CIS 265 FINAL
Which of the following is considered an intellectual property? Answers: a. A patent b. An auction c. A plagiarized content d. An ethic
a. A patent
Which of the following is a disadvantage of cloud software? Answers: a. Cloud software and data cannot be accessed without Internet connection b. Cloud software cannot be delivered on demand to a user in a location other than where it was installed. c. Edits stored locally on a computer when a user is offline cannot be synchronized with the documents stored on the cloud servers when online. d. Documents created using cloud software are stored online but cannot be accessed via any Internet-enabled device.
a. Cloud software and data cannot be accessed without Internet connection
Identify a true statement about RAM (random access memory). Answers: a. Data in RAM is erased when the computer is shut off. b. Having less RAM allows more applications to run at one time in a computer. c. It is also known as ROM (Read Only Memory). d. It is nonvolatile.
a. Data in RAM is erased when the computer is shut off.
_____ refers to the act of breaking into a computer or network. Answers: a. Hacking b. Authentication c. Encrypting d. Authorization
a. Hacking
Jenny, a new accountant at Sroha Networks, wants to transfer official data from a colleague's hard drive to her laptop. She wants to exchange the data directly between the two systems via the Internet. Which of the following types of networks should Jenny use to perform the data transfer without asking the colleague to place the data on a Web server for her to view? a. Internet peer-to-peer computing b. Internet n-tier computing c. Internet cloud-based computing d. Internet client-server computing
a. Internet peer-to-peer computing
Tom is an HR manager at Yellowwood LLC, which provides financial services. The company wants him to hire a financial advisor who can provide guidance on taxes, stakes, and insurance decisions. Tom should use _____ to find the most suitable candidate for the role. Answers: a. LinkedIn b. Instagram c. Pinterest d. Twitter
a. LinkedIn
Mike creates a graph on his computer using a spreadsheet application. He uses the mouse as the peripheral device with the computer. Which of the following serves as an intermediary between application programs and the computer's hardware that allows Mike to complete his work? Answers: a. Operating system b. Hard drive c. Input device d. Buffer
a. Operating system
Jerry sets up a small network consisting of his portable computer, mobile phone, and digital camera. Jerry designs the network such that these devices can communicate and share data whenever they get within a certain physical distance of each other. Which of the following networks has Jerry used in the given scenario? answers: a. Personal area network (PAN) b. Wide area network (WAN) c. Local area network (LAN) d. Metropolitan area network (MAN)
a. Personal area network (PAN)
_____ steal credit card or debit card numbers by attaching an illegal device to a credit card reader or an ATM that reads and stores the card numbers. Answers: a. Skimmers b. Pharmers c. Feeders d. Smishers
a. Skimmers
Which of the following refers to the versatile bus architecture widely used for connecting peripheral devices? Answers: a. Universal Serial Bus b. Register Bus c. Random Access Memory Bus d. Cache Memory Bus
a. Universal Serial Bus
Case 5-1 Luke is frustrated as he is often criticized by his employer for not meeting deadlines. He decides to take revenge on his employer for criticizing him in front of all his peers. Luke asks his friends in the organization to flood the network server by sending it unsolicited requests. He does this to avoid being suspected by his employer. This act of sabotage is called _____. Answers: a. a distributed denial of service attack b. data piggybacking c. a brick encryption attack d. war driving
a. a distributed denial of service attack
Brianna has developed a new device to be used by people with physical disabilities. Brianna's device can be classified as _____. Answers: a. assistive hardware b. networking hardware c. cloud hardware d. flash-drive hardware
a. assistive hardware
Daniel edits an image on his computer using a painting tool. He works on it by coloring the individual pixels in the image. The type of image created by Daniel is a(n) _____. Answers: a. bitmap image b. radial image c. analog image d. vector image
a. bitmap image
The operating system is loaded into memory during the _____. Answers: a. boot process b. eviction process c. sole process d. swap process
a. boot process
Remote storage services accessed via the Internet are often referred to as _____. Answers: a. cloud storage b. flash storage c. slot storage d. optical storage
a. cloud storage
The part of a CPU core that translates instructions into a form that can be processed by the arithmetic/logic unit (ALU) and floating point unit (FPU) is called the _____. Answers: a. decode unit b. expansion bus c. Universal Serial Bus d. prefetch unit
a. decode unit
Secure Wi-Fi networks and VPNs use _____ to secure data transferred over a network. Answers: a. encryption b. wireframes c. hotspots d. viewports
a. encryption
Sara, the chief finance officer of a consulting firm, wants data to be automatically encrypted when stored on her hard drive. To accomplish this, she must use _____. Answers: a. full disk encryption b. uninterruptible encryption c. redundant array encryption d. default encryption
a. full disk encryption
The progression of input, processing, output, and storage is known as the _____. Answers: a. information processing cycle b. secure storage cycle c. output transmission cycle d. input transfer cycle
a. information processing cycle
On a computer with two or more CPUs, _____ is a technique in which each processor or core works on a different job. Answers: a. multiprocessing b. looped hosting c. file hosting d. parallel processing
a. multiprocessing
Encyclopedias, dictionaries, and atlases are examples of _____. Answers: a. reference software b. educational software c. library software d. infotainment software
a. reference software
Case 1-1 Casey is learning about the types of servers and more powerful computers available. She has asked her friend Burt, an expert on computers and its uses, to quiz her. Burt describes an incredibly expensive computer designed to focus all of its computing power on one specific task at a time that can handle applications requiring speed, accuracy, and processing capabilities. Casey identifies the type of computer to be a(n) _____. Answers: a. supercomputer b. enterprise-class computer c. mainframe computer d. wireframe computer
a. supercomputer
A user has to provide a valid password to gain access to a vault in a bank. In addition to this, the vault opens only when the user's fingerprint matches the fingerprint data stored in the database or when a valid smartcard is swiped. The authentication method used here is _____. Answers: a. two-factor authentication b. private-key authentication c. zip-level authentication d. hard-drill authentication
a. two-factor authentication
Case 5-1 The world of the Internet can be overwhelming. It takes time to understand the community and its players. For each of the following questions, look at the organizations, businesses, or individuals listed, and then determine what they represent as a whole. AT&T and Comcast are examples of _____. Answers: a. online shopping sites b. Internet service providers c. search engines d. instant messaging apps
b. Internet service providers
Which of the following was introduced by the U.S. Environmental Protection Agency (EPA) as a voluntary labeling program designed to identify and promote power-efficient products in an effort to reduce greenhouse gas emissions? Answers: a. Power Commando b. ENERGY STAR c. VOLUNTEER PLANT d. Gas Quantum Vessel
b. ENERGY STAR
Identify a true statement about an intellectual property. Answers: a. It uses the TM symbol for unregistered service marks. b. It includes original creative work such as movies and music. c. It withdraws the protection rights for a work after its creator's death. d. It provides copyrights only for published works.
b. It includes original creative work such as movies and music.
Which of the following statements is true of the global positioning system (GPS)? Answers: a. It is used to avail work from home facilities. b. It is used in determining exact geographic locations. c. It uses satellite technology to schedule meetings with clients. d. It provides medical information and services worldwide.
b. It is used in determining exact geographic locations.
_____ is the use of an email message that appears to come from a legitimate organization, such as PayPal or a bank, but is actually sent from a person to trick the recipient into revealing sensitive personal information, such as Web site logon information or credit card numbers. Answers: a. Vishing b. Phishing c. Smishing d. Pharming
b. Phishing
Case 3-2 Application software (apps) includes all the programs that allow you to perform specific tasks or applications on a computer. Individuals and businesses use software to write letters, keep track of finances, participate in videoconferences, watch videos, make business presentations, process orders, access Web-based resources, and many other tasks. In the following questions, identify the tasks of different application software. Michelle wants an application program that can use formulas to perform calculations and organize numbers and values into rows and columns. Identify the application program that Michelle should choose. Answers: a. Note taking software b. Spreadsheet program c. Word processing program d. Presentation software
b. Spreadsheet program
Leslie, a computer hacker, creates a game using malware code for desktop computers. Once users download the game, the malware infects their devices without their knowledge. The type of malware Leslie has programmed into the game is a _____. Answers: a. firewall b. Trojan horse c. War horse d. proxy
b. Trojan horse
Mac OS X is based on the _____. Answers: a. FORTRAN operating system b. UNIX operating system c. Disk operating system d. LiMaX operating system
b. UNIX operating system
Which of the following statements is true of Wi-Fi (802.11)? Selected Answer: a. The speed of a Wi-Fi network is independent of the Wi-Fi standard being used. b. Wi-Fi is designed for medium-range data transfers—typically between 100 and 300 feet indoors and 300 to 900 feet outdoors. c. The speed of a Wi-Fi network is independent of the number of solid objects between the access point and the computer or other device being used. d. Wi-Fi is designed for low-range data transfers—typically between 10 and 30 feet indoors and 30 to 90 feet outdoors.
b. Wi-Fi is designed for medium-range data transfers—typically between 100 and 300 feet indoors and 300 to 900 feet outdoors. Answers:
All data processed by a computer must be in _____. Answers: a. duodecimal form b. binary form c. unitary form d. hexadecimal form
b. binary form
The biggest advantage of Voice over Internet Protocol (VoIP) is _____. Answers: a. high-quality streaming of movies and television shows b. cost savings c. voice clarity d. 0% downtime
b. cost savings
Most networking media send data using _____ in which data is represented by only two discrete states: 0s and 1s. Answers: a. ramp signals b. digital signals c. exponential signals d. contiguous signals
b. digital signals
Schools or businesses that need to install software on a large number of computers can usually obtain a _____ for the number of users needed. Answers: a. computer license b. network license c. business license d. school license
b. network license
Case 3-2 Application software (apps) includes all the programs that allow you to perform specific tasks or applications on a computer. Individuals and businesses use software to write letters, keep track of finances, participate in videoconferences, watch videos, make business presentations, process orders, access Web-based resources, and many other tasks. In the following questions, identify the tasks of different application software. Patrick needs a specialized program to track his personal expenses, manage stock portfolios, and prepare income taxes. For this purpose, Patrick should purchase _____. Answers: a. accounting software b. personal finance software c. database software d. vector software
b. personal finance software
A(n) _____ is high-speed memory built into the CPU that temporarily stores data during processing. Answers: a. bus b. register c. expansion card d. interface card
b. register
Case 4-3 Akira is a freelance content writer and uses the Internet to research about the topics that she works on. She needs constant high-speed Internet connectivity to upload and download necessary information. If Akira needs to connect the Internet to a local area network (LAN), she should use a(n) _____, which passes data on to the intended recipient only and plans a path through the network to ensure that the data reaches its destination in the most efficient manner possible. Answers: a. antenna b. router c. hub d. repeater
b. router
File management programs can also be used to _____. Answers: a. recover deleted files from the recycle bin b. search for stored files that meet specified criteria c. monitor a file on a computer and block suspicious activity d. duplicate a file so it can be restored at a later date
b. search for stored files that meet specified criteria
A computer network is a collection of _____. a. programs that perform tasks that users are directly interested in, which includes operating systems and any program that supports application software b. systems and other hardware devices that are connected so users can share hardware, software, and data as well as communicate with each other electronically c. documents called Web pages available through the Internet d. related fields in a data organization that can be stored, sorted, and queried
b. systems and other hardware devices that are connected so users can share hardware, software, and data as well as communicate with each other electronically
The main disadvantage of fiber-optic cabling is _____. a. the use of metallic fiber strands instead of glass or plastic fiber strands b. the initial expense of both the cable and the installation c. its susceptibility to interference d. its slow speed when used to connect networks housed in separate buildings
b. the initial expense of both the cable and the installation
Systems software consists of _____. Answers: a. interface programs that allow users to interact with electronic devices b. the operating system and utility programs that control a computer c. only those programs that operate enterprise-class servers d. productivity programs such as Microsoft Office
b. the operating system and utility programs that control a computer
The amount of data that is actually transferred under real-life conditions is called _____. Answers: a. latency b. throughput c. jitter d. interplay data
b. throughput
Ted is a programmer. He uses a desktop to code applications. The means by which Ted interacts with any program on a computer is called the _____. Answers: a. domain server b. user interface c. plug-in d. bootstrap
b. user interface
A _____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media to which it has access. Answers: a. proxy b. virus c. digital signature d. firewall
b. virus
The part of a computer that runs programs is called __________. secondary storage a.RAM b.the CPU c.main memory
b.the CPU
Roger, a budding author, completes a manuscript and sends it to various publishers. He copyrights his work so that it will not be copied by others. For how long will the copyright cover Roger's work? Answers: a. 75 years b. 80 years c. 70 years d. 85 years
c. 70 years
Which of the following is an example of hardware? Answers: a. A content management system b. A device driver c. A mouse d. A web desktop
c. A mouse
Which of the following is a difference between bitmap images and vector images? Answers: a. Bitmap images use mathematical formulas to represent image content, whereas vector images are created by coloring pixels. b. Bitmap images are programmed in terms of numbers, whereas vector images are programmed in terms of characters. c. Bitmap images cannot be enlarged and still maintain their quality, whereas vector images can be resized and otherwise manipulated without loss of quality. d. Bitmap images are usually named with the extension .XLSX, whereas vector images are named with the extension .VNP.
c. Bitmap images cannot be enlarged and still maintain their quality, whereas vector images can be resized and otherwise manipulated without loss of quality.
_____ is a special group of very fast memory circuitry, usually built into the CPU, that is used to speed up processing. Answers: a. Flash memory b. Read-only memory c. Cache memory d. Virtual memory
c. Cache memory
Which of the following refers to a measurement of the number of instructions that a CPU can process per second? Answers: a. Hard disk space b. RAM capacity c. Clock speed d. Run time
c. Clock speed
Case 3-2 Application software (apps) includes all the programs that allow you to perform specific tasks or applications on a computer. Individuals and businesses use software to write letters, keep track of finances, participate in videoconferences, watch videos, make business presentations, process orders, access Web-based resources, and many other tasks. In the following questions, identify the tasks of different application software. Drake is an entrepreneur and his business has a growing client base as well as a growing inventory. He needs to keep track of a good deal of information and be able to search for information quickly. Which of the following software should Drake use? Answers: a. Note taking software b. Mastersheet software c. Database software d. Presentation software
c. Database software
_____ bits grouped together are collectively referred to as a byte. Answers: a. Six b. Twelve c. Eight d. Nine
c. Eight
_____ is a way of temporarily converting data into an unreadable form in order to protect that data from being viewed by unauthorized individuals. Answers: a. Decryption b. Authorization c. Encryption d. Authentication
c. Encryption
Steve, a senior architect, has to design a work environment for the people who work in the office, including properly adjusting furniture and hardware. Which of the following should Steve make use of to set up a safe and effective workspace? Answers: a. Macronomics b. Geonomics c. Ergonomics d. Hydrodynamics
c. Ergonomics
Case 4-2 Arnold takes his networking trainer Ron's help to learn about the array of new communications technologies that are being used today. Ron provides various instances and examples that can help Arnold identify different communication protocols and standards. Ron tells Arnold that many mobile WiMAX services have moved to cellular standards such as _____, which is the primary standard for 4G networks today. Answers: a. Universal Mobile Telecommunications System (UMTS) b. High Speed Downlink Packet Access (HSDPA) c. Long Term Evolution (LTE) d. Evolution Data Optimized (EV-DO)
c. Long Term Evolution (LTE)
Laura, a network administrator, is in charge of setting up various networks for the IT department of a University. For a final year project, the students of the university seek Laura's help to set up a network with multiple connections between network devices. The students need to ensure that even if one device on the network fails or if the line of connection fails, the network should function, assuming an alternate path is available. Which of the following network topologies should Laura suggest in the given scenario? Answers: a. Star network b. Bus network c. Mesh network d. Counter area network
c. Mesh network
_____ is a scam that redirects traffic intended for a commonly used Web site to a bogus Web site set up by a person to obtain users' personal information. Answers: a. Smishing b. Vishing c. Pharming d. Phishing
c. Pharming
Lee is a technical support executive in a product-based software company. On a day when Lee is working from home, he gets a call from a customer about an issue with an application. Lee takes the concerned system's IP address, username, and password and asks the customer to stay connected to the Internet. Which of the following software will help Lee to link to the customer's computer to solve the issue? Answers: a. Note taking software b. Desktop publishing software c. Remote access software d. Project management software
c. Remote access software
_____ runs a computer and allows people to use the computer to perform specific tasks, such as creating letters, preparing budgets, managing inventory and customer databases. Answers: a. Network interface card b. Hardware c. Software d. Expansion card
c. Software
Case 4-1 Michael, the owner of a new retail store, sets up a business network to communicate with fellow retailers and to attract customers. Michael plans to indulge in various networking applications that can be used in his business. Which of the following networking technologies can he use to conduct meetings with retailers in other parts of the world? Answers: a. Host signaling b. Telemarketing c. Videoconferencing d. Peer-to-peer (P2P) networking
c. Videoconferencing
Bluewood Hospital uses a connection that allows its patients and visitors to connect their devices wirelessly to the Internet. Here, Bluewood Hospital has created a _____. Answers: a. sensor network b. dial-up domain c. Wi-Fi hotspot d. linkup area
c. Wi-Fi hotspot
A _____ is an input device that reads an individual's fingerprint or voice. Answers: a. barcode reader b. card reader c. biometric reader d. RFID reader
c. biometric reader
A sender's private key is used to acknowledge a document, and that key, along with the contents of the document, generates a unique _____. Answers: a. digital quotient b. data report c. digital signature d. business report
c. digital signature
A _____ creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access. Answers: a. worm b. botnet c. firewall d. Trojan horse
c. firewall
A computer cannot function without a(n) _____. Answers: a. optical drive b. pointing device c. operating system d. application suite
c. operating system
Case 5-2 Doug, a computer enthusiast, uses computers to perform some notorious tasks. Doug sends email messages, which look legitimate, to his friends and obtains confidential information—such as credit card details, security numbers, and so on—from them. This is an example of _____. Answers: a. war driving b. piggybacking c. phishing d. social media hacking
c. phishing
A _____ is the smallest colorable area in an electronic image. Answers: a. bit unit b. file c. pixel d. system unit
c. pixel
Slingbox is an example of _____. Answers: a. project management software b. note-taking software c. remote access software d. desktop publishing software
c. remote access software
Computer professionals who are responsible for designing computers to be used within their companies are the _____. Answers: a. business developers b. software testers c. systems analysts d. technical support engineers
c. systems analysts
A _____ is a device made of semiconductor material that controls the flow of electrons inside a chip. Answers: a. adapter b. cache c. transistor d. register
c. transistor
Integrated circuits incorporate many _____ on a single tiny silicon chip, making computers smaller and more reliable. Answers: a. batch files and algorithmic circuits b. arrays and bitmap circuits c. transistors and electronic circuits d. metafiles and mnemonic circuits
c. transistors and electronic circuits
In Microsoft Access 2016, a(n) _________ exists between two tables when one record in the first table matches zero, one, or many records in the second table, and when each record in the second table matches at most one record in the first table. Answers: a. many-to-one relationship b. many-to-many relationship c. one-to-one relationship d. one-to-many relationship
d. one-to-many relationship
Which of the following is true of an embedded computer? Answers: a. It is a mainframe computer embedded into a product designed to perform specific tasks or functions for that product. b. It is a personal computer embedded into a product designed to perform specific tasks or functions for that product. c. It is a supercomputer embedded into a product designed to perform specific tasks or functions for that product. d. It is a tiny computer embedded into a product designed to perform specific tasks or functions for that product.
d. It is a tiny computer embedded into a product designed to perform specific tasks or functions for that product.
Case 1-3 Damon asks his friend Tanya to test his understanding on computer and business ethics. Tanyaasks Damon to provide a scenario that is an act of plagiarism. Which of the following scenarios can Damon provide? Answers: a. A philosopher referring to the information available on the Internet and using certain quotes in her research paper either indented or enclosed in quotation marks with the proper citations for each author b. A newspaper reporter paraphrasing a few sentences or paragraphs written by another author without changing the meaning of the text, including the revised text in an article, and crediting the original author with a proper citation c. A student copying and pasting information from various online documents and using those quotes in her research paper either indented or enclosed in quotation marks with the proper citations for each author d. A teacher sharing a poem with a class, leading the class to believe the poem was his original work
d. A teacher sharing a poem with a class, leading the class to believe the poem was his original work
Billy, who is studying Java, wants to learn how to build a mobile application and decides to research online. He finds a code and modifies it. He needs an open platform so that he can download the application on his device and use it for testing. Which of the following mobile operating systems should Billy choose? Answers: a. BlackBerry OS b. HPwebOS c. iPhone OS d. Android
d. Android
Identify the difference between data and information from the following options. Answers: a. Data is the outcome derived after processing information, while information is only the input given to a system. b. Data is easily understood, while information is difficult to understand. c. Data is generated to answer a question, while information is a raw fact. d. Data is an unorganized set of facts, while information is processed data.
d. Data is an unorganized set of facts, while information is processed data.
Case 1-2 Bruce, a freelance Web designer, has signed a contract to design a Web site for Glenvalley Corporation. He has been told that the Web site will only provide company specifics, the products they develop, the company founders, and the contact details; and no financial transactions would happen on the Web site. According to the specifications provided by the organization, which of the following Web page protocols should Bruce make use of to develop the Web site? Answers: a. Transmission Control Protocol (tcp://) b. File Transfer Protocol (ftp://) c. Secure sockets layer (ssl://) d. Hypertext Transfer Protocol (http://)
d. Hypertext Transfer Protocol (http://)
Which of the following statements is true of the Transmission Control Protocol (TCP)? Selected Answer: a. It does not allow users to create block boundaries. b. It is used in broadcast and multicast connections. c. It is faster than the User Data Protocol (UDP). d. It is responsible for the delivery of data.
d. It is responsible for the delivery of data.
Identify a protocol that is used to retrieve emails. a. Address Resolution Protocol (ARP) b. File Transfer Protocol (FTP) c. Simple Mail Transfer Protocol (SMTP) d. Post Office Protocol (POP3)
d. Post Office Protocol (POP3)
Pablo, a content writer, receives a text message, on his cellphone, containing details about a job offer. The type of message received by Pablo is called _____. Answers: a. Multimedia Message Service (MMS) b. Text Protocol (TP) c. Message over Internet Protocol (MoIP) d. Short Message Service (SMS)
d. Short Message Service (SMS)
_____ is the largest and most well-known computer network, linking billions of computers all over the world. Answers: a. An extranet b. An intranet c. The World Wide Web d. The Internet
d. The Internet
_____, the largest and most well-known computer network in the world, is a network of networks because it consists of a vast collection of networks that can access each other. Answers: a. An extranet b. The World Wide Web c. An intranet d. The Internet
d. The Internet
A group of bots that are controlled by one individual and can work together in a coordinated fashion is called a _____. Answers: a. chat bot b. botcon c. bean bot d. botnet
d. botnet
James shares the link of his Google Doc with his friend over e-mail. Here, James is using _____ to share information. Answers: a. pixel computing b. stylus computing c. flash computing d. cloud computing
d. cloud computing
Charlie uses his personal computer to play games, do his school projects using Microsoft Word, and download information from the Internet. The type of operating system used in Charlie's computer is typically referred to as a(n) _____. Answers: a. embedded operating system b. batch operating system c. network operating system d. desktop operating system
d. desktop operating system
Small programs called _____ are used to communicate with peripheral devices, such as monitors, printers, portable storage devices, and keyboards. Answers: a. adapters b. spreadsheets c. applets d. drivers
d. drivers
The computers found in DVD players, thermostats, answering machines, and some appliances are known as _____. Answers: a. supercomputers b. mainframe computers c. fifth-generation computers d. embedded computers
d. embedded computers
Abby writes a program that redirects users trying to visit a Web site to a bogus Web site created by him. The scam Abby has committed is called _____. Answers: a. smishing b. phishing c. vishing d. pharming
d. pharming
Case 1-3 Damon asks his friend Tanya to test his understanding on computer and business ethics. Tanya provides a scenario to Damon where a student copies and pastes information from various online documents to create a research paper, without crediting the original authors. The paper is only for school use and will not be shared or sold outside of school. Damon replies saying that this is an act of _____. Answers: a. felony b. solicitation c. inchoateness d. plagiarism
d. plagiarism
A _____ is a special connector accessible through the exterior of the system unit case that is used to connect an external hardware device. Answers: a. processor b. chip c. motherboard d. port
d. port
Evan needs to download and print an acknowledgement he has received for an online application form. After the download is completed, the computer gives an option to save and print the document. When Evan clicks the option, the file is placed in a buffer so that the printer can retrieve it. This process is called _____. Answers: a. threading b. slicing c. blocking d. spooling
d. spooling
The amount of data actually transferred under real-life conditions is called _____. Answers: a. jitter b. latency c. bandwidth d. throughput
d. throughput
Phil decides to sell his personal computer to buy a new laptop, so he deletes all the data on his hard drive. To ensure that the data on his hard drive cannot be recovered using any special software, he _____ the hard drive-overwrites the hard drive several times using a disk erasing software-before the selling the system. Answers: a. backs up b. synchronizes c. encrypts d. wipes
d. wipes
Conventional television and radio networks, cellular telephone networks, and satellite TV networks are examples of _____. Answers: a. bounded networks b. wired networks c. reinforced networks d. wireless networks
d. wireless networks
Write a statement that multiplies the value of the variable hours_worked by the value of the variable hourly_rate and stores the result in the variable gross_pay.
gross_pay=hours_worked*hourly_rate
Write a Python statement which asks the user to input the hours worked, converts the value to a floating point number and stores it in a variable named hours_worked. The statement should use the prompt: Enter the hours worked: and displays a space after the colon (i.e. :)
hours_worked=float(input("Enter the hours worked:"))
Write a Python statement to print the words Gross Pay: $ followed by the value of the variable gross_pay.
print("Gross Pay: $",gross_pay)
Write a Python statement to display the text Hello world!
print("Hello world!")