A(n) ____________ protects against unauthorized access from the Internet.
> Explain why the function is discontinuous at the given number a. Sketch the graph of the function.
> Explain why the function is discontinuous at the given number a. Sketch the graph of the function.
> Explain why the function is discontinuous at the given number a. Sketch the graph of the function.
> Evaluate the limit, if it exists. lim x → 0 (4 + h)2 – 16 / h
> (a). A particle starts by moving to the right along a horizontal line; the graph of its position function is shown. When is the particle moving to the right? Moving to the left? Standing still? (b). Draw a graph of the velocity function.
> Use the definition of continuity and the properties of limits to show that the function g (x) = 2 √3-x is continuous on the interval (-∞, 3].
> Use the definition of continuity and the properties of limits to show that the function is continuous at the given number a.
> Evaluate the limit, if it exists. lim x → 4 x2 - 4x / x2 – 3x - 4
> Evaluate the limit, if it exists. Lim x → 5 x2 - 6x + 5/ x - 5
> Sketch the graph of the function and use it to determine the values of for which limx→a f (x) exists.
> Evaluate the limit and justify each step by indicating the appropriate Limit Law(s).
> Evaluate the limit and justify each step by indicating the appropriate Limit Law(s).
> A patient receives a 150-mg injection of a drug every 4 hours. The graph shows the amount f (x) of the drug in the bloodstream after t hours. Find limt→12- f (t) and limt→12+ f (t) and explain the significance of these
> Evaluate the limit and justify each step by indicating the appropriate Limit Law(s).
> Use the graph of the function f to state the value of each limit, if it exists. If it does not exist, explain why.
> Explain why each function is continuous or discontinuous. (a). The temperature at a specific location as a function of time (b). The temperature at a specific time as a function of the distance due west from New York City (c). The altitude above sea leve
> Explain in your own words the meaning of each of the following.
> Apple Macs primarily use the __________ display connector type.
> The time it takes to redraw the entire screen is called the __________ .
> Two common projector technologies are LCD and ________________ .
> The __________ bus is the most common expansion slot for video cards.
> Using an aspect ratio of 16:10, the __________ refers to the number of horizontal pixels times the number of vertical pixels.
> DirectX is a(n) _____________ that translates instructions for the video device driver.
> The traditional D-subminiature connector on a video card is called a VGA connector or _________ .
> The size of the projected image at a specific distance from the screen is defined as the projector’s ___________ .
> To provide the optimal display for an LCD monitor, always set it to its ___________ .
> Virtual machines perform better on CPUs with ____________ .
> Before making a credit card purchase on the Internet, be sure the Web site uses the ______________ protocol (that replaced the older SSL protocol), which you can verify by checking for the __________ protocol in the address bar.
> Cloud computing companies provide ____________ that bills users for only what they use.
> A(n) ___________ is a virtual machine running on a hypervisor.
> A(n) __________ translates commands issued by software in order to run it on hardware it wasn’t designed to run on.
> You can use basic ____________ to create and run virtual machines on a local system.
> You can create a(n) _______ or ________ as a restore point for a virtual machine.
> John’s hypervisor enables all five of the virtual machines on his system to communicate with each other through the ____________ without going outside the host system.
> A program that runs multiple operating systems simultaneously is called a(n) __________ .
> A machine running a hypervisor is a(n) ____________ .
> A(n) _________ is a complete environment for a guest operating system to function as though that operating system was installed on its own computer.
> The ______________ applet provides a relative feel for how your computer stacks up against other systems using the Windows Experience Index.
> Many companies authenticate access to secure rooms using an ownership factor such as a(n)_______________ .
> To run a program written for Windows XP in a Windows 7 computer, use _________ if you encounter problems.
> In Windows Vista and Windows 7, you can use the _________ feature to recover previous versions of corrupted or deleted files.
> Use the ________ in Windows 8 to see an aggregation of event messages, warnings, maintenance messages, and quick access to security and maintenance tools.
> The___________ , accessed by pressing CTRL-SHIFT-ESC once, enables you to see all processes and services currently running or to close a process that has stopped working.
> To start Windows using only the most basic and essential drivers and services, use ________ .
> If Windows 7 fails but you have not logged on, you can select _________ to restore the computer to the way it was the last time a user logged on.
> Use the ___________ to check and replace any corrupted critical Windows files such as DLLs.
> Current versions of Windows include a set of repair tools known as the______________ .
> The _________ tool enables you to view and modify the BCD store.
> The _______ command is used by Linux systems to copy entire block volumes.
> The asterisk is a special character called a(n) _______ that you can use in place of part of a filename when executing a command-line command.
> Type _____ or ________ before a Terminal command to get root privileges.
> The ___________ command enables you to restart a computer remotely from the command line.
> Your system knows what program is associated with a particular file by that file’s __________.
> The Terminal _______ command enables you to delete a file.
> The copy command is to move in Windows as cp is to _________ in Linux.
> Extra text you type after a command to modify its operation is called a(n) __________.
> The _________ command is used in Mac OS X to change a password.
> The _____________ tells you it’s ready to receive commands by displaying a specific set of characters called a(n) __________ .
> When you insert an optical disc into your PC, Windows uses the _______ and _________ features to start the disc automatically.
> Most attacks on computer data are accomplished through _____________.
> The process of keeping software updated in a safe and timely fashion is known as_____________ .
> Mac OS X uses __________ and most Linux distributions use ______ to run all sorts of tasks automatically in the background.
> You can use ___________ to disable certain graphical flourishes, such as animations, transparencies, and more.
> In Windows Vista and 7, Microsoft occasionally packaged several updates for Windows together into a(n) _____________ .
> If installing a new driver causes problems in your system, ____________ enables you to roll back the driver to a previously installed version.
> To change which programs and services start with Windows 8/8.1/10, you would use the __________ .
> In Mac OS X, you access updates through the __________ pane in System Preferences
> The __________ tool enables you to create a__________ , a snapshot of your computer’s configuration at a specific point in time.
> In Windows, you use the ____________ applet to uninstall, change, or repair programs.
> ________________ requires a special Trusted Platform Module (TPM) on the motherboard to verify on boot that the computer has not changed.
> Although not all ____________ is malicious, it can lead to data destruction.
> The _________ command enables you to change the owner and the group with which a file or folder is associated in Linux and Mac OS X.
> By default, any file you drop into a folder on an NTFS drive gets the same permissions as those assigned to the folder, a feature called___________ .
> _______________ enables standard users to perform common tasks and provides a permissions dialog box when standard users and administrators do certain things that could potentially harm the computer.
> A(n) __________ is a collection of user accounts that share the same access capabilities.
> When you create a new file or folder on an NTFS partition, you become the _______ of that file or folder.
> The process that defines what resources an authenticated user may access and what he or she may do with those resources is called ___________ .
> To log on to a standalone Windows PC, you need a(n)______________ .
> The _____________ enables you to scramble a file or folder and thus hide the contents from anyone, even an administrator.
> The _____________ enables you to manage user accounts in Windows.
> You can open the ___________ directly by pressing CTRL-SHIFT-ESC.
> Enable __________ to create Event Viewer entries when a specific file is accessed.
> The __________ tracks everything about your computer, from file types to user preferences.
> Windows 8.1 uses ________ to boot the OS.
> You can right-click on a user in the __________ tab of the Task Manager to disconnect them.
> When you open the Registry Editor, you will see the five _________ on the left side of the window.
> The Performance Monitor requires a ________ and an _________ to create logs about resource usage.
> The ___________ tab in the Task Manager displays overall CPU and memory usage.
> __________ is a command-line version of the Task Manager.
> When programmers need to use objects across multiple applications, they turn to _________ .
> The __________ tab in Task Manager shows applications that will run on boot.
> Windows tracks the installation progress with a set of text files called _________ .
> Antivirus software uses updatable __________ to identify a virus by its______________.
> During the Windows installation, you will need to agree to a legal document called the ____________ .
> If you wish to have only one OS and keep the applications and configuration of the current system, you should choose to do a(n) _______________ of the new OS.
> A(n) ________ is a fix for a single problem with the OS, while a(n) _________ is a combination of fixes.
> If you have a new hard drive with nothing on it, you will likely choose to do a(n) ____________ .
> If you want to share files and printers over your home network, you can set up a(n) ________ .
> _________ cases are used to make your computer blend in with the rest of your home theater equipment.
> A(n) ___________ is a box that you hook up to your PC with inputs that enable you to connect professional microphones and instruments.