______are used to identify a user who returns to a Website?

A. Cookies
B. Plug-ins
C. Scripts
D. ASPs

The_____ data mining technique derives rules from real-world case examples?

A. Rule discover
B. Signal processing
C. Neural nets
D. Case-based reasoning

Where does most data go first with in a Computer memory hierarchy ?

A. RAM
B. ROM
C. BIOS
D. CACHE

The Ability to recover and read deleted or damaged files from a criminal’s Computer is an example of a law Enforcement speciality called ?

A. robotics
B. simulation
C. computer forensics
D. animation

Computers manipulate data in many ways, and this Manipulation is called__?

A. upgrading
B. processing
C. batching
D. utilizing

Computers process data into information by working exclusively with___?

A. multimedia
B. word
C. numbers
D. characters

When creating a Computer program, the _________ designs the structure of the program?

A. End user
B. System Analyst
C. Programmer
D. All of the above

Servers are Computers that Provide resources to other Computers connected to a?

A. network
B. mainframe
C. supercomputer
D. client

_________is the science that attempts to produce machines that display the same type of Intelligence that humans do?

A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (Al)

The CPU and memory are located on the______?

A. expansion board
B. motherboard
C. storage device
D. output device