BDT_RFrancis_Intro_To_Computing_Training_Questions PDF

Summary

This document is a collection of multiple-choice questions focused on introductory computing concepts. The topics covered include IoT systems, computer models, and basic computer components. It presents the questions and answers, likely for training purposes or review.

Full Transcript

1 An IoT system consists of sensors/devices which “talk” to the cloud through some kind of connectivity. Once the data gets to the cloud, software processes it and then might decide to perform an action, such as sending an alert or automatically adjusting the sensors/devices without the need for th...

1 An IoT system consists of sensors/devices which “talk” to the cloud through some kind of connectivity. Once the data gets to the cloud, software processes it and then might decide to perform an action, such as sending an alert or automatically adjusting the sensors/devices without the need for the user. True False 2 A ____ is a mathematical model. It consists of an infinite length tape. This infinite tape is further divided into cells on which input is given. It consists of a head which reads the input tape and state register stores the state of the machine. When the head read an input symbol then it is replaced with another symbol which results to its internal state change, and then it moves from one cell to the other (Rightward or leftward direction). Turing Machine Von Neumann Computer Screen Central Processing Unit (CPU) 3 _______ is empowering industrial engineering with sensors, software and big data analytics to create brilliant machines. Smart cities IoT in agriculture Industrial Internet Smart homes 4 _______ carries control signals/commands from the CPU (and status signals from other devices) in order to control and coordinate all the activities within the computer. Address Bus Data Bus Control Bus Microphone 5 ______ are the means by which data is transmitted from one part of a computer to another, connecting all major internal components to the CPU and memory. Analog Signals Hard Disks Buses Cables 6 The Internet of Things (IoT) is a system of ______ computing devices. Network to Network Machine to Machine Interrelated Mechanical 7 In a computer, the memory unit consists of _____, sometimes referred to as primary or main memory. Unlike a hard drive (secondary memory), this memory is fast and also directly accessible by the CPU. Disk Drives RAM (Random Access Memory) Solid State Drives Coaxial Cables 8 The shown architecture represents which computer model? The Turing Model Von Neumann Model Client-server architecture Model Single instruction, multiple data (SIMD) architecture Model 9 The basic idea behind the ______ is to collect data in an automated fashion and analyze the behavior of electricity consumers and suppliers for improving efficiency as well as economics of electricity use. They will also be able to detect sources of power outages more quickly and at individual household levels like nearby solar panel, making possible distributed energy system. smart refrigerators smart homes smart cars smart grids 10 _____ devices are installed with sensors and software which collect data and information about the users. This data is later pre-processed to extract essential insights about the user. These devices broadly cover fitness, health and entertainment requirements. The pre-requisite from internet of things technology for such applications is to be highly energy efficient or ultra-low power and small sized. Smart home Wearable Smart commuting Smart Retail 11 Which of the following is not a daily computing device? tablet laptop oscilloscope wearable devices 12 Which one of the following is not an IoT device? Amazon echo voice controller Google Home Nest Smoke Alarm None of these 13 A _______ is a vehicle which is able to optimize it’s own operation, maintenance as well as comfort of passengers using onboard sensors and internet connectivity. 1956 Chevrolet School Bus connected car smart home 14 The cost of owning a house is the biggest expense in a homeowner’s life. ______ products are promised to save time, energy and money. With them, companies like Nest, Ecobee, Ring and August, to name a few, will become household brands and are planning to deliver a never seen before experience. Smart Home IoT in Healthcare Connected Car IoT in Agriculture 15 ______ allows arithmetic (add, subtract etc) and logic (AND, OR, NOT etc) operations to be carried out. Control Unit (CU) Computer Screen Central Processing Unit (CPU) Arithmetic and Logic Unit (ALU) 16 A complete IoT system integrates ______ distinct components. 8 12 5 4 17 Technology can help to level the playing field through ________. Cash payments instead of digital payments Poor network connections Access to public services Trade access restriction 18 In an IoT system, first, _____ collect data from their environment. This could be as simple as a temperature reading or as complex as a full video feed. Actuators Sensors Control Unit Cloud 19 _____ is another powerful application of IoT generating curiosity among world’s population. Examples of IoT in this application contains; Smart surveillance, automated transportation, smarter energy management systems, water distribution, urban security and environmental monitoring Smart home Smart city Connected cars Artificial Intelligence 20. Cell towers are connected using ______. Wireless Technology Optic Fiber Cables Electricity Cables Coaxial Cables 21. What is the command that you type in the command prompt to know the IP address of the device? hostname netstat -a ipconfig dir 22. ______ is the process of converting data (either in-flight and at-rest) into a form only readable by another authenticated system or device. Packet Filtering Encryption Decryption Plain Texting 23.Suppose Chris wants to call Kevin. When Chris dials Kevin's number, the call request first arrives at ______. Kevin's home MSC Chris's home MSC Chris's foreign MSC Kevin's foreign MSC 24. The First Generation of mobile phones used ______ technique. CDMA TDMA WCDMA FDMA 25. The Second Generation of mobile phones introduced a revolutionary data service, SMS and Internet browsing with speed of ______ Kbps. 20 100 50 150 26. An antenna of your mobile phone transmits ______. Digital Signals Analogue Signals Electromagnetic Waves Infrared Radiation 27. The Fourth Generation of mobile phones used ______ technology. WCDMA TDMA & CDMA OFDMA & MIMO Enhanced MIMO 28. One of the main advantages of Transmission Control Protocol is ______. Simple in its transmission. Fast Checks for errors in data packets. Supports broadcasting. 29. The unique combination of IP address and Port number together are termed as _______. HTTP Port DNS Socket 30. The ________ is the layout arrangement of the different devices in a network. Common examples include: Bus, Star, Mesh, Ring, and Daisy chain. Router OSI Network Topology Firewall 31. When you purchase a SIM card, all the subscription information is registered in a specified MSC. This MSC is the foreign MSC. True False 32. Using a proxy server will slow network performance. True False 33. The _________ function reviews each data packet that passes through it, accepting or rejecting based on user-defined rules. These are effective but can be difficult to configure to block all possible threats. WAN Gateway DNS Packet Filtering 34. Your home MSC always knows which MSC area you are in. True False 35. The MAC Address is the logical address, of the system across the network. True False 36. It is Similar to LAN but on a wider scale; it connects multiple local networks. The devices in 1 LAN network can communicate with those in other connected LAN networks through pre-configured routers. It is highly scalable but has longer latency based on the system scale. Which type of network is described? LAN WLAN WAN Cloud 37. The microphone inside your mobile phone turns your voice into a digital signal with the help of ______. Light Sensor Speaker Sensor MEMS Sensor and IC Air Humidity Sensor 38. In cellular technology, a geographic area is divided into hexagonal cells, because it covers an entire area without ______. Signal Interference Overlapping High Frequency Bands Many Frequency Slots 39. _______ is the unique identifier of each host and is associated with its NIC (Network Interface Card). It is also known as the physical address and is assigned to the NIC at the time of manufacturing. Hostname Port IP Address MAC Address 40. A hard disk is considered __________ storage because when the computer is turned off the data remains in storage on the disk, ready for when the computer is turned on. volatile fast non-volatile big capacity 41. The unique combination of IP address and Port number together are termed as ________. Socket 42. What is basically a server which translates web addresses or URLs (ex: www.google.com) into their corresponding IP addresses? Firewall Domain Name System MAC Address Packet Filtering 43. What is the generation indicator of "Intel Core i9-12900K" processor? 9th Generation 90th Generation 12th Generation 10th Generation 44. 1 Petabyte equals to ________ bytes. 1 billion 1 million 1 quadrilion 1 thousand 45. There are two types of Bluetooth technology as of 2020: Bluetooth Low Energy (LE) and Bluetooth Classic (BR/EDR) Bluetooth High Speed (HS) and Bluetooth Classic (BR/EDR) Bluetooth Low Energy (LE) and Bluetooth High Energy (HE) Bluetooth 1 and Bluetooth 2 46. The product line suffix of the processor "Intel Core i9-12900K" is ____________. K - meaning unlocked 47. RAM is generally installed in a personal computer through the use of a _________ memory module. Double Data Rate (DDR) Solid State Drive (SSD) Bus Non-Volatile 48. When the computer is turned off, any data stored in the RAM is lost. True False 49. SATA SSD is faster than NVMe SSD. True False 50. Instead of spinning disks, the SSD uses flash memory that incorporates _________ chips, which is much faster. EEPROM 51. The speed (“clock time”) of a CPU is measured in ___________. Hertz or Giga Hertz 52. A ______ is quick but indiscriminate; when it receives a data packet, it will copy it and quickly send it to every device connected to it. Switch Hub Proxy Server Host 53. __________ is the process of converting data (either in-flight and at- rest) into a form only readable by another authenticated system or device. Encryption 54. Bluetooth exchanges data over short distances of ___________ using radio waves. 1 meters up to 5 meters 10 meters up to 100 meters 0.5 meter up to 10 meters 10 meters up to 1000 meters 55.The _____________ allows the parts of a computer to work together by performing tasks like transferring data between memory and disks or rendering output onto a display device. application programs web browser word processor operating system 56. BIOS is _______________. Basic Input / Output System Biggest Input / Output System Basic Input / Output Speed Bottom Input / Output Software 57.An algorithm should have step-by-step directions, which should be dependent on the programming code. True False 58. The top of the directory structure is called the __________. root directory default directory child directory parent directory 59._________________ is a generic term referring to the computer programs used to start and run computer systems including diverse application software and networks. Application software System software Data Programming Tool 60. Algorithms must terminate after a finite number of steps. True False 61. Linux is a family of ___________ operating systems. shareware commercial freeware open-source 62. Software is a generic term for organizing collections of computer data and _________. games instructions floppy disks hard disk drives 63. From programming point of view, _______ is a step-by-step procedure to resolve any problem. a software an algorithm a hardware a map guide 64. What are the uses of computer programs? Develop graphics and special effects in movie making. Perform Ultrasounds, X-Rays, and other medical examinations. In our mobile phones for SMS, Chat, and voice communication. All of the options 65. A computer program is a ___________ written using a __________ to perform a specified task by the computer. sequence of instructions, Computer Programming Language hardware, human language software, English language sequence of instructions, human language 66. __________ allow operating systems to recognize certain filenames and associate (match) them to the program that created it. Root directory Directory name Filenames File extensions 67. Most of the time, you will have more than one application open at the same time, this is known as _________. concurrent multi-tasking serial-tasking heavy-load 68. _________ is software developed by individual and small companies that cannot afford to market their software worldwide or by a company that wants to release a demonstration version of their commercial product. Freeware Advertisement software Shareware Open Source software 69. An algorithm should have one or more well-defined inputs. True False 70.The original Microsoft operating system was called ______________. GUI (Graphical User Interface) DOS (Disk Operating System) Linux Windows 95 71. Data Compression is also referred to as ________ or source coding. This technique is used to reduce the size of large files. bit-rate reduction low level language high level language high-rate reduction 72. ________ data compression is used to compress larger files into smaller files. In this compression technique, some specific amount of data and quality are removed from the original file. high rate lossless lossy zipped 73. There are mainly two types of data compression techniques ______ and ______ data compression. free, bound high, low speedy, slowly lossless, lossy 74. Software is broken down into 2 major categories; ___________ and _____________. websites and web applications operating system and entertainment software system software and application software word processing software and web browser software 75. A __________ is a structure / access pattern specific to data warehouse environments, used to retrieve client-facing data. It is a subset of the data warehouse and is usually oriented to a specific business line or team decision support system database data warehouse data mart 76. 1 Petabyte equals to ________ bytes. 1 thousand 1 million 1 quadrilion 1 billion 77. A ______ lets you use your mouse to click icons, buttons, and menus, and everything is clearly displayed on the screen using a combination of graphics and text. wireless mouse wired device web page GUI 78. One type of processes is _____; where data is broken down into frames and processed using two or more CPUs within a single computer system. Also known as parallel processing. online processing Multi-processing Time-Sharing Batch Processing 79. One of the mostly common used database models is the ___________. Relational Database Database Administrator Traditional File System Primary Key 80.______ data compression is used to compress larger files into smaller files. In this compression technique, some specific amount of data and quality are removed from the original file. Lossy Lossless Audio Raw 81. One of the main tools for network security, _______ act like a checkpoint where data passed to or from private networks is reviewed before being accepted or rejected. hubs switches firewalls routers 82. An _____________ software tool such as SQL Server Integration Services [SSIS] is used to obtain data from each appropriate source to feed the data-warehouse. Data Mart Foreign Key Hierarchical DB Extract, Transform, and Load 83. _________ is a software developed by individual and small companies that cannot afford to market their software worldwide or by a company that wants to release a demonstration version of their commercial product. Freeware Shareware Open Source Commercial 84. A Proxy Server will slow network performance by adding an additional data node to travel through. True False 85. A __________ is a central repository of information that provides users with current and historical decision support information which is difficult to access or present in the traditional operational data store. database data warehouse data block data mart 86. There are two types of Bluetooth technology as of 2020: _______ and Bluetooth Classic Bluetooth Mobile Bluetooth Long Range (LR) Bluetooth 2020 Bluetooth Low Energy (LE) 87. The unique combination of IP address and Port number together are termed as ________. socket IP Address MAC Address Application Door 88. __________ data is data concerned with descriptions, which can be observed but cannot be computed. Qualitative Document Quantitative Image 89. One type of processes is _______; where it allocates computer resources and data in time slots to several users simultaneously. Online Processing Real Time Processing Batch Processing Time-Sharing 90. One of the advantages of TCP/IP (Transmission Control Protocol) is _______. ability to execute broadcasting tasks checking for errors in data packets being slower than UDP due to extra duties simplicity in its transmission due to limited data management 91. Advantages of Traditional File system includes ______. (Choose all that apply) Required less labor work to do. Customization is easy and efficient. File processing cost less and can be more speed than database. Design is simple. 92. A ___________ is a software that is used to manage the Database. It receives instruction from a Database Administrator (DBA) and accordingly instructs the system to make the corresponding changes. DBA DBMS Traditional File System Data collection 93. SSDs are considered more reliable since there are no ______. EEPROM electronic chips moving parts flash drives 94. A system which is not connected to the network and can’t be communicated with is called _____. Computer Network system Closed system Open system Protocol system 95. ______ styles the website to look different. It can make what you see in the browser bigger or smaller, reorganize the pieces on the page, add colors, and more. Hypertext Markup Language Cascaded Style Sheet Active Server Pages Javascript 96. _____ is a program that both translates and executes the instructions in a high-level language program. Assembler Interpreter Decoder Compiler 97. ____ is a program that translates a high-level language program into a separate machine language program. Compiler Interpreter Encoder Decoder 98. Assembly language also requires that you write a large number of instructions for even the simplest program. True False 99. What does the following algorithm do? Step-1 Start Step-2 Input Value of N Step-3 X = 1, SUM=0 Step-4 IF (X >N) THEN GO TO Step-8 ENDIF Step-5 SUM = SUM + X Step-6 X = X + 1 Step-7 Go to step-4 Step-8 Display value of SUM Step-9 Stop Display sum of series of numbers from 1 to N ie 1+2+3...+N Display sum of series numbers from 1 to X ie 1+2+3...+X Display sum of first 8 numbers Display sum of first 50 numbers 100. If you imagine a website as a person, you can think of ______ as being the skeleton. CSS HTML Javascript AJAX 101. _______ is used to translate an assembly language program to a machine language program. Interpreter Compiler Assembler Encoder 102. What does the following algorithm do? Step 1 − START Step 2 − declare three integers a, b & c Step 3 − define values of a & b Step 4 − add values of a & b Step 5 − store output of step 4 to c Step 6 − print c Step 7 − STOP add three numbers and display the result. add two numbers and display the result. compare two numbers and display the maximum. compare two numbers and display the minimum. 103. _________ is the act of writing computer programs, which are a sequence of instructions written using a Computer Programming Language to perform a specified task by the computer. Fetch Decode Execute Computer Programming Python Flow Charts 104. A machine language instruction is a binary number that represents a command that tells the CPU to perform an operation. In the ________ step the CPU untangle the instruction that was just fetched from memory, to determine which operation it should perform. run execute fetch decode 105. When a CPU executes the instructions in a program, it is engaged in a process that is known as the _____ cycle. capture-run-convert random binary fetch-decode-execute assembly 106. From programming point of view, _________ is a step-by-step procedure to resolve any problem. It is an effective method expressed as a finite set of well-defined instructions. Data Structure Flow Chart Algorithm computer software 107. Assembly language programs cannot be executed by the CPU, however. The CPU only understands machine language, so a special program known as an _________ is used to translate an assembly language program to a machine language program. assembler interpreter software Algorithm 108. From the data structure point of view, following are some important categories of algorithms: (Choose all that apply) Insert Sort Search Delete Update 109. Not all procedures can be called an algorithm. An algorithm should have the following characteristics: (Choose all that apply) clear and unambiguous An algorithm should have 1 or more well-defined outputs An algorithm should have 0 or more well-defined inputs An algorithm should have step-by-step directions, which should be independent of any programming code. 110 ______ can be defined as the group of data elements which provides an efficient way of storing and organizing data in the computer so that it can be used efficiently. A File Data Structure HTML Algorithm 111 _______ data structure provides better memory management than arrays. Because it is allocated memory at run time, so, there is no waste of memory. It is proved to be a useful data structure when the number of elements to be stored is not known ahead of time. There are many flavors of it like: linear, circular, doubly, and doubly circular. Queue Array Graph Linked list 112 _____ is a way of collecting and organizing data in such a way that we can perform operations on these data in an effective way. Filenames Data Set Data Structure Data Gathering 113 What are the benefits of Flowcharts? (Select all that apply) Simplify the Logic Effective Analysis Makes Communication Better Useful in Coding Applicable Documentation 114 What does the program shown in the flowchart do? Prints smallest among three numbers Prints largest among three numbers Prints a random number among three numbers Prints largest among two numbers 115 What does the program shown in the flowchart do? Sum of the first 100 numbers Sum of n numbers sum of the i+n numbers sum of 50 numbers 116 _________ are multilevel data structures with a hierarchical relationship among its elements known as nodes. Graphs Trees Linked List Queue 117 ______ is a data structure that follows the principle LIFO (Last In First Out). All the operations on it are performed from the top of the stack such as PUSH and POP operation. Object String Stack AJAX 118 _______ is a blueprint that pictorially represents the algorithm and its steps. It is a graphical representation of an algorithm. Picture Algorithm steps Flowchart Program Code 119 The flowchart shown is for a program. What is the output of the program if the Income is 30,000 USD and the Cost is 18,932 USD? Profit is 11,068 USD Loss is 11,068 USD Profit is 30,000 USD Profit is 18,932 USD 120 The diagram below shows\describes the __________. relationship between employees in the same organization relationship of the 4 major types Information Systems to one another relationship between the top management information system and the operational level of the organization None of the above 121 Instead of spinning disks, the SSD uses flash memory that incorporates _________ chips, which is much faster. capacitor Arduino DDR EEPROM 122 1. A major challenge for large organizations, which are typically saddled with hundreds, even thousands of different applications serving different levels and business functions is ______. hardware extraction of data from systems systems building systems integration 123 _______ system can answer questions such as the following: Given a customer delivery schedule and an offered freight rate: - Which vessel should be assigned at what rate to maximize profits? - What is the optimal speed at which a particular vessel can optimize its profit and still meet its delivery schedule? - What is the optimal loading pattern for a ship bound for the U.S. West Coast from Malaysia? Transaction Processing Decision Support Management Information Executive Support 124 The principal purpose of systems at the _________ is to answer routine questions and to track the flow of transactions through the organization. ex. What happened to Mr. Kevin's payment? Finance CFO Information System Strategic Level Systems Management Level Systems Operational Level Systems 125 An example of a question ESS assist in answering is __________. List the total pounds of lettuce used this quarter by a fast-food chain? Which units should we sell to raise cash for acquisitions? What is the optimal loading pattern for a ship bound for the U.S. West Coast from Malaysia? What are the total sales in eastern Europe this week? 126 ______ is a linear list in which insertion and deletions are allowed only at one end, called top. This data structure follows the principle LIFO. Stack Graph String Queue 127 One of the main advantages of Transmission Control Protocol is ______. Simple in its transmission. Supports broadcasting. Checks for errors in data packets. Fast 128 _________ support operational managers by keeping track of the elementary activities and transactions of the organization, such as sales, receipts, cash deposits, payroll, credit decisions, and the flow of materials in a factory. Strategic-level systems Paid-level Information systems Operational-level systems Management-level systems 129 _____ filter, compress, and track critical data, displaying the data of greatest importance to senior managers. For example, the CEO of Leiner Health Products, the largest manufacturer of private label vitamins and supplements in the United States, has an ESS that provides on his desktop a minute-to-minute view of the firm’s financial performance as measured by working capital, accounts receivable, accounts payable, cash flow, and inventory. DSS ESS TPS MIS 130 A major challenge for large organizations, which are typically saddled with hundreds, even thousands of different applications serving different levels and business functions is ______. systems integration systems building extraction of data from systems 131 _____ provide managers with reports and often online access to the organization’s current performance and historical records. They primarily serve the functions of planning, controlling, and decision making at the management level. Transaction processing systems (TPS) Management information systems (MIS) Executive support systems (ESS) Strategic-level systems 132 What is the correct excel formula to be put in cell F20 for displaying the category value of Tea Set? VLOOKUP(Tea Set,A19:C33,3,TRUE) VLOOKUP(E20,A19:C33,2,TRUE) VLOOKUP(E20,A19:C33,3,TRUE) VLOOKUP("Tea Set",A19:C33,1,TRUE) 133 A _______ is a computerized system that performs and records the daily routine transactions necessary to conduct business. management-level system transaction processing system decision-support system executive support system 134 The three main categories of information systems which serve different organizational levels are _______. low-level, medium-level, high-level systems human support-level, machine support-level, AI systems operational-level, management-level, strategic-level systems open source-level, management-level, paid-level systems 135 ________ use executive support systems (ESS) to help them make decisions. Accountants Senior Managers Sales Teams Human Resources junior employees 136 _____ help managers make decisions that are unique, rapidly changing, and not easily specified in advance. Transaction processing systems (TPS) Executive support systems (ESS) Decision-support system (DSS) 137 _________ support operational managers by keeping track of the elementary activities and transactions of the organization, such as sales, receipts, cash deposits, payroll, credit decisions, and the flow of materials in a factory. Management-level systems Operational-level systems Paid-level Information systems Strategic-level systems 138 ______ serve the monitoring, controlling, decision-making, and administrative activities of middle managers. Strategic-level systems Operational-level systems Management-level systems 139 _____ filter, compress, and track critical data, displaying the data of greatest importance to senior managers. For example, the CEO of Leiner Health Products, the largest manufacturer of private-label vitamins and supplements in the United States, has an ESS that provides on his desktop a minute-to-minute view of the firm’s financial performance as measured by working capital, accounts receivable, accounts payable, cash flow, and inventory. DSS ESS TPS MIS 140 ________ help senior management tackle and address strategic issues and long-term trends, both in the firm and in the external environment. Strategic-level systems Management-level systems Operational-level systems High-level systems 141 Transaction processing systems are often so _______ to a business that TPS failure for a few hours can lead to a firm’s demise and perhaps that of other firms linked to it. central non-critical secondary 142 A single system can provide all the information an organization needs. True False 143 ESS are designed to incorporate data about _______ events, such as new tax laws or competitors, but they also draw summarized information from internal MIS and DSS. external internal 144 An example of a question ESS assist in answering is: What is the optimal loading pattern for a ship bound for the U.S. West Coast from Malaysia? Which units should we sell to raise cash for acquisitions? List the total pounds of lettuce used this quarter by a fast-food chain? 145 ______ are typically a major source of data for other systems. ESS TPS DSS 146 What does the program shown in the flowchart below do? Prints three whole numbers in descending order Prints three decimal numbers in descending order Prints largest among three numbers Prints smallest among three numbers 147 One of the main advantages of Transmission Control Protocol is ______. Supports broadcasting. Checks for errors in data packets. Simple in its transmission. Fast 148 What is the correct excel formula to be put in cell F3 for displaying the sum of sales in Texas? VLOOKUP(TX,A19:C33,3,TRUE) SUMPRODUCT(--(C3:C7="TX"),B3:B7) SUMPRODUCT(--(B3:B7="TX"),C3:C7) SUMPRODUCT(--(C3:C7=TX"),B3:B7) 149 Converting the decimal number 156 into binary will equal _______. 11000010 10011100 11100010 10010010 150 ______ is the process of converting data (either in-flight or at-rest) into a form only readable by another authenticated system or device. Decryption Encryption Packet Filtering Plain Texting 151 What does the following algorithm do? Step-1 Start Step-2 Input Value of N Step-3 X = 1, SUM=0 Step-4 IF (X >N) THEN GO TO Step-8 ENDIF Step-5 SUM = SUM + X Step-6 X = X + 1 Step-7 Go to step-4 Step-8 Display value of SUM Step-9 Stop Display sum of series numbers from 1 to X ie 1+2+3...+X Display sum of first 8 numbers Display sum of series of numbers from 1 to N ie 1+2+3...+N Display sum of first 50 numbers 152 What is the correct excel formula to be put in cell F20 for displaying the price value of the Photo frame item? VLOOKUP(A31,A19:C33,2,FALSE) VLOOKUP(Photo frame,A19:C33,2,TRUE) VLOOKUP(“Photo Frame”,A19:C33,3,TRUE) VLOOKUP(A31,A19:C33,3,FALSE) 153 A _______ is a computerized system that performs and records the daily routine transactions necessary to conduct business. management-level system transaction processing system decision-support system executive support system 154 In cellular technology, a geographic area is divided into hexagonal cells, because it covers an entire area without ______. Signal Interference Overlapping High Frequency Bands Many Frequency Slots 155 What is the command that you type in the command prompt to know the IP address of the device? arp ipconfig netstat -a hostname 156 A ______ is quick but indiscriminate; when it receives a data packet, it will copy it and quickly send it to every device connected to it. Host Hub Switch Proxy Server 157 _________ are multilevel data structures with a hierarchical relationship among its elements known as nodes. Graphs Trees Linked Lists Queues 158 The microphone inside your mobile phone turns your voice into a digital signal with the help of ______. Speaker Sensor Digital Sensor MEMS sensor and IC Optic Sensor 159 Bluetooth exchanges data over short distances of ___________ using radio waves. 10 meters up to 1000 meters 1 meters up to 5 meters 0.5 meter up to 10 meters 10 meters up to 100 meters 160 Data Compression is also referred to as ________ or source coding. This technique is used to reduce the size of large files. high-rate reduction high level language bit-rate reduction low level language 161 _______ is faster than SATA SSD. NVME SSD CD 7200 rpm HDD Hard Disk Drive 162 The Fourth Generation of mobile phones used ______ technology. WCDMA OFDMA & MIMO Enhanced MIMO TDMA & CDMA 163 A major challenge for large organizations, which are typically saddled with hundreds, even thousands of different applications serving different levels and business functions is ______. systems building systems integration extraction of data from systems hardware 164 ______ masks the network address of connected devices, directing all requests made through an alternative cover device. This provides an added level of anonymity and filtering, as it acts as a buffer, sending back only specified types of data to the source. Web Application Firewall DNS Proxy Server Packet Filtering 165 ________ data compression is used to compress larger files into smaller files. In this compression technique, some specific amount of data and quality are removed from the original file. Lossy Zipped Lossless High rate

Use Quizgecko on...
Browser
Browser