Note: This Question is unanswered, help us to find answer for this one
87. Wireshark is a popular tool for capturing network traffic in __________ mode.
Answer
Correct Answer:
Promiscuous
Note: This Question is unanswered, help us to find answer for this one
88. To improve traffic to your e-commerce site, _______.
Answer
Correct Answer:
Acquire links to your site on other sites
Note: This Question is unanswered, help us to find answer for this one
89. To define functional and procedural components, eia-232f incorporates the itus ____ standard.
Note: This Question is unanswered, help us to find answer for this one
90. To add a circle object into a pane, use ________.
Answer
Correct Answer:
Pane.getChildren().add(circle);
Note: This Question is unanswered, help us to find answer for this one
91. To prime the read with a loop, you place an input statement ____.
Answer
Correct Answer:
Before the loop body
Note: This Question is unanswered, help us to find answer for this one
92. The vi editor is typically running in one of ____ modes. (type in a numeric digit).
Note: This Question is unanswered, help us to find answer for this one
93. The trend toward having readers help write their own news is called _____ journalism.
Answer
Correct Answer:
Participatory
Note: This Question is unanswered, help us to find answer for this one
94. The term for a collection of website files stored on a web server is ____.
Answer
Correct Answer:
remote website
Note: This Question is unanswered, help us to find answer for this one
95. The term ____ describes transmission situations involving multiple senders and receivers.
Answer
Correct Answer:
Synchronization
Note: This Question is unanswered, help us to find answer for this one
96. There is no limit to the number of ____ elements used within a web page.
Note: This Question is unanswered, help us to find answer for this one
97. The signature of a method consists of ____________.
Answer
Correct Answer:
Method name and parameter list
Note: This Question is unanswered, help us to find answer for this one
98. The room where the _________________ is located is called the data closet.
Answer
Correct Answer:
MDF main distribution frame
Note: This Question is unanswered, help us to find answer for this one
99. The report footer section prints ____.
Answer
Correct Answer:
At the end of the entire report
Note: This Question is unanswered, help us to find answer for this one
100. The random function in raptor returns a number in the range 0.0 up to but not including _______.
Note: This Question is unanswered, help us to find answer for this one
101. The programmer determines the fields and methods of an object and creates the ________ code.
Note: This Question is unanswered, help us to find answer for this one
102. The process of resolving a domain name to an ip address begins with a(n) ____ server.
Answer
Correct Answer:
Local caching
Note: This Question is unanswered, help us to find answer for this one
103. The primary vehicle for articulating the purpose of a disaster recovery program is the ____.
Answer
Correct Answer:
Disaster recovery policy
Note: This Question is unanswered, help us to find answer for this one
104. Once a _____ is installed, the attacker can gain full access to the computer.
Note: This Question is unanswered, help us to find answer for this one
105. Netware ____ introduced netware directory services (nds).
Answer
Correct Answer:
Version 4
Note: This Question is unanswered, help us to find answer for this one
106. Net nanny is an example of ____.
Answer
Correct Answer:
Content-filtering software
Note: This Question is unanswered, help us to find answer for this one
107. Nearly _____ percent of total costs occur after the purchase of hardware and software.
Note: This Question is unanswered, help us to find answer for this one
108. Maintenance, repair, and operations (mro) materials are also called ____.
Answer
Correct Answer:
Indirect materials
Note: This Question is unanswered, help us to find answer for this one
109. Linux iso images that can be burned to a cd or dvd are referred to as ____.
Answer
Correct Answer:
Linux Live CDs.
Note: This Question is unanswered, help us to find answer for this one
110. Like a family tree, a ________ shows the inheritance relationship between classes.
Answer
Correct Answer:
Flowchart
Note: This Question is unanswered, help us to find answer for this one
111. Knowing that you are buying one pound of bread is part of _____.
Answer
Correct Answer:
Standards for weights and measures
Note: This Question is unanswered, help us to find answer for this one
112. Kerberos __________ provides tickets to clients who request services.
Note: This Question is unanswered, help us to find answer for this one
113. For socrates, an unexamined life is a tragedy because it results in grievous harm to _____.
Note: This Question is unanswered, help us to find answer for this one
114. Consider the following statement: double alpha[10][5];. the number of components of alpha is ____.
Note: This Question is unanswered, help us to find answer for this one
115. Companies are moving to the 5 ghz band because there is ________ than in the 2.5 ghz band.
Answer
Correct Answer:
More bandwidth
Note: This Question is unanswered, help us to find answer for this one
116. Colonial adventure tours organizes day-long guided trips to ____.
Answer
Correct Answer:
New England
Note: This Question is unanswered, help us to find answer for this one
117. Centralized it departments no longer produce reams of printed _____ reports.
Note: This Question is unanswered, help us to find answer for this one
118. After a global network is in place, a company must _____.
Answer
Correct Answer:
Decide which types of information-sharing technology it will be using
Note: This Question is unanswered, help us to find answer for this one
119. According to the text, any act or object that endangers an asset is known as a(n) ____.
Note: This Question is unanswered, help us to find answer for this one
120. Access control on a wireless router refers to ________________________.
Answer
Correct Answer:
Using a computer's MAC address to determine if it can connect
Note: This Question is unanswered, help us to find answer for this one
121. A technique used to compromise a system is known as a(n) ___________.
Note: This Question is unanswered, help us to find answer for this one
122. A switch uses a _____________ that is very similar to a routing table used in a router.
Answer
Correct Answer:
Forwarding table
Note: This Question is unanswered, help us to find answer for this one
123. A supply chain driven by forecasts of consumer demand follows a ________ model.
Answer
Correct Answer:
Push-Based
Note: This Question is unanswered, help us to find answer for this one
124. A supertype entity can contain as many as ____ subtype entities.
Answer
Correct Answer:
No define Limit
Note: This Question is unanswered, help us to find answer for this one
125. A public attribute is shown in a class diagram with the symbol _____ before the name.
Note: This Question is unanswered, help us to find answer for this one
126. A network that runs on the customer premises is a ________.
Note: This Question is unanswered, help us to find answer for this one
127. The part of an ipv6 global unicast address that designates the host is called the ________.
Answer
Correct Answer:
Interface ID
Note: This Question is unanswered, help us to find answer for this one
128. All of the following are examples of being computer literate, except ________.
Answer
Correct Answer:
Knowing only how to use your computer for e-mails
Note: This Question is unanswered, help us to find answer for this one
129. The responsibilities of a tech support engineer include ________.
Answer
Correct Answer:
Helping users solve problems and providing training
Note: This Question is unanswered, help us to find answer for this one
130. If you leave out the size declarator in an array declaration ________.
Answer
Correct Answer:
The array cannot be created
Note: This Question is unanswered, help us to find answer for this one
131. During the implementation phase of the systems development life cycle (sdlc), _____.
Answer
Correct Answer:
Phased-in-phased-out
Note: This Question is unanswered, help us to find answer for this one
132. A(n) _____ is a common output device for soft copy.
Answer
Correct Answer:
Liquid crystal display
Note: This Question is unanswered, help us to find answer for this one
133. To reduce the sting of an unpleasant thought, _____.
Answer
Correct Answer:
State ideas using positive language
Note: This Question is unanswered, help us to find answer for this one
134. To redirect the list of the files in a directory to a file called homedir.list, you enter ____.
Answer
Correct Answer:
Ls > homedir.list
Note: This Question is unanswered, help us to find answer for this one
135. To prevent a class from being instantiated, ________.
Answer
Correct Answer:
Use the private modifier on the constructor
Note: This Question is unanswered, help us to find answer for this one
136. To keep information beyond reach of unauthorized users is to keep the information _____.
Note: This Question is unanswered, help us to find answer for this one
137. To declare a constant max_length inside a method with value 99.98, you write ________.
Answer
Correct Answer:
Final double MAX_LENGTH = 99.98;
Note: This Question is unanswered, help us to find answer for this one
138. The total quiz points for a student for an entire semester is a(n) ________ attribute.
Note: This Question is unanswered, help us to find answer for this one
139. The scope of a namespace member is local to the ____.
Answer
Correct Answer:
Namespace
Note: This Question is unanswered, help us to find answer for this one
140. The process of converting human-readable data into machine-readable form is called _____.
Answer
Correct Answer:
Data entry
Note: This Question is unanswered, help us to find answer for this one
141. The number of mobile websites worldwide is expected to grow rapidly because of ______________.
Answer
Correct Answer:
The development of new and useful applications
Note: This Question is unanswered, help us to find answer for this one
142. The most significant contributing factor to problems with data integrity is __________.
Answer
Correct Answer:
Data duplication
Note: This Question is unanswered, help us to find answer for this one
143. The entries in a listbox are stored in the ________ property.
Note: This Question is unanswered, help us to find answer for this one
144. The ________ method copies the sourcearray to the targetarray.
Answer
Correct Answer:
System.copyarrays(sourceArray, 0, targetArray, 0, sourceArray.length);
Note: This Question is unanswered, help us to find answer for this one
145. The greatest expression of the lac operon occurs when lactose levels are _____.
Answer
Correct Answer:
High and glucose levels are lo
Note: This Question is unanswered, help us to find answer for this one
146. The length of the string "hello there. " is ____.
Note: This Question is unanswered, help us to find answer for this one
147. Security __________ are the areas of trust within which users can freely communicate.
Note: This Question is unanswered, help us to find answer for this one
148. When reading words using a scanner object's next method, ____.
Answer
Correct Answer:
Any characters at the beginning of the input that are considered to be white space are consumed and do not become part of the word being read.
Note: This Question is unanswered, help us to find answer for this one
149. An array can easily be stepped through by using a ________.
Note: This Question is unanswered, help us to find answer for this one
150. Any particular location on earth experiences __________.
Note: This Question is unanswered, help us to find answer for this one
151. A(n) _________ is a combination of mobile phone and handheld computer.
Answer
Correct Answer:
Smartphone
Note: This Question is unanswered, help us to find answer for this one
152. A field whose data type is ____ can contain any characters
Answer
Correct Answer:
Short Text
Note: This Question is unanswered, help us to find answer for this one
153. A bubble sort is sometimes called a ____.
Answer
Correct Answer:
Dropping sort
Note: This Question is unanswered, help us to find answer for this one
154. A ____ aggregates multiple dsl subscriber lines and connects them to the carriers co.
Note: This Question is unanswered, help us to find answer for this one
155. A(n) ____ is an ordered arrangement of keys and pointers.
Note: This Question is unanswered, help us to find answer for this one
156. The bargaining power of a customer is weak if ________.
Answer
Correct Answer:
The availability of a rival product is limited
Note: This Question is unanswered, help us to find answer for this one
157. One of the dangers in researching vendor solutions is that users and analysts _______.
Answer
Correct Answer:
may want to buy one of these solutions prematurely
Note: This Question is unanswered, help us to find answer for this one
158. The _____ relationship should be rare in any relational database design.
Note: This Question is unanswered, help us to find answer for this one
159. The _____ pseudo-column is used to select the next value from a sequence.
Note: This Question is unanswered, help us to find answer for this one
160. The ____ directory contains configuration files that the system uses when the computer starts.
Note: This Question is unanswered, help us to find answer for this one
161. ____ are small components typically made out of aluminum with fins that help to dissipate heat.
Answer
Correct Answer:
Heat sinks
Note: This Question is unanswered, help us to find answer for this one
162. The development environment in access that is used to create, view, and modify macros is the ____.
Answer
Correct Answer:
Macro Designer
Note: This Question is unanswered, help us to find answer for this one
163. You can use ____ to convert two or more basic disks to dynamic disks
Answer
Correct Answer:
Disk Management
Note: This Question is unanswered, help us to find answer for this one
164. You can place an insertion point by tapping or clicking in the field or by pressing ____.
Note: This Question is unanswered, help us to find answer for this one
165. With no options, ____ displays the current listing of bash environment and shell script variables.
Note: This Question is unanswered, help us to find answer for this one
166. Wireless lans and public hotspots use ____ technology to connect to the internet.
Note: This Question is unanswered, help us to find answer for this one
167. Wi-fi networks used in homes and public hotspots use the ________.
Answer
Correct Answer:
IEEE 802.11 standards
Note: This Question is unanswered, help us to find answer for this one
168. When a new application designed for windows vista or windows 7 prints, it uses ____-based printing.
Note: This Question is unanswered, help us to find answer for this one
169. When a function is called by its name, then it is _____.
Note: This Question is unanswered, help us to find answer for this one
170. Use the ____ command to rearrange parts of files on the drive so they are contiguous
Note: This Question is unanswered, help us to find answer for this one
171. Unlike a sub procedure header, a function?s header includes the ____ section.
Answer
Correct Answer:
As datatType
Note: This Question is unanswered, help us to find answer for this one
172. To generate a surrogate key, microsoft access uses a(n) _____ data type.
Answer
Correct Answer:
AutoNumber
Note: This Question is unanswered, help us to find answer for this one
173. To delete a record, tap or click the record selector for the record, and then press the ____ key(s)
Note: This Question is unanswered, help us to find answer for this one
174. To define an additional field in datasheet view, tap or click the ____ column heading.
Answer
Correct Answer:
Click to Add.
Note: This Question is unanswered, help us to find answer for this one
175. To create an action query, click the ____ button from the create tab in access 2016.
Note: This Question is unanswered, help us to find answer for this one
176. Ticket machines, atms, digital cameras, and robotics all use ______ operating systems.
Answer
Correct Answer:
Embedded.
Note: This Question is unanswered, help us to find answer for this one
177. The two most popular hard disk interfaces are ide and ____.
Note: This Question is unanswered, help us to find answer for this one
178. The standard naming convention prefix tag for a query used to identify the object type is ____.
Note: This Question is unanswered, help us to find answer for this one
179. The siri personal assistant application on apple's iphone 5s is an example of a ________.
Answer
Correct Answer:
Data mining.
Note: This Question is unanswered, help us to find answer for this one
180. The relational model?s creator, e. f. codd, used the term relation as a synonym for ____.
Note: This Question is unanswered, help us to find answer for this one
181. The process of normalization constructs tables such that every table has a ________.
Answer
Correct Answer:
Single theme
Note: This Question is unanswered, help us to find answer for this one
182. The process of finding and correcting program errors is called ____.
Answer
Correct Answer:
Debugging
Note: This Question is unanswered, help us to find answer for this one
183. The mifi device is produced by the company ____.
Answer
Correct Answer:
Novatel.
Note: This Question is unanswered, help us to find answer for this one
184. The first ibm pcs used ____ as an operating system
Note: This Question is unanswered, help us to find answer for this one
185. The entity relationship diagram (erd) represents the _____ database as viewed by the end user.
Answer
Correct Answer:
Conceptual.
Note: This Question is unanswered, help us to find answer for this one
186. Software that helps manage a checkbook or prepare taxes is called ________ software.
Answer
Correct Answer:
Multimedia
Note: This Question is unanswered, help us to find answer for this one
187. Software products such as microsoft office, adobe premiere, and quicken are also called ________.
Note: This Question is unanswered, help us to find answer for this one
188. Software for pcs contains a(n) _________ program that guides you through the installation process.
Note: This Question is unanswered, help us to find answer for this one
189. Server virtualization in windows server 2012 r2 is based on a module called the _________.
Answer
Correct Answer:
Hypervisor
Note: This Question is unanswered, help us to find answer for this one
190. Oracle recommends _____ for creating audit logs.
Note: This Question is unanswered, help us to find answer for this one
191. One of the most obvious initial changes in windows vista was the ____ interface.
Note: This Question is unanswered, help us to find answer for this one
192. One of the advantages of off-the-shelf software is that ________________.
Answer
Correct Answer:
The initial cost is lower because the software firm can spread the development costs over many customers
Note: This Question is unanswered, help us to find answer for this one
193. Normal telephone cable is a type of ________.
Answer
Correct Answer:
Twisted-pair cable
Note: This Question is unanswered, help us to find answer for this one
194. Ms-dos first used a(n) ________ interface.
Answer
Correct Answer:
Command-driven
Note: This Question is unanswered, help us to find answer for this one
195. Mac os x includes a backup utility called ________.
Answer
Correct Answer:
Time Machine
Note: This Question is unanswered, help us to find answer for this one
196. It is best to use the ____ available text editor when writing java programs.
Note: This Question is unanswered, help us to find answer for this one
197. In windows server 2012, the hypervisor ________ the host operating system.
Answer
Correct Answer:
Hypervisor
Note: This Question is unanswered, help us to find answer for this one
198. In the criterion, <=250, the operator will return values for the specified field that are ____.
Answer
Correct Answer:
Less than or equal to 250
Note: This Question is unanswered, help us to find answer for this one
199. In some database programs, a data file is referred to as a(n) ______.
Note: This Question is unanswered, help us to find answer for this one
200. In several languages, the visual development environment is known by the acronym ____.
Note: This Question is unanswered, help us to find answer for this one
201. In a microsoft access database, the gettysburg address would be stored in a(n) ________ field.
Answer
Correct Answer:
Long text
Note: This Question is unanswered, help us to find answer for this one
202. In ______________, a vnic relies on the host machine to act as a nat device.
Answer
Correct Answer:
Packet switching
Note: This Question is unanswered, help us to find answer for this one
203. Google's android os currently runs just over _____ percent of the mobile phones on the market.
Note: This Question is unanswered, help us to find answer for this one
204. For windows 7, the ____________________ tracks problems with applications, hardware, and windows.
Answer
Correct Answer:
Action center
Note: This Question is unanswered, help us to find answer for this one
205. Filenames typically include a ____ at the end of the filename.
Answer
Correct Answer:
File extension
Note: This Question is unanswered, help us to find answer for this one
206. Fiber-optic cable uses a protected string of _____ that transmits beams of light.
Note: This Question is unanswered, help us to find answer for this one
207. Entity attributes and primary keys are not present in the _____ data model.
Answer
Correct Answer:
Primary Key
Note: This Question is unanswered, help us to find answer for this one
208. Desktop, laptop, and tablet computers, and mobile devices are classified as _______.
Answer
Correct Answer:
Personal computers
Note: This Question is unanswered, help us to find answer for this one
209. Desktop apps are also known as ____ apps
Note: This Question is unanswered, help us to find answer for this one
210. Date criteria are automatically enclosed in ____ when entered in a query design.
Answer
Correct Answer:
Number signs.
Note: This Question is unanswered, help us to find answer for this one
211. Data staging consists of all of the following steps, except ________.
Answer
Correct Answer:
Mining the data.
Note: This Question is unanswered, help us to find answer for this one
212. Data redundancies occur from ____________________ of data on every row entry.
Answer
Correct Answer:
Duplication
Note: This Question is unanswered, help us to find answer for this one
213. Data are sent through a network in bundles called ________.
Note: This Question is unanswered, help us to find answer for this one
214. Corona and magmito can be used to develop ________.
Answer
Correct Answer:
Apps for smartphones.
Note: This Question is unanswered, help us to find answer for this one
215. Conventional dial-up connects to the internet at a maximum of ____.
Note: This Question is unanswered, help us to find answer for this one
216. Cellular services use _______ to provide wireless connectivity to the internet.
Answer
Correct Answer:
IP address
Note: This Question is unanswered, help us to find answer for this one
217. Andrea advises dean to remove unnecessary programs from his computer by using a(n) ____ utility.
Note: This Question is unanswered, help us to find answer for this one
218. All primary key entries are unique, and no part of a primary key may be ____.
Note: This Question is unanswered, help us to find answer for this one
219. All of this information is part of a ____ in a database
Note: This Question is unanswered, help us to find answer for this one
220. All of the following software applications are available for apple's smartwatch except ________.
Answer
Correct Answer:
Linux for running web servers
Note: This Question is unanswered, help us to find answer for this one
221. All of the following operating systems support p2p networking except ________.
Note: This Question is unanswered, help us to find answer for this one
222. All of the following can be used in an os x file name except ________.
Note: This Question is unanswered, help us to find answer for this one
223. All of the following are examples of someone using personal productivity software except _________.
Answer
Correct Answer:
Callie entering a customer's order into a restaurant's ordering system.
Note: This Question is unanswered, help us to find answer for this one
224. Access the individual elements in an array by using their ________.
Answer
Correct Answer:
Subscripts
Note: This Question is unanswered, help us to find answer for this one
225. A(n)_____ is a combination of a hardware configuration and systems software.
Answer
Correct Answer:
Computer system platform
Note: This Question is unanswered, help us to find answer for this one
226. A(n) ____________________ is a filtering program that stops pop-up ads from displaying on webpages.
Answer
Correct Answer:
Pop-up blocker.
Note: This Question is unanswered, help us to find answer for this one
227. A(n) _______________ is a field that contains data unique to a record.
Answer
Correct Answer:
Primary key
Note: This Question is unanswered, help us to find answer for this one
228. A(n) ____ value is not allowed in an index if the setting for the primary property is yes.
Note: This Question is unanswered, help us to find answer for this one
229. A(n) ____ license can be used anywhere on a college campus.
Note: This Question is unanswered, help us to find answer for this one
230. A(n) ____ is a piece of data required by an action in a macro.
Note: This Question is unanswered, help us to find answer for this one
231. A(n) ____ is a compiler embedded with a collection of supporting software.
Answer
Correct Answer:
Integrated development environment (IDE)
Note: This Question is unanswered, help us to find answer for this one
232. A table that contains a repeating group is called a(n) ____.
Answer
Correct Answer:
Unnormalized relation
Note: This Question is unanswered, help us to find answer for this one
233. A fixed-length field contains a predetermined number of ____.
Note: This Question is unanswered, help us to find answer for this one
234. A database or a relational database is a collection of related tables. _________________________
Note: This Question is unanswered, help us to find answer for this one
235. A database maintains information on ___________.
Answer
Correct Answer:
Inventory transactions employees,
Note: This Question is unanswered, help us to find answer for this one
236. A company network that is accessible to authorized outsiders is called a(n) ____.
Answer
Correct Answer:
Extranet.
Note: This Question is unanswered, help us to find answer for this one
237. A client can be a home computer or a node in an organization?s _____.
Note: This Question is unanswered, help us to find answer for this one
238. A chart created with the access chart wizard is ____ in access.
Answer
Correct Answer:
Embedded.
Note: This Question is unanswered, help us to find answer for this one
239. A ____ is a set of letters or numbers that represents a data item.
Note: This Question is unanswered, help us to find answer for this one
240. A ____ is a network device that connects two similar networks.
Note: This Question is unanswered, help us to find answer for this one
241. ________ cable is not subject to electromagnetic interference or radio frequency interference.
Answer
Correct Answer:
Fiber-optic
Note: This Question is unanswered, help us to find answer for this one
242. ________ a database rearranges data and objects in a database to make its size smaller.
Answer
Correct Answer:
Compacting
Note: This Question is unanswered, help us to find answer for this one
243. _____ provide(s) companies with a single version of the truth for their data.
Answer
Correct Answer:
Data warehouses
Note: This Question is unanswered, help us to find answer for this one
244. _____ is an open-source operating system whose source code is freely available to everyone.
Note: This Question is unanswered, help us to find answer for this one
245. _____ is a good site to develop your professional network.
Answer
Correct Answer:
LinkedIn
Note: This Question is unanswered, help us to find answer for this one
246. _____ are conducted media that can be used for both data and voice transmissions.
Answer
Correct Answer:
Coaxial cables
Note: This Question is unanswered, help us to find answer for this one
247. ____ is the physical address support program for accessing more than 4 gb of physical ram.
Answer
Correct Answer:
NTDetect.com
Note: This Question is unanswered, help us to find answer for this one
248. ____ is the most widely used mobile operating system in the united states.
Note: This Question is unanswered, help us to find answer for this one
249. ____ allows separate partitions of a single server to support different operating systems.
Answer
Correct Answer:
Virtualization
Note: This Question is unanswered, help us to find answer for this one
250. The service within kerberos that generates and issues session keys is known as __________.
Note: This Question is unanswered, help us to find answer for this one
251. ________ includes a query language titled pig.
Note: This Question is unanswered, help us to find answer for this one
252. A lock arising from a select...for update command will be released when ____.
Answer
Correct Answer:
A COMMIT command is executed
Note: This Question is unanswered, help us to find answer for this one
253. You need at least ____ complete years of data to project a seasonal trend for the next year.
Note: This Question is unanswered, help us to find answer for this one
254. When you are using the internet, you are ____ with other computers.
Answer
Correct Answer:
Networking
Note: This Question is unanswered, help us to find answer for this one
255. Viruses, adware, and spyware are referred to collectively as ________.
Note: This Question is unanswered, help us to find answer for this one
256. Translating an algorithm into a programming language is called ________.
Note: This Question is unanswered, help us to find answer for this one
257. The types of ____ systems used with personal and business computers today include smart cards.
Note: This Question is unanswered, help us to find answer for this one
258. The type of media that uses laser technology to store data and programs is _______.
Answer
Correct Answer:
Optical disc
Note: This Question is unanswered, help us to find answer for this one
259. The term hard drive refers collectively to hard disks and ______.
Note: This Question is unanswered, help us to find answer for this one
260. The purpose of ___ is to hold data permanently, even when the computer is turned off.
Note: This Question is unanswered, help us to find answer for this one
261. The operating system and other tools are collectively known as ______ software.
Note: This Question is unanswered, help us to find answer for this one
262. The most common type of monitor is a(n) ________.
Answer
Correct Answer:
LCD Monitors
Note: This Question is unanswered, help us to find answer for this one
263. The most common type of monitor for laptops and desktop computers is a(n) ________.
Answer
Correct Answer:
Liquid crystal display (LCD)
Note: This Question is unanswered, help us to find answer for this one
264. The main circuits on the system board that carry data are called the _________.
Note: This Question is unanswered, help us to find answer for this one
265. The language of telecommunications is governed by rules called ____
Answer
Correct Answer:
Protocols
Note: This Question is unanswered, help us to find answer for this one
266. The instructions that make up a computer program are sometimes referred to as __________.
Note: This Question is unanswered, help us to find answer for this one
267. The following are all processing operations of a dbms except _________.
Answer
Correct Answer:
Autocorrect data
Note: This Question is unanswered, help us to find answer for this one
268. The connection to a peripheral is often called the ____.
Answer
Correct Answer:
Interface
Note: This Question is unanswered, help us to find answer for this one
269. The ____________________ data types are used to store whole numbers.
Note: This Question is unanswered, help us to find answer for this one
270. Tape storage requires ______ access, which refers to reading or writing data consecutively.
Answer
Correct Answer:
Sequential
Note: This Question is unanswered, help us to find answer for this one
271. Records are composed of ____.
Note: This Question is unanswered, help us to find answer for this one
272. Ram is an example of ____ storage
Note: This Question is unanswered, help us to find answer for this one
273. Public key encryption utilizes a pair of encryption keys obtained through ____ .
Answer
Correct Answer:
A Certificate Authority
Note: This Question is unanswered, help us to find answer for this one
274. Performing an operation on an icon causes a(n) ____.
Note: This Question is unanswered, help us to find answer for this one
275. One advantage of personal observation is _____________.
Answer
Correct Answer:
The observer gains? firsthand, unbiased information
Note: This Question is unanswered, help us to find answer for this one
276. Once you ____, the forward button becomes available.
Answer
Correct Answer:
Navigate back a page
Note: This Question is unanswered, help us to find answer for this one
277. On the motherboard, the connection points for chips are referred to as _____.
Note: This Question is unanswered, help us to find answer for this one
278. On magnetic disks, files can be organized in one of three ways: ____.
Answer
Correct Answer:
Sequential, direct, or indexed sequential
Note: This Question is unanswered, help us to find answer for this one
279. Most current displays are a type of ______ display.
Answer
Correct Answer:
Flat-panel
Note: This Question is unanswered, help us to find answer for this one
280. Media that allow random access are sometimes referred to as ____ media.
Answer
Correct Answer:
Addressable as media
Note: This Question is unanswered, help us to find answer for this one
281. Main memory is called ____.
Note: This Question is unanswered, help us to find answer for this one
282. Locating and repairing all syntax errors is part of the process of ____ a program.
Answer
Correct Answer:
Debugging
Note: This Question is unanswered, help us to find answer for this one
283. In a data flow diagram (dfd), _________ are used to represent external entities.
Answer
Correct Answer:
A rectangle
Note: This Question is unanswered, help us to find answer for this one
284. In 1986, the _________ was released; this computer was 16-bit rather than 8-bit.
Answer
Correct Answer:
Apple IIGS
Note: This Question is unanswered, help us to find answer for this one
285. Hard disks store and organize files using all of the following, except _______.
Note: This Question is unanswered, help us to find answer for this one
286. Digital devices can use ____ as a code to represent character data.
Answer
Correct Answer:
All of the above
Note: This Question is unanswered, help us to find answer for this one
287. Developers and organizations all around the world leverage ______ extensively
Note: This Question is unanswered, help us to find answer for this one
288. Data becomes ____ when it is presented in a format that people can understand and use.
Answer
Correct Answer:
Information.
Note: This Question is unanswered, help us to find answer for this one
289. Computers use ________ language consisting of 0s and 1s.
Note: This Question is unanswered, help us to find answer for this one
290. Compressed files usually have ______ at the end of the file name.
Note: This Question is unanswered, help us to find answer for this one
291. Communication and language are key elements in the ____.
Answer
Correct Answer:
Turing Test
Note: This Question is unanswered, help us to find answer for this one
292. Cd-roms and dvds are examples of _____.
Answer
Correct Answer:
Optical disks
Note: This Question is unanswered, help us to find answer for this one
293. Cd-rom is an example of a(n) _______ type of storage medium.
Answer
Correct Answer:
Optical disk
Note: This Question is unanswered, help us to find answer for this one
294. Autonomy is ________.
Answer
Correct Answer:
Work design
Note: This Question is unanswered, help us to find answer for this one
295. After a successful compile, you can run the class file on any computer that has a ____.
Answer
Correct Answer:
Java language interpreter
Note: This Question is unanswered, help us to find answer for this one
296. A/an _________________ manipulates data, doing arithmetic or logical operations on it.
Answer
Correct Answer:
Processing unit
Note: This Question is unanswered, help us to find answer for this one
297. A(n) ________________ is an informal web site of time-stamped articles written in a journal format.
Note: This Question is unanswered, help us to find answer for this one
298. A(n) ______ is a laptop computer that can convert into a tablet-like device.
Answer
Correct Answer:
2-in-1 PC
Note: This Question is unanswered, help us to find answer for this one
299. A(n) ______ drive is comparable to a cassette recorder.
Note: This Question is unanswered, help us to find answer for this one
300. A(n) _____ represents a single dot on an output device.
Note: This Question is unanswered, help us to find answer for this one
301. A(n) _____ is a temporary storage space used to speed computing tasks.
Note: This Question is unanswered, help us to find answer for this one
302. A(n) ____ is an extension of an organizations intranet into cloud computing.
Answer
Correct Answer:
Private cloud
Note: This Question is unanswered, help us to find answer for this one
303. A(n) ____ comes into existence as soon as a work is placed into a tangible form.
Answer
Correct Answer:
Copyright
Note: This Question is unanswered, help us to find answer for this one
304. A utility tool that can change the software that is launched automatically during start-up is ____.
Answer
Correct Answer:
An autoruns utility
Note: This Question is unanswered, help us to find answer for this one
305. A backup utility can write copies of important data files and folders on ____.
Answer
Correct Answer:
Any of these
Note: This Question is unanswered, help us to find answer for this one
306. A ________ is a virus that is triggered on a certain date.
Answer
Correct Answer:
Time bomb
Note: This Question is unanswered, help us to find answer for this one
307. A _____ is an audio output device that converts text to speech.
Answer
Correct Answer:
Voice synthesizer
Note: This Question is unanswered, help us to find answer for this one
308. A _____ is a peripheral device for recording, storing, and retrieving information.
Answer
Correct Answer:
Disk drive
Note: This Question is unanswered, help us to find answer for this one
309. A _____ is a computer with the ability to perform trillions of calculations per second.
Answer
Correct Answer:
Supercomputer
Note: This Question is unanswered, help us to find answer for this one
310. A ____ is equal to exactly 1,024 bytes, but often is rounded down to 1,000 bytes by computer users.
Answer
Correct Answer:
Kilobyte (abbreviated K or KB)
Note: This Question is unanswered, help us to find answer for this one
311. A ____ is an optical code that represents data with bars of varying widths or heights.
Note: This Question is unanswered, help us to find answer for this one
312. ___________________ addresses how specific a policy is with respect to resources.
Answer
Correct Answer:
Granularity
Note: This Question is unanswered, help us to find answer for this one
313. ___________ is a tool used for extracting data from a database.
Answer
Correct Answer:
Data mining
Note: This Question is unanswered, help us to find answer for this one
314. _________ memory refers to a portion of your hard drive that is being used as ram.
Note: This Question is unanswered, help us to find answer for this one
315. ________ viruses are often transmitted by a flash drive left in a usb port.
Answer
Correct Answer:
Boot-sector.
Note: This Question is unanswered, help us to find answer for this one
316. _______ storage devices do not lose data or programs after the electrical power is turned off.
Answer
Correct Answer:
Secondary
Note: This Question is unanswered, help us to find answer for this one
317. ______ is the process of transferring items from a storage medium into memory.
Note: This Question is unanswered, help us to find answer for this one
318. ______ is data that is entered into a computer. ______ is the result produced by a computer.
Answer
Correct Answer:
Input, Output
Note: This Question is unanswered, help us to find answer for this one
319. ____ technology uses digital signaling in which the cable carries only one channel of digital data.
Answer
Correct Answer:
Baseband coaxial
Note: This Question is unanswered, help us to find answer for this one
320. The concept of competitive _________ refers to falling behind the competition.
Answer
Correct Answer:
Disadvantage
Note: This Question is unanswered, help us to find answer for this one
321. The __________ is a statement of the boundaries of the ra.
Note: This Question is unanswered, help us to find answer for this one
322. Software designed specifically for a highly specialized industry is called ____.
Answer
Correct Answer:
Vertical market software
Note: This Question is unanswered, help us to find answer for this one
323. In the ____ process, measured results are compared to expected results.
Answer
Correct Answer:
Negative feedback loop
Note: This Question is unanswered, help us to find answer for this one
324. In _____, direct and indirect materials in one industry are purchased on an as-needed basis.
Answer
Correct Answer:
Vertical exchanges
Note: This Question is unanswered, help us to find answer for this one
325. _____ is the efficient and effective execution of specific tasks
Answer
Correct Answer:
Operational
Note: This Question is unanswered, help us to find answer for this one
326. _____ is an example of a popular general purpose software suite for personal computer users.
Answer
Correct Answer:
Corel WordPerfect Office
Note: This Question is unanswered, help us to find answer for this one
Information Engineering MCQs | Topic-wise
Information Engineering Subjects
|