1.
In the decimal or binary notations, the symbol used to represent a digit and the digit’s position in a string determines its ____.
A. 
B. 
C. 
D. 
2.
____ occurs when the absolute value of a negative exponent is too large to fit in the bits allocated tostore it.
A. 
B. 
C. 
D. 
3.
A(n) ____ is a set of related data values.
A. 
B. 
C. 
D. 
4.
A(n) ____ is a data structure that uses pointers so that list elements can be scattered among nonsequential storage locations.
A. 
B. 
C. 
D. 
5.
During the ____ cycle of the CPU, data inputs are prepared for transformation into data outputs.
A. 
B. 
C. 
D. 
6.
A ____ instruction copies data bits to storage locations and can copy data between any combination of registers and primary storage locations.
A. 
B. 
C. 
D. 
7.
An ____ is a template that specifies the number of operands and the position and length of the op code and operands.
A. 
B. 
C. 
D. 
8.
When manipulating single-precision floating-point numbers, CPU performance is measured in ____.
A. 
B. 
C. 
D. 
9.
____ states that the cost of fabrication facilities for the latest chip generation doubles every four years.
A. 
B. 
C. 
D. 
10.
____ is a generic term for describing secondary storage data transfer units.
A. 
B. 
C. 
D. 
11.
____ stores each bit by using a single transistor and capacitor.
A. 
B. 
C. 
D. 
12.
The ratio of cache hits to read accesses is called the cache’s ____.
A. 
B. 
C. 
D. 
13.
____ sensors capture input from special-purpose symbols placed on paper or the flat surfaces of 3D objects.
A. 
B. 
C. 
D. 
14.
PDF417 bar codes can hold around ____ of data.
A. 
B. 
C. 
D. 
15.
A(n) ____ is the maximum number of bits or bytes per second that the channel can carry.
A. 
Minimum data transfer rate
B. 
Overhead data transfer rate
C. 
D. 
16.
As bit transmission speed is increased, the duration of each bit in the signal, known as the ____, decreases.
A. 
B. 
C. 
D. 
17.
A(n) ____ extracts the data embedded in the signal it receives and retransmits a new signalcontaining the same data.
A. 
B. 
C. 
D. 
18.
The ____ standard divides frequency bands in the 5.2, 5.7, and 5.8 GHz ranges into 12 channels.
A. 
B. 
C. 
D. 
19.
The term ____ refers to the spatial organization of network devices, physical routing of network cabling, and flow of messages from one network node to another.
A. 
B. 
C. 
D. 
20.
The ____ layer includes communication protocols used by programs that make and respond to high-level requests for network services.
A. 
B. 
C. 
D. 
21.
The ____ layer forwards messages to their correct destinations.
A. 
B. 
C. 
D. 
22.
The ____ layer is the interface between network software and hardware.
A. 
B. 
C. 
D. 
23.
IP accepts messages called ____ from Transport-layer protocols and forwards them to theirdestination.
A. 
B. 
C. 
D. 
24.
The written format of 128-bit IP addresses is called ____ notation.
A. 
B. 
C. 
D. 
25.
At the sending node, the ____ layer’s role is to translate IP datagrams into a format that can be transported and forwarded over a specific physical network.
A. 
B. 
C. 
D. 
26.
____ perform design activities to create models that produce an architectural blueprint for system implementation.
A. 
B. 
C. 
D. 
27.
The one-to-many (1:N) relationship between later-generation programming statements and the CPU actions implementing them is called ____.
A. 
B. 
C. 
D. 
28.
A ____ uses mnemonics to represent instructions, variables, and labels and has a degree of instruction explosion higher than 1:1.
A. 
B. 
Second-generation language
C. 
Third-generation language
D. 
Fifth-generation language
29.
A ____ is a source code instruction that controls the execution of other source code instructions.
A. 
B. 
C. 
D. 
30.
____ linking is performed during program loading or execution.
A. 
B. 
C. 
D. 
31.
Threads in the ____ are idle, pending availability of a CPU.
A. 
B. 
C. 
D. 
32.
The OS maintains a ____ and updates it each time a partition is allocated or freed.
A. 
B. 
C. 
D. 
33.
In virtual memory management, a ____ is a small fixed-size portion of a program, normally between 1 and 4 KB.
A. 
B. 
C. 
D. 
34.
A reference to a page held in memory is called a ____.
A. 
B. 
C. 
D. 
35.
The CPU maintains a ____ containing descriptors for all memory segments.
A. 
B. 
C. 
D. 
36.
A ____ is the unit of storage transferred between the device controller and memory in a single operation.
A. 
B. 
C. 
D. 
37.
Software implementing the Transport, Internet, and Network Interface layers of the TCP/IP model is commonly called a(n) ____.
A. 
B. 
C. 
D. 
38.
In static resource connections, the resource locator maintains a ____ containing the names and locations of known resources and services.
A. 
B. 
C. 
D. 
39.
All objects in an LDAP schema have a(n) ____ attribute.
A. 
B. 
C. 
D. 
40.
Active Directory clients rely on a ____ to locate Active Directory servers.
A. 
B. 
C. 
D. 
41.
With the ____ protocol, a process on one machine can call a process on another machine.
A. 
B. 
C. 
D. 
Remote Calling Convention
42.
In DCE, the security server issues security “____” to each party that are exchanged to verify identities.
A. 
B. 
C. 
D. 
43.
____ is a collection of resources that can be accessed over the Internet by standard protocols, such as Hypertext Transfer Protocol (HTTP).
A. 
B. 
C. 
D. 
44.
____ specifies the middleware objects use to interact across networks.
A. 
B. 
C. 
D. 
45.
____ is a key supporting technology in IaaS because it enables a customer/user to configureapplication and system software for a generic platform as virtual servers and then deploy these servers to a third-party hosting site.
A. 
B. 
C. 
D. 
46.
____ are assets or resources expected to provide benefits beyond the current fiscal year.
A. 
B. 
C. 
D. 
47.
The starting point for determining hardware requirements is the ____ that will run on the hardware platform.
A. 
B. 
C. 
D. 
48.
A ____ is a measure of computer system performance while executing one or more processing tasks.
A. 
B. 
C. 
D. 
49.
A ____ is a program typically embedded in OS service routines that detects and reports processing activity or requests.
A. 
B. 
C. 
D. 
50.
A ____ describes the resource or service utilization of an application program during execution.
A. 
B. 
C. 
D. 
51.
A(n) ____ tracks the progress of complex client/server interactions.
A. 
B. 
C. 
Packet-filtering firewall
D. 
52.
In general, the humidity level of a room containing computer equipment should be near ____%.
A. 
B. 
C. 
D.