A ___is a maker connected to network-related such as a computer or a game consingle.

You are watching: Which of the following provides a visual representation of the patterns of an algorithm

Which transmission tool transmits information the fastest? Twisted-pair cable
___ is the maximum rate at which data have the right to be transferred between two nodes. Bandwidth
The present variation of wireless Ethernet is 802.11n
Regular telephone cable is a type of twisted-pair cable.
A netoccupational provided to interact among tools cshed to one person is referred to as a PAN.
A peer-to-peer (P2P) network-related is an instance of ___ management. local
Documents is sent out through a network on bundles called packets.
Client/server networks are managed by a central server that runs a specialized piece of software application called a netoccupational operating mechanism (NOS)
All of the following are additional preadvises you have the right to take to secure a wireless network-related, except allow SSID broadcast.
Which of the adhering to is NOT a form of cable provided in wired networks? Router cable
All of the complying with are benefits of netfunctions EXCEPT, Sharing an operating system.
The most popular transmission media alternative for wired Ethernet networks is unshielded twisted-pair (UTP) cable.
Network architectures are classified according to the means in which they are regulated and the distance between their nodes.
Wiremuch less Web is accessible using radio waves.
All of the following involve jobs for network-related management, except purchasing initial equipment for the netoccupational.
SSID stands for Service Set Identifier.
The primary difference between the tablet and also smartphone is the display dimension.
An analog-to-digital converter chip converts the sound waved from a voice right into digital signals.
All of the following are benefits of VoIP except relicapacity.
SMS delivers messeras to the correct mobile device making use of ___ innovation. store-and-forward
Imeras are a depiction of light waves called ___ or constant waves. analog
The operating mechanism of a cell phone is stored in ROM.
Text messaging is additionally called Quick message service (SMS)
An internet connectivity arrangement is additionally recognized a data setup.
Which of the adhering to statements in NOT true about the JPEG file format? JPEGs are bigger than raw files.
What is Android? An operating mechanism for cell/smartphones.
Which of the adhering to supplies radio waves to transmit data signals over short ranges. Bluetooth
The alternative interaction mode for world aged 14 to 30 is texting.
The major input gadgets for smartphones are microphone and touch pad.
A portable media player have the right to play papers with every one of the following file extensions, except .doc.
A ___ runs a conventional desktop operating device and is lightweight. netbook
___ is a really well known totally free VoIP provider. Skype
All of the adhering to are innovations offered to transport digital information, except 5G
Almany all cell phones are designed through a ___ port. USB
The global placing mechanism is a netoccupational of___ satellites plus 3 functioning spares. 21
An converts your voices sound waves right into digital signals. analog-to-digital converter chip
___ is a solitary cable that carries all audio and also video indevelopment from gadgets connected to a TV to the TV itself. HDMI
You have the right to send messperiods that incorporate photos and also videos in between mobile tools using ___ innovation. multimedia message business (MMS)
To transport papers from your computer to your music device use a ___ port. USB
Social is any technique that uses social skills to geneprice human interaction that entices individuals to reveal sensitive indevelopment. engineering
Using your computer system for non-job-related activities while you are being passist to execute your job is known as cyperloafing.
A ___ is a virus that is motivated on a particular day. time bomb
IC3 is a partnership in between the FBI and also National White Collar Crime Center
You can block logical ports to intruders and also make your computer invisible to others on the Internet by installing a firewall.
___ is an unwanted piggyearlier regimen that typically downloads with software application you are installing from the Net. Spyware
Which of the adhering to classifications of virsupplies deserve to change its very own code to prevent detection. Polymorphic
All of the following are categories of virsupplies, except snakes.
___hackers break right into units for mon-malicious reasons such regarding test system security vulnerabilities. White-hat
A ___ is the portion of virus code that is unique to a specific computer virus. virus signature
When malicious code is planted on your computer system and also alters your browser’s capacity to uncover Internet addresses it is recognized as pharming.
All of the following are means that can infect your computer through a virus, except logging into e-mail.
Which of the complying with statements around cookies is NOT true. Cookies attain your individual information by searching you hard drive.
All of the complying with are height cybercrimes reported to the IC3 in 2011 except son pornography
With regard to computer security, quarantining is characterized as placing a found virus in a secure location on the hard drive.
A packet sniffer is a routine that have the right to permit a hacker to perform all of the adhering to, EXCEPT launch a denial of company (DoS) strike on your computer system.
All of the adhering to are the primary features of antivirus software, except assassinating all virsupplies.
___ viruses are often transmitted by a flash drive left in a USB port. Boot-sector
Which of the complying with is formally characterized as any kind of criminal action perpetrated mainly through the usage of a computer. Cybercrime
A ___ virus transforms its very own code or periodically rewrites itself to avoid detection. polymorphic
___ floods a computer through researches until it shuts down and also refprovides to answer any kind of repursuits for indevelopment. A DDoS attack
Rules for creating passwords include all of the complying with, except save your password composed down and also stored in an easy-to-remember location.
All of the adhering to are thought about cybercrimes, except theft of a cell phone.
A ___ is called after a real estate building and construction function that slows the spreview of fires from house to residence. firewall
Which statement about choosing the best programming language for a project is FALSE? Programming langueras require the very same amount of time to execute.
Keywords in a programming language that redirect the flow of a routine based upon a decision are called manage frameworks.
A ___ error is captured once the regime executes. logical
___ is a powerful programming language offered to build a broad selection of Windows applications. Visual Basic
The process by which regimen code is converted right into machine language is called compilation.
The capcapability of relocating a completed programming solution easily from one form of computer to one more is well-known as portcapacity.
___ is the process of translating a job into a collection of commands that a computer system will usage to perform the task. Programming
Throughout which phase of the device breakthrough life cycle are flowcharts and also data-circulation diagrams developed? Design
___ is a text-based strategy to documenting an algorithm. pseudocode
With object-oriented evaluation, programmers identify categories of input that are part of the problem into classes
Which of the complying with statements around JAVA is false? Java have the right to run just on a Windows operating system
Before its last commercial release, software program is regularly gave free or at a lessened cost in a ___ version to particular test sites or to interested users. Beta
FORTRAN, C++, and Java are all ___ generation languperiods. third
Special icons called tags are offered in which of the following languages? HTML/XHTML
The method of algorithm production offered once a programmer breaks down a trouble into a series of high-level work and also proceeds to break each job into successively even more thorough subwork is called peak dvery own designs
The collection of particular, sequential measures that describe specifically wwarm a copter program have to carry out to finish the work-related is called an algorithm
The loop decision suggest is composed of 3 features: an initial worth, a set of actions to be perdeveloped, and a test condition
Which of the complying with is the initially stage of the regimen advancement life cycle (PDLC)? Describing the problem
Translating an algorithm right into a programming language is called coding.
SQL is an example of a ___ generation language. fourth
___ is the instructions programmers have written in a higher-level language. Source code
Which statement does NOT define fifth-generation languages? They usage a set of short, English-based commands (such as SUB) that speak straight to the CPU
Which of the following provides a visual representation of fads that an algorithm comprises? flowchart
A ___ is a visual diagram of a procedure, consisting of the decisions that should be made along the way flowchart
How many steps are tright here in the mechanism advance life cycle? 6
The first-generation language is machine language
___ is the process of reducing information redundancy by recording data just as soon as. normalization
A ___ is a means of retrieving information from one or more tables that specifies a certain subcollection of information.

See more: Which Statement Best Describes Why A Machine Is Useful? Which Statement Best Describes Scrum

___ is the branch of computer scientific research that deals with the attempt to develop computers that think prefer people. artificial intelligence