For the nodes on a network to connect with each other and access the network, each
node needs a _____________.
Give this one a try later!
network adapter
Computers use a _____________ language consisting of 0s and 1s.
,Give this one a try later!
binary
A(n) ________ is a navigation aid that shows the path you have taken to get to a web page
or where the page is located within the website.
Give this one a try later!
breadcrumb trail
RAM
Give this one a try later!
stores programs and data the computer is currently using
A ________ allows a hacker to gain access to your computer and take almost complete
control of it without your knowledge.
Give this one a try later!
rootkit
FTP
,Give this one a try later!
protocol that allows files to be uploaded/downloaded from a web server
Which of the following is the final stage of the program development life cycle
(PDLC)?
Give this one a try later!
Testing and Documentation
pseudocode
Give this one a try later!
text-based approach to documenting an algorithm
tracks
Give this one a try later!
concentric circles on a hard drive
Unwanted or unneeded software included by manufacturers on new computers is
called ________.
, Give this one a try later!
bloatware
You can block logical ports from invaders and make your computer virtually invisible
to others on the Internet by installing ________.
Give this one a try later!
a firewall
personal information manager
Give this one a try later!
software used to keep track of appointments
File ________ provides an organizational structure to the files and folders on your
storage device.
Give this one a try later!
management
Wireless network devices use _____________ to communicate with each other.
node needs a _____________.
Give this one a try later!
network adapter
Computers use a _____________ language consisting of 0s and 1s.
,Give this one a try later!
binary
A(n) ________ is a navigation aid that shows the path you have taken to get to a web page
or where the page is located within the website.
Give this one a try later!
breadcrumb trail
RAM
Give this one a try later!
stores programs and data the computer is currently using
A ________ allows a hacker to gain access to your computer and take almost complete
control of it without your knowledge.
Give this one a try later!
rootkit
FTP
,Give this one a try later!
protocol that allows files to be uploaded/downloaded from a web server
Which of the following is the final stage of the program development life cycle
(PDLC)?
Give this one a try later!
Testing and Documentation
pseudocode
Give this one a try later!
text-based approach to documenting an algorithm
tracks
Give this one a try later!
concentric circles on a hard drive
Unwanted or unneeded software included by manufacturers on new computers is
called ________.
, Give this one a try later!
bloatware
You can block logical ports from invaders and make your computer virtually invisible
to others on the Internet by installing ________.
Give this one a try later!
a firewall
personal information manager
Give this one a try later!
software used to keep track of appointments
File ________ provides an organizational structure to the files and folders on your
storage device.
Give this one a try later!
management
Wireless network devices use _____________ to communicate with each other.