Question 31 (1 point) _____ is the set of instructions that signal the central p
ID: 447399 • Letter: Q
Question
Question 31 (1 point)
_____ is the set of instructions that signal the central processing unit (CPU) to perform circuit-switching operations.
Question 31 options:
Program code
Cache
Spreadsheet
Software suite
Save
Question 32 (1 point)
Which of the following statements is true of the National Do Not Call Registry?
Question 32 options:
The National Do Not Call Registry allows a person to receive calls from political organizations even if he or she has registered with the service.
Telemarketers who call numbers on the National Do Not Call Registry list are free from consumer lawsuits.
The National Do Not Call Registry has erased several compliance-related issues for direct marketing companies.
The Do Not Call Rules require that, at least every 31 days, sellers and telemarketers add to their call lists the numbers found in the registry.
Save
Question 33 (1 point)
Each attribute in a relational database model can be constrained to a range of allowable values called a _____.
Question 33 options:
bandwidth
scope
slot
domain
Save
Question 34 (1 point)
The term _____ describes the steps an organization takes to protect information sought by "hostile" intelligence gathers.
Question 34 options:
data loss prevention
trade secret
counterintelligence
competitive intelligence
Save
Question 35 (1 point)
A(n)_____ is a combination of a hardware configuration and systems software.
Question 35 options:
application software
computer system platform
application service provider (ASP)
software suite
Save
Question 36 (1 point)
A database is a collection of integrated and related _____.
Question 36 options:
fields
attributes
records
files
Save
Question 37 (1 point)
_____ is an open-source operating system whose source code is freely available to everyone.
Question 37 options:
Linux
Mac OS X
Chrome
Unix
Save
Question 38 (1 point)
Data warehouses allow managers to _____ to get increasing levels of detail about business conditions.
Question 38 options:
roll up
drill down
slice and dice
extract data
Save
Question 39 (1 point)
One way to help protect the security of communications over both wired and wireless networks is to _____.
Question 39 options:
encrypt the data
use radio waves
enable infrared transmission
keep using the same password
Save
Question 40 (1 point)
_____ is a form of data mining that combines historical data with assumptions about future conditions to forecast the outcomes of events.
Question 40 options:
Business intelligence
Social graph analysis
Online analytical processing
Predictive analysis
Program code
Cache
Spreadsheet
Software suite
Explanation / Answer
31. The answer is program code. A program code gives signals the CPU and enables the CPU to convert those signals into actions. The action is in the form of switching the circuits on and off. In other words, program codes are instructions to the CPU that these actions should happen.
32. The National Do Not Call registry enables U.S. consumers to reduce the unwanted telemarketing calls received by them. There are known exceptions and not all unsolicited calls will stop for a person when they register on the National Do Not Call Registry. The person registered with National Do Not Call Registry will still receive calls from political organizations.
Hence the answer is: The National Do Not Call Registry allows a person to receive calls from political organizations even if he or she has registered with the service.
33. The answer is "domain". Domain in relational database model shows the range of allowable values for a data attribute. It indicates what values can be inserted in each column. If the column is "education" then the following values can be entered - graduate or postgraduate. 1 as a value cannot be entered here.
34. The answer is "counterintelligence". It refers to the activities conducted by an organization that helps it in protecting itself from espionage and other intelligence activities. These activities helps in protecting information from enemies and from other organizations who should not have access to the information (which is usually sensitive or is a secret).
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.