2.99 See Answer

Question: The _____________ tells you it’s ready


The _____________ tells you it’s ready to receive commands by displaying a specific set of characters called a(n) __________ .


> Sketch the graph of the function and use it to determine the values of for which limx→a f (x) exists.

> Evaluate the limit and justify each step by indicating the appropriate Limit Law(s).

> Evaluate the limit and justify each step by indicating the appropriate Limit Law(s).

> A patient receives a 150-mg injection of a drug every 4 hours. The graph shows the amount f (x) of the drug in the bloodstream after t hours. Find limt→12- f (t) and limt→12+ f (t) and explain the significance of these

> Evaluate the limit and justify each step by indicating the appropriate Limit Law(s).

> Use the graph of the function f to state the value of each limit, if it exists. If it does not exist, explain why.

> Explain why each function is continuous or discontinuous. (a). The temperature at a specific location as a function of time (b). The temperature at a specific time as a function of the distance due west from New York City (c). The altitude above sea leve

> Explain in your own words the meaning of each of the following.

> Apple Macs primarily use the __________ display connector type.

> The time it takes to redraw the entire screen is called the __________ .

> Two common projector technologies are LCD and ________________ .

> The __________ bus is the most common expansion slot for video cards.

> Using an aspect ratio of 16:10, the __________ refers to the number of horizontal pixels times the number of vertical pixels.

> DirectX is a(n) _____________ that translates instructions for the video device driver.

> The traditional D-subminiature connector on a video card is called a VGA connector or _________ .

> The size of the projected image at a specific distance from the screen is defined as the projector’s ___________ .

> To provide the optimal display for an LCD monitor, always set it to its ___________ .

> Virtual machines perform better on CPUs with ____________ .

> Before making a credit card purchase on the Internet, be sure the Web site uses the ______________ protocol (that replaced the older SSL protocol), which you can verify by checking for the __________ protocol in the address bar.

> Cloud computing companies provide ____________ that bills users for only what they use.

> A(n) ___________ is a virtual machine running on a hypervisor.

> A(n) __________ translates commands issued by software in order to run it on hardware it wasn’t designed to run on.

> You can use basic ____________ to create and run virtual machines on a local system.

> You can create a(n) _______ or ________ as a restore point for a virtual machine.

> John’s hypervisor enables all five of the virtual machines on his system to communicate with each other through the ____________ without going outside the host system.

> A program that runs multiple operating systems simultaneously is called a(n) __________ .

> A machine running a hypervisor is a(n) ____________ .

> A(n) _________ is a complete environment for a guest operating system to function as though that operating system was installed on its own computer.

> The ______________ applet provides a relative feel for how your computer stacks up against other systems using the Windows Experience Index.

> Many companies authenticate access to secure rooms using an ownership factor such as a(n)_______________ .

> To run a program written for Windows XP in a Windows 7 computer, use _________ if you encounter problems.

> In Windows Vista and Windows 7, you can use the _________ feature to recover previous versions of corrupted or deleted files.

> Use the ________ in Windows 8 to see an aggregation of event messages, warnings, maintenance messages, and quick access to security and maintenance tools.

> The___________ , accessed by pressing CTRL-SHIFT-ESC once, enables you to see all processes and services currently running or to close a process that has stopped working.

> To start Windows using only the most basic and essential drivers and services, use ________ .

> If Windows 7 fails but you have not logged on, you can select _________ to restore the computer to the way it was the last time a user logged on.

> Use the ___________ to check and replace any corrupted critical Windows files such as DLLs.

> Current versions of Windows include a set of repair tools known as the______________ .

> The _________ tool enables you to view and modify the BCD store.

> The _______ command is used by Linux systems to copy entire block volumes.

> A(n) ____________ protects against unauthorized access from the Internet.

> The asterisk is a special character called a(n) _______ that you can use in place of part of a filename when executing a command-line command.

> Type _____ or ________ before a Terminal command to get root privileges.

> The ___________ command enables you to restart a computer remotely from the command line.

> Your system knows what program is associated with a particular file by that file’s __________.

> The Terminal _______ command enables you to delete a file.

> The copy command is to move in Windows as cp is to _________ in Linux.

> Extra text you type after a command to modify its operation is called a(n) __________.

> The _________ command is used in Mac OS X to change a password.

> When you insert an optical disc into your PC, Windows uses the _______ and _________ features to start the disc automatically.

> Most attacks on computer data are accomplished through _____________.

> The process of keeping software updated in a safe and timely fashion is known as_____________ .

> Mac OS X uses __________ and most Linux distributions use ______ to run all sorts of tasks automatically in the background.

> You can use ___________ to disable certain graphical flourishes, such as animations, transparencies, and more.

> In Windows Vista and 7, Microsoft occasionally packaged several updates for Windows together into a(n) _____________ .

> If installing a new driver causes problems in your system, ____________ enables you to roll back the driver to a previously installed version.

> To change which programs and services start with Windows 8/8.1/10, you would use the __________ .

> In Mac OS X, you access updates through the __________ pane in System Preferences

> The __________ tool enables you to create a__________ , a snapshot of your computer’s configuration at a specific point in time.

> In Windows, you use the ____________ applet to uninstall, change, or repair programs.

> ________________ requires a special Trusted Platform Module (TPM) on the motherboard to verify on boot that the computer has not changed.

> Although not all ____________ is malicious, it can lead to data destruction.

> The _________ command enables you to change the owner and the group with which a file or folder is associated in Linux and Mac OS X.

> By default, any file you drop into a folder on an NTFS drive gets the same permissions as those assigned to the folder, a feature called___________ .

> _______________ enables standard users to perform common tasks and provides a permissions dialog box when standard users and administrators do certain things that could potentially harm the computer.

> A(n) __________ is a collection of user accounts that share the same access capabilities.

> When you create a new file or folder on an NTFS partition, you become the _______ of that file or folder.

> The process that defines what resources an authenticated user may access and what he or she may do with those resources is called ___________ .

> To log on to a standalone Windows PC, you need a(n)______________ .

> The _____________ enables you to scramble a file or folder and thus hide the contents from anyone, even an administrator.

> The _____________ enables you to manage user accounts in Windows.

> You can open the ___________ directly by pressing CTRL-SHIFT-ESC.

> Enable __________ to create Event Viewer entries when a specific file is accessed.

> The __________ tracks everything about your computer, from file types to user preferences.

> Windows 8.1 uses ________ to boot the OS.

> You can right-click on a user in the __________ tab of the Task Manager to disconnect them.

> When you open the Registry Editor, you will see the five _________ on the left side of the window.

> The Performance Monitor requires a ________ and an _________ to create logs about resource usage.

> The ___________ tab in the Task Manager displays overall CPU and memory usage.

> __________ is a command-line version of the Task Manager.

> When programmers need to use objects across multiple applications, they turn to _________ .

> The __________ tab in Task Manager shows applications that will run on boot.

> Windows tracks the installation progress with a set of text files called _________ .

> Antivirus software uses updatable __________ to identify a virus by its______________.

> During the Windows installation, you will need to agree to a legal document called the ____________ .

> If you wish to have only one OS and keep the applications and configuration of the current system, you should choose to do a(n) _______________ of the new OS.

> A(n) ________ is a fix for a single problem with the OS, while a(n) _________ is a combination of fixes.

> If you have a new hard drive with nothing on it, you will likely choose to do a(n) ____________ .

> If you want to share files and printers over your home network, you can set up a(n) ________ .

> _________ cases are used to make your computer blend in with the rest of your home theater equipment.

> A(n) ___________ is a box that you hook up to your PC with inputs that enable you to connect professional microphones and instruments.

> Windows uses the ____________ tool for migrating user files and settings.

> A(n) __________ is a system designed to handle only very basic applications with an absolute minimum amount of hardware required by the operating system.

> A series of instructions telling a computer how to read a compressed file is called a(n)______ .

> A(n) __________ masquerades as a legitimate program, yet does something different than what is expected when executed.

> 1. Which command pauses after displaying a screen’s worth of directory contents? (Choose two.) A. dir p B. ls | more C. ls -p D. dir /p 2. Which of the following commands will delete all of the files in a directory in Terminal? A. del *.* B. del all C.

> 1. What process determines the identity of a user? A. Authentication B. Authorization C. Identification D. Indemnification 2. Which of the following user account types can create other user accounts? A. Administrator B. Limited user C. Restricted user D

> 1. What is the process of using or manipulating people to gain access to network resources? A. Cracking B. Hacking C. Network engineering D. Social engineering 2. Which of the following might offer good hardware authentication? A. Strong password B. Enc

> 1. Which part of a laser printer applies a positive charge to the paper that attracts the toner particles to it? A. Erase lamp B. Transfer roller C. Laser D. Primary corona 2. Janet just bought a new computer. She wants to install her three-yearold inkj

> 1. After five minutes of struggling with a painfully sluggish device, you finally manage to close the offending application. What’s the best next step? A. Reopen the application and hope it doesn’t freeze again. B. Uninstall the application and look for

2.99

See Answer