Which of the following input technologies has been

Assignment Help Basic Computer Science
Reference no: EM13463735

1. Tele'Wire, a mobile manufacturer, offers free connections to customers who buy its mobile phones. This cost of connection is actually included in the price of the mobile phone. Tele'Wire is pursuing a(n) ________ approach to applying freeconomics.

  • cross subsidies
  • advertising
  • zero marginal cost
  • freemium
  • gift economy

12. While pursuing a global business strategy, the ________ prohibit(s) the implementation of local strategies, and thus a global company cannot quickly react to local challenges and opportunities.

  • threat of new entrants into the market
  • increased bargaining power of suppliers
  • threat of substitute products from other industries
  • need to achieve economies of scale
  • increased bargaining power of customers

3. In ________ networks, servers and clients have defined roles.

  • server-to-peer
  • server-centric
  • client-centric
  • peer-to-peer
  • peer-centric

4. The operating system of a computer is an example of a(n) ________ software.

  • systems
  • peripheral
  • transitory
  • open source
  • application

5. Which of the following tasks is performed by the application software?

  • presenting information via a monitor
  • writing a business letter
  • saving data to a disk
  • printing documents
  • updating the system clock

6. The CPU interacts with ________ for permanently storing data.

  • primary storage
  • random-access memory
  • output technologies
  • secondary storage
  • volatile memory

7. Which of the following is true about the graphical Web browser Mosaic?

  • It made the tracking of IP addresses possible.
  • It allowed users to open and use more than one Web page simultaneously.
  • It is the basis of popular browsers such as Internet Explorer and Mozilla Firefox.
  • It initiated file sharing on the Web.
  • It provided users with references or links to other documents.

8. A(n) ________ is also referred to as the computer's brain.

  • random-access memory
  • read-only memory
  • microprocessor
  • operating system
  • application software

9. Which of the following types of computer software utilities monitors users' incoming e-mail messages and filters unwanted messages from arriving?

  • spam blockers
  • disk and data recovery
  • antivirus
  • data compression
  • spyware detection and removal

10. Which of the following statements is true of a bus network topology?

  • The configuration of bus networks facilitates easy diagnosis and isolation of network faults.
  • In a bus network, every computer and device is connected to every other computer and device.
  • A bus network has the most complex wiring layout.
  • Extending a bus network is more difficult to achieve than it is for other topologies.
  • A bus network topology enables all network nodes to receive the same message through the network cable at the same time.

11. Google's Linux-based operating system for mobile devices is known as ________.

  • Java
  • Bada
  • iOS
  • Android
  • Symbian

12. Which of the following programming languages allows programmers to easily add a command button to a screen with a few clicks of a mouse instead of programming the button pixel by pixel and using many lines of code?

  • Web development languages
  • scripting languages
  • visual programming languages
  • object-oriented languages
  • prototype-based programming languages

13. Which of the following is an example of presentation software?

  • Mozilla Thunderbird
  • Microsoft Excel
  • Apple Keynote
  • Lotus Notes
  • ACT!

14. Which of the following functions do scripting languages perform?

  • laying out or formatting Web pages
  • checking the accuracy of user-entered information on Web pages
  • automating or supporting activities throughout the information systems development process
  • developing applications in high-speed arcade graphics
  • creating animation and video that can be compressed small enough for fast download speeds

15. Which of the following input technologies has been historically used for entering text and numbers on computers?

  • scanner
  • optical mouse
  • graphics tablet
  • QWERTY keyboard
  • joystick

Reference no: EM13463735

Questions Cloud

You have just been hired by gregs goofy gadgetsnbspyou are : you have just been hired by gregs goofy gadgets.nbspyou are an it professional and you are tasked solely with fixing
Compare the religions from anthropological perspective : the us culture has a broad spectrum of religious affiliations and religiosity. as a result of interacting with people
Hink about a reading you liked or related to discuss how : the exam asks that you write a five paragraph essay reflecting on what you have learned in this class. think about a
Describe the advantages and disadvantages of restricting : there are many kinds of input controls. write a 4-5 page paper in which youexplain the function of input
Which of the following input technologies has been : 1. telewire a mobile manufacturer offers free connections to customers who buy its mobile phones. this cost of
Why were attributions and suppositions made in each : we make attributions every day about our own behaviors and the behaviors of the people that we interact with. and
Use wireshark tool to capture packets use wireshark tool to : use wireshark tool to capture packets when you download lecture 1 from the coit20229 course webpage. before you
Te second option requires you to choose a movie from the : the second option requires you to choose a movie from the following list to view. choose a character fromnbspthe movie
Explain why there is no such thing as a best practice but : 1.explain why there is no such thing as a best practice but rather there are only good practices for a given

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explaining multiple client computers and servers

In network with multiple client computers, servers, switches and wireless access points, write down resources must be scanned for possible vulnerabilities.

  Write the definition of a function absolutevalue

Write the definition of a function absoluteValue , that receives an integer parameter and returns the absolute value of the parameter's value. So, if the parameter's value is 9 or 903 or 241 the function returns 9, 093 or 241 respectively.

  Best describes the existing state of communications

Organizational Systems security: Define the communication model that best describes the existing state of communications at your company and leverage that model to identify the weaknesses/points of failure in the existing system

  Draw a possible class diagram,uml diagram for the system

Ship A has two instruments, which provide digital information for navigation: (1) A global positioning system (GPS) measures the position and velocity of Ship A.

  Design and implement a class that allows a teacher to track

Design and implement a class that allows a teacher to track the grades in a single course. Include methods that calculate the average grade, the highest grade, and the lowest grade. I use C# and visual studio 2012

  Description of what the computer considers

For your initial post, provide your own description of what the computer considers "TRUE" and what the computer considers "FALSE." Then, provide at least two code examples (original examples) that would return TRUE, and provide a description of what ..

  Displays the factorial for every integer

Write an application that displays the factorial for every integer value from 1 to 10. A factorial of a number is the product of that number multiplied by each positive integer lower than it. For example, 4 factorial is 4 * 3 * 2 * 1, or 24.

  Is it ethical for a potential employer to use the internet

Digital Footprint , is it ethical for a potential employer to use the internet this way? Also is it legal?

  Which nameserver was provided?

Which nameserver was provided?

  Develop an understanding of domain knowledge about a range

In completing this assignment, you are expected to use available resources such as the practical activities in the study modules, the Communication skills handbook, the Course Study Desk – especially the Discussion List

  Estimate the mean and variance of the number of times

Estimate the mean and variance of the number of times you have to roll 2 dice until the total exceeds 100.

  Write a declaration for an enumerated data type

A pet store sells dogs, cats, birds, and hamsters. Write a declaration for an enumerated data type that can represent the types of pets the store sells.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd