What is not considered a cloud application

Assignment Help Basic Computer Science
Reference no: EM13802289

1. You might zip a file to reduce its size and to:

A) improve packet throughput

B) bypass certain file type restrictions

C) make the file easier to read

D) improve packet switching

2. In Windows, a right click will always produce a(n):

A) Shortcut menu

B) Folder

C) File

D) Zipped file

3. Which is not part of the four operations that make up the information processing cycle?

A) Processing

B) Output

C) Storage

D) Hardware

4. Computers are made up of these three fundamental components:

A) Monitor, printer, and system unit

B) Monitor, input devices, and peripherals

C) Input, processing, and output

D) CPU, memory, and storage

5. IP stands for

A) Internet Protocol

B) Internet provider

C) Internet priority

D) Internet procedures

6. Which of the following is NOT an example of a Web Browser

A) Microsoft Internet Explorer

B) Mozilla Firefox

C) Google Chrome

D) Microsoft Office

7. A complete URL has four parts: protocol, domain name, path, and

A) Index page

B) Resource name

C) Home page

D) directory

8. Instant messaging (IM) and text messaging are ideal for:

A) Complex discussions

B) Venting anger

C) Brief conversations

D) Lengthy discussions

9. When you want to let your potential employer see the personal side of you what document would you send to him/her?

A) Resume

B) Memo

C) Transcript

D) Cover letter

10. What is NOT a characteristic of a Blog?

A) Another form of a journal

B) Easy to create

C) Can create restrictive access

D) You must have your own server to create

11. Before you are done with your research paper you should always:

A) Save your paper

B) Check the grammar

C) Check your spelling

D) All the choices

12. Descriptive words matching the qualifications that an employer posted somewhere in the resume:

A) Synonym

B) Antonym

C) Computer literacy

D) Keyword

13. One day you decide to turn in a resource paper that you found on the Internet. You are:

A) Being efficient

B) Plagiarizing

C) Legal

D) Whistle-blowing

14. What is not considered a Cloud application?

A) Multimedia devices

B) Shutterfly

C) YouTube

D) Google Docs

15. A cloud that is operated for a single organization is called:

A) Community cloud

B) Public cloud

C) Hybrid cloud

D) Private cloud

16. Given the file designator below, in which folder is the file located? C:\Spring\Computer\Homework\Assg1.doc

A) Homework

B) C:

C) Computer

D) Spring

17. Application files commonly have the extension:

A) .prog

B) .txt

C) .docx

D) .exe

18. If you ____ a file, the original is left intact and a duplicate is created in a new location.

A) Move

B) Delete

C) Create a shortcut to

D) Copy

19. Which character is permitted in file names?

A) Space

B) :

C) /

D) >

20. Which application created by Microsoft is considered a digital notebook?

A) Microsoft PowerPoint

B) Microsoft Publisher

C) Microsoft OneNote

D) Microsoft Access.

Reference no: EM13802289

Questions Cloud

Discuss the differences between windows and mac os : Apple's Mac OS is a major competitor for Windows and many people feel very strongly about choosing one over the other. Locate articles online that discuss the differences between Windows and Mac OS
Effectiveness in improving the quality of u.s. elementary : The policies' effectiveness in improving the quality of U.S. elementary and secondary education. Justify your assessment by clearly explaining your definition of "effectiveness" and how it should be measured or determined.
Question regarding the employee motivation : Managers have observed that employees are of three types: committed, compliant, or resistant. Most organizational leaders prefer committed employees because they exhibit motivation and willingness to sacrifice for the organization.
Write a response paper about the book strngth in what remain : Write a response paper about the book "strngth in what remains".
What is not considered a cloud application : One day you decide to turn in a resource paper that you found on the Internet. What is not considered a Cloud application
Political party loyalty or campaign money may influence : Discuss fact-based evidence about how interest groups, political party loyalty, or campaign money may influence your representative. Can these influences weaken his or her effectiveness as a true "representative" of the district
Making effective and ethical decisions : Complete the experiential exercise 5.1 Assessing Yourself at the end of the chapter, "Ethics and Corporate Responsibility." Based on your score, create a plan to increase your skills in making ethical decisions in the workplace.
Visual language and culture paper : Visual Language and Culture Paper
Create a new string called passwd : Create a class called Hw1FirstLastName.javain a project called hw1firstlastname. Create a new string called passwd formed by concatenatingevery alternate non-spacecharacter in sentencestarting with the first

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd