Description : The process of copying file to a CD is known as: a) Storing b) Burning c) Pasting d) Copying e) None of These
Last Answer : b) Burning
Description : In social websites like this one, what is your opinion about people divulging your real name or copying & pasting excerpts from chatrooms into forum posts?
Last Answer : I think anyone that knows me well enough to know my name or chat with me would be able to use that info with discreetness. But it might be different for other people. I think we all have our own rules when it comes to that.
Description : condensing output data to exhibit specific information is a. calculating b. recording c. merging d. summarizing
Last Answer : recording
Description : What is the process of copying software programs from secondary storage mediato the hard disk called? (A) Configuration (B) Download (C) Storage (D) Upload (E) Installation
Last Answer : Upload
Description : Name the two South Asian economists who worked together to bring out the initial Human Development Report. -Geography
Last Answer : Dr. Mahbub-ul-Haq and Dr. Amartya Sen.
Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received in the same order as sent order d. it sends data very quickly
Last Answer : a. all UDP packets are treated independently by transport layer
Description : User datagram protocol is called connectionless because _____________ a. all UDP packets are treated independently by transport layer b. it sends data as a stream of related packets c. it is received ... order d. it sends data very quickly Answer: Option(a) 4. Transmission control protocol ____
Description : User datagram protocol is called connectionless because _____________ A. all UDP packets are treated independently by transport layer B. it sends data as a stream of related packets C. it is received in the same order as sent order D. it sends data very quickly
Last Answer : A. all UDP packets are treated independently by transport layer
Description : User datagram protocol is called connectionless because _____________ a) all UDP packets are treated independently by transport layer b) it sends data as a stream of related packets c) it is received in the same order as sent order d) it sends data very quickly
Last Answer : all UDP packets are treated independently by transport layer
Description : In the first books of "Jason Bourne" by Robert Ludlum, is it realistic that the military and the CIA work together in a black ops project just to bring down one single man?
Last Answer : As I remember, Jason Bourne was a made up person. Yes, David Webb was a commando that played the role when a real human was needed. But they attributed pretty much every nifty hit that occurred in the ... Webb (Bourne). Could the CIA and military have cooked up such a thing? I don't see why not.
Description : The default view in Excel is“““.view. (A) Work (B) Auto (C) Normal (D) Roman (E) None of these
Last Answer : Normal
Description : Why does the copy and pasting of a text into a search engine not always work lately?
Last Answer : I have run into this sort of thing before. I don't know if you are facing the same problem. Apparently some sites have sneaky embedded Javascript that somehow prevents a person from correctly ... when pasted was not the one expected. It sounds like you are experiencing a somewhat different problem.
Description : Pasting wet clay ribbons and making patterns on them is known as ____________ work.
Last Answer : Choose the correct alternative and write the complete sentence: Pasting wet clay ribbons and making patterns ... (c) apply (d) amalgamation
Description : Loose Droppings that stick to the feathers around the vent area in birds is known as? [a] Pasty butt [b] Pasting [c] Paste up [d] Pasted vent [e] All of the above
Last Answer : [e] All of the above
Description : Auditing is based on the assumption that financial data are verifiable. Data are verifiable when two or more qualified individuals, a. Working together, can prove, beyond doubt, the accuracy of ... reach essentially similar conclusions. d. Working together, can agree upon the accuracy of the data
Last Answer : Working independently, each reach essentially similar conclusions
Description : Two non-allelic genes produces the new phenotype when present together but fail to do so independently then it is called (a) epistasis (b) polygene (c) non complementary gene (d) complementary gene.
Last Answer : epistasis
Description : What displays thecontents of the active cell in Excel ? (A) Name box (B) Row Headings (C) Formula bar (D) Task pane (E) None of these
Last Answer : Name box
Description : The basic unit ofa worksheet into which you enter data in Excel is called a– (A) tab (B) cell (C) box (D) range (E) None of these
Last Answer : cell
Description : Is it acceptable for a Jelly to answer questions by cutting and pasting articles from other websites?
Last Answer : No, you should report these. Answers are supposed to be credited if taken from somewhere else.
Description : How can I prevent accidental pasting in bash?
Last Answer : bash is old enough that I doubt anyone has put something like that in. Might be something better implemented in the terminal-- are you using a local tty or some sort of remote terminal app?
Description : Whats a lightwieght program for copy-pasting pictures?
Last Answer : Copy-Pasting? I'm kinda lost as to what you mean. Anyway, try Paint.Net if you are on Windows. http://www.getpaint.net/ , or http://picasa.google.com/ .
Description : The use of spooler programs and/or “. Hardware allows personal computer operators to do the processing work at the same time a printing operation is in progress a. Registered mails b. Memory c. CPU d. Buffer
Last Answer : Buffer
Description : What the historical method of compiling a dictionary was first used by Dr. Samuel Johnson. True?
Last Answer : Need answer
Description : _____is the process of finding errors in software code. 1) Compiling 2) Testing 3) Running 4) Debugging 6 5) None of these
Last Answer : Answer :4
Description : Which of the following is the process of assembling program components, data, and libraries, and then compiling and linking these to create an executable system? a) System building b) Release management c) Change management d) Version management
Last Answer : a) System building
Description : High level language C supports register transfer technique for _ application. a. Executing b. Compiling c. Both d. None
Last Answer : a. Executing
Description : What is correcting errors in a program called? 1) Debugging 2) Compiling 3) Interpreting 4) None of these
Last Answer : 1) Debugging
Description : Compiling creates a(n)- 1) Program Specification 2) Algorithm 3) Executable Program 4) Subroutine
Last Answer : 3) Executable Program
Description : The Process of writing out computer instructions is known as- 1) Assembling 2) Compiling 3) Executing 4) coding
Last Answer : 1) Assembling
Description : ..... is the process finding errors in software code. 1) compiling 2) Assembling 3) Interpreting 4) Debugging
Last Answer : 4) Debugging
Description : The process of combining strings is known as (1) compiling (2) Combining (3) Attaching (4) Concatenation
Last Answer : Concatenation
Description : In programming, repeating some statements is usually called (1) Compiling (2) Structure (3) Looping (4) Control structure
Last Answer : Looping
Description : Which of the following statement is incorrect? A. The Addresses Resolution Protocol, ARP, allows a host to find the physicaladdress ofa target host on the samephysical network, given only the target IP address. ... -addresses of our choice to every machine. D. All of theabove E. None of the above
Last Answer : All of theabove
Description : What is the name of the softwarepackage that allows peopleto sendelectronic mail along anetworkof computers and workstations? A. Memory residentpackage B. Project management package C. Data communication package D. Electronic mail package E. None of the above
Last Answer : Data communication package
Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above
Description : Which one of the following statements is NOT correct about HTTP cookies? a. A cookies is a piece of code that has the potential to compromise the security of an Internet user b. A cookie gains entry ... and time d. Cookies can be used to track the browsing pattern of a user at a particular site
Last Answer : a. A cookies is a piece of code that has the potential to compromise the security of an Internet user
Description : You are designing a network which needs to support 200 users. You don't plan to extend the segment beyond the current number of users. Which subnet mask would best meet your needs? Select the best answer. A. 255.255.0.0 B. 255.255.255.0 C. 255.0.0.0 D. 255.224.0.0 E. 255.255.255.200
Last Answer : 255.255.255.0
Description : Which of the following does not allow multiple users or devices toshare onecommunications line? A. doubleplexer B. multipplexer C. concentrator D. controller E. None of the above
Last Answer : doubleplexer
Description : How do I leave certain cells in an Excel spreedsheet unlocked so that other users can modify them?
Last Answer : I wonder if the fact that the cells I’m trying to leave unlocked are merged is part of what is creating this problem…?
Description : Which of the following memories allows simultaneous read and write operations? a. ROM b. RAM c. EPROM d. None of above
Last Answer : RAM
Description : What type of network device allows youto share your connection to the Internet with other computers in your home? A) Ethernet card B) NIC C) Router D) Cat 5
Last Answer : Router
Description : In _________, autonegotiation allows two devices to negotiate the mode or datarate of operation. A) Standard B) Fast Ethernet C) Gigabit Ethernet D) Ten-Gigabit Ethernet
Last Answer : Fast Ethernet
Description : A _______LAN allows several LANs to be connected. A) backbone B) wireless C) wired D) none of the above
Last Answer : backbone
Description : _____ isa digitalprocess that allows several connections to share thehighbandwidth ofa link. A) FDM B) TDM C) WDM D) None of the above
Last Answer : TDM
Description : ________is the set of techniques that allows the simultaneous transmission of multiple signalsacrossa single data link. A) Demodulating B) Multiplexing C) Compressing D) None of the above
Last Answer : Multiplexing
Description : The Federal Communications Commission (FCC) allows ______ kHz for each FM station. A) 20 B) 100 C) 200 D) none of the above
Last Answer : 100
Description : The Federal Communications Commission (FCC) allows ______kHz for each AM station. A) 5 B) 10 C) 20 D) none of the above
Last Answer : 0
Description : IPv6 allows _________ security provisions than IPv4. A) more B) less C) thesame level D) noneof the above
Last Answer : more
Description : The _______ protocol allows the administrator toassign acost, called the metric, to each route. A) OSPF B) RIP C) BGP D) none of the above
Last Answer : OSPF
Description : What type of telecommunicationshardware allows you to access the web? A) Browser B) Modem C) FTP protocol D) IRC
Last Answer : Modem