Computer Science 103 Study Blue
Data dictionary
A DBMS uses the __________ to perform validation checks.
Power source
A UPS connects between a computer and a ____.
neural networks
A ___ is a system that attempts to imitate the behavior of the human brain.
Request for quotation (RFQ)
A ____ identifies the product(s) a systems analyst requires from a vendor.
Check
A __________ digit is a number(s) or character(s) that is appended to or inserted into a primary key field.
Script Kiddie
A __________ has the same intent as a cracker, but does not have the technical skills and knowledge.
Hub
A __________ is a device that provides a central point for cables in a network.
Trojan horse
A __________ is malware that hides within or looks like a legitimate program, such as a screen saver.
Dedicated
A __________ line is a type of always-on connection that is established between two communications devices.
Worm
A __________ replicates itself to other computers.
Command
A ___is an instruction that causes a program to perform a specific action.
Formula
A ___performs calculations on the data in a worksheet and displays the resulting value in a cell.
Authority
A certificate __________ is an authorized person or company that issues and verifies digital certificates.
Channel
A communications __________ is a transmission media on which data, instructions, or information travel.
Controller
A disk ____ consists of a special-purpose chip and electronic circuits that control the transfer of data, instructions, and information from a disk to and from the system bus and other components in the computer.
They have redundant data and they isolate data
A major weakness of a lot of file processing systems is that __________.
Topology
A network __________ refers to the layout of the computers and devices in a communications network.
Firewall
A personal __________ is a utility that detects and protects a computer from unauthorized intrusions.
A series of instructions that tells a computer what to do and how to do it.
A program is
VAR
A(n) ____ is a company that purchases products from manufacturers and then resells these products to the public. They also offer additional services with the purchased product.
Prototype
A(n) ____ is a working model of a proposed system.
Server
A(n) ____ operating system is an operating system that organizes and coordinates how multiple users access and share resources on a network.
Stand-alone
A(n) __________ operating system is a complete operating system that works on a desktop computer, notebook computer, or mobile computing device.
OODB
A(n) __________ stores data in objects.
Faster data transmission and smaller size; Better security for signals during transmission; Less susceptible to noise from other devices.
Advantages of fiber-optic cables?
Impact on labor force.
All of the following are advantages of using computers EXCEPT:
Both Domain and User Name
An email address is made up of which of the following parts?
Outsource
Companies can develop software in-house using their own IT personnel or ____ it, which means having an outside source develop it for them.
Computers with pipelining can process multiple instructions at once.
Computers with pipelining differ from those without pipelining in what way?
Run the same on multiple operating systems
Cross platform programs are programs that __________.
Program Design
During ____, a systems analyst identifies the required programs and the relationship among each program, as well as input, output, and database specifications.
File Transfer Protocol
FTP stands for what term?
False
Flash memory is a type volatile memory.
bandwidth should be high and latency low
For best performance of a communications channel, ____.
A Domain Name is the text format of an IP Address.
How are an IP address and domain name related?
Recovery
If a hard disk is damaged, a computer can be booted from a(n) __________ disk, which is usually a CD that contains a few system files that will start the computer.
The disadvantage of a multifunction peripheral is that ____.
If the device breaks down all functions are lost
has a primary key and each column has a unique name
In a relational database, each row ____.
Both Fabrication and Assembly
In computer-aided manufacturing, computers are used in the process of which of the following.
Phased
In what type of "conversion", does each location convert to a new system at a separate time?
Open source
Linux is __________ software, which means its code is provided for use, modification, and redistribution.
Pixels per Inch (PPI)
Manufacturers often use ___ to represent the resolution of a digital camera like the one shown in the accompanying figure?
Does not require line-of-sight transmission.
Many retailers use RFID as an alternative to bar codes because it ___.
Business-to-Business or (B2B) e-commerce
Most e-commerce actually takes place between businesses, which is called
Document Management Software
Provides a means of sharing, distributing, and searching documents by converting them into a format that can be viewed by any user.
False
Simply mail transfer protocol deals with incoming emails on mail servers.
Sequential
Tape storage requires ____ access, which refers to reading or writing data consecutively.
BIOS
The ____ is firmware that contains a computer's startup instructions.
Design
The ____ phase consists of two major activities: (1) if necessary, acquire hardware and software and (2) develop all of the details of the new or modified information system.
it can consolidate data much faster than a relational database
The advantage of a multidimensional database is that ____.
Width
The bus ___ determines the number of bits that the computer can transmit at one time.
Unicode
The coding scheme that is capable of representing all languages is which of the following.
Dictionary
The data ____ stores the data item's name, description, and other details about each item of data.
Turning it off, unplugging the power cord, and all cables from the ports.
The first step in cleaning a computer is ___?
Hardware, Software, Data, People, Procedures
The five elements of an information system are:
Planning, designing, creation, storing, maintaining
The five steps of publishing a Web site in order is which of the following:
Incorporate comfort, efficiency, and safety in workplace design.
The goal of ergonomics is to ___.
Improve Processing Times
The purpose of a "cache" is to ___?
Operation, support, security
The purpose of the ____ phase is to provide ongoing assistance for an information system and its users after the system is implemented.
Wiki
The type of Web page that allows users to create, add, modify, or delete content is ___
URL
The web address www.iastate.eduis an example of?
True
True or False. An online service provider is different from Internet service providers because it provides additional features to members.
True
True or False. Animation is the use of a series of still images displayed in sequence to create the appearance of motion.
True
True or False. Telemedicine is a form of long distance health care that lets health-care professionals in different locations to have live conferences over the internet.
True
True or False: A(n) DoS attack is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail.
False
True or False: All activities in the system development life cycle must be performed at a different time.
False
True or False: The lower the dpi (dots per inch) an ink-jet printer can output, the better the print quality.
False
True or False? A system on a chip combines memory, processor and audio into one chip.
True
True or False? E-learning is the delivery of education through some electronic method.
False
True or False? The higher the ppi, the more images you can store in the camera?
True
True or False?Biometrics is the technology of authenticating a person's identity by verifying personal characteristics.
True
True or False?Utility programs are considered part of the system software on a computer.
False
True or False?When you save a document, the computer transfers the document from a storage medium to memory.
True
True or false. A graphical user interface (GUI) controls how users enter and view data through the use of icons, graphics, and text.
operating system and utitlty programs
Two types of system software
Keyboard, stylus, pen, etc.
Users can use ___ to input information into a smart phones.
Text, graphics, video, and audio
What are the basic categories of output?
Fetching, Decoding, Executing, Storing
What are the four steps of the machine cycle in order?
Studio, Field, Point-and-Shoot
What are the three correct types of digital cameras?
Point-of-Sale, DVD Kiosk, ATM
What are the three types of computer terminals?
Adapter Cards and Peripherals are automatically configured as you install them.
What does Plug and Play technology mean?
It increases the low bass sounds for a speaker system
What does a subwoofer do?
Programs that extend the capability of a browser.
What is a plug-in?
A circuit board that enhances functions or connects peripherals.
What is an adapter card (also known as an expansion card)?
A collection of unprocessed text, numbers, images, audio, and video.
What is data?
super computer
What is the fastest type of computer?
The bus itself might become inoperable
What is the greatest risk to a bus network?
Planning, analysis, design, implementation, support (PADIS)
What is the order that most system development life cycles (SDLC) contain?
Software Suite
What is the term for individual software programs integrated into a package?
Integrity
What is the term that identifies the quality of data in a database?
Memory
When you start the computer the operating system is loaded (copied) from the computer's hard disk into ___?
Laptops
Which of the following devices would not have an internal miniature hard disk: Laptops, Smart phones, media players or digital cameras?
A Wi-Fi's internet service can be dial-up access..
Which of the following is NOT true of a Wi-Fi network?
A single-core processor is better for multitasking.
Which of the following is NOT true?
Trackball
Which of the following is a stationary device with a ball on its top or side?
Dial-up
Which of the following is a temporary connection that uses analog lines for communications?
Both Megabyte and Bit
Which of the following is a unit of measurement for data?
A Touchpad
Which of the following is an example of an input device?
Operating Systems Software
Which of the following is an example of system software?
Temporary User
Which of the following is not a category of computer user?
Register Data
Which of the following is not a category of items stored in memory?
Keyboard
Which of the following is not a form of input?
Consumer-to-business
Which of the following is not a type of E-commerce?
Internet
Which of the following is not a type of audio input?
Word Processing Software
Which of the following is not an example of system software?
Verify. (It's Input, Process, Output, Storage)
Which of the following is not part of the information processing cycle?
RAID
Which of the following is the term for a group of two or more integrated hard disks?
Internet Telephony
Which of the following requires a high-speed Internet connection to function properly?
Gas is sandwiched between two plates of glass in a plasma monitor
Which of the following statements about plasma monitors is true?
Tape
Which of the following storage media does not use direct access: DVDs, CDs, Tape, Hard Disks?
Banks
Who are the primary user of MICR readers?
Mathematicians
Who is not a common user of computer-aided design (CAD) software?
Bus
Within the circuitry of a computer, each channel along which bits transfer, called a(n) ___, allows the various devices both inside and attached to the system unit to communicate with each other.
Telecommuting
___ is a work arrangement in which employees work away from a company's standard workplace and often communicate with the office through the computer.
Streaming
___ is done when data is transferred continuously and evenly for the purpose of immediate playback.
Spoofing
____ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
Output
____ is data that has been processed into a useful form.
Cookies
____ is/are not considered spyware because a user knows it/they exist(s).
Spyware
______ is a program placed on a computer without the user's knowledge or consent that secretly collects information about the user.
Cellular
__________ radio is a form of broadcast radio that is used widely for mobile communications, specifically wireless modems and telephones.
DSL
___is a technology that provides high-speed Internet connection using regular copper telephone lines.
Parallel Processing
___is the term for using multiple processors simultaneously to execute a program or task.
Accounting
___software helps companies record and report their financial transactions.
Spreadsheet
___software is software that allows users to organize data in rows and columns and perform calculations on the data.
A(n) ____ printer is an impact printer that produces printed images when tiny wire pins on a print head mechanism strike an inked ribbon.
dot-matrix
Literacy
entails having the knowledge and understanding of computers and their uses.
Open-Source Software
has no restrictions from the copyright holder regarding the modification of the software's internal instructions and redistribution of the software.
Data
is a collection of unprocessed items, which can include text, numbers, images, audio, and video.
Database Software
is a type of business software that lets users query data and generate forms?
L1 Cache
is built directly into a processor chip and usually has a very small capacity.
Application
software consists of programs designed to make users more productive and/or assist them with personal tasks.