Codes consisting of lines of varying widths or lengths that are computer_readable are known as__________
(A) an ASCII code
(B) a magnetic tape
(C) an OCR scanner
(D) a bar code
_____________are used to identify a user who returns to a Website
(A) Cookies
(B) Plug-ins
(C) Scripts
(D) ASPs
The_____________data mining technique derives rules from real_world case examples
(A) Rule discover
(B) Signal processing
(C) Neural nets
(D) Case-based reasoning
Where does most data go first with in a computer memory hierarchy
(A) RAM
(B) ROM
(C) BIOS
(D) CACHE
The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement speciality called___________
(A) robotics
(B) simulation
(C) computer forensics
(D) animation
Computers manipulate data in many ways, and this manipulation is called___________
(A) upgrading
(B) processing
(C) batching
(D) utilizing
Computers process data into information by working exclusively with____________
(A) multimedia
(B) word
(C) numbers
(D) characters
When creating a computer program, the____________designs the structure of the program
(A) End user
(B) System Analyst
(C) Programmer
(D) All of the above
Servers are computers that provide resources to other computers connected to a___________
(A) network
(B) mainframe
(C) supercomputer
(D) client
______________is the science that attempts to produce machines that display the same type of intelligence that humans do
(A) Nanoscience
(B) Nanotechnology
(C) Simulation
(D) Artificial intelligence (Al)