What software acts as the computer's software administrator by managing integrating, and controlling application software and hardware? Answer a. Operating system b. Anti-malware c. Utility d. Electronic health record e. Telecommunication
Pretexting involves hacking into a system through technical vulnerabilities. True False
Data mining can discover patterns and insights, such as association rules, that are not evident in raw data. True False
Which of the following is the characteristic of a vector image shape? A The image shape has a convex near field. B All of the scan lines originate from a common point of origin. C The image shape is rectangular. D The image shape has a flat top and sloped sides.
eventing Unsafe Conditions Elements for correcting unsafe conditions: #1 H3 square square Recognize Eliminate or Control Evaluate
25. Doctor's Smart Phone Patient information will be protected by: Automatically Office Manager Reception Team Each worker
22. Our Internal database will be protected by: Closing the program when not in use Daily Back -up Storing the program in the Administrator's home Not applicable
What is a loop in programming? A conditional statement A block of code that is executed repeatedly A function definition A data structure
Which of the following are common data types in programming? String Boolean Integer All of the above
Hard disks store and organize files using all the following, except __ blank. tracks sectors cylinders paths
What is the primary purpose of a search engine? To create websites To store files on the internet To help users find information on the internet
Which of the following signals transmits information more reliably? digital analog
What role do you think AI will play in future space exploration?
Which logging feature captures events from multiple network devices into a centralized server? SNMP traps NetFlow Ping probes Syslog
Which term refers to having a device or system that can take over in the event of a failure? A Disaster recovery B Redundancy C High availability D Scalability
Exercice 2 : Les requêtes simples. On considère une table ETUDIANTS avec les champs : matricule, Nom , Prénom Age, Filière. Question : 1. Ecrire une requête SQL pour afficher tous les étudiants. 2. Ecrire une requête pour afficher les étudiants de la filière scientifique. 3. Ecrire une requête pour afficher les étudiants âgés de plus de 18 ans. 4. Ecrire une requête pour afficher seulement Nom et prénom.
Complete the sentence. The most commonly used data container in Python is a $\square $ list
Which of these is an example of an adaptive technology? (1 point) a text-to-speech function on an e-book reader a cloud-basec database a customer service chatbot cognitive offloading software
Which of the following statements would clear the text displayed in a Label control named cityLabel? $cityLabel.Text=''clear'';$ $cityLabel.Text=''none'';$ $cityLabel.Text=''empty'';$ Clear my selection
Question 5 Which type of file is commonly used by trusted websites to create installation software for mobile devices? EXE file APK file BAT file SYS file