com sci 3

¡Supera tus tareas y exámenes ahora con Quizwiz!

which of the following is made up of 128 bits

IPv6

star topology is an ___ configuration

LAN

which is the PC version of Unix

Linux

format of email attachments

MIME type

which of the following indicates the format of a file attached to an email message

MIME type

which is the operating system of choice for apple computers

MacOS

transfer an electronic mail

SMTP

choose the correct HTML element to define emphasized text

<em>

choose the correct HTML element for the largest heading

<h1>

what is the correct HTML for inserting an image

<img src+"image.gif">

how can you make a numbered list

<ol>

which of these elements are all <table> elements

<table> <tr> <td>

how can you make a bulleted list

<ul>

which of the following describes a set of high-speed networks on the Internet, sponsored by companies such as AT&T and Verizon

Backbone

what is the original PC operating system called

DOS

the industry standard for LANS

Ethernet

transfer files to and from another computer

FTP

a node that handles communication between its LAN and other networks

Gateway

exchange a World Wide Web documents

HTTP

what does HTML stand for

Hyper Text Markup Langauge

programs that help us solve real world problems

application software

which character is used to indicte an end tag

/

what is the correct HTML for creating a hyperlink

<a href="http://www.messiah.edu">Messiah University </a>

what is the correct HTML for adding a background color

<body bgcolor="yellow">

what is the correct HTML element for inserting a line break

<br>

historically, which is the operating system of choice for serious programmers

UNIX

an internet is an

WAN

what is the microsoft operating system family provided on PC's called

Windows

who is making the web standards

World Wide Web Consortium

which of the following shows the hierarchical organization of the file system

directory tree

word processing file

doc and wp3

CPU scheduling determines which programs are in memory

false

a firewall is a barrier that protects network equipment from physical damage

false

a logical address specifies an actual location in main memory

false

an absolute path and a relative path will always be the same length

false

an operating system is an example of application software

false

batch processing implies a high level of interaction between the user and the program

false

sequential access and direct access take about the same amount of time to retrieve data

false

which of the following is the last part of the file name that gives an indication of what kind of data the file contains?

file extension

which of the following is the term used to describe a machine and software that protects a network from inappropriate access

firewall

which of the following is a CPU scheduling algorithm that allocates processes to the CPU in the order in which they arrive

first-come, first-serve

image file

gif, tiff, jpg

the .gif, .tiff, and .jpg file extensions are generally used for which of the following?

image file

program source file

java, c, and cpp

audio file

mp3, au, and wav

programs that manage computer resources and provide an interface for other programs

operating system

an ___ is a set of rules that defines how data is formatted and processed on a network

protocol

to which state does a process move when the CPU scheduling algorithm determines it may next use the CPU

running

program that manage a computer system and interact with hardware

system software

log into a remote computer system

telnet

A text file stores binary data that is organized into groups of 8 or 16 bits that are interpreted as characters.

true

A timesharing system allows multiple users to interact with a computer at the same time.

true

The type of a file determines which kinds of operations can be performed on it.

true

UNIX file permissions allow a group of users to access a file in various ways.

true

a computer can have more than one operating system, but only one OS is in control at any given time

true

a process in the running state is currently being executed by the CPU

true

a time slice is the amount of time each process is given before being preempted in a round robin scheduler

true

an IPv4 address is stored in 32 bits, and an IPv6 address is stored in 128 bits

true

an operating system is responsible for managing the access to a disk drive

true

an operating system provides a basic user interface that allows the user to use the computer

true

in most operating systems, a directory is represented as a file

true

in the 1960s and 1970s, a human operator would organize similar computer jobs into batches to be run

true

messages sent over some shared communication lines are divided into fixed-size, numbered pieces called packets

true

text data file

txt


Conjuntos de estudio relacionados

Honors Econ Chapter 1 and 2 Practice Test

View Set

7th Grade Science - Atomic Model

View Set

Mental Health Nursing Test 5- Ch 17

View Set

F7 Stockholder's Equity, EPS, Statement of Cashflows Becker 2016

View Set

Bronfenbrenner's Bio-Ecological Model of Development Theory

View Set