Question is unanswered, help us to find answer for this one
297. The process of optimizing ram storage by borrowing hard drive space is called ________.
Answer
Correct Answer:
Virtual memory
Note: This Question is unanswered, help us to find answer for this one
298. The process of converting raw picture data to another format is referred to as ____.
Answer
Correct Answer:
Demosaicing
Note: This Question is unanswered, help us to find answer for this one
299. The keyword that is not included in a single-alternative selection is ____.
Note: This Question is unanswered, help us to find answer for this one
300. The code template for an event handler identifies it as a type of __________ procedure.
Note: This Question is unanswered, help us to find answer for this one
301. String variables are automatically initialized using ____.
Answer
Correct Answer:
The keyword Nothing (no data at all)
Note: This Question is unanswered, help us to find answer for this one
302. All of the following were top cybercrimes reported to the ic3 in 2013 except ________.
Answer
Correct Answer:
Theft of services
Note: This Question is unanswered, help us to find answer for this one
303. A(n) ________ is a small program that performs general housekeeping tasks for your computer.
Answer
Correct Answer:
Utility program
Note: This Question is unanswered, help us to find answer for this one
304. When a continue statement is executed in a ____, the update statement always executes.
Note: This Question is unanswered, help us to find answer for this one
305. Use the delete operator only on pointers that were ________.
Answer
Correct Answer:
Created with the new operator
Note: This Question is unanswered, help us to find answer for this one
306. The most effective fire extinguisher for computer equipment is ____.
Answer
Correct Answer:
Halon gas or a substitute
Note: This Question is unanswered, help us to find answer for this one
307. A ________ is the biggest power consumer on a computer.
Note: This Question is unanswered, help us to find answer for this one
308. With html, absolute pathnames begin with a ____.
Note: This Question is unanswered, help us to find answer for this one
309. You should _____ a function name in the formula autocomplete list to select the function.
Answer
Correct Answer:
Double-Click
Note: This Question is unanswered, help us to find answer for this one
310. You can split the worksheet window into ____ separate panes.
Answer
Correct Answer:
Two or four
Note: This Question is unanswered, help us to find answer for this one
311. When they have the same name, variables within ____ of a class override the classs fields.
Note: This Question is unanswered, help us to find answer for this one
312. Use the xnpv and xirr functions for cash flows that appear _______.
Answer
Correct Answer:
At unevenly spaced intervals
Note: This Question is unanswered, help us to find answer for this one
313. To show the navigation pane if it is hidden, click the ____ button.
Answer
Correct Answer:
Shutter Bar Open/Close
Note: This Question is unanswered, help us to find answer for this one
314. To move to the end of the document, press the ____ key(s).
Note: This Question is unanswered, help us to find answer for this one
315. The use of microfilm and microfiche provides all of the following advantages except ____.
Answer
Correct Answer:
They can be read without a reader
Note: This Question is unanswered, help us to find answer for this one
316. The simplest statement you can use to make a decision is the ____ statement.
Note: This Question is unanswered, help us to find answer for this one
317. The padding property uses the ____ property code.
Answer
Correct Answer:
Shorthand
Note: This Question is unanswered, help us to find answer for this one
318. ________ a database rearranges data and objects in a database to make its size smaller.
Answer
Correct Answer:
Compacting
Note: This Question is unanswered, help us to find answer for this one
319. In access, table and field names can be up to ____ characters in length
Note: This Question is unanswered, help us to find answer for this one
320. A(n) ____ filename is the name that differentiates a file from other files in the same directory.
Note: This Question is unanswered, help us to find answer for this one
321. A files ____ filename includes all path information for that file.
Note: This Question is unanswered, help us to find answer for this one
322. Security keys are more ideal than otp generators because they're resistant to _______ attacks.
Answer
Correct Answer:
Phishing Attacks
Note: This Question is unanswered, help us to find answer for this one
323. A(n) _____ is bidirectional.
Answer
Correct Answer:
Relationship
Note: This Question is unanswered, help us to find answer for this one
324. A significant problem with priority scheduling algorithms is _____.
Answer
Correct Answer:
Starvation
Note: This Question is unanswered, help us to find answer for this one
325. If you see a black square when you insert a video, you can override this by setting a ____ frame.
Note: This Question is unanswered, help us to find answer for this one
326. Text-to-self connections are made when the reader connects something in the text to __________.
Answer
Correct Answer:
Something the reader has experienced
Note: This Question is unanswered, help us to find answer for this one
327. If you are going to print an iron-on t-shirt transfer, you likely will use a(n) ______ printer.
Note: This Question is unanswered, help us to find answer for this one
328. ____ optical discs can be written to, erased, and overwritten just like magnetic hard disks.
Answer
Correct Answer:
Rewritable
Note: This Question is unanswered, help us to find answer for this one
329. Because a cd-r can be written on only one time, the format of these discs sometimes is called ____?
Note: This Question is unanswered, help us to find answer for this one
330. ____ software can control which devices can be connected to an employee's computer.
Answer
Correct Answer:
Data leakage prevention
Note: This Question is unanswered, help us to find answer for this one
331. A ____ provides an area in the form for the user to enter data.
Note: This Question is unanswered, help us to find answer for this one
332. The term hard drive refers collectively to hard disks and ______.
Note: This Question is unanswered, help us to find answer for this one
333. When an activex component needs to be approved, a(n) _______ bar will appear.
Note: This Question is unanswered, help us to find answer for this one
334. Our networked society has raised a number of ____ concerns.
Answer
Correct Answer:
Software quality
Note: This Question is unanswered, help us to find answer for this one
335. An internet connectivity plan is also known as a ________ plan.
Note: This Question is unanswered, help us to find answer for this one
336. A storage medium is inserted into its corresponding ____ in order to be read from or written to.
Answer
Correct Answer:
Storage device
Note: This Question is unanswered, help us to find answer for this one
337. A(n) ______ drive is comparable to a cassette recorder.
Note: This Question is unanswered, help us to find answer for this one
338. Actions and ethics practiced on the sports field __________.
Answer
Correct Answer:
Often mirror our ethics in everyday life
Note: This Question is unanswered, help us to find answer for this one
339. On a linux computer, ____ contains group memberships for the local system.
Answer
Correct Answer:
/etc/group
Note: This Question is unanswered, help us to find answer for this one
340. One emerging type of trojan horse is called a ____-access trojan.
Note: This Question is unanswered, help us to find answer for this one
341. In a printer, the print ____ affects the quality of the printed output.
Answer
Correct Answer:
Resolution
Note: This Question is unanswered, help us to find answer for this one
342. The display device for a desktop computer is formally called a ____.
Note: This Question is unanswered, help us to find answer for this one
343. In ____ transmission, data can move in both directions at the same time, such as with a telephone.
Answer
Correct Answer:
Full-duplex transmission.
Note: This Question is unanswered, help us to find answer for this one
344. ________ tools enable people to connect and exchange ideas.
Answer
Correct Answer:
Social networking
Note: This Question is unanswered, help us to find answer for this one
345. The majority of time on a project is usually spent on _____, as is most of the project's budget.
Answer
Correct Answer:
Execution
Note: This Question is unanswered, help us to find answer for this one
346. The ________ method copies the sourcearray to the targetarray.
Answer
Correct Answer:
System.arraycopy(sourceArray, 0, targetArray, 0, sourceArray.length)
Note: This Question is unanswered, help us to find answer for this one
347. The _____ model uses the term connectivity to label the relationship types.
Answer
Correct Answer:
Entity relationship
Note: This Question is unanswered, help us to find answer for this one
348. The ____ value of the display style tells the browser not the display the element.
Note: This Question is unanswered, help us to find answer for this one
349. The ____ statement can be used to eliminate the use of certain (flag) variables.
Note: This Question is unanswered, help us to find answer for this one
350. The ____ function is used to interchange the contents of two string variables.
Note: This Question is unanswered, help us to find answer for this one
351. A(n) ______ is a laptop computer that can convert into a tablet-like device.
Answer
Correct Answer:
2-in-1 PC
Note: This Question is unanswered, help us to find answer for this one
352. A(n) _____ is a common output device for hard copy.
Answer
Correct Answer:
Laser printer.
Note: This Question is unanswered, help us to find answer for this one
353. A supply chain driven by forecasts of consumer demand follows a ________ model.
Answer
Correct Answer:
Push-based
Note: This Question is unanswered, help us to find answer for this one
354. A relationship is an association between ____.
Answer
Correct Answer:
Databases.
Note: This Question is unanswered, help us to find answer for this one
355. If a programming language does not support ____, the language is not considered object-oriented.
Answer
Correct Answer:
Polymorphism
Note: This Question is unanswered, help us to find answer for this one
356. Rfm analysis is used to analyze and rank customers according to their ________.
Answer
Correct Answer:
Purchasing patterns
Note: This Question is unanswered, help us to find answer for this one
357. Consider the following statement: double alpha[10][5];. the number of components of alpha is ____.
Note: This Question is unanswered, help us to find answer for this one
358. In goal seek, the ________ box contains the formula that calculates the information you seek.
Note: This Question is unanswered, help us to find answer for this one
359. Email spoofing is a synonym for ________.
Note: This Question is unanswered, help us to find answer for this one
360. An array can easily be stepped through by using a ________.
Note: This Question is unanswered, help us to find answer for this one
361. A verb associating two nouns in a business rule translates to a(n) _____ in the data model.
Answer
Correct Answer:
Relationship
Note: This Question is unanswered, help us to find answer for this one
362. A _____ can be used as a hardware-based digital wallet.
Answer
Correct Answer:
Small phone
Note: This Question is unanswered, help us to find answer for this one
363. Rotating teams more frequently is an example of __________ of the game to keep things fair.
Answer
Correct Answer:
Modifying the rules
Note: This Question is unanswered, help us to find answer for this one
364. A(n) ______________ is an audio file distributed through downloads or feeds.
Note: This Question is unanswered, help us to find answer for this one
365. A file's ____ filename includes all path information for that file.
Note: This Question is unanswered, help us to find answer for this one
366. The ____________________ relationship is the relational database norm.
Note: This Question is unanswered, help us to find answer for this one
367. The ________ is adequate for searching through small arrays.
Answer
Correct Answer:
Linear search
Note: This Question is unanswered, help us to find answer for this one
368. ____ create the menus, forms, and input screens used with a program or database.
Answer
Correct Answer:
User interface (UI) builders
Note: This Question is unanswered, help us to find answer for this one
369. _____ readers optically scan a set of lines to identify a product.
Note: This Question is unanswered, help us to find answer for this one
370. ______ transmission often is called fixed wireless.
Answer
Correct Answer:
Microwave
Note: This Question is unanswered, help us to find answer for this one
371. _____ are essentially portable modems about the size of a usb drive.
Note: This Question is unanswered, help us to find answer for this one
372. A(n) _____ is something a person wants to get out of a job or that brings them job satisfaction.
Answer
Correct Answer:
Work value
Note: This Question is unanswered, help us to find answer for this one
373. You use ____ to view an xps file.
Answer
Correct Answer:
XPS Viewer.
Note: This Question is unanswered, help us to find answer for this one
374. You can set play options for a video clip with buttons in the video options group on the ____ tab.
Answer
Correct Answer:
VIDEO TOOLS PLAYBACK
Note: This Question is unanswered, help us to find answer for this one
375. You can change a column chart to a clustered bar chart using the ____ dialog box.
Answer
Correct Answer:
Change Chart Type
Note: This Question is unanswered, help us to find answer for this one
376. To open the navigation pane, tap or click the ____ button.
Answer
Correct Answer:
Shutter Bar Open/Close
Note: This Question is unanswered, help us to find answer for this one
377. Regardless of the algorithm being used, a search through an array is always performed ________.
Answer
Correct Answer:
None of these
Note: This Question is unanswered, help us to find answer for this one
378. If you want to conserve ink or toner, you can instruct powerpoint to print ____ documents.
Answer
Correct Answer:
Standard quality
Note: This Question is unanswered, help us to find answer for this one
379. Css supports styles to define both the text and ______ color for each element on your page.
Answer
Correct Answer:
Background
Note: This Question is unanswered, help us to find answer for this one
380. An operating system's ____ capability supports a division of labor among all the processing units.
Answer
Correct Answer:
Multiprocessing
Note: This Question is unanswered, help us to find answer for this one
381. An array's size declarator must be a(n)________ with a value greater than ________.
Answer
Correct Answer:
Constant integer expression
Note: This Question is unanswered, help us to find answer for this one
382. Transmission speeds are expressed in _______, whereas storage space is expressed in _______.
Answer
Correct Answer:
Bits, bytes
Note: This Question is unanswered, help us to find answer for this one
383. To eliminate the space between table cells, use the ___________ property.
Answer
Correct Answer:
Border-spacing: 0;
Note: This Question is unanswered, help us to find answer for this one
384. Less than (<), greater than (>), and not (not equal to) are examples of ____.
Answer
Correct Answer:
Comparison operators
Note: This Question is unanswered, help us to find answer for this one
385. It is common practice to use a ________ variable as a size declarator.
Note: This Question is unanswered, help us to find answer for this one
386. In the tag, an alignment value of ____ places the caption above the table.
Note: This Question is unanswered, help us to find answer for this one
387. If photos need to be emailed or uploaded to a web page, choose the ____ ppi compression setting.
Note: This Question is unanswered, help us to find answer for this one
388. A san is a high-speed network with the sole purpose of providing storage to other attached ______.
Note: This Question is unanswered, help us to find answer for this one
389. 0s and 1s are electronic signals that represent ____.
Answer
Correct Answer:
Both ON AND OFF & YES AND NO.
Note: This Question is unanswered, help us to find answer for this one
390. The ____ used to be the norm for desktop computers.
Answer
Correct Answer:
CRT monitor
Note: This Question is unanswered, help us to find answer for this one
391. The ____ option button lists formatting options following an insertion of cells, rows, or columns.
Note: This Question is unanswered, help us to find answer for this one
392. Text annotations are ____ that you can add to further describe the data in your chart.
Note: This Question is unanswered, help us to find answer for this one
393. Text ____ defines the appearance and shape of letters, numbers, punctuation marks, and symbols.
Note: This Question is unanswered, help us to find answer for this one
394. The command ____ searches for and replaces corrupted system files
Answer
Correct Answer:
Sfc /scannow
Note: This Question is unanswered, help us to find answer for this one
395. The align commands are in the ____ group.
Note: This Question is unanswered, help us to find answer for this one
396. The "fathers of the internet" are vinton cerf and ________.
Answer
Correct Answer:
Robert Kahn
Note: This Question is unanswered, help us to find answer for this one
397. Each time you press the ____ key, word carries forward custom tab stops to the next paragraph
Note: This Question is unanswered, help us to find answer for this one
398. Bipolar neurons are commonly ________.
Answer
Correct Answer:
Found in the retina
Note: This Question is unanswered, help us to find answer for this one
399. A(n) _____ file is a file on a web server that is not linked to any page.
Note: This Question is unanswered, help us to find answer for this one
400. A multiple-field index must be created using ____.
Answer
Correct Answer:
Subdata sheet
Note: This Question is unanswered, help us to find answer for this one
401. A file ______ performs functions related to displaying and organizing files.
Note: This Question is unanswered, help us to find answer for this one
402. A default button is identified by setting the form's ____ property.
Answer
Correct Answer:
AcceptButton
Note: This Question is unanswered, help us to find answer for this one
403. A ________ is a facility for managing an organization's business intelligence data.
Answer
Correct Answer:
Data warehouse
Note: This Question is unanswered, help us to find answer for this one
404. A ________ enables your computer to connect to other computers or to the internet.
Answer
Correct Answer:
Network interface card (NIC)
Note: This Question is unanswered, help us to find answer for this one
405. A ____ attack uses password cracking software
Answer
Correct Answer:
Brute force
Note: This Question is unanswered, help us to find answer for this one
406. ________ databases are the most frequently used electronic databases
Answer
Correct Answer:
Relational
Note: This Question is unanswered, help us to find answer for this one
407. ________ behavior is not conforming to a set of approved standards of behavior.
Answer
Correct Answer:
Unethical
Note: This Question is unanswered, help us to find answer for this one
408. Most digital investigations in the private sector involve ____.
Answer
Correct Answer:
Misuse of digital assets
Note: This Question is unanswered, help us to find answer for this one
409. A _____ printer heats specially coated paper to produce an image.
Note: This Question is unanswered, help us to find answer for this one
410. Laptops and tablets use _______ that are typically located outside the system unit.
Answer
Correct Answer:
AC adapters
Note: This Question is unanswered, help us to find answer for this one
411. Free computer games and free screen saver programs are typical carriers of _______.
Answer
Correct Answer:
Trojan Horses
Note: This Question is unanswered, help us to find answer for this one
412. Viewing a system as a group of subsystems begins the search for a problem at ____.
Answer
Correct Answer:
Any of these starting points
Note: This Question is unanswered, help us to find answer for this one
413. A(n) _____ is a logical storage area in oracle.
Answer
Correct Answer:
Tablespace.
Note: This Question is unanswered, help us to find answer for this one
414. The general software you use to do tasks at home, school, or work is known as ________ software.
Answer
Correct Answer:
Application
Note: This Question is unanswered, help us to find answer for this one
415. On most computers, the default font size in word is ____.
Note: This Question is unanswered, help us to find answer for this one
416. Trojans depend on ________ to spread.
Answer
Correct Answer:
Social engineering
Note: This Question is unanswered, help us to find answer for this one
417. Most computer historians agree that computers have evolved through _______ distinct generations.
Note: This Question is unanswered, help us to find answer for this one
418. Most laptops, tablets, and smartphones use a(n) ___ display.
Note: This Question is unanswered, help us to find answer for this one
419. If you have a tower unit, you have a _____ computer.
Note: This Question is unanswered, help us to find answer for this one
420. A(n) ____ is simply a high-speed connection to which multiple devices can attach.
Note: This Question is unanswered, help us to find answer for this one
421. A ____ contains the web page content that appears on the screen.
Note: This Question is unanswered, help us to find answer for this one
422. A ____ can be inserted using the text box button.
Answer
Correct Answer:
Either or
Note: This Question is unanswered, help us to find answer for this one
423. _____ text often provides a strong visual appeal.
Note: This Question is unanswered, help us to find answer for this one
424. Optical discs store items by using microscopic ______ (indentations) and ______ (flat areas).
Answer
Correct Answer:
Pits/lands
Note: This Question is unanswered, help us to find answer for this one
425. In addition to sales, crm, and scm, erp modules support business activities such as _____________.
Answer
Correct Answer:
Product planning; manufacturing and purchasing
Note: This Question is unanswered, help us to find answer for this one
426. A web __________ is based on an html source document that is stored as a file on a web server.
Note: This Question is unanswered, help us to find answer for this one
427. A link contains the ________ that links to another web page.
Note: This Question is unanswered, help us to find answer for this one
428. A ____ is an optical code that represents data with bars of varying widths or heights.
Note: This Question is unanswered, help us to find answer for this one
429. ###### in a cell means that the ____.
Answer
Correct Answer:
Column is too narrow to display the
Note: This Question is unanswered, help us to find answer for this one
430. In the formula =int(average(a1:a100)), which would occur first? ____
Answer
Correct Answer:
The average of the values in the range A1:A100 is added to the integer.
Note: This Question is unanswered, help us to find answer for this one
431. Local variables must be ________.
Answer
Correct Answer:
Initialized when they're declared
Note: This Question is unanswered, help us to find answer for this one
432. After experiencing a loss, it's important to take care of yourself by __________.
Answer
Correct Answer:
Focusing on life before the loss
Note: This Question is unanswered, help us to find answer for this one
433. In the acronym ada, the d stands for ______.
Answer
Correct Answer:
Disabilities
Note: This Question is unanswered, help us to find answer for this one
434. Printer ____ is measured by ppm
Note: This Question is unanswered, help us to find answer for this one
435. One of the primary causes of eyestrain is ____.
Answer
Correct Answer:
A display screen that reflects light
Note: This Question is unanswered, help us to find answer for this one
436. Each time you click the increase indent button, the paragraph is indented ____ inch.
Note: This Question is unanswered, help us to find answer for this one
437. Another name for needs analysis is ____.
Answer
Correct Answer:
Needs assessment.
Note: This Question is unanswered, help us to find answer for this one
438. Adding a ____ to text adds depth and helps the letters display prominently.
Note: This Question is unanswered, help us to find answer for this one
439. A(n) _______ password is difficult to hack.
Note: This Question is unanswered, help us to find answer for this one
440. A(n) _____ is essentially a flash-based replacement for an internal hard drive.
Note: This Question is unanswered, help us to find answer for this one
441. A computer lab is an example of a(n) ________ type of network.
Note: This Question is unanswered, help us to find answer for this one
442. A byte is formed by a group of _____.
Note: This Question is unanswered, help us to find answer for this one
443. A backup utility can write copies of important data files and folders on ____.
Answer
Correct Answer:
Any of these
Note: This Question is unanswered, help us to find answer for this one
444. A ________ is a personal journal posted on the web
Note: This Question is unanswered, help us to find answer for this one
445. A _____ is the software that acts as an intermediary between two systems.
Answer
Correct Answer:
Proxy server
Note: This Question is unanswered, help us to find answer for this one
446. __________ software may be freely copied, distributed, and even resold.
Answer
Correct Answer:
Public domain
Note: This Question is unanswered, help us to find answer for this one
447. Most of today's processors are housed in a ____ chip package.
Note: This Question is unanswered, help us to find answer for this one
448. A(n) _____ is the equivalent to a subsystem.
Answer
Correct Answer:
Partition
Note: This Question is unanswered, help us to find answer for this one
449. When you connect to a wi-fi hotspot, your digital device is classified as a(n) _______________.
Note: This Question is unanswered, help us to find answer for this one
450. In most cases, a file deleted from a usb drive ____.
Answer
Correct Answer:
Goes to the Recycle Bin
Note: This Question is unanswered, help us to find answer for this one
451. Windows can create partitions using the _______________ disk.
Note: This Question is unanswered, help us to find answer for this one
452. A(n) _____ represents a single dot on an output device.
Note: This Question is unanswered, help us to find answer for this one
453. All of the following are tips for professional e-mail etiquette except ________.
Answer
Correct Answer:
Use abbreviations such as "u," "r," and "BRB" to keep the e-mail message shorter
Note: This Question is unanswered, help us to find answer for this one
454. All of the following are terms related to part of the boot process except ________.
Note: This Question is unanswered, help us to find answer for this one
455. A(n) ____________________ device is a computing device small enough to hold in your hand.
Note: This Question is unanswered, help us to find answer for this one
456. A(n) ________ is used as an index to pinpoint a specific element within an array.
Answer
Correct Answer:
Subscript
Note: This Question is unanswered, help us to find answer for this one
457. A(n) ________ converts your voice's sound waves into digital signals.
Answer
Correct Answer:
Analog-to-digital converter chip
Note: This Question is unanswered, help us to find answer for this one
458. A(n) ____ statement is a statement that returns a value to the statement that called the function.
Note: This Question is unanswered, help us to find answer for this one
459. A(n) ____ is an element's numeric position within an array.
Note: This Question is unanswered, help us to find answer for this one
460. A virus __________ usually arrives as an email message that contains warnings about a fake virus.
Note: This Question is unanswered, help us to find answer for this one
461. A variable's unknown value is commonly called ____.
Note: This Question is unanswered, help us to find answer for this one
462. A unique number called a(n) ____ identifies each item in a collection.
Note: This Question is unanswered, help us to find answer for this one
463. A social security number which appears in the format 123-456-7891 is an example of a(n) ____.
Answer
Correct Answer:
Predefined input mask
Note: This Question is unanswered, help us to find answer for this one
464. There are four basic categories of software: commercial software, shareware, freeware, and ____.
Answer
Correct Answer:
Public domain software
Note: This Question is unanswered, help us to find answer for this one
465. A hard drive that uses fde is often referred to as a(n) ____.
Answer
Correct Answer:
Self-encrypting hard drive.
Note: This Question is unanswered, help us to find answer for this one
466. You can select multiple paragraphs by using the ____ key repeatedly.
Answer
Correct Answer:
CTRL+ END
Note: This Question is unanswered, help us to find answer for this one
467. Windows 10 stores compressed files in a special type of folder called a(n) ____.
Note: This Question is unanswered, help us to find answer for this one
468. All of the following are guidelines about the appearance of letterhead elements except ____.
Answer
Correct Answer:
Make the font size of your name the same size as the rest of the text in the letterhead
Note: This Question is unanswered, help us to find answer for this one
469. A(n) ____ is a software package that provides an editor, a compiler, and other programming tools.
Note: This Question is unanswered, help us to find answer for this one
470. A reading level that is appropriate for most technical documentation is ____.
Answer
Correct Answer:
10th grade
Note: This Question is unanswered, help us to find answer for this one
471. You represent a decision in a flowchart by drawing a decision symbol, which is shaped like a ____.
Note: This Question is unanswered, help us to find answer for this one
472. To speed up magnetic hard drive performance, ____ is often used.
Answer
Correct Answer:
Disk caching
Note: This Question is unanswered, help us to find answer for this one
473. To redirect the list of the files in a directory to a file called homedir.list, you enter ____.
Answer
Correct Answer:
Ls > homedir.list
Note: This Question is unanswered, help us to find answer for this one
474. The purpose of a ups backup battery is to permit a pc or server to ____.
Answer
Correct Answer:
Shutdown normally
Note: This Question is unanswered, help us to find answer for this one
475. Solid ____ is one color used throughout the entire slide.
Note: This Question is unanswered, help us to find answer for this one
476. Pmt(rate, nper, pv [, fv=0] [, type=0]) in the figure above, fv and type are ____.
Answer
Correct Answer:
Present value of the loan
Note: This Question is unanswered, help us to find answer for this one
477. Instead of reading a large text file into php, you can use the ____ to iterate through a text file.
Answer
Correct Answer:
File pointer
Note: This Question is unanswered, help us to find answer for this one
478. Each hard disk is divided into pie-shaped groups of ____.
Note: This Question is unanswered, help us to find answer for this one
479. An uninterruptable power supply contains a ____.
Note: This Question is unanswered, help us to find answer for this one
480. An extension of .sys designates a ____ type of file.
Answer
Correct Answer:
Configuration
Note: This Question is unanswered, help us to find answer for this one
481. A photo's color intensity can be modified by changing the brightness and ____.
Answer
Correct Answer:
Contrast.
Note: This Question is unanswered, help us to find answer for this one
482. Root cause analysis is an iterative process that asks a series of ____ questions.
Note: This Question is unanswered, help us to find answer for this one
483. To find duplicate records in a table, use the _____ query wizard.
Answer
Correct Answer:
Find Duplicates
Note: This Question is unanswered, help us to find answer for this one
484. Excel remembers the last ____ actions you have completed.
Note: This Question is unanswered, help us to find answer for this one
485. Deleting a record in a form will also delete it from the underlying ________.
Note: This Question is unanswered, help us to find answer for this one
486. Today's widescreen devices, such as laptops and smartphones, are designed for the 16:9 __________.
Answer
Correct Answer:
Aspect ratio
Note: This Question is unanswered, help us to find answer for this one
487. Color ____ indicates that one color is dominating a picture.
Note: This Question is unanswered, help us to find answer for this one
488. Widespread use of the internet by business and home users first occurred in the ____.
Note: This Question is unanswered, help us to find answer for this one
489. When a subscript is not within the range of acceptable subscripts, it is said to be ____.
Answer
Correct Answer:
A superscript
Note: This Question is unanswered, help us to find answer for this one
490. To sort by a second column, click the ____ arrow and click a column header.
Note: This Question is unanswered, help us to find answer for this one
491. To filter records in a report, use the filter buttons on the ____ tab.
Note: This Question is unanswered, help us to find answer for this one
492. The prefix ____ should be used for naming a textbox object.
Note: This Question is unanswered, help us to find answer for this one
493. The output of the statement: cout << pow(3.0, 2.0) + 5 << endl; is ____.
Note: This Question is unanswered, help us to find answer for this one
494. The main circuits on the system board that carry data are called the _________.
Note: This Question is unanswered, help us to find answer for this one
495. The concept that similar items should be handled consistently throughout a document is called ____.
Answer
Correct Answer:
Parallel structure
Note: This Question is unanswered, help us to find answer for this one
496. Set the ____ property to no to prevent users from using the tab key to navigate to a control.
Answer
Correct Answer:
Tab Stop.
Note: This Question is unanswered, help us to find answer for this one
497. Print all, pages, and selected record(s) are options available from the ____ for printing forms.
Answer
Correct Answer:
Print dialog box
Note: This Question is unanswered, help us to find answer for this one
498. Most software problems that impact end users occur ____.
Answer
Correct Answer:
During the installation and configuration of the software.
Note: This Question is unanswered, help us to find answer for this one
499. Media that allow random access are sometimes referred to as ____ media.
Answer
Correct Answer:
Addressable
Note: This Question is unanswered, help us to find answer for this one
500. In dolby digital 7.1, the 1 indicates a ________ speaker.
Answer
Correct Answer:
Subwoofer
Note: This Question is unanswered, help us to find answer for this one
501. In a count-controlled loop, the counter performs ________ action(s).
Note: This Question is unanswered, help us to find answer for this one
502. If the navigation pane is not open, click the _____ to open it and view the database objects.
Answer
Correct Answer:
Shutter Bar Open/Close Button
Note: This Question is unanswered, help us to find answer for this one
503. Gabrielle is planning to connect selected devices to the network wirelessly with a wireless ____.
Answer
Correct Answer:
Access point
Note: This Question is unanswered, help us to find answer for this one
504. Employees who provide informal peer support to other users in an organization ____.
Answer
Correct Answer:
Often have little or no training in user support.
Note: This Question is unanswered, help us to find answer for this one
505. C:\windows\system32\drivers\etc\protocol is an example of a file ________.
Note: This Question is unanswered, help us to find answer for this one
506. As programs become larger and more complicated, the need for good planning and design ____ .
Answer
Correct Answer:
Increases
Note: This Question is unanswered, help us to find answer for this one
507. An example of software most commonly associated with productivity software is ____.
Answer
Correct Answer:
Word processing
Note: This Question is unanswered, help us to find answer for this one
508. All of the following are tips for a great presentation except ________.
Answer
Correct Answer:
Use a variety of animations on most slides to keep your audience's attention.
Note: This Question is unanswered, help us to find answer for this one
509. After adding a shape to a slide, you can change its default characteristics by adding ____.
Answer
Correct Answer:
Numbers bullets . text . styles.
Note: This Question is unanswered, help us to find answer for this one
510. A(n) ______ machine enables you to install a second operating system on a computer.
Note: This Question is unanswered, help us to find answer for this one
511. A(n) ____ is a flat, touch-sensitive device used in conjunction with a digital pen.
Answer
Correct Answer:
Graphics table
Note: This Question is unanswered, help us to find answer for this one
512. A unique feature of ____ is that users can easily add enhancements to the operating system.
Note: This Question is unanswered, help us to find answer for this one
513. A two-dimensional array is like ______________ put together.
Answer
Correct Answer:
The correct answer is: several identical arrays
Note: This Question is unanswered, help us to find answer for this one
514. Computer programmers often refer to memory addresses using ____ notation
Answer
Correct Answer:
Hexadecimal.
Note: This Question is unanswered, help us to find answer for this one
515. In most programming languages, before you can use any variable, you must include a ____ for it.
Answer
Correct Answer:
Declaration
Note: This Question is unanswered, help us to find answer for this one
516. A usb flash drive is a(n) ____ disk
Answer
Correct Answer:
Removable.
Note: This Question is unanswered, help us to find answer for this one
517. Solid-state storage is quickly replacing _____ for storing data on small devices like the ipod.
Answer
Correct Answer:
Microdrives.
Note: This Question is unanswered, help us to find answer for this one
518. In order to allocate the needed memory for an object, you must use the ____ operator.
Note: This Question is unanswered, help us to find answer for this one
519. If your computer is thrashing, increase ________ to solve the problem.
Note: This Question is unanswered, help us to find answer for this one
520. If you open a field list and the tables do not appear in the field list, click ____.
Answer
Correct Answer:
Show all tables
Note: This Question is unanswered, help us to find answer for this one
521. Color _____ changes the intensity of colors
Answer
Correct Answer:
Saturation
Note: This Question is unanswered, help us to find answer for this one
522. By default a word document generally displays in ____ view
Answer
Correct Answer:
Print layout
Note: This Question is unanswered, help us to find answer for this one
523. All of the following are tasks for network administration of a large organization except ________.
Answer
Correct Answer:
Purchasing initial equipment for the network
Note: This Question is unanswered, help us to find answer for this one
524. A(n) ________________ is an informal web site of time-stamped articles written in a journal format.
Note: This Question is unanswered, help us to find answer for this one
525. A(n) ____ is a software program that helps programmers develop software.
Answer
Correct Answer:
Application generator
Note: This Question is unanswered, help us to find answer for this one
526. A violation of the holder's rights is known as copyright ________.
Answer
Correct Answer:
Infringement
Note: This Question is unanswered, help us to find answer for this one
527. A type of spyware known as _________ can record the individual keystrokes of a user.
Answer
Correct Answer:
Keylogger
Note: This Question is unanswered, help us to find answer for this one
528. A row-and-column subset ____ consists of a subset of the rows and columns in some individual table.
Note: This Question is unanswered, help us to find answer for this one
529. A form's object name appears on the tab for the form in the access window. ____________________
Note: This Question is unanswered, help us to find answer for this one
530. A __________ cookie is set by a site other than the one you connected to.
Answer
Correct Answer:
Third-party.
Note: This Question is unanswered, help us to find answer for this one
531. ________ a site means to take extraordinary measures to reduce a system's vulnerability.
Answer
Correct Answer:
Hardening
Note: This Question is unanswered, help us to find answer for this one
532. Cache memory levels are based on proximity to ________.
Answer
Correct Answer:
The processor.
Note: This Question is unanswered, help us to find answer for this one
533. The calculated expression =city & ?,? & state & ? ? & zipcode is an example of ____.
Answer
Correct Answer:
Concatenation
Note: This Question is unanswered, help us to find answer for this one
534. The bullets button is located in the ____ group.
Answer
Correct Answer:
Paragraph
Note: This Question is unanswered, help us to find answer for this one
535. The arrangement of keys on a keyboard, qwerty reflects the keyboard layout by _______.
Answer
Correct Answer:
Taking the letters of the first six alphabetic characters found on the top row of keys
Note: This Question is unanswered, help us to find answer for this one
536. The arguments in ____ in the screentip for a function are optional.
Note: This Question is unanswered, help us to find answer for this one
537. The appropriate software to use for creating research papers is ________ software.
Answer
Correct Answer:
Word processing
Note: This Question is unanswered, help us to find answer for this one
538. The apple logo would be considered a(n) ________.
Answer
Correct Answer:
Trademark
Note: This Question is unanswered, help us to find answer for this one
539. The access window consists of a variety of components. these include the ____.
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
540. The ________ element configures dynamic graphics.
Note: This Question is unanswered, help us to find answer for this one
541. Suppose str = "abcdefghi". the output of the statement cout << str.length() << endl; is ____.
Note: This Question is unanswered, help us to find answer for this one
542. Activex controls are identified using the ____ attribute.
Note: This Question is unanswered, help us to find answer for this one
543. When data is processed into a meaningful form, it becomes ____.
Answer
Correct Answer:
Information
Note: This Question is unanswered, help us to find answer for this one
544. Spreadsheet software creates a ____, composed of a grid of columns and rows.
Answer
Correct Answer:
Worksheet
Note: This Question is unanswered, help us to find answer for this one
545. ____ area networks can cover large geographic distances, including the entire earth.
Note: This Question is unanswered, help us to find answer for this one
546. Some 3d projectors are designed to project ____.
Answer
Correct Answer:
Holograms
Note: This Question is unanswered, help us to find answer for this one
547. Web pages are viewed using a web ____.
Note: This Question is unanswered, help us to find answer for this one
548. Visitors to a web site are sometimes called web ____.
Note: This Question is unanswered, help us to find answer for this one
549. The sentence ?larry will present a tutorial on excel macros on tuesday next week? is in ____ voice.
Note: This Question is unanswered, help us to find answer for this one
550. The first pcs were used in businesses and homes in the ____.
Note: This Question is unanswered, help us to find answer for this one
551. The color orange denotes ____.
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
552. The default importance level for all new messages is ____ importance.
Note: This Question is unanswered, help us to find answer for this one
553. Emptying the recycle bin frees up ____ on your computer
Answer
Correct Answer:
Storage space
Note: This Question is unanswered, help us to find answer for this one
554. Javascript and vbscript are _____, which provide commands that are executed on the client.
Answer
Correct Answer:
Scripting languages
Note: This Question is unanswered, help us to find answer for this one
555. In the url http://www.microsoft.com/surface, the portion labeled ""http"" is the ________.
Note: This Question is unanswered, help us to find answer for this one
556. ____ utilities scan incoming and outgoing files to be sure they are safe.
Note: This Question is unanswered, help us to find answer for this one
557. The length ____ contains the number of elements in the array.
Note: This Question is unanswered, help us to find answer for this one
558. The base class's ________ affects the way its members are inherited by the derived class.
Answer
Correct Answer:
Access specification
Note: This Question is unanswered, help us to find answer for this one
559. The actionlistener interface contains the ____ method specification.
Answer
Correct Answer:
ActionPerformed(ActionEvent e)
Note: This Question is unanswered, help us to find answer for this one
560. If i simplify the address 2001:0000:0000:00fe:0000:0000:0000:cdef, i get ________.
Answer
Correct Answer:
2001:::fe::::cdef
Note: This Question is unanswered, help us to find answer for this one
561. The _________ , also known as the address operator, returns the memory address of a variable.
Answer
Correct Answer:
Ampersand ( & )
Note: This Question is unanswered, help us to find answer for this one
562. The ____ attribute lets you control how the internal table gridlines are drawn.
Note: This Question is unanswered, help us to find answer for this one
563. Function strcmp returns __________ if its first argument is equal to its second argument.
Answer
Correct Answer:
Specifically O
Note: This Question is unanswered, help us to find answer for this one
564. Four-pair utp uses ________ connectors.
Answer
Correct Answer:
None of the above
Note: This Question is unanswered, help us to find answer for this one
565. C++ requires that a copy constructor's parameter be a(n) ________.
Answer
Correct Answer:
Reference object
Note: This Question is unanswered, help us to find answer for this one
566. Arrays must be ________ at the time they are ________.
Answer
Correct Answer:
Initialized, declared
Note: This Question is unanswered, help us to find answer for this one
567. Ajax takes advantage of ________ scripting to make applications more responsive.
Answer
Correct Answer:
Client-side
Note: This Question is unanswered, help us to find answer for this one
568. A class and its members can be described graphically using a notation known as the ____ notation.
Note: This Question is unanswered, help us to find answer for this one
569. Is a consultative function of the mis department.
Answer
Correct Answer:
Educating the non-MIS managers about IT
Note: This Question is unanswered, help us to find answer for this one
570. ________ are an intangible benefit of information systems.
Answer
Correct Answer:
Lower operational costs,
Note: This Question is unanswered, help us to find answer for this one
571. Comparing a variable to a list of values in an array is a process called ____ an array.
Answer
Correct Answer:
Searching
Note: This Question is unanswered, help us to find answer for this one
572. The instruction myanswer = mynumber*2 is an example of a(n) ____ operation.
Answer
Correct Answer:
Processing
Note: This Question is unanswered, help us to find answer for this one
573. Each task in a systems development project should culminate in one or more ________.
Answer
Correct Answer:
Deliverables.
Note: This Question is unanswered, help us to find answer for this one
574. Major coding mistakes made by programmers when they write software are called ____.
Note: This Question is unanswered, help us to find answer for this one
575. The _______________ element was widely used but never part of the w3c standard until html5.
Note: This Question is unanswered, help us to find answer for this one
576. Software designed specifically for managing real estate is an example of ________ software.
Answer
Correct Answer:
Vertical market
Note: This Question is unanswered, help us to find answer for this one
577. Using ________ searches the spreadsheet for one value and replaces it with another.
Answer
Correct Answer:
Find and Replace
Note: This Question is unanswered, help us to find answer for this one
578. The ________ operator performs string concatenation.
Answer
Correct Answer:
Ampersand (&)
Note: This Question is unanswered, help us to find answer for this one
579. With respect to computer networks, a typical ________ network has a bandwidth of 10 mbps to 1 gbps.
Answer
Correct Answer:
Local Area
Note: This Question is unanswered, help us to find answer for this one
580. With an enumerated data type, the enumerators are stored in memory as ________.
Answer
Correct Answer:
Integers.
Note: This Question is unanswered, help us to find answer for this one
581. When you schedule an appointment, outlook adds the appointment to the ____ folder by default.
Note: This Question is unanswered, help us to find answer for this one
582. When you ask multiple questions before an outcome is determined, you create a ____ condition.
Note: This Question is unanswered, help us to find answer for this one
583. When computer users ____________________ a project, they change its appearance.
Note: This Question is unanswered, help us to find answer for this one
584. When a variable ceases to exist at the end of a method, programmers say the variable ____.
Answer
Correct Answer:
Goes out of scope
Note: This Question is unanswered, help us to find answer for this one
585. Transistors are constructed from ____, such as silicon and gallium arsenide.
Answer
Correct Answer:
Semiconductors
Note: This Question is unanswered, help us to find answer for this one
586. To view the preview pane, click the ____ tab, and click print on the navigation bar.
Note: This Question is unanswered, help us to find answer for this one
587. To use the predefined function tolower, the program must include the header file ____.
Note: This Question is unanswered, help us to find answer for this one
588. To ungroup an illustration, press ____.
Answer
Correct Answer:
CTRL+SHIFT+G
Note: This Question is unanswered, help us to find answer for this one
589. To select adjacent worksheets, you use the ____ key.
Note: This Question is unanswered, help us to find answer for this one
590. To resize an image without changing its proportions simply drag ____ of the image
Answer
Correct Answer:
Any corner.
Note: This Question is unanswered, help us to find answer for this one
591. To remove a total row that appears in a datasheet, tap or click the ____ button on the home tab.
Note: This Question is unanswered, help us to find answer for this one
592. To re-use saved export steps, tap or click the saved exports button on the ____ tab on the ribbon.
Answer
Correct Answer:
EXTERNAL DATA
Note: This Question is unanswered, help us to find answer for this one
593. To organize entries in the navigation pane by table, click ____ on the navigation pane menu.
Answer
Correct Answer:
Tables and Related Views
Note: This Question is unanswered, help us to find answer for this one
594. To move a field in the query design grid, click its ____, and then drag it left or right.
Answer
Correct Answer:
Field selector.
Note: This Question is unanswered, help us to find answer for this one
595. To import data to a table, tap or click the ____ tab on the ribbon.
Answer
Correct Answer:
EXTERNAL DATA
Note: This Question is unanswered, help us to find answer for this one
596. To change the caption for a form, use the ____ property in the property sheet.
Note: This Question is unanswered, help us to find answer for this one
597. To add totals or other statistics to a report, use the ____ button on the design tab.
Note: This Question is unanswered, help us to find answer for this one
598. To add a record to a table, tap or click the ____ record button
Answer
Correct Answer:
New (blank)
Note: This Question is unanswered, help us to find answer for this one
599. Though an invitee can propose a new meeting time, only the ____ can change or delete the meeting.
Answer
Correct Answer:
Originator
Note: This Question is unanswered, help us to find answer for this one
600. There are ____ stable states in a bistable environment.
Note: This Question is unanswered, help us to find answer for this one
601. The type of media that uses laser technology to store data and programs is _______.
Answer
Correct Answer:
Optical disc
Note: This Question is unanswered, help us to find answer for this one
602. The purpose of a preinstallation site visit is to ____.
Answer
Correct Answer:
Anticipate possible installation problems
Note: This Question is unanswered, help us to find answer for this one
603. The most significant internal data sources for an mis are the organization?s _____.
Answer
Correct Answer:
Various DSS and GSS systems and users
Note: This Question is unanswered, help us to find answer for this one
604. The module definition comprises the module header and the module ________.
Note: This Question is unanswered, help us to find answer for this one
605. Another name for the weighted point evaluation method is the ____ method.
Answer
Correct Answer:
Kepner-Tregoe
Note: This Question is unanswered, help us to find answer for this one
606. Many desktops have a(n) ____________________ tower that is a separate device from a monitor.
Answer
Correct Answer:
System Unit
Note: This Question is unanswered, help us to find answer for this one
607. Long passwords that use several types of keyboard characters are called ________ passwords.
Note: This Question is unanswered, help us to find answer for this one
608. A profile in a social networking site consists of ________.
Answer
Correct Answer:
A photo or information about the person or organization
Note: This Question is unanswered, help us to find answer for this one
609. The ____________________ of a function consists of the function name and its formal parameter list.
Answer
Correct Answer:
Signature
Note: This Question is unanswered, help us to find answer for this one
610. In 802.11i ________, hosts must know a shared initial key.
Answer
Correct Answer:
PSK mode.
Note: This Question is unanswered, help us to find answer for this one
611. Closing a file causes any unsaved information still held in the file buffer to be ________.
Answer
Correct Answer:
Saved to the file
Note: This Question is unanswered, help us to find answer for this one
612. Each outlook folder displays the items it contains in a layout called a(n) ____.
Note: This Question is unanswered, help us to find answer for this one
613. An input mask may be created for any field with the ____ or ____ data type.
Answer
Correct Answer:
Short Text, Number
Note: This Question is unanswered, help us to find answer for this one
614. An array is a(n) ____ of values in computer memory.
Note: This Question is unanswered, help us to find answer for this one
615. A unique identifier is most likely used as a ____ key in a database.
Note: This Question is unanswered, help us to find answer for this one
616. A query based on more than one table is a(n) ____ query
Answer
Correct Answer:
Multitable
Note: This Question is unanswered, help us to find answer for this one
617. A help desk structured into levels or tiers of support uses a ____.
Answer
Correct Answer:
Multilevel support model
Note: This Question is unanswered, help us to find answer for this one
618. A hardware component that has its jumper pins set incorrectly is an example of a hardware ____.
Answer
Correct Answer:
Configuration problem
Note: This Question is unanswered, help us to find answer for this one
619. A file that stays in memory after it executes is a(n) _____________.
Answer
Correct Answer:
Executable
Note: This Question is unanswered, help us to find answer for this one
620. A ____ consists of a selection of colors and fonts for the various sections in a report or form.
Note: This Question is unanswered, help us to find answer for this one
621. ________ software lets you perform calculations and numerical analyses.
Answer
Correct Answer:
Spreadsheet
Note: This Question is unanswered, help us to find answer for this one
622. ________ allows only limited use of media that have been legally purchased.
Answer
Correct Answer:
Digital rights management.
Note: This Question is unanswered, help us to find answer for this one
623. A(n) ________ cable carries all audio and video information from devices to a connected tv.
Note: This Question is unanswered, help us to find answer for this one
624. A distributed computing system usually includes ____.
Answer
Correct Answer:
All of these.
Note: This Question is unanswered, help us to find answer for this one
625. A _____ page is an unchanging page retrieved from a file on a web server.
Note: This Question is unanswered, help us to find answer for this one
626. Catfishing is ________.
Answer
Correct Answer:
Creating fake profiles on a dating site and developing a fabricated online and phone relationship
Note: This Question is unanswered, help us to find answer for this one
627. A(n) ____ layout arranges controls vertically with the labels to the left of the control.
Note: This Question is unanswered, help us to find answer for this one
628. A three-tier, or multitier, client/server system consists of three distinct pieces: these are ____.
Answer
Correct Answer:
The client tier, the processing tier, and the data storage tier
Note: This Question is unanswered, help us to find answer for this one
629. A method?s name and parameter list constitute the method?s ____.
Answer
Correct Answer:
Signature
Note: This Question is unanswered, help us to find answer for this one
630. A calculated field is formatted using the ____ for the field.
Answer
Correct Answer:
Property Sheet
Note: This Question is unanswered, help us to find answer for this one
631. ____ loops are called posttest loops.
Answer
Correct Answer:
Do...while loop
Note: This Question is unanswered, help us to find answer for this one
632. ____ is currently the most popular technology for connecting peripherals
Note: This Question is unanswered, help us to find answer for this one
633. Suppose str = ""xyzw"";. after the statement str[2] = 'y'; the value of str is ""____"".
Note: This Question is unanswered, help us to find answer for this one
634. Fine lines that extend from the top and bottom of a font's letters are called ____.
Note: This Question is unanswered, help us to find answer for this one
635. To create an update query, create a new query and then click the ____ button on the design tab.
Note: This Question is unanswered, help us to find answer for this one
636. The personal assistant application on apple's iphone is an example of a ________.
Answer
Correct Answer:
Natural language processing (NLP) system
Note: This Question is unanswered, help us to find answer for this one
637. To speed up the display of graphics, a(n) ________ is integrated into some video cards.
Note: This Question is unanswered, help us to find answer for this one
638. The navigation pane includes two panes: the ____ panes.
Answer
Correct Answer:
Date Navigator and my calendars
Note: This Question is unanswered, help us to find answer for this one
639. The navigation pane contains the headings tab, the results tab, and the _____ tab.
Note: This Question is unanswered, help us to find answer for this one
640. The internet data transfer speed for your computer might be stated in ____ per second.
Note: This Question is unanswered, help us to find answer for this one
641. The appearance of fields in a report that is created using the report wizard is determined by ____.
Answer
Correct Answer:
The order the fields are selected in the
Note: This Question is unanswered, help us to find answer for this one
642. Press and hold the ____ key as you click a link on a webpage to open a new webpage in a new tab.
Note: This Question is unanswered, help us to find answer for this one
643. Most music for portable media players is stored in _______ audio file formats.
Answer
Correct Answer:
Compressed
Note: This Question is unanswered, help us to find answer for this one
644. Modern motherboards use a 20- or 24-pin _______________.
Note: This Question is unanswered, help us to find answer for this one
645. Pixels is short for _____ and is a measure of _____.
Answer
Correct Answer:
Picture elements; resolution
Note: This Question is unanswered, help us to find answer for this one
646. Internet explorer inserts the flash shockwave player as a(n) ____ control.
Note: This Question is unanswered, help us to find answer for this one
647. To connect multiple usb devices to a single usb port, a ____ can be used.
Note: This Question is unanswered, help us to find answer for this one
648. The purpose of ___ is to hold data permanently, even when the computer is turned off.
Note: This Question is unanswered, help us to find answer for this one
649. The internet connects millions of computers connected through millions of ____ worldwide.
Note: This Question is unanswered, help us to find answer for this one
650. One common way to deal with spam that makes it to your computer is to use a(n) ____.
Answer
Correct Answer:
Email filter
Note: This Question is unanswered, help us to find answer for this one
651. Most keyboards today are arranged in a(n) _______ layout.
Note: This Question is unanswered, help us to find answer for this one
652. Main memory is called ____.
Answer
Correct Answer:
Primary memory
Note: This Question is unanswered, help us to find answer for this one
653. Like any other processor, a graphics processor needs _______________.
Note: This Question is unanswered, help us to find answer for this one
654. The line most commonly used by corporate, government, and academic sites is ________.
Note: This Question is unanswered, help us to find answer for this one
655. When installing new software, it is recommended to install it in/on ____.
Answer
Correct Answer:
C:\Programs
Note: This Question is unanswered, help us to find answer for this one
656. To save a document with a new name, click _______ in the navigation bar and enter a new filename.
Note: This Question is unanswered, help us to find answer for this one
657. A reason to overload the ________ is to write classes that have array-like behaviors.
Answer
Correct Answer:
Square brackets [ ] operator
Note: This Question is unanswered, help us to find answer for this one
658. For downloaded software, the details of the software license usually appear during ______.
Answer
Correct Answer:
Installation
Note: This Question is unanswered, help us to find answer for this one
659. A(n) ____ is a set of values together with a set of operations.
Answer
Correct Answer:
Data type
Note: This Question is unanswered, help us to find answer for this one
660. Current computer programs are able to identify some objects _____.
Answer
Correct Answer:
But they often make errors that a human would never make
Note: This Question is unanswered, help us to find answer for this one
661. A ______ is a symbol used to represent a location in memory.
Note: This Question is unanswered, help us to find answer for this one
662. A string with delimiters can be parsed into separate fields using the _____ class.
Answer
Correct Answer:
StringTokenizer
Note: This Question is unanswered, help us to find answer for this one
663. A method that is associated with an individual object is called ________.
Answer
Correct Answer:
An instance method
Note: This Question is unanswered, help us to find answer for this one
664. A loop that continues to execute endlessly is called a(n) ____ loop.
Note: This Question is unanswered, help us to find answer for this one
665. A function includes its ____, which are values used by the function.
Answer
Correct Answer:
Parameters
Note: This Question is unanswered, help us to find answer for this one
666. A data item is ____ when it cannot be changed while a program is running
Note: This Question is unanswered, help us to find answer for this one
667. A class ____ automatically executes whenever a class object goes out of scope.
Answer
Correct Answer:
Destructor
Note: This Question is unanswered, help us to find answer for this one
668. ________ functions may have the same name, as long as their parameter lists are different.
Answer
Correct Answer:
Two or more
Note: This Question is unanswered, help us to find answer for this one
669. ____ a data item means you override incorrect data by setting the variable to a specific value.
Note: This Question is unanswered, help us to find answer for this one
670. You create a named constant using the ____ statement.
Note: This Question is unanswered, help us to find answer for this one
671. You can break up a long statement into multiple lines as long as you don't break up a ________.
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
672. The goal of _____ is to build a system that is effective, reliable, and maintainable.
Answer
Correct Answer:
System design
Note: This Question is unanswered, help us to find answer for this one
673. In addition to using loops to validate data, ________ can also be used to validate data.
Answer
Correct Answer:
Boolean Function
Note: This Question is unanswered, help us to find answer for this one
674. In a computer, each_____ can represent one letter, number, or symbol.
Note: This Question is unanswered, help us to find answer for this one
675. ____ error messages indicate coding errors detected by the compiler.
Note: This Question is unanswered, help us to find answer for this one
676. A ________ a string of bits used to encrypt the data.
Note: This Question is unanswered, help us to find answer for this one
677. A ____ is a variable that you set to indicate whether some event has occurred.
Note: This Question is unanswered, help us to find answer for this one
678. ______ data consists of numbers that can be used in arithmetic operations.
Note: This Question is unanswered, help us to find answer for this one
679. A locally declared variable always ____ another variable with the same name elsewhere in the class.
Note: This Question is unanswered, help us to find answer for this one
680. Assigning initial values to an array is often referred to as ____.
Answer
Correct Answer:
Populating
Note: This Question is unanswered, help us to find answer for this one
681. ____ are the characteristics that define an object as part of a class.
Answer
Correct Answer:
Behaviors
Note: This Question is unanswered, help us to find answer for this one
682. A ________ value in a loop can be either a positive or a negative number.
Note: This Question is unanswered, help us to find answer for this one
683. A special character that is used to substitute for a character or many characters is a(n) ________.
Note: This Question is unanswered, help us to find answer for this one
684. A situation where two software packages use resources in incompatible ways is called a(n) ____.
Note: This Question is unanswered, help us to find answer for this one
685. A method can receive ____ arguments, even if it is defined as needing double arguments.
Note: This Question is unanswered, help us to find answer for this one
686. A literal string can be assigned a zero-length string value called a(n) ____ string.
Note: This Question is unanswered, help us to find answer for this one
687. A condition is a ________ expression
Note: This Question is unanswered, help us to find answer for this one
688. A comparison is correct only when the correct ____ and operator are used
Note: This Question is unanswered, help us to find answer for this one
689. A class ____ is a collection of classes that can be made available for developers to use. class library
Note: This Question is unanswered, help us to find answer for this one
690. A ____ loop is best used when the specific number of iterations required is known.
Note: This Question is unanswered, help us to find answer for this one
691. A ____ is a named memory location that you can use to store a value.
Note: This Question is unanswered, help us to find answer for this one
692. A ____ exception occurs when code attempts to divide a number by zero.
Answer
Correct Answer:
Divide by Zero
Note: This Question is unanswered, help us to find answer for this one
693. ____ occurs when both of the operands are integers.
Answer
Correct Answer:
Both operands are true
Note: This Question is unanswered, help us to find answer for this one
694. Each data type is a class from which a variable can be ____.
Answer
Correct Answer:
Instantiated
Note: This Question is unanswered, help us to find answer for this one
695. ________ property is work that is the result of someone's creativity and knowledge.
Answer
Correct Answer:
Intellectual property
Note: This Question is unanswered, help us to find answer for this one
696. John's height is 6 feet 3 inches. this is an example of ________.
Note: This Question is unanswered, help us to find answer for this one
697. For maximum efficiency, a good rule of thumb in an and decision is to ____.
Answer
Correct Answer:
First ask the question that is more likely to be false.
Note: This Question is unanswered, help us to find answer for this one
698. Compared to traditional advertising, an effective business use of social media tools is to _____.
Answer
Correct Answer:
Engage customers
Note: This Question is unanswered, help us to find answer for this one
699. A digital certificate usually contains all of the following except ____.
Answer
Correct Answer:
a keycode that destroys all evidence of the certificate upon use
Note: This Question is unanswered, help us to find answer for this one
700. _____ measures the amount of space between words.
Note: This Question is unanswered, help us to find answer for this one
701. The ____ is the device or substance that actually holds data.
Answer
Correct Answer:
Storage medium
Note: This Question is unanswered, help us to find answer for this one
702. Tables are similar in design to ____.
Answer
Correct Answer:
Spreadsheets
Note: This Question is unanswered, help us to find answer for this one
703. In 1982, the percentage of households that had a computer was closest to ____ percent.
Note: This Question is unanswered, help us to find answer for this one
704. An internal user is one who is a ____.
Answer
Correct Answer:
Worker in the same organization that provides support services
Note: This Question is unanswered, help us to find answer for this one
705. A ________ combines the functionality of a smartphone with a screen the size of a tablet.
Note: This Question is unanswered, help us to find answer for this one
706. The basis of an xp plan is a set of ____ that users develop.
Answer
Correct Answer:
User stories
Note: This Question is unanswered, help us to find answer for this one
707. The arguments sent to a method in a method call are often referred to as ____ parameters.
Note: This Question is unanswered, help us to find answer for this one
708. Creative commons licenses are ________.
Answer
Correct Answer:
Irrevocable
Note: This Question is unanswered, help us to find answer for this one
709. A variation of the content model is sometimes called the ____ model.
Answer
Correct Answer:
Information
Note: This Question is unanswered, help us to find answer for this one
710. ____ input data from special forms to score or tally exams, questionnaires, ballots, and so forth.
Answer
Correct Answer:
Optical mark readers (OMRs)
Note: This Question is unanswered, help us to find answer for this one
711. A ____ is information presented on a physical medium, such as paper.
Answer
Correct Answer:
Hard copy
Note: This Question is unanswered, help us to find answer for this one
712. _____ is the imitation of the operation of a real-world process or system over time.
Answer
Correct Answer:
Simulation
Note: This Question is unanswered, help us to find answer for this one
713. Statistical information such as totals and averages is calculated using ____.
Answer
Correct Answer:
Aggregate functions
Note: This Question is unanswered, help us to find answer for this one
714. The introduction of _____ on cell phones was the first step toward realizing augmented reality.
Answer
Correct Answer:
Geographic positioning systems
Note: This Question is unanswered, help us to find answer for this one
715. Robotic cameras used by television stations for sports events require a ________ operating system.
Answer
Correct Answer:
Real-time
Note: This Question is unanswered, help us to find answer for this one
716. In the url http://www.cengage.com/index.html, http: is the ____.
Note: This Question is unanswered, help us to find answer for this one
717. If your time is limited, consider using a logical acquisition or ____ acquisition data copy method.
Note: This Question is unanswered, help us to find answer for this one
718. Classifying end users as internal versus external is a classification by ____.
Answer
Correct Answer:
Relationship
Note: This Question is unanswered, help us to find answer for this one
719. Business reports that list only totals, with no individual item details, are called ____.
Answer
Correct Answer:
Summary reports
Note: This Question is unanswered, help us to find answer for this one
720. An sd card is an example of a(n) ________ card.
Note: This Question is unanswered, help us to find answer for this one
721. A(n) ________ search is more efficient than a ________ search.
Answer
Correct Answer:
Binary, linear
Note: This Question is unanswered, help us to find answer for this one
722. A(n) ________ is a worksheet where totals from other worksheets are summarized and displayed.
Answer
Correct Answer:
Summarysheet
Note: This Question is unanswered, help us to find answer for this one
723. A(n) _____ provides access for customers, employees, suppliers, and the public.
Answer
Correct Answer:
Corporate portal
Note: This Question is unanswered, help us to find answer for this one
724. A subscript is a(n) _____.
Answer
Correct Answer:
Number that indicates the position of an array element
Note: This Question is unanswered, help us to find answer for this one
725. A software package used to prepare budgets, reports, forecasts, and financial statements is a ____.
Answer
Correct Answer:
Spreadsheet program
Note: This Question is unanswered, help us to find answer for this one
726. A ____ object forces the user to select only one option from a group of options.
Answer
Correct Answer:
RadioButton
Note: This Question is unanswered, help us to find answer for this one
727. Computing components are designed to last 18 to ____ months in normal business operations.
Note: This Question is unanswered, help us to find answer for this one
728. ____ are common examples of e-marketplaces.
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
729. ____ a file places a duplicate version of the file in a new location that you specify.
Note: This Question is unanswered, help us to find answer for this one
730. ____ uses a number of hard drives to store information across multiple drive units.
Note: This Question is unanswered, help us to find answer for this one
731. ____ is registering, selling, or using a domain name to profit from someone else?s trademark.
Answer
Correct Answer:
Cybersquatting
Note: This Question is unanswered, help us to find answer for this one
732. ____ consists of full-motion images played back at various speeds.
Note: This Question is unanswered, help us to find answer for this one
733. A file not within a subfolder is said to be in the _______________.
Answer
Correct Answer:
Root directory
Note: This Question is unanswered, help us to find answer for this one
734. _____ is what you put into a computer; _____ is what you get out of it.
Answer
Correct Answer:
Data; information
Note: This Question is unanswered, help us to find answer for this one
735. A monitor is a(n) ____ device
Note: This Question is unanswered, help us to find answer for this one
736. In the chicago style, the ________ is displayed using hanging indent.
Answer
Correct Answer:
Bibliography
Note: This Question is unanswered, help us to find answer for this one
737. A ____ virus is a virus that infects a piece of executable code such as an .exe or .com file.
Answer
Correct Answer:
File infector
Note: This Question is unanswered, help us to find answer for this one
738. Each element in a two-dimensional array requires ____ subscript(s) to reference it.
Note: This Question is unanswered, help us to find answer for this one
739. An array whose elements you can access using a single subscript is a ____ array.
Answer
Correct Answer:
One dimensional
Note: This Question is unanswered, help us to find answer for this one
740. The ____ is the user interface to the os.
Note: This Question is unanswered, help us to find answer for this one
741. In a function template, the programmer substitutes ________ for ________.
Answer
Correct Answer:
Parameters, data types
Note: This Question is unanswered, help us to find answer for this one
742. Apa-style papers use ________ as the title of the list of sources.
Answer
Correct Answer:
References
Note: This Question is unanswered, help us to find answer for this one
743. Cartoonists create animated films by drawing a sequence of ____ or cells.
Note: This Question is unanswered, help us to find answer for this one
744. The ________ of a secondary storage device indicates how much data the storage medium can hold.
Note: This Question is unanswered, help us to find answer for this one
745. The sequential search algorithm uses a(n) ____ variable to track whether the item is found.
Note: This Question is unanswered, help us to find answer for this one
746. Computer-integrated manufacturing integrates ______________ with manufacturing.
Answer
Correct Answer:
Information from across the organization
Note: This Question is unanswered, help us to find answer for this one
747. To hide field codes on the screen, press the ____ keys.
Note: This Question is unanswered, help us to find answer for this one
748. Desktop, laptop, and tablet computers, and mobile devices are classified as _______.
Answer
Correct Answer:
Personal computers
Note: This Question is unanswered, help us to find answer for this one
749. In a cd-r, the r stands for ____ technology.
Answer
Correct Answer:
Recordable
Note: This Question is unanswered, help us to find answer for this one
750. Tables queries and forms are examples of access ____
Note: This Question is unanswered, help us to find answer for this one
751. Use the ________ method to write text to a web page.
Answer
Correct Answer:
Document.write()
Note: This Question is unanswered, help us to find answer for this one
752. During the early years of computing, a mainframe computer was called the ____.
Note: This Question is unanswered, help us to find answer for this one
753. Analysts often refer to the three ____’s when describing characteristics of big data
Note: This Question is unanswered, help us to find answer for this one
754. To create a module you write its ________.
Answer
Correct Answer:
Definition
Note: This Question is unanswered, help us to find answer for this one
755. When working in the navigation pane, you ____ a folder to open it.
Answer
Correct Answer:
Double-click
Note: This Question is unanswered, help us to find answer for this one
756. Which of the following is not a comparison operator ____
Note: This Question is unanswered, help us to find answer for this one
757. Personal ethics deals with ____.
Answer
Correct Answer:
The choices and behaviors made by individuals
Note: This Question is unanswered, help us to find answer for this one
758. To watch video on a computer, you need special hardware plus software known as a _____.
Answer
Correct Answer:
Media player
Note: This Question is unanswered, help us to find answer for this one
759. A race condition ____.
Answer
Correct Answer:
Results when several threads try to access and modify the same data concurrently
Note: This Question is unanswered, help us to find answer for this one
760. The number of colors a monitor can display is referred to as ____
Answer
Correct Answer:
Color depth
Note: This Question is unanswered, help us to find answer for this one
761. The process of accessing information from secondary storage devices is referred to as _______.
Note: This Question is unanswered, help us to find answer for this one
762. Implicit memory is to _____ as explicit memory is to _____.
Answer
Correct Answer:
Priming; episodic memory
Note: This Question is unanswered, help us to find answer for this one
763. When a user prints a report for class, the report would be ________.
Note: This Question is unanswered, help us to find answer for this one
764. The most basic file ____ are characteristics such as filename, creation date, and modified date.
Note: This Question is unanswered, help us to find answer for this one
765. The term for a collection of website files stored on a web server is ____.
Answer
Correct Answer:
remote website
Note: This Question is unanswered, help us to find answer for this one
766. The ____________________ of relational and logical operators is said to be from left to right.
Answer
Correct Answer:
Associativity
Note: This Question is unanswered, help us to find answer for this one
767. The ________ operator is used in c++ to test for equality.
Note: This Question is unanswered, help us to find answer for this one
768. The ________ operator is a unary operator, as it works with only one operand.
Note: This Question is unanswered, help us to find answer for this one
769. The ________ of a local variable is the function in which that variable is created.
Note: This Question is unanswered, help us to find answer for this one
770. The ____ command can be used to provide a long listing for each file in a certain directory.
Note: This Question is unanswered, help us to find answer for this one
771. Digital wallet transactions occur ____.
Answer
Correct Answer:
either a. or b
Note: This Question is unanswered, help us to find answer for this one
772. Cloud computing provides ____ on demand, which matches resources to needs at any given time.
Note: This Question is unanswered, help us to find answer for this one
773. Before using the data type string, the program must include the header file ____.
Note: This Question is unanswered, help us to find answer for this one
774. A(n) _____ is an input device used to grade multiple-choice and true/false tests.
Answer
Correct Answer:
Optical mark recognition system
Note: This Question is unanswered, help us to find answer for this one
775. A search can be performed on an array of ________ .
Note: This Question is unanswered, help us to find answer for this one
776. A _____ is the size of a character.
Answer
Correct Answer:
Fixed, variable
Note: This Question is unanswered, help us to find answer for this one
777. A _____ allows data to be stored in multiple places to improve a system’s reliability.
Answer
Correct Answer:
A redundant array of independent disks
Note: This Question is unanswered, help us to find answer for this one
778. One of the most popular ____ options is netflix.
Answer
Correct Answer:
Video on demand
Note: This Question is unanswered, help us to find answer for this one
779. Objects in an array are accessed with ________, just like any other data type in an array.
Answer
Correct Answer:
Subscripts
Note: This Question is unanswered, help us to find answer for this one
780. The ____ feature automatically locates specific text and then replaces it with desired text.
Answer
Correct Answer:
Find and Replace
Note: This Question is unanswered, help us to find answer for this one
781. The \ operator is the arithmetic operator for ____ division.
Note: This Question is unanswered, help us to find answer for this one
782. The _____ keyword is required to use relational operators in a case statement.
Note: This Question is unanswered, help us to find answer for this one
783. In c++, ____ is a reserved word.
Note: This Question is unanswered, help us to find answer for this one
784. When you return an array from a method, the method returns __________.
Answer
Correct Answer:
The reference of the array
Note: This Question is unanswered, help us to find answer for this one
785. When you copy data from a file on a storage device into ram, you ____ from the file.
Note: This Question is unanswered, help us to find answer for this one
786. Raid 0 uses disk ____, which spreads files over several disk drives.
Answer
Correct Answer:
Stripping
Note: This Question is unanswered, help us to find answer for this one
787. Programming style is important, because ________.
Answer
Correct Answer:
Good programming style makes a program more readable Good programming style helps reduce programming errors
Note: This question has more than 1 correct answers
Note: This Question is unanswered, help us to find answer for this one
788. Data types that are created by the programmer are known as ________.
Answer
Correct Answer:
Abstract data types
Note: This Question is unanswered, help us to find answer for this one
789. A sorting ____ is a field position within each line.
Answer
Correct Answer:
Sorting key
Note: This Question is unanswered, help us to find answer for this one
790. A simple text file is called a ____ file.
Answer
Correct Answer:
Sequential
Note: This Question is unanswered, help us to find answer for this one
791. ________ happens when an input operation attempts to read data, but there is no data to read.
Answer
Correct Answer:
Empty Input
Note: This Question is unanswered, help us to find answer for this one
792. A destructor has the character ____, followed by the name of the class.
Note: This Question is unanswered, help us to find answer for this one
793. The relationship created with composition is called a(n) ____ relationship.
Note: This Question is unanswered, help us to find answer for this one
794. Virtualization is the process by which ________.
Answer
Correct Answer:
One physical computer hosts many different virtual computers within it
Note: This Question is unanswered, help us to find answer for this one
795. The two major types of system software programs are utility programs and the ________.
Answer
Correct Answer:
Operating system
Note: This Question is unanswered, help us to find answer for this one
796. The first step in building an entity-relationship diagram (erd) is _____.
Answer
Correct Answer:
Identifying the attributes and primary keys that adequately describe the entities
Note: This Question is unanswered, help us to find answer for this one
797. The bullets button is available on the home tab of the ribbon in the ____ group.
Answer
Correct Answer:
Paragraph
Note: This Question is unanswered, help us to find answer for this one
798. The ________ of the operating system enables users to communicate with the computer system.
Answer
Correct Answer:
User Interface
Note: This Question is unanswered, help us to find answer for this one
799. The ________ has the largest capacity of any storage device
Answer
Correct Answer:
Mechanical Hard Drive
Note: This Question is unanswered, help us to find answer for this one
800. Many programming languages include a string operation called __________.
Answer
Correct Answer:
Concatenation
Note: This Question is unanswered, help us to find answer for this one
801. A _____ enables communication by defining the format of data and rules for exchange.
Note: This Question is unanswered, help us to find answer for this one
802. The components of a struct are called the ____ of the struct.
Note: This Question is unanswered, help us to find answer for this one
803. The base case ________ the recursion.
Note: This Question is unanswered, help us to find answer for this one
804. The application gateway is also known as a(n) ____
Answer
Correct Answer:
Application level firewall
Note: This Question is unanswered, help us to find answer for this one
805. The 802.11 frame contains the _____ field.
Answer
Correct Answer:
Protocol version
Note: This Question is unanswered, help us to find answer for this one
806. Parsedouble is a method in the ________ class.
Note: This Question is unanswered, help us to find answer for this one
807. When they have the same name, variables within ____ of a class override the class’s fields.
Note: This Question is unanswered, help us to find answer for this one
808. A user ____ is what the user sees and interacts with while an application is running.
Answer
Correct Answer:
Interface
Note: This Question is unanswered, help us to find answer for this one
809. The most common type of database used on pcs today is a(n) ____.
Answer
Correct Answer:
Relational database
Note: This Question is unanswered, help us to find answer for this one
810. A ____ is a shared electrical or optical channel that connects two or more devices.
Note: This Question is unanswered, help us to find answer for this one
811. Many display devices are _____ monitors.
Answer
Correct Answer:
Flat panel
Note: This Question is unanswered, help us to find answer for this one
812. According to the value chain model, technology is considered a ________ of the firm.
Answer
Correct Answer:
Support activity
Note: This Question is unanswered, help us to find answer for this one
813. The class ____ is the base of the classes designed to handle exceptions.
Answer
Correct Answer:
Exception
Note: This Question is unanswered, help us to find answer for this one
814. Most commercial ________ include(s) an online catalog, a shopping cart, and a secure order form.
Answer
Correct Answer:
E-commerce hosting packages
Note: This Question is unanswered, help us to find answer for this one
815. Metadata are ________.
Answer
Correct Answer:
Data that describe data
Note: This Question is unanswered, help us to find answer for this one
816. The ethernet length field gives the length of the ________.
Answer
Correct Answer:
Data field
Note: This Question is unanswered, help us to find answer for this one
817. Rad relies heavily on ____
Answer
Correct Answer:
Prototyping
Note: This Question is unanswered, help us to find answer for this one
818. Xlsx and gif are examples of file ____.
Answer
Correct Answer:
Extensions
Note: This Question is unanswered, help us to find answer for this one
819. With ____, macintosh moved to the intel processor and became unix based.
Note: This Question is unanswered, help us to find answer for this one
820. Wary bidders in low-price auctions can check the_____ to protect themselves from being cheated.
Answer
Correct Answer:
Seller's records
Note: This Question is unanswered, help us to find answer for this one
821. Two pioneers of usability testing are _____ and jakob nielsen.
Answer
Correct Answer:
Ben Shneiderman
Note: This Question is unanswered, help us to find answer for this one
822. Traditionally, large companies distribute excess inventory through _____.
Answer
Correct Answer:
Their own Web auction sites
Note: This Question is unanswered, help us to find answer for this one
823. To declare a constant max_length inside a method with value 99.98, you write ________.
Answer
Correct Answer:
Final double MAX_LENGTH = 99.98;
Note: This Question is unanswered, help us to find answer for this one
824. The process of converting human-readable data into machine-readable form is called _____.
Answer
Correct Answer:
Data entry
Note: This Question is unanswered, help us to find answer for this one
825. Flatbed, sheet-fed, pen, and handheld are types of _____.
Note: This Question is unanswered, help us to find answer for this one
826. To increase a paragraph indent use the _____ shortcut keys
Note: This Question is unanswered, help us to find answer for this one
827. A structure that has a loop that is inside another loop is called a(n) ________ loop
Note: This Question is unanswered, help us to find answer for this one
828. The type of software used widely in businesses to complete specific tasks is _____.
Answer
Correct Answer:
Application software
Note: This Question is unanswered, help us to find answer for this one
829. Information systems improve process quality by ________.
Answer
Correct Answer:
Controlling process flow
Note: This Question is unanswered, help us to find answer for this one
830. Information entered into a field is called the field ____.
Note: This Question is unanswered, help us to find answer for this one
831. A(n) ____________________ is a memory location whose contents can be changed.
Note: This Question is unanswered, help us to find answer for this one
832. A(n) _____ provides rapid access to timely information and direct access to management reports.
Answer
Correct Answer:
Digital dashboard
Note: This Question is unanswered, help us to find answer for this one
833. A type of memory whose contents are not lost if the power is turned off is said to be _____.
Answer
Correct Answer:
Nonvolatile
Note: This Question is unanswered, help us to find answer for this one
834. A protocol analyzer is also known as ____.
Note: This Question is unanswered, help us to find answer for this one
835. A market pay line _____.
Answer
Correct Answer:
Links a company's benchmark jobs with market rates paid by competitors
Note: This Question is unanswered, help us to find answer for this one
836. A digital computer uses _____ that represent data in the form of code.
Note: This Question is unanswered, help us to find answer for this one
837. A digital _____ is a digital code or stream embedded undetectably in a digital image or audio file.
Answer
Correct Answer:
Watermark
Note: This Question is unanswered, help us to find answer for this one
838. A computer with a quad-processor has ________ cpus.
Note: This Question is unanswered, help us to find answer for this one
839. A computer that supports 10/100/1000 ethernet allows for 10, 100, or 1000 ________ per second.
Note: This Question is unanswered, help us to find answer for this one
840. A computer bus consists of data lines, __________, control lines, and power lines.
Answer
Correct Answer:
Address lines
Note: This Question is unanswered, help us to find answer for this one
841. A _____ is a program hidden inside another program or web page that masks its true purpose.
Answer
Correct Answer:
Trojan Horse
Note: This Question is unanswered, help us to find answer for this one
842. A _____ is a private network connecting servers and storage units.
Answer
Correct Answer:
Storage-area network
Note: This Question is unanswered, help us to find answer for this one
843. A ____ should be used to provide visual indication that option buttons belong in the same group.
Note: This Question is unanswered, help us to find answer for this one
844. ________ is the worldwide leader of erp vendors
Note: This Question is unanswered, help us to find answer for this one
845. ________ is the worldwide leader of enterprise resource planning (erp) vendors.
Note: This Question is unanswered, help us to find answer for this one
846. ________ duplicates data across databases.
Answer
Correct Answer:
Data propagation
Note: This Question is unanswered, help us to find answer for this one
847. _______ provide additional information and request user input.
Answer
Correct Answer:
Dialog boxes
Note: This Question is unanswered, help us to find answer for this one
848. ______ is a form of database processing that supports top-down, query-driven data analysis.
Answer
Correct Answer:
Online analytical processing (OLAP)
Note: This Question is unanswered, help us to find answer for this one
849. _____ is the use of interpersonal connections online to promote or sell goods and services.
Answer
Correct Answer:
Social commerce
Note: This Question is unanswered, help us to find answer for this one
850. Clicking the show/hide button on the home tab of the ribbon displays ________.
Answer
Correct Answer:
Formatting marks
Note: This Question is unanswered, help us to find answer for this one
851. Loops are frequently used to ____; that is, to make sure it is meaningful and useful.
Answer
Correct Answer:
Validate data
Note: This Question is unanswered, help us to find answer for this one
852. Note that the unicode for character a is 65. the expression ""a"" + 1 evaluates to ________.
Note: This Question is unanswered, help us to find answer for this one
853. In the accompanying figure, the text “click to add title” is the title ____.
Answer
Correct Answer:
Placeholder.
Note: This Question is unanswered, help us to find answer for this one
854. In the accompanying figure, the split double arrow mouse pointer ____.
Answer
Correct Answer:
Is the result of moving the mouse pointer to the boundary between column heading A and column
Note: This Question is unanswered, help us to find answer for this one
855. A(n) ______ is a request for specific data from a database.
Note: This Question is unanswered, help us to find answer for this one
856. You may hear programmers refer to looping as ____.
Answer
Correct Answer:
Iteration
Note: This Question is unanswered, help us to find answer for this one
857. To securely erase data, the u.s. department of defense suggests that data be ________.
Answer
Correct Answer:
Overwritten multiple times
Note: This Question is unanswered, help us to find answer for this one
858. To declare a constant max_length as a member of the class, you write ________.
Answer
Correct Answer:
Final static double MAX_LENGTH = 99.98
Note: This Question is unanswered, help us to find answer for this one
859. The true benefit of using an array lies in your ability to use a ____ as a subscript to the array.
Note: This Question is unanswered, help us to find answer for this one
860. The leads online web-based service system is used by law enforcement to ____.
Answer
Correct Answer:
Recover stolen property
Note: This Question is unanswered, help us to find answer for this one
861. The last step in a while loop is usually to ____.
Answer
Correct Answer:
Increment the loop control variable
Note: This Question is unanswered, help us to find answer for this one
862. The amount by which a for loop control variable changes is often called a ____ value.
Note: This Question is unanswered, help us to find answer for this one
863. The action or actions that occur within a loop are known as a(n) ____.
Answer
Correct Answer:
Loop body
Note: This Question is unanswered, help us to find answer for this one
864. Many programming languages allow you to use ____ to force an expression to evaluate first.
Answer
Correct Answer:
Parentheses
Note: This Question is unanswered, help us to find answer for this one
865. Antiglare screens are sometimes called ____.
Answer
Correct Answer:
Eye protectors
Note: This Question is unanswered, help us to find answer for this one
866. A(n) ____ is a data element containing the address of another data element.
Note: This Question is unanswered, help us to find answer for this one
867. When calling this() from a constructor, it must be the ____ statement within the constructor.
Note: This Question is unanswered, help us to find answer for this one
868. Usually, when you create nested loops, each loop has its own ____.
Answer
Correct Answer:
Loop control variable
Note: This Question is unanswered, help us to find answer for this one
869. The mac computer employs the ____ system to encrypt its file data.
Answer
Correct Answer:
FireVault
Note: This Question is unanswered, help us to find answer for this one
870. The ________ and ________ operators can be used to increment or decrement a pointer variable.
Note: This Question is unanswered, help us to find answer for this one
871. One advantage of proprietary software versus off-the-shelf software is that _____.
Answer
Correct Answer:
Being involved in the development offers control over the results
Note: This Question is unanswered, help us to find answer for this one
872. Once your logic enters the body of a structured loop, ____.
Answer
Correct Answer:
The entire loop must execute
Note: This Question is unanswered, help us to find answer for this one
873. Every array has a(n) ____ size.
Note: This Question is unanswered, help us to find answer for this one
874. Comparison operators are also referred to as ____ operators.
Answer
Correct Answer:
Relational
Note: This Question is unanswered, help us to find answer for this one
875. Class ________ represents an image that can be displayed on a jlabel.
Answer
Correct Answer:
ImageIcon.
Note: This Question is unanswered, help us to find answer for this one
876. A dvd-rom uses all of the following to achieve a higher storage capacity than a cd-rom except ____.
Answer
Correct Answer:
Making the disc single-session
Note: This Question is unanswered, help us to find answer for this one
877. Encryption that uses 16-character keys is known as ____.
Answer
Correct Answer:
Strong 128-bit encryption
Note: This Question is unanswered, help us to find answer for this one
878. An attribute of an entity in a table is called a ________.
Note: This Question is unanswered, help us to find answer for this one
879. All of the following are examples of software packages except ________.
Answer
Correct Answer:
Microsoft OneNote
Note: This Question is unanswered, help us to find answer for this one
880. The ________ operator performs division and returns the remainder.
Note: This Question is unanswered, help us to find answer for this one
881. The ____ of a variable specifies where a variable can be referenced within a program.
Note: This Question is unanswered, help us to find answer for this one
882. File management capabilities available from application software include ____ files.
Answer
Correct Answer:
ALL OF THE ABOVE
Note: This Question is unanswered, help us to find answer for this one
883. A pointer variable may be initialized with ________.
Answer
Correct Answer:
Any address in the computer's memory
Note: This Question is unanswered, help us to find answer for this one
884. A member function that is declared ________ cannot use the this pointer.
Note: This Question is unanswered, help us to find answer for this one
885. A function ________ return a structure.
Note: This Question is unanswered, help us to find answer for this one
886. ____ is freeware software.
Answer
Correct Answer:
Internet Explorer (Web browser)
Note: This Question is unanswered, help us to find answer for this one
887. ________ is not one of the five primary activities in the value chain.
Answer
Correct Answer:
Firm infrastructure (accounting, finance, management)
Note: This Question is unanswered, help us to find answer for this one
888. ________ is free software created and updated by a worldwide community of programmers.
Answer
Correct Answer:
Open-source software
Note: This Question is unanswered, help us to find answer for this one
889. ________ is a standard way of drawing diagrams that describe object-oriented systems.
Note: This Question is unanswered, help us to find answer for this one
890. ________ is a set of commands used to control a database, which includes security.
Note: This Question is unanswered, help us to find answer for this one
891. A(n) _____ describes information about an object.
Answer
Correct Answer:
Attribute
Note: This Question is unanswered, help us to find answer for this one
892. A _____ can be as powerful as a desktop computer.
Note: This Question is unanswered, help us to find answer for this one
893. A ____ virus is a common type of virus that is programmed into an attached macro file.
Note: This Question is unanswered, help us to find answer for this one
894. A ____ symbol is another name for a dot symbol
Note: This Question is unanswered, help us to find answer for this one
895. A ____ storage device stores and retrieves data items in a linear, or sequential, order.
Answer
Correct Answer:
Serial Access
Note: This Question is unanswered, help us to find answer for this one
896. ________ is sometimes the term used for input validation.
Answer
Correct Answer:
Error trap
Note: This Question is unanswered, help us to find answer for this one
897. ____ software controls the flow of data, provides data security, and manages network operations.
Note: This Question is unanswered, help us to find answer for this one
898. ____ is a shareware program
Answer
Correct Answer:
WinZip (file compression program
Note: This Question is unanswered, help us to find answer for this one
899. ____ is a process that hides encrypted messages within different types of files.
Answer
Correct Answer:
Steganography
Note: This Question is unanswered, help us to find answer for this one
900. ____ also is called looping.
Answer
Correct Answer:
Iteration
Note: This Question is unanswered, help us to find answer for this one
901. To insert data into an ole object field, use ____ command on the ole?s shortcut menu.
Answer
Correct Answer:
Insert Object
Note: This Question is unanswered, help us to find answer for this one
902. Winload loads into memory the ________________ but does not start it yet.
Note: This Question is unanswered, help us to find answer for this one
903. To delete data from a disk in such a way that no one can ever read it, you should ____.
Answer
Correct Answer:
Use special file shredder software
Note: This Question is unanswered, help us to find answer for this one
904. The four functions of the computer include input, process, output, and ________.
Note: This Question is unanswered, help us to find answer for this one
905. The two main categories of home and office printers are ________ and laser printers.
Note: This Question is unanswered, help us to find answer for this one
906. To include the total row in the design grid, click the ____ button on the design tab.
Note: This Question is unanswered, help us to find answer for this one
907. Usb drives can store up to ____ of data
Note: This Question is unanswered, help us to find answer for this one
908. The first basic step in the development process of a multimedia web site is ____.
Answer
Correct Answer:
Creating the multimedia elements
Note: This Question is unanswered, help us to find answer for this one
909. The characteristics of an entity are called ____.
Answer
Correct Answer:
Attributes
Note: This Question is unanswered, help us to find answer for this one
910. The number of bits used to store color information about each pixel is called ____.
Answer
Correct Answer:
Bit depth
Note: This Question is unanswered, help us to find answer for this one
911. The traditional keyboard layout is called _________.
Note: This Question is unanswered, help us to find answer for this one
912. Use ____ references when you want different formulas to refer to the same cell
Note: This Question is unanswered, help us to find answer for this one
913. When an html document includes a script, it is included the ____ section.
Note: This Question is unanswered, help us to find answer for this one
914. When an array is passed to a function, it is actually ________ the array that is/are passed.
Answer
Correct Answer:
A copy of all the values in
Note: This Question is unanswered, help us to find answer for this one
915. When an application is run, the method that must be executed first must be named ____.
Note: This Question is unanswered, help us to find answer for this one
916. You may use a pointer to a structure as a ________.
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
917. The primary input devices for smartphones are ________.
Answer
Correct Answer:
Microphone and touch pad
Note: This Question is unanswered, help us to find answer for this one
918. You specify 2d colors by using the ____ method.
Note: This Question is unanswered, help us to find answer for this one
919. When reading words using a scanner object's next method, ____.
Answer
Correct Answer:
Any characters at the beginning of the input that are considered to be white space are consumed and become part of the word being read.
Note: This Question is unanswered, help us to find answer for this one
920. When preparing a case, you can apply ____ to problem solving.
Answer
Correct Answer:
Standard systems analysis steps
Note: This Question is unanswered, help us to find answer for this one
921. Web based application software is software that ________
Answer
Correct Answer:
Is stored completely on a web server instead of your hard drive
Note: This Question is unanswered, help us to find answer for this one
922. Vector graphics is the use of ____ to represent images in computer graphics
Note: This Question is unanswered, help us to find answer for this one
923. Variety-based positioning refers to __________.
Answer
Correct Answer:
Serving few needs of many customers
Note: This Question is unanswered, help us to find answer for this one
924. Variety can ________ a design
Answer
Correct Answer:
Invigorate
Note: This Question is unanswered, help us to find answer for this one
925. Variables defined in the method header are called ________.
Answer
Correct Answer:
Formal parameters
Note: This Question is unanswered, help us to find answer for this one
926. Use the ________ property to configure rounded corners with css.
Answer
Correct Answer:
Border-radius
Note: This Question is unanswered, help us to find answer for this one
927. Unwanted or junk e-mail is called ________.
Note: This Question is unanswered, help us to find answer for this one
928. Unix and linux are ____ systems, which allow one user to execute more than one program at a time.
Answer
Correct Answer:
Multitasking
Note: This Question is unanswered, help us to find answer for this one
929. Thousands of computers working in parallel to deliver services is called a ________.
Answer
Correct Answer:
Server farm
Note: This Question is unanswered, help us to find answer for this one
930. This piece is entitled _______(1)_______. it is attributed to the _______(2)_______.
Answer
Correct Answer:
(1) Hunter’s Mural; (2) Freemont people
Note: This Question is unanswered, help us to find answer for this one
931. The way a network is designed to communicate is known as its ____.
Answer
Correct Answer:
Architecture
Note: This Question is unanswered, help us to find answer for this one
932. The statement, ____, removes the table smaller from a dbms.
Answer
Correct Answer:
DROP TABLE Smaller ;
Note: This Question is unanswered, help us to find answer for this one
933. The sql ________ statement allows you to combine two different tables.
Note: This Question is unanswered, help us to find answer for this one
934. The special operator used to check whether a subquery returns any rows is ____.
Note: This Question is unanswered, help us to find answer for this one
935. The section of an inode that stores permissions is called the ____ of the file.
Note: This Question is unanswered, help us to find answer for this one
936. The primary outcome of the systems analysis phase is ____.
Answer
Correct Answer:
A prioritized list of system requirements
Note: This Question is unanswered, help us to find answer for this one
937. The order of operations for _____________ is not first, then and, then or.
Answer
Correct Answer:
Logical operators
Note: This Question is unanswered, help us to find answer for this one
938. The optical _________ is the most common pointing device for desktop computers.
Note: This Question is unanswered, help us to find answer for this one
939. You use the ____ method to select all of the text contained in a text box.
Answer
Correct Answer:
SelectAll
Note: This Question is unanswered, help us to find answer for this one
940. You should use a ____ control to provide keyboard access to a list box.
Note: This Question is unanswered, help us to find answer for this one
941. The part of the data bus that runs between the microprocessor and ram is called the _______ bus.
Answer
Correct Answer:
Local (A)
Note: This Question is unanswered, help us to find answer for this one
942. When you need to sort data on two columns, the less important column is called the ____ sort key.
Note: This Question is unanswered, help us to find answer for this one
943. Unencrypted information is called ____.
Answer
Correct Answer:
Plain text
Note: This Question is unanswered, help us to find answer for this one
944. When the ________ is placed in front of a variable name, it returns the address of that variable.
Answer
Correct Answer:
Ampersand ( & )
Note: This Question is unanswered, help us to find answer for this one
945. When defining a variable, the keyword ____ appears at the beginning of the statement.
Note: This Question is unanswered, help us to find answer for this one
946. "to select and set properties for an entire section, click on the ____.
Answer
Correct Answer:
Section selector
Note: This Question is unanswered, help us to find answer for this one
947. When you store data records, they exist in ____.
Answer
Correct Answer:
Some type of order
Note: This Question is unanswered, help us to find answer for this one
948. Use the ______ value for the css display property to configure an element to not display.
Note: This Question is unanswered, help us to find answer for this one
949. When functions are nested, the ____ function is solved first.
Note: This Question is unanswered, help us to find answer for this one
950. To quit access, click the ____ button on the right side of the access title bar.
Note: This Question is unanswered, help us to find answer for this one
951. Podcasts enable you to ________
Answer
Correct Answer:
Deliver audio/video files via RSS
Note: This Question is unanswered, help us to find answer for this one
952. Only positive scenarios are validated in ___________ testing.
Answer
Correct Answer:
Build verification
Note: This Question is unanswered, help us to find answer for this one
953. One type of mobile phone that is not commonly used is the ____.
Answer
Correct Answer:
Satellite phone
Note: This Question is unanswered, help us to find answer for this one
954. One of the reasons the apple ii computer was popular was that ________.
Answer
Correct Answer:
The operating system was stored in ROM
Note: This Question is unanswered, help us to find answer for this one
955. One of the most common painting programs is ____.
Answer
Correct Answer:
Microsoft paint
Note: This Question is unanswered, help us to find answer for this one
956. In the tag, the ____ attribute indicates the type of data to be embedded.
Note: This Question is unanswered, help us to find answer for this one
957. In excel, the clipboard task pane opens ____ the worksheet window.
Answer
Correct Answer:
To the left of
Note: This Question is unanswered, help us to find answer for this one
958. If your device will not display a pdf in your browser, you may need to install a browser ________ .
Note: This Question is unanswered, help us to find answer for this one
959. Frequently-accessed information is held in _____.
Answer
Correct Answer:
Cache memory
Note: This Question is unanswered, help us to find answer for this one
960. File names cannot contain a(n) ____.
Answer
Correct Answer:
Question mark (?), colon (:)
Note: This Question is unanswered, help us to find answer for this one
961. Every complete c++ program must have a __________.
Answer
Correct Answer:
Function named main
Note: This Question is unanswered, help us to find answer for this one
962. Each device connected to a computer must have a _______.
Note: This Question is unanswered, help us to find answer for this one
963. Declaring a starting value for a variable is known as ____ the variable.
Answer
Correct Answer:
Initializing
Note: This Question is unanswered, help us to find answer for this one
964. Data files are often called ____.
Answer
Correct Answer:
Documents
Note: This Question is unanswered, help us to find answer for this one
965. Crt monitors use ____.
Answer
Correct Answer:
Analog signals
Note: This Question is unanswered, help us to find answer for this one
966. Copying a file can be accomplished using the ____ command.
Note: This Question is unanswered, help us to find answer for this one
967. Cookie files contain ____.
Note: This Question is unanswered, help us to find answer for this one
968. Computers gather data, which means that they allow users to ________ data.
Note: This Question is unanswered, help us to find answer for this one
969. Computers characterized by their use of vacuum tubes are considered ____-generation.
Note: This Question is unanswered, help us to find answer for this one
970. Computer speech recognition is _____.
Answer
Correct Answer:
Poorer than human speech recognition
Note: This Question is unanswered, help us to find answer for this one
971. Complete the formula for processor frequency. system bus frequency x________ = processor frequency
Answer
Correct Answer:
Multiplier
Note: This Question is unanswered, help us to find answer for this one
972. Complete loss of power for a moment is known as a ____.
Note: This Question is unanswered, help us to find answer for this one
973. Comparison shopping web sites are sometimes called ____
Answer
Correct Answer:
Shopping bots
Note: This Question is unanswered, help us to find answer for this one
974. Companies that deliver saas are sometimes referred to as ____.
Answer
Correct Answer:
Application service providers
Note: This Question is unanswered, help us to find answer for this one
975. Applications that are processed across multiple computing devices is known as a ________.
Answer
Correct Answer:
Distributed system
Note: This Question is unanswered, help us to find answer for this one
976. Another name for a sniffer is a(n) ________ analyzer.
Note: This Question is unanswered, help us to find answer for this one
977. A ________ query is used to summarize data organized by field values.
Note: This Question is unanswered, help us to find answer for this one
978. An electronic component that can be programmed to perform tasks is a ____.
Answer
Correct Answer:
Microprocessor
Note: This Question is unanswered, help us to find answer for this one
979. A(n) _____ system relies on artificial intelligence.
Note: This Question is unanswered, help us to find answer for this one
980. A script to handle a support incident has ____.
Answer
Correct Answer:
Several sequences of questions with multiple decision points or paths
Note: This Question is unanswered, help us to find answer for this one
981. A rewritable ____ is a replacement for a hard drive
Answer
Correct Answer:
None of the above
Note: This Question is unanswered, help us to find answer for this one
982. A program must __________ without any errors before it can be run.
Note: This Question is unanswered, help us to find answer for this one
983. A member function that is declared ________ may not access any non-static data members in the class
Note: This Question is unanswered, help us to find answer for this one
984. A file that tells a computer how to perform a specific task is called a(n) ____ file.
Answer
Correct Answer:
Executable
Note: This Question is unanswered, help us to find answer for this one
985. A display screen should be positioned so that it ____.
Answer
Correct Answer:
Is at a 90-degree angle to the light source
Note: This Question is unanswered, help us to find answer for this one
986. A dfd shows ____.
Answer
Correct Answer:
How a system transforms input data into useful information
Note: This Question is unanswered, help us to find answer for this one
987. A device's cache and main memory are ________.
Note: This Question is unanswered, help us to find answer for this one
988. A cryptographic __________ is a procedure for encryption or decryption.
Answer
Correct Answer:
Algorithm
Note: This Question is unanswered, help us to find answer for this one
989. A client server network is an example of ________ administration
Note: This Question is unanswered, help us to find answer for this one
990. A browser __________ adds features to a browser.
Answer
Correct Answer:
Extension
Note: This Question is unanswered, help us to find answer for this one
991. A _____ is a pathway on a circuit board through which data moves.
Note: This Question is unanswered, help us to find answer for this one
992. A ____ procedure returns a single value to the calling procedure.
Note: This Question is unanswered, help us to find answer for this one
993. A ____ is an electronic circuit
Answer
Correct Answer:
Voltage limiter
Note: This Question is unanswered, help us to find answer for this one
994. A ____ is a separate piece of hardware containing multiple high-speed hard drives.
Answer
Correct Answer:
Storage server
Note: This Question is unanswered, help us to find answer for this one
995. A ____ is a question, or, in database terms, a request for specific information from the database.
Note: This Question is unanswered, help us to find answer for this one
996. A ____ is a collection of computers and users that are identified by a common security database.
Note: This Question is unanswered, help us to find answer for this one
997. A ____ chip holds software that is used to start the computer.
Note: This Question is unanswered, help us to find answer for this one
998. _____, a coding method that uses one byte per character, is used on most personal computers.
Answer
Correct Answer:
ASCII (American Standard Code for Information Interchange)
Note: This Question is unanswered, help us to find answer for this one
999. ________ is a term relating to sending data to a satellite.
Note: This Question is unanswered, help us to find answer for this one
1000. ________ are data items whose values cannot change while the program is running.
Note: This Question is unanswered, help us to find answer for this one
1001. _______ is a tool for developing a virtual representation of any three-dimensional object.
Answer
Correct Answer:
3D modeling software
Note: This Question is unanswered, help us to find answer for this one
1002. ______ output provides the user with a physical response from the input device.
Note: This Question is unanswered, help us to find answer for this one
1003. ______ is most famous for making central processing units (cpu's).
Answer
Correct Answer:
Intel- they invented the first microprocessor
Note: This Question is unanswered, help us to find answer for this one
1004. _____ means saving data in computer memory.
Note: This Question is unanswered, help us to find answer for this one
1005. _____ are programs that test code to ensure that it contains no syntax errors.
Answer
Correct Answer:
Validators
Note: This Question is unanswered, help us to find answer for this one
1006. ____ variables and constants are known to the entire program.
Note: This Question is unanswered, help us to find answer for this one
1007. ____ usually involves having a software program that monitors every transaction within a system.
Answer
Correct Answer:
Computer auditing
Note: This Question is unanswered, help us to find answer for this one
1008. ____ transmissions are used with cell phones and are sent and received via cellular (cell) towers.
Answer
Correct Answer:
Cellular radio
Note: This Question is unanswered, help us to find answer for this one
1009. ____ threats are network security threats that originate from within a network.
Note: This Question is unanswered, help us to find answer for this one
1010. ____ software helps you carry out tasks using a computer, such as editing a photo.
Answer
Correct Answer:
Application
Note: This Question is unanswered, help us to find answer for this one
1011. ____ servers can store files that internet users can download, or transfer, to their computers.
Note: This Question is unanswered, help us to find answer for this one
1012. ____ occurs when data is entered into the computer.
Note: This Question is unanswered, help us to find answer for this one
1013. ____ networks use a central device to connect each device directly to the network.
Note: This Question is unanswered, help us to find answer for this one
1014. ____ is the use of networking technology to provide medical information and services.
Answer
Correct Answer:
Telemedicine
Note: This Question is unanswered, help us to find answer for this one
1015. ____ is the fastest and most current wi-fi standard.
Answer
Correct Answer:
Telemedicine
Note: This Question is unanswered, help us to find answer for this one
1016. ____ is not a valid file name.
Answer
Correct Answer:
Mary*Jon.doc
Note: This Question is unanswered, help us to find answer for this one
1017. ____ is one of the primary operations of a computer
Answer
Correct Answer:
C:Processing
Note: This Question is unanswered, help us to find answer for this one
1018. ____ is not one of the five critical questions suggested in the chapter.
Answer
Correct Answer:
How much experience do you have using this system?
Note: This Question is unanswered, help us to find answer for this one
1019. ____ is not a common source of job stress among user support workers.
Answer
Correct Answer:
All of these are common sources
Note: This Question is unanswered, help us to find answer for this one
1020. ____ is data before any encryption has been performed.
Answer
Correct Answer:
Plaintext
Note: This Question is unanswered, help us to find answer for this one
1021. ____ is an example of a web crawler.
Answer
Correct Answer:
Googlebot
Note: This Question is unanswered, help us to find answer for this one
1022. ____ is a scripting language that does not create standalone applications.
Answer
Correct Answer:
JavaScript
Note: This Question is unanswered, help us to find answer for this one
1023. ____ is a relational set operator.
Note: This Question is unanswered, help us to find answer for this one
1024. ____ is a packet-switched network that was designed for transmitting data over fixed lines.
Answer
Correct Answer:
Frame relay
Note: This Question is unanswered, help us to find answer for this one
1025. ____ help users establish a connection to another computer, mobile device, or network.
Answer
Correct Answer:
Communications software
Note: This Question is unanswered, help us to find answer for this one
1026. ____ files involves combining two or more files while maintaining the sequential order.
Note: This Question is unanswered, help us to find answer for this one
1027. ____ cookies remain available only for the current browser session.
Answer
Correct Answer:
Temporary
Note: This Question is unanswered, help us to find answer for this one
1028. ____ can tell more about a person than all other kinds of electronic surveillance.
Answer
Correct Answer:
Data mining
Note: This Question is unanswered, help us to find answer for this one
1029. ____ browsing allows you to open multiple web pages at one time.
Note: This Question is unanswered, help us to find answer for this one
1030. ____ are used to display data that is calculated from other data, such as a total.
Answer
Correct Answer:
Calculated Controls
Note: This Question is unanswered, help us to find answer for this one
1031. ____ applications require that a record be accessed immediately while a client is waiting.
Answer
Correct Answer:
Real-time
Note: This Question is unanswered, help us to find answer for this one
1032. The statement select * from t1, t2 produces a(n) _____ join.
Note: This Question is unanswered, help us to find answer for this one
1033. The size, or _______, is measured by the diagonal length of a monitor's viewing area.
Answer
Correct Answer:
Active display area
Note: This Question is unanswered, help us to find answer for this one
1034. The setonaction method is defined in ________.
Answer
Correct Answer:
ButtonBase
Note: This Question is unanswered, help us to find answer for this one
1035. The ____ file is typically saved with a prefix of inc_.
Note: This Question is unanswered, help us to find answer for this one
1036. Suppose integer x = new integer(3); x holds ________.
Answer
Correct Answer:
A reference value to an Integer object
Note: This Question is unanswered, help us to find answer for this one
1037. Steganalysis tools are also called ____.
Answer
Correct Answer:
Steg tools
Note: This Question is unanswered, help us to find answer for this one
1038. Ram is an example of ____ storage
Note: This Question is unanswered, help us to find answer for this one
1039. Pointers are variables that contain __________ as their values.
Answer
Correct Answer:
Memory addresses
Note: This Question is unanswered, help us to find answer for this one
1040. Multiple inheritance is when a ________ class has ________ base classes.
Answer
Correct Answer:
Derived, two or more
Note: This Question is unanswered, help us to find answer for this one
1041. Methods that set values are called ____ methods.
Note: This Question is unanswered, help us to find answer for this one
1042. Metacognition involves a troubleshooter asking all these questions except ____.
Answer
Correct Answer:
What recent change in configuration caused the user to experience a problem?
Note: This Question is unanswered, help us to find answer for this one
1043. Linux is an example of a(n) ______.
Answer
Correct Answer:
Operating system
Note: This Question is unanswered, help us to find answer for this one
1044. In a helpstar dashboard, throughput measures ____.
Answer
Correct Answer:
The volume of incidents in various categories
Note: This Question is unanswered, help us to find answer for this one
1045. If a recursive function does not contain a base case, it ________.
Answer
Correct Answer:
Uses up all available stack memory, causing the program to crash
Note: This Question is unanswered, help us to find answer for this one
1046. Gui components have a set of ________ that determine how the component appears on the screen.
Answer
Correct Answer:
Properties
Note: This Question is unanswered, help us to find answer for this one
1047. Function is another name for ________.
Note: This Question is unanswered, help us to find answer for this one
1048. As with any research paper, write the ___________________ last.
Note: This Question is unanswered, help us to find answer for this one
1049. All of the following are types of multimedia and entertainment software except ________.
Answer
Correct Answer:
Productivity software
Note: This Question is unanswered, help us to find answer for this one
1050. All of the following are formats accepted for picture files except ____.
Note: This Question is unanswered, help us to find answer for this one
1051. All of the following are examples of software suites except ________.
Answer
Correct Answer:
Microsoft OneNote
Note: This Question is unanswered, help us to find answer for this one
1052. All of the following are examples of database software except ________.
Note: This Question is unanswered, help us to find answer for this one
1053. A struct is a(n) ____________________, not a declaration.
Answer
Correct Answer:
Definition
Note: This Question is unanswered, help us to find answer for this one
1054. A specific formula for solving a problem is called ________.
Answer
Correct Answer:
An algorithm
Note: This Question is unanswered, help us to find answer for this one
1055. A relation is a(n) ____.
Note: This Question is unanswered, help us to find answer for this one
1056. A join line is also called a(n) ____ line.
Note: This Question is unanswered, help us to find answer for this one
1057. ____ measures image clarity
Answer
Correct Answer:
DOT PITCH
Note: This Question is unanswered, help us to find answer for this one
Computer Science MCQs | Topic-wise
Computer Science Subjects
|