Filters
Question type

​Which of the following options is a useful format for your resume?


A) ​Print
B) ​Email
C) ​HTML
D) ​all of the above

E) All of the above
F) B) and D)

Correct Answer

verifed

verified

​_____________ is the use of ICT technology to carry out politically motivated attacks designed to infiltrate, sabotage, or damage an opponent's information systems and defensive capabilities.

Correct Answer

verifed

verified

​Atanasoff-Berry Computer is often considered the first electronic digital computer.

A) True
B) False

Correct Answer

verifed

verified

​A(n) ____________  administrator plans, installs, and maintains one or more local area networks and may also manage cloud resources.

Correct Answer

verifed

verified

​___________ refers to transmitting text or symbolic information over long distances without the use of a living carrier, such as a courier.

Correct Answer

verifed

verified

​A manual calculator implements algorithms autonomously.

A) True
B) False

Correct Answer

verifed

verified

​It was not until the ______-generation of computers that portable operating systems, such as CP/M and UNIX, provided programmers with similar operating system commands across hardware platforms.

Correct Answer

verifed

verified

​Which of the following descriptions best matches that of computer engineering degree?


A) ​Focuses on computer architecture and how to program computers to make them work effectively and efficiently.
B) ​Focuses on applying computers to business problems.
C) ​Focuses on computer equipment and software used by businesses.
D) ​Focuses on the design of computer hardware and peripheral devices, often at the chip level.

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

A computer _________ is any person whose primary occupation involves the design, configuration, analysis, development, modification, testing, or security of computer hardware or software.

Correct Answer

verifed

verified

​Early computers that held both programs and data in memory became known as ________ architecture.

Correct Answer

verifed

verified

​Babbage's __________ was an all-purpose computing device.

Correct Answer

verifed

verified

​Which of the following information technology laws makes it illegal to circumvent copy-protection technologies, such as those used to prevent unauthorized copying of software CDs, music CDs, and movie DVDs?


A) ​Electronic Communications Privacy Act
B) ​Fair Use Doctrine
C) ​United States Copyright Act
D) ​Digital Millennium Copyright Act

E) None of the above
F) A) and D)

Correct Answer

verifed

verified

​Which of the following would be considered a third-generation computer?


A) ​IBM 360
B) ​UNIVAC
C) ​Z3
D) ​MITS Altair

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

​_________ is the monetary value of all the goods and services produced by a nation's workforce on an annual?basis.


A) Productivity​
B) ​GDP
C) ​ITC growth
D) ​PLC

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

​If you are hired as an entry-level programmer, your job title would be a(n) ___________ programmer.

Correct Answer

verifed

verified

​Certification alone is sufficient to qualify for a job in the IT industry.

A) True
B) False

Correct Answer

verifed

verified

​The first cellular phones to access the Internet and the Web were available in 1996.

A) True
B) False

Correct Answer

verifed

verified

​A stock market _________ refers to a sharp rise in stock values that is later followed by a sudden decline.

Correct Answer

verifed

verified

​In economics, _________ are things that can be used or consumed, whereas _________ are intangible actions performed for a consumer.


A) ​goods, services
B) ​services, goods
C) ​assets, services
D) ​none of the above

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

​The Harvard Mark I was digital but used _________ rather than binary representation.

Correct Answer

verifed

verified

Showing 61 - 80 of 117

Related Exams

Show Answer