1. ______ is a collection of unprocessed items, including text, numbers, images, audio, and video.
Answer
Correct Answer:
Data
Note: This Question is unanswered, help us to find answer for this one
2. ______ transforms one video image into another image over the course of several frames of video.
Answer
Correct Answer:
Morphing
Note: This Question is unanswered, help us to find answer for this one
3. When a subquery is used, ____ is(are) evaluated first.
Answer
Correct Answer:
the sub query
Note: This Question is unanswered, help us to find answer for this one
4. With _____, you can access storage and applications over the internet.
Answer
Correct Answer:
Cloud Computing
Note: This Question is unanswered, help us to find answer for this one
5. Data sent by a program to the screen, a printer, or a file is __________.
Answer
Correct Answer:
Output
Note: This Question is unanswered, help us to find answer for this one
6. When you are looking for a 'hotspot', you are searching for _____.
Answer
Correct Answer:
A wireless access point
Note: This Question is unanswered, help us to find answer for this one
7. A user name ________ a user.
Answer
Correct Answer:
Identifies
Note: This Question is unanswered, help us to find answer for this one
8. A ____ network is the only network that offers a dedicated path.
Answer
Correct Answer:
Packet switch
Note: This Question is unanswered, help us to find answer for this one
9. A distributed computing system usually includes ____.
Answer
Correct Answer:
All of these
Note: This Question is unanswered, help us to find answer for this one
10. Characters are made up of smaller elements called ____.
Answer
Correct Answer:
Bits
Note: This Question is unanswered, help us to find answer for this one
11. A ____ is responsible for maintaining a large, multiuser system.
Answer
Correct Answer:
System administrator
Note: This Question is unanswered, help us to find answer for this one
12. If data aggregation is the goal of collecting the data, ______ are the best choice.
Answer
Correct Answer:
Classifications
Note: This Question is unanswered, help us to find answer for this one
13. Entering data into a computer system is also known as ________________ data.
Answer
Correct Answer:
Capturing
Note: This Question is unanswered, help us to find answer for this one
14. Data that a computer accepts and processes is called ______.
Answer
Correct Answer:
Imput
Note: This Question is unanswered, help us to find answer for this one
15. Daas stands for ______ as a service.
Answer
Correct Answer:
Data
Note: This Question is unanswered, help us to find answer for this one
16. Cloud pricing structure is a ____-based model.
Answer
Correct Answer:
Subscription
Note: This Question is unanswered, help us to find answer for this one
17. Buses differ according to their ____.
Answer
Correct Answer:
Capacity
Note: This Question is unanswered, help us to find answer for this one
18. Among the rights you have as a user of computing resources is the right to _______.
Answer
Correct Answer:
Protection from viruses, worms, and other threats
Note: This Question is unanswered, help us to find answer for this one
19. A microsoft ________ account allows you to store and share files in the cloud.
Answer
Correct Answer:
OneDrive
Note: This Question is unanswered, help us to find answer for this one
20. A graphics tablet also is called a(n) ______.
Answer
Correct Answer:
Digitizer
Note: This Question is unanswered, help us to find answer for this one
21. A common way to move an object from one location to another using a mouse is to ______.
Answer
Correct Answer:
Drag
Note: This Question is unanswered, help us to find answer for this one
22. A byte's ______ is a unique number that identifies the location of a byte in memory.
Answer
Correct Answer:
Address
Note: This Question is unanswered, help us to find answer for this one
23. ________ is used to solve large-scale computing problems.
Answer
Correct Answer:
Grid Computing
Note: This Question is unanswered, help us to find answer for this one
24. Windows
Answer
Correct Answer:
Computer _____ temporarily stores instructions and data that the processor is likely to use frequently.
Note: This Question is unanswered, help us to find answer for this one
25. Defragmentation
Answer
Correct Answer:
By using a _______________ utility - files on a disk are rearranged so that they are stored in contiguous clusters.
Note: This Question is unanswered, help us to find answer for this one
26. Changed
Answer
Correct Answer:
MAC addresses are set from the factory and cannot be ________ by the network admin.
Note: This Question is unanswered, help us to find answer for this one
27. Securely
Answer
Correct Answer:
SSL and TLS are protocols used to ________ transmit credit card data over the Internet.
Note: This Question is unanswered, help us to find answer for this one
28. Microcomputers
Answer
Correct Answer:
Personal computers are also called ______________.
Note: This Question is unanswered, help us to find answer for this one
29. Overheat
Answer
Correct Answer:
Overclocking is popular with computer gamers but can be dangerous as components may _________ and be damaged or catch fire.
Note: This Question is unanswered, help us to find answer for this one
30. Com
Answer
Correct Answer:
What part of the URL http://instantcert.com/landing.html is the top level domain? ___
Note: This Question is unanswered, help us to find answer for this one
31. Instructions
Answer
Correct Answer:
A programming language is a set of keywords and grammar rules used to create ____________ for a computer.
Note: This Question is unanswered, help us to find answer for this one
32. Copyrighted
Answer
Correct Answer:
Public domain software is not ___________ and can be copied without fear of prosecution.
Note: This Question is unanswered, help us to find answer for this one
33. Buffer
Answer
Correct Answer:
On a hard disk - this waiting area is called a _______.
Note: This Question is unanswered, help us to find answer for this one
34. Cable
Answer
Correct Answer:
A bus network has two endpoints and all computers are connected to a single wire or _____.
Note: This Question is unanswered, help us to find answer for this one
35. Three dimensional
Answer
Correct Answer:
Virtual reality is a computer generated artificial reality which projects a person into a sensation of _____ ____________ space.
Note: This Question is unanswered, help us to find answer for this one
36. Local Area
Answer
Correct Answer:
A LAN (______ _____ Network) normally occupies a single building.
Note: This Question is unanswered, help us to find answer for this one
37. Employment
Answer
Correct Answer:
A job search agent is an automated program that searches one or more __________ databases and notifies you when it finds leads that match your search criteria.
Note: This Question is unanswered, help us to find answer for this one
38. Organize
Answer
Correct Answer:
Databases use structured files to _________ data.
Note: This Question is unanswered, help us to find answer for this one
39. Routes
Answer
Correct Answer:
The TCP/IP protocol breaks data up into packets - which are fixed-length blocks of data - for transmission over the network. This permits the message to be broken up into small parts which are then transmitted over separate _______ and yet all end up
Note: This Question is unanswered, help us to find answer for this one
40. Formula
Answer
Correct Answer:
An algorithm is a _______ or set of steps for solving a particular problem.
Note: This Question is unanswered, help us to find answer for this one
41. Hypertext
Answer
Correct Answer:
HTML (__________ Markup Language) tags are used to structure and format web pages and links to other documents.
Note: This Question is unanswered, help us to find answer for this one
42. Served
Answer
Correct Answer:
Messages are divided into equal size packets and shipped over the network on a first come first _______ basis.
Note: This Question is unanswered, help us to find answer for this one
43. Sequentially
Answer
Correct Answer:
With serial processing - instructions are executed ______________ in the order received.
Note: This Question is unanswered, help us to find answer for this one
44. Meta
Answer
Correct Answer:
Search agents and _____ search tools allow you to automate your search process across many sites.
Note: This Question is unanswered, help us to find answer for this one
45. Decryption
Answer
Correct Answer:
The process of converting cyphertext to plaintext is ___________
Note: This Question is unanswered, help us to find answer for this one
46. Network interface
Answer
Correct Answer:
A _________ ________ card (NIC) is used by a computer to transmit and receive data over a network.
Note: This Question is unanswered, help us to find answer for this one
47. Component
Answer
Correct Answer:
In programming - a _________ is a prewritten module designed for a specific task.
Note: This Question is unanswered, help us to find answer for this one
48. Security
Answer
Correct Answer:
This UNIX-based kernel also contributes to stronger _________.
Note: This Question is unanswered, help us to find answer for this one
49. Passwords
Answer
Correct Answer:
A keystroke logger can be used to steal __________.
Note: This Question is unanswered, help us to find answer for this one
50. Machine
Answer
Correct Answer:
The instruction cycle is also often referred to as the ________ cycle.
Note: This Question is unanswered, help us to find answer for this one
51. Web page
Answer
Correct Answer:
Dreamweaver - Macromedia Flash and MS FrontPage are all examples of ___ _____ design software.
Note: This Question is unanswered, help us to find answer for this one
52. High level
Answer
Correct Answer:
_____ _____ languages are based on human languages and include C - C++ and FORTRAN.
Note: This Question is unanswered, help us to find answer for this one
53. Remote
Answer
Correct Answer:
Transferring data from a ______ computer to a local computer is called downloading.
Note: This Question is unanswered, help us to find answer for this one