Trivia Quiz: Elements Of Computing

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Sb0705
S
Sb0705
Community Contributor
Quizzes Created: 14 | Total Attempts: 7,505
| Attempts: 156 | Questions: 152
Please wait...
Question 1 / 152
0 %
0/100
Score 0/100
1.
HTML and the Web connect one page to another through _____.
       
       
 

Explanation

HTML and the Web connect one page to another through hyperlinks. Hyperlinks are clickable elements on a webpage that allow users to navigate to another page or a different section of the same page. They are created using the anchor tag in HTML and are an essential part of the interconnected nature of the World Wide Web.

Submit
Please wait...
About This Quiz
Trivia Quiz: Elements Of Computing - Quiz

Computer knowledge is one of the skills that most employers look for in a prospective employee. This is because businesses are now becoming paperless, and most of the... see moretransactions people undertake to take place online. Being that you just covered the basic elements of computing, I have designed a quiz that is designed to help you review all that you have learned. see less

2.
The acronym HTTP stands for _____.
       
 

Explanation

HTTP stands for Hypertext Transfer Protocol. This protocol is used for transmitting hypertext over the internet. It allows for the transfer of various types of data, such as HTML files, images, videos, and more, between a web server and a web browser. HTTP is the foundation of the World Wide Web and is responsible for the communication between clients and servers.

Submit
3.
You can check the network configuration of your computer in Windows by using the _____ command.
       
       
       
 

Explanation

You can check the network configuration of your computer in Windows by using the "IPCONFIG" command.

Submit
4.
A _____ is a device designed to protect an internal network or node from intentional or unintentional damage from an external network.
       
       
       
 

Explanation

A firewall is a device designed to protect an internal network or node from intentional or unintentional damage from an external network. It acts as a barrier between the internal network and the external network, monitoring and controlling incoming and outgoing network traffic based on predetermined security rules. It helps to prevent unauthorized access, malware attacks, and other security threats by filtering and blocking potentially harmful traffic.

Submit
5.
The loose collection of networks called "the Internet" is the short form of which of the following words?
       
       
       
 
 

Explanation

The correct answer is "a.internetwork". The term "internetwork" refers to a loose collection of networks that are interconnected to form the Internet. It is a combination of the words "inter" (meaning between or among) and "network" (referring to a group of interconnected devices). Therefore, "internetwork" accurately describes the structure and nature of the Internet.

Submit
6.
Central to the operation of the IP protocol is the IP _____ of both the source and destination.
       
       
 

Explanation

The IP protocol relies on the IP address of both the source and destination in order to properly route and deliver data packets. The IP address serves as a unique identifier for each device connected to the network, allowing for proper communication and data transmission between devices.

Submit
7.
The problem of having to remember IP addresses was solved by allowing Web servers to have _____ names.
       
       
 

Explanation

Web servers were allowed to have domain names in order to solve the problem of having to remember IP addresses. Domain names provide a more user-friendly and memorable way to access websites, as they can be easily typed into a browser instead of having to remember a string of numbers.

Submit
8.
According to general consensus, which of the following companies won the mainframe battle of the first electronic computer generation?
 

Explanation

During the first electronic computer generation, IBM emerged as the winner of the mainframe battle. This is supported by the general consensus among experts and industry professionals. IBM's dominance in the mainframe market during this time period solidified its position as a leader in the computer industry.

Submit
9. ____ are characters that are used to match any character at the end of a file name to a particular file extension.

Explanation

Wildcards are characters that are used to match any character at the end of a file name to a particular file extension. This means that they can represent any character or set of characters in a file name, allowing for more flexible and inclusive file searches or commands. The use of wildcards is especially useful when dealing with large numbers of files or when searching for files with similar naming patterns.

Submit
10.
A ____ tool is the most logical choice for the development of a slide show.
       
       
       
 
 

Explanation

A presentation tool is the most logical choice for the development of a slide show because it is specifically designed for creating and delivering presentations. Presentation tools usually have features such as slide templates, animations, and multimedia integration that make it easy to create visually appealing and interactive slides. Additionally, presentation tools often have features for rehearsing and delivering presentations, such as presenter notes and slide show modes. Therefore, using a presentation tool would provide the necessary features and functionality to create an effective slide show.

Submit
11.
The Macintosh had the first mass-produced ____ , an interface that uses graphical instead of text commands.
       
       
       
 
 

Explanation

The correct answer is c.GUI. The Macintosh had the first mass-produced graphical user interface (GUI), which allowed users to interact with the computer using visual elements such as icons, windows, and menus instead of text-based commands. This made the computer more user-friendly and accessible to a wider audience.

Submit
12. Moving files is similar to ____ files

Explanation

Moving files involves transferring them from one location to another. Similarly, copying files also involves transferring them, but in this case, a duplicate of the file is created in the new location while the original file remains in its original location. Therefore, moving files is similar to copying files as both actions involve transferring the files.

Submit
13.
Which of the following SQL key words indicates that data is not required for a specified column?
       
       
 

Explanation

The SQL keyword "NULL" indicates that data is not required for a specified column.

Submit
14.
Which of the following war-time activities caused the U.S. Navy Board of Ordinance to sponsor the development of the first modern electronic computer?
       
       
       
 
 

Explanation

The correct answer is c. weapons development. During wartime, the development of new and more advanced weapons becomes crucial. The U.S. Navy Board of Ordnance sponsored the development of the first modern electronic computer to aid in the design and testing of new weapons. This computer would have been used to perform complex calculations and simulations that were necessary for weapons development.

Submit
15.
The Transport layer of the OSI model uses data units called _____.
       
       
 

Explanation

The Transport layer of the OSI model uses data units called "datagrams". These datagrams are packets of data that are sent from the source to the destination. They contain the necessary information for the data to be transmitted reliably and efficiently, including the source and destination addresses, error detection codes, and sequencing information. This allows for the reliable delivery of data across the network.

Submit
16.
By switching on and off, the ____ can be used to represent the 1s and 0s that are the foundation of all that goes on in the computer.
       
       
       
 
 

Explanation

Transistors can be switched on and off to represent the 1s and 0s in a computer. They are electronic devices that can amplify or switch electronic signals and are commonly used in digital circuits to perform logic operations. By controlling the flow of current, transistors can represent binary information, with one state representing a 1 and the other state representing a 0.

Submit
17.
____ in the form of logos, cartoons, and maps play a large part in the world of information sharing.
       
       
       
 
   

Explanation

Graphics, in the form of logos, cartoons, and maps, play a large part in the world of information sharing. They help to visually represent information and make it easier for people to understand and interpret. Graphics can convey complex ideas and concepts in a simplified and visually appealing way. They are widely used in various fields such as advertising, education, journalism, and entertainment to enhance communication and engage the audience.

Submit
18.
Data that has been organized and logically related to allow access, retrieval, and use of that data is called a _____.
       
       
 

Explanation

A database is a collection of organized and logically related data that allows for easy access, retrieval, and use of that data. It is a structured way of storing and managing data, making it a suitable answer for the given question.

Submit
19.
Which of following is a valid SQL command for constructing a table?
       
       
 

Explanation

The correct answer is d.CREATE TABLE. This is a valid SQL command used to create a new table in a database. It is followed by the name of the table and a list of column names and their data types.

Submit
20.
Which of the following graphical formats should be favored for animation and small file size?
       
       
       
 

Explanation

GIF should be favored for animation and small file size because it supports animation and uses lossless compression, which means that the image quality is not compromised when the file size is reduced. Additionally, GIF files have a limited color palette, which helps to keep the file size small.

Submit
21.
A _____ is a relatively small number of computers connected together in close proximity, usually within a building or complex.
       
       
 

Explanation

A LAN (Local Area Network) is a relatively small number of computers connected together in close proximity, usually within a building or complex. It is used for sharing resources and exchanging data between devices in a localized area.

Submit
22.
To flip an image upside down, the user would ____ it 180 degrees.
       
       
       
 
 

Explanation

To flip an image upside down, the user would rotate it 180 degrees.

Submit
23.
When you are diagramming and creating flowcharts, you are principally engaged in ____ tasks.
       
       
       
 
 

Explanation

Diagramming and creating flowcharts are tasks that are typically associated with programming. These activities involve visually representing the logic and flow of a program, which is an essential part of the programming process. Therefore, the correct answer is "a. programming."

Submit
24.
Based on low cost, available source code, and reputed reliability, which of the following operating systems presents the greatest competitive threat to Windows?
       
       
 

Explanation

Linux presents the greatest competitive threat to Windows based on its low cost, available source code, and reputed reliability. Linux is known for being a free and open-source operating system, making it a cost-effective option compared to Windows. Additionally, the availability of its source code allows for customization and modification, attracting a large community of developers. Linux is also known for its stability and security, making it a reliable alternative to Windows. Therefore, Linux is the correct answer.

Submit
25.
File ____ Protocol (or FTP) is a transmission method used to send files across the Internet.
       
       
       
 
 

Explanation

FTP stands for File Transfer Protocol, which is a transmission method used to send files across the Internet. This protocol allows users to transfer files between a local computer and a remote server. It is commonly used for uploading website files, downloading software updates, and sharing large files. The correct answer, "c.Transfer," accurately describes the purpose of FTP as a method for transferring files.

Submit
26.
The term ____ computing or ____ architectures refers to linking a number of CPUs to work on a task simultaneously.
       
       
       
 
 

Explanation

Parallel computing or parallel architectures refers to linking a number of CPUs to work on a task simultaneously. This means that multiple CPUs are used to divide and conquer a task, allowing for faster processing and increased efficiency.

Submit
27.
Creating documents, presentations, and spreadsheets are best classified as ____ tasks.
       
       
       
 
 

Explanation

Creating documents, presentations, and spreadsheets are best classified as office tasks because they are commonly performed in a professional or business setting using office software such as Microsoft Office or Google Suite. These tasks involve creating and managing documents, presentations, and spreadsheets for various purposes such as communication, data analysis, and information organization. They are essential for day-to-day operations in an office environment.

Submit
28.
A _____ or entity is divided into rows or columns much like a spreadsheet.
       
       
 

Explanation

A table is divided into rows or columns much like a spreadsheet, making it the correct answer.

Submit
29.
Fiber-optic cables use _____ fibers to guide light pulses along a cable.
       
       
       
 

Explanation

Fiber-optic cables use glass fibers to guide light pulses along a cable. Glass is a suitable material for fiber-optic cables because it has low signal loss, high transparency, and can transmit light over long distances without significant degradation. Ceramic, plastic, and tungsten are not commonly used as materials for fiber-optic cables.

Submit
30.
Crawling makes use of a special program called a bot or _____.
       
       
 

Explanation

Crawling refers to the process of a bot or spider program systematically browsing through the internet to collect data. Therefore, the correct answer is c. spider, as spiders are commonly used to crawl websites and gather information.

Submit
31.
The integration of Internet Explorer with the dominant Windows operating system was the turning point in what came to be known as the "____".
       
       
       
 
 

Explanation

The integration of Internet Explorer with the dominant Windows operating system sparked intense competition between different web browsers, leading to what is now known as the "browser wars". This refers to the period of intense rivalry and innovation among browser companies, such as Microsoft's Internet Explorer, Netscape Navigator, and later on, Mozilla Firefox and Google Chrome. During this time, companies competed for market share and dominance in the browser market, resulting in rapid advancements in browser technology and features.

Submit
32.
_____ measures the speed a transmission medium is able to handle in bits per second.
       
       
 

Explanation

Bandwidth measures the speed at which a transmission medium can handle data in bits per second. It refers to the capacity of the medium to transmit data and is often used to describe the maximum data transfer rate.

Submit
33.
____ algebra is concerned with the logic of the operators AND, OR, and NOT.
       
       
       
   

Explanation

Boolean algebra is concerned with the logic of the operators AND, OR, and NOT. It is a mathematical structure that deals with binary variables and logical operations. In Boolean algebra, variables can only have two possible values, either true or false. The operators AND, OR, and NOT are used to manipulate and combine these variables to form logical expressions. This type of algebra is widely used in computer science and digital electronics for designing and analyzing circuits and logical systems.

Submit
34.
Which of the following is a primary function of an operating system?
       
       
       
 
 

Explanation

The primary function of an operating system is to manage resources. This includes managing the allocation of memory, processing power, disk space, and other hardware resources. The operating system ensures that different processes and applications running on the computer have fair and efficient access to these resources. It also handles tasks such as scheduling processes, managing file systems, and providing a user interface for interaction with the computer.

Submit
35.
 
Very Large-Scale Integration (VLSI) chips hold ____ of circuits.
       
       
       
   

Explanation

VLSI chips hold millions of circuits. This is because VLSI technology allows for the integration of a large number of transistors and other components onto a single chip. The high level of integration enables the creation of complex and powerful electronic devices, such as microprocessors and memory chips, that can perform a wide range of functions.

Submit
36.
In the fifth generation of electronic computing, modular approaches to coding, such as ____ , facilitate larger, more complex, and more quickly and reliably delivered software products.
       
       
 
   
 

Explanation

In the fifth generation of electronic computing, modular approaches to coding, such as object-oriented programming, facilitate larger, more complex, and more quickly and reliably delivered software products. Object-oriented programming allows for the creation of reusable code modules, called objects, which can be easily combined and modified to build complex software systems. This modular approach improves software development efficiency and enables the development of more advanced and reliable software products.

Submit
37.
RAM is called "____" because it does not have to be read sequentially.
       
       
       
 
 

Explanation

RAM is called "random" because it does not have to be read sequentially. This means that the data stored in RAM can be accessed in any order, without having to go through the entire memory sequentially.

Submit
38.
Using _____, a packet can just be sent on an alternate line if the desired line is damaged or busy.
       
       
 

Explanation

Routers have the capability to determine the best path for data packets to travel and can reroute the packets if the desired line is damaged or busy. They use routing tables and algorithms to make these decisions, ensuring efficient and reliable data transmission.

Submit
39.
When you type in a URL in the address bar of your browser, you send a _____ lookup request to the _____ server at your ISP.
       
       
 

Explanation

When you type in a URL in the address bar of your browser, you send a DNS lookup request to the DNS server at your ISP. DNS stands for Domain Name System, and it is responsible for translating the domain name (URL) into the corresponding IP address of the website you are trying to access. This is necessary because computers communicate using IP addresses, not domain names. The DNS server will then return the IP address to your browser, allowing it to establish a connection with the website's server.

Submit
40. The main directory level is also called the ____ level.

Explanation

The main directory level is referred to as the root level because it is the highest level in the directory hierarchy. The root directory serves as the starting point for navigating through the file system and contains all other directories and files within it. It is analogous to the root of a tree, from which all other branches and sub-branches originate.

Submit
41.
In Windows, deleted files and folders reside in the ____ Bin folder until it is emptied

Explanation

In Windows, when files and folders are deleted, they are moved to the Recycle Bin folder. The Recycle Bin acts as a temporary storage for deleted items, allowing users to easily restore them if needed. The files and folders remain in the Recycle Bin until it is emptied, either manually by the user or automatically when the allocated storage space is exceeded.

Submit
42.
A(n) _____ defines how one entity works with or relates to another.
       
       
 

Explanation

An entity relationship defines how one entity works with or relates to another. It describes the connection and interaction between entities, outlining the nature of their association and the rules that govern their relationship. It helps to establish the structure and behavior of a system or database by defining the dependencies and interactions between different entities.

Submit
43.
SQL statements are closed with a(n) _____.
       
       
 

Explanation

SQL statements are closed with a semicolon. The semicolon is used to indicate the end of a SQL statement and separate multiple statements within a script. It is a standard convention in SQL to terminate each statement with a semicolon to ensure proper execution of the code.

Submit
44.
Which piece of technology replaced the vacuum tube?
       
       
       
 
   

Explanation

The correct answer is a. transistor. The transistor replaced the vacuum tube as a more efficient and reliable electronic component. Transistors are smaller in size, consume less power, and generate less heat compared to vacuum tubes. They also have faster switching speeds and are more durable. The invention of the transistor revolutionized the field of electronics and paved the way for the development of modern technology such as computers, smartphones, and other electronic devices.

Submit
45.
Both the Jacquard loom and the player piano had a "____".
       
       
       
 
 

Explanation

Both the Jacquard loom and the player piano had a "stored program" because they were both early examples of machines that could be programmed to carry out specific tasks. The Jacquard loom used punched cards to control the patterns woven into fabric, while the player piano used perforated paper rolls to control the notes played. In both cases, the machine followed a predetermined set of instructions, or a "stored program," to carry out its tasks.

Submit
46.
The _____ protocol establishes a virtual circuit with the destination computer to transmit packets.
       
       
       
 

Explanation

TCP (Transmission Control Protocol) is the correct answer because it is a connection-oriented protocol that establishes a virtual circuit with the destination computer before transmitting packets. TCP ensures reliable and ordered delivery of data by using acknowledgments and retransmissions. It is commonly used for applications that require a reliable and error-free transmission, such as web browsing, email, and file transfers.

Submit
47.
_____ languages allow a Web page developer to include dynamic properties.
       
 

Explanation

Scripting languages allow a Web page developer to include dynamic properties. These languages are specifically designed to be embedded within HTML code and are used to add interactivity and functionality to a website. By using scripting languages like JavaScript, developers can manipulate the content and behavior of a webpage in real-time, allowing for dynamic updates and user interactions. This makes scripting languages essential for creating dynamic and interactive web pages.

Submit
48.
Your Internet provider maintains a switching center called a _____.
       
       
       
 

Explanation

A point-of-presence (POP) is a physical location where an Internet service provider (ISP) maintains a presence in order to connect its customers to the Internet. It is a switching center that allows the ISP to receive and send data to and from its customers. The POP acts as a gateway between the ISP's network and the Internet, providing connectivity and routing services.

Submit
49.
A(n) _____ is a set of rules designed to facilitate communication.
       
       
 

Explanation

A protocol is a set of rules designed to facilitate communication. Protocols are used in various fields such as computer networking, telecommunications, and diplomacy to ensure that communication between different entities is standardized and efficient. They define the format, timing, sequencing, and error checking of messages exchanged between parties. By following a protocol, parties can effectively communicate and understand each other's messages, leading to successful communication.

Submit
50.
Keyboards, and most other I/O devices, connect to the motherboard through a(n) ____.
       
       
       
 
 

Explanation

Keyboards and other I/O devices connect to the motherboard through a port.

Submit
51.
A grid-like document that facilitates arithmetic manipulation and presentation is called a ____.
       
       
       
 
 

Explanation

A grid-like document that facilitates arithmetic manipulation and presentation is called a spreadsheet.

Submit
52.
Which of the following programming environments is actually a platform hosting a number of distinct languages?
       
       
       
 
   
 

Explanation

Microsoft.NET is a programming environment that is actually a platform hosting a number of distinct languages. It provides a framework for developing and running software applications. The languages supported by Microsoft.NET include C#, Visual Basic.NET, and F#. These languages can all be used to write code that runs on the .NET platform, allowing developers to choose the language that best suits their needs.

Submit
53.
A ____ is a collection of information usually organized into tables.
       
       
       
 
 

Explanation

A database is a collection of information usually organized into tables. This is because a database is a structured collection of data that is stored and accessed electronically. The data is typically organized into tables, which consist of rows and columns. Each row represents a record, and each column represents a field or attribute. By organizing information into tables, a database allows for efficient storage, retrieval, and manipulation of data.

Submit
54.
Which of the following commands can be used to add new rows of data to a table?
       
       
 

Explanation

The correct answer is c.INSERT. The INSERT command is used to add new rows of data to a table in a database. This command allows you to specify the table name and the values for each column in the new row that you want to insert.

Submit
55.
The truth table for the NOT gate shows that the output is the ____ of the input.
       
       
       
 
 

Explanation

The truth table for the NOT gate shows that the output is the opposite of the input.

Submit
56.
A program that is currently executing is called a ____.
       
       
       
 

Explanation

A program that is currently executing is called a process.

Submit
57.
When an I/O device places a voltage signal on a(n) ____ line, the associated chip checks its priority before passing it on to the CPU.
       
       
       
 
 

Explanation

When an I/O device places a voltage signal on an interrupt line, the associated chip checks its priority before passing it on to the CPU. This means that the interrupt line is used to signal the CPU that an I/O device needs attention or that a certain event has occurred. The associated chip checks the priority of the interrupt to determine if it should be passed on to the CPU immediately or if it should wait for a higher priority interrupt to be processed first. This allows for efficient handling of I/O requests and events by the CPU.

Submit
58.
A ____ is a generic tool that allows you to do basic editing, although the finished document won't have a professional look.
       
       
       
 
 

Explanation

A text editor is a generic tool that allows you to do basic editing, such as typing, deleting, and formatting text. However, it lacks advanced features and design options that would give the finished document a professional look.

Submit
59.
Which of the following storage forms is non-volatile?
       
       
       
 
 

Explanation

CD-ROM is a non-volatile storage form because it retains data even when the power is turned off. Unlike volatile storage forms like DRAM, SRAM, and DDRAM, which require constant power to maintain data, CD-ROMs store data permanently and do not require power to retain information.

Submit
60.
____ involves dividing messages into blocks that can be reassembled at their destination, with each block possibly following a different path.
       
       
       
 
   

Explanation

Packet switching involves dividing messages into blocks that can be reassembled at their destination, with each block possibly following a different path. This allows for efficient and reliable transmission of data over a network, as it allows multiple packets to be transmitted simultaneously and takes advantage of available network resources.

Submit
61.
A situation known as ____ occurs when all active processes are tied up in a circular wait for resources.
       
       
       
 
 

Explanation

A situation known as deadlock occurs when all active processes are tied up in a circular wait for resources. This means that each process is waiting for a resource that is being held by another process, leading to a situation where no progress can be made. Deadlock can occur in multi-threaded or multi-process systems, and it can be resolved using various techniques such as resource allocation, deadlock detection, and deadlock prevention.

Submit
62.
The concept of computer design that allows for future modifications and additions by members of the public is known as which of the following?
       
       
       
 
   

Explanation

Open architecture refers to the concept of computer design that allows for future modifications and additions by members of the public. It means that the design is not restricted or controlled by a single entity and can be freely accessed, modified, and extended by anyone. This promotes collaboration, innovation, and the development of a diverse range of software and hardware components that can work together seamlessly.

Submit
63.
One of the main functions of the ____ component of the computer's CPU is to add numbers.
       
       
       
 
 

Explanation

The ALU (Arithmetic Logic Unit) is responsible for performing arithmetic and logical operations in the computer's CPU. This includes adding numbers, as mentioned in the question. The ALU is a crucial component of the CPU that carries out calculations and manipulations of data.

Submit
64.
The ____ extension is one of the more popular compression formats in the world of Windows.
       
       
       
 
 

Explanation

The extension ".zip" is a popular compression format in the world of Windows. It is commonly used to compress multiple files into a single archive, making it easier to store and transfer large amounts of data.

Submit
65.
Which of the following is a valid SQL word used  to return data in descending order?
       
       
       
 

Explanation

The correct answer is "c.DESC". In SQL, "DESC" is used to sort the data in descending order. It is often used in conjunction with the "ORDER BY" clause to specify the sorting order for a column.

Submit
66.
The OSI conceptual model for the communication process has _____ discrete layers.
       
       
 

Explanation

The OSI conceptual model for the communication process has seven discrete layers.

Submit
67.
A gate's output for any set of inputs follows the specifications given in the ____ table.
       
       
       
 
 

Explanation

The correct answer is "d.truth". This is because a gate's output for any set of inputs follows the specifications given in the truth table. The truth table defines the output of a gate for each possible combination of input values.

Submit
68.
 
 
Which of the following operating systems supports multitasking?
       
       
       
  

Explanation

Windows XP supports multitasking. This means that it can run multiple programs or processes simultaneously, allowing users to switch between them and perform multiple tasks at the same time. This is a key feature of modern operating systems that enhances productivity and efficiency.

Submit
69.
Data ____can be used to reduce the sizeof a file and speed thetransmission ofthe file through e-mail.
       
       
       
 
   
 

Explanation

Compression is the correct answer because it refers to the process of reducing the size of a file by encoding the data in a more efficient way. This can be done through various algorithms that remove redundant or unnecessary information from the file. By compressing the file, it becomes smaller in size, making it easier and faster to transmit through email.

Submit
70.
Most computers today are still based on what has come to be called ____ architecture, and are sometimes still called ____ machines.
       
       
       
 
 

Explanation

Most computers today are still based on the Von Neumann architecture, which is a design concept that separates the computer's memory and processing unit. This architecture allows for the program instructions and data to be stored in the same memory, making it easier for the computer to fetch and execute instructions. Von Neumann machines refer to computers that follow this architecture.

Submit
71.
Hard disks are made up of one or more metal platters with a coating consisting of ____ particles.
       
       
       
   

Explanation

Hard disks are made up of metal platters with a coating of magnetic particles. These magnetic particles are used to store data in the form of magnetic fields. When the hard disk spins, a magnetic head reads and writes data on these particles by manipulating the magnetic fields. Therefore, the correct answer is "a. magnetic".

Submit
72.
Subnets are defined through the use of a subnet _____.
       
       
       
 

Explanation

Subnets are defined through the use of a subnet mask. A subnet mask is a binary number that is used to divide an IP address into network and host portions. It determines which part of the IP address belongs to the network and which part belongs to the host. The subnet mask is applied to the IP address to identify the network address and to determine the range of available host addresses within that network.

Submit
73.
So that packets do not keep bouncing from router to router forever, one of the fields in the IP header is the _____ field.
       
 

Explanation

The correct answer is "a. time to live". The time to live field in the IP header is used to prevent packets from circulating indefinitely in the network. It specifies the maximum number of hops (routers) that a packet can traverse before being discarded. Each router decrements the time to live value by 1, and if it reaches 0, the packet is dropped. This mechanism ensures that packets have a limited lifespan and prevents them from continuously bouncing between routers.

Submit
74.
The _____ protocol establishes a link from an e-mail client to a mail server.
       
       
       
 

Explanation

SMTP (Simple Mail Transfer Protocol) is the correct answer because it is the protocol used for sending emails from an email client to a mail server. SMTP is responsible for the transmission of email messages over the internet, ensuring that they are delivered to the recipient's mail server.

Submit
75.
Which of the following computer scientists invented the World Wide Web?
       
       
 

Explanation

Tim Berners-Lee is the correct answer because he is credited with inventing the World Wide Web. He developed the necessary technologies and protocols, such as HTML, HTTP, and URLs, that allowed for the creation and sharing of information over the internet. His work revolutionized the way we access and interact with information online, making the World Wide Web an essential part of modern life.

Submit
76.
In DOS, you can enter ____ <command> to get more details concerning a particular command.
       
       
       
 
 

Explanation

In DOS, you can enter "HELP " to get more details concerning a particular command. The "HELP" command provides a list of available commands and their descriptions, helping users understand how to use them effectively.

Submit
77.
UML or Universal ____ Language diagrams are used to develop object-oriented systems and programs.
       
       
       
 
 

Explanation

UML or Universal Modeling Language diagrams are used to develop object-oriented systems and programs. UML provides a standardized way to visualize and document the design of a system. It includes different types of diagrams such as class diagrams, sequence diagrams, and activity diagrams, which help in representing the different aspects of the system. By using UML diagrams, developers can communicate and collaborate effectively, ensuring a clear understanding of the system's structure and behavior.

Submit
78.
____ is a graphics tool popular with Web designers.
       
       
       
 

Explanation

Macromedia Fireworks is a graphics tool popular with Web designers.

Submit
79.
Images reduced by ____ compression techniques retain their original quality.
       
       
       
 
 

Explanation

Lossless compression techniques are designed to reduce the size of an image file without sacrificing its quality. This means that when an image is compressed using lossless techniques, it can be uncompressed back to its original form without any loss of quality. Therefore, images reduced by lossless compression techniques retain their original quality.

Submit
80.
Which of the following terms refers to computing with more than one CPU?
       
       
       
 
 

Explanation

Multiprocessing refers to computing with more than one CPU. It involves the simultaneous execution of multiple processes or threads on multiple processors or cores. This allows for increased speed and efficiency in executing tasks and handling large amounts of data. Multitasking, on the other hand, refers to the ability of an operating system to execute multiple tasks concurrently on a single processor. Multilayering and multileveraging are not terms related to computing with multiple CPUs.

Submit
81.
Which of the following operating systems was developed jointly by IBM and Microsoft?
       
       
       
 
 

Explanation

OS/2 was developed jointly by IBM and Microsoft.

Submit
82.
 
Which of the following operating systems was designed to accommodate multiple users and multiple tasks?
       
       
   

Explanation

UNIX was designed to accommodate multiple users and multiple tasks. Unlike DOS, CP/M, and Windows 3.0, UNIX was specifically developed to be a multi-user and multi-tasking operating system. It allows multiple users to access and use the system simultaneously, and it can handle multiple tasks or processes running concurrently. This makes UNIX suitable for environments where multiple users need to work on the same system at the same time or where multiple tasks need to be executed simultaneously.

Submit
83.
ENIAC was a functioning and useful computer that could perform both arithmetic and ____ operations.
       
       
 

Explanation

ENIAC was a functioning and useful computer that could perform both arithmetic and logical operations. This means that in addition to being able to perform mathematical calculations, ENIAC was also capable of executing logical operations such as comparisons, conditional statements, and boolean operations. These logical operations allowed ENIAC to make decisions and perform tasks based on certain conditions or inputs, making it a versatile and powerful computer for its time.

Submit
84.
The normal copper wire is capable of carrying _____ voice channels.
       
       
 

Explanation

Copper wire is commonly used for telecommunications and can carry multiple voice channels simultaneously. The number of voice channels that can be carried depends on various factors such as the thickness and quality of the wire. In this case, the correct answer is 24, indicating that the normal copper wire is capable of carrying 24 voice channels.

Submit
85.
 
Interface programs that allow a computer to interact with peripheral devices are called ____.
       
       
       
   

Explanation

Interface programs that allow a computer to interact with peripheral devices are called drivers. Drivers are software programs that enable the operating system to communicate with hardware devices. They provide a way for the computer to send and receive data from the peripheral devices, such as printers, scanners, and keyboards. Drivers act as a bridge between the hardware and the operating system, allowing them to work together seamlessly.

Submit
86.
Herman Hollerith introduced electromechanical counting equipment using ____ as input.
       
       
       
 

Explanation

Herman Hollerith introduced electromechanical counting equipment using punch cards as input. Punch cards were a method of data storage and input, where holes were punched into cards to represent data. This allowed for the automation of data processing and analysis, as the machines could read and interpret the punched holes on the cards.

Submit
87.
 The ____ is the core of the OS.
 
       
       
       
 

Explanation

The kernel is the core of the operating system. It is responsible for managing the system's resources, such as the CPU, memory, and input/output devices. It provides an interface between the hardware and the software, allowing programs to run and communicate with the hardware. The kernel also handles tasks such as process scheduling, memory management, and device drivers. Without the kernel, the operating system would not be able to function properly.

Submit
88.
Console operating systems prompt users to interact through a(n) ____ line.
       
       
       
 
 

Explanation

Console operating systems prompt users to interact through a command line. This is where users can input specific commands to execute various tasks or actions on the operating system. The command line allows users to navigate through directories, run programs, and perform other operations by typing in specific commands.

Submit
89.
 
In 1977, Apple released the ____ based upon the Motorola 6502 processor.
       
       
       
   

Explanation

In 1977, Apple released the Apple II based upon the Motorola 6502 processor. The Apple II was a personal computer and one of the first successful mass-produced microcomputer products. It was designed primarily by Steve Wozniak and was the successor to the Apple I. The Apple II had color graphics and a built-in BASIC programming language, making it popular for educational and business use. It played a significant role in the early development of the personal computer industry.

Submit
90. The process of ____ arranges the disk surface into addressable areas and sets up the basic directory tree structure on the disk.

Explanation

Formatting is the correct answer because it refers to the process of preparing a storage device, such as a disk, to be used by a computer system. During formatting, the disk surface is divided into addressable areas and a basic directory tree structure is set up. This allows the operating system to recognize and access the storage space on the disk.

Submit
91.
When the columns are used to determine the sort order of information they are called _____.
       
       
 

Explanation

When the columns are used to determine the sort order of information, they are referred to as "keys". Keys are used to uniquely identify and sort data in a database or data structure. They can be used to quickly retrieve and organize information based on specific criteria.

Submit
92.
To put the table into the _____ normal form, a separate row needs to be created for each row-column intersection with more than one value.
       
       
 

Explanation

To put the table into the first normal form, a separate row needs to be created for each row-column intersection with more than one value. This means that if there is a cell in the table that contains multiple values, it needs to be split into separate rows so that each value has its own row. This helps to eliminate redundancy and ensure that each value is atomic.

Submit
93.
Which of the following commands enables UNIX to partition a disk drive?

Explanation

The command "fdisk" enables UNIX to partition a disk drive. This command is used to create, delete, and modify partitions on a disk drive in UNIX systems. It allows users to allocate space on the disk for different purposes, such as creating separate partitions for different operating systems or organizing data. The "fdisk" command is commonly used in UNIX-based operating systems like Linux to manage disk partitions.

Submit
94.
In 1823 ____ invented a mechanical device that did addition, subtraction, multiplication, and division of 6-digit numbers.
       
       
       
 
 

Explanation

Charles Babbage is the correct answer because he is known for inventing the mechanical device called the "Difference Engine" in the 1820s. The Difference Engine was capable of performing calculations such as addition, subtraction, multiplication, and division of 6-digit numbers. Babbage's invention laid the foundation for modern computers and is considered a significant contribution to the field of computing.

Submit
95.
The total pool of IPv4 addresses is separated into groups, called _____.
       
       
 

Explanation

not-available-via-ai

Submit
96.
The process of changing image format from one type to another is called ____.
       
       
       
 
 

Explanation

The correct answer is "conversion" because the process of changing an image format from one type to another involves converting the image data from its original format to a new format. This can include converting from formats like JPEG to PNG, or from RAW to TIFF, for example.

Submit
97.
_____ direct network traffic based on the logical (IP) addresses assigned at the third layer of the OSI stack.
       
       
 

Explanation

Routers direct network traffic based on the logical (IP) addresses assigned at the third layer of the OSI stack. Unlike bridges, hubs, and gateways, routers can analyze the IP addresses of packets and determine the most efficient path for data transmission. They use routing tables to make decisions about where to send packets, ensuring that they reach their intended destination. Routers are essential for connecting different networks and enabling communication between devices on different networks.

Submit
98.
Grammar check and font selection are common features of which of the following tools?
       
       
       
 
 

Explanation

Word processors commonly have grammar check and font selection features. These features allow users to check and correct grammar errors in their documents and also choose different fonts for their text. Text editors, binders, and browsers typically do not have these specific features. Therefore, the correct answer is d. word processor.

Submit
99.
The truth table for the ____ gate indicates that the output is 1 only when the inputs are different.
       
       
       
 
 

Explanation

The XOR gate, also known as the exclusive OR gate, has a truth table that indicates that the output is 1 only when the inputs are different. This means that if one input is 1 and the other input is 0, the output will be 1. However, if both inputs are the same (either both 0 or both 1), the output will be 0. Therefore, the XOR gate is the correct answer for this question.

Submit
100.
Printers are rated by both printing speed.and ____ of output.
       
       
       
 
 

Explanation

Printers are rated by both printing speed and resolution of output. Resolution refers to the level of detail and clarity in the printed output. A higher resolution means that the printer can produce sharper and more detailed images and text. Therefore, the resolution of output is an important factor to consider when evaluating printers.

Submit
101.
The set of rules that dictates how databases are designed is called _____.
       
       
 

Explanation

Normalization is the set of rules that dictates how databases are designed. It involves organizing data in a database to eliminate redundancy and improve data integrity. By following normalization rules, databases can be structured efficiently, reducing data duplication and ensuring consistency. This helps in optimizing storage space and improving query performance.

Submit
102.
The PCI system bus consists of _____ wires.
       
       
 

Explanation

The correct answer is c.98. The PCI system bus consists of 98 wires.

Submit
103.
The AND circuit generates ____ output for each set of inputs.
       
       
       
 
 

Explanation

The AND circuit generates one output for each set of inputs. This means that if all the inputs to the AND circuit are true, the output will be true. If any of the inputs are false, the output will be false.

Submit
104.
Which of the following tools specializes in sophisticated page layout?
       
       
       
 
 

Explanation

A desktop publisher specializes in sophisticated page layout, allowing users to design and format documents with precise control over elements such as text, images, and graphics. This tool is commonly used in the creation of brochures, magazines, newsletters, and other visually appealing printed materials. It offers advanced features for arranging and manipulating content on a page, making it the ideal choice for tasks that require professional-level design and layout.

Submit
105.
In its antitrust suit with the government, Microsoft claimed which of the following programs was an integral part of the operating system?
       
       
       
 
   
 

Explanation

Microsoft claimed that Internet Explorer was an integral part of the operating system in its antitrust suit with the government.

Submit
106.
Text editors, compilers, and debuggers are directly featured on the menu of which of the following software tools?
   
   
   
   
   
 
 

Explanation

Integrated Development Environments (IDEs) typically include text editors, compilers, and debuggers as part of their features. These tools are essential for software development, allowing programmers to write, compile, and debug their code all within one software environment. Therefore, the correct answer is a. Integrated Development Environment.

Submit
107.
The operating system reallocates the CPU through a program known as a(n) ____ handler.
       
       
       
 
 

Explanation

The operating system reallocates the CPU through a program known as an interrupt handler.

Submit
108.
The _____ protocol is used to provide the reliable and efficient transmission of data files.
       
       
 

Explanation

The correct answer is c. FTP. FTP stands for File Transfer Protocol and it is specifically designed for the reliable and efficient transmission of data files over a network. FTP allows users to transfer files between a client and a server using a set of commands and protocols. It provides features such as file compression, error checking, and data integrity verification to ensure the successful and secure transfer of files.

Submit
109.
The tendency of a signal to become weaker over distance is known as _____.
       
       
       
 

Explanation

Attenuation refers to the weakening or loss of signal strength as it travels over a distance. This can occur due to various factors such as absorption, scattering, and interference. Amplification, on the other hand, refers to the increase in signal strength. Alienation and amelioration are unrelated to the weakening of a signal over distance.

Submit
110.
Normal telephone voice-grade lines use what is called _____-division multiplexing to divide up the bandwidth among the subscribers.
       
       
 

Explanation

Voice-grade lines use frequency-division multiplexing to divide up the bandwidth among the subscribers. This means that different frequencies are assigned to each subscriber to carry their telephone signals, allowing multiple conversations to be transmitted simultaneously over the same line.

Submit
111.
Which of the following was the first commercially viable computer?
       
       
       
 
   

Explanation

UNIVAC was the first commercially viable computer. It was developed by J. Presper Eckert and John Mauchly in the early 1950s. UNIVAC was the first computer to be produced in quantity and sold to customers. It was used for a wide range of applications, including scientific calculations, business data processing, and military calculations. UNIVAC played a significant role in the development of computer technology and paved the way for future advancements in the field.

Submit
112.
The port number can be analogized to which of the following address components?
       
       
 

Explanation

The port number can be analogized to the apartment number because just like an apartment number helps identify a specific unit within a building, a port number helps identify a specific process or service running on a computer.

Submit
113.
Assembly language, while easier to use than machine code, has what type of correspondence with machine code?
       
       
       
 
 

Explanation

Assembly language has a one-to-one correspondence with machine code. This means that each assembly language instruction corresponds to one specific machine code instruction. Each assembly language instruction is translated into a specific machine code instruction, and vice versa. This allows programmers to write code in a more human-readable format (assembly language) while still being able to directly communicate with the computer's hardware through the corresponding machine code instructions.

Submit
114.
A DBMS must provide or interface with a(n) _____ language to extract information from the database.
       
       
 

Explanation

A DBMS must provide or interface with a query language to extract information from the database. This is because a query language allows users to retrieve specific data from the database by writing queries or commands. It provides a standardized way for users to interact with the database and retrieve the desired information without having to understand the underlying structure or programming languages.

Submit
115.
A(n) _____ key is defined as a column in one table that is part of the primary key in another.
 

Explanation

A foreign key is a column in one table that is part of the primary key in another table. It is used to establish a relationship between the two tables, allowing data to be linked and referenced between them. This ensures data integrity and maintains the referential integrity of the database.

Submit
116.
Using the Berners-Lee protocols, Marc Andreesen created the browser that had the most impact beyond the walls of academia: ____.
 

Explanation

Marc Andreesen created the browser called Mosaic using the Berners-Lee protocols. Mosaic was the browser that had the most impact beyond the walls of academia.

Submit
117.
A(n) _____ is a special type of file that occupies its own space and specifies one or more columns that determine how the information stored in a table is organized.
 

Explanation

An index is a special type of file that occupies its own space and specifies one or more columns that determine how the information stored in a table is organized. It helps in improving the performance of database queries by allowing faster access to the data based on the indexed columns.

Submit
118.
A key that is made up of more than one column is called which of the following?
       
       
 

Explanation

A key that is made up of more than one column is called a composite key. This means that the key consists of multiple columns combined together to uniquely identify a record in a database table.

Submit
119.
_____ media are physical media such as copper wire or fiber-optic cable.
 

Explanation

Guided media refers to physical media that can guide or direct the transmission of signals, such as copper wire or fiber-optic cable. These media provide a physical pathway for the signals to travel through, allowing for more controlled and reliable transmission. Therefore, the correct answer is b.Guided.

Submit
120.
A(n) ____ network consists of computers that independently decide how to channel to the next computer.
       
       
       
 

Explanation

A distributed network consists of computers that independently decide how to channel to the next computer. In a distributed network, there is no central authority or control, and each computer has equal decision-making power. This allows for greater flexibility, scalability, and fault tolerance in the network, as there is no single point of failure.

Submit
121.
The _____ layer of the OSI model is responsible for translation, formatting, and syntax selection.
       
       
       
 

Explanation

The presentation layer of the OSI model is responsible for translation, formatting, and syntax selection. This layer ensures that data is properly formatted and translated so that it can be understood by the receiving device. It also handles tasks such as data compression and encryption.

Submit
122.
In a _____ topology, one of the computers or a network device serves as a hub for all messages.
       
       
       
 

Explanation

In a star topology, one of the computers or a network device serves as a hub for all messages. This means that all communication in the network goes through the central hub, which helps to manage and distribute the messages effectively. This topology is commonly used in Ethernet networks as it provides a centralized control and allows for easy troubleshooting and scalability.

Submit
123.
Graphics software available in the form of ____ is generally free of charge during a trial period.
       
       
       
 
 

Explanation

Graphics software available in the form of shareware is generally free of charge during a trial period. Shareware refers to software that is distributed for free initially, allowing users to try it out before deciding whether to purchase the full version. During the trial period, users can access all the features and functionalities of the graphics software without having to pay for it. This allows users to evaluate the software and determine if it meets their needs before making a financial commitment.

Submit
124.
The ____ operator works with a single input and its purpose is to reverse the input.
       
       
       
 
 

Explanation

The NOT operator works with a single input and its purpose is to reverse the input.

Submit
125.
At a basic level, most computers operate on what is called a(n) "____" cycle.
       
       
       
 
 

Explanation

The correct answer is "d.fetch-execute." This refers to the basic cycle of a computer's operation, which involves fetching instructions from memory and then executing them. This cycle is repeated continuously, allowing the computer to process data and perform tasks.

Submit
126.
Time-____ is a method that allows multiple processes to share the CPU.
       
       
       
   

Explanation

Slicing is a method that allows multiple processes to share the CPU. It involves dividing the CPU time into small time slices or intervals, during which each process is allocated a certain amount of time to execute. This allows multiple processes to take turns using the CPU, ensuring that each process gets a fair share of the CPU's resources.

Submit
127.
The _____ server is just a computer that is programmed to respond to HTTP requests.
       
       
 

Explanation

A web server is a computer that is programmed to respond to HTTP requests. It is responsible for hosting websites and serving web pages to users who request them. The web server processes the HTTP requests and sends the appropriate responses, usually in the form of HTML documents, back to the client's web browser.

Submit
128.
The operating system running on a computer is often called its ____ and is typically tied to a particular CPU.
       
       
       
   

Explanation

The correct answer is "platform". The operating system is often referred to as the platform because it provides the foundation for running applications and managing hardware resources on a computer. It is closely tied to a particular CPU because different CPUs may require different instructions and optimizations in the operating system.

Submit
129.
Which of the following technologies made electronic computing possible?
       
       
       
   

Explanation

Vacuum tubes made electronic computing possible. Vacuum tubes were one of the earliest electronic components used in computers. They acted as amplifiers and switches, allowing for the manipulation and processing of electronic signals. Vacuum tube technology paved the way for the development of early computers, enabling them to perform calculations and store information electronically. This technology was later replaced by transistors and integrated circuits, but it was a crucial step in the evolution of electronic computing.

Submit
130.
Which of the following SQL statements is most commonly used?
       
       
 

Explanation

The SELECT statement is the most commonly used SQL statement because it is used to retrieve data from a database. It allows users to specify the columns and rows they want to retrieve, as well as any conditions or filters to apply. The SELECT statement is essential for querying and retrieving data for various purposes such as generating reports, analyzing data, and making data-driven decisions. INSERT, CREATE, and DELETE statements are also important in SQL, but they are not used as frequently as the SELECT statement.

Submit
131.
In Western society, you can probably credit the 1622 invention of the ____as the beginning of the solution of complex mathematical problems by mechanical devices with moving parts.
       
       
       
   

Explanation

The invention of the slide rule in 1622 is credited as the beginning of the solution of complex mathematical problems by mechanical devices with moving parts in Western society. The slide rule was a tool used for mathematical calculations before the advent of calculators and computers. It allowed users to perform calculations involving multiplication, division, logarithms, and trigonometry. The slide rule was widely used by engineers, scientists, and mathematicians for centuries until it was eventually replaced by electronic calculators.

Submit
132.
Cable is theoretically capable of speeds up to _____.
       
       
       
 

Explanation

Cable is theoretically capable of speeds up to 42 Mbps.

Submit
133.
The 16.7 million color palette of the BMP format requires ____ bits.
       
       
       
 
 

Explanation

The BMP format uses 24 bits to represent its 16.7 million color palette. Each color is made up of 8 bits for red, 8 bits for green, and 8 bits for blue, resulting in a total of 24 bits. This allows for a wide range of colors to be displayed in the image.

Submit
134.
Fiberoptics and wireless technologies have given rise to which of the following terms?
       
       
       
 
 

Explanation

Fiberoptics and wireless technologies have given rise to WLAN, which stands for Wireless Local Area Network. This technology allows devices to connect to a network without the need for physical cables, enabling wireless communication within a limited area such as a home or office.

Submit
135.
_____ shows the numeric occurrences between entities in an ER model.
       
       
 

Explanation

Cardinality in an ER model represents the numeric occurrences between entities. It specifies the number of instances of one entity that can be associated with the number of instances of another entity. It helps to determine the relationship between entities and their participation in the relationship.

Submit
136.
In addition to redundant areas, ____ compression techniques eliminate information not perceptible to the human eye.
       
       
       
 
 

Explanation

Lossy compression techniques eliminate information not perceptible to the human eye. This means that during the compression process, certain data that is not easily noticeable or important to the human eye is discarded or altered to reduce the file size. This allows for more efficient storage and transmission of the compressed data.

Submit
137.
Which of the following computer scientists made significant contributions to relational database management?
       
       
 

Explanation

E.F. Codd made significant contributions to relational database management. He is known as the father of the relational model for database management systems. He developed the concept of a relational database, which organizes data into tables with rows and columns, and introduced the idea of using a query language (SQL) to manipulate and retrieve data from these databases. Codd's work revolutionized the field of database management and laid the foundation for modern relational database systems.

Submit
138.
The process of painting an image on the screen of a monitor is called ____ scanning.
       
       
       
 
 

Explanation

The correct answer is a. raster. The process of painting an image on the screen of a monitor is called raster scanning. Raster scanning is a method that involves scanning the image line by line from top to bottom and left to right. It is commonly used in computer graphics and television displays to display images on a monitor.

Submit
139.
With _____, multiple computers can share one Internet connection.
       
       
 

Explanation

NAT (Network Address Translation) allows multiple devices on a local network to share a single public IP address. It translates the private IP addresses of the devices into the public IP address, allowing them to access the internet. This is commonly used in home networks or small businesses where there are multiple devices but only one internet connection. DHCP (Dynamic Host Configuration Protocol) is responsible for assigning IP addresses to devices on a network. TCP/IP and UDP are protocols used for communication over the internet.

Submit
140.
____ are simply broad divisions of the total capacity of the disk into specific OS areas.
       
       
       
 
 

Explanation

Partitions are simply broad divisions of the total capacity of the disk into specific OS areas.

Submit
141.
The set of possible values for each column is called the _____ of that column.
       
       
 

Explanation

The set of possible values for each column is called the domain of that column.

Submit
142.
_____ pulses allow transmission rates up to 4 Mbps.
       
       
       
 

Explanation

Infrared pulses allow transmission rates up to 4 Mbps. Infrared communication uses infrared light waves to transmit data. It is commonly used for short-range wireless communication, such as in remote controls and wireless headphones. Infrared pulses have a higher data transmission rate compared to other options listed, such as microwave, X-ray, and ultraviolet.

Submit
143.
TCP and IP protocols map to Transport, Network, and _____ layers of the OSI model.
       
       
 

Explanation

The TCP and IP protocols map to the Transport (TCP) and Network (IP) layers of the OSI model. The missing layer in the question is the Session layer. The Session layer is responsible for establishing, maintaining, and terminating connections between applications. Therefore, the correct answer is d. Session.

Submit
144.
In Unix or Linux, entering ____<command> gives you the manual on the command that you specify.
       
       
 
   
 

Explanation

Entering "man " in Unix or Linux gives you the manual on the command that you specify. The "man" command is used to display the manual pages for various commands, providing detailed information and usage instructions.

Submit
145.
A(n) _____ diagram shows the protocol interactions between two entities.
       
 

Explanation

A timing diagram shows the protocol interactions between two entities by representing the timing and order of events. It allows for the visualization of when certain events occur and how they relate to each other in terms of timing. This type of diagram is commonly used in the field of computer science and engineering to analyze and design communication protocols.

Submit
146.
Which of the following WAN technologies use the same unguided media as television?
       
       
 

Explanation

Satellite technology uses the same unguided media as television. Satellite signals are transmitted through space and received by satellite dishes, just like television signals. This makes satellite a suitable WAN technology for areas where other forms of connectivity, such as DSL or cable, may not be available or feasible. Dial-up and cable technologies use different media for transmission.

Submit
147.
Twisting copper wires nearly eliminates the electromagnetic effect known as _____.
       
       
       
 

Explanation

Twisting copper wires helps to reduce the inductance, which is the property of a conductor to generate an electromotive force (EMF) in response to a changing magnetic field. By twisting the wires, the magnetic fields from each wire cancel each other out, reducing the overall electromagnetic effect and minimizing inductance.

Submit
148.
_____ formats content for display in a browser and transfers information via the Web.
       
       
 

Explanation

not-available-via-ai

Submit
149.
IBM's first multipurpose machine was called which of the following?
       
       
       
 
 

Explanation

IBM's first multipurpose machine was called the Mark I.

Submit
150.
A(n) _____ dependency exists when one column is dependent upon another column that is not the primary key.
       
       
 

Explanation

A transitive dependency exists when one column is dependent upon another column that is not the primary key. This means that the value of the dependent column can be determined by the value of another non-key column. In other words, the value of the dependent column is indirectly determined by the primary key through the non-key column.

Submit
151.
A special language known as _____ is used to query or extract information from databases.
 

Explanation

not-available-via-ai

Submit
152. Wildcard specifications are case sensitive in ____.

Explanation

Wildcard specifications are case sensitive in UNIX. This means that when using wildcards in UNIX, such as the asterisk (*) or question mark (?), the case of the characters matters. For example, if you use "*.txt" as a wildcard to search for all files with the .txt extension, it will only match files with lowercase ".txt" and not files with uppercase ".TXT". This is different from other operating systems like DOS, Windows XP, and MAC OS, where wildcard specifications are not case sensitive.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 16, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 16, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 08, 2012
    Quiz Created by
    Sb0705
Cancel
  • All
    All (152)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
HTML and the Web connect one page to another through _____....
The acronym HTTP stands for _____....
You can check the network configuration of your computer in Windows by...
A _____ is a device designed to protect an internal network or node...
The loose collection of networks called "the Internet" is the short...
Central to the operation of the IP protocol is the IP _____ of both...
The problem of having to remember IP addresses was solved by allowing...
According to general consensus, which of the following companies won...
____ are characters that are used to match any character at the end of...
A ____ tool is the most logical choice for the development of a slide...
The Macintosh had the first mass-produced ____ , an interface that...
Moving files is similar to ____ files
Which of the following SQL key words indicates that data is not...
Which of the following war-time activities caused the U.S. Navy Board...
The Transport layer of the OSI model uses data units called _____....
By switching on and off, the ____ can be used to represent the 1s and...
____ in the form of logos, cartoons, and maps play a large part in the...
Data that has been organized and logically related to allow access,...
Which of following is a valid SQL command for constructing a table?...
Which of the following graphical formats should be favored for...
A _____ is a relatively small number of computers connected together...
To flip an image upside down, the user would ____ it 180 degrees....
When you are diagramming and creating flowcharts, you are principally...
Based on low cost, available source code, and reputed reliability,...
File ____ Protocol (or FTP) is a transmission method used to send...
The term ____ computing or ____ architectures refers to linking a...
Creating documents, presentations, and spreadsheets are best...
A _____ or entity is divided into rows or columns much like a...
Fiber-optic cables use _____ fibers to guide light pulses along a...
Crawling makes use of a special program called a bot or _____....
The integration of Internet Explorer with the dominant Windows...
_____ measures the speed a transmission medium is able to handle in...
____ algebra is concerned with the logic of the operators AND, OR, and...
Which of the following is a primary function of an operating system?...
 ...
In the fifth generation of electronic computing, modular approaches to...
RAM is called "____" because it does not have to be read sequentially....
Using _____, a packet can just be sent on an alternate line if the...
When you type in a URL in the address bar of your browser, you send a...
The main directory level is also called the ____ level.
In Windows, deleted files and folders reside in the ____ Bin folder...
A(n) _____ defines how one entity works with or relates to another....
SQL statements are closed with a(n) _____....
Which piece of technology replaced the vacuum tube?...
Both the Jacquard loom and the player piano had a "____"....
The _____ protocol establishes a virtual circuit with the destination...
_____ languages allow a Web page developer to include dynamic...
Your Internet provider maintains a switching center called a _____....
A(n) _____ is a set of rules designed to facilitate communication....
Keyboards, and most other I/O devices, connect to the motherboard...
A grid-like document that facilitates arithmetic manipulation and...
Which of the following programming environments is actually a platform...
A ____ is a collection of information usually organized into tables....
Which of the following commands can be used to add new rows of data to...
The truth table for the NOT gate shows that the output is the ____ of...
A program that is currently executing is called a ____....
When an I/O device places a voltage signal on a(n) ____ line, the...
A ____ is a generic tool that allows you to do basic editing, although...
Which of the following storage forms is non-volatile?...
____ involves dividing messages into blocks that can be reassembled at...
A situation known as ____ occurs when all active processes are tied up...
The concept of computer design that allows for future modifications...
One of the main functions of the ____ component of the computer's CPU...
The ____ extension is one of the more popular compression formats in...
Which of the following is a valid SQL word used  to return data...
The OSI conceptual model for the communication process has _____...
A gate's output for any set of inputs follows the specifications given...
 ...
Data ____can be used to reduce the sizeof a file and speed...
Most computers today are still based on what has come to be called...
Hard disks are made up of one or more metal platters with a coating...
Subnets are defined through the use of a subnet _____....
So that packets do not keep bouncing from router to router forever,...
The _____ protocol establishes a link from an e-mail client to a mail...
Which of the following computer scientists invented the World Wide...
In DOS, you can enter ____ <command> to get more details...
UML or Universal ____ Language diagrams are used to develop...
____ is a graphics tool popular with Web designers....
Images reduced by ____ compression techniques retain their original...
Which of the following terms refers to computing with more than one...
Which of the following operating systems was developed jointly by IBM...
 ...
ENIAC was a functioning and useful computer that could perform both...
The normal copper wire is capable of carrying _____ voice channels....
 ...
Herman Hollerith introduced electromechanical counting equipment using...
 The ____ is the core of the OS....
Console operating systems prompt users to interact through a(n) ____...
 ...
The process of ____ arranges the disk surface into addressable areas...
When the columns are used to determine the sort order of information...
To put the table into the _____ normal form, a separate row needs to...
Which of the following commands enables UNIX to partition a disk...
In 1823 ____ invented a mechanical device that did addition,...
The total pool of IPv4 addresses is separated into groups, called...
The process of changing image format from one type to another is...
_____ direct network traffic based on the logical (IP) addresses...
Grammar check and font selection are common features of which of the...
The truth table for the ____ gate indicates that the output is 1 only...
Printers are rated by both printing speed.and ____ of output....
The set of rules that dictates how databases are designed is called...
The PCI system bus consists of _____ wires....
The AND circuit generates ____ output for each set of inputs....
Which of the following tools specializes in sophisticated page layout?...
In its antitrust suit with the government, Microsoft claimed which of...
Text editors, compilers, and debuggers are directly featured on the...
The operating system reallocates the CPU through a program known as...
The _____ protocol is used to provide the reliable and efficient...
The tendency of a signal to become weaker over distance is known as...
Normal telephone voice-grade lines use what is called _____-division...
Which of the following was the first commercially viable computer?...
The port number can be analogized to which of the following address...
Assembly language, while easier to use than machine code, has what...
A DBMS must provide or interface with a(n) _____ language to extract...
A(n) _____ key is defined as a column in one table that is part of the...
Using the Berners-Lee protocols, Marc Andreesen created the browser...
A(n) _____ is a special type of file that occupies its own space and...
A key that is made up of more than one column is called which of the...
_____ media are physical media such as copper wire or fiber-optic...
A(n) ____ network consists of computers that independently decide how...
The _____ layer of the OSI model is responsible for translation,...
In a _____ topology, one of the computers or a network device serves...
Graphics software available in the form of ____ is generally free of...
The ____ operator works with a single input and its purpose is to...
At a basic level, most computers operate on what is called a(n) "____"...
Time-____ is a method that allows multiple processes to share the CPU....
The _____ server is just a computer that is programmed to respond to...
The operating system running on a computer is often called its ____...
Which of the following technologies made electronic computing...
Which of the following SQL statements is most commonly used?...
In Western society, you can probably credit the 1622 invention of the...
Cable is theoretically capable of speeds up to _____....
The 16.7 million color palette of the BMP format requires ____ bits....
Fiberoptics and wireless technologies have given rise to which of the...
_____ shows the numeric occurrences between entities in an ER model....
In addition to redundant areas, ____ compression techniques eliminate...
Which of the following computer scientists made significant...
The process of painting an image on the screen of a monitor is called...
With _____, multiple computers can share one Internet connection....
____ are simply broad divisions of the total capacity of the disk into...
The set of possible values for each column is called the _____ of that...
_____ pulses allow transmission rates up to 4 Mbps....
TCP and IP protocols map to Transport, Network, and _____ layers of...
In Unix or Linux, entering ____<command> gives you the manual on...
A(n) _____ diagram shows the protocol interactions between two...
Which of the following WAN technologies use the same unguided media as...
Twisting copper wires nearly eliminates the electromagnetic effect...
_____ formats content for display in a browser and transfers...
IBM's first multipurpose machine was called which of the following?...
A(n) _____ dependency exists when one column is dependent upon another...
A special language known as _____ is used to query or extract...
Wildcard specifications are case sensitive in ____.
Alert!

Advertisement