Ovido
Lingua
  • Inglese
  • Spagnolo
  • Francese
  • Portoghese
  • Tedesco
  • Italiano
  • Olandese
  • Svedese
Testo
  • Maiuscole

Utente

  • Accedi
  • Crea account
  • Passa a Premium
Ovido
  • Home
  • Accedi
  • Crea account

FBLA Intoduction to Technolgy Part 1 Section 4

WHICH OF THE FOLLOWING firlds would be the best choice for a primary key?

Socail Securtiy NUMBER

Which type of information system is used to track measurements of final product quality?

Statstical quality conntrol(SQC)

Which of the following describes a system for providing supplies to a factory at the last moment before production?

Just-in-time delivery

Which type of information system does not allow users to modify the software?

Closed system

A type of software used to coordinate a group of projects is called

Shareware

Which of the following older languages was developed for mathmatical and scientific programming?

FORTRAN

Which of the following was developed as learning language?

BASIC

A fax is usually sent through existing telephone lines using__signals.

analog

which of the following allows spoken messages to be received by special telephone equipment that records,storesm, forwards, and plays back.

Voice messaging

Text, sound, or pictures that are turned into binary files for computers to display are known as

Digital media

A program that is built5 to partly automate a complex process by helping a ser through masses of options or raw data is called a(n)

intelligent agent

An element that tries to emulate the working of the human frain is a

cognitive method

Which of the following viruses is triggered when the computer's clock reaches a certain date?

Time bomb

Which of the following action is most commonly taken by computer viruses?

Data destruction

Which of the following is a program that displays all network traffic?

Network hub

What is a diffference between a software virus and a software worm?

A worm actively tries to send itself places

Unique identification numbers coded into hardware and software are known as

cookies

Personal information gathered by businesses for marketing purposes are compiled into

consumer profiles

Infrared technology transmits data by sending

light waves

A CISCO certificate that qualifies people as advanced netork designers is the

CCDP

The attempts to deny network accesss to unauthorized users

firewall

Microsoft's certificaiton for professional who develop and maintain Web sites is the

Microsoft Certified Professional+Site Building

which of the following as a physical injury associated with working on a computer?

Carpal tunnel syndrome

All of the following are examples of wireless technologies except

fiber-optic

Which of the following statements refers to the study of the interaction between humans and the equipment they use?

Ergonomics

A computer system that allows users to pose queries in less than absolute terms, and that allows for concepts such as very good, or somewhat low, would be employing

fuzzy logic

the transmisison of data over computer networks is characterized by all of the following except

frequency

which of the following is a device that sends messages along a network bus in either direction?

transceier

Which of the following is software designed to allow one person to watch the activites of another over a network?

Spyware

the ___is an electronic device used in a Local Area Network to link computers and allow them to communicate with each other.

hub

when information has to travel a long distance within a network and the wires and cables are not designed to carry information the full distance, which of thefollowing can be used?

An amplifier

XYZ Corportaion uses two different types of networks, but wants the two different networks to communciate. XYZ Corporation could use a

gateway

Which of the following terms is a set of rules and procedures for exchanging information among computers on a network?

Protocol

which of the following increases the efficiency of a network system by allowing low-speed devices to share a single high-speed communications medium?

Multiplexer

ring and star topology networks use which of the following protocols?

token ring

A client/server computing environment is one in which

Processing can be distributed on the network among "clients" that request information and one or more network "servers" that store data

Quiz
FBLA Intoduction to Technolgy Part 1 Section 3
FBLA Intoduction to Technolgy Part 1 Section 2
FBLA Intoduction to Technolgy Part 1 Section 1
VAE300
Fysik/begrepp
Fysik/frågor
15.4 Handel, dienstverlening en verzekeringen
15.3 Onderneming
15.2 Industrie, ambacht en techniek
15.1 Landbouw, visserij, mijnbouw
chap.10 vocab
French Sentences
انیمیشن ها و سازنده و ژانر
BlankaFrench
Svenska
europe apres le moyenne age
The Story On Job
microbes
microbes biooooo
Poesia trovadoresca
Family (THEORIES)
Family (CHILDHOOD)
vocabulario 4
NP 1 - copie
NP 1 - copy
NP 1 - copie
KLAR- Rörelseapparatens sjukdomar
Indigenous People
KLAR- Nervsystemets sjukdomar
Engels
Julain
Unit 5
masters of recall
sacramenten godsdienst
ingles tema 1
Born a crime 4
polski
Deutsch
Family (COUPLES)
nyckeltal :(
Digital Communication
شیوه های کاربردی و تزئینی خوشنویسی
trabalho
خوشنویسی در سده های مختلف جدول ص ۲۱۸
ekonomistyrning
Plant disease
Unit 5- Vocanulary
L.J
vocaboulary 3
Juhn Hwahn Bup (Spinning Techniques)