Select the correct answer. Anne is creating a website where she can share music that her band created. She needs to make sure that the file size is small enough to allow her fans to stream the audio over the Internet. Which format should she use to save her audio? A. WMV B. MP3 C. JPEG D. MP4
When users store data on remote servers and access and share data through the internet, which storage method are they most likely using? A. Flash storage B. Networking storage C. DRAM storage D. Cloud storage
In what medium do web applications operate? Select one: ) Internet Telepresence Cloud Browser
def mystery (x,y) : return y+y result=mystery(3,2) print(result) square
Which statement about Rule-Based Access Control is true? a. It requires that a custodian set all rules. b. It dynamically assigns roles to subjects based on rules. c. It is considered a real-world approach by linking a user's job function with security. d. It is no longer considered secure.
What is the purpose of a choke point in a screened subnet configuration? To allow unrestricted access between the perimeter network and the LAN To facilitate better access control and easier monitoring To provide a direct connection to the Internet To eliminate the need for internal firewalls
Words that when clicked on can link to another website are called: a. protocols b. browsers c. hyperlinks d. explorer
Which of the following is not a comparison (relational) operator in Python 3? != o gt = ==
Computer Vocabulary.Question 3 of 4 What is the program you need to look at Web sites? A. both B. el explorador de Web C. el navegador
Construct the truth table for the following Boolean statements. 4. Clean your room and have a snack.
What is the primary purpose of a search engine? To create websites To store files on the internet To help users find information on the internet
Which of the following signals transmits information more reliably? digital analog
What role do you think AI will play in future space exploration?
Which logging feature captures events from multiple network devices into a centralized server? SNMP traps NetFlow Ping probes Syslog
Which term refers to having a device or system that can take over in the event of a failure? A Disaster recovery B Redundancy C High availability D Scalability
Exercice 2 : Les requêtes simples. On considère une table ETUDIANTS avec les champs : matricule, Nom , Prénom Age, Filière. Question : 1. Ecrire une requête SQL pour afficher tous les étudiants. 2. Ecrire une requête pour afficher les étudiants de la filière scientifique. 3. Ecrire une requête pour afficher les étudiants âgés de plus de 18 ans. 4. Ecrire une requête pour afficher seulement Nom et prénom.
Complete the sentence. The most commonly used data container in Python is a $\square $ list
Which of these is an example of an adaptive technology? (1 point) a text-to-speech function on an e-book reader a cloud-basec database a customer service chatbot cognitive offloading software
Which of the following statements would clear the text displayed in a Label control named cityLabel? $cityLabel.Text=''clear'';$ $cityLabel.Text=''none'';$ $cityLabel.Text=''empty'';$ Clear my selection
Question 5 Which type of file is commonly used by trusted websites to create installation software for mobile devices? EXE file APK file BAT file SYS file