_____________are used to identify a user who returns to a Website?
A. Cookies
B. Plug-ins
C. Scripts
D. ASPs
_____________are used to identify a user who returns to a Website?
A. Cookies
B. Plug-ins
C. Scripts
D. ASPs
The_____________data mining technique derives rules from real-world case examples?
A. Rule discover
B. Signal processing
C. Neural nets
D. Case-based reasoning
Where does most data go first with in a computer memory hierarchy ?
A. RAM
B. ROM
C. BIOS
D. CACHE
The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement speciality called___________?
A. robotics
B. simulation
C. computer forensics
D. animation
Computers manipulate data in many ways, and this manipulation is called___________?
A. upgrading
B. processing
C. batching
D. utilizing
Computers process data into information by working exclusively with____________?
A. multimedia
B. word
C. numbers
D. characters
When creating a computer program, the____________designs the structure of the program?
A. End user
B. System Analyst
C. Programmer
D. All of the above
Servers are computers that provide resources to other computers connected to a___________?
A. network
B. mainframe
C. supercomputer
D. client
______________is the science that attempts to produce machines that display the same type of intelligence that humans do?
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (Al)
The CPU and memory are located on the__________?
A. expansion board
B. motherboard
C. storage device
D. output device