Terms in this set (40)Sets found in the same folderOther sets by this creatorVerified questionscomputer science Verified answer
computer science Verified answer
computer science Verified answer
computer science Create a dictionary object from two lists. The first list is the keys and the second list is the values of the created dictionary. Note that keys are unique. Only the first occurrence of a key and the corresponding value should be appended to the created dictionary. Example: A = [1, 2, 2, 5, 1, 20, 5, 1, 0, -10], B = ['A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', 'I', 'J'], created dictionary: {1: 'A', 2: 'B', 5: 'D', 20: 'F', 0: 'I', -10: 'J'} Verified answer Recommended textbook solutions
Other Quizlet setsRelated questionsRecommended textbook solutions
Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions Computer Organization and Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, John L. Hennessy 220 solutions
Introduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen 726 solutions Answer- Option C is the correct answer. Option A - .gov is a domain in the system of the domain names. It is restricted to the use of government entities. Hene, this option is incorrect. Option B - It is a top-level domain used for the word network. It is designed for networking and technology companies. It is used by companies to launch their business online. Because of this, this choice is wrong. Option C - A top-level domain name used by research centers and educational institutions. Websites with the .edu top-level domain are considered to be credible websites. Therefore, this option is correct. Option D - It indicates an informational website that is globally recognized. It is considered to be an alternative to .com and .org domains. It is an unrestricted domain and can be created by anyone for any purpose. Hence this is the wrong choice.
The concept of the Internet was developed by the U.S. Department of Defense as a network that ________ in event of an attack a. provides point to point connections b. would not be disrupted easily c. allows commerce to continue d. would not be easily hacked ch3&5 In the URL https://www.microsoft.com/surface, the portion labeled ".com" is the ________. host, top-level domain, protocol, domain name a. host b. top-level domain c. protocol d. domain name ch3&5 The "s" in "https" stands for ________ socket layer. social semantic secure server social semantic secure server ch3&5 Which of the following is a feature of Live bookmarks? -Streams live television programs - Broadcasts webinars - Enables you to pin your favorite website images - Adds RSS technology to bookmarks -Streams live television programs - Broadcasts webinars - Enables you to pin your favorite website images - Adds RSS technology to bookmarks ch3&5 In the URL https://www.microsoft.com/surface, the portion labeled "surface" is the ________. subdirectory protocol domain name top-level domain subdirectory protocol domain name top-level domain The unique identification number assigned to your computer when you connect to the Internet is known as all of the following EXCEPT ________. IP address dotted decimal dotted quad path IP address dotted decimal dotted quad path AND, OR, and NOT are examples of ________ operators. Jacobean relational Boolean keyword Jacobean relational Boolean keyword Which of the following top-level domains identifies a degree-granting institution? .gov .net .info .edu A subset of e-commerce that uses social networks to assist in marketing and purchasing products is known as ________ commerce. social source crowd friend social source crowd friend All of the following are tips for professional e-mail etiquette EXCEPT ________. - use abbreviations such as "u," "r," and "BRB" to keep the e-mail message shorter -include a meaningful subject line - use spell-checker and proofread before sending - be concise and to the point - use abbreviations such as "u," "r," and "BRB" to keep the e-mail message shorter - include a meaningful subject line -use spell-checker and proofread before sending - be concise and to the point The "fathers of the Internet" are Vinton Cerf and ________. Robert Kahn, Robert Cailliau, Tim Berners-Lee, Bill Gates Robert Kahn Robert Cailliau Tim Berners-Lee Bill Gates A(n) ________ is installed on your computer, and when the program is opened, your e-mail is downloaded to your computer. e-mail client, web-based e-mail, e-mail server, e-mail host e-mail client web-based e-mail e-mail server e-mail host A ________ is a personal journal posted on the web. blog webcast wiki podcast blog webcast wiki podcast A ________ allows visitors to add, remove, or edit its content. wiki blog chat podcast The Internet is ________. - the same as the web -an internal communication system for businesses -a large network of networks -a communication system for the U.S. military -the same as the web -an internal communication system for businesses -a large network of networks -a communication system for the U.S. military Match each of the following domains to the site that would use it: Apple .edu Harvard .ca White House .org Red Cross .com Ontario Government .gov Apple .com Harvard .edu White House .gov Red Cross .org Ontario Government .ca protocol that allows files to be transferred from a web server C2C - transactions between two individuals transactions between two individuals FTP - protocol that allows files to be transferred over the internet protocol that allows files to be transferred over the internet B2C - transactions between a company and its customers transactions between a company and its customers All of the following are examples of network operating systems EXCEPT ________. - Linux - Windows 10 -OS X -MS-DOS - Linux - Windows 10 -OS X -MS-DOS When using Windows File Explorer, which view provides the most information at a glance? List Details Tiles Content List Details Tiles Content The ________ of the operating system enables users to communicate with the computer system. -network adapter card -modem -user interface -window - network adapter card - modem -user interface -window Which of the following operating systems are used on most tablets? -BlackBerry and Windows -Windows and iOS -Windows and Android -Android and iOS -BlackBerry and Windows -Windows and iOS -Windows and Android -Android and iOS Each device attached to your computer has a special program called a(n) ________ that enables the device and operating system to communicate with each other. interpreter, device driver, translator, device configurator interpreter device driver translator device configurator Which of the following is the name of a Microsoft Excel file? inventory.accdb inventory.wpd inventory.pdf inventory.xlsx inventory.accdb inventory.wpd inventory.pdf inventory.xlsx OS X is the operating system developed by ________. Microsoft Linux Google Apple Microsoft Linux Google Apple Using hard disk space to temporarily store data or instructions from RAM is referred to as the ________. virtual memory, compressor, interrupt sequencer, spool virtual memory compressor interrupt sequencer spool The two major types of system software programs are utility programs and the ________. charms operating system application software user interface charms operating system application software user interface C: denotes a(n) ________ directory that is at the top of the filing structure of a computer. cluster top-level upper-level root cluster top-level upper-level root The location of a file is specified by its ________. drive identifier file type file extension file path drive identifier file type file extension file path The Mac OS was the first commercially available OS to incorporate ________. sound point and click technology networking color graphics sound point and click technology networking color graphics In the late 1980s, computer specialists were concerned that proprietary software had too many ________, so they started working on open source projects. spiders, worms, bugs You can use the Windows ________ to check on a nonresponsive program. System Restore, Backup utility, Error-checking, Task Manager System Restore Backup utility Error-checking Task Manager Which utility temporarily removes redundancies in a file to reduce the file size? Disk Cleanup Error-checking File Compression Disk Defragmenter Disk Cleanup Error-checking File Compression Disk Defragmenter Match each of the following terms to its meaning: Kernel Virtual Memory Swap file Spooler Paging kernel- operating system supervisor program virtual memory- process of optimizing RAM storage by using hard drive space swap file - temporary storage area on the hard drive spooler- coordinates print jobs paging - the process of swapping data between RAM and a swap file - operating system supervisor program - process of optimizing RAM storage by using hard drive space -temporary storage area on the hard drive -coordinates print jobs -the process of swapping data between RAM and a swap file (goes with previous card) Match each of the following terms to its file type (category): .pdf image .jpg portable document format .zip web page .accdb compressed files .html Microsoft Access .pdf portable document format .jpg image .zip compressed files .accdb Microsoft Access .html web page What domain is restricted to degree granting institutions?edu domain is the top level domain (TLD) of the Internet domain name system (DNS) that was established for use by educational institutions. Currently, it is generally restricted to use by four-year degree granting higher education institutions.
Which of the following top level domain is generally used by Internet service providers?As the internet continued to grow in use and popularity, dot-coms quickly became the most commonly used top-level domain. . net – Short for network, dot-nets were made for network technology companies like infrastructure companies or internet service providers (ISPs).
Which of the following is not considered a social networking?Hotmail is not a social networking site; instead, it offers webmail services that allow users to access their Hotmail accounts through an internet connection. Only the Hotmail username and password are required to access the account.
Are e mails are completely private?Emails are not completely private. Emails to individuals are prepared with the assumption that they would only be seen by that person, and internet providers' data rules should reflect this, but unlike a letter, an email may simply be forwarded elsewhere after it is sent.
|