Which of the following input technologies has been

Assignment Help Basic Computer Science
Reference no: EM13463735

1. Tele'Wire, a mobile manufacturer, offers free connections to customers who buy its mobile phones. This cost of connection is actually included in the price of the mobile phone. Tele'Wire is pursuing a(n) ________ approach to applying freeconomics.

  • cross subsidies
  • advertising
  • zero marginal cost
  • freemium
  • gift economy

12. While pursuing a global business strategy, the ________ prohibit(s) the implementation of local strategies, and thus a global company cannot quickly react to local challenges and opportunities.

  • threat of new entrants into the market
  • increased bargaining power of suppliers
  • threat of substitute products from other industries
  • need to achieve economies of scale
  • increased bargaining power of customers

3. In ________ networks, servers and clients have defined roles.

  • server-to-peer
  • server-centric
  • client-centric
  • peer-to-peer
  • peer-centric

4. The operating system of a computer is an example of a(n) ________ software.

  • systems
  • peripheral
  • transitory
  • open source
  • application

5. Which of the following tasks is performed by the application software?

  • presenting information via a monitor
  • writing a business letter
  • saving data to a disk
  • printing documents
  • updating the system clock

6. The CPU interacts with ________ for permanently storing data.

  • primary storage
  • random-access memory
  • output technologies
  • secondary storage
  • volatile memory

7. Which of the following is true about the graphical Web browser Mosaic?

  • It made the tracking of IP addresses possible.
  • It allowed users to open and use more than one Web page simultaneously.
  • It is the basis of popular browsers such as Internet Explorer and Mozilla Firefox.
  • It initiated file sharing on the Web.
  • It provided users with references or links to other documents.

8. A(n) ________ is also referred to as the computer's brain.

  • random-access memory
  • read-only memory
  • microprocessor
  • operating system
  • application software

9. Which of the following types of computer software utilities monitors users' incoming e-mail messages and filters unwanted messages from arriving?

  • spam blockers
  • disk and data recovery
  • antivirus
  • data compression
  • spyware detection and removal

10. Which of the following statements is true of a bus network topology?

  • The configuration of bus networks facilitates easy diagnosis and isolation of network faults.
  • In a bus network, every computer and device is connected to every other computer and device.
  • A bus network has the most complex wiring layout.
  • Extending a bus network is more difficult to achieve than it is for other topologies.
  • A bus network topology enables all network nodes to receive the same message through the network cable at the same time.

11. Google's Linux-based operating system for mobile devices is known as ________.

  • Java
  • Bada
  • iOS
  • Android
  • Symbian

12. Which of the following programming languages allows programmers to easily add a command button to a screen with a few clicks of a mouse instead of programming the button pixel by pixel and using many lines of code?

  • Web development languages
  • scripting languages
  • visual programming languages
  • object-oriented languages
  • prototype-based programming languages

13. Which of the following is an example of presentation software?

  • Mozilla Thunderbird
  • Microsoft Excel
  • Apple Keynote
  • Lotus Notes
  • ACT!

14. Which of the following functions do scripting languages perform?

  • laying out or formatting Web pages
  • checking the accuracy of user-entered information on Web pages
  • automating or supporting activities throughout the information systems development process
  • developing applications in high-speed arcade graphics
  • creating animation and video that can be compressed small enough for fast download speeds

15. Which of the following input technologies has been historically used for entering text and numbers on computers?

  • scanner
  • optical mouse
  • graphics tablet
  • QWERTY keyboard
  • joystick

Reference no: EM13463735

Questions Cloud

You have just been hired by gregs goofy gadgetsnbspyou are : you have just been hired by gregs goofy gadgets.nbspyou are an it professional and you are tasked solely with fixing
Compare the religions from anthropological perspective : the us culture has a broad spectrum of religious affiliations and religiosity. as a result of interacting with people
Hink about a reading you liked or related to discuss how : the exam asks that you write a five paragraph essay reflecting on what you have learned in this class. think about a
Describe the advantages and disadvantages of restricting : there are many kinds of input controls. write a 4-5 page paper in which youexplain the function of input
Which of the following input technologies has been : 1. telewire a mobile manufacturer offers free connections to customers who buy its mobile phones. this cost of
Why were attributions and suppositions made in each : we make attributions every day about our own behaviors and the behaviors of the people that we interact with. and
Use wireshark tool to capture packets use wireshark tool to : use wireshark tool to capture packets when you download lecture 1 from the coit20229 course webpage. before you
Te second option requires you to choose a movie from the : the second option requires you to choose a movie from the following list to view. choose a character fromnbspthe movie
Explain why there is no such thing as a best practice but : 1.explain why there is no such thing as a best practice but rather there are only good practices for a given

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How could a business use information technology

How could a business use information technology to increase switching costs and lock in its customers and suppliers? Use business examples to support your answers

  Write a computer program using q basic

write a computer program using q basic with the following information. We just started learning about loop commands but I'm completely lost. My teacher introduced the for next, do while, and do until loop commands and he suggested to use the for next..

  What is the difference between intrinsic and acquired value

What is the difference between intrinsic value and acquired value?

  Calculation for programming and machine independency

Assume f is a function that returns the result of reversing string of symbols given as its input, and g is a function that returns concatenation of the 2-strings given as its input. If x is the string abcd,

  Freedom of expression in cyberspace-information society

Write down a 3 pages summary about "Freedom of expression in Cyberspace & Information Society " after reading at least one article in each point of view.

  Which part of the try-catch statement must be witten

Mark the following statements are True or False. If a statement is False, explain why? a. There can be only one catch-lause for each try-catch statement. b. A catch-lause is an exception handler. c. A throw statement must be located within a try-c..

  How cultural values affect moral legitimacy

Identify examples of how cultural values affect moral legitimacy

  Describes how you have used abstraction as a strategy

Give an example that describes how you have used abstraction as a strategy and how it was beneficial to you.

  Explain how they might be avoided

when is compaction of secondary storage beneficial from the file managers perspective? give several examples. list some problems that could be presented as a result of compaction and explain how they might be avoided.

  How many hemoglobin molecules are there in an average red

How many hemoglobin molecules are there in an average red cell? Assume that the molecular weight of the human hemoglobin tetramer is 65 kd.

  User can input an odd number in the range from 1 - 25

this pattern (9 rows), modify your program so that your user can input an odd number in the range from 1 - 25 for the number of rows in the diamond.

  Minimum number of edits required to convert string

Given two strings of size m, n and set of operations replace (R), insert (I) and delete (D) all at equal cost. Find minimum number of edits (operations) required to convert one string into another.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd