What is not considered a cloud application

Assignment Help Basic Computer Science
Reference no: EM13802289

1. You might zip a file to reduce its size and to:

A) improve packet throughput

B) bypass certain file type restrictions

C) make the file easier to read

D) improve packet switching

2. In Windows, a right click will always produce a(n):

A) Shortcut menu

B) Folder

C) File

D) Zipped file

3. Which is not part of the four operations that make up the information processing cycle?

A) Processing

B) Output

C) Storage

D) Hardware

4. Computers are made up of these three fundamental components:

A) Monitor, printer, and system unit

B) Monitor, input devices, and peripherals

C) Input, processing, and output

D) CPU, memory, and storage

5. IP stands for

A) Internet Protocol

B) Internet provider

C) Internet priority

D) Internet procedures

6. Which of the following is NOT an example of a Web Browser

A) Microsoft Internet Explorer

B) Mozilla Firefox

C) Google Chrome

D) Microsoft Office

7. A complete URL has four parts: protocol, domain name, path, and

A) Index page

B) Resource name

C) Home page

D) directory

8. Instant messaging (IM) and text messaging are ideal for:

A) Complex discussions

B) Venting anger

C) Brief conversations

D) Lengthy discussions

9. When you want to let your potential employer see the personal side of you what document would you send to him/her?

A) Resume

B) Memo

C) Transcript

D) Cover letter

10. What is NOT a characteristic of a Blog?

A) Another form of a journal

B) Easy to create

C) Can create restrictive access

D) You must have your own server to create

11. Before you are done with your research paper you should always:

A) Save your paper

B) Check the grammar

C) Check your spelling

D) All the choices

12. Descriptive words matching the qualifications that an employer posted somewhere in the resume:

A) Synonym

B) Antonym

C) Computer literacy

D) Keyword

13. One day you decide to turn in a resource paper that you found on the Internet. You are:

A) Being efficient

B) Plagiarizing

C) Legal

D) Whistle-blowing

14. What is not considered a Cloud application?

A) Multimedia devices

B) Shutterfly

C) YouTube

D) Google Docs

15. A cloud that is operated for a single organization is called:

A) Community cloud

B) Public cloud

C) Hybrid cloud

D) Private cloud

16. Given the file designator below, in which folder is the file located? C:\Spring\Computer\Homework\Assg1.doc

A) Homework

B) C:

C) Computer

D) Spring

17. Application files commonly have the extension:

A) .prog

B) .txt

C) .docx

D) .exe

18. If you ____ a file, the original is left intact and a duplicate is created in a new location.

A) Move

B) Delete

C) Create a shortcut to

D) Copy

19. Which character is permitted in file names?

A) Space

B) :

C) /

D) >

20. Which application created by Microsoft is considered a digital notebook?

A) Microsoft PowerPoint

B) Microsoft Publisher

C) Microsoft OneNote

D) Microsoft Access.

Reference no: EM13802289

Questions Cloud

Discuss the differences between windows and mac os : Apple's Mac OS is a major competitor for Windows and many people feel very strongly about choosing one over the other. Locate articles online that discuss the differences between Windows and Mac OS
Effectiveness in improving the quality of u.s. elementary : The policies' effectiveness in improving the quality of U.S. elementary and secondary education. Justify your assessment by clearly explaining your definition of "effectiveness" and how it should be measured or determined.
Question regarding the employee motivation : Managers have observed that employees are of three types: committed, compliant, or resistant. Most organizational leaders prefer committed employees because they exhibit motivation and willingness to sacrifice for the organization.
Write a response paper about the book strngth in what remain : Write a response paper about the book "strngth in what remains".
What is not considered a cloud application : One day you decide to turn in a resource paper that you found on the Internet. What is not considered a Cloud application
Political party loyalty or campaign money may influence : Discuss fact-based evidence about how interest groups, political party loyalty, or campaign money may influence your representative. Can these influences weaken his or her effectiveness as a true "representative" of the district
Making effective and ethical decisions : Complete the experiential exercise 5.1 Assessing Yourself at the end of the chapter, "Ethics and Corporate Responsibility." Based on your score, create a plan to increase your skills in making ethical decisions in the workplace.
Visual language and culture paper : Visual Language and Culture Paper
Create a new string called passwd : Create a class called Hw1FirstLastName.javain a project called hw1firstlastname. Create a new string called passwd formed by concatenatingevery alternate non-spacecharacter in sentencestarting with the first

Reviews

Write a Review

Basic Computer Science Questions & Answers

  An information systems project to increase data security

What issues need to be considered when planning an information systems project to increase data security

  Use of authentication types techniques impact security

Explain how the use of authentication types techniques impact security

  Solve this problem with solution :homogeneous coordinates

solve this problem with solution :homogeneous coordinates

  How many gigabytes in a petabyte

How many gigabytes in a petabyte

  Security by implementing database auditing

You are a DBA for corporation's databases. The management has decided to increase security by applying database auditing yet they are unspecific what actions to audit.

  First argument of the function

Implement the given function above. The first argument of the function is a vector of "v" integers and the second argument is an integer "k". The function returns the number of times "k" occurs in "v".

  Java / xml example that utilizes some form of recursion

Java / XML example that utilizes some form of recursion. Include blocks of code and the XML with your example

  Explain how primitive values like doubles are passed

Explain how primitive values like doubles are passed between functions in Java. How are string objects passed between functions in Java?

  How to convert a string of binary into decimal

how to convert a string of binary into decimal and a decimal into binary using java

  Write a class that maintains the top 10 scores

but use a singly linked list instead of an array Part 2: Implement the stack and queue with a single class interfaces with a unique class that is derived from class LinkedDeque (Code Fragment 5.21)

  Identify telecommunication component technology

Identify one telecommunication component technology - 3-5 appendix pages including spreadsheets, Datas , and diagram tables if any available or any references.

  Explain company-s business intelligence products and service

Go to IBM.COM discover all company's business intelligence (BI) products and services Explain their process in minimum of half page to full page.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd