Answer:
D. Routing and Switching
Explanation:
The purpose of a network is to connect computers and peripherals using switches and routers. These two let the devices connected to your network communicate with each other as well as talk to other networks.
Routers are used to tie multiple networks together. For example, you would use a router to connect your networked computers to the Internet and thereby share an Internet connection among many users. The router will act as a dispatcher, choosing the best route for your information to travel so that you receive it quickly.
Switches are used to connect multiple devices on the same network within a building or campus. For example, a switch can connect your computers, printers and servers, creating a network of shared resources. The switch would serve as a controller, allowing the various devices to share information and talk to each other. Through information sharing and resource allocation, switches save you money and increase productivity.
A new laptop was delivered to your home and left on the porch while you were at work. It is very cold outside, and you don't know how long it has been there. You unpack the computer and would like to know if it is working properly.
What should you do?
Answer:
Let the computer warm up to room temperature before turning it on.
Explanation:
The laptop has been shipped to the user's home when he were at work and found on the deck. Outside it is really cool and he don't remember how long it has been there. Then, the user open his laptop and want to know whether it is functioning properly. Instead, let the machine warm up while switching it on to room temperature.
When a computer is still in a cold climate, they have to let it heat up to room temperature apx. 6-24 hours before switching it on. Otherwise, its heat the elements generate could cause water moisture within the laptop. That water could then harm elements of the system.
According to the definition of computer science proposed by Norman Gibbs and Allen Tucker, the central concept in computer science is the ____.
Answer:
"Algorithm" is the correct answer to this question.
Explanation:
An algorithm is an incredibly Well-definable way, that fixes the computer problem. In the computer, if there are multiple types of problems so, it will use a single algorithm to solve it. It is known as an optimization method, which is the most effective way over a certain function.
In the programming language, every function is called the algorithm, that executes any task in steps. It is also used as a mathematical method for several applications in computer science.Final answer:
The central concept in computer science as proposed by Norman Gibbs and Allen Tucker is the algorithm, reflecting the importance of problem-solving strategies set by instructions, exemplified by Alan Turing's contributions to the field.
Explanation:
According to the definition of computer science proposed by Norman Gibbs and Allen Tucker, the central concept in computer science is the algorithm. An algorithm is a problem-solving strategy characterized by a specific set of instructions. This is reflective of the legacy of Alan Turing's seminal work, wherein the Universal Turing Machine could perform computations based on a given algorithm. Turing is considered the father of theoretical computer science and artificial intelligence, with the concept of the modern computer deriving from his theories.
Thinking, as a form of computation, parallels the way a computer processes data through software to produce outputs. The IEEE Computer Society's vision reinforces the centrality of advancing the theory and practice of algorithms and computation. Together, these components come to define the pursuit of computer science as a discipline deeply rooted in complex problem-solving and the creation of solutions.
When a program has several modules calling other modules, programmers often use a program ____, which operates similarly to an organizational chart, to show the overall picture of how modules are related to one another.a. hierarchy chartb. tree chart c. flow chartd. data diagram
Answer:
The answer is A. Hierarchy chart
Explanation:
Hierarchy charts or diagrams are aimed at dissolving or disbanding of a system to its minimum possible parts.
The diagram is drawn using lines and rectangles, the rectangles show the different modules that make up a system, while the lines connect them as they operate in a system.
Hierarchy charts are used for business and educational purposes.
Which laptop part is usually replaceable through unlocking it, pulling it out, and then replacing it with a new one?
Battery
Hard drive
RAM
Wireless card
Answer: Hard drive
Explanation:
The structure of the camelCase naming convention is to write the first word of the variable name in lowercase letters and then to capitalize the first character of the second and subsequent words. True False What symbol is used to mark the beginning and end of a string? Question Slash Quotation Comma Asterisk Which of the following is not an example of operating system software? Microsoft Word Windows Vista Linux Mac OS X None of these
Answer:
- True.
- Quotation.
- Microsoft word.
Explanation:
The camel case convention is a mechanism in naming variables in Programming language codes for easy identification and understanding. The first letter of the variable name is written in lower case, while the beginning letter of the next word on the same variable name is in capital letter.
String is a data type in Programming languages that is identified with a single or double quotation mark on the starting and end point of the data.
Microsoft Word is a word processing application package and not an operating system.
Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?
A. Trusted Platform Module (TPM)
B. Self-encrypting hard disk drives (HDDs)
C. Encrypted hardware-based USB devices
D. Hardware Security Module (HSM)
Answer:
Hardware security module.
Explanation:
Hardware security module is a Physical digital device that comes as a plug-in adapter used to secure and manage digital keys and provides crypto processing for strong authentication.
It has an onboard cryptographic keyboard and one or more crypto processors, and can be used on computers and network servers to prevent logical or physical authentication access to unauthorized users. It supports symmetric and asymmetric cryptography.
Which is true about POP3 and IMAP for incoming email?
Both keep email on an email server by default
IMAP keeps email on an email server by default
Neither keep email on an email server by default
POP3 keeps email on an email server by default.
Answer:
IMAP keeps email on an email server by default
Explanation:
IMAP and POP3 both are email receiving protocols. These protocols used to access the emails from the email server to client inbox.
In POP3 (Post Office Protocol 3) emails are received in the user inbox. This protocol removes the emails from email servers and keep in user inbox.
While in IMAP (Internet Message Access Protocol) the message is directly access form the email server, it will not stored on the local user device.
So, the IMAP is the only protocol in which email are kept saved on email serve by default.
The field of ____ gives us information about how the four developmental forces interact with each other.
Answer:
Neuroscience
Explanation:
Neuroscience is a multidisciplinary science that is concerned with the study of the structure and function of the nervous system. It encompasses the evolution, development, cellular and molecular biology, physiology, anatomy and pharmacology of the nervous system, as well as computational, behavioural and cognitive neuroscience.
Neuroscientists focus on the brain and its impact on behaviour and cognitive functions, or how people think. They also investigate what happens to the nervous system when people have neurological, psychiatric, and neurodevelopmental disorders.
Eric has asked you to help him build a new gaming computer so that he can play the newest games available. He also wants the computer to be VR-compatible. He has already purchased a high definition sound card, a new multi-core processor, an SSD hard drive, and 16GB of RAM. What is missing from Eric’s game design build?a. Video card
b. Joystick port
c. New monitor
d. Wireless network card
Answer:
A. Video Card
Explanation:
Assuming that he has purchased everything as such. A video card or graphics card is the key thing he's missing to play any games and being VR-compatible. B and D are not really necessary to gaming and although having an C is kind of needed. Playing on an old monitor is fine as well, just as long as it has an HDMI or DP input. All that's left is the video card.
_____ refers to applications installed on a personal computer, typically to support tasks performed by a single user.
Answer:
"Desktop software" is the correct answer for the above question.
Explanation:
Desktop software is software, which works on the computer to perform some tasks for the user of the computer. It performs the task of the user and the application. It is used to connect the application to the user by which the user can use any application of the computer system.The question wants to ask about the software which is used in the computer to connect the user and applications. So the answer is "Desktop computers" which is described above.Another method that might be desired is one that updates the Student’s number of credit hours. This method will receive a number of credit hours and add these to the Student’s current hours. Which of the following methods would accomplish this?
a) public int updateHours( )
{
return hours;
}
b) public void updateHours( )
{
hours++;
}
c) public updateHours(int moreHours)
{
hours += moreHours;
}
d) public void updateHours(int moreHours)
{
hours += moreHours;
}
e) public int updateHours(int moreHours)
{
return hours + moreHours;
}
The Coin class, as defined in Chapter 4, consists of a constructor, and methods flip, isHeads and toString. The method isHeads returns true if the last flip was a Heads, and false if the last flip was a Tails. The toString method returns a String equal to "Heads" or "Tails" depending on the result of the last flip. Using this information, answer questions 4-5.
4) A set of code has already instantiated c to be a Coin and has input a String guess, from the user asking whether the user guesses that a coin flip will result in "Heads" or "Tails". Which of the following sets of code will perform the coin flip and see if the user’s guess was right or wrong?
a) c.flip( );
if(c.isHeads( ).equals(guess)) System.out.println("User is correct");
b) if(c.flip( ).equals(guess)) System.out.println("User is correct");
c) if(c.isHeads( ).equals(guess)) System.out.println("User is correct");
d) c.flip( );
if(c.toString( ).equals(guess)) System.out.println("User is correct");
e) c.flip( ).toString( );
if(c.equals(guess)) System.out.println("User is correct");
5) What does the following code compute?
int num = 0;
for(int j = 0; j < 1000; j++)
{
c.flip( );
if(c.isHeads()) num++;
}
double value = (double) num / 1000;
a) the number of Heads flipped out of 1000 flips
b) the number of Heads flipped in a row out of 1000 flips
c) the percentage of heads flipped out of 1000 flips
d) the percentage of times neither Heads nor Tails were flipped out of 1000 flips
e) nothing at all
Part 1:
Option d) is correct one.
public void updateHours(int moreHours)
{
hours += moreHours;
}
Explanation:
The variable more hours will be given as argument to the function that will add the previous counted hours to the new ones. So the function updateHours will return total number of credit hours as required.
Part 2:
Option d) is the correct one.
c.flip( );
if(c.toString( ).equals(guess)) System.out.println("User is correct");
Explanation:
If the result of c.flip() gets equal to the guess the string "User is correct" will be printed on the screen to lag that the user is right otherwise the user will be wrong.
Part 3:
Option c) is the correct one.
the percentage of heads flipped out of 1000 flips
Explanation:
As we can see through the code that the total number of heads is divided by the number 1000 that is the total o all flips so it will give the percentage of the heads flipped out of 1000 lips.
I hope it will help you!A computer record is used to store all the information about one transaction, but several such records must be used to store the information about one employee, one inventory part, and so forth, on a master filea.trueb.false
Answer:
True
Explanation:
A single file can be used to record/ store all the information regarding a transaction because in a transaction there are less complexities. a simple transaction involves an exchange/communication between a buyer and a seller which involves exchange in finances between the buyer and the seller.
An employee can be involved in several activities like work activities and multiple transactions while a single inventory part record is different from an employee's record and any other form of transaction. hence separate files have to be created for each of these activities.
To have an easy access to this information when needed a master file is created to store all the individual files.
A general-use dimmer switch is required to be counted as ? where installed in a single-gang box on a circuit wired with 12 awg copper conductors.
Answer:
2 conductors.
Explanation:
A dimmer switch is an electrical switching or control device used to control the power or voltage to a compatible dimmer bulb.
It reduces the ambience if light bulbs by uniformly increasing the resistance of the switch when the knob is rotated to a lesser point. It is a circuit breaker as two conductors are connected to its terminals and a variable voltage resistor determines the flow of current between them.
Final answer:
A general-use dimmer switch is counted as a single device in a single-gang box wired with 12 AWG copper conductors, acting by increasing total resistance in the circuit.
Explanation:
A general-use dimmer switch should be counted as a single device when installed in a single-gang box on a circuit wired with 12 AWG copper conductors. The dimmer switch alters the flow of electric current to the lighting fixture, which in turn adjusts the intensity of the light the fixture produces.
When incorporating a dimmer switch, it's important to consider the total resistance in the circuit, as adding a dimmer generally increases the resistance and thus affects the circuit's overall performance.
A program that processes data submitted by the user. Allows a Web server to pass control to a software application, based on user request. The application receives and organizes data, then returns it in a consistent format.
Answer:
The correct answer to the following question will be "Common Gateway Interface (CGI)".
Explanation:
An architecture specification for web applications to implement programs that execute on a computer operated like console applications and dynamically create web pages. Similar applications are referred to as CGI files, or generally, as CGIs, termed as CGI (Common Gateway Interface).Such applications are used to automatically create pages or execute several other functions when somebody is filling out an HTML document and pressing the submit or send button.Therefore, CGI is the right answer.
_____ is concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IS-related products, including all types of computers, printers, and printer materials such as cartridges and toner.
Answer:
Green computing
Explanation:
A software (organized code pieces) uses time and memory to do its computing job, hence consumes electricity . Also during the manufacturing or the operation of an hardware component physical resources can be consumed. The idea that promotes the efficient use of resources in Information Systems (IS) industry is called Green Computing.
The cell with the largest value contains a data marker that extends across the entire width of the cell, and the lengths of the other bars in the selected range are determined relative to that bar.True / False.
Answer:
The answer is "False".
Explanation:
The Information Marker is also called a data marker. It is a circle, line, pie layer or any map that marks a lot of information like any item on a diagram and shows a single value of the data based on a workbook cell.
It is a part of the spreadsheets, it marks the visualization of ideas in a variety of molecules is very easy. It's also known as a larger bar, that more valuable and runs the following actions to contribute to data bars.When the continue statement is encountered in a loop, all the statements in the body of the loop that appear after it are ignored, and the loop prepares for the next iteration.
Answer:
True
Explanation:
While looping through, there can be times that you do not want your code to do anything in some situations. Let's say you loop through an array consists of four numbers (1, 2, 3, and 4). You want to print all the values except 2. Check the code written in Java below.
int [] numbers = {1, 2, 3, 4};
for(int number : numbers) {
if(number == 2) {
continue;
}
System.out.println(number);
}
Concerning Structured Cabling, select the statement that is true, or select, "All statements are false."
vertical cross connects connect work stations to the closest data closet
a patch cable is relatively short, from 20 feet to 90 feet
the dmarc is located at the local telecommunications carrier's office
the MDF(main distribution frame) is the centralized point of interconnection for an organization's LAN.
the IDF (intermediate distribution frame) is a junction point between the MDF and the entrance facility.
All statements are false.
Answer:
1) TRUE
2) FALSE
3) FALSE
4) TRUE
5) TRUE
Explanation:
1) vertical cross connects connect work stations to the closest data closet TRUE
2) a patch cable is relatively short, from 20 feet to 90 feet
FALSE
3) the dmarc is located at the local telecommunications carrier's office
FALSE
4) the MDF(main distribution frame) is the centralized point of interconnection for an organization's LAN.
TRUE
5 )the IDF (intermediate distribution frame) is a junction point between the MDF and the entrance facility.
TRUE
To prevent deliberate contamination of food, a manager should know who is in the facility, monitor the security of products, keep information related to food security on file, and know....
A. When to register with the EPA
B. How to fill out an incident report
C. Where to find find MSDS in the operation
D. Who to contact about suspicious activity
Answer:
Option D is the correct option.
Explanation:
In the above scenario, the manager wants to stop happening of contamination of the food that's why he wanted to know that who is the person that is responsible for the security of the following products. He also wants to know to whom he will inform for the food security and to whom he will communicate for that suspicious activity.
To prevent deliberate contamination of food, a manager should know who is in the facility, monitor the security of products, keep information related to food security on file, and know who to contact about suspicious activity. Therefore, the correct answer is option D.
In the above scenario, the manager wants to stop happening of contamination of the food that's why he wanted to know that who is the person that is responsible for the security of the following products. He also wants to know to whom he will inform for the food security and to whom he will communicate for that suspicious activity.
Therefore, the correct answer is option D.
Learn more about the contamination of food here:
https://brainly.com/question/28272665.
#SPJ6
To make sound decisions about information security, management must be informed about the various threats facing the organization, its people, applications, data, and information systems.A. TrueB. False
Answer:
The answer is A. True
Explanation:
It is the responsibility of management to be aware of the current and potential threats that the organization is facing or prone to face in the nearest future. The threats could be focused on data integrity, valuable information, applications, or human personnel.
Hence, to make adequate decisions on information security, the management must take an assessment of the current situation of the organization and make plans towards securing the organization.
Say that you want to paste a formula result — but not the underlying formula — to another cell. You would copy the cell with the formula, then place the insertion point in the cell you want to copy to. What next?
Answer:
The next thing to do is to
Click the down arrow under the Paste icon on your home tabThen click the values option.Explanation:
To paste a just the formula result and not the formula itself. You can follow the following steps:
Select and copy the cell (formula inclusive)Select the cell you want to paste the copied informationClick the down arrow under the Paste icon on your home tabThen click the values option.What is an umbrella of software programs that may include CAD/CAM, product routing, maintenance, and other product concerns?
Answer:
Product lifecycle management software
Explanation:
Characteristics.
Complete set of tools to establish decision criteria regarding the portfolio and simulations for product planning.It allows the standardization and automation of the processes of request of alterations in the product, controlling the decisions, deadlines and ensuring traceability.Improves efficiency in product design.Example SoftExpert PLM is an accessible, easy-to-use and completely web solution for managing the life cycle of products.With so much information and moving parts within a company, technology has made it possible for employers to monitor many aspects of employee jobs and duties. What is a system that can track employee's activities by measures as keystrokes, error rate, and number of transaction processed?A. Anti-spam systemB. Information intelligence systemC. Workplace MIS monitoringD. Company technology monitoring
Answer:
Workplace MIS Monitoring
Explanation:
The effective monitoring of employees within a company or organization has now become dynamic, thanks to improvements in Information Technology (IT). In previous time, monitoring employees was possible by the physical presence of a supervisor, who would from time to time go round to see that the employees are carrying out their respective duties, however, workplace monitoring is done in the following ways:
Mobile devices and Telephones: Activities carried out on mobile devices provided to the employees and telephones can be monitored by the employer. Conversations carried out are recorded for further analysis and to ensure that the employee only makes necessary calls.Computer: Similar to mobile devices and telephones, the employee's computer can be monitored through the help of software installed. The software can grant the employee rights to see activities carried out on the computer, such as memory usage, storage space, and even keyboard activities.Email: In cases when the email tool is provided by the employers, the email of the employees can be monitored accordingly.Geolocation: Harnessing the power of the GPS (Global Positioning System) technology, the location of the employees can be ascertained and monitored accordingly to ensure efficiency and productivity.Video: This is most common as employees install CCTV (Closed-Circuit Television) to record the activities that go on in the workplace to ensure productivity.Claire is trying to listen to her history professor's lecture, but her mind keeps wandering to thoughts about her plans for the upcoming weekend. She is likely experiencing ____ noise
A) Internal
B) External
C) Expressional
D) Insistent
Answer:
internal
Explanation:
its is a type of distraction causing her not to pay attention to her surroundings
What is the advantage of using plenum cable for twisted-pair cable?
Faster speeds
Fewer signal interruptions
Fire-resistant
Longer distances
The advantage of using plenum cable for twisted- pair cable is it is "Fire resistant"
Explanation:
Plenum cable is a cable that is used in plenum spaces of buildings. These cables have fire resistance characteristic with low smoke. These cables are self extinguishing, and never re-ignite. They require less space for installation and allows space for air circulation to be used by the HVAC system. Twisted-pair, coaxial, HDMI and DVI variants of cable are manufactured in the plenum version. Plenum cable is mandatory to be fixed in any "air handling" area.
Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log out of the switch and log back in at the console. Which command defines the password that you had to enter to access privileged mode?
Answer:
Enable secret.
Explanation:
When both commands are enabled IOS will only accept that password which configured in the hidden command allow.
So, when the user has configured the allow hidden code from the terminal, accompanied by the allow password code. Then, enable secret command describes the password you must have entered to reach privileged mode
When considering the purchase of a major software application, managers need to also consider the following potential downside:
A) It is typically more expensive than custom development.
B) The package seldom totally fits the company's needs.
C) It takes much longer to implement because of the software's complexity.
D) There is no documentation.
Answer:
The answer is B.The package seldom totally fits the company's needs
Explanation:
Lin is booting up his computer, and during the boot process, the computer powers down. After several unsuccessful attempts to boot his computer, he decides that he needs to start the troubleshooting process. Lin thinks that the problem could be in the power supply, so he uses a power supply tester. The test shows that the power supply is functioning properly.
What should Lin check next in the troubleshooting process?
a.
Processor
b.
Motherboard
c.
RAM
d.
Hard drive
Answer:
A. Processor.
Explanation:
When a computer system works working or does not boot, it is mostly ask a result of power supply failure.
The system does not come on, that is, the fan and screen does not come up and the caps lock indicator is not blinking. The power supply shows that the power is good.
When the processor is not sitting properly and when the motherboard has failed, the signs mentioned above are observed.
Not to escalate the problem, test for the processor status as a probable cause with another functional and compatible processor before the motherboard.
Final answer:
After testing the power supply, the next step is to inspect the motherboard and then possibly the processor, as they are critical to the computer's boot process, and issues with them can lead to power-down scenarios during boot.
Explanation:
Since Lin has already tested the power supply and confirmed it is functional, the next step in the troubleshooting process would be to check the components most essential for the computer's boot process. An abrupt power down during boot can be caused by a variety of hardware issues. The logical step following the power supply would typically be to check the motherboard as it is a central hub connecting all other components. Issues with the motherboard can prevent the computer from completing the boot process. If the motherboard has diagnostic LEDs or beep codes, Lin should check those to identify any potential issues. It's also possible that the processor (CPU) is overheating or failing, which could cause the system to shut down to prevent damage. However, problems with the RAM or hard drive usually don't lead to abrupt power loss; they generally result in error messages or system instability rather than power issues.
Embedded style sheets are created by web page authors and consist of styles that are inserted directly within the body element of a Hypertext Markup Language (HTML) document.A. True
B. False
Answer:
B. False
Explanation:
There are three ways of styling a web-page namely:-
Inline Style Sheets
Internal/Embedded Style Sheets
External Style Sheets.
In Inline Style sheet, the style sheet information is applied directly to a an HTML document.
e.g <p style="color: red"> This is an inline styling </p>
In Internal style sheet, the style sheet information is embedded within <style></style> tags in the head of your document
e.g
<style>
p {
font-family: arial, serif;
font-size: 50%;
}
hr {
color: blue;
height: 1px;
}
</style>
In External style sheet, the style sheet information is written in a file where you can declare all the styles that you want to use on your website. You then link to the external style sheet using <link rel="stylesheet" href="styles.css">
e.g
1. Create a style sheet
body {
background-color: darkslategrey;
color: azure;
font-size: 1.1em;
}
h1 {
color: coral;
}
#intro {
font-size: 1.3em;
}
.colorful {
color: orange;
}
2. Link style sheet
<!DOCTYPE html>
<html>
<head>
<title>My Example</title>
<link rel="stylesheet" href="styles.css">
</head>
<body>
<h1>Hello World</h1>
</body>
</html>
For Windows 9x and Windows NT operating systems, which authentication protocol should be used that protects the authentication process through the use of a secure channel for logon purposes?
Answer:
"NTLMv2" is the correct answer to this question.
Explanation:
The NTLMv2 authentication is a login information-based user protection method. The NT(new technology) version 4.0 in window servers with SP4 was designed to replace NTLMv1 with an increase in cryptography.
It offers a mechanism for authentication, that supports the verification process by using a cryptographic signature for logon, that's why NTLMv2 authentication is the correct answer.