Which of given statements is true for programming languages

Assignment Help Computer Engineering
Reference no: EM131568590

Assignment

Question 1
Every computer on the Internet has a(n) __________ address.
favorite
server
ISP
IP

Question 2
Which of the following statements is true for programming languages?
Compilers translate high-level language programs into machine language programs.
Interpreter programs use assembly language as input.
Interpreted programs run faster than compiled programs.
None of the above.

Question 3
When a network does not have a server, all the computers essentially are equal, and programs and data are distributed among them. This is called a __________ network.
local area
simple
peer-to-peer
PC-to-PC

Question 4
A __________ is a person or an organization that seeks to obtain or alter data or other IS assets illegally without the owner's permission and often without the owner's knowledge.
target
key escrow
vulnerability
threat

Question 5
The term "open source" means that the source code of the program is __________.
less stable and platform dependent
available to the public
available exclusively through licensing
available only to carefully vetted contractors

Question 6
Which of the following are examples of information systems?
ATM
College registration system
Accounts payable
All of the above

Question 7
Cloud resources are __________ because many different organizations use the same physical hardware.
pooled
programmatic
portable
elastic

Question 8
An MIS does not help managers to gain:
market niche.
competitiveness.
operational efficiency.
none of the above.

Question 9
Which of the following is the presentation format of an application?
User interface
Botnet
Cookie
Process blueprints

Question 10
Scientific tools used to manipulate information to help choose the best of several possibilities is:
decision support systems.
transaction processing systems.
neural networking.
AI.

Question 11
Which of the following is the largest unit of measurement?
Terabyte
Megabyte
Kilobyte
Gigabyte

Question 12
Which of the following conditions exist when data are isolated in separated information systems?
Data segregation
Information silo
Information overload
Encapsulation

Question 13
What is source code?
An open source framework
File(s) containing statements that provide program instructions
A program that produces machine code
The object code

Question 14
A login password should not include __________.
lowercase letters
uppercase letters
personal information, such as birthdays
more than 8 characters

Question 15
Mark is transferring funds online through the website of a reputed bank. Which of the following will be displayed in the address bar of his browser that will let him know that the bank is using the SSL protocol?
ftp
https
.com
www

Question 16
The suite of communications protocols used in the Internet is called:
none of the above.
URL.
TCP/IP.
HTML.

Question 17
__________ is the activity of altering existing and designing new business processes to take advantage of new information systems.
Business process outsourcing
Business process modeling
Business process reengineering
Enterprise resource planning

Question 18
The physical components of a computer are referred to as __________.
software
hardware
configurations
specifications

Question 19
A(n) __________ is a computer program that senses when another computer is attempting to scan the disk or otherwise access a computer.
keylogger
access control system
intrusion detection system
botnet

Question 20
A relational DBMS allows you to create database structures containing __________.
table relationships
fields
tables
all of the above.

Reference no: EM131568590

Questions Cloud

Describe the criteria used to select winners : Explain what the TuringAward is and describe the criteria used to select winners. List six past winners of the award and why they received the award.
Discuss and explain time value of money : Discuss and explain Time Value of Money. How could it be used? Provide examples to illustrate your points.
How quickly processors can perform operations : Describe the historic trends in how quickly processors can perform operations and use these trends to estimate how quickly processors will be able to perform.
What are some challenges that globalizing companies create : What are the initiatives and criteria the OFS should have in its Balanced Scorecard? What are some challenges that globalizing companies create?
Which of given statements is true for programming languages : Which of the following statements is true for programming languages? Which of the following are examples of information systems?
What legislation will apply to a retail lease : What are the primary obligations of the landlord regarding a retail lease, particularly regarding disclosure requirements and the length of lease
Solutions for a real-life strategic problem : Solutions For a Real-Life Strategic Problem - Choose an organisation that is presently featured in the Australian media in a negative light.
Find the number of comparisons used by the bubble sort : Using a generator of random orderings of the integers 1, 2,...,n, find the number of comparisons used by the bubble sort, insertion sort, binary insertion sort.
What is the date for the most recent report : What is the date for the most recent report? Summarize the policy actions of the Board of Governors during the most recent period.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd