Filters
Question type

 The dot-com bubble occurred between the years 2008 and 2010.​ 

A) True
B) False

Correct Answer

verifed

verified

 Computer systems such as the Mark-8 and the MITS Altair are examples of early ______ computers.​

Correct Answer

verifed

verified

 ​Which of the following descriptions best matches that of computer engineering degree? 


A)  ​Focuses on computer architecture and how to program computers to make them work effectively and efficiently. 
B)  ​Focuses on applying computers to business problems. 
C)  ​Focuses on computer equipment and software used by businesses. 
D)  ​Focuses on the design of computer hardware and peripheral devices, often at the chip level.

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

 ​A computer ________ designs, codes, and tests computer programs. In addition, they may modify existing programs to meet new requirements or eliminate bugs.

Correct Answer

verifed

verified

 The __________ is made up of businesses that focus on digital equipment, software, communications technologies, and related services.​ 


A)  ​ICT industry 
B)  ​stock market 
C)  ​dot-com industry 
D)  ​Internet

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

 ​Apple released the first Apple Macintosh computer in what year? ___________

Correct Answer

verifed

verified

 ​If you are hired as an entry-level programmer, your job title would be a(n) ___________ programmer.

Correct Answer

verifed

verified

 ​It was not until the ______-generation of computers that portable operating systems, such as CP/M and UNIX, provided programmers with similar operating system commands across hardware platforms.

Correct Answer

verifed

verified

 ​A(n) ___________ is a device that transmits human voices over a distance using cables or airborne signals.

Correct Answer

verifed

verified

 ​A(n) ____________  administrator plans, installs, and maintains one or more local area networks and may also manage cloud resources.

Correct Answer

verifed

verified

 The first telephones were connected by point-to-point networks, similar to those used by the telegraph system.​ 

A) True
B) False

Correct Answer

verifed

verified

 Whistleblowing is risky under any circumstances.​ 

A) True
B) False

Correct Answer

verifed

verified

 ​The Stuxnet virus that disabled Iranian nuclear centrifuges is an example of cyberwarfare. 

A) True
B) False

Correct Answer

verifed

verified

 A key feature of the Apple Lisa was its use of _______________.​ 


A)  ​vacuum tubes 
B)  ​graphical user interface 
C)  ​transistors 
D)  ​VisiCalc

E) A) and C)
F) All of the above

Correct Answer

verifed

verified

 ​The Atanasoff-Berry Computer was the first computing device to use ________ instead of mechanical switches as processing circuitry.

Correct Answer

verifed

verified

 ​The Motorola DynaTAC 8000X was brought to market in what year? ___________

Correct Answer

verifed

verified

 ​________ was an electronic device designed to decode messages that were sent between the German High Command and their field commanders in World War II.

Correct Answer

verifed

verified

Showing 101 - 117 of 117

Related Exams

Show Answer