A ___is a maker connected to network-related such as a computer or a game consingle. You are watching: Which of the following provides a visual representation of the patterns of an algorithm | node |
Which transmission tool transmits information the fastest? | Twisted-pair cable |
___ is the maximum rate at which data have the right to be transferred between two nodes. | Bandwidth |
The present variation of wireless Ethernet is | 802.11n |
Regular telephone cable is a type of | twisted-pair cable. |
A netoccupational provided to interact among tools cshed to one person is referred to as a | PAN. |
A peer-to-peer (P2P) network-related is an instance of ___ management. | local |
Documents is sent out through a network on bundles called | packets. |
Client/server networks are managed by a central server that runs a specialized piece of software application called a | netoccupational operating mechanism (NOS) |
All of the following are additional preadvises you have the right to take to secure a wireless network-related, except | allow SSID broadcast. |
Which of the adhering to is NOT a form of cable provided in wired networks? | Router cable |
All of the complying with are benefits of netfunctions EXCEPT, | Sharing an operating system. |
The most popular transmission media alternative for wired Ethernet networks is | unshielded twisted-pair (UTP) cable. |
Network architectures are classified according to | the means in which they are regulated and the distance between their nodes. |
Wiremuch less Web is accessible using | radio waves. |
All of the following involve jobs for network-related management, except | purchasing initial equipment for the netoccupational. |
SSID stands for | Service Set Identifier. |
The primary difference between the tablet and also smartphone is the | display dimension. |
An analog-to-digital converter chip | converts the sound waved from a voice right into digital signals. |
All of the following are benefits of VoIP except | relicapacity. |
SMS delivers messeras to the correct mobile device making use of ___ innovation. | store-and-forward |
Imeras are a depiction of light waves called ___ or constant waves. | analog |
The operating mechanism of a cell phone is stored in | ROM. |
Text messaging is additionally called | Quick message service (SMS) |
An internet connectivity arrangement is additionally recognized a | data setup. |
Which of the adhering to statements in NOT true about the JPEG file format? | JPEGs are bigger than raw files. |
What is Android? | An operating mechanism for cell/smartphones. |
Which of the adhering to supplies radio waves to transmit data signals over short ranges. | Bluetooth |
The alternative interaction mode for world aged 14 to 30 is | texting. |
The major input gadgets for smartphones are | microphone and touch pad. |
A portable media player have the right to play papers with every one of the following file extensions, except | .doc. |
A ___ runs a conventional desktop operating device and is lightweight. | netbook |
___ is a really well known totally free VoIP provider. | Skype |
All of the adhering to are innovations offered to transport digital information, except | 5G |
Almany all cell phones are designed through a ___ port. | USB |
The global placing mechanism is a netoccupational of___ satellites plus 3 functioning spares. | 21 |
An converts your voices sound waves right into digital signals. | analog-to-digital converter chip |
___ is a solitary cable that carries all audio and also video indevelopment from gadgets connected to a TV to the TV itself. | HDMI |
You have the right to send messperiods that incorporate photos and also videos in between mobile tools using ___ innovation. | multimedia message business (MMS) |
To transport papers from your computer to your music device use a ___ port. | USB |
Social is any technique that uses social skills to geneprice human interaction that entices individuals to reveal sensitive indevelopment. | engineering |
Using your computer system for non-job-related activities while you are being passist to execute your job is known as | cyperloafing. |
A ___ is a virus that is motivated on a particular day. | time bomb |
IC3 is a partnership in between the | FBI and also National White Collar Crime Center |
You can block logical ports to intruders and also make your computer invisible to others on the Internet by installing a | firewall. |
___ is an unwanted piggyearlier regimen that typically downloads with software application you are installing from the Net. | Spyware |
Which of the adhering to classifications of virsupplies deserve to change its very own code to prevent detection. | Polymorphic |
All of the following are categories of virsupplies, except | snakes. |
___hackers break right into units for mon-malicious reasons such regarding test system security vulnerabilities. | White-hat |
A ___ is the portion of virus code that is unique to a specific computer virus. | virus signature |
When malicious code is planted on your computer system and also alters your browser’s capacity to uncover Internet addresses it is recognized as | pharming. |
All of the following are means that can infect your computer through a virus, except | logging into e-mail. |
Which of the complying with statements around cookies is NOT true. | Cookies attain your individual information by searching you hard drive. |
All of the complying with are height cybercrimes reported to the IC3 in 2011 except | son pornography |
With regard to computer security, quarantining is characterized as | placing a found virus in a secure location on the hard drive. |
A packet sniffer is a routine that have the right to permit a hacker to perform all of the adhering to, EXCEPT | launch a denial of company (DoS) strike on your computer system. |
All of the adhering to are the primary features of antivirus software, except | assassinating all virsupplies. |
___ viruses are often transmitted by a flash drive left in a USB port. | Boot-sector |
Which of the complying with is formally characterized as any kind of criminal action perpetrated mainly through the usage of a computer. | Cybercrime |
A ___ virus transforms its very own code or periodically rewrites itself to avoid detection. | polymorphic |
___ floods a computer through researches until it shuts down and also refprovides to answer any kind of repursuits for indevelopment. | A DDoS attack |
Rules for creating passwords include all of the complying with, except | save your password composed down and also stored in an easy-to-remember location. |
All of the adhering to are thought about cybercrimes, except | theft of a cell phone. |
A ___ is called after a real estate building and construction function that slows the spreview of fires from house to residence. | firewall |
Which statement about choosing the best programming language for a project is FALSE? | Programming langueras require the very same amount of time to execute. |
Keywords in a programming language that redirect the flow of a routine based upon a decision are called | manage frameworks. |
A ___ error is captured once the regime executes. | logical |
___ is a powerful programming language offered to build a broad selection of Windows applications. | Visual Basic |
The process by which regimen code is converted right into machine language is called | compilation. |
The capcapability of relocating a completed programming solution easily from one form of computer to one more is well-known as | portcapacity. |
___ is the process of translating a job into a collection of commands that a computer system will usage to perform the task. | Programming |
Throughout which phase of the device breakthrough life cycle are flowcharts and also data-circulation diagrams developed? | Design |
___ is a text-based strategy to documenting an algorithm. | pseudocode |
With object-oriented evaluation, programmers identify categories of input that are part of the problem into | classes |
Which of the complying with statements around JAVA is false? | Java have the right to run just on a Windows operating system |
Before its last commercial release, software program is regularly gave free or at a lessened cost in a ___ version to particular test sites or to interested users. | Beta |
FORTRAN, C++, and Java are all ___ generation languperiods. | third |
Special icons called tags are offered in which of the following languages? | HTML/XHTML |
The method of algorithm production offered once a programmer breaks down a trouble into a series of high-level work and also proceeds to break each job into successively even more thorough subwork is called | peak dvery own designs |
The collection of particular, sequential measures that describe specifically wwarm a copter program have to carry out to finish the work-related is called an | algorithm |
The loop decision suggest is composed of 3 features: an initial worth, a set of actions to be perdeveloped, and a | test condition |
Which of the complying with is the initially stage of the regimen advancement life cycle (PDLC)? | Describing the problem |
Translating an algorithm right into a programming language is called | coding. |
SQL is an example of a ___ generation language. | fourth |
___ is the instructions programmers have written in a higher-level language. | Source code |
Which statement does NOT define fifth-generation languages? | They usage a set of short, English-based commands (such as SUB) that speak straight to the CPU |
Which of the following provides a visual representation of fads that an algorithm comprises? | flowchart |
A ___ is a visual diagram of a procedure, consisting of the decisions that should be made along the way | flowchart |
How many steps are tright here in the mechanism advance life cycle? | 6 |
The first-generation language is | machine language |
___ is the process of reducing information redundancy by recording data just as soon as. | normalization |
A ___ is a means of retrieving information from one or more tables that specifies a certain subcollection of information. See more: Which Statement Best Describes Why A Machine Is Useful? Which Statement Best Describes Scrum | query |
___ is the branch of computer scientific research that deals with the attempt to develop computers that think prefer people. | artificial intelligence |