Package deal
IT 104 GMU Q&A Mastery Bundle
Prepare for success in your IT 104 course at GMU with our Q&A Exam Bundle!
[Show more]Prepare for success in your IT 104 course at GMU with our Q&A Exam Bundle!
[Show more]Imagine a computer that can read a set of news articles on any topic, understand what it has read, and write a report summarizing what it has learned. To do these things, the computer must have a natural language interface 
The use of robots in an automobile manufacturing plant is an example of a(n)...
Preview 2 out of 12 pages
Add to cartImagine a computer that can read a set of news articles on any topic, understand what it has read, and write a report summarizing what it has learned. To do these things, the computer must have a natural language interface 
The use of robots in an automobile manufacturing plant is an example of a(n)...
Defragmenting reorganizes the files on a disk so that they are located in ____ access time. Noncontiguous sectors, which slows 
Contiguous sectors, which slows 
Contiguous sectors, which speeds (correct) 
Noncontiguous sectors, which speeds Contiguous sectors, which speeds 
__________ connects a pag...
Preview 2 out of 10 pages
Add to cartDefragmenting reorganizes the files on a disk so that they are located in ____ access time. Noncontiguous sectors, which slows 
Contiguous sectors, which slows 
Contiguous sectors, which speeds (correct) 
Noncontiguous sectors, which speeds Contiguous sectors, which speeds 
__________ connects a pag...
If a program exceeds its allocated space, the operating system uses an area of the hard disk, called ____________ , to store parts of programs or data files until they are needed. Virtual memory 
The HTTPS protocol was designed to: add encryption to HTTP messages 
Every client and server on the Inte...
Preview 1 out of 4 pages
Add to cartIf a program exceeds its allocated space, the operating system uses an area of the hard disk, called ____________ , to store parts of programs or data files until they are needed. Virtual memory 
The HTTPS protocol was designed to: add encryption to HTTP messages 
Every client and server on the Inte...
Computer programing involves writing instructions for a computer to follow as it processes data. The instructions are usually written in a high-level language and later translated into the computer's native language: machine language. 
machine language Machine language is binary 
a set of instructi...
Preview 2 out of 6 pages
Add to cartComputer programing involves writing instructions for a computer to follow as it processes data. The instructions are usually written in a high-level language and later translated into the computer's native language: machine language. 
machine language Machine language is binary 
a set of instructi...
Many music, video, and software distributors have focused on developing and implementing copy protection technologies called digital rights management (DRM) 
symptoms of ________ can include headaches, loss of focus, burning or tired eyes, blurred or double visio, and neck and shoulder strain. compu...
Preview 2 out of 5 pages
Add to cartMany music, video, and software distributors have focused on developing and implementing copy protection technologies called digital rights management (DRM) 
symptoms of ________ can include headaches, loss of focus, burning or tired eyes, blurred or double visio, and neck and shoulder strain. compu...
T/F: An advantage of a packet-switching network is that data arrives in exactly the same order in which is sent. FALSE 
Which of the following is a utility that removes a program, as well as any associated entries in the system files? a. application remover b. uninstaller c. application purger d. an...
Preview 2 out of 6 pages
Add to cartT/F: An advantage of a packet-switching network is that data arrives in exactly the same order in which is sent. FALSE 
Which of the following is a utility that removes a program, as well as any associated entries in the system files? a. application remover b. uninstaller c. application purger d. an...
control unit in charge of making sure everything happens at the right time. Takes info from the decode unit and instructs the ALU and registers what to do 
decode unit takes instructions from the prefetch unit and translates them into a form the control unit can understand 
prefetch unit requests in...
Preview 2 out of 5 pages
Add to cartcontrol unit in charge of making sure everything happens at the right time. Takes info from the decode unit and instructs the ALU and registers what to do 
decode unit takes instructions from the prefetch unit and translates them into a form the control unit can understand 
prefetch unit requests in...
What is a device that modulates a carrier's signal to encode a computers digital data, and later demodulates the signal to decode the data at the receiving end? router modem bus folder network card router ** modem bus folder network card 
The programs that control the activity of the hardware and c...
Preview 2 out of 8 pages
Add to cartWhat is a device that modulates a carrier's signal to encode a computers digital data, and later demodulates the signal to decode the data at the receiving end? router modem bus folder network card router ** modem bus folder network card 
The programs that control the activity of the hardware and c...
Researchers are developing a sensor called _________ , designed to be so small that it floats in the air. A) personal fabricator 
B) smart dust 
C) rapid prototyping 
D) qubits B) smart dust 
A ___________ is the person responsible for designing, developing and maintaining a website. A) system admin...
Preview 2 out of 9 pages
Add to cartResearchers are developing a sensor called _________ , designed to be so small that it floats in the air. A) personal fabricator 
B) smart dust 
C) rapid prototyping 
D) qubits B) smart dust 
A ___________ is the person responsible for designing, developing and maintaining a website. A) system admin...
A(n) _________ is a separate area of a hard disk that holds an infected file until the infection can be removed. 
a) Quarantine b) Firewall c) Payload d) Honeypot Quarantine 
Which of the following is an advantage of a database management system? 
a) Increased data redundance b) Quick response to re...
Preview 2 out of 13 pages
Add to cartA(n) _________ is a separate area of a hard disk that holds an infected file until the infection can be removed. 
a) Quarantine b) Firewall c) Payload d) Honeypot Quarantine 
Which of the following is an advantage of a database management system? 
a) Increased data redundance b) Quick response to re...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller twishfrancis. Stuvia facilitates payment to the seller.
No, you only buy these notes for $30.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
77254 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now