correctly solved
False - correct answer True or false? Public-key cryptography and
transposition ciphers are examples of modern computer encryption.
False - correct answer True or False? A semantic network cannot represent
the relationships among objects.
False - correct answer True or False? A relative path begins at the root of the
directory tree.
Python - correct answer Which of the following languages uses indentions to
indicate blocks of code?
False - correct answer True or False? Computers can interpret a
conversation quickly and easily.
swapping - correct answer Which of the following describes the act of
bringing in a page from secondary memory, which may cause another to be
written back to secondary memory?
natural language - correct answer Which of the following describes a
language, like English, that humans use to communicate with each other?
False - correct answer True or False? An Entity-Relationship (ER) diagram is
used to compose and execute queries in a database management system.
,False - correct answer True or False? In partitioned memory management,
the bounds register holds the address of the end of a program's partition.
True - correct answer True or False? Data transfer rate is the speed with
which data is moved from one place on the network to another.
latency - correct answer Which of the following describes the amount of time
it takes the platter to rotate into the proper position for reading or writing?
Python - correct answer Which of the following languages allow only value
parameters?
True - correct answer True or False? In asynchronous processing, the
processing is under the control of events occurring outside the sequence of
processing instructions.
instantiation - correct answer Which of the following is the process of creating
an object from a class?
False - correct answer True or False? The process control block (PCB)
contains the algorithm that determines which process will gain control of the
CPU.
True - correct answer True or False? An information system is software that
helps us organize and analyze data.
True - correct answer True or False? A Turing test is a behavioral approach
to determining if a computer system is intelligent.
, node - correct answer Which of the following is a generic term used for any
device on a network?
True - correct answer True or False? Sequential files mirror the sequential
nature of magnetic tape.
buffer overflow - correct answer Which of the following security attacks
exploits a flaw in a program that could cause a system to crash and leave the
user with increased authority levels?
class - correct answer Which of the following is a language construct that
defines the pattern for an object?
False - correct answer True or False? A star topology is a LAN configuration
in which all nodes are connected in a closed loop.
True - correct answer True or False? The CPU can be executing only one
program at any instance in time.
False - correct answer True or False? Whenever possible, a constant value
should be used in a spreadsheet instead of a formula.
batch - correct answer Which of the following describes a collection of similar
programs processed at the same time?
True - correct answer True or False? A high effective weight simulates an
excited biological neuron.
True - correct answer True or False? In a generic data type, the type of the
items being stored and managed is not specified until the collection is used.