Computer Science MCQ

1. False alarms in an ids are known as ________.

Answer

Correct Answer: False positives

Note: This Question is unanswered, help us to find answer for this one

2. While editing a record, pressing [esc] a second time ____.

Answer

Correct Answer: Deletes the current field

Note: This Question is unanswered, help us to find answer for this one

3. When evaluating search tools, avoid tools that ____.

Answer

Correct Answer: Do not clearly mark paid or sponsored hits in a search results page

Note: This Question is unanswered, help us to find answer for this one

4. When a user issues the delete from tablename command without specifying a where condition, _____.

Answer

Correct Answer: No rows will be deleted

Note: This Question is unanswered, help us to find answer for this one

5. Web ____ caters to user-generated content.

Answer

Correct Answer: 2.0

Note: This Question is unanswered, help us to find answer for this one

6. Usually a submenu is executed by the selection made by the user from the ________.

Answer

Correct Answer: Main menu

Note: This Question is unanswered, help us to find answer for this one

7. Using _____ is a way to solve health issues related to computer equipment.

Answer

Correct Answer: Correct lighting

Note: This Question is unanswered, help us to find answer for this one

8. United states privacy laws are largely based on the _________________ report.

Answer

Correct Answer: Fair information practices

Note: This Question is unanswered, help us to find answer for this one

9. To append data to an existing file, use ________ to construct a fileoutputstream for file out.dat.

Answer

Correct Answer: new FileOutputStream("out.dat", true)

Note: This Question is unanswered, help us to find answer for this one

10. The number positioned in square brackets after an array name is the _______ of an item.

Answer

Correct Answer: Position

Note: This Question is unanswered, help us to find answer for this one

11. The name of the function to overload the operator <= is ____.

Answer

Correct Answer: Operator<=

Note: This Question is unanswered, help us to find answer for this one

12. The keyword ________ is required to declare a class.

Answer

Correct Answer: Class

Note: This Question is unanswered, help us to find answer for this one

13. The ____________ represents the fourth layer of defense for a typical it infrastructure.

Answer

Correct Answer: LAN-to-WAN Domain

Note: This Question is unanswered, help us to find answer for this one

14. The __________ release of mac os xhad built-in support for icloud to support cloud computing.

Answer

Correct Answer: Mac OS X 10.8, named Mountain Lion.

Note: This Question is unanswered, help us to find answer for this one

15. The _________ qualifier to tar causes it to use xz compression when creating an archive.

Answer

Correct Answer: Xz

Note: This Question is unanswered, help us to find answer for this one

16. The ________ offers additional student support services which include the virtual buddy program.

Answer

Correct Answer: Peer Tutoring Center

Note: This Question is unanswered, help us to find answer for this one

17. The ________ method sorts the array scores of the double[] type.

Answer

Correct Answer: Java.util.Arrays.sort(scores)

Note: This Question is unanswered, help us to find answer for this one

18. The ________ is where the fourth layer of defense is required.

Answer

Correct Answer: LAN-to-WAN Domain

Note: This Question is unanswered, help us to find answer for this one

19. The ________ decodes an instruction and generates electrical signals.

Answer

Correct Answer: Control Unit

Note: This Question is unanswered, help us to find answer for this one

20. The ______ ratio defines a display's width relative to its height.

Answer

Correct Answer: Aspect

Note: This Question is unanswered, help us to find answer for this one

21. The _____ has been the coordinating body for standards in the united states since 1918.

Answer

Correct Answer: American National Standards Institute

Note: This Question is unanswered, help us to find answer for this one

22. The ____ option of the paste command is used to specify a different separator as a delimiter.

Answer

Correct Answer: -d

Note: This Question is unanswered, help us to find answer for this one

23. The ____ option of the grep command displays only lines that do not contain the search pattern.

Answer

Correct Answer: -v.

Note: This Question is unanswered, help us to find answer for this one

24. The ____ function is used to interchange the contents of two string variables.

Answer

Correct Answer: Swap

Note: This Question is unanswered, help us to find answer for this one

25. The ____ directory contains the kernel (operating system) images.

Answer

Correct Answer: Boot

Note: This Question is unanswered, help us to find answer for this one

26. The ____ command locates identical lines within two identically sorted files.

Answer

Correct Answer: Comm

Note: This Question is unanswered, help us to find answer for this one

27. System administrators and programmers refer to standard input as ____.

Answer

Correct Answer: Stin

Note: This Question is unanswered, help us to find answer for this one

28. Studies show that more than 300 million photos are uploaded daily to __________.

Answer

Correct Answer: Facebook

Note: This Question is unanswered, help us to find answer for this one

29. Studies show that approximately 72 hours of video are uploaded to __________ every minute.

Answer

Correct Answer: YouTube

Note: This Question is unanswered, help us to find answer for this one

30. Speech synthesizers use _____ to determine context before outputting.

Answer

Correct Answer: INCORRECT

Note: This Question is unanswered, help us to find answer for this one

31. Spanning cells are created by inserting a ____ attribute in a or tag.

Answer

Correct Answer: Rowspan or colspan

Note: This Question is unanswered, help us to find answer for this one

32. Smart objects often include ________ to relay information about their environment.

Answer

Correct Answer: Sensors

Note: This Question is unanswered, help us to find answer for this one

33. Scripting languages are distinguished by their ____ types.

Answer

Correct Answer: MIME

Note: This Question is unanswered, help us to find answer for this one

34. Rfm analysis is used to analyze and rank customers according to their ________.

Answer

Correct Answer: Purchasing pattems

Note: This Question is unanswered, help us to find answer for this one

35. A(n) ____ path begins at the root level and lists all subdirectories to the destination file.

Answer

Correct Answer: Absolute.

Note: This Question is unanswered, help us to find answer for this one

36. A ____ of a color is darker than the original color and is created by mixing the color with black.

Answer

Correct Answer: Shade

Note: This Question is unanswered, help us to find answer for this one

37. In a system resource-allocation graph, ____.

Answer

Correct Answer: A directed edge from a process to a resource is called a request edge

Note: This Question is unanswered, help us to find answer for this one

38. If you want all objects to share a single nonchanging value, then the field is static and ______.

Answer

Correct Answer: Final

Note: This Question is unanswered, help us to find answer for this one

39. If you add the parameter, ____, the text in the applet window fades in and out as it scrolls.

Answer

Correct Answer: Fadezone

Note: This Question is unanswered, help us to find answer for this one

40. If an 802.11n client tries to use an 802.11ac access point, ________.

Answer

Correct Answer: They will communicate using 802.11n

Note: This Question is unanswered, help us to find answer for this one

41. Hyperlinks are active only when ____.

Answer

Correct Answer: You run the presentation

Note: This Question is unanswered, help us to find answer for this one

42. Heavy computer users who experience red, dry, itchy eyes should _____.

Answer

Correct Answer: Consider the use of artificial tears

Note: This Question is unanswered, help us to find answer for this one

43. Carrier sense multiple access (csma) is a ____-based access protocol.

Answer

Correct Answer: Contention

Note: This Question is unanswered, help us to find answer for this one

44. By default, browsers display input boxes as _____ elements with a default length of 20 characters.

Answer

Correct Answer: ​inline

Note: This Question is unanswered, help us to find answer for this one

45. Assigning ____ to a field means that no other classes can access the fields values.

Answer

Correct Answer: Private access

Note: This Question is unanswered, help us to find answer for this one

46. Analysts often refer to the three ____s when describing characteristics of big data.

Answer

Correct Answer: V

Note: This Question is unanswered, help us to find answer for this one

47. A famous study entitled protection analysis: final report was published in ____.

Answer

Correct Answer: 1978

Note: This Question is unanswered, help us to find answer for this one

48. A deadlocked state occurs whenever ____.

Answer

Correct Answer: Every process in a set is waiting for an event that can only be caused by another process in the set

Note: This Question is unanswered, help us to find answer for this one

49. A data collector set can monitor a(n) ____ to track when system events occur.

Answer

Correct Answer: Event Trace

Note: This Question is unanswered, help us to find answer for this one

50. A common way of examining network traffic is by running the ____ program.

Answer

Correct Answer: Tcpdump

Note: This Question is unanswered, help us to find answer for this one

51. A ____________________ operator allows you to make comparisions in a program.

Answer

Correct Answer: Relational

Note: This Question is unanswered, help us to find answer for this one

52. A ________ is a value that signals when the end of a list of values has been reached.

Answer

Correct Answer: Sentinel

Note: This Question is unanswered, help us to find answer for this one

53. A ________ is a small text file passed to a web browser on a user's computer by a web server.

Answer

Correct Answer: Cookie

Note: This Question is unanswered, help us to find answer for this one

54. A ________ is a set of rules that programs on two communicating devices follow.

Answer

Correct Answer: Protocol

Note: This Question is unanswered, help us to find answer for this one

55. A _____ language is a language used to describe the content and structure of documents.

Answer

Correct Answer: Markup

Note: This Question is unanswered, help us to find answer for this one

56. A _____ can be used as a hardware-based digital wallet.

Answer

Correct Answer: Smartphone

Note: This Question is unanswered, help us to find answer for this one

57. A ____ stores items on a server as articles or postings that are sorted by topic.

Answer

Correct Answer: Newsgroup

Note: This Question is unanswered, help us to find answer for this one

58. A ____ is where you conduct your investigations, store evidence, and do most of your work.

Answer

Correct Answer: Digital forensics lab

Note: This Question is unanswered, help us to find answer for this one

59. A ____ checks a value, and based on the result performs one of two actions.

Answer

Correct Answer: Decision structure

Note: This Question is unanswered, help us to find answer for this one

60. (int)('a' + math.random() * ('z' - 'a' + 1)) returns a random number ________.

Answer

Correct Answer: Between (int)'a' and (int)'z'

Note: This Question is unanswered, help us to find answer for this one

61. Incorrect calculation of buffer size is in the __________ software error category.

Answer

Correct Answer: Risky Resource Management

Note: This Question is unanswered, help us to find answer for this one

62. "aba".comparetoignorecase("abc") returns ________.

Answer

Correct Answer: -2

Note: This Question is unanswered, help us to find answer for this one

63. ".edu" is a ________.

Answer

Correct Answer: Top-level domain

Note: This Question is unanswered, help us to find answer for this one

64. ____________________ is granting or denying approval to use specific resources.

Answer

Correct Answer: Access Control

Note: This Question is unanswered, help us to find answer for this one

65. ____________________ are used for both the transmission and reception of wireless signals.

Answer

Correct Answer: Antennas

Note: This Question is unanswered, help us to find answer for this one

66. __________ information system can be strategic ___________.

Answer

Correct Answer: Any; if it is used properly

Note: This Question is unanswered, help us to find answer for this one

67. _________ is a consultative function of the mis department.

Answer

Correct Answer: Partnering with business-unit executives

Note: This Question is unanswered, help us to find answer for this one

68. ________ software lets you perform calculations and numerical analyses.

Answer

Correct Answer: Spreadsheet

Note: This Question is unanswered, help us to find answer for this one

69. ________ is to implement one method in the structure chart at a time from the top to the bottom.

Answer

Correct Answer: Top-down approach

Note: This Question is unanswered, help us to find answer for this one

70. Banner ads benefit websites by ________.

Answer

Correct Answer: Increasing awareness of the website

Note: This Question is unanswered, help us to find answer for this one

71. ____ helps the cpu match the slower speed of i/o devices.

Answer

Correct Answer: Buffering

Note: This Question is unanswered, help us to find answer for this one

72. A client can be a home computer or a node in an organizations _____.

Answer

Correct Answer: LAN

Note: This Question is unanswered, help us to find answer for this one

73. __________ is the protocol for handling tcp traffic through a proxy server.

Answer

Correct Answer: Socks

Note: This Question is unanswered, help us to find answer for this one

74. A text boxs ____ event occurs when the text box receives the focus.

Answer

Correct Answer: Enter

Note: This Question is unanswered, help us to find answer for this one

75. ______ is the process of initiating contact between two bluetooth devices.

Answer

Correct Answer: Pairing

Note: This Question is unanswered, help us to find answer for this one

76. _____ is accelerated and enhanced by the internet and the technology that supports it.

Answer

Correct Answer: E-commerce

Note: This Question is unanswered, help us to find answer for this one

77. _____ are people who work directly with information systems to get results.

Answer

Correct Answer: End users

Note: This Question is unanswered, help us to find answer for this one

78. ____ will find all records where there is any entry in the field, even if the entry is 0.

Answer

Correct Answer: Is Not Null

Note: This Question is unanswered, help us to find answer for this one

79. ____ refers to following a predesignated procedure to remove yourself from marketing lists.

Answer

Correct Answer: Opting out

Note: This Question is unanswered, help us to find answer for this one

80. ____ is needed to achieve success in deploying a patch to a large network.

Answer

Correct Answer: An inventory of all hardware and software on affected computers

Note: This Question is unanswered, help us to find answer for this one

81. ____ is a set of rules for exchanging data over the web.

Answer

Correct Answer: PDF

Note: This Question is unanswered, help us to find answer for this one

82. ____ is a layered network defense strategy developed by the national security agency (nsa).

Answer

Correct Answer: Defense in Depth

Note: This Question is unanswered, help us to find answer for this one

83. ____ effectively removes restrictions on maximum program size.

Answer

Correct Answer: Virtual memory

Note: This Question is unanswered, help us to find answer for this one

84. ____ determines how long a piece of information lasts on a system.

Answer

Correct Answer: Order of volatility

Note: This Question is unanswered, help us to find answer for this one

85. ____ allows for faster turnaround of cpu-bound jobs.

Answer

Correct Answer: Variable time quantum per queue

Note: This Question is unanswered, help us to find answer for this one

86. Within a table row, a two-sided ____ tag indicates the presence of individual table cells.

Answer

Correct Answer:

Note: This Question is unanswered, help us to find answer for this one

87. Wireshark is a popular tool for capturing network traffic in __________ mode.

Answer

Correct Answer: Promiscuous

Note: This Question is unanswered, help us to find answer for this one

88. To improve traffic to your e-commerce site, _______.

Answer

Correct Answer: Acquire links to your site on other sites

Note: This Question is unanswered, help us to find answer for this one

89. To define functional and procedural components, eia-232f incorporates the itus ____ standard.

Answer

Correct Answer: V.24

Note: This Question is unanswered, help us to find answer for this one

90. To add a circle object into a pane, use ________.

Answer

Correct Answer: Pane.getChildren().add(circle);

Note: This Question is unanswered, help us to find answer for this one

91. To prime the read with a loop, you place an input statement ____.

Answer

Correct Answer: Before the loop body

Note: This Question is unanswered, help us to find answer for this one

92. The vi editor is typically running in one of ____ modes. (type in a numeric digit).

Answer

Correct Answer: 3

Note: This Question is unanswered, help us to find answer for this one

93. The trend toward having readers help write their own news is called _____ journalism.

Answer

Correct Answer: Participatory

Note: This Question is unanswered, help us to find answer for this one

94. The term for a collection of website files stored on a web server is ____.

Answer

Correct Answer: ​remote website

Note: This Question is unanswered, help us to find answer for this one

95. The term ____ describes transmission situations involving multiple senders and receivers.

Answer

Correct Answer: Synchronization

Note: This Question is unanswered, help us to find answer for this one

96. There is no limit to the number of ____ elements used within a web page.

Answer

Correct Answer: Script

Note: This Question is unanswered, help us to find answer for this one

97. The signature of a method consists of ____________.

Answer

Correct Answer: Method name and parameter list

Note: This Question is unanswered, help us to find answer for this one

98. The room where the _________________ is located is called the data closet.

Answer

Correct Answer: MDF main distribution frame

Note: This Question is unanswered, help us to find answer for this one

99. The report footer section prints ____.

Answer

Correct Answer: At the end of the entire report

Note: This Question is unanswered, help us to find answer for this one

100. The random function in raptor returns a number in the range 0.0 up to but not including _______.

Answer

Correct Answer: 1.0

Note: This Question is unanswered, help us to find answer for this one

101. The programmer determines the fields and methods of an object and creates the ________ code.

Answer

Correct Answer: Class

Note: This Question is unanswered, help us to find answer for this one

102. The process of resolving a domain name to an ip address begins with a(n) ____ server.

Answer

Correct Answer: Local caching

Note: This Question is unanswered, help us to find answer for this one

103. The primary vehicle for articulating the purpose of a disaster recovery program is the ____.

Answer

Correct Answer: Disaster recovery policy

Note: This Question is unanswered, help us to find answer for this one

104. Once a _____ is installed, the attacker can gain full access to the computer.

Answer

Correct Answer: Rootkit

Note: This Question is unanswered, help us to find answer for this one

105. Netware ____ introduced netware directory services (nds).

Answer

Correct Answer: Version 4

Note: This Question is unanswered, help us to find answer for this one

106. Net nanny is an example of ____.

Answer

Correct Answer: Content-filtering software

Note: This Question is unanswered, help us to find answer for this one

107. Nearly _____ percent of total costs occur after the purchase of hardware and software.

Answer

Correct Answer: 80

Note: This Question is unanswered, help us to find answer for this one

108. Maintenance, repair, and operations (mro) materials are also called ____.

Answer

Correct Answer: Indirect materials

Note: This Question is unanswered, help us to find answer for this one

109. Linux iso images that can be burned to a cd or dvd are referred to as ____.

Answer

Correct Answer: Linux Live CDs.

Note: This Question is unanswered, help us to find answer for this one

110. Like a family tree, a ________ shows the inheritance relationship between classes.

Answer

Correct Answer: Flowchart

Note: This Question is unanswered, help us to find answer for this one

111. Knowing that you are buying one pound of bread is part of _____.

Answer

Correct Answer: Standards for weights and measures

Note: This Question is unanswered, help us to find answer for this one

112. Kerberos __________ provides tickets to clients who request services.

Answer

Correct Answer: TGS

Note: This Question is unanswered, help us to find answer for this one

113. For socrates, an unexamined life is a tragedy because it results in grievous harm to _____.

Answer

Correct Answer: The soul

Note: This Question is unanswered, help us to find answer for this one

114. Consider the following statement: double alpha[10][5];. the number of components of alpha is ____.

Answer

Correct Answer: 50

Note: This Question is unanswered, help us to find answer for this one

115. Companies are moving to the 5 ghz band because there is ________ than in the 2.5 ghz band.

Answer

Correct Answer: More bandwidth

Note: This Question is unanswered, help us to find answer for this one

116. Colonial adventure tours organizes day-long guided trips to ____.

Answer

Correct Answer: New England

Note: This Question is unanswered, help us to find answer for this one

117. Centralized it departments no longer produce reams of printed _____ reports.

Answer

Correct Answer: Greenbar

Note: This Question is unanswered, help us to find answer for this one

118. After a global network is in place, a company must _____.

Answer

Correct Answer: Decide which types of information-sharing technology it will be using

Note: This Question is unanswered, help us to find answer for this one

119. According to the text, any act or object that endangers an asset is known as a(n) ____.

Answer

Correct Answer: Threat

Note: This Question is unanswered, help us to find answer for this one

120. Access control on a wireless router refers to ________________________.

Answer

Correct Answer: Using a computer's MAC address to determine if it can connect

Note: This Question is unanswered, help us to find answer for this one

121. A technique used to compromise a system is known as a(n) ___________.

Answer

Correct Answer: Exploit

Note: This Question is unanswered, help us to find answer for this one

122. A switch uses a _____________ that is very similar to a routing table used in a router.

Answer

Correct Answer: Forwarding table

Note: This Question is unanswered, help us to find answer for this one

123. A supply chain driven by forecasts of consumer demand follows a ________ model.

Answer

Correct Answer: Push-Based

Note: This Question is unanswered, help us to find answer for this one

124. A supertype entity can contain as many as ____ subtype entities.

Answer

Correct Answer: No define Limit

Note: This Question is unanswered, help us to find answer for this one

125. A public attribute is shown in a class diagram with the symbol _____ before the name.

Answer

Correct Answer: +

Note: This Question is unanswered, help us to find answer for this one

126. A network that runs on the customer premises is a ________.

Answer

Correct Answer: LAN

Note: This Question is unanswered, help us to find answer for this one

127. The part of an ipv6 global unicast address that designates the host is called the ________.

Answer

Correct Answer: Interface ID

Note: This Question is unanswered, help us to find answer for this one

128. All of the following are examples of being computer literate, except ________.

Answer

Correct Answer: Knowing only how to use your computer for e-mails

Note: This Question is unanswered, help us to find answer for this one

129. The responsibilities of a tech support engineer include ________.

Answer

Correct Answer: Helping users solve problems and providing training

Note: This Question is unanswered, help us to find answer for this one

130. If you leave out the size declarator in an array declaration ________.

Answer

Correct Answer: The array cannot be created

Note: This Question is unanswered, help us to find answer for this one

131. During the implementation phase of the systems development life cycle (sdlc), _____.

Answer

Correct Answer: Phased-in-phased-out

Note: This Question is unanswered, help us to find answer for this one

132. A(n) _____ is a common output device for soft copy.

Answer

Correct Answer: Liquid crystal display

Note: This Question is unanswered, help us to find answer for this one

133. To reduce the sting of an unpleasant thought, _____.

Answer

Correct Answer: State ideas using positive language

Note: This Question is unanswered, help us to find answer for this one

134. To redirect the list of the files in a directory to a file called homedir.list, you enter ____.

Answer

Correct Answer: Ls > homedir.list

Note: This Question is unanswered, help us to find answer for this one

135. To prevent a class from being instantiated, ________.

Answer

Correct Answer: Use the private modifier on the constructor

Note: This Question is unanswered, help us to find answer for this one

136. To keep information beyond reach of unauthorized users is to keep the information _____.

Answer

Correct Answer: Secure

Note: This Question is unanswered, help us to find answer for this one

137. To declare a constant max_length inside a method with value 99.98, you write ________.

Answer

Correct Answer: Final double MAX_LENGTH = 99.98;

Note: This Question is unanswered, help us to find answer for this one

138. The total quiz points for a student for an entire semester is a(n) ________ attribute.

Answer

Correct Answer: Derived

Note: This Question is unanswered, help us to find answer for this one

139. The scope of a namespace member is local to the ____.

Answer

Correct Answer: Namespace

Note: This Question is unanswered, help us to find answer for this one

140. The process of converting human-readable data into machine-readable form is called _____.

Answer

Correct Answer: Data entry

Note: This Question is unanswered, help us to find answer for this one

141. The number of mobile websites worldwide is expected to grow rapidly because of ______________.

Answer

Correct Answer: The development of new and useful applications

Note: This Question is unanswered, help us to find answer for this one

142. The most significant contributing factor to problems with data integrity is __________.

Answer

Correct Answer: Data duplication

Note: This Question is unanswered, help us to find answer for this one

143. The entries in a listbox are stored in the ________ property.

Answer

Correct Answer: Items

Note: This Question is unanswered, help us to find answer for this one

144. The ________ method copies the sourcearray to the targetarray.

Answer

Correct Answer: System.copyarrays(sourceArray, 0, targetArray, 0, sourceArray.length);

Note: This Question is unanswered, help us to find answer for this one

145. The greatest expression of the lac operon occurs when lactose levels are _____.

Answer

Correct Answer: High and glucose levels are lo

Note: This Question is unanswered, help us to find answer for this one

146. The length of the string "hello there. " is ____.

Answer

Correct Answer: 13

Note: This Question is unanswered, help us to find answer for this one

147. Security __________ are the areas of trust within which users can freely communicate.

Answer

Correct Answer: Domains

Note: This Question is unanswered, help us to find answer for this one

148. When reading words using a scanner object's next method, ____.

Answer

Correct Answer: Any characters at the beginning of the input that are considered to be white space are consumed and do not become part of the word being read.

Note: This Question is unanswered, help us to find answer for this one

149. An array can easily be stepped through by using a ________.

Answer

Correct Answer: For loop

Note: This Question is unanswered, help us to find answer for this one

150. Any particular location on earth experiences __________.

Answer

Correct Answer: #

Note: This Question is unanswered, help us to find answer for this one

151. A(n) _________ is a combination of mobile phone and handheld computer.

Answer

Correct Answer: Smartphone

Note: This Question is unanswered, help us to find answer for this one

152. A field whose data type is ____ can contain any characters

Answer

Correct Answer: Short Text

Note: This Question is unanswered, help us to find answer for this one

153. A bubble sort is sometimes called a ____.

Answer

Correct Answer: Dropping sort

Note: This Question is unanswered, help us to find answer for this one

154. A ____ aggregates multiple dsl subscriber lines and connects them to the carriers co.

Answer

Correct Answer: Security

Note: This Question is unanswered, help us to find answer for this one

155. A(n) ____ is an ordered arrangement of keys and pointers.

Answer

Correct Answer: Index

Note: This Question is unanswered, help us to find answer for this one

156. The bargaining power of a customer is weak if ________.

Answer

Correct Answer: The availability of a rival product is limited

Note: This Question is unanswered, help us to find answer for this one

157. One of the dangers in researching vendor solutions is that users and analysts _______.

Answer

Correct Answer: ​may want to buy one of these solutions prematurely

Note: This Question is unanswered, help us to find answer for this one

158. The _____ relationship should be rare in any relational database design.

Answer

Correct Answer: 1:1

Note: This Question is unanswered, help us to find answer for this one

159. The _____ pseudo-column is used to select the next value from a sequence.

Answer

Correct Answer: NEXTVAL

Note: This Question is unanswered, help us to find answer for this one

160. The ____ directory contains configuration files that the system uses when the computer starts.

Answer

Correct Answer: /etc

Note: This Question is unanswered, help us to find answer for this one

161. ____ are small components typically made out of aluminum with fins that help to dissipate heat.

Answer

Correct Answer: Heat sinks

Note: This Question is unanswered, help us to find answer for this one

162. The development environment in access that is used to create, view, and modify macros is the ____.

Answer

Correct Answer: Macro Designer

Note: This Question is unanswered, help us to find answer for this one

163. You can use ____ to convert two or more basic disks to dynamic disks

Answer

Correct Answer: Disk Management

Note: This Question is unanswered, help us to find answer for this one

164. You can place an insertion point by tapping or clicking in the field or by pressing ____.

Answer

Correct Answer: F2

Note: This Question is unanswered, help us to find answer for this one

165. With no options, ____ displays the current listing of bash environment and shell script variables.

Answer

Correct Answer: Set

Note: This Question is unanswered, help us to find answer for this one

166. Wireless lans and public hotspots use ____ technology to connect to the internet.

Answer

Correct Answer: Wi-Fi

Note: This Question is unanswered, help us to find answer for this one

167. Wi-fi networks used in homes and public hotspots use the ________.

Answer

Correct Answer: IEEE 802.11 standards

Note: This Question is unanswered, help us to find answer for this one

168. When a new application designed for windows vista or windows 7 prints, it uses ____-based printing.

Answer

Correct Answer: XPS

Note: This Question is unanswered, help us to find answer for this one

169. When a function is called by its name, then it is _____.

Answer

Correct Answer: Executed

Note: This Question is unanswered, help us to find answer for this one

170. Use the ____ command to rearrange parts of files on the drive so they are contiguous

Answer

Correct Answer: Defrag

Note: This Question is unanswered, help us to find answer for this one

171. Unlike a sub procedure header, a function?s header includes the ____ section.

Answer

Correct Answer: As datatType

Note: This Question is unanswered, help us to find answer for this one

172. To generate a surrogate key, microsoft access uses a(n) _____ data type.

Answer

Correct Answer: AutoNumber

Note: This Question is unanswered, help us to find answer for this one

173. To delete a record, tap or click the record selector for the record, and then press the ____ key(s)

Answer

Correct Answer: Delete

Note: This Question is unanswered, help us to find answer for this one

174. To define an additional field in datasheet view, tap or click the ____ column heading.

Answer

Correct Answer: Click to Add.

Note: This Question is unanswered, help us to find answer for this one

175. To create an action query, click the ____ button from the create tab in access 2016.

Answer

Correct Answer: Update

Note: This Question is unanswered, help us to find answer for this one

176. Ticket machines, atms, digital cameras, and robotics all use ______ operating systems.

Answer

Correct Answer: Embedded.

Note: This Question is unanswered, help us to find answer for this one

177. The two most popular hard disk interfaces are ide and ____.

Answer

Correct Answer: SCSI.

Note: This Question is unanswered, help us to find answer for this one

178. The standard naming convention prefix tag for a query used to identify the object type is ____.

Answer

Correct Answer: Qry

Note: This Question is unanswered, help us to find answer for this one

179. The siri personal assistant application on apple's iphone 5s is an example of a ________.

Answer

Correct Answer: Data mining.

Note: This Question is unanswered, help us to find answer for this one

180. The relational model?s creator, e. f. codd, used the term relation as a synonym for ____.

Answer

Correct Answer: Table.

Note: This Question is unanswered, help us to find answer for this one

181. The process of normalization constructs tables such that every table has a ________.

Answer

Correct Answer: Single theme

Note: This Question is unanswered, help us to find answer for this one

182. The process of finding and correcting program errors is called ____.

Answer

Correct Answer: Debugging

Note: This Question is unanswered, help us to find answer for this one

183. The mifi device is produced by the company ____.

Answer

Correct Answer: Novatel. ​

Note: This Question is unanswered, help us to find answer for this one

184. The first ibm pcs used ____ as an operating system

Answer

Correct Answer: Osborne

Note: This Question is unanswered, help us to find answer for this one

185. The entity relationship diagram (erd) represents the _____ database as viewed by the end user.

Answer

Correct Answer: Conceptual.

Note: This Question is unanswered, help us to find answer for this one

186. Software that helps manage a checkbook or prepare taxes is called ________ software.

Answer

Correct Answer: Multimedia

Note: This Question is unanswered, help us to find answer for this one

187. Software products such as microsoft office, adobe premiere, and quicken are also called ________.

Answer

Correct Answer: COTS

Note: This Question is unanswered, help us to find answer for this one

188. Software for pcs contains a(n) _________ program that guides you through the installation process.

Answer

Correct Answer: Setup

Note: This Question is unanswered, help us to find answer for this one

189. Server virtualization in windows server 2012 r2 is based on a module called the _________.

Answer

Correct Answer: Hypervisor

Note: This Question is unanswered, help us to find answer for this one

190. Oracle recommends _____ for creating audit logs.

Answer

Correct Answer: Triggers

Note: This Question is unanswered, help us to find answer for this one

191. One of the most obvious initial changes in windows vista was the ____ interface.

Answer

Correct Answer: Aero

Note: This Question is unanswered, help us to find answer for this one

192. One of the advantages of off-the-shelf software is that ________________.

Answer

Correct Answer: The initial cost is lower because the software firm can spread the development costs over many customers

Note: This Question is unanswered, help us to find answer for this one

193. Normal telephone cable is a type of ________.

Answer

Correct Answer: Twisted-pair cable

Note: This Question is unanswered, help us to find answer for this one

194. Ms-dos first used a(n) ________ interface.

Answer

Correct Answer: Command-driven

Note: This Question is unanswered, help us to find answer for this one

195. Mac os x includes a backup utility called ________.

Answer

Correct Answer: Time Machine

Note: This Question is unanswered, help us to find answer for this one

196. It is best to use the ____ available text editor when writing java programs.

Answer

Correct Answer: Java

Note: This Question is unanswered, help us to find answer for this one

197. In windows server 2012, the hypervisor ________ the host operating system.

Answer

Correct Answer: Hypervisor

Note: This Question is unanswered, help us to find answer for this one

198. In the criterion, <=250, the operator will return values for the specified field that are ____.

Answer

Correct Answer: Less than or equal to 250

Note: This Question is unanswered, help us to find answer for this one

199. In some database programs, a data file is referred to as a(n) ______.

Answer

Correct Answer: Table

Note: This Question is unanswered, help us to find answer for this one

200. In several languages, the visual development environment is known by the acronym ____.

Answer

Correct Answer: IDE.

Note: This Question is unanswered, help us to find answer for this one

201. In a microsoft access database, the gettysburg address would be stored in a(n) ________ field.

Answer

Correct Answer: Long text

Note: This Question is unanswered, help us to find answer for this one

202. In ______________, a vnic relies on the host machine to act as a nat device.

Answer

Correct Answer: Packet switching

Note: This Question is unanswered, help us to find answer for this one

203. Google's android os currently runs just over _____ percent of the mobile phones on the market.

Answer

Correct Answer: 80

Note: This Question is unanswered, help us to find answer for this one

204. For windows 7, the ____________________ tracks problems with applications, hardware, and windows.

Answer

Correct Answer: Action center

Note: This Question is unanswered, help us to find answer for this one

205. Filenames typically include a ____ at the end of the filename.

Answer

Correct Answer: File extension

Note: This Question is unanswered, help us to find answer for this one

206. Fiber-optic cable uses a protected string of _____ that transmits beams of light.

Answer

Correct Answer: Glass

Note: This Question is unanswered, help us to find answer for this one

207. Entity attributes and primary keys are not present in the _____ data model.

Answer

Correct Answer: Primary Key

Note: This Question is unanswered, help us to find answer for this one

208. Desktop, laptop, and tablet computers, and mobile devices are classified as _______.

Answer

Correct Answer: Personal computers

Note: This Question is unanswered, help us to find answer for this one

209. Desktop apps are also known as ____ apps

Answer

Correct Answer: Taskbar

Note: This Question is unanswered, help us to find answer for this one

210. Date criteria are automatically enclosed in ____ when entered in a query design.

Answer

Correct Answer: Number signs.

Note: This Question is unanswered, help us to find answer for this one

211. Data staging consists of all of the following steps, except ________.

Answer

Correct Answer: Mining the data.

Note: This Question is unanswered, help us to find answer for this one

212. Data redundancies occur from ____________________ of data on every row entry.

Answer

Correct Answer: Duplication

Note: This Question is unanswered, help us to find answer for this one

213. Data are sent through a network in bundles called ________.

Answer

Correct Answer: Packets

Note: This Question is unanswered, help us to find answer for this one

214. Corona and magmito can be used to develop ________.

Answer

Correct Answer: Apps for smartphones.

Note: This Question is unanswered, help us to find answer for this one

215. Conventional dial-up connects to the internet at a maximum of ____.

Answer

Correct Answer: 56 Kbps

Note: This Question is unanswered, help us to find answer for this one

216. Cellular services use _______ to provide wireless connectivity to the internet.

Answer

Correct Answer: IP address

Note: This Question is unanswered, help us to find answer for this one

217. Andrea advises dean to remove unnecessary programs from his computer by using a(n) ____ utility.

Answer

Correct Answer: Remove

Note: This Question is unanswered, help us to find answer for this one

218. All primary key entries are unique, and no part of a primary key may be ____.

Answer

Correct Answer: Null

Note: This Question is unanswered, help us to find answer for this one

219. All of this information is part of a ____ in a database

Answer

Correct Answer: Record

Note: This Question is unanswered, help us to find answer for this one

220. All of the following software applications are available for apple's smartwatch except ________.

Answer

Correct Answer: Linux for running web servers

Note: This Question is unanswered, help us to find answer for this one

221. All of the following operating systems support p2p networking except ________.

Answer

Correct Answer: Unix.

Note: This Question is unanswered, help us to find answer for this one

222. All of the following can be used in an os x file name except ________.

Answer

Correct Answer: :

Note: This Question is unanswered, help us to find answer for this one

223. All of the following are examples of someone using personal productivity software except _________.

Answer

Correct Answer: Callie entering a customer's order into a restaurant's ordering system.

Note: This Question is unanswered, help us to find answer for this one

224. Access the individual elements in an array by using their ________.

Answer

Correct Answer: Subscripts

Note: This Question is unanswered, help us to find answer for this one

225. A(n)_____ is a combination of a hardware configuration and systems software.

Answer

Correct Answer: Computer system platform

Note: This Question is unanswered, help us to find answer for this one

226. A(n) ____________________ is a filtering program that stops pop-up ads from displaying on webpages.

Answer

Correct Answer: Pop-up blocker.

Note: This Question is unanswered, help us to find answer for this one

227. A(n) _______________ is a field that contains data unique to a record.

Answer

Correct Answer: Primary key

Note: This Question is unanswered, help us to find answer for this one

228. A(n) ____ value is not allowed in an index if the setting for the primary property is yes.

Answer

Correct Answer: Date

Note: This Question is unanswered, help us to find answer for this one

229. A(n) ____ license can be used anywhere on a college campus.

Answer

Correct Answer: Site.

Note: This Question is unanswered, help us to find answer for this one

230. A(n) ____ is a piece of data required by an action in a macro.

Answer

Correct Answer: Argument

Note: This Question is unanswered, help us to find answer for this one

231. A(n) ____ is a compiler embedded with a collection of supporting software.

Answer

Correct Answer: Integrated development environment (IDE)

Note: This Question is unanswered, help us to find answer for this one

232. A table that contains a repeating group is called a(n) ____.

Answer

Correct Answer: Unnormalized relation

Note: This Question is unanswered, help us to find answer for this one

233. A fixed-length field contains a predetermined number of ____.

Answer

Correct Answer: Bytes *

Note: This Question is unanswered, help us to find answer for this one

234. A database or a relational database is a collection of related tables. _________________________

Answer

Correct Answer: True

Note: This Question is unanswered, help us to find answer for this one

235. A database maintains information on ___________.

Answer

Correct Answer: Inventory transactions employees,

Note: This Question is unanswered, help us to find answer for this one

236. A company network that is accessible to authorized outsiders is called a(n) ____.

Answer

Correct Answer: Extranet.

Note: This Question is unanswered, help us to find answer for this one

237. A client can be a home computer or a node in an organization?s _____.

Answer

Correct Answer: Server

Note: This Question is unanswered, help us to find answer for this one

238. A chart created with the access chart wizard is ____ in access.

Answer

Correct Answer: Embedded.

Note: This Question is unanswered, help us to find answer for this one

239. A ____ is a set of letters or numbers that represents a data item.

Answer

Correct Answer: Code

Note: This Question is unanswered, help us to find answer for this one

240. A ____ is a network device that connects two similar networks.

Answer

Correct Answer: Bridge

Note: This Question is unanswered, help us to find answer for this one

241. ________ cable is not subject to electromagnetic interference or radio frequency interference.

Answer

Correct Answer: Fiber-optic

Note: This Question is unanswered, help us to find answer for this one

242. ________ a database rearranges data and objects in a database to make its size smaller.

Answer

Correct Answer: Compacting

Note: This Question is unanswered, help us to find answer for this one

243. _____ provide(s) companies with a single version of the truth for their data.

Answer

Correct Answer: Data warehouses

Note: This Question is unanswered, help us to find answer for this one

244. _____ is an open-source operating system whose source code is freely available to everyone.

Answer

Correct Answer: Linux

Note: This Question is unanswered, help us to find answer for this one

245. _____ is a good site to develop your professional network.

Answer

Correct Answer: ​LinkedIn

Note: This Question is unanswered, help us to find answer for this one

246. _____ are conducted media that can be used for both data and voice transmissions.

Answer

Correct Answer: Coaxial cables

Note: This Question is unanswered, help us to find answer for this one

247. ____ is the physical address support program for accessing more than 4 gb of physical ram.

Answer

Correct Answer: NTDetect.com

Note: This Question is unanswered, help us to find answer for this one

248. ____ is the most widely used mobile operating system in the united states.

Answer

Correct Answer: Android

Note: This Question is unanswered, help us to find answer for this one

249. ____ allows separate partitions of a single server to support different operating systems.

Answer

Correct Answer: Virtualization

Note: This Question is unanswered, help us to find answer for this one

250. The service within kerberos that generates and issues session keys is known as __________.

Answer

Correct Answer: KDC

Note: This Question is unanswered, help us to find answer for this one

251. ________ includes a query language titled pig.

Answer

Correct Answer: Hadoop

Note: This Question is unanswered, help us to find answer for this one

252. A lock arising from a select...for update command will be released when ____.

Answer

Correct Answer: A COMMIT command is executed

Note: This Question is unanswered, help us to find answer for this one

253. You need at least ____ complete years of data to project a seasonal trend for the next year.

Answer

Correct Answer: Two

Note: This Question is unanswered, help us to find answer for this one

254. When you are using the internet, you are ____ with other computers.

Answer

Correct Answer: Networking

Note: This Question is unanswered, help us to find answer for this one

255. Viruses, adware, and spyware are referred to collectively as ________.

Answer

Correct Answer: Grayware

Note: This Question is unanswered, help us to find answer for this one

256. Translating an algorithm into a programming language is called ________.

Answer

Correct Answer: Coding

Note: This Question is unanswered, help us to find answer for this one

257. The types of ____ systems used with personal and business computers today include smart cards.

Answer

Correct Answer: Storage

Note: This Question is unanswered, help us to find answer for this one

258. The type of media that uses laser technology to store data and programs is _______.

Answer

Correct Answer: Optical disc

Note: This Question is unanswered, help us to find answer for this one

259. The term hard drive refers collectively to hard disks and ______.

Answer

Correct Answer: SSDs

Note: This Question is unanswered, help us to find answer for this one

260. The purpose of ___ is to hold data permanently, even when the computer is turned off.

Answer

Correct Answer: Storage

Note: This Question is unanswered, help us to find answer for this one

261. The operating system and other tools are collectively known as ______ software.

Answer

Correct Answer: System

Note: This Question is unanswered, help us to find answer for this one

262. The most common type of monitor is a(n) ________.

Answer

Correct Answer: LCD Monitors

Note: This Question is unanswered, help us to find answer for this one

263. The most common type of monitor for laptops and desktop computers is a(n) ________.

Answer

Correct Answer: Liquid crystal display (LCD)

Note: This Question is unanswered, help us to find answer for this one

264. The main circuits on the system board that carry data are called the _________.

Answer

Correct Answer: Data bus

Note: This Question is unanswered, help us to find answer for this one

265. The language of telecommunications is governed by rules called ____

Answer

Correct Answer: Protocols

Note: This Question is unanswered, help us to find answer for this one

266. The instructions that make up a computer program are sometimes referred to as __________.

Answer

Correct Answer: Code

Note: This Question is unanswered, help us to find answer for this one

267. The following are all processing operations of a dbms except _________.

Answer

Correct Answer: Autocorrect data

Note: This Question is unanswered, help us to find answer for this one

268. The connection to a peripheral is often called the ____.

Answer

Correct Answer: Interface

Note: This Question is unanswered, help us to find answer for this one

269. The ____________________ data types are used to store whole numbers.

Answer

Correct Answer: Integer

Note: This Question is unanswered, help us to find answer for this one

270. Tape storage requires ______ access, which refers to reading or writing data consecutively.

Answer

Correct Answer: Sequential

Note: This Question is unanswered, help us to find answer for this one

271. Records are composed of ____.

Answer

Correct Answer: Fields

Note: This Question is unanswered, help us to find answer for this one

272. Ram is an example of ____ storage

Answer

Correct Answer: Volatile

Note: This Question is unanswered, help us to find answer for this one

273. Public key encryption utilizes a pair of encryption keys obtained through ____ .

Answer

Correct Answer: A Certificate Authority

Note: This Question is unanswered, help us to find answer for this one

274. Performing an operation on an icon causes a(n) ____.

Answer

Correct Answer: Event

Note: This Question is unanswered, help us to find answer for this one

275. One advantage of personal observation is _____________.

Answer

Correct Answer: The observer gains? firsthand, unbiased information

Note: This Question is unanswered, help us to find answer for this one

276. Once you ____, the forward button becomes available.

Answer

Correct Answer: Navigate back a page

Note: This Question is unanswered, help us to find answer for this one

277. On the motherboard, the connection points for chips are referred to as _____.

Answer

Correct Answer: Sockets

Note: This Question is unanswered, help us to find answer for this one

278. On magnetic disks, files can be organized in one of three ways: ____.

Answer

Correct Answer: Sequential, direct, or indexed sequential

Note: This Question is unanswered, help us to find answer for this one

279. Most current displays are a type of ______ display.

Answer

Correct Answer: Flat-panel

Note: This Question is unanswered, help us to find answer for this one

280. Media that allow random access are sometimes referred to as ____ media.

Answer

Correct Answer: Addressable as media

Note: This Question is unanswered, help us to find answer for this one

281. Main memory is called ____.

Answer

Correct Answer: RAM

Note: This Question is unanswered, help us to find answer for this one

282. Locating and repairing all syntax errors is part of the process of ____ a program.

Answer

Correct Answer: Debugging

Note: This Question is unanswered, help us to find answer for this one

283. In a data flow diagram (dfd), _________ are used to represent external entities.

Answer

Correct Answer: A rectangle

Note: This Question is unanswered, help us to find answer for this one

284. In 1986, the _________ was released; this computer was 16-bit rather than 8-bit.

Answer

Correct Answer: Apple IIGS

Note: This Question is unanswered, help us to find answer for this one

285. Hard disks store and organize files using all of the following, except _______.

Answer

Correct Answer: Paths

Note: This Question is unanswered, help us to find answer for this one

286. Digital devices can use ____ as a code to represent character data.

Answer

Correct Answer: All of the above

Note: This Question is unanswered, help us to find answer for this one

287. Developers and organizations all around the world leverage ______ extensively

Answer

Correct Answer: SaaS

Note: This Question is unanswered, help us to find answer for this one

288. Data becomes ____ when it is presented in a format that people can understand and use.

Answer

Correct Answer: Information.

Note: This Question is unanswered, help us to find answer for this one

289. Computers use ________ language consisting of 0s and 1s.

Answer

Correct Answer: Binary

Note: This Question is unanswered, help us to find answer for this one

290. Compressed files usually have ______ at the end of the file name.

Answer

Correct Answer: .zip

Note: This Question is unanswered, help us to find answer for this one

291. Communication and language are key elements in the ____.

Answer

Correct Answer: Turing Test

Note: This Question is unanswered, help us to find answer for this one

292. Cd-roms and dvds are examples of _____.

Answer

Correct Answer: Optical disks

Note: This Question is unanswered, help us to find answer for this one

293. Cd-rom is an example of a(n) _______ type of storage medium.

Answer

Correct Answer: Optical disk

Note: This Question is unanswered, help us to find answer for this one

294. Autonomy is ________.

Answer

Correct Answer: Work design

Note: This Question is unanswered, help us to find answer for this one

295. After a successful compile, you can run the class file on any computer that has a ____.

Answer

Correct Answer: Java language interpreter

Note: This Question is unanswered, help us to find answer for this one

296. A/an _________________ manipulates data, doing arithmetic or logical operations on it.

Answer

Correct Answer: Processing unit

Note: This Question is unanswered, help us to find answer for this one

297. A(n) ________________ is an informal web site of time-stamped articles written in a journal format.

Answer

Correct Answer: Blog

Note: This Question is unanswered, help us to find answer for this one

298. A(n) ______ is a laptop computer that can convert into a tablet-like device.

Answer

Correct Answer: 2-in-1 PC

Note: This Question is unanswered, help us to find answer for this one

299. A(n) ______ drive is comparable to a cassette recorder.

Answer

Correct Answer: Tape

Note: This Question is unanswered, help us to find answer for this one

300. A(n) _____ represents a single dot on an output device.

Answer

Correct Answer: Pixel

Note: This Question is unanswered, help us to find answer for this one

301. A(n) _____ is a temporary storage space used to speed computing tasks.

Answer

Correct Answer: Cache

Note: This Question is unanswered, help us to find answer for this one

302. A(n) ____ is an extension of an organizations intranet into cloud computing.

Answer

Correct Answer: Private cloud

Note: This Question is unanswered, help us to find answer for this one

303. A(n) ____ comes into existence as soon as a work is placed into a tangible form.

Answer

Correct Answer: Copyright

Note: This Question is unanswered, help us to find answer for this one

304. A utility tool that can change the software that is launched automatically during start-up is ____.

Answer

Correct Answer: An autoruns utility

Note: This Question is unanswered, help us to find answer for this one

305. A backup utility can write copies of important data files and folders on ____.

Answer

Correct Answer: Any of these

Note: This Question is unanswered, help us to find answer for this one

306. A ________ is a virus that is triggered on a certain date.

Answer

Correct Answer: Time bomb

Note: This Question is unanswered, help us to find answer for this one

307. A _____ is an audio output device that converts text to speech.

Answer

Correct Answer: Voice synthesizer

Note: This Question is unanswered, help us to find answer for this one

308. A _____ is a peripheral device for recording, storing, and retrieving information.

Answer

Correct Answer: Disk drive

Note: This Question is unanswered, help us to find answer for this one

309. A _____ is a computer with the ability to perform trillions of calculations per second.

Answer

Correct Answer: Supercomputer

Note: This Question is unanswered, help us to find answer for this one

310. A ____ is equal to exactly 1,024 bytes, but often is rounded down to 1,000 bytes by computer users.

Answer

Correct Answer: Kilobyte (abbreviated K or KB)

Note: This Question is unanswered, help us to find answer for this one

311. A ____ is an optical code that represents data with bars of varying widths or heights.

Answer

Correct Answer: Barcode.

Note: This Question is unanswered, help us to find answer for this one

312. ___________________ addresses how specific a policy is with respect to resources.

Answer

Correct Answer: Granularity

Note: This Question is unanswered, help us to find answer for this one

313. ___________ is a tool used for extracting data from a database.

Answer

Correct Answer: Data mining

Note: This Question is unanswered, help us to find answer for this one

314. _________ memory refers to a portion of your hard drive that is being used as ram.

Answer

Correct Answer: Virtual

Note: This Question is unanswered, help us to find answer for this one

315. ________ viruses are often transmitted by a flash drive left in a usb port.

Answer

Correct Answer: Boot-sector.

Note: This Question is unanswered, help us to find answer for this one

316. _______ storage devices do not lose data or programs after the electrical power is turned off.

Answer

Correct Answer: Secondary

Note: This Question is unanswered, help us to find answer for this one

317. ______ is the process of transferring items from a storage medium into memory.

Answer

Correct Answer: Reading

Note: This Question is unanswered, help us to find answer for this one

318. ______ is data that is entered into a computer. ______ is the result produced by a computer.

Answer

Correct Answer: Input, Output

Note: This Question is unanswered, help us to find answer for this one

319. ____ technology uses digital signaling in which the cable carries only one channel of digital data.

Answer

Correct Answer: Baseband coaxial

Note: This Question is unanswered, help us to find answer for this one

320. The concept of competitive _________ refers to falling behind the competition.

Answer

Correct Answer: Disadvantage

Note: This Question is unanswered, help us to find answer for this one

321. The __________ is a statement of the boundaries of the ra.

Answer

Correct Answer: Scope

Note: This Question is unanswered, help us to find answer for this one

322. Software designed specifically for a highly specialized industry is called ____.

Answer

Correct Answer: Vertical market software

Note: This Question is unanswered, help us to find answer for this one

323. In the ____ process, measured results are compared to expected results.

Answer

Correct Answer: Negative feedback loop

Note: This Question is unanswered, help us to find answer for this one

324. In _____, direct and indirect materials in one industry are purchased on an as-needed basis.

Answer

Correct Answer: Vertical exchanges

Note: This Question is unanswered, help us to find answer for this one

325. _____ is the efficient and effective execution of specific tasks

Answer

Correct Answer: Operational

Note: This Question is unanswered, help us to find answer for this one

326. _____ is an example of a popular general purpose software suite for personal computer users.

Answer

Correct Answer: Corel WordPerfect Office

Note: This Question is unanswered, help us to find answer for this one