Social Psychology
10th EditionElliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson
525 solutions
Operations Management: Sustainability and Supply Chain Management
12th EditionBarry Render, Chuck Munson, Jay Heizer
1,698 solutions
Human Resource Management
15th EditionJohn David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine
249 solutions
Operations Management: Sustainability and Supply Chain Management
12th EditionBarry Render, Chuck Munson, Jay Heizer
1,698 solutions
Upgrade to remove ads
Only A$47.99/year
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (30)
A network interface card sends data between a computer and the network.
yes
One home network can include both wired and wireless devices.
yes
A laptop (notebook) typically includes a _______.
touchpad & key pad
Most GUI-based operating systems also include a command-line interface.
yes
An operating system manages system resources including RAM.
yes
To be successful in professional messaging, you should _____.
share articles about the latest industry
connect with current and dormer colleagues
upload photos and media clips from a conference you organized
Each computer or device on a network is called a(n) _____.
node
Solid state drives are more durable than hard disk drives.
yes
The root directory is the main list of _______.
files and folders on a drive
Cookies that remain on your device indefinitely are called ______.
persistent
Malware _______ are delivery methods that take advantage of security flaws.
exploits
A padlock icon in the address bar indicates the current website is unsafe.
no
An VPN allows a mobile user to connect securely over the Internet.
yes
Most file managers include a way to create a folder through the Save dialog box.
yes
Ink-jet printers use pressurized nozzles to spray ink onto paper.
yes
You can run multiple operating systems on one computer using ____ machines.
virtual
If the image seems stretched, your computer's display may not be set to the default _____.
resolution
You should unplug your computer if you _____.
smell burning or see smoke coming from it
A file saved in a standard file format can only be opened by the application that created it.
no
Encryption is an effective replacement for a firewall.
no
What type of social media site is best suited for posting a how-to video series?
media sharing
Describe how geotagging is used in social networking.
it assigns a location to a posted image or video
You can place file and app icons on the desktop in which of the following operating systems?
microsoft windows
linux
macOS
You can use a browser to _____.
research information
work in web apps
watch videos
Which web browser feature lets you save shortcuts to webpages?
favorites or bookmarkers
Typical uses of wikis include _____.
sharing research
virtual workspaces
company knowledge base
Natural language processing is AI that ______.
understand human languages
Modern processors often have ____ levels of cache.
three
An operating system uses available storage space on a startup drive for _____.
storing program
virtual memory
storing apps
A disk utility is a tool for _____.
improving performance
Students also viewedConcepts Module 4: Operating Systems and File
21 terms
BigRomeo201PLUS
Intro to Comp.
64 terms
Benroch26
Study guide
72 terms
Brandon_Martin14
Module 4 Computer Concepts Exam
70 terms
pariwils1
Sets found in the same folderConcepts Module 4: Operating Systems and File
21 terms
BigRomeo201PLUS
Intro to Comp.
64 terms
Benroch26
ISDS 1100 - Exam 1 Module 3
90 terms
carolinezaunbrecher_
ISDS 1100-Exam 1 Module 3
67 terms
eegioe
Other sets by this creatorEXSC 311 EXAM 1
76 terms
Alex_Jackson20
THEO 202 TEST 2
72 terms
Alex_Jackson20
THEO 202
34 terms
Alex_Jackson20
PHED MIDTERM
91 terms
Alex_Jackson20
Verified questions
computer science
Assume 151 and 214 are unsigned 8-bit integers. Calculate 151 - 214 using saturating arithmetic. The result should be written in decimal. Show your work.
Verified answer
computer science
Suggest how to implement a direct-address table in which the keys of stored elements do not need to be distinct and the elements can have satellite data. All three dictionary operations (INSERT, DELETE, and SEARCH) should run in O(1) time. (Don’t forget that DELETE takes as an argument a pointer to an object to be deleted, not a key.)
Verified answer
computer science
Let $M O D E X P=\{\langle a, b, c, p\rangle | a, b, c$, and p are positive binary integers such that $a^{b} \equiv c \quad(\bmod p)$}. Show that $M O D E X P \in \mathrm{P}$. (Note that the most obvious algorithm doesn’t run in polynomial time. Hint: Try it first where b is a power of 2.)
Verified answer
computer science
The ______ function copies, at most, n number of characters from one string to another.
Verified answer
Recommended textbook solutionsFundamentals of Database Systems
7th EditionRamez Elmasri, Shamkant B. Navathe
687 solutions
Introduction to Algorithms
3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen
726 solutions
Service Management: Operations, Strategy, and Information Technology
7th EditionJames Fitzsimmons, Mona Fitzsimmons
103 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Other Quizlet setsGEO PRE Lab- Quiz 11
14 terms
Fry__Blake3PLUS
week 11 Pharm NCLEX/ ATI questions
43 terms
madisson_marie6PLUS
Aircraft Weight & Balance
53 terms
melissa_burns2013
series 66 exam 2
64 terms
Grays99