Which is not an explanation of icons?
A) pictorial, onscreen representations
B) they symbolize computer actions that users may select using a mouse, keyboard, lightpen, or joystick
C) they serve functions similar to those of words
D) they may replace functions in many menus
E) meaning of icons is less quickly grasped than words
E) meaning of icons is less quickly grasped than words
You might also like to view...
Match each term with the correct statement below.
A. used to test the voltage on a network cable. B. device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information. C. can be used to verify that a DNS is server is online and working. D. can be used to monitor server components such as hard disks, memory, and the processor. E. can detect many forms of network traffic and capture packets and frames for analysis F. provides network management services through agents and management systems. G. backs up all files, files that have changed by date, or files that have changed after the previous backup. H. used by Performance Monitor when there are two or more types of elements to monitor such as two or more NICs or disk drives I. a specific situation or event detected by SNMP that a network administrator may want to be warned about
In the code below, why is it that the displayName() module cannot print the person's name?Start Call getInput() Call displayName()StopModule getInput() Declare String name Display "Enter your name: " Input nameEnd ModuleModule displayName() Display "Your name is: " + nameEnd Module
A. The name variable is outside the displayName() module's scope. B. The name variable is a global variable. C. The name variable is strongly cohesive. D. The name variable has high coupling.
Which formula would you use to arrive at the number of hosts on a subnet?
A. 2x + 2, where x represents the number of zeroes in the subnet mask B. 2x - 2, where x represents the number of zeroes in the subnet mask C. 2x / 2, where x represents the number of zeroes in the subnet mask D. 2x * 2, where x represents the number of zeroes in the subnet mask
Which of the following options allows you to gain access to the BIOS configuration when an unknown password prevents such access?
A) Repositioning a jumper on the motherboard to clear the CMOS memory B) Holding down a BIOS-specific key or key sequence while booting the machine C) Unplugging the computer for at least 2 minutes D) Pressing F8 early in the boot sequence and selecting the option to clear the password from the resulting menu