What does the base 2 number, 0100 1111, convert to in decimal?
A. 128
B. 79
C. 91
D. 25
Answer: ...
In an ERD, the lines represent __________.
In an ERD, the lines represent __________.
A. Entries
B. Relationships
C. Attributes
D. Cardinality
Answer: ...
In an ERD, the boxes represent___________.
In an ERD, the boxes represent___________.
A. Cardinality
B. Attributes
C. Relationships
D. Entities
Answer: ...
When a DBMS accounts for linked records when a parent record is deleted, what is this called?
When a DBMS accounts for linked records when a parent record is deleted, what is this called?
A. Referential integrity
B. DB Refinery
C. Cleanup routine
D....
In a flat file system, how many times must a single piece of data be added?
In a flat file system, how many times must a single piece of data be added?
A. once for every table
B. once
C. unknown
Answer: ...
In a relational database, how many times must a single piece of data be added?
In a relational database, how many times must a single piece of data be added?
A. once for every table
B. unknown
C. Once
Answer: ...
In the following SQL statement... SELECT lastname FROM employeetbl WHERE employeeID = 79 form where is the data being pulled?
In the following SQL statement... SELECT lastname FROM employeetbl WHERE employeeID = 79 form where is the data being pulled?
A. employeetbl
B. employeeID
C....
In the following SQL statement.... SELECT lastname FROM employeetbl WHERE employeeID = 79 what data will be displayed in the results?
In the following SQL statement.... SELECT lastname FROM employeetbl WHERE employeeID = 79 what data will be displayed in the results?
A. All of these...
What must a DBMS have?
What must a DBMS have?
A. Word processor
B. None of these options
C. Web access
D. DB Engine
Answer: ...
What are examples of DBMSs?
What are examples of DBMSs?
A. Oracle
B. Chrome
C. Windows 10
D. Excel
Answer: ...
How does a database store data?
How does a database store data?
A. Relationships are initiated with foreign keys
B. In tables that consist of rows and columns
C. Each row in each...
Who came up with the theory used to base relational databases?
Who came up with the theory used to base relational databases?
A. Steve Jobs
B. Edgar Codd
C. Bill Gates
D. Al Gore
Answer: ...
In order to combat the problems associated with islands of information, what were organizations looking for?
In order to combat the problems associated with islands of information, what were organizations looking for?
A. Something Central
B. Something relational
C....
What are "islands of information?"
What are "islands of information?"
A. Separate pool of redundant data spread throughout the organization
B. Centralized deposit of data
C. Any...
Who had direct access to all of the data in organizations in the 1940s, 1950s and 1960s?
Who had direct access to all of the data in organizations in the 1940s, 1950s and 1960s?
A. Systems Analysts
B. Secretaries
C. Customers
D. Janit...
If you had a high end hard drive that held 4 Terabytes of information, how many filing cabinets would that require to store the equivalent number of textual characters?
If you had a high end hard drive that held 4 Terabytes of information, how many filing cabinets would that require to store the equivalent number of...
What is the analogue to the semiotic "data" level in how data is organized in computer files?
What is the analogue to the semiotic "data" level in how data is organized in computer files?
A. Files
B. Fields
C. Characters
D. Records
Answe...
If it is generally understood among employees that you should arrive at work at 8am and leave whenever your work is complete, this is at what level of information?
If it is generally understood among employees that you should arrive at work at 8am and leave whenever your work is complete, this is at what level...
If you see markings on a wall, at what level of information are you?
If you see markings on a wall, at what level of information are you?
A. Semantics
B. Syntax
C. Signs
D. Signals
Answer: ...
How many bits are used for the color in a single pixel in most image files?
How many bits are used for the color in a single pixel in most image files?
A. 24
B. 3
C. about 16 million
D. 1
Answer: ...
In the context of computing, what is a "Hertz"?
In the context of computing, what is a "Hertz"?
A. Flux transfer
B. Bit conversion
C. Cycle per second
D. Car rental company
Answer: ...
The main focus of supercomputers is
The main focus of supercomputers is
A. Maximum redundancy
B. Maximum processing speed
C. Maximum memory
D. Maximum resolution
Answer: ...
Supercomputers use which measurement unit to describe how fast they run?
Supercomputers use which measurement unit to describe how fast they run?
A. PetaFLOPs
B. Gigabyte
C. Gigahertz
D. GigaWatts
Answer: ...
Laptop and desktop computers use which measurement unit to describe how fast they run?
Laptop and desktop computers use which measurement unit to describe how fast they run?
A. Gigawatts
B. Gigahertz
C. Gigabyte
D. TeraFLOPs
Answe...
Why do computers have power supply units?
Why do computers have power supply units?
A. In order to increase the power for computers
B. None of these
C. In order to convert alternative current...
Which of the following will lose their information when power is lost?
Which of the following will lose their information when power is lost?
A. Optical Disks
B. Hard Drives
C. Flash Memory
D. RAM
Answer: ...
When comparing Flash memory to magnetic hard drives, which of the following are true?
When comparing Flash memory to magnetic hard drives, which of the following are true?
A. Flash is generally cheaper to produce
B. Magnetic hard drives...
How many characters can a byte represent?
How many characters can a byte represent?
A. 26
B. 24
C. about 16,000,000
D. 256
Answer: ...
How many byte(s) are typically used to store one color pixel?
How many byte(s) are typically used to store one color pixel?
A. 256
B. 24
C. 1
D. 3
Answer: ...
How many byte(s) are used to store one ASCII character?
How many byte(s) are used to store one ASCII character?
A. 24
B. 8
C. 3
D. 1
Answer: ...
Roughly how many bytes are in a megabyte?
Roughly how many bytes are in a megabyte?
A. 1,000
B. 1,000,000,000
C. 1
D. 1,000,000
Answer: ...
How many different combinations of characters can be stored in a byte?
How many different combinations of characters can be stored in a byte?
A. 64
B. 255
C. 8
D. 256
Answer: ...
Which of the following bytes is equivalent to 82 (in Base 10)
Which of the following bytes is equivalent to 82 (in Base 10)
A. 0101 0010
B. 0101 0011
C. 0111 0001
D. 0101 1010
Answer: ...
Computers are based in which numeric base?
Computers are based in which numeric base?
A. 2
B. 15
C. 10
D. 60
Answer: ...
Humans typically count in which base?
Humans typically count in which base?
A. 8
B. 2
C. 16
D. 10
Answer: ...
Of the items on the following list, what is the latest advancement in hardware?
Of the items on the following list, what is the latest advancement in hardware?
A. Vacuum tube
B. Parallel Processing
C. Transistors
D. Integrated...
Which of the following are examples of disadvantages of computing
Which of the following are examples of disadvantages of computing
A. Reliability
B. Speed
C. All of these options
D. Privacy
Answer: ...
What is the "brain" of a computer?
What is the "brain" of a computer?
A.RAM
B.CPU
C. Monitor
D. Hard Drive
Answer: ...
The JPEG fie type stores images in what way?
The JPEG fie type stores images in what way?
A. Higher Quality lossless files with compression
B. Higher quality lossy files with compression
C. Lower...
Which company created the first mouse?
Which company created the first mouse?
A. Applex
B. Microsoft
C. Yahoo!
D. Xerox
Answer: ...
Why are keyboards laid out the way they are?
Why are keyboards laid out the way they are?
A. To increase typing efficiency
B. To speed up typing
C. To ensure the bits flow efficiently
D. To decrease...
What type of layout does a keyboard have?
What type of layout does a keyboard have?
A. QWERTY
B. Dvorak
C. Binary
D. ASCII
Answer: ...
IPO stands for what in the context of computing?
IPO stands for what in the context of computing?
A. Input Process Output
B. Internet Protocol Offset
C. Initial Public Offering
D. Ionized Plasma...
Which of the following is indicative of the future of computing?
Which of the following is indicative of the future of computing?
A. Increased size of hardware
B. Increased hardware costs
C. Decreased mobility
D....
Online job hunting services are the best way to help you find a job in the MIS Field.
Online job hunting services are the best way to help you find a job in the MIS Field.
A. True
B. False
Answer: ...
Which of the following are safe bets in the MIS Field in coming years?
Which of the following are safe bets in the MIS Field in coming years?
A. Healthcare Industry
B. Call Center Jobs
C. Computer Repair
D. All of these...
The situation with jobs in the IT and IS field over the next 10 years is
The situation with jobs in the IT and IS field over the next 10 years is
A. An increase in jobs
B. None of the options
C. A Decrease in jobs
D. No...
Which of the following disciplines focuses on theory and infrastructure building at the system level?
Which of the following disciplines focuses on theory and infrastructure building at the system level?
A. IT
B. IS
C. CS
D. None of the options
...
What is the best definition of an information system?
What is the best definition of an information system?
A. A technical system that that has been socially implemented
B. The emergent result of the...
What is an example of Artificial Intelligence circa 2017?
What is an example of Artificial Intelligence circa 2017?
a.They are self aware
b.They can diagnose medical issues with high levels of accuracy
c.They...
What was George Hotz known for in the Intellectual Property arena?
What was George Hotz known for in the Intellectual Property arena?
a.Founding PirateBay
b.Hacking Visa's payment systems
c.Tearing down a PS2 to hack...
What is an example of a deontological approach to ethics?
What is an example of a deontological approach to ethics?
a.Killing baby Hitler to prevent World War II
b.Lying to your spouse in order to make them...
The group "Anonymous" is usually categorized as what subset of hackers?
The group "Anonymous" is usually categorized as what subset of hackers?
a.Tinkerers
b.Script Kiddies
c.State based attackers
d.Vault slashers
Answer: b.Script...
How can firewalls be defeated?
How can firewalls be defeated?
a.Antisocial engineering
b.Front Door Attacks
c.Brute force attacks
d.Phone phreaking
Answer: c.Brute force ...
What is one way the traditional model (i.e. CIA model) of security instantiated
What is one way the traditional model (i.e. CIA model) of security instantiated
a.Risk analysis
b.Access control
c.Disaster planning
d.None of the...
What ended up killing the Phone phreaking movement?
What ended up killing the Phone phreaking movement?
a.Lack of Media attention
b.Parasites using tools to manipulate the system after exposure by the...
Modern hacking is said to have originated with which group?
Modern hacking is said to have originated with which group?
a.Phone phreakers, who manipulated telephone company employees
b.Anonymous
c.Wozniak's...
Which of the following concepts was part of the traditional model of security?
Which of the following concepts was part of the traditional model of security?
a.Responsibility
b.Ethicality
c.Trust
d.Confidentiality
Answer:&n...
A Denial of Service attack involves what?
A Denial of Service attack involves what?
a.Flooding a server with so many hits that it shuts down
b.Distributing viruses
c.Activating zombies on a...
How was the hacker Captain Crunch (John Draper) named?
How was the hacker Captain Crunch (John Draper) named?
a.He could crunch numbers in head so quickly that he could beat most calculators
b.He popularized...
What is the difference between hackers and script kiddie?
What is the difference between hackers and script kiddie?
a.The former are problem solvers and the latter have mal intent with little problem solving...
A DNS attack will
A DNS attack will
a.Kill a firewall
b.Reroute a request for a web page
c.Crash a server
d.Disable a virus scanner
Answer: b.Reroute a request...
Why did the average losses per company decrease after 2001
Why did the average losses per company decrease after 2001
a.Managers realized that an ROI of 0 was superior to millions in losses
b.The formal approach...
What is a difference between personal and organizational security?
What is a difference between personal and organizational security?
a.Organizational security must account for many people accessing the system
b.Organizations...
What is a "Blue Box" within the context of Computer Security?
What is a "Blue Box" within the context of Computer Security?
a.A tool used by the FBI to record emails
b.A method of encryption
c.A tool created by...
What is a similarity between personal and organizational security?
What is a similarity between personal and organizational security?
a.They both have to be aware of internal threats
b.They both use some similar technical...
One of the earliest attempts at security was
One of the earliest attempts at security was
a.Virus scanners
b.Firewalls
c.Encryption
d.Blue boxes
Answer: c.Encryptio...
Why might Blockchain have a massive impact on the future?
Why might Blockchain have a massive impact on the future?
a.government regulation
b.financial incentive
c.increased education
d.international standards
Answer: b.financial...
What does Blockchain mean?
What does Blockchain mean?
a.the place in a computing device where the operating system (OS), application programs and data in current use are kept...
Why did losses due to security breaches peak in 2001/2002?
Why did losses due to security breaches peak in 2001/2002?
a.Al Qaida was invested in attacking our corporate infrastructure
b.Businesses were getting...
Compared to its low point in 2008, in recent years, security breaches have been
Compared to its low point in 2008, in recent years, security breaches have been
a.Lower
b.The same
c.Higher
d.None of these
Answer: c.Highe...
How does the general public view hackers?
How does the general public view hackers?
a.As a diverse group with differing views of how hacking should be done
b.As a generally good group that...
Which of the following is a data centric security model?
Which of the following is a data centric security model?
a.CIA
b.Managerial
c.Organizational
d.Hyper Encryption
Answer: a.CI...
How has Intellectual Property piracy trended in the last couple of years?
How has Intellectual Property piracy trended in the last couple of years?
a.It has increased
b.It has decreased
c.It has been flat
d.It has gone up...
Which of the following refers to data not being modified in an unauthorized or undetected manner?
Which of the following refers to data not being modified in an unauthorized or undetected manner?
a.Confidentiality
b.Integrity
c.Availability
d.R...
Who did Apple sue for their use of "rounded rectangles" in their interface?
Who did Apple sue for their use of "rounded rectangles" in their interface?
a.Microsoft
b.Xerox
c.Samsung
d.Google
Answer: c.Samsun...
What lasts an author's lifetime plus 70 years?
What lasts an author's lifetime plus 70 years?
a.Copyright
b.Patent
c.Trademark
d.All of the above
Answer: a.Copyrigh...
How can someone record everything you do on a computer?
How can someone record everything you do on a computer?
a.Phishing
b.Keylogging
c.3rd party cookies
d.1st party cookies
Answer: b.Keyloggin...
How can legitimate companies track you while you are online?
How can legitimate companies track you while you are online?
a.Viruses
b.Spyware
c.3rd party cookies
d.All of the above
Answer: c.3rd party...
Which of the following approaches to applied ethics calls for doing the right thing regardless of the consequences?
Which of the following approaches to applied ethics calls for doing the right thing regardless of the consequences?
a.Utilitarianism
b.Deontology
c.Virtue
d.Social...
What is the highest level of Kohlberg's stages of moral development?
What is the highest level of Kohlberg's stages of moral development?
a.Social Norms
b.Self Interest
c.Universal Ethics
d.Obedience
Answer: c.Universal...
What analogy did Kelly use to describe the Internet as it stood in 2007 (5000 days of the web video)?
What analogy did Kelly use to describe the Internet as it stood in 2007 (5000 days of the web video)?
a.A car in the flow of traffic
b.A single human...
How much downtime has the Web has since its inception (5000 days of the web video)?
How much downtime has the Web has since its inception (5000 days of the web video)?
a.100 days
b.10 days
c.1 day
d.0 days
Answer: d.0 day...
Kevin Kelly (5000 days of the web video) described what people thought the Web would be in the future back when the web first started. What was this prediction?
Kevin Kelly (5000 days of the web video) described what people thought the Web would be in the future back when the web first started. What was this...
What is an example of a device that might be considered part of the "Internet of Things?"
What is an example of a device that might be considered part of the "Internet of Things?"
a.Nest home HVAC controller
b.FitBit personal exercise tracker
c.Energy...
What are three types of 3D printing?
What are three types of 3D printing?
a.Intrusion, wire, and bio
b.Extrusion, granular, and bio
c.Bio, extrusion, and modular
d.Modular, Intrusion,...
Your instructor felt which way about Genetically Modified Organisms and food production?
Your instructor felt which way about Genetically Modified Organisms and food production?
a.He agreed with the plurality of scientists that supported...
How might cancer be treated in the future?
How might cancer be treated in the future?
a.Via personalized medicine
b.Via nanotech robots that physically remove cancer cells
c.Via genetic analysis...
Automation is predicted to lead to what percentage of unemployment within 25 years?
Automation is predicted to lead to what percentage of unemployment within 25 years?
a.10%
b.20%
c.50%
d.100%
Answer: c.50...
What issues are of concern with regards to intellectual property and ethics?
What issues are of concern with regards to intellectual property and ethics?
a.Piracy
b.Plagiarism
c.State-based theft
d.All of these
Answer: d.All...
What program does the US government use to collect data on all of your communications?
What program does the US government use to collect data on all of your communications?
a.CIA
b.PRISM
c.Dragonheart
d.Linux
Answer: b.PRIS...
According to the lecture slide, what is an approach to applied ethics?
According to the lecture slide, what is an approach to applied ethics?
a.Utilitarianism
b.Interpretive
c.Positivistic
d.All of these
Answer:&nbs...
What is the singularity?
What is the singularity?
a.The theoretical emergence of greater than human superintelligence through technological means
b.Humans merging with machines
c.The...
Why is the revolution in medicine happening now, according to Topol?
Why is the revolution in medicine happening now, according to Topol?
a.Pervasive connectivity
b.Smartphones are everywhere
c.Development of new sensors
d.All...
In the "wireless future of medicine" video, what device did Topol feel would be the central item in the future of medicine?
In the "wireless future of medicine" video, what device did Topol feel would be the central item in the future of medicine?
a.Wireless routers
b.L...
What is the main difference between existing prosthetics for blindness and Nirenberg's (2011) prosthetic eye?
What is the main difference between existing prosthetics for blindness and Nirenberg's (2011) prosthetic eye?
a.Utilizing output cells
b.Transducer
c.Encoder...
Which of the following are negatives to automation and the use of IT in the workplace?
Which of the following are negatives to automation and the use of IT in the workplace?
a.Productivity
b.Changes to the Knowledge economy
c.Changes...
Which of the following situations is ethical?
Which of the following situations is ethical?
a.You violate an End User License Agreement (EULA) in order to make a copy of copyright protected software...
Which of the following are risks of computer usage?
Which of the following are risks of computer usage?
a.3rd party cookies
b.Spyware
c.Fishing
d.All of the above
Answer: d.All of the abov...
Which of the following accounts for the majority of traffic on the Internet?
Which of the following accounts for the majority of traffic on the Internet?
a.Bots
b.Evenly split between humans and bots
c.Spam
d.Humans
Answe...
Apple's Safari browser is an example of
Apple's Safari browser is an example of
a.Server software
b.Client software
c.Downfile software
d.Peer-to-Peer software
Answer: b.Client so...
What type of software is designed to form the infrastructure by which other software runs?
What type of software is designed to form the infrastructure by which other software runs?
a.Malware
b.Shareware
c.System Software
d.Application Software
Answer: c.System...
Who was the first programmer?
Who was the first programmer?
a.Ada Lovelace
b.Grace Hopper
c.Bill Gates
d.Charles Babbage
Answer: a.Ada Lovelac...
The programming language C++ is categorized in which way?
The programming language C++ is categorized in which way?
a.A 4th generation language
b.A data manipulation language
c.An Object Oriented Language
d.A...
When you need to do one or another thing based on a decision, what logical structure might you use?
When you need to do one or another thing based on a decision, what logical structure might you use?
a.Step-by-Step
b.Conditional
c.Looping
d.Itera...
What are the basic logic structures used in programming?
What are the basic logic structures used in programming?
a.SQL, COBOL, Java, and Assembly
b.Tables, arrays, and characters
c.Sequential, conditional,...
What is something you might do during the Implementation Phase?
What is something you might do during the Implementation Phase?
a.Write the program
b.Create the structure chart
c.All of the above
d.Interview end...
What is something you might do during the Design Phase?
What is something you might do during the Design Phase?
a.All of the above
b.Write the program
c.Interview end users
d.Create the structure chart
Answer: d.Create...
What are activities one might do during the analysis phase?
What are activities one might do during the analysis phase?
a.Meet with the systems analyst and users
b.Maintain the system
c.Review the code
d.Test...
Javascript is categorized as what type of language?
Javascript is categorized as what type of language?
a.A server side scripting language
b.A client side scripting language
c.HTML
d.Algorithm
Answer: b.A...
If you need to process data sent through a web page, what should you use?
If you need to process data sent through a web page, what should you use?
a.Client side script
b.Algorithm
c.Server side script
d.HTML
Answer: c.Server...
What does COBOL stand for?
What does COBOL stand for?
a.It doesn't stand for anything; it's just "COBOL"
b.Codefied Boolean Language
c.Coded Object Binary Oliniated Language
d.Common...
Machine Language is considered part of what generation of programming languages?
Machine Language is considered part of what generation of programming languages?
a.1st
b.3rd
c.4th
d.2nd
Answer: a.1s...
When developing a program, what is the correct order of activities?
When developing a program, what is the correct order of activities?
a.Plan > Analyze > Design > Implement > Operation
b.Design > Analyze...
Java is considered part of what generation of programming languages?
Java is considered part of what generation of programming languages?
a.3rd
b.4th
c.2nd
d. 1st
Answer: a.3r...
What is a program?
What is a program?
a.A set of instructions
b.An algorithm
c.All of these
d.An executable file that does something on a computer
Answer: c.All...
Concerning 4th generation languages
Concerning 4th generation languages
a.Both the 2nd and 3rd options
b.The general consensus is that SQL is the 4th generation
c.The instructor feels...
Which of the following is true of Object Oriented Programming?
Which of the following is true of Object Oriented Programming?
a.All of these
b.Objects consist of modules of data AND process
c.Objects can be reused
d.Programmers...
What was the first programming "language" used?
What was the first programming "language" used?
a.Java
b.Assembly
c.COBOL
d.Machine Language
Answer: d.Machine Languag...
In the TCP/IP stack, the web browser Firefox would work at which level
In the TCP/IP stack, the web browser Firefox would work at which level
a.Application
b.Link
c.Internet
d.Transport
Answer: a.Applicatio...
In the TCP/IP stack, an Ethernet cable would work at which level?
In the TCP/IP stack, an Ethernet cable would work at which level?
a.Link
b.Transport
c.Application
d.Internet
Answer: a.Lin...
What does a modem do?
What does a modem do?
a.Modulate analog signals and demodulate digital signals
b.All of these
c.Transform wifi signals to digital signals in the computer
d.Convert...
What is HTML?
What is HTML?
a.All of these
b.A formatting language
c.A procedural programming language
d.A data definition language
Answer: b.A formatting...
When comparing the top Internet retailers with the top Internet sites by traffic
When comparing the top Internet retailers with the top Internet sites by traffic
a.There is a little overlap
b.They completely match up
c.They mostly...
What are examples of Internet services?
What are examples of Internet services?
a.Firefox
b.E-mail
c.Web Server
d.All of these
Answer: b.E-mai...
When considering the WWW and the Internet
When considering the WWW and the Internet
a.The Internet is part of the WWW
b.They are completely different and not related
c.The WWW is part of the...
What does Tim Berners-Lee think about Web 2.0?
What does Tim Berners-Lee think about Web 2.0?
a.He does not think it is a real thing
b.He believes it is a great innovation
c.He directly created...
What was the first actual creation of something that utilized the concept of hypertext?
What was the first actual creation of something that utilized the concept of hypertext?
a.Memex Machine
b.Apple's Hypercard
c.Netscape
d.World Wide...
In the Web, when a client connects to a server, it is typically in what state?
In the Web, when a client connects to a server, it is typically in what state?
a.Connectionless
b.Wireless
c.Connect Orientation
d.Wired
Answer:...
What range does wifi have indoors?
What range does wifi have indoors?
a.1 mile
b.1000 feet
c.100 feet
d.20 feet
Answer: c.100 fee...
What does P2P stand for?
What does P2P stand for?
a.Point to Point
b.Peer to Peer
c.Ping to Ping
d.Protocol to Protocol
Answer: b.Peer to Pee...
One of the earliest writings that referenced the concept of the Web was ____________
One of the earliest writings that referenced the concept of the Web was ____________
a.Our Future Self
b.Information Web
c.Linked Lives
d.The Machine...
How can Web 2.0 be defined?
How can Web 2.0 be defined?
a.Emailing files
b.Using gif files
c.All of these
d.Participatory information sharing
Answer: d.Participatory information...
What is the primary advantage of using Google Docs over standard word processing software, such as Microsoft Office?
What is the primary advantage of using Google Docs over standard word processing software, such as Microsoft Office?
a.All of these
b.Real time collaboration
c.Automatic...
What is the most widely used software client for accessing the World Wide Web?
What is the most widely used software client for accessing the World Wide Web?
a.IE
b.Chrome
c.Firefox
d.Safari
Answer: b.Chrom...
Why does the Internet utilize both TCP and IP?
Why does the Internet utilize both TCP and IP?
a.To maximize speed and maximize errors
b.To minimize speed and maximize errors
c.To minimize speed...
The Internet is considered what type of network?
The Internet is considered what type of network?
a.None of these
b.LAN
c.WAN
d.MAN
Answer: c.WA...
If a network were to occupy several non adjacent cities, what type of network would that be?
If a network were to occupy several non adjacent cities, what type of network would that be?
a.LAN
b.None of the above
c.MAN
d.WAN
Answer: ...
What are some of the benefits of online for profit schools?
What are some of the benefits of online for profit schools?
a.Name recognition and reputation of institutions
b.You don't have to go in to class and...
Who was the person that created the hypertext transfer protocol and the software that utilized client-server technology?
Who was the person that created the hypertext transfer protocol and the software that utilized client-server technology?
a.Bill Gates
b.Tim Berners-Lee
c.Steve...
When was the concept of "hypertexting" first conceptualized in a published article?
When was the concept of "hypertexting" first conceptualized in a published article?
a.1990
b.1995
c.1987
d.1945
Answer: d.194...
What are the benefits of gaming?
What are the benefits of gaming?
a.Ergonomic results of sedentary lifestyle
b.Potential mental health issues
c.All of the above
d.Better judgment times...
How many computers/devices/routers are connected to the Internet today?
How many computers/devices/routers are connected to the Internet today?
a.about 1,000,000
b.more than 1,000,000,000
c.about 1000
d.about 1,000,000,000
Answer: b.more...
The Internet started with how many hosts?
The Internet started with how many hosts?
a.4
b.52
c.0
d.9
Answer: a....
The Internet started with how many hosts?
The Internet started with how many hosts?
a.4
b.52
c.0
d.9
Answer: a....
The amount of computers that an Internet Packet will go through when you send data from your computer to a server is
The amount of computers that an Internet Packet will go through when you send data from your computer to a server is
a.Unknown
b.1
c.2
d.16
Answ...
The 16 bit header checksum in an Internet packet is used to
The 16 bit header checksum in an Internet packet is used to
a.Hold the data in the packet
b.Tell routers where the packet is going
c.Tell routers...
Domain Name Service (DNS) is used to translate what?
Domain Name Service (DNS) is used to translate what?
a.IP address to Domain Name
b.Web page to Domain Name
c.TCP Address to Domain Name
d.File Structure...
What protocol is used for web pages?
What protocol is used for web pages?
a.Hypertext Transfer Protocol
b.None of the above
c.File Transfer Protocol
d.Simple Mail Transfer Protocol
Answer: a.Hypertext...
What type of technology drives the World Wide Web?
What type of technology drives the World Wide Web?
a.Client-Server
b.Centralized Database
c.Peer-to-Peer
d.Hierarchical
Answer: a.Client-S...
Subscribe to:
Posts (Atom)