-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (40)
Sets found in the same folderOther sets by this creatorVerified questionscomputer science
Verified answer
computer science
Verified answer
computer science
Verified answer
computer science
Create a dictionary object from two lists. The first list is the keys and the second list is the values of the created dictionary. Note that keys are unique. Only the first occurrence of a key and the corresponding value should be appended to the created dictionary. Example: A = [1, 2, 2, 5, 1, 20, 5, 1, 0, -10], B = ['A', 'B', 'C', 'D', 'E', 'F', 'G', 'H', 'I', 'J'], created dictionary: {1: 'A', 2: 'B', 5: 'D', 20: 'F', 0: 'I', -10: 'J'}
Verified answer
Recommended textbook solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th EditionJack T. Marchewka
346 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface
5th EditionDavid A. Patterson, John L. Hennessy
220 solutions
Introduction to Algorithms
3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen
726 solutions
Answer-
Option C is the correct answer.
Option A - .gov is a domain in the system of the domain names. It is restricted to the use of government entities. Hene, this option is incorrect.
Option B - It is a top-level domain used for the word network. It is designed for networking and technology companies. It is used by companies to launch their business online. Because of this, this choice is wrong.
Option C - A top-level domain name used by research centers and educational institutions. Websites with the .edu top-level domain are considered to be credible websites. Therefore, this option is correct.
Option D - It indicates an informational website that is globally recognized. It is considered to be an alternative to .com and .org domains. It is an unrestricted domain and can be created by anyone for any purpose. Hence this is the wrong choice.
The concept of the Internet was developed by the U.S. Department of Defense as a network that ________ in event of an attack
a. provides point to point connections
b. would not be disrupted easily
c. allows commerce to continue
d. would not be easily hacked
ch3&5
In the URL //www.microsoft.com/surface, the portion labeled ".com" is the ________.
host, top-level domain, protocol, domain name
a. host
b. top-level domain
c. protocol
d. domain name
ch3&5
The "s" in "https" stands for ________ socket layer.
social semantic secure server
social semantic secure server
ch3&5
Which of the following is a feature of Live bookmarks?
-Streams live television programs
- Broadcasts webinars
- Enables you to pin your favorite website images
- Adds RSS technology to bookmarks
-Streams live television programs
- Broadcasts webinars
- Enables you to pin your favorite website images
- Adds RSS technology to bookmarks
ch3&5
In the URL //www.microsoft.com/surface, the portion labeled "surface" is the ________.
subdirectory
protocol
domain name
top-level domain
subdirectory
protocol
domain name
top-level domain
The unique identification number assigned to your computer when you connect to the Internet is known as all of the following EXCEPT ________.
IP address
dotted decimal
dotted quad
path
IP address
dotted decimal
dotted quad
path
AND, OR, and NOT are examples of ________ operators.
Jacobean relational Boolean keyword
Jacobean relational Boolean keyword
Which of the following top-level domains identifies a degree-granting institution?
.gov .net .info .edu
A subset of e-commerce that uses social networks to assist in marketing and purchasing products is known as ________ commerce.
social source crowd friend
social source crowd friend
All of the following are tips for professional e-mail etiquette EXCEPT ________.
- use abbreviations such as "u," "r," and "BRB" to keep the e-mail message shorter
-include a meaningful subject line
- use spell-checker and proofread before sending
- be concise and to the point
- use abbreviations such as "u," "r," and "BRB" to keep the e-mail message shorter
- include a meaningful subject line
-use spell-checker and proofread before sending
- be concise and to the point
The "fathers of the Internet" are Vinton Cerf and ________.
Robert Kahn, Robert Cailliau, Tim Berners-Lee, Bill Gates
Robert Kahn
Robert Cailliau
Tim Berners-Lee
Bill Gates
A(n) ________ is installed on your computer, and when the program is opened, your e-mail is downloaded to your computer.
e-mail client, web-based e-mail, e-mail server, e-mail host
e-mail client
web-based e-mail
e-mail server
e-mail host
A ________ is a personal journal posted on the web.
blog webcast wiki podcast
blog webcast wiki podcast
A ________ allows visitors to add, remove, or edit its content.
wiki blog chat podcast
The Internet is ________.
- the same as the web
-an internal communication system for businesses
-a large network of networks
-a communication system for the U.S. military
-the same as the web
-an internal communication system for businesses
-a large network of networks
-a communication system for the U.S. military
Match each of the following domains to the site that would use it:
Apple .edu
Harvard .ca
White House .org
Red Cross .com
Ontario Government .gov
Apple .com
Harvard .edu
White House .gov
Red Cross .org
Ontario Government .ca
protocol that allows files to be transferred from a web server
C2C - transactions between two individuals
transactions between two individuals
FTP - protocol that allows files to be transferred over the internet
protocol that allows files to be transferred over the internet
B2C - transactions between a company and its customers
transactions between a company and its customers
All of the following are examples of network operating systems EXCEPT ________.
- Linux - Windows 10 -OS X -MS-DOS
- Linux - Windows 10 -OS X -MS-DOS
When using Windows File Explorer, which view provides the most information at a glance?
List Details Tiles Content
List Details Tiles Content
The ________ of the operating system enables users to communicate with the computer system.
-network adapter card
-modem
-user interface
-window
- network adapter card
- modem
-user interface
-window
Which of the following operating systems are used on most tablets?
-BlackBerry and Windows
-Windows and iOS
-Windows and Android
-Android and iOS
-BlackBerry and Windows
-Windows and iOS
-Windows and Android
-Android and iOS
Each device attached to your computer has a special program called a(n) ________ that enables the device and operating system to communicate with each other.
interpreter, device driver, translator, device configurator
interpreter
device driver
translator
device configurator
Which of the following is the name of a Microsoft Excel file?
inventory.accdb
inventory.wpd
inventory.pdf
inventory.xlsx
inventory.accdb
inventory.wpd
inventory.pdf
inventory.xlsx
OS X is the operating system developed by ________.
Microsoft Linux Google Apple
Microsoft Linux Google Apple
Using hard disk space to temporarily store data or instructions from RAM is referred to as the ________.
virtual memory,
compressor,
interrupt sequencer,
spool
virtual memory
compressor
interrupt sequencer
spool
The two major types of system software programs are utility programs and the ________.
charms
operating system
application software
user interface
charms
operating system
application software
user interface
C: denotes a(n) ________ directory that is at the top of the filing structure of a computer.
cluster top-level upper-level root
cluster
top-level
upper-level
root
The location of a file is specified by its ________.
drive identifier
file type
file extension
file path
drive identifier
file type
file extension
file path
The Mac OS was the first commercially available OS to incorporate ________.
sound
point and click technology
networking
color graphics
sound
point and click technology
networking
color graphics
In the late 1980s, computer specialists were concerned that proprietary software had too many ________, so they started working on open source projects.
spiders, worms, bugs
You can use the Windows ________ to check on a nonresponsive program.
System Restore, Backup utility, Error-checking, Task Manager
System Restore
Backup utility
Error-checking
Task Manager
Which utility temporarily removes redundancies in a file to reduce the file size?
Disk Cleanup
Error-checking
File Compression
Disk Defragmenter
Disk Cleanup
Error-checking
File Compression
Disk Defragmenter
Match each of the following terms to its meaning:
Kernel
Virtual Memory
Swap file
Spooler
Paging
kernel- operating system supervisor program
virtual memory- process of optimizing RAM storage by using hard drive space
swap file - temporary storage area on the hard drive
spooler- coordinates print jobs
paging - the process of swapping data between RAM and a swap file
- operating system supervisor program
- process of optimizing RAM storage by using hard drive space
-temporary storage area on the hard drive
-coordinates print jobs
-the process of swapping data between RAM and a swap file
(goes with previous card)
Match each of the following terms to its file type (category):
.pdf image
.jpg portable document format
.zip web page
.accdb compressed files
.html Microsoft Access
.pdf portable document format
.jpg image
.zip compressed files
.accdb Microsoft Access
.html web page