Which of the following are examples of data mining tools?
A) inferential, associative, comparative
B) cleaner, marted, processed
C) cleansed, clouded,...
A ________ is a segment or category of data that has been extracted from a data warehouse.
A ________ is a segment or category of data that has been extracted from a data warehouse.
A) data mart
B) cleaning mine
C) cloud cover
D) transformed...
To say that data have been ________ means that the data have been checked for missing values, incorrect values, and other syntactical problems.
To say that data have been ________ means that the data have been checked for missing values, incorrect values, and other syntactical problems.
A)...
Advances in hardware, software, storage, and database technologies have given businesses a new tool that better allows them to competitively use their mountains of data. This tool is called ________.
Advances in hardware, software, storage, and database technologies have given businesses a new tool that better allows them to competitively use their...
For data to become information, the data must be ________.
For data to become information, the data must be ________.
A) requested
B) transformed
C) received
D) transferred
Answer: ...
What is a data service that is used to carry voice communications?
What is a data service that is used to carry voice communications?
A) Voice Information Service (VIS)
B) Wireless Markup
C) Voice-over-Internet Protocol...
The use of ________ encryption creates a secure VPN.
The use of ________ encryption creates a secure VPN.
A) buried
B) tunneled
C) covered
D) routed
Answer: ...
Before a trusted VPN path can be established, the ________ and addressing have to be defined between the sender and the receiver.
Before a trusted VPN path can be established, the ________ and addressing have to be defined between the sender and the receiver.
A) routing
B) receiving
C)...
For a ________ VPN, no one other than the carrier can affect the creation or modification of the VPN's path.
For a ________ VPN, no one other than the carrier can affect the creation or modification of the VPN's path.
A) trusted
B) divided
C) secure
D) h...
A NAS appliance must be attached to a network that supports ________ protocols.
A NAS appliance must be attached to a network that supports ________ protocols.
A) VS-based
B) OP-based
C) IP-based
D) IM-based
Answer: ...
In addition to Fibre Channel, one type of networking connection technology is ________.
In addition to Fibre Channel, one type of networking connection technology is ________.
A) Gigabit Ethernet
B) Web Markup
C) Description Language
D)...
What is the name of Microsoft's application development platform?
What is the name of Microsoft's application development platform?
A) .Plat
B) .Net
C) .Dev
D) .MAD
Answer: ...
_______ is an umbrella term used to describe technologies that, utilizing the Internet and particularly the WWW, provide access to a host of services for customers, employees, and business partners.
_______ is an umbrella term used to describe technologies that, utilizing the Internet and particularly the WWW, provide access to a host of services...
Which of the following is NOT one of the four most common VPN tunneling protocols?
Which of the following is NOT one of the four most common VPN tunneling protocols?
A) Internet Protocol Security
B) Session-to-Session Tunneling Protocol
C)...
The three types of VPN include:
The three types of VPN include:
A) alpha, beta, gamma
B) first, second, third
C) wired, wireless, virtual
D) trusted, secure, or hybrid
Answer:...
________ refers to a technique that allows packets from one protocol to be wrapped, or encapsulated, within a second protocol.
________ refers to a technique that allows packets from one protocol to be wrapped, or encapsulated, within a second protocol.
A) Tunneling
B) Sanding
C)...
________ is a process that businesses follow to generate value from their intellectual property and knowledge-based assets.
________ is a process that businesses follow to generate value from their intellectual property and knowledge-based assets.
A) Knowledge management
B)...
________ is a means of viewing a wide variety of data that can offer a comprehensive view of business conditions at a given point in time.
________ is a means of viewing a wide variety of data that can offer a comprehensive view of business conditions at a given point in time.
A) Direct...
_______ is a high-speed (100 million bytes per second) switched-fabric technology capable of connecting hundreds or even thousands of devices.
_______ is a high-speed (100 million bytes per second) switched-fabric technology capable of connecting hundreds or even thousands of devices.
A)...
A standard SCSI parallel cable should be no longer than ________, which limits how far an external storage device can be from its direct-connect server.
A standard SCSI parallel cable should be no longer than ________, which limits how far an external storage device can be from its direct-connect server.
A)...
Standard voice is ________; VoIP is ________.
Standard voice is ________; VoIP is ________.
A) analog, digital
B) digital, analog
C) remote, local
D) random, particular
Answer: ...
Three common cloud models are ________.
Three common cloud models are ________.
A) random, remote, and digital
B) cumulus, cirrus, and stratus
C) connected, virtual, and wired
D) public,...
Three significant reasons cited in the text for the popularity of cloud computing are ________.
Three significant reasons cited in the text for the popularity of cloud computing are ________.
A) proximity, leverage, and popularity
B) cost, accessibility,...
_______ computing in essence virtualizes the networking infrastructure such that the user of ________ services and resources does not need to be concerned with, or aware of, how the ________ is configured, maintained, or implemented.
_______ computing in essence virtualizes the networking infrastructure such that the user of ________ services and resources does not need to be concerned...
Subscribe to:
Posts (Atom)