HTML and the Web connect one page to another through _____....
The acronym HTTP stands for _____....
You can check the network configuration of your computer in Windows by...
A _____ is a device designed to protect an internal network or node...
The loose collection of networks called "the Internet" is the short...
Central to the operation of the IP protocol is the IP _____ of both...
The problem of having to remember IP addresses was solved by allowing...
According to general consensus, which of the following companies won...
____ are characters that are used to match any character at the end of...
A ____ tool is the most logical choice for the development of a slide...
The Macintosh had the first mass-produced ____ , an interface that...
Moving files is similar to ____ files
Which of the following SQL key words indicates that data is not...
Which of the following war-time activities caused the U.S. Navy Board...
The Transport layer of the OSI model uses data units called _____....
By switching on and off, the ____ can be used to represent the 1s and...
____ in the form of logos, cartoons, and maps play a large part in the...
Data that has been organized and logically related to allow access,...
Which of following is a valid SQL command for constructing a table?...
Which of the following graphical formats should be favored for...
A _____ is a relatively small number of computers connected together...
To flip an image upside down, the user would ____ it 180 degrees....
When you are diagramming and creating flowcharts, you are principally...
Based on low cost, available source code, and reputed reliability,...
File ____ Protocol (or FTP) is a transmission method used to send...
The term ____ computing or ____ architectures refers to linking a...
Creating documents, presentations, and spreadsheets are best...
A _____ or entity is divided into rows or columns much like a...
Fiber-optic cables use _____ fibers to guide light pulses along a...
Crawling makes use of a special program called a bot or _____....
The integration of Internet Explorer with the dominant Windows...
_____ measures the speed a transmission medium is able to handle in...
____ algebra is concerned with the logic of the operators AND, OR, and...
Which of the following is a primary function of an operating system?...
...
In the fifth generation of electronic computing, modular approaches to...
RAM is called "____" because it does not have to be read sequentially....
Using _____, a packet can just be sent on an alternate line if the...
When you type in a URL in the address bar of your browser, you send a...
The main directory level is also called the ____ level.
In Windows, deleted files and folders reside in the ____ Bin folder...
A(n) _____ defines how one entity works with or relates to another....
SQL statements are closed with a(n) _____....
Which piece of technology replaced the vacuum tube?...
Both the Jacquard loom and the player piano had a "____"....
The _____ protocol establishes a virtual circuit with the destination...
_____ languages allow a Web page developer to include dynamic...
Your Internet provider maintains a switching center called a _____....
A(n) _____ is a set of rules designed to facilitate communication....
Keyboards, and most other I/O devices, connect to the motherboard...
A grid-like document that facilitates arithmetic manipulation and...
Which of the following programming environments is actually a platform...
A ____ is a collection of information usually organized into tables....
Which of the following commands can be used to add new rows of data to...
The truth table for the NOT gate shows that the output is the ____ of...
A program that is currently executing is called a ____....
When an I/O device places a voltage signal on a(n) ____ line, the...
A ____ is a generic tool that allows you to do basic editing, although...
Which of the following storage forms is non-volatile?...
____ involves dividing messages into blocks that can be reassembled at...
A situation known as ____ occurs when all active processes are tied up...
The concept of computer design that allows for future modifications...
One of the main functions of the ____ component of the computer's CPU...
The ____ extension is one of the more popular compression formats in...
Which of the following is a valid SQL word used to return data...
The OSI conceptual model for the communication process has _____...
A gate's output for any set of inputs follows the specifications given...
...
Data ____can be used to reduce the sizeof a file and speed...
Most computers today are still based on what has come to be called...
Hard disks are made up of one or more metal platters with a coating...
Subnets are defined through the use of a subnet _____....
So that packets do not keep bouncing from router to router forever,...
The _____ protocol establishes a link from an e-mail client to a mail...
Which of the following computer scientists invented the World Wide...
In DOS, you can enter ____ <command> to get more details...
UML or Universal ____ Language diagrams are used to develop...
____ is a graphics tool popular with Web designers....
Images reduced by ____ compression techniques retain their original...
Which of the following terms refers to computing with more than one...
Which of the following operating systems was developed jointly by IBM...
...
ENIAC was a functioning and useful computer that could perform both...
The normal copper wire is capable of carrying _____ voice channels....
...
Herman Hollerith introduced electromechanical counting equipment using...
The ____ is the core of the OS....
Console operating systems prompt users to interact through a(n) ____...
...
The process of ____ arranges the disk surface into addressable areas...
When the columns are used to determine the sort order of information...
To put the table into the _____ normal form, a separate row needs to...
Which of the following commands enables UNIX to partition a disk...
In 1823 ____ invented a mechanical device that did addition,...
The total pool of IPv4 addresses is separated into groups, called...
The process of changing image format from one type to another is...
_____ direct network traffic based on the logical (IP) addresses...
Grammar check and font selection are common features of which of the...
The truth table for the ____ gate indicates that the output is 1 only...
Printers are rated by both printing speed.and ____ of output....
The set of rules that dictates how databases are designed is called...
The PCI system bus consists of _____ wires....
The AND circuit generates ____ output for each set of inputs....
Which of the following tools specializes in sophisticated page layout?...
In its antitrust suit with the government, Microsoft claimed which of...
Text editors, compilers, and debuggers are directly featured on the...
The operating system reallocates the CPU through a program known as...
The _____ protocol is used to provide the reliable and efficient...
The tendency of a signal to become weaker over distance is known as...
Normal telephone voice-grade lines use what is called _____-division...
Which of the following was the first commercially viable computer?...
The port number can be analogized to which of the following address...
Assembly language, while easier to use than machine code, has what...
A DBMS must provide or interface with a(n) _____ language to extract...
A(n) _____ key is defined as a column in one table that is part of the...
Using the Berners-Lee protocols, Marc Andreesen created the browser...
A(n) _____ is a special type of file that occupies its own space and...
A key that is made up of more than one column is called which of the...
_____ media are physical media such as copper wire or fiber-optic...
A(n) ____ network consists of computers that independently decide how...
The _____ layer of the OSI model is responsible for translation,...
In a _____ topology, one of the computers or a network device serves...
Graphics software available in the form of ____ is generally free of...
The ____ operator works with a single input and its purpose is to...
At a basic level, most computers operate on what is called a(n) "____"...
Time-____ is a method that allows multiple processes to share the CPU....
The _____ server is just a computer that is programmed to respond to...
The operating system running on a computer is often called its ____...
Which of the following technologies made electronic computing...
Which of the following SQL statements is most commonly used?...
In Western society, you can probably credit the 1622 invention of the...
Cable is theoretically capable of speeds up to _____....
The 16.7 million color palette of the BMP format requires ____ bits....
Fiberoptics and wireless technologies have given rise to which of the...
_____ shows the numeric occurrences between entities in an ER model....
In addition to redundant areas, ____ compression techniques eliminate...
Which of the following computer scientists made significant...
The process of painting an image on the screen of a monitor is called...
With _____, multiple computers can share one Internet connection....
____ are simply broad divisions of the total capacity of the disk into...
The set of possible values for each column is called the _____ of that...
_____ pulses allow transmission rates up to 4 Mbps....
TCP and IP protocols map to Transport, Network, and _____ layers of...
In Unix or Linux, entering ____<command> gives you the manual on...
A(n) _____ diagram shows the protocol interactions between two...
Which of the following WAN technologies use the same unguided media as...
Twisting copper wires nearly eliminates the electromagnetic effect...
_____ formats content for display in a browser and transfers...
IBM's first multipurpose machine was called which of the following?...
A(n) _____ dependency exists when one column is dependent upon another...
A special language known as _____ is used to query or extract...
Wildcard specifications are case sensitive in ____.