ict

Ace your homework & exams now with Quizwiz!

Which of the following is an example of assignment operator in Python?

!=

Which symbol is used to introduce comments in Python? :

#

Which of the following is an example of assignment operator in Python?

+=

What extentsion is used for Java source files :

.java

What extentsion is used for PHP source files :

.php

What extentsion is used for Python source files :

.py

What numerical value has binary representation 0

0

What numerical value has binary representation 01

1

What will be the output after execution of the following code? Please answer based on Python code provided bellow x = 2 y = 3 list = [1,2,3,4,5] print(list[0])

1

From the above: 1) a text editor; 2) a table editor; 3) compiler program; 4) graphic editor; 5) optimizer program - to create a program in the selected programming language, you must have components:

1, 3

What numerical value has binary representation 1010

10

What will be the output of the execution of the following code? Please answer based on Python code provided bellow x = 2 y = 3 list = [1,2,3,4,5] print(x+y+list[-1]) :

10

Which of the following is not the value of 2 bits

12

The number of internet users in Kazakhstan in 2016:

12 million people

Charles Babbage designed first analytical computer in :

1820-1822

Alan Turing proposed first abstract general-purpose computer "Turing machine" in :

1936

First time computer was able to store information on memory in :

1941

First computer chip has been unveiled in :

1958

. When was first e-mail sent?

1972

When was TCP firstly developed?

1974

First IBM Personal Computer named "Acorn" was presented in :

1981

When was DNS system was created?

1983

com was firstly used in

1984

How many main lines of research on artificial intelligence?

2

What numerical value has binary representation 10 :

2

What will be the output after execution of the following code? Please answer based on Python code provided bellow int_1 = 4 int_2 = 5 int_3 = int_1*int_2 print(int_3)

20

YouTube was founded in

2005

Year of first IPhone

2007

The term Big Data appeared in

2008

. How many parameters teleconferences can be classified?

3

What maximum numerical value can be represented with 2 bits? :

3

What numerical value has binary representation 11 :

3

What will be the output after execution of the following code? Please answer based on Python code provided bellow x = 2 y = 3 list = [1,2,3,4,5] print(list[2]) :

3

At what stage the block is broadcasted to all the nodes of the network? :

3 stage

What range does Low Frequency (LF) RFID operate in?

30 KHz to 300 KHz

What range does Ultra-High Frequency (UHF) RFID operate in?

300 MHz to 3 GHz

How many layers in TCP/IP messaging model?

4

What numerical value has binary representation 100 :

4

What will be the output after execution of the following code? Please answer based on Python code provided bellow int_1 = 4 int_2 = 5 int_3 = int_1*int_2 print(int_1)

4

What will be the output of the execution of the following code? Please answer based on Python code provided bellow var = 2 Var = 3 list = [1,2,3,4,5] print(list[0]*2+var) :

4

What will be the output of the execution of the following code? Please answer based on Python code provided bellow var = 2 Var = 3 list = [1,2,3,4,5] print(list[0]+list[-1]-var)

4

Which bit from the right to left refers to value 8?

4th

. What will be the output after execution of the following code? Please answer based on Python code provided bellow int_1 = 4 int_2 = 5 int_3 = int_1*int_2 print(int_2)

5

What numerical value has binary representation 101 :

5

What will be the output after execution of the following code? Please answer based on Python code provided bellow x = 2 y = 3 list = [1,2,3,4,5] print(list[-1]) :

5

What approximated percent of the people nowadays use Internet all over the world?

50

How many steps does block chain work include?

6 stages

Unicode character set is approximately

65000

Which bit from the right to left refers to value 32?:

6th

What numerical value has binary representation 111

7

Find incorrect Normal Form of the relational database

7NF

What approximated amoung of RFC are there nowadays?

8600

What numerical value has binary representation 1001

9

Which of the following is an example of arithmetic operator in Python

: *

Which of the following is an example of arithmetic operator in Python

: +

Format beginning of Internet history, first dot-com domain regirstered in

: 1985

The environmental impact of the ICT sector, namely carbon dioxide emissions? :

: 2 %

What range does High Frequency (HF) RFID operate in

: 3 MHz to 30 MHz

Which of the following is an example of assignment operator in Python?

: =

The term "big data" pertains to a combination of

: All listed

Specify one of the data mining methods

: Linear Regression

Ada Lovelace is considered as first

: Programmer

Smart technology means

: Self-Monitoring Analysys and Reporting Technology

What value will hold the variable y, after execution of the following code? Please answer based on Python code provided bellow x = 10 y = '10' message ='Hello World!' print(message)

: String value "10"

. What is the basic principle of building a block chain? :

: all answers are correct

What is a teleconference?

: thematic exchange of messages between network users

WSN stands for

: wireless sensor network

The second stage of Block chain work

A block representing the transition is created

What is a feature of the key field in the relational database :

A field containing unique data

What is the main feature of a primary key field

A field with no duplicated (repeated) data

A database is

A set of related data

Show the examples of Sensor Based HCI device in list: 1) mouse; 2) keyboard; 3) graphical tablet; 4) VR trackers

A) All listed

2 main objects of HCI

A) Human and computer

Which of these persons is considered as first programmer:

A. Lovelace

What of the following is Application to play audio not for video

AIMP

What of the following is not text editing application

AIMP

What is the name of Corporation that have invented first version of Internet?:

ARPA

Which of the following organizations are not related to RFCs?

ARPA

What was the title of precursor of Internet?

ARPANET

Which of the following is not advantage of Command Line Interface (CLI) :

Ability to give audio commands

Which person made influence to computer development? :

Ada Lovelace

What of the following is software to work with raster graphics :

Adobe Photoshop

Which person made influence to computer development? :

Alan Turing

What of the following is not programming language

Algorithm

Which statement is true?

Algorithm is the part of programming

What individual WSNs are limited to?

All answers are correct

Which of the following issues are considered in IoT?

All issues

The relationships between relational database tables may be of types

All listed

This interface uses windows, icons, menus and pointers (WIMP) which can be manipulated by a mouse :

All listed

Which of the following is advantages of Natural Language Interface: 1)quicker than keyboard; 2) Hands-free; 3)Can be used by the disabled; 4) No training required :

All listed

What refers to ASCII

American Standard Code for Information Interchange

The chief aim of analysis is to distinguish between

An event occurring as either reflecting a true effect versus a one occurring by chance

What was the name of Victorian-era computer constructed by Charles Babbage

Analytical Engine

What of the following Applications are open source:

Apache Open Office

Which of the following Companies releases macOS

Apple

. It is separate program that helps users to solve particular problems:

Application

API is:

Application Programming Interface

We recognize the order of processing the blocks in flowchart of algorithm from:

Arrows

Which of the following is example of multimodal HCI architecture :

Audio and Visual Based HCI

What of the following is not office software:

Autodesk Scetchbook

What IS part of CIA Triad?

Availability

What factor was not preserved in the following example? Attacker blocks the communication channels so sender could not successfuly send message to the recipient.

Availability

What IS NOT one of the challenges in computer security?

Average salaries of information security specialist are low, that is why no one wants to work as such specialist

An algorithm in which the order of actions depends on certain conditions is called

B) branching

Algorithms in the execution of which individual commands or series of commands are executed repeatedly are called

B) cyclic

What can be used for providing companies with valuable insights into their customers?

Big Data

Unit measurement of information equivalent to the result of a choice between only 2 possible alternatives in the binary number system:

Bit

Which of the following applications are an example of peer-to-peer?:

BitTorrent

What of the following is Application to work with 3D

Blender

What of the following is not programming language

Blender

A technology of distributed storage of information, which concerns any vital questions:

Block chain

Which one of the following examples is for ICT use in Banking:

Businessman can save his time by using online services offered by banks.

An example of high level programming language that is using compiler as a translator is :

C

The most common algorithm that implements Decision Tree:

CART

In wich organization was firstly developed World Wide Web? :

CERN

System that eases creation and modification of digital content of web sites :

CMS

One of the basic hardware device:

CPU ( Microprocessor)

Language used to create styles for HTML documents

CSS

Which person made influence to computer development?

Charles Babbage

How we call the devices connected to server to make querries and requests?:

Client

Model of network with one main computer that is connected by many devices to work with

Client-Server

A field or attribute in the relational database is in fact a table

Column

Which of following tools is used to convert code into executable file :

Compiler

At which stage of database creation all data is collected

Conceptual

What factor is maintained in the following example? There are specified settings on computer files, when authorized users are able to access it, while unauthorized persons are blocked from accessing it :

Confidentiality

What factor was not preserved in the following example? Attacker intercepts message, reads contents, and forwards message to the recipient, without any modification :

Confidentiality

Which of the following is not disadvantage of Command Line Interface (CLI) :

Consumes big amount of resources

CMS is ...

Content Management System.

. Restoration of a database from a backup, after main database damage, is an example of which kind of control?

Corrective

Which of the following is not about Interface

D) A point where humans meet

3 types of algorithms do not contain:

D) Coding algorithm

. Which of the following occured in 1983

DNS was created

Which of the following occured in 1983

DNS was created

The main definition of data

Data is a collection of independent and unorganized facts

The term «big data» refers to a combination of what data?

Data security infrastructure

Which of the following is encoded in binary format:

Digital data

Which of the following is not advantage of Menu Driven Interface :

Does not physical input other than keyboard, doesn't work with cursor

Which of the following is not advantage of Natural Language Interface:

Does not process homonyms

What is DNS?

Domain Name System

Software provided by hardware vendors to properly recognize signals of the device:

Driver

A foreign key field may contain

Duplicates

Internet application for sending and receiving messages with "at" to domain name

E-mail

Who invented Relational database

Edgar Codd

Vulnerabilities are reducing the risk to the assets. Is the statement above true or false?

FALSE

What is FTP?

File Transfer Protocol

Portable programs contains:

Files

. Computing systems are:

Finite machines processing digital data

Which of the following occured in 1988

First internet worm

The structural diagram of the algorithm is called:

Flowchart

Which generation of computers lays in period of 1971-2010

Fourth

This interface uses windows, icons, menus and pointers (WIMP) which can be manipulated by a mouse :

Graphical User Interface

Which of the following is correct type of interface? :

Graphical User Interface

What is the transcript of GUI:

Graphics User Interface

Where is the application mostly installed

Hard disc

. The general term that is used to describe physical artifacts of a technology:

Hardware

. The tangible part of a computer system:

Hardware

What will be the output after execution of the following code? Please answer based on Python code provided bellow x = 10 y = "10" message ="Hello World!" print(message) :

Hello World!

. HTML is ...

Hypertext Markup Language

Standard markup language to be displayed in web browsers

Hypertext Markup Language (HTML)

Application Protocol for hypermedia information systems

Hypertext Transfer Protocol (HTTP)

What will be the output after execution of the following code? Please answer based on Python code provided bellow str_1 = "I have an " str_2 = "apple" str_3 = str_1 + str_2 print(str_1)

I have an

What will be the output after execution of the following code? Please answer based on Python code provided bellow str_1 = "I have an " str_2 = "apple" str_3 = str_1 + str_2 print(str_3)

I have an apple

Component of basic Internet data sending protocol, that is used to transport data that is prepared by TCP?:

IP

What is a FIRST step, in risk management process, regarding information security?

Identify information and related assets, and potential threats, vulnerabilities and impacts

Transcript of ICT:

Information and communication technology

What value will hold the variable x, after execution of the following code? Please answer based on Python code provided bellow x = 10 y = '10' message ='Hello World!' print(message)

Integer value 10

What factor was not preserved in the following example? Attacker intercepts message, reads contents, changes contents and forwards message to the recipient

Integrity

What type of human activity concerns the problems that are posed and solved in the framework of Artificial Intelligence?

Intellectual

What IS NOT part of CIA Triad? :

Intelligence

What is IP?:

Internet Protocol

What of the following is not programming language

J++

Who constructed Electronic Numerical Integrator and Calculator (ENIAC)? :

J. Mauchly and J.P. Eckert

The way to launch large and heavy applications, like games, in the web page

Java Applet

Most used programming language in Web application programming :

JavaScript

The Relational database tables may be connected to each other via :

Key fields

What is needed to regulate purchasing and paying for application software

Licenses

Which of the following IS NOT a vulnerability category?

Loss of agency

Which of the following IS a vulenrability category?

Loss of availability

What is a output device:

Loudspeaker

Which of the following Operating systems contains only the Command Line to interact with user

MS-DOS

Which of this lists is Website :

Mail.ru

Edgar Codd invented relational database tables relationships based on :

Mathematical theory of sets

In this interface the user has a list of items to choose from, and can make selections by highlighting one :

Menu Driven Interface

Which of the following is correct type of interface? :

Menu Driven Interface

Software that is only used in programming applications as its parts and modules:

Middleware

Which IS NOT a mean to deal with security attacks?

Minimize

Component of Output Device:

Monitor

One of the basic hardware device:

Monitor

One of the basic hardware device:

Motherboard

. Which of the following is correct type of interface? :

Natural Language Interface

Which of the following is not disadvantage of Command Line Interface (CLI) :

Needs natural language processing of commands

Application uses following tool to interact with other application on other computer

Networking API

Scripting programming language to automatically create HTML web pages

PERL

Scripting programming language to automatically create HTML web pages

PHP

Which of the following IS NOT an example of translator?

Parameter

Model of network when all computers connected to each other with similar rights:

Peer-to-peer

What IS one of the challenges in computer security?

People mostly, tend to not see the benefits of security until failure occurs

Application that can be moved via flash drives or storage discs are called:

Portable

What of following is not system software

Portable Application

Classification Data Mining Models

Predicts the class of an object

Component of Output Device:

Printer

Which of the Following is Communication

Process where information is exchanged between individuals using symbols, signs or verbal interactions

What of the following is open source program

Program with source available in internet

What IS one of the challenges in computer security?

Protector should find all potential weaknesses and cover them, while attacker only need to find one and exploit it

The system of rules that allow several units of communication system to transmit information?

Protocol

Internet stadards created by...

RFC

A method in which data stored by transponders are read or recorded using radio signals :

RFID

This technology is well suited for tracking the movement of certain objects and receiving a small amount of information from them

RFID

the technology of automatic identification of objects is? :

RFID

The concept of "internet of things" is associated of development of two technologies. What are they? :

RFID and WSN

The way of encoding data sent by Internet by public-key cryptosystem

RSA

Description of RFID :

Radio Frequency Identification

What is RAM?

Random access memory (RAM) is a type of data storage used in computers.

What is ROM?:

Read-only memory is a class of storage media used in computers.

Which of the following IS NOT a type of active attack? :

Release of message contents

Which of the following was first created in 2016 :

Reprogrammable quantum computer

RFC means

Request for Comments

A record in the relational database is in fact a table

Row

Find incorrect database creation stage :

Schematic

What of the following is not the core function of OS

Screen saver

Which generation of computers is in period of 1956 - 1963:

Second

What is the meaning of the word SMART?

Self-Monitoring Analysis And Reporting Technology

How we call Main computer, to which we connect using clients? :

Server

Which is not MS Access object

Sheet

Which term contains all other terms :

Software

What value will hold the variable message, after execution of the following code? Please answer based on Python code provided bellow x = 10 y = '10' message ='Hello World!' print(message)

String value "Hello World!"

What is part of cryptography?

Symmetric ciphers

. What are 2 basic types of software:

System and Applications software

Component of basic Internet data sending protocol, that is used to encript information that is to be sent by IP?

TCP

Which one of the following examples is for ICT use in Education:

Teacher uses computers to study teaching materials.

Find incorrect database logical type

Technical

The use of scientific knowledge, experience and resources to create process and product of that fulfill human needs:

Technology

Management method - moderated and non-moderated refers to

Teleconferences

Tools for interaction with Command line:

Text commands

Which of the Following is Information

The knowledge obtained from reading, investigation, study or research

What is a cybersecurity? :

The protection afforded to an automated information system or network in order to attain the applicable objectives of preserving the integrity, availability and confidentiality of information system resources

Which of the Following is Technology

The use of scientific knowledge, experience and resources to create process and product of that fulfill human needs

What is name of the variable, that holds the value "print"? Please answer based on Python code snippet provided bellow message ="Hello World!" print(message)

There is not enough information given to answer this question

What will be the output after execution of the following code? Please answer based on Python code provided bellow str_1 = "I have an " str_2 = "apple" str_3 = str_1 + str_2 print(str_4)

There will be an error in the output

What will be the output after execution of the following code? Please answer based on Python code provided bellow x = 10 y = "10" message ="Hello World!" print(msg) :

There will be an error in the output

Which generation of computers lays in period of 1964 - 1971

Third

Which one of the following examples is for ICT use in E-Commerce:

To connect online customers with suppliers to purchase products.

. Which one of the following examples is for ICT use in Industry

To help administrators to oversee and control entire operations in the factory.

Graphics API is used:

To interact with applications visually

Which of the following IS NOT a type of active attack? :

Traffic analysis

Companies KazakhstanTemirZholy, AirAstana, BekkAir, Skat have their own informational system which is:

Traffic control system

What is TCP?:

Transmission Control Protocol

Python stops executing when it comes to the input() function, and continues when the user has given some input. True or false?

True

Which of the following is an example of keyword in Python? :

True

What responses may be the answer for rhombic decision

True or false

What name had first commercial computer for business and government applications?:

UNIVAC

What is URL?

Uniform Resource Locator

the ease of use and learnability of a user interface :

Usability

Which of the following is not advantage of Command Line Interface (CLI):

Usable buttons alligned into scrolls

Which of the following is advantage of Command Line Interface (CLI) :

Uses the fewest system resources

What IS one of the challenges in computer security?

Usually security is an afterthought to be incorporated to a system, after system design was complete

The process of Data management consists of...

Validating

What is the 2 basic types of representing graphical images

Vector and Raster

What of the following is not the trait of Internet?

Very big amount of wires

Which of the following is not advantage of Menu Driven Interface :

Very clearly interacts with audio input

Which of the following is a type of symmetric algorithm/cipher?:

Vigener's cipher

The Application software that acts as another Computer on your Operating System

Virtual Machine

Which standard is not for representing letters and numbers

WAV

What environmental conditions such as temperature, sound, vibration, pressure, movement or pollutants can be determined?

WSN

Which of the following is not an Internet Application?

Web browser

What problems do artificial intelligence systems include

Which have the following function: the algorithmic solution to the problem is unknown

Which of variants is Website

Wikipedia.com

Which of the following operating systems are not based on Linux

Windows

how does the word WSN stand for?

Wireless Sensor Networks

An algorithm is

a description of the sequence of actions, the strict execution of which leads to the solution of the problem in a finite number of steps

Replay is a type of attack. Which one?

active

Repudiation is a type of attack. Which one? :

active

RFID types are?

all answers are correct

User Experience UX term contains :

all listed

Ways to obtain information

all listed

Which of the following is an example of logical operator in Python?

and

What will be the output after execution of the following code? Please answer based on Python code provided bellow str_1 = "I have an " str_2 = "apple" str_3 = str_1 + str_2 print(str_2) :

apple

Section of computer science, in which the problems of hardware and software modeling are posed and solved?

artificial intelligence

An example of low level programming language is :

assembly

What IS NOT one of the challenges in computer security? :

average salaries of information security specialist are low, that is why no one wants to work as such specialist

The area where we consider ways to analyze, systematically extract information from data sets is?

big data

extraction of information from other data sets or processing them in other ways that are too large or complex to be solved using traditional application software for data processing are considered? ::A field in which methods of analysis, systematic extraction of information from other data sets or processing them in other ways that are too large or complex to be solved using traditional application software for data processing are considered?::A field in which methods of analysis, systematic extraction of information from other data sets or processing them in other ways that are too large or complex to be solved using traditional application software for data processing are considered? :

big data

What deals with the problems of artificial reproduction of those structures and processes that are characteristic of the brain of a living person and underlie the solution of human problems? :

bionic

Within the framework of what approach to the problem of artificial intelligence was a new science of neuroinformatics formed? :

bionic

Technology for distributed storage of information that concerns any pressing issues?

block chain

distributed information storage technology that addresses any vital issues is it?:distributed information storage technology that addresses any vital issues is it? :

blockchain

Which of the following is Top level domain?

com

Which of the following IS NOT a category of an attack?

corrupted

Construction of block chain is based on three main principles. What are they? :

distribution, openness and protection.

Blockchain principles :

distribution, openness, protection

. Which top level domain is not especially for country?:

edu

What is the key of development of green technologies? :

energy

The source text is converted into such file using a compiler program :

executable

Identifier in Python could start with the digit. Is statement above true or false?

false

Which of the following is an example of keyword in Python? :

false

Which of the following domains are not connected to ROOT? :

google

An algorithm is called linear if:

his commands are executed in the order of their natural succession one after another, regardless of any conditions

For what purposes do companies use big data? :

improving marketing, and increasing profits

Modern intelligent information technologies are

information processing and problem solving using computers

Which of the Following is Information and Communication Technologies:

information processing, in particular, the use of electronics, computers, communication devices, and application software to convert, store, protect, process, transmit and retrieve information from anywhere to anytime

Components of computer hardware system:

input devices, output devices, processor and storage devices

. Function that returns the value that user inputs in command line is called

input()

What will be the output after execution of the following code? Please answer based on Python code provided bellow int_1 = 4 int_2 = 5 int_3 = int_1*int_2 print("int_3")

int_3

. IoT stands for?

internet of things

What IS NOT one of the challenges in computer security? :

is impossible to completly prevent the attack to the information systems

. An algorithm is called cyclic if

it is designed so that its implementation involves repeated repetition of the same actions

Which of the following IS NOT a category of an attack?

leaky

An algorithm in which the order of actions is fixed and each action is performed only once is called

linear

What will be the output after execution of the following code? Please answer based on Python code provided bellow x = 2 y = 3 list = [1,2,3,4,5] print("list[0]") :

list[0]

The main Definition of Hardware:

mechanism that transforms information in the external world for consumption by a computer

. What is name of the variable, that holds the value "Hello World!"? Please answer based on Python code snippet provided bellow message ="Hello World!" print(message)

message

What will be the output after execution of the following code? Please answer based on Python code provided bellow str_1 = "I have an " str_2 = "apple" str_3 = str_1 + str_2 print("message")

message

What will be the output after execution of the following code? Please answer based on Python code provided bellow x = 10 y = "10" message ="Hello World!" print("message")

message

Which top level domain is for millitary organizations?

mill

. How call sixth generation of computers? :

neurocomputer

Which of the following is an example of logical operator in Python?

or

Which top level domain is for non-profit organizations?:

org

The start and stop blocks in the algorithm are depicted :

oval

Input and output in the flowchart of the algorithm is depicted

parallelogram

Traffic analysis is a type of attack. Which one?

passive

Function that outputs the variable that is passed to it as an argument is called

print()

. What should be added after the last line of code, in order to get 3 in the output? Please answer based on Python code provided bellow x = 2 y = 3 list = [1,2,3,4,5] :

print(list[2])

An algorithm written in a computer-understandable programming language is called:

program

At run time, the application program is stored in:

random access memory

Which of the following is an example of keyword in Python? :

return

The operation "conditional transition" in the flowchart of the algorithm is depicted as :

rhombic

Another definition of Software

set of instructions that tells the hardware what to do

. Which of the following IS NOT an example of basic data type?

sets

Operating system is:

software environment that defines the user interface

intellectual problems on existing computer models: ::This direction is ...::intellectual problems on existing computer models: ::This direction is focused on the search for algorithms for solving intellectual problems on existing computer models:: This direction is focused on the search for algorithms for solving intellectual problems on existing computer models

software-pragmatic

. Сhoose 2 main directions of artificial intelligence :

software-pragmatic and bionic

Function transforms the numeric argument that is passed into the function, to the text type is called :

str()

What will be the output after execution of the following code? Please answer based on Python code provided bellow str_1 = "I have an " str_2 = "apple" str_3 = str_1 + str_2 print("str_3")

str_3

Organized thematic messaging between network users?

teleconference

What are the main directions of telemedicine?

telemedicine consultation, tele education, remote bio monitoring

Command line interface in Ubuntu Linux is called :

terminal

What IS NOT one of the challenges in computer security? :

the information security is very boring

The algorithm includes branching if

the progress of its implementation depends on the truth of certain conditions

Telemedicine is based on?

the use of modern communication technologies

What is the purpose of green technology in ICT?

to reduce the negative impact on the environment

Artificial intelligence systems are focused on :

to solve a large and important class of problems

Commented line will be ignored by interpretor. True or false? :

true

Python IS case sensitive programming language. Is statement above true or false?

true

Unassigned literals would be ignored by Python interpretor, that is why putting lines into triple quotes in order to make a multi-line string, could be a way to comment block of code. Is above true or false? :

true

Vulnerabilites could be reduced by implemented countermeasures. Is the statement above true or false? :

true

What of the following is programming language

С

Which of the following is an example of assignment operator in Python?

нет


Related study sets

Equations with Variables on Both Sides

View Set

Respiratory System 4.2- Carbon Dioxide in blood

View Set

Loss, Grief, and Dying - Exam #4

View Set

Psychology Chapter 8 cumulative terms

View Set

Mastering Biology HHMI: Got Lactase?

View Set

Video: Castro and the Cuban Revolution

View Set

psychology: ch 16 applied psychology and psychology careers

View Set

Chapter 2 Subjectivism, Realism, and Emotivism

View Set