Computer Science 100 quizzes 1-10 review -- New Perspectives on Computer Science 2016
A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications.
firewall
In a spreadsheet worksheet, a(n) ___________ works behind the scenes to tell the microprocessor how to use the contents of cells in calculations.
formula
In 1969, computer scientists began to develop high-level languages, called ________-generation languages, which more closely= resembled human languages.
fourth
A(n) __________ is a section of code that is part of a program, but is not included in the main sequential execution path.
function
Payment processing is based on an online payment __________ that authorizes credit and debit cards, PayPal, and Apple Pay transactions.
gateway
Web pages are connected by __________ links.
hypertext
What is the term that is used to describe a computer system that could store literary documents, link them according to logical relationships, and allow readers to comment and annotate what they read?
hypertext
When a program begins, the memory address of the first instruction is placed in a part of the microprocessor's control unit called a(n) __________.
instruction pointer
Microprocessors are hard-wired to perform a limited, preprogrammed set of activities called a(n) ___________.
instruction set
As an alternative to a compiler, a(n) ________ converts and executes one statement at a time while the program is running.
interpreter
Once loaded into RAM, the __________ provides essential operating system services, such as memory management and file access.
kernel
A cryptographic ________ is a word, number, or phrase that must be known to encrypt or decrypt data.
key
Passwords used as encryption ________ help to make hijacked data unusable.
keys
When 4:3 videos are displayed in a widescreen player, they are bordered by the black bars of a(n) _______.
letterbox
A software ________ is a legal contract that defines the ways in which a computer program may be used.
license
The most popular battery type used in today's electronic devices is __________.
lithium ion
The part of the data bus that runs between the microprocessor and RAM is called the _______ bus.
local
The structure of files and folders displayed by File Explorer is called a ________ storage model because it helps you create a mental picture of the way files are organized in a hierarchy of folders.
logical
Microprocessors can't directly understand programming languages, so programs have to be converted into _____________ that corresponds to the microprocessor's instruction set.
machine language
Regarding OO programming, which of the following terms best matches with the term "method"?
main()
A large, closet-sized computer capable of simultaneously processing data for hundreds or thousands of users is most likely a __________ computer.
mainframe
A set of commands called HTTP ________ help your browser communicate with Web servers.
methods
In a processor, the timing device that sets the pace for executing instructions is called the ___________.
microprocessor clock
A ___________ app is designed for a handheld device, such as a smartphone, tablet computer, or enhanced media player.
mobile
The circuitry that enables a device to access a LAN is called a(n) ________.
network interface controller
Any device in a network is called a(n) __________.
node
Many employment contracts contain a(n) ______________ designed to prevent employees from divulging proprietary information to competitors or opening competing businesses.
non-compete clause
A(n) _____________ is a collection of programs that typically include word processing, spreadsheet, presentation, and database modules.
office suite
The phrase programming _____________ refers to a way of conceptualizing and structuring the tasks a computer performs.
paradigm
If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________ is an excellent option.
password manager
If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________ is an excellent option.
password manager
The core function of a password manager is to store user IDs with their corresponding ________.
passwords
A computer file's location is defined by a file ______.
path
On a network, file sharing allows users to open, view, edit, copy, and delete files from a remote device, providing that they have the proper ___________ .
permission
Cookies that are stored on a device after a session ends are referred to as ________ cookies.
persistent
Speech recognition software analyzes the sounds of your voice and converts each word into groups of ________.
phonemes
A communication ______ is a virtual end point for data entering and leaving a digital device.
port
In Prolog, the __________ describes the relationship between the arguments.
predicate
Popular ___________ software products include Microsoft PowerPoint, iWork Keynote, LibreOffice Impress, and Google Docs Slides.
presentation
The downside of the _____________ paradigm is that it does not fit gracefully with certain types of problems—those that are unstructured or those with very complex algorithms.
procedural
With respect to organizations, confidentiality means protecting __________ information about company finances, procedures, products, and research that competitors would find valuable.
proprietary
When a router connects to and communicates over the Internet, it has a ________ IP address that is routable over the Internet.
public
Video compression can be expressed as a compression ______.
ratio
Which of the following is the technique for adding light and shadows to a 3-D image?
ray tracing
A(n) _____________ contains parts of the operating system necessary to boot your computer and diagnose system problems after a hard drive failure or software malfunction.
recovery drive
In a(n) _________ database, a table is a sequence of records, similar to a flat file.
relational
The process of covering a wireframe with surface color and texture is called _________.
rendering
Data __________ refers to the form in which data is stored, processed, and transmitted.
representation
The number of horizontal and vertical pixels that a device displays on the screen is referred to as screen ________.
resolution
Any code that is designed to hide the existence of processes and privileges is referred to as a(n) _______.
rootkit
With just facts and goals, Prolog would be nothing more than a database, but the addition of _________ gives programmers a set of tools to manipulate the facts.
rules
One method of heuristic analysis allows the suspicious file to run in a guarded environment called a(n) ___________
sandbox
An integrated circuit is a set of microscopic electronic circuits etched onto a thin slice of ___________ material such as silicon.
semiconducting
Processors that execute one instruction at a time are considered to be ________ processors
serial
A computer that is primarily used to serve data to other computers on a network is called a(n) ______________.
server
A virus __________ is a section of program code that contains a unique series of instructions known to be part of a malware exploit.
signature
A(n) _________ sort uses one field, to arrange records. A(n) _________ sort arranges information by more than one field.
single-level, multi-level
Unicode uses________ bits and provides codes for 65,000 characters.
sixteen
In a general sense, ____________ refers to all the non-hardware components of a digital device.
software
The collection of programs on a computer is referred to as _______________.
software
Unauthorized changes to the DNS are called DNS ________.
spoofing
Within the agile development framework, the process of developing each iteration of a program is called a(n) _________.
sprint
Any software that secretly gathers personal information without the victim's knowledge is classified as __________.
spyware
Networks use more than one protocol, and the collection of protocols for a network is referred to as a protocol ________.
stack
HTTP is considered to be a(n) ___________ protocol.
stateless
A(n) _______ password is difficult to hack.
strong
Computers run three main types of software: application software, development tools, and _______ software.
system
The primary purpose of ________ software is to help the computer system monitor itself in order to function efficiently.
system
The ________ houses all essential chips and provides connecting circuitry between them.
system board
The term ________ refers to the part of a digital device that holds the system board.
system unit
There are three core elements in a relational database: fields, ________, and relationships.
tables
An information _________ degree programs focus on computer equipment and software used by businesses.
technology
In the context of communication networks, the term __________ refers to the structure and layout of network components
topology
In a wireless network, RF signals are sent and received by a ______________.
transceiver
A(n) __________ is a computer program that seems to perform one function while actually doing something else.
trojan
A new version or edition of a software product is referred to as a software ___________.
upgrade
A(n) _________ represents a value that can change.
variable
A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.
virus
____________ is the disclosure by an employee of confidential information that relates to some danger, fraud, or other illegal or unethical conduct connected with the workplace, be it of the employer or of fellow employees.
whistleblowing
A feature called ___________ determines how your text flows from line to line by automatically moving words down to the next line as you reach the right margin.
word wrap
A computer _______ is a self-replicating, self-distributing program designed to carry out unauthorized activity on a victim's device.
worm
Stuxnet is a notorious computer _______.
worm
Which of the following would not be considered a disruptive technology?
Computers that run OS X replacing computers that run Windows 8.
__________ is music, speech, and other sounds represented in binary format for use in digital devices.
Digital audio
To establish a(n) ________, hackers set up an unsecured Wi-Fi hotspot complete with an Internet connection.
Evil Twin
Which of the following is NOT used to create or edit HTML documents?
Filezilla FTP client
Industry standard tools for scheduling and project management include PERT, WBS, and ________.
Gantt charts
Which of the following is not a characteristic for a good problem statement?
It contains detailed descriptions of the processes and tools that need to be developed.
Which type of network topology connects a peripheral device to a host device?
Point-to-point
__________ refers to a branch of data mining that analyzes current and historical data to predict future trends.
Predictive analytics
A(n) ____________ is a company that provides space on a server to house Web pages.
Web hosting service
Which of the following is not an example of an authentication protocol?
all of the above
In a browser, __________ link to pages that you use frequently.
both A and B
A(n) __________ is a device that uses a low-power radio transmitter to carry out two-way voice communications.
cellular telephone
A(n) _________ is a set of guidelines designed to help professionals thread their way through a sometimes tangled web of ethical on-the-job decisions.
code of ethics
The main circuits on the system board that carry data are called the _________.
data bus
Which type of cables are used for high-capacity trunk lines that provide main routes for telephone, cable, and Internet communications?
fiber-optic cables
What is the term used for when a link leads to a Web page that no longer exists?
link rot
Many employment contracts contain a(n) ______________ designed to prevent employees from divulging proprietary information to competitors or opening competing businesses.
non-compete clause
If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________ is an excellent option.
password manager
A(n) _______________ is a field that contains data unique to a record.
primary key
Chrome OS is an example of a _________ because it depends substantially on processing and storage provided by cloud-based servers.
thin client
Software for Macs is usually stored in a single executable file with an __________ extension.
.app
When were the original HTML specifications developed by Tim Berners-Lee?
1990
Which type of mobile broadband service has maximum download rates of 300 Mbps and upload rates of 75 Mbps?
4G
Wireless connections use unlicensed frequencies that are available for public use, including 2.4 GHz and _____ GHz. which is subject to less interference from other devices, but it has a more limited range.
5
The __________ chip family set the standard for processors used in today's desktop and laptop computers, as well as servers.
8086 OR x86 (both answers work)
As with other popular mobile operating systems, Android is designed for _______ processors.
ARM
Which of the following is a markup language?
All of the above
Which of the following would not be considered an operating system resource?
All of the above
Which from the following list are an example of productivity software?
All of the above
_____________ programmers create productivity applications such as Microsoft Office, as well as enterprise applications such as CRM and ERP.
Application
What type of Internet connection do you have when upload speed differs from download speed?
Asymmetric
Two of the most common open source and free software licenses are ___________.
BSD and GPL
Which file sharing protocol distributes the role of a file server across a collection of dispersed computers?
BitTorrent
__________ are the most commonly used database clients.
Browsers
_________ workers are not official employees of a company.
Contract
Which type of security measure reduces the effect of an attack by using data backups, disaster recovery plans, and the availability of redundant hardware devices?
Corrective procedures
The acronym ____________ refers to software that manages data stored in a database.
DBMS
Which of the following is NOT a format that is used for digital audio?
DOC
_______ is a high-speed, digital, always-on, Internet access technology that runs over standard phone lines.
DSL
_________ is the amount of data a storage device can move per second from the storage medium to RAM.
Data transfer rate
____________ is distributed for free and often comes preinstalled on new devices, but it is limited in some way until you pay for it.
Demoware
Which category of software would programming languages fall into?
Development Software
_________ technology displaces an existing business process, market, industry, or product.
Disruptive
A(n) _____ system can provide such benefits as improved overall performance by standardizing business processes based on best practices or improved access to information from a single database to an enterprise.
ERP
_________________ refers to the process of hiding the internal details of objects and their methods.
Encapsulation
________ is a wired network technology that is defined by IEEE 802.3 standards.
Ethernet
__________ LANs are usually arranged in a star topology with computers wired to central switching circuitry that is incorporated in modern routers.
Ethernet
A private IP address can be used to send data over the Internet.
FALSE
ARM-based processors are not especially energy efficient.
FALSE
Agile methodologies tend to be used for large software development projects involving more than ten developers, geographically dispersed development teams, and life-critical applications.
FALSE
Because it is so easy to experiment with different numbers, word processing software is particularly useful for what-if analysis.
FALSE
Cookies can be stored on desktop and laptop computers but not smartphones or tablet computers.
FALSE
Detailed application specifications can be developed before or after selecting the hardware and software for an information system.
FALSE
During an instruction cycle, all parts of the instruction are performed by the microprocessor's control unit.
FALSE
In DFD terminology, a data store is a process that changes data by performing a calculation, updating information, or sorting a list.
FALSE
LGAs have two rows of pins that connect the chip to a circuit board.
FALSE
Microsoft Windows is used exclusively on desktop systems.
FALSE
Most wireless LANs use licensed frequencies that require applying to the FCC for permission.
FALSE
SQL keywords must be entered in all uppercase letters because they are case-sensitive.
FALSE
Spreadsheet software offers database capabilities for establishing relationships between different record types.
FALSE
The Head section of an HTML document contains text and links to images.
FALSE
The Web is synonymous with the Internet.
FALSE
The entire Internet contains about a zettabyte of data.
FALSE
The use of several databases is one of ERP's major advantages.
FALSE
There is a universal standard for categorizing software and various categorization schemes have few similarities.
FALSE
Third-generation languages added a level of abstraction to machine languages by substituting abbreviated command words for the strings of 1s and 0s used in machine languages.
FALSE
Your search history is the same as your browser history.
FALSE
programmers who work within the declarative paradigm envision a program as data objects that essentially network with each other to exchange data
FALSE
A manual calculator implements algorithms autonomously.
FALSE
If you are traveling and expect to access files on a computer that you've left at home, make sure the remote access utilities is turned off.
FALSE
Most ISPs and email services do not use filtering techniques to block spam.
FALSE
Once you have installed antivirus software, you don't typically need to keep it running full time in the background
FALSE
Similar to a worm, a trojan is not designed to spread itself to other devices.
FALSE
The Atanasoff-Berry Computer was the first computing device to use transistors instead of vacuum tubes as processing circuitry.
FALSE
Two-way radio technology went portable during World War I.
FALSE
8-bit color depth is also called True Color.
False
All remote storage is considered to be cloud storage.
False
An DIP is a square chip package, typically used for microprocessors, with pins arranged in concentric squares.
False
Application programmers specialize in developing system software such as operating systems, device drivers, security modules, and communications software.
False
Athlon and A-series processors manufactured by AMD are NOT x86 compatible.
False
Component systems are currently the most popular form factor for digital devices.
False
Data cannot flow over multiple networks that have different topologies.
False
File sharing poses no real security risks.
False
Memory cards are typically volatile.
False
Modern processors follow Intel's original numbering sequence.
False
Most Web apps require installation on your local computer or handheld device.
False
Network discovery works in the exact same way on all devices.
False
ROM is temporary and volatile, RAM is more permanent and non-volatile.
False
Session cookies are stored on a disk or other permanent storage medium.
False
The labels and values on a spreadsheet worksheet cannot be formatted in similar way as you would format text in a word processing document.
False
The operating systems for smartphones are radically different to those used for tablet computers.
False
The organization that supervises Internet addressing is ARPANET.
False
To conserve space, applications that require high-quality sound use low sampling rates.
False
Web crawlers gather material from the invisible Web.
False
When high-level languages were originally conceived in the 1950s, they were dubbed second-generation languages because they seemed a major improvement over machine and assembly languages.
False
An original message or file that has not yet been encrypted is referred to as ciphertext.
False
Android devices automatically encrypt data stored on the device when a user activates the login password.
False
Blacklist and header filtering is usually performed by email clients and Webmail services.
False
Certification alone is sufficient to qualify for a job in the IT industry.
False
In addition to replicating itself, a virus self-distributing.
False
Pharming attacks carried out by DNS spoofing can be detected by antivirus software or spyware removal software.
False
The objective of a MITM attack is for a third party to block communications between two entities.
False
Viruses spread themselves from one device to another.
False
DSL is an example of what type of Internet access?
Fixed
The World Wide Web is a collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called _____.
HTTP
If you are sending personal data such as credit card information to a Web site, which of the following should you see in the address bar of your browser?
HTTPS
Which of the following is NOT drawback of using cloud storage?
High price of storage.
_______________, such as BASIC, Python, Java, Prolog, and C++, make the programming process easier by replacing unintelligible strings of 1s and 0s or cryptic assembly commands with understandable commands, such as PRINT and WRITE.
High-level languages
Which DCE would you use if you wanted to extend a wired network by adding more ports?
Hub
The organization that supervises Internet addressing is ___________.
ICANN
What organization is the top-level authority for supervising domain name requests?
ICANN
The __________ is made up of businesses that focus on digital equipment, software, communications technologies, and related services.
ICT industry
___________ is the fraudulent use of someone's personal information to carry out transactions.
Identity theft
_______________ are two of the world's largest exporters of ICT services.
India and Ireland
1996 was the year that cable _______ service made its debut.
Internet
Which programming language is an interpreted language most commonly used for client-side Web scripting, such as animating page elements and validating input on HTML forms?
Javascript
DHCP assigns an IP address to a device and links it to the device's _______ address.
MAC
________ refers to any computer program designed to surreptitiously enter a digital device.
Malware
Which type of network topology allows for redundant paths between devices that can be used to bypass failed devices?
Mesh
Which OS is installed on more than 80% of the World's personal computers?
Microsoft Word
Which type of broadband Internet access involves using cellular data networks?
Mobile
A network utility called ______________ produces a detailed list of open ports on a device.
Netstat
Which type of software must include the source code, which allows programmers to modify and improve the software?
Open source
What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed?
PUP
________ is utility software designed to measure responsiveness of an Internet connection.
Ping
In a browser, _________ services can automatically complete your search requests based on previous searches.
Predictive
_________ software supplies the tools for combining text, photos, clip art, graphs, animations, and sound into a series of electronic slides that can be shown on a screen or projector
Presentation
____________ paradigms are used to conceptualize the solution to a problem as a sequence of steps.
Procedural
_________ is a temporary holding area for data and programs.
RAM
A ___________ is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker.
RAT
Which of the following is not a SQL keyword?
REMOVE
A(n) ___________ is a collection of language-specific programming tools that enables a programmer to develop applications for a specific computer platform.
SDK
Word processing software is likely to include which the following features?
Search and Replace, readability formula
Which type of device is the top target for ransomware?
Smartphones
Which database tool is best for simple flat files that involve calculations?
Spreadsheet software
Suppose you wanted to run a Web server or FTP server from your home. What type of IP address would you want?
Static
__________ methodology focuses on the processes that take place within an information system.
Structured
On a network, which protocol is responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order, and error checking?
TCP
Which business practice is a technique initiated by top management that involves all employees and all departments, and focuses on quality assurance in every product and service offered to customers?
TQM
A 404 status code indicates that the resource that your browser requested does not exist.
TRUE
A document called a system requirements report that describes the objectives for the information system.
TRUE
A local application is installed on a computer's hard disk.
TRUE
A slate tablet configuration is basically a screen in a narrow frame that lacks a physical keyboard.
TRUE
An API is a set of application or operating system functions that programmers can add to the programs they create.
TRUE
As a general rule, declarative programming languages are most suitable for problems that pertain to words and concepts rather than to numbers.
TRUE
Connection speed is technically a measure of capacity.
TRUE
Dedicated enterprise database applications may allow cosmetic changes, but they do not encourage modifications of core data structures.
TRUE
Dropbox is an example of a file hosting service.
TRUE
Files can remain in the Web cache for days or weeks
TRUE
In a display device, response rate is the time it takes for one pixel to change from black to white then back to black.
TRUE
In a key-value database, each data item has a key that is a unique identifier similar to a relational database key
TRUE
Information systems designed for a specific industry or enterprise may use vertical market software.
TRUE
Iterative SDLCs are often referred to as "agile methods" because they allow flexibility as development progresses.
TRUE
Many Web apps allow several people to collaborate on projects because the project files are stored on the Web and can be easily shared.
TRUE
Most spreadsheet software also includes basic data management features.
TRUE
One of the major functions of an information system is to help people make decisions in response to problems.
TRUE
Paragraph style includes the alignment of text within the margins and the space between each line of text.
TRUE
Prolog programming is all about facts and rules.
TRUE
Search engines will keep a record of your search history.
TRUE
Some database software provides tools to work with more than one collection of records, as long as the records are somehow related to each other.
TRUE
Structured English is a subset of the English language with a limited selection of sentence structures that reflect processing activities.
TRUE
Technically, a supply chain stretches from raw materials and parts all the way to customer delivery.
TRUE
Ten terabytes offer enough storage capacity to hold the printed collection of the Library of Congress.
TRUE
The Internet is the world's largest WAN.
TRUE
The first telephones were connected by point-to-point networks, similar to those used by the telegraph system.
TRUE
The goto command is rarely used by skilled programmers because it can lead to programs that are difficult to understand and maintain.
TRUE
The growth of the ICT industry has a generally upward trend.
TRUE
The term 'stored program' means that a series of instructions for a computing task can be loaded into a computer's memory.
TRUE
The term service pack usually applies to operating system updates.
TRUE
Whistleblowing is risky under any circumstances.
TRUE
You can set up Wi-Fi to use wireless mesh topology OR star topology.
TRUE
x86 processors use a different instruction set than ARM processors.
TRUE
Heuristics may produce false positives that mistakenly identify a legitimate file as malware.
TRUE
OS X devices include a utility that automatically encrypts data stored locally.
TRUE
Spam sent by scammers often uses spoofed email addresses.
TRUE
The 2002 Sarbanes-Oxley Act is meant to offer protection to whistleblowers.
TRUE
The goal of normalization is to minimize data redundancy.
TRUE
The most common types of PUPs and PUAs are toolbars and alternative browsers.
TRUE
UDP is faster than TCP but does not perform error checking.
TRUE
Based on existing laws governing international conflict, the ______________ sets out rules for conducting and responding to cyberwarfare.
Tallinn Manual
Which of the following is not an example of an Information Technology Law?
The Espionage Act of 1917
If you use a password manager, what do you as the user need to remember?
The master password.
_____________ is a network diagnostic tool that shows you each router and server that your data encounters as it travels over the Internet.
Traceroute
A Web site cannot be accessed by its domain name until the name is added to the domain name server lists.
True
A bitmap graphic is composed of a grid of tiny rectangular cells.
True
A hard disk drive is an example of magnetic storage.
True
A multicore processor that executes more than one instruction at a time is referred to as a parallel processor.
True
A vector graphic consists of a set of instructions for creating a picture.
True
An example of system software is a computer operating system.
True
Data refers to the symbols that represent people, events, things, and ideas.
True
Domain name servers maintain lists of all domain names and their corresponding IP addresses.
True
HTML tags are instructions for a browser.
True
In a spreadsheet worksheet, each cell in a grid can contain a value, label, or formula.
True
LANs use many of the same network technologies as the Internet.
True
Lossy compression throws away some of the original data during the compression process.
True
Macs do not use drive letters, and the main hard disk is called Macintosh HD.
True
Microprocessors only understand machine language, so there has to be some way to convert assembly language instructions into 1s and 0s.
True
Mobile broadband can be used to access the Internet from a laptop or desktop computer.
True
Networks can be classified according to their size and geographic scope.
True
One of the main disadvantages of MIDI is that it cannot produce vocals.
True
Packet loss of less than 2% is required for acceptable streaming, gaming, Skype, and voice calls.
True
Portable software does not require installation.
True
Some software engineering activities overlap with the systems analysis and design activities
True
The ability to switch between programs makes computers multipurpose devices.
True
The term instruction cycle refers to the process in which a computer executes a single instruction.
True
Web apps are examples of cloud computing.
True
When interference affects a wireless signal, data must be re-transmitted.
True
When setting up a Wi-Fi network, the router you select should support the fastest device you'll want to use on the network.
True
You won't find a desktop with application windows on an iOS device.
True
A botnet has a server that is controlled by hackers.
True
Applications include menu options for opening and saving files calling on the operating system's file management routines to get the job done.
True
Colossus used binary arithmetic.
True
Most trojans are not designed to replicate themselves.
True
Social engineering attacks prey on human vulnerabilities.
True
The first cellular phones to access the Internet and the Web were available in 1996.
True
The single most effective security measure for digital devices is to password protect access to them.
True
Which type of problem requires human intuition as the basis for finding a solution.
Unstructured
When the PC version of the spreadsheet program __________ became available, the IBM PC quickly became the top-selling personal computer.
VisiCalc
1024 Zettabytes = 1 _______.
Yottabyte
3-D graphics are based on vectors stored as a set of instructions describing the coordinates for lines and shapes in a three-dimensional space. What do these vectors form?
a wireframe
A low-level language has a low level of ___________ because it includes commands specific to a particular CPU or microprocessor family.
abstraction
A Web crawler uses a search _______ to traverse the Web.
algorithm
A calculation is based on a(n) ___________—the step-by-step process by which numbers are manipulated.
algorithm
A cryptographic __________ is a procedure for encryption or decryption.
algorithm
Which is a component of a search engine?
all of the above
Which of the following is an advantage of wired connection?
all of the above
Which of the following is an example of a DCE?
all of the above
Which of the following can be used to block unauthorized access while allowing authorized communications on a device or network?
all of the above
A(n) _________ database is used to collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions.
analytical
An ecommerce ____________ is the software that handles ecommerce transactions.
application
In Prolog programming, a(n) __________ represents one of the main subjects that a fact describes.
argument
The ____________ is the part of the microprocessor that performs arithmetic operations, such as addition and subtraction.
arithmetic logic unit
Today's widescreen devices, such as laptops and smartphones, are designed for the 16:9 __________.
aspect ratio
In the context of database security, database ______ identifies sensitive data and database vulnerabilities in order to secure them.
assessment
In a problem statement, you can limit complexity by making ____________.
assumptions
In spreadsheet software, the________________ feature ensures that the results in every cell are accurate for the information currently entered in the worksheet.
automatic recalculation
An example of _________ data is the 1 million transactions generated by Walmart sales registers every hour.
big
Hackers who gain control over several computers can organize them into a client-server network known as a(n) _______.
botnet
A Web _________ is client software that displays Web page elements and handles links between those pages.
browser
An operating system ensures that input and output proceed in an orderly manner, using ___________ to collect and hold data while the device is busy with other tasks.
buffers
A group of eight bits is called a _______.
byte
A(n) ____________ is special high-speed memory that allows a microprocessor to access data more rapidly than from memory located elsewhere on the system board.
cache
Your browser _________ serves as temporary storage for Web documents.
cache
In the context of bitmap graphics editing, what technique employs algorithms that pull pixels from one area of an image and then apply them to another area?
cloning
Remote storage that is available as an Internet service is called ______ storage.
cloud
A(n) _______ is the software that compresses a video stream when a video is stored, and decompresses the file when the video is played.
codec
Computers that operate in essentially the same way and use the same software are said to be ______.
compatible
Bit rate can be scaled down by reducing the resolution and applying ____________ techniques.
compression
Video files are stored in ________ formats that hold the compressed video stream and an audio stream.
container
The information industry has three major facets: _________, computers, and telecommunications.
content
In the context of a VDE, a(n) ___________ is a screen-based object whose behavior can be defined by a programmer.
control
Decision makers can access analytical databases using an executive __________.
dashboard
Using a ________ support worksheet, the project team can assign scores to each criterion, weight them, and compare totals for all solutions
decision
In the context of Prolog programming, a(n) ________________ is a tabular method for visualizing and specifying rules based on multiple factors.
decision table
The _______________ paradigm describes aspects of a problem that lead to a solution.
declarative
Your ________ browser is automatically used when opening a web page or clicking on a web link.
default
The process of converting information, such as text, numbers, photos, or music, into digital data that can be manipulated by electronic devices is called ___________.
digitization
The mechanism for tracking domain names and their corresponding IP addresses is called the ________.
domain name system
Internet addresses that are temporarily assigned are called ________ addresses.
dynamic
Conventional wisdom tells us that strong passwords are at least _____ characters in length and include one or more uppercase letters, numbers, and symbols.
eight
Password managers store passwords in a(n) _________ file
encrypted
Which of the following terms would best match this definition: Transforms a message or data file in such a way that its contents are hidden from unauthorized readers.
encryption
Password _________ is a measure in bits of a password's unpredictability.
entropy
The term professional _______ refers to on-the-job choices and actions that reflect a person's values.
ethics
Ports that expand the options for input, output, and storage, they are commonly called ____________ ports.
expansion
A file with a .css file extension indicates that it is a(n) ________ CSS.
external