CS 1 Final Exam
True or False -- Most spreadsheet programs do not have built-in Web capabilities.
False
True or False -- RAM capacity is measured in bits.
False
True or False -- Storage media are volatile.
False
True or False -- Direct Internet connections are much slower than dial-up connections.
False
True or False -- Today's CPUs contain hundreds of millions of transistors, and the number doubles approximately every 18 months, a phenomenon known as Moliere's Law.
False
True or False -- Traditionally, the magnetic particles on a hard disk have been aligned vertically, perpendicular to the hard disk's surface.
False
True or False -- Typically, in hierarchical database management systems, a one-to-one relationship exists between data entities.
False
Using virtual memory is faster than just using RAM.
False
Windows 98 was built from the ground up using a different kernel than the other versions of Windows.
False
True or False -- Arranging data for efficient retrieval is called data organization.
True
True or False -- The graphics tablet is typically connected to a computer via a USB port.
True
Creating a ____ means making a duplicate copy of important files so you can restore those files if needed.
backup
Comments are usually preceded by a specific symbol.
True
Fourth-generation languages are commonly used today to access databases.
True
True or False -- Pharming attacks often increase after the occurrence of large data breaches that expose names and e-mail addresses of individuals, along with the businesses that these individuals patronize.
False
True or False -- Portable barcode readers are always used in point-of-sale (POS) systems.
False
True or False -- RFID tags need to be within line of sight of a reader.
False
True or False -- ROM (read-only memory), also called main memory or system memory, is used to store the essential parts of the operating system while the computer is running.
False
True or False -- Repeated threats or other malicious behavior that poses a credible threat of harm carried out online is referred to as phishing.
False
True or False -- Semirugged devices are designed to withstand drops onto concrete, extreme temperature variations, and use while being bounced around over rough terrain in a vehicle.
False
True or False -- Single-core CPUs allow computers to work simultaneously on more than one task at a time.
False
True or False -- Spam refers to harmful programs that can be installed on our computers without our knowledge.
False
True or False -- The Cut command in Windows can be replaced by the keyboard shortcut [Ctrl]+[C].
False
True or False -- The ISP is the largest and most well-known computer network in the world.
False
True or False -- The backside bus (BSB) has been one of the most common types of expansion buses in past years.
False
True or False -- There are buses inside the CPU, as well as on the memory channel.
False
True or False -- Unintentional encryption can result in huge data losses during or after a natural disaster or a terrorist attack.
False
True or False -- Wired displays connect to a computer or other device (such as to a smartphone) using a wireless networking connection such as Wi-Fi, Bluetooth, or a special wireless standard designed for transmitting multimedia.
False
True or False -- With a DVD, the storage medium and the storage device are permanently sealed together to form one piece of hardware called a fixed-media storage system.
False
True or False -- With random access, the data can only be retrieved in the order in which it is physically stored on the medium.
False
True or False -- With rewritable optical media, the laser permanently alters the disc surface.
False
Most Windows computers typically use ____, which supports much larger hard drives and files than the older FAT32 and includes better security and error-recovery capabilities.
NTFS
____ devices are high-performance storage systems that are connected individually to a network to provide storage for the computers connected to that network.
Network attached storage (NAS)
Plasma displays use a layered technology like LCD and ____ and look similar to LCD displays.
OLED
The UML standards are developed by the ____.
OMG
The documentation resulting from the design phase of the ____ is a set of design specifications that illustrates the program needed to fulfill the program requirements.
PDLC
To restore a file or folder deleted from your computer's hard drive, open the ____ and restore the file.
Recycle Bin
____ Web sites provide access to specific types of useful information, such as maps and driving directions.
Reference
____ optical discs can be written to, erased, and overwritten just like magnetic hard disks.
Rewritable
The ____ cards used with mobile phones today are a special type of smart card.
SIM
Low-level languages make programs easier to write.
False
Markup languages are most often used to add dynamic content to a Web page or to integrate a Web page with a database.
False
True or False -- Advocates of war driving and cyberstalking state that, unless individuals or businesses protect their access points, they are welcoming others to use them.
False
True or False -- CRT monitors use digital signals to display images, which allows for sharper images.
False
You must have the necessary hardware to support to use multiple monitors, such as the appropriate ____.
monitor ports
True or False -- Cloud databases allow Web pages to be static Web pages; that is, Web pages in which the appearance or content of the pages changes based on the user's input.
False
True or False -- Data accessibility refers to protecting data against destruction and misuse—both intentional and accidental.
False
True or False -- Display device size is measured diagonally from corner to corner as opposed to the way TV screens are measured.
False
True or False -- Display devices are used to select and manipulate objects, to input certain types of data (such as handwritten data), and to issue commands to the computer.
False
True or False -- Dr. Herman Hollerith's Punch Card Tabulating Machine and Sorter was the first electromechanical machine that could read slide rules.
False
True or False -- Due to the rising number of violent thefts of smartphones in major U.S. cities, cloud locks have been receiving increased attention.
False
True or False -- Embedded computers are computers that host data and programs available to a small group of users.
False
A hard drive that uses FDE is often referred to as a(n) ____.
self encrypting hard drive
A(n) ____ occurs when the programmer has not followed the proper rules of the programming language being used.
syntax error
True or False -- FTP programs block access to a computer from outside computers and enable each user to specify which programs on his or her computer are allowed to have access to the Internet. _________________________
False
True or False -- Joysticks are headphones with a built-in microphone.
False
True or False -- LCD displays do not use backlighting, which makes them energy efficient and lengthens the battery life of portable devices using these displays.
False
True or False -- LCD displays use layers of organic material, which emit a visible light when electric current is applied.
False
True or False -- Most recent software programs, including the latest versions of Microsoft Windows, OS X, and Microsoft Office, use ASCII.
False
True or False -- One type of self-contained business application designed to work over the Internet or a company network is a(n) Internet service.
False
Folders can contain both files and other folders (called subfolders).
True
Java programs are compiled into a format called bytecode.
True
There are no standard XML tags.
True
True or False -- A strategy that is sometimes used with keywords is the wildcard approach.
True
True or False -- A user inputs data into a computer, and then the computer processes it.
True
Direct Internet connections are typically ____ connections.
broadband
Businesses and other organizations (particularly ____ providers) have tremendous storage needs.
cloud
Chrome OS is the first ____
cloud operating system
To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.
codes of conduct
____ is a useful sales and marketing tool to help companies match customers with products they would be likely to purchase.
customer profiling
Conventional personal computers that are designed to fit on or next to a desk are often referred to as ____.
desktop computers
Some mobile apps are designed to be compatible with popular ____ such as Microsoft Office.
desktop software
True or False -- Although cost is a factor when comparing similar devices, it is often not the most compelling reason to choose a particular technology.
True
True or False -- At its most basic level, word processing is used to do what was done on a typewriter before computers were commonplace.
True
True or False -- Automating the data entry process is referred to as source data automation.
True
True or False -- Before using a dial-up access number to connect to the Internet, verify that it is a local telephone number; if it is not, you will incur long-distance charges.
True
True or False -- Businesses and ISPs typically archive e-mail messages that travel through their servers.
True
True or False -- Cloud software is delivered on demand via the Web to wherever the user is at the moment, provided he or she has an Internet connection.
True
True or False -- Computer literacy is knowing about and understanding computers and their uses.
True
True or False -- Computer speakers are the most common type of audio output device.
True
True or False -- Conventional RAM is volatile.
True
True or False -- Data integrity refers to the accuracy of data.
True
True or False -- Drawing programs typically create vector graphics, which use mathematical formulas to represent image content instead of pixels.
True
True or False -- Each location in memory has an address.
True
True or False -- Each pixel in a monochrome graphic can be only one of two possible colors (such as black or white).
True
True or False -- Early computers required programs to be written in machine language.
True
True or False -- NoSQL databases are organized differently than relational databases are organized and therefore, they do not usually use tables and SQL.
True
True or False -- Open source software are programs made up of source code that is available to the public.
True
True or False -- Spyware is a possible privacy risk.
True
True or False -- Users do not have to be concerned with how files are physically stored on a storage medium.
True
True or False -- Virtually all computer users will need at least one convenient USB port to be used to connect external hard drives, USB flash drives, printers, mice, and other USB-based hardware.
True
True or False -- Web browsers maintain a History list, which is a record of all Web pages visited during the period of time specified in the browser settings.
True
Two of the most common design and manufacturing systems are known as CAM and CAD.
True
User documentation normally consists of a user's manual containing instructions for running the program, a description of software commands, and so forth.
True
Windows Vista replaced Windows XP.
True
____ was originally developed in the late 1960s at AT&T Bell Laboratories as an operating system for midrange servers.
UNIX
Online shopping and online investing are examples of ____.
e-commerce
One common way to deal with spam that makes it to your computer is to use a(n) ____.
e-mail filter
Some 3D projectors are designed to project ____.
holograms
A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.
hot site
The most common type of Internet search is the ____.
keyword search
A ____ is approximately 1,000 bytes.
kilobyte (KB)
The ____ is cited as a disadvantage of Web-based training and distance learning by some educators.
lack of face-to-face contact
Regardless of how storage devices are connected to a computer, ____ and/or names are typically assigned to each storage device.
letters of the alphabet
A(n) ____ uses charged liquid crystals located between two sheets of clear material to light up the appropriate pixels to form the image on the screen.
liquid crystal display (LCD)
Today's CPUs are formed using a process called ____ that imprints patterns on semiconductor materials.
lithography
When ____ occur during preliminary debugging, dummy print statements—statements that are temporarily inserted into the code to display status information on the screen—can be used to help locate the error.
logic errors
A(n) ____ is an information system that provides decision makers with regular, routine, and timely information that is used to make decisions.
management information system (MIS)
One factor affecting digital camera quality is the number of pixels, measured in ____, used to store the data for each image.
megapixels
Two specific types of ____ are e-commerce systems and point-of-sale (POS) systems.
order entry systems
One of the simplest hashing algorithms involves dividing the primary key field by a particular ____.
prime number
Often the storage device and storage medium are two separate pieces of hardware (that is, the storage medium is ____).
removable
A ____ displays table information with a more formal, businesslike appearance.
report
The ____ contains a list of technical specifications for equipment, software, and services needed for a new system, as determined during the system design phase, and requests that vendors propose products that meet those specifications.
request for proposal (RFP)
A record is also called a ____.
row
____ are designed to withstand much more physical abuse than conventional devices.
ruggedized devices
Fifty years ago, computers were used primarily by researchers and ____.
scientists
Middleware for cloud database applications is commonly written as ____—short sections of code written in a programming or scripting language that are executed by another program.
scripts
Most search sites use a ____—a software program—in conjunction with a huge database of information about Web pages to help visitors find Web pages that contain the information they are seeking.
search engine
The surface of a hard disk is organized into tracks and pie-shaped groups of ____.
sectors
Computing technologies make it possible to have ____, traditional appliances with some type of built-in computer or communications technology.
smart appliances
The types of ____ systems used with personal and business computers today include smart cards.
storage
A storage medium is inserted into its corresponding ____ in order to be read from or written to.
storage device
The key element of the microprocessor is the ____—a device made of semiconductor material that controls the flow of electrons inside a chip.
transistor
Terascale computing is the ability of a computer to process one ____ floating point operations per second (teraflops).
trillion
____ form images by spraying tiny drops of liquid ink onto the page, one printed line at a time.
Ink-jet printers
____ occurs when data is entered into the computer.
Input
Application programmers manage day-to-day processing once a system has become operational.
False
Application software runs in the background at all times, making it possible for you to use your computer.
False
C is an object-oriented programming language developed by Sun Microsystems.
False
Filename rules are the same in all operating systems.
False
____ are utility programs that search for documents and other files on a user's hard drives.
Search tools
A variety of problems have emerged from our extensive use of computers and related technology, ranging from stress and health concerns, to the proliferation of ____ and malware.
Spam
Common online investing services include the ability to set up a(n) ____ that displays the status of the stocks you specify.
online portfolio
The ____ refers to a world where everyday physical objects are connected to, and uniquely identifiable on, the Internet so they can communicate with other devices.
Internet of Things (IoT)
____ refer to the variety of systems in place to record the details of a company's financial transactions (such as payments and purchases).
accounting systems
____ is the use of video cameras to monitor activities of individuals, typically for work-related or crime-prevention purposes.
video surveillance
Popular drawing programs include ____, CorelDRAW, and Corel Painter.
Adobe Illustrator CC
____ are the standard for business documents and come in both personal and network versions.
Laser printers
Each place value in a binary number represents ____ raised to the appropriate power.
2
Hybrid notebook-tablet computers are also called convertible tablets or ____.
2-in-1 computers
Conventional dial-up connects to the Internet at a maximum of ____.
56 Kbps
When selecting font size in a document, ____ points equals one-inch-tall text.
72
One of the most obvious initial changes in Windows Vista was the ____ interface.
Aero
The ____ is the section of a CPU core that performs arithmetic involving integers and logical operations.
ALU
Most application programs have a built-in help feature, typically available through a(n) ____ button.
Help
____ refers to using a personal computer to combine and manipulate text and images to create attractive documents that look as if they were created by a professional printer.
Desktop publishing
____ versions of freeware and open source software are often available to the public for testing.
BETA
____ is freeware software.
Chrome (Web browser)
The bus width and bus speed together determine the bus's ____.
bandwidth
Rearranging the data on the hard drive so all files are stored in contiguous locations is called ____.
Disk Defragmentation
____, as it relates to the Internet, encompasses what information about individuals is available, how it is used, and by whom.
Privacy
High-level object-oriented programming languages include C++, C#, Java, Dart, and ____.
Python
RAID 0 uses disk ____, which spreads files over two or more hard drives.
Striping
____ focuses on specifying what the new system will look like and how it will work.
System design
External hard drives typically connect to a computer via an external port (such as a USB or ____ port) or a wireless connection.
Thunderbolt
Data mining used in conjunction with Web site data is referred to as Web mining.
True
To connect multiple USB devices to a single USB port, a ____ can be used.
USB hub
Common types of possessed objects are smart cards, RFID-encoded badges, magnetic cards, ____, and smartphones that are swiped through or placed close to a reader to be read.
USB security tokens
System software is usually divided into two categories: operating systems and ____ programs.
Utility
____ is a set of rules for exchanging data over the Web.
XML
To navigate to a new Web page for which you know the URL, type that URL in the browser's ____ bar and press Enter.
address
In the program design phase of the PDLC, the specifications developed during the problem analysis phase are used to develop a(n) ____ for the program.
algorithm
Digital camcorders are similar to conventional ____ camcorders.
analog
CRT monitors use ____.
analog signals
A ____ is the smallest unit of data that a binary computer can recognize.
bit
The number of bits used to store color information about each pixel is called ____.
bit depth
A(n) ____ is a flat, touch-sensitive device used in conjunction with a digital pen.
graphics tablet
LCD panels used with computer monitors typically include a light, usually at the rear of the display device—a technique referred to as ____ .
backlighting
Creating a(n) ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy.
backup
____ carry on written "conversations" with people in a natural language.
chatterbots
The various types of communications systems that are in place at many organizations include e-mail, messaging, videoconferencing, ____, and telecommuting.
collaborative (workgroup) computing
A field is also called a ____.
column
The objective of ____ is to gather useful data about the system being studied.
data collection
Case-Based Critical Thinking Questions Case 6-1 When Mary started college, her parents bought her a new computer that came loaded with the bare essentials in terms of software applications. She is now looking into purchasing additional software. Mary enjoys taking digital photos and would like software that would allow her to perform tasks such as correct brightness or contrast, eliminate red eye, crop, resize, etc. In order to have this functionality on her computer, she needs a photo ____ program.
editing
Collecting in-depth information about an individual is known as ____.
electronic profiling
Case-Based Critical Thinking Questions Case 3-1 Dan is a small business owner who depends on his computer to keep track of customer and sales data. He is investigating storage options because it is critical for him to ensure that his data is safe in the event of a computer failure. As Dan is very concerned about maintaining the security of his business data, he should look for an external hard drive that comes with built-in ____.
encryption
Case-Based Critical Thinking Questions Case 14-1 James is a recent college graduate and has six months of IT experience. He is thinking about pursuing a certification program in order to demonstrate that he is serious about IT. James is most interested in becoming a database designer. Another name for this career choice is database ____.
engineer
Case-Based Critical Thinking Questions Case 6-2 Bryan has just started an internship in which he uses a database frequently. The database contains information about the company's employees. Bryan's supervisor senses that he is anxious about using the database and drops by to give him a short tutorial. Bryan is told by the supervisor that to create a database, he first needs to create the database ____ itself, and then he can create the necessary database objects.
file
Case-Based Critical Thinking Questions Case 12-1 Mary is entering her senior year of college. She has a meeting on Friday with her advisor to discuss her career plans. Mary might want to consider becoming a ____, as she would eventually like to manage networks for an organization and determine what changes, if any, are needed.
network systems and data communications analyst
Artificial intelligence systems that attempt to imitate the way a human brain works are called ____.
neural networks
One nanometer (nm) is ____ of a meter.
one-billionth
Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.
privacy policy
Case-Based Critical Thinking Questions Case 2-2 Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit documents. Recently, he has come to realize that in order to keep the computer performing at its best, he needs to carry out regular system maintenance on the computer. Since Jack has a Windows system, he can right-click a hard drive icon in File Explorer, select Properties, and then select the ____ option on the Tools tab to check that hard drive for errors.
Check
Most operating systems include security features, such as an integrated ____, to protect against unauthorized access via the Internet.
Firewall
____ programs can protect against someone accessing your computer via the Internet or a wireless connection.
Firewall
____ consists of nonvolatile memory chips that can be used for storage by the computer or the user.
Flash memory
____ have begun to replace ROM for storing system information, such as a computer's BIOS.
Flash memory chips
A computer operations manager designs and builds the end-user interfaces and tools used with cloud services.
False
A paperless office can be implemented today through a variety of technologies and processing techniques.
False
A scripting language is a type of language that uses symbols or tags to describe what a document should look like.
False
A selection control structure is simply a series of statements that follow one another.
False
A(n) GIS program helps design buildings, bridges, and other structures; design new products; design mechanical and electrical systems; and so forth.
False
A(n) data mart typically stores data for an entire enterprise.
False
A(n) systems analyst codes system software, fine-tunes operating system performance, and performs other system software-related tasks.
False
All programs and data located in RAM are divided into fixed-length pages or variable-length files.
False
Cleanup programs evaluate your system, looking for problems and making recommendations for fixing any errors that are discovered
False
Cleanup programs evaluate your system, looking for problems and making recommendations for fixing any errors that are discovered.
False
ERP refers to the transfer of data electronically between companies using networks, such as the Internet.
False
In 1994, Microsoft announced that all versions of Windows after 3.11 would be full-fledged operating systems instead of just application environments.
False
In Windows, users can use the search box located at the lower-left corner of the File Explorer window to search for files and folders in the current location that match the keywords entered into the search box.
False
Most application systems today look for and recognize new devices each time the computer boots.
False
Most operating systems are designed for either 16-bit or 32-bit CPUs.
False
One advantage of playing against a computer is that even if the human player makes a mistake, there is still hope that the computer opponent will make its own mistake at a later time, to level the playing field in that game.
False
One or more rounds of outside tests for programs created for mass distribution are referred to as alpha tests
False
Operating systems manage and process data from the time it is generated (such as data resulting from orders, documents, and other business transactions) through its conversion into information.
False
Robots of the future are expected to have a less humanoid form than the household robots currently on the market.
False
Structure charts are used to illustrate the step-by-step logic that is to take place within a program, module, or method.
False
TPS transactions are typically processed using batch processing.
False
The SCM describes the development of a system from the time it is first studied until the time it is updated or replaced.
False
The Windows Action Manager lists all the program and processes currently running on a computer.
False
The combination of hardware, software, and other resources used to increase productivity and facilitate communications in the office, is collectively referred to as a(n) system development life cycle.
False
The data dictionary resulting from the system analysis phase includes any instruments (such as questionnaires or interview questions) used in the data gathering stage, as well as the resulting diagrams, tables, trees, models, and other tools used to summarize and analyze the gathered data.
False
The goal of business intelligence is to provide a detailed picture of an organization, its functions, and its systems, as well as the relationships among these items.
False
The older DOS operating system and some versions of the UNIX and Linux operating systems use a(n) graphical user interface.
False
The older DOS operating system and some versions of the UNIX and Linux operating systems use a(n) graphical user interface. _________________________
False
The purpose of computer-aided manufacturing (CAM) is to reduce the time designers spend developing products.
False
The repetition control structure is also called the selection control structure.
False
The three most common types of language translators are compilers, interpreters, and coders.
False
True or False -- "Tracking up data" refers to creating a second copy of important files.
False
True or False -- A computer does not always do whatever the instructions, or program, tell it to do.
False
True or False -- A database that combines object and relational database technology can be referred to as an object-oriented database management system (OODBMS).
False
True or False -- A database typically consists of interrelated tables that contain forms and reports.
False
True or False -- A government database is a collection of data about people that is collected and maintained by private industry.
False
True or False -- A graphics tablet is also called a digitizing tablet.
False
True or False -- A(n) display screen is a programmable, electronic device that accepts data, performs operations on that data, presents the results, and stores the data or results as needed.
False
True or False -- A(n) e-diary is a Web page that contains short, frequently updated entries in chronological order.
False
True or False -- A(n) keyword search uses lists of categories instead of a search box.
False
True or False -- Abbreviations or acronyms, such as BTW for "between the words," are commonly used to save time in all types of communications today.
False
True or False -- According to the online version of the Merriam-Webster Dictionary, the term "aphorize" means "to steal and pass off the ideas or words of another as one's own" or to "use another's production without crediting the source."
False
True or False -- Advocates of war driving and cyberstalking state that, unless individuals or businesses protect their access points, they are welcoming others to use them. _________________________
False
True or False -- All public Wi-Fi hotspots are free.
False
True or False -- An external flash memory card reader that connects via an RJ14 port can be used when the destination device doesn't have a built-in reader.
False
True or False -- Application service providers (ASPs) supply the information that is available through the Internet.
False
True or False -- As a hard drive begins to get full, it takes less time to locate the data stored on the hard drive.
False
True or False -- At the lowest level, words are entered into database fields (columns), which hold single pieces of data in the database, such as product names or quantities.
False
True or False -- Because of its large size, audio data is usually encrypted to reduce its file size when it is transmitted over the Internet or stored on a smartphone or another device.
False
True or False -- Cache memory today is usually external cache.
False
True or False -- Computer programmers are the people who use computers to perform tasks or obtain information.
False
True or False -- Database developers are the people responsible for managing the databases within an organization.
False
True or False -- Each pixel on an LCD display emits visible light in the necessary color.
False
True or False -- For an even higher level of security than a scheduled backup, presence backup can be used.
False
True or False -- For extended power outages, generators are needed.
False
True or False -- Hardware theft can take many forms, including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement.
False
True or False -- If a field needs to store decimal places, the Long Integer field size can be used.
False
True or False -- Images need to be scanned at a lower resolution if the image will be enlarged significantly.
False
True or False -- In 1993, a group of professors and students at the University of Illinois National Center for Supercomputing Applications (NCSA) released the Netscape Web browser. _________________________
False
True or False -- In a typical word processing program, a footer is text entered by the user that appears at the top of every page.
False
True or False -- In a worksheet, functions are words, column headings, and other nonmathematical data.
False
True or False -- In addition to hardware, software, data, and procedures, the fifth major component of a computer system are codes.
False
True or False -- In determining where to store specific data in a(n) centralized DBMS, factors such as communications cost, response time, storage cost, and security are key considerations.
False
True or False -- In terms of functionality, the distinction between NAS and HHD is blurring because they both provide storage services to the network.
False
True or False -- Independent Web sites such as Snopes.com reports on the sources of current online rumors and stories.
False
True or False -- Instant messaging (IM) is the original industry term for the process of placing telephone calls over the Internet. _________________________
False
True or False -- Mobile tablets are extremely powerful computers used for complex computations and processing.
False
True or False -- Most application programs that allow text editing have a(n) editing spot that looks like a blinking vertical line on the screen and shows where the next change will be made to the document currently displayed on the screen.
False
True or False -- Most printers today are impact printers.
False
True or False -- Normalization is usually viewed as a multistep process, moving the table structures from first normal form (1NF) to usually fifth normal form (5NF).
False
True or False -- Once an image is inserted into a document, it cannot easily be modified.
False
True or False -- Once you have an Internet connection, you are ready to begin programming the Web—that is, to use a Web browser to view Web pages.
False
True or False -- One of the most important skills an Internet user can acquire today is how to successfully publish databases on the Internet.
False
True or False -- One or more adjacent sectors form a(n) track, the smallest amount of disk space that can be used to hold a file.
False
True or False -- One-dimension (1D) barcodes contain data only vertically.
False
True or False -- Online auctions allow you to check your account balances, make electronic payments, view your transaction history, and more.
False
True or False -- Optical character recognition (OCR) is a technology used primarily by the banking industry to facilitate check processing.
False
True or False -- Optical marks are characters specifically designed to be identifiable by humans as well as by an OCR device.
False
True or False -- Ownership rights for original creative works are referred to as software licenses.
False
True or False -- Performance-based exams cannot be administered and taken online.
False
True or False -- Printers produce soft copy.
False
True or False -- Read a Web site's piracy rules before providing any personal information.
False
True or False -- Repairing or restoring data that has become corrupt, such as the result of a storage media error or a computer virus, is a database analysis activity.
False
True or False -- Satellite communication (more commonly called s-com) is the process of exchanging electronic messages between individuals over a network—usually the Internet.
False
True or False -- Scanners produce images through either impact or nonimpact technologies.
False
True or False -- Software that connects two otherwise separate applications (such as a Web server and a DBMS) is referred to as interware.
False
True or False -- Some software tools are designed for recovery, instead of prevention; that is, they are designed to locate lost or stolen hardware. One example is device tracking software.
False
True or False -- The Web is a worldwide collection of separate, but interconnected, networks accessed daily by billions of people using a variety of devices to obtain information, disseminate information, or communicate with others.
False
True or False -- The control unit takes the instructions fetched by the prefetch unit and translates them into a form that can be understood by the control unit, ALU, and FPU.
False
True or False -- The data dictionary includes data located in the database tables.
False
True or False -- The development rights of a software program specify the allowable use of the program.
False
True or False -- The external hardware components are located inside the main box or system unit of the computer.
False
True or False -- The finished specifications for a table are commonly referred to as the table format.
False
True or False -- The hard drives of devices to be disposed of should be destroyed before they are sold or recycled. _________________________
False
True or False -- The lack of feedback is one disadvantage of Web-based training and distance learning.
False
True or False -- The main circuit board inside the system unit is called the megaboard.
False
True or False -- The most common security protocol used with secure Web pages is Secure Sockets Layer (SSL).
False
True or False -- The number of digital photos that can be stored in a camera at one time depends only on the capacity of the card being used.
False
True or False -- The primary function of employee monitoring is to track employee productivity.
False
True or False -- The process of recording data onto a recordable or rewritable optical disc is called tracking.
False
True or False -- The process of representing data in a form that can be understood by a digital computer is called decimal byte representation.
False
True or False -- The slide rule is considered by many to be the earliest recorded calculating device.
False
True or False -- The term surveillance refers to unsolicited e-mail sent to a large group of individuals at one time.
False
True or False -- The toolbar command button that pastes the last item copied or cut to the Clipboard to the current location can be replaced by the keyboard shortcut [Ctrl]+[P].
False
True or False -- The use of cookies provides no benefits to consumers.
False
True or False -- There are many options for protecting yourself against computer monitoring by your employer or the government.
False
True or False -- There are two parts to any storage system: the storage processor and the storage device.
False
True or False -- Thunderbolt ports are used to receive wireless transmissions from devices.
False
True or False -- To begin to use a computer, the user first turns on the power by pressing the power button, and then the computer displays a prompt for the user to decide the next course of action.
False
True or False -- To create presentation graphics, database software is used.
False
True or False -- To help you identify USB 3 ports, they are colored red.
False
True or False -- To protect hardware from damage due to power fluctuations, it is important for all computer users to use a voltage inverter.
False
True or False -- To write to, erase, or overwrite rewritable optical discs, track change technology is used.
False
True or False -- Typically, objects in painting programs can be layered so, if you place one object on top of another, you can later separate the two images if desired.
False
True or False -- USB ports are used to connect a computer to a phone outlet via telephone connectors.
False
True or False -- Views need to be designed to extract the requested information from a relational database, as efficiently as possible.
False
True or False -- Web services companies are the enterprises that own or operate the paths or "roadways" along which Internet data travels, such as the Internet backbone and the communications networks connected to it. _________________________
False
True or False -- Web-based software must be installed on the device being used before it is run.
False
True or False -- When entering a formula or function into a cell, most spreadsheet programs require that you begin with some type of symbol, usually the asterisk character (*).
False
True or False -- When hard drives containing critical data become damaged, systems design firms may be able to help out.
False
When you issue the command for your computer to store a document on your hard drive, the application software must make sure that the specified hard drive exists.
False
With most programs, compiling or interpreting a program for the first time will result in errors, and the assembling process consists of locating and correcting these errors.
False
With the do until structure, the statements in the loop are repeated as long as a certain condition is true.
False
The file management program incorporated into recent versions of Windows is ____.
File Explorer
Filenames typically include a ____ at the end of the filename.
File Extension
An important task that the operating system performs is ____, which keeps track of the files stored on a computer so that they can be retrieved when needed.
File Management
Using the Save As option on the File tab, before editing a document is a good idea, so you can return to the original version if needed.
True
While COBOL is not inherently suited to developing interactive applications or cloud software, new versions of COBOL are evolving to support new applications.
True
With File Explorer, use the View tab to specify how the items in the right pane are displayed
True
With File Explorer, use the View tab to specify how the items in the right pane are displayed.
True
With a JIT system, inventory, production resources, and finished products are limited to the right number at the right time as required to fill orders.
True
With logic errors, the program will run but the output will be wrong.
True
Case-Based Critical Thinking Questions Case 6-1 When Mary started college, her parents bought her a new computer that came loaded with the bare essentials in terms of software applications. She is now looking into purchasing additional software. Mary needs word processing software for her classes, but she has to budget her resources carefully this semester. She might consider using ____.
Office Online
Most computers today support the ____ standard, which means the computer automatically configures new devices as soon as they are installed and the computer is powered up.
Plug and Play
Product lifecycle management systems are designed to manage a product as it moves through the various stages of its life cycle, from design to manufacturing to retirement..
True
Pseudocode expresses the steps in a program, module, or method, but it uses English-like statements in place of the flowchart's graphical symbols.
True
Some expert systems are designed to take the place of human experts, while others are designed to assist them.
True
Sometimes run time errors occur because the program tries to do something that isn't possible, such as dividing a numeric value by zero.
True
Stand-alone utility programs are often available in a suite of related programs.
True
Structured programming embodies a top-down design philosophy.
True
System development can take place in-house or it can be outsourced to external companies.
True
The documents waiting to be printed are said to be in a(n) print queue, which designates the order the documents will be printed.
True
The goal of SCM is to reduce operating and inventory costs while meeting delivery objectives and increasing profits; that is, to be able to deliver the right product to the right place, at the right time, and at the right price.
True
The information systems (IS) department is also called the information technology (IT) department.
True
The purpose of the preliminary investigation is to define and evaluate the proposal for a new system or system modification relatively quickly, to see if it is worthy of further study.
True
There are many stand-alone utility programs available as an alternative to the operating system's utility programs.
True
There are two primary forms of DOS: PC-DOS and MS-DOS.
True
There have been many different versions of Windows over the years.
True
To use a macro recorder, you start the macro recorder and then perform the desired tasks—the macro recorder records all of the keystrokes and mouse clicks you make until the recorder is turned off.
True
True or False -- A common RAID technique is disk mirroring, in which data is written to two duplicate drives simultaneously.
True
True or False -- A disaster recovery plan is also called a business continuity plan.
True
True or False -- A display device is the most common form of output device.
True
True or False -- A good strategy to use when basic searching is not producing the desired results is field searching.
True
True or False -- A mainframe computer is a powerful computer used in many large organizations that need to manage large amounts of centralized data.
True
True or False -- A(n) Trojan horse is a type of malware that masquerades as something else—usually an application program. _________________________
True
True or False -- A(n) file management system is a program that allows the creation of individual database tables, each of which is stored in its own physical file and is not related to any other file.
True
True or False -- ASCII is the coding system traditionally used with personal computers.
True
True or False -- After all the tables in a database application have been created and their primary keys designated, the tables can be related to one another via their primary keys so that a primary key for one table can be used to extract data from other tables as needed.
True
True or False -- An e-mail address consists of a(n) username, followed by the @ symbol, followed by the domain name for the computer that will be handling that person's e-mail (called a mail server).
True
True or False -- Benchmark tests typically run the same series of programs on several computer systems that are identical except for one component (such as the CPU) and measure how long each task takes in order to determine the overall relative performance of the component being tested.
True
True or False -- Computer tapes are read by tape drives, which can be either an internal or an external piece of hardware.
True
True or False -- Digital video cameras include digital camcorders and small digital video cameras used in conjunction with computers and other devices.
True
True or False -- Even though in everyday use many people use the terms Internet and Web interchangeably, they are not the same thing.
True
True or False -- Fixed wireless Internet access is similar to satellite Internet access in that it uses wireless signals, but it uses radio transmission towers instead of satellites.
True
True or False -- Font size is measured in points.
True
True or False -- For most software programs, the licensing agreement or terms of use agreement is usually displayed and must be agreed to by the end user at the beginning of the software installation.
True
True or False -- Fourth-generation computers typically use a keyboard and mouse for input, a monitor and printer for output, and hard drives, flash memory media, and optical discs for storage.
True
True or False -- Fourth-generation computers typically use a keyboard and mouse for input, a monitor and printer for output, and hard drives, flash memory media, and optical discs for storage. _________________________
True
True or False -- Fourth-generation computers witnessed the development of computer networks, wireless technologies, and the Internet.
True
True or False -- Graphics software—also called digital imaging software—is used to create or modify images.
True
True or False -- Graphics tablets are often used in conjunction with image editing software to create original images or to modify digital photographs.
True
True or False -- Hashing procedures usually result in two or more records being assigned the same storage address, an event known as a collision.
True
True or False -- IBM's DB2 program contains a hybrid XML/relational database server.
True
True or False -- ISPs that offer free Internet access typically obtain revenue by selling on-screen ads.
True
True or False -- In addition to a keyboard, most computers today are used in conjunction with some type of pointing device.
True
True or False -- In its early years, the Internet was used primarily by the government, scientists, and educational institutions.
True
True or False -- In spreadsheet programs, when absolute cell references are used, formulas are copied exactly as they are written.
True
True or False -- Information processing is a vital activity today for all computer users, as well as for businesses and other organizations.
True
True or False -- Internal hard drives are not designed to be removed, unless they need to be repaired or replaced.
True
True or False -- Just as you can learn to drive a car without knowing much about car engines, you can learn to use a computer without understanding the technical details of how a computer works.
True
True or False -- Keystroke logging software can be used to record e-mail messages and documents before they are encrypted.
True
True or False -- Like any document created with software instead of paper and pencil, word processing documents can be retrieved, modified, and printed as many times as needed.
True
True or False -- Many news sites have searchable archives to look for past articles, although some require a fee to view back articles. _________________________
True
True or False -- Many-to-many entity relationships exist when one entity can be related to more than one other entity, and those entities can be related to multiple entities of the same type as the original entity.
True
True or False -- Mobile device management software secures and manages the mobile devices used in an organization.
True
True or False -- Most databases created today do not use the hierarchical or network models; however, these models, which are generally used with legacy mainframe systems, are still operational and so must be maintained.
True
True or False -- Most large storage systems are based on magnetic hard disks, although some systems can use a combination of magnetic and solid-state drives.
True
True or False -- Most search sites today are designed for keyword searches; some sites allow directory searches as well.
True
True or False -- Most spreadsheet programs allow multiple worksheets to be saved together in a single spreadsheet file, called a(n) workbook.
True
True or False -- N-tier database systems provide a great deal of flexibility and scalability, allowing the system to be modified as new needs and opportunities arise.
True
True or False -- Notebook and netbook computers usually have a keyboard that is similar to a desktop keyboard, but it is typically smaller.
True
True or False -- Notebook computers (also called laptops) are about the size of a paper notebook and open to reveal a screen and keyboard.
True
True or False -- Numeric passwords are often called PINs.
True
True or False -- Object-oriented and multidimensional databases are two examples of NoSQL (Not Only SQL) databases.
True
True or False -- Objects stored in an OODBMS can be retrieved using queries, such as with queries written in object query language (OQL)—an object-oriented version of SQL.
True
True or False -- One advantage of the n-tier architecture is that it allows the program code used to access the database to be separate from the database, and the code can be divided into any number of logical components.
True
True or False -- One advantage of using a biometric access system is its very high accuracy.
True
True or False -- One emerging data security risk is the exploitation of known but unpatched vulnerabilities by hackers.
True
True or False -- One of the most obvious types of hardware loss is hardware theft.
True
True or False -- One reason advanced users may partition a primary hard drive is to be able to use two different operating systems on the same hard drive.
True
True or False -- Online auctions are one of the most common ways to purchase items online from other individuals. _________________________
True
True or False -- Opt-out procedures can be confusing and time consuming, and they do not always work well.
True
True or False -- Optical discs are thin circular discs made out of polycarbonate substrate.
True
True or False -- Optical zoom specifications reflect how much the camera can zoom without losing image quality.
True
True or False -- PHOLED technology is especially appropriate for use on mobile devices, consumer electronics, and other devices where power consumption is an important concern.
True
True or False -- Paragraph formatting changes an entire paragraph at one time, such as specifying the line spacing for a particular paragraph.
True
True or False -- People who use the Internet for activities, such as looking up telephone numbers, browsing through online catalogs, or making an online purchase, are referred to as "users."
True
True or False -- Pipelining increases the number of machine cycles completed per second.
True
True or False -- Popular application programs such as Word or PowerPoint typically have mobile versions.
True
True or False -- Processors consist of a variety of circuitry and components that are packaged together and connected directly to the motherboard.
True
True or False -- Public domain software is not copyrighted; instead, the ownership rights to the program have been donated to the public domain.
True
True or False -- Public key encryption is also called asymmetric key encryption.
True
True or False -- Public video surveillance systems are often used in conjunction with face recognition technology to try to identify known terrorists and other criminals, to identify criminals when their crimes are caught on tape, and to prevent crimes from occurring.
True
True or False -- Recordable optical discs can be written to, but the discs cannot be erased and reused.
True
True or False -- Remote storage services accessed via the Internet are often referred to as cloud storage or online storage. These services can be provided either as a stand-alone service or as part of a cloud computing service.
True
True or False -- Remote storage services accessed via the Internet are often referred to as cloud storage.
True
True or False -- SSDs are becoming the norm for netbooks, mobile devices, and other very portable devices.
True
True or False -- SSDs are not subject to mechanical failures like magnetic hard drives, and are more resistant to shock and vibration.
True
True or False -- Security software protects devices against malware and other threats.
True
True or False -- Small office networks enable workers to access company records stored on a network server.
True
True or False -- Smartphones are prone to attacks and are known to have OS flaws.
True
True or False -- Some basic capabilities are often integrated directly into the motherboard instead of requiring the use of an expansion card.
True
True or False -- Some client-server database systems just have two parts (the clients and the server), others have at least one middle component between the client and the server; these systems are referred to as n-tier database systems.
True
True or False -- Some electronic tools, such as devices used by individuals to eavesdrop on wireless telephone conversations are illegal for individuals to use.
True
True or False -- Some new personal computers come with two partitions: a C drive partition ready to use for programs and data and a D drive partition set up as a recovery partition.
True
True or False -- Speech recognition systems enable the device being used to recognize voice input as spoken words.
True
True or False -- Spreadsheet templates are available to help users quickly create common types of business documents, such as balance sheets, income statements, invoices, and purchase orders.
True
True or False -- Storage devices are used to store data on or access data from storage media, such as DVD discs and flash memory cards.
True
True or False -- Storage devices can be internal (located inside the system unit), external (plugged into an external port on the system unit), or remote (located on another computer).
True
True or False -- Structured query language (SQL) is recognized as the standard query language for relational databases. Structured query language (SQL) is recognized as the standard query language for relational databases.
True
True or False -- System failure can occur because of a hardware problem, a software problem, or computer sabotage.
True
True or False -- Systems analysts design computer systems to be used within their companies.
True
True or False -- TOLED displays are transparent.
True
True or False -- Tablet computers are typically about the size of a notebook computer and are designed to be used with a digital pen/stylus or touch input.
True
True or False -- Technically, the Internet is the physical network, and the Web is the collection of Web pages accessible over the Internet.
True
True or False -- The Internet Society provides leadership in addressing issues that may impact the future of the Internet and oversees the groups responsible for Internet infrastructure standards.
True
True or False -- The background work area displayed on the screen for computers running Microsoft Windows is called the desktop.
True
True or False -- The binary numbering system uses only two symbols—the digits 0 and 1—to represent all possible numbers.
True
True or False -- The buses that connect peripheral (typically input and output) devices to the motherboard are often called expansion buses.
True
True or False -- The data on a(n) read-only disc cannot be erased, changed, or added to because the pits that are molded into the surface of the disc when the disc is produced are permanent.
True
True or False -- The most common internal hard drive interface standard for desktop computers today is serial ATA.
True
True or False -- The number of bits being transmitted at one time is dependent on the bus width.
True
True or False -- The system unit is the main case of a computer or mobile device.
True
True or False -- The term phosphorescence refers to a process that results in much more conversion of electrical energy into light instead of heat.
True
True or False -- The video card or the integrated graphics component determines the graphics capabilities of the computer.
True
True or False -- There are application programs that help users write their own programs in a form the computer can understand using a programming language.
True
True or False -- Tim Berners-Lee proposed the idea of the World Wide Web.
True
True or False -- To capture sound from a CD, ripping software is used.
True
True or False -- To comply with truth-in-advertising laws, a(n) unsubscribe e-mail address included in an unsolicited e-mail must be a working address. _________________________
True
True or False -- To convert analog sound to digital sound, several thousand samples—digital representations of the sound at a particular moment—are taken every second.
True
True or False -- To protect against data loss caused by a database failure, an accidental deletion, or another problem that renders the main copy of a database unusable, stringent backup procedures should be implemented.
True
True or False -- To protect against data loss due to disasters, some firms maintain a redundant copy of the database on a(n) mirrored drive, backing up the data at very frequent intervals to an off-site location.
True
True or False -- To retrieve information from a database, queries and reports are used.
True
True or False -- Transitions—special effects used between slides—can be applied to specific slides, or random transitions can be selected for the entire slide show.
True
True or False -- Typically data in a database is organized into fields, records, and files.
True
True or False -- USB flash drives are designed to be very small and very portable.
True
True or False -- Unlike ASCII and EBCDIC, Unicode is a universal international coding standard designed to represent text-based data written in any ancient or modern language, including those with different alphabets.
True
True or False -- When comparing the zoom capabilities of a digital camera, look for optical zoom, not digital zoom, specifications.
True
True or False -- While the memory used for disk caching can be a designated portion of RAM, today's hard drives typically use a disk cache consisting of memory chips located on a circuit board inside the hard drive case.
True
True or False -- Wireless networking allows the use of computers in virtually any location.
True
True or False -- With handwriting recognition, the computer interprets data handwritten with a digital pen as individual characters.
True
True or False -- With pipelining, a new instruction begins executing as soon as the previous one reaches the next stage of the pipeline.
True
True or False -- You can order free credit reports online quickly and easily via the AnnualCreditReport.com Web site.
True
True or False -- One of the most common types of software used in conjunction with a multi-dimensional database is Online Analytical Processing (OLAP).
True
True or False — Web conferences typically take place via a personal computer or mobile phone and are used by businesses and individuals.
True
True or False —One advantage of using personal computers for Internet access is that they have relatively large screens for viewing Internet content and keyboards for easier data entry.
True
Typically, information systems are used to support business intelligence (BI).
True
In spreadsheet programs, labels and constant values are always copied exactly to the new location; what happens to formulas when they are copied depends on whether they use relative cell referencing or ____.
absolute cell referencing
Partitions are sometimes referred to as ____.
logical drives
The earliest programming languages are referred to as ____.
low-level languages
A(n) ____ instruction might look like a meaningless string of 0s and 1s, but it actually represents specific operations and storage locations.
machine language
Magnetic RAM (MRAM) uses ____ rather than an electrical charge to store data.
magnetic polarization
Continually evaluating and improving the security measures used with the database is a database ____ activity.
maintenance
Case-Based Critical Thinking Questions Case 1-1 Sarah is a busy real estate agent with a growing clientele. She is looking to purchase a new computer and software so that she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch up photos of real estate properties. What kind of computer would most likely fit Sarah's needs?
notebook computer
Two of the most significant approaches to programming are procedural programming and ____.
object-oriented programming
Case-Based Critical Thinking Questions Case 8-2 Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports. Brenda likes to download her music from a(n) ____ site and then transfer it to her portable digital media player so that she can listen to her music while she's away from her computer.
online music store
The ____ boots the computer, launches application software, and ensures that all actions requested by a user are valid and processed in an orderly fashion.
operating system
Case-Based Critical Thinking Questions Case 4-1 Stacey is the office manager for a small business and is looking for a new printer and scanner for her office. When buying a scanner, Stacey needs to make sure that the scanner has a high enough ____, usually measured in the number of dots per inch (dpi), for the business needs of the office.
optical resolution
By ____, you instruct companies with whom you do business not to share your personal information with third parties.
opting out
A(n) ____ uses a printhead consisting of pins that strike an inked ribbon to transfer the ink to the paper.
dot-matrix printer
In a printer, the number of ____ affects the quality of printed output.
dots per inch (dpi)
Small programs called ____ are used to communicate with peripheral devices, such as monitors, printers, portable storage devices, and keyboards.
drivers
A marketing activity that can be considered a privacy risk is ____.
e-profiling
The term ____ refers to chip-based storage.
memory
Case-Based Critical Thinking Questions Case 8-1 Anthony is passionate about politics and enjoys sharing and discussing his views with others over the Internet. Anthony regularly visits several popular political ____, which are Web pages designed to facilitate written discussions between people on specific subjects.
message boards
A personal computer or PC, originally called a ____, is a small computer designed to be used by one person at a time.
microcomputer
In the early 1980s, ____ were invented and computer use increased dramatically.
microcomputers
Web-based database requests are received by the Web server, which then converts the request into a database query and passes it on to the database server with the help of software called ____.
middleware
A(n) ____ is a computer used to host programs and data for a network.
midrange server
A ____ is loosely defined as a small device that has built-in computing or Internet capability.
mobile device
____ is the type of direct connection most commonly used with smartphones and tablets to keep them connected to the Internet via a cellular network.
mobile wireless internet access
A variety of ____ and network adapters are available to communicate electronically because there are different types of Internet and network connections.
modems
The display device for a desktop computer is formally called a ____.
monitor
All programs and data located in RAM are divided into fixed-length ____ or variable-length segments, depending on the operating system being used.
pages
Print speed is typically measured in ____.
pages per minute (ppm)
With a ____, both systems are operated in tandem until it is determined that the new system is working correctly, and then the old system is deactivated.
parallel conversion
Case-Based Critical Thinking Questions Case 12-2 Mother Goose Computing, Inc. provides computational biology consulting services. They are currently updating several of their systems. For the protein folding division, Mother Goose is planning to implement the new system module by module. This is called a ____ conversion.
phased
One of the most straightforward ways to improve the quality of the hits returned in a search is to use ____—essentially typing more than one keyword in a keyword search.
phrase searching
Case-Based Critical Thinking Questions Case 12-2 Mother Goose Computing, Inc. provides computational biology consulting services. They are currently updating several of their systems. For the biochemistry division, Mother Goose is planning to implement the new system first in their New York location. If it works properly, they will extend it to their Boston and Chicago locations. This is called a ____ conversion.
pilot
A ____ is the smallest colorable area on a display device.
pixel
With bitmapped images, the color of each ____ is represented by bits; the more bits used, the better the image quality.
pixel
The ____ orders data and instructions from cache or RAM based on the current task.
prefetch unit
The ____ tries to predict what data and instructions will be needed and retrieves them ahead of time in order to help avoid delays in processing.
prefetch unit
When a proposal for a new system or system modification is submitted, one of the first steps is to conduct a ____.
preliminary invesigation
A ____ is an image designed to enhance a presentation (such as an electronic slide show or a printed report) visually, typically to convey information more easily to people.
presentation graphic
Presentation slides can be advanced at predetermined intervals, by clicking or tapping on the screen, or by ____.
pressing the spacebar
The field in a table that is used to relate that table to other tables is called the ____.
primary field
Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. Before providing any personal information on a shopping site, Samuel always reads the Web site's ____.
privacy policy
Using the ____ browsing mode offered by some browsers can prevent personal information from being left on a public computer.
private
Many Web browsers, including Internet Explorer, Edge, Chrome, and Safari, have a(n) ____ option to browse the Web without leaving any history of the sites you visited on the computer you are using.
private browsing
Businesses and many individuals often use office suites, sometimes called ____, to produce written documents.
productivity software suites
Most DBMSs come bundled with a set of tools to perform a variety of necessary tasks, such as creating forms and reports and interfacing with query languages and ____ for complex applications.
programming languages
The most common HD format is 1080p, which uses a screen resolution of 1,920 Χ 1,080 and displays screen images one line at a time, called ____.
progressive display
For monitoring the physical locations of employees, video cameras are often used, but another possibility is the use of ____.
proximity cards
When a digitally signed document is received, the recipient's device uses the sender's ____ key to verify the digital signature.
public
Regardless of the device being used, software typically falls into four basic categories of software: commercial software, shareware, freeware, and ____.
public domain software
A ____ extracts specific information from a database by specifying particular conditions (called criteria) about the data you would like to retrieve.
query
A ____ is a question, or, in database terms, a request for specific information from the database.
query
Case-Based Critical Thinking Questions Case 6-2 Bryan has just started an internship in which he uses a database frequently. The database contains information about the company's employees. Bryan's supervisor senses that he is anxious about using the database and drops by to give him a short tutorial. Bryan's supervisor explains that to retrieve information from the database, Bryan needs to use a ____.
query
Some benefits can be computed relatively easily by calculating the amount of labor the new system will save, the reduction in paperwork it will allow, and so on. These gains are called ____ because they represent quantifiable dollar amounts.
tangible benefits
The JPEG images taken by most digital cameras today use 24-bit ____.
true color images
Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ____ uniquely identifies a specific Web page.
uniform resource locator (URL)
A collaborative Web page that is designed to be edited and republished by a variety of individuals is known as a(n) ____.
wiki
Keyboards can be built into a device, attached by inserting the keyboard's wired cable or ____ into a USB port, or connected via a wireless networking connection such as Bluetooth.
wireless receiver
To create a query, users can either type a query using SQL or, more commonly, use the query tools built into the DBMS (such as a query design screen or query ____) to create a query object.
wizard
A computer ____ is the amount of data (typically measured in bits or bytes) that a CPU can manipulate at one time.
word
Word processing programs use a feature called ____, which means the insertion point automatically moves to the beginning of the next line when the end of the screen line is reached.
word wrap
A single spreadsheet document is often called a ____.
worksheet
When computer systems perform in ways that would be considered intelligent if observed in human beings, it is referred to as ____.
artificial intelligence (AI)
Eight bits grouped together are collectively referred to as a ____.
byte
Case-Based Critical Thinking Questions Case 15-1 IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. One of IBF's clients owns a large number of expensive electronic devices and would like to be able to secure them in case of theft. IBF advises her to use ____.
cable locks
A ____ is a place to store something temporarily.
cache
A ____ holds a single category of data (such as customer names or employee phone numbers) that will be stored in a database.
field
A ____ limits the search to a particular search characteristic, such as the page title, URL, page text, top-level domain, or Web site.
field search
Data definition involves describing the properties of the data that go into each database table, specifically the ____ that make up the database.
fields
Anything (such as a program, letter, digital photograph, or song) stored on a storage medium is referred to as a(n) ____.
file
A ____ is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.
firewall
Digital still cameras most often use ____ cards for storage.
flash memory
Individual database tables are often referred to as ____.
flat files
Program ____ use graphical symbols and relational operators (such as < for "less than" and = for "equal to") to portray the sequence of steps needed to fulfill the logic in that program, module, or method.
flowcharts
Although both the user and the computer use drive letters, ____ names, and filenames to save and retrieve documents, they perceive them differently.
folder
To keep files organized, related documents are often stored in ____ (also called directories) located on the storage medium.
folders
Video data—such as home movies, feature films, video clips, and television shows—is displayed using a collection of ____.
frames
In a typical client-server database application, the client is called the ____.
front end
A(n) ____ is a named, preprogrammed formula, such as to compute the average of a group of cells or to calculate a mortgage payment amount.
function
The most common flat-panel technologies include liquid crystal display (LCD), various types of light emitting diode (LED), ____, and e-paper.
gas plasma
A(n) ____ is used to describe the characteristics of all data used in a system.
data dictionary
The ____ contains all data definitions for a database, including table structures, security information, relationships between the tables in the database, and so on.
data dictionary
Because many mobile devices and personal computers today are continually connected to the Internet, securing those devices against computer viruses and ____ is essential for both individuals and businesses.
hackers
With the ____, the statements in the loop are repeated as long as a certain condition is false.
do until structure
To help store, organize, and retrieve documents once they have been created in or converted to digital form, a(n) ____ system can be used.
document management
Data files are often called ____.
documents
Virtually all personal computers come with a(n) ____ that is used to store most programs and data.
hard drive
One of the most recent adaptive software development approaches is agile software development (ASD).
True
Virtually all DBMSs include a ____ for easy data input, modification, and retrieval.
user interface
Tools such as Microsoft's ____ help to bridge different platforms and programming languages.
.NET framework
The numbering system we commonly use is called the decimal numbering system because it uses ____ symbols to represent all possible numbers.
10
Hollerith's machine was used to process the 1890 U.S. Census data in ____, as opposed to the decade it usually took to process the data manually.
2 and 1/2 years
Windows ____ was released in 2012.
8
A(n) ____ is a collection of an individual's work accessible through a Web site.
E-portfolio
One objective of the ____ project was to create a computer network that would allow researchers located in different places to communicate with each other.
ARPANET
____ is a broad term to describe creating and managing an application throughout its entire life cycle—from design through coding and testing, to maintenance, and, eventually, to retirement.
Application lifecycle management (ALM)
____ are businesses or other organizations that provide Internet access to others, typically for a fee.
Application service providers (ASPs)
____ is a Linux-based operating system developed by the Open Handset Alliance.
Android
____ includes all the programs that allow you to perform specific tasks on your computer, such as writing a letter.
Application Software
____ takes the idea of breaking down a program into separate and reusable functions to the next level by focusing on the encapsulation of programming policies.
Aspect-oriented programming (AOP)
Ensuring that the private data stored by a business is adequately protected is increasingly the responsibility of a ____.
CPO
One measurement of the speed of a CPU is the ____, which is rated in megahertz (MHz) or gigahertz (GHz).
CPU clock speed
Case-Based Critical Thinking Questions Case 5-2 Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on basic utility programs. Andrea tells Dean is that it is very important for him to ____ all of his important data on a regular basis to avoid data loss in the case of a problem with the computer. He can use a(n) ____ utility to do this.
Backup
____ are used to input data about a person so that the individual's identity can be verified based on a particular unique physiological characteristic.
Biometric readers
A relatively new type of very fast direct connection available to homes and businesses in areas where there is fiber-optic cabling available all the way to the building is generically called ____.
BoF
____ values are values that represent one of two states—yes (true) or no (false).
Boolean
A ____ is an area in RAM or on the hard drive designated to hold input and output on their way in or out of the computer system.
Buffer
____ is the process of gathering, storing, accessing, and analyzing data about a company in order to make better business decisions.
Business Intelligence
Some drive letters, such as the letter ____ that is typically used with the primary hard drive, are usually consistent from computer to computer and do not change even if more storage devices are added to the computer.
C
Case-Based Critical Thinking Questions Case 3-2 Rodney owns a computer that he uses to work, keep in touch with friends and family, watch movies, listen to music, and use the Internet. If Rodney wants to be able to write, erase, and overwrite the files on a CD, he should get a ____.
CD-RW
With about 85% of all business transactions being processed by ____ and about 200 billion lines of ____ code still in use today, knowing ____ could set an IT job applicant apart from the crowd..
COBOL
The ____ used to be the norm for desktop computers.
CRT monitor
____ are notes within the actual program code that identify key features and steps of the program but that are written in such a way that the computer knows to ignore them when the program is executed.
Comments
When information from an ERP or other type of internal system is exchanged between different applications (either within an organization or between organizations), it is called ____.
EAI
A ____ is a software program that is designed to cause damage to a computer or perform some other malicious act.
Computer Virus
____ is used specifically for the purpose of recording keystrokes, logging the programs or Web sites accessed, or otherwise monitoring someone's computer activity.
Computer monitoring software
____ is a special type of large, integrated system that ties together all types of a company's activities, such as planning, manufacturing, sales, marketing, distribution, customer service, and finance.
ERP
In DOS, the command ____ displays the files and folders in the current location.
DIR
During the 1980s and early 1990s, ____ was the dominant operating system for microcomputers.
DOS (Disk Operating System)
____ refers to organizing the content to be transferred to DVD, such as importing video clips, creating the desired menu structure, and so forth.
DVD authoring
____ is a growing concern because of the vast amounts of personal data stored in databases today and the many data privacy breaches that are occurring.
Data privacy
____ create the actual database based on the design generated by the database designer and get it ready for data entry.
Database developers
____ are useful for identifying procedures and summarizing the decision making process for one step of a system.
Decision Tables
____ are most often used to create Web pages and Web applications.
Markup languages
Case-Based Critical Thinking Questions Case 5-2 Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on basic utility programs. Andrea tells Dean that he should periodically perform ____ on his computer to optimize the hard drive so that it works more efficiently. This process works by rearranging the data on the hard drive so all files are stored in contiguous locations.
Disk fragmentation
____ are designed to be used with everyday objects, such as home appliances, gaming consoles, digital cameras, e-readers, digital photo frames, ATMs, toys, watches, GPS systems, home medical devices, voting terminals, and cars.
Embedded operating systems
____ are illustrations of faces showing smiles, frowns, and other expressions that are created with keyboard symbols.
Emoticons
When typing text in a word processing program, you should only press ____ after a short line (like a title), at the end of a paragraph, and to leave a blank line between paragraphs.
Enter
____ keys on a keyboard are used for issuing commands in some programs.
Function
____ allow the user to issue commands by selecting icons, buttons, menu items, and other objects—typically with a mouse, pen, or finger.
Graphical user interfaces
The specifications for ____ are developed by the World Wide Web Consortium (W3C) and are continually evolving.
HTML
One property that makes 4GLs easier to use is that they are declarative, rather than procedural like third-generation languages.
True
____ coordinates activities related to the Internet's naming system, such as IP address allocation and domain name management.
ICANN (Internet Corporation for Assigned Names and Numbers)
Charts are inserted into an Excel spreadsheet using the commands in the Charts group on the ____ tab on the Ribbon.
Insert
____ allows you to exchange real-time typed messages with people on your buddy list—a list of individuals that you specify.
Instant messaging
To request a Web page or other resource located on the Internet, use its ____.
Internet address
The primary infrastructure that makes up the ____ is typically owned by communications companies, such as telephone and cable companies.
Internet backbone
A musician who posts his music video on YouTube is an example of a(n) ____ .
Internet content provider
There are a number of options available today for listening to online music, including ____ such as Pandora.
Internet radio stations
____ is a consortium of researchers, educators, and technology leaders from industry, government, and the international community that is dedicated to the development of revolutionary Internet technologies.
Internet2
In addition to the normal business transaction processing systems, there are also specialty transaction processing systems used by law enforcement, the military, financial institutions, and other organizations.
True
In practice, the difference between system and application software is not always straightforward.
True
Case-Based Critical Thinking Questions Case 1-2 Jamie is interested in pursuing some aspect of computer technology as a career. He is very comfortable working with PCs and has a broad knowledge of the typical systems and applications software that people use. He has always enjoyed working closely with people and has a good facility for explaining how technical systems work. Jamie's mother is a computer programmer and would like Jamie to follow in her footsteps. What course would she most likely suggest that Jamie take in college?
Java
Case-Based Critical Thinking Questions Case 13-2 Kelly is a college sophomore majoring in computer science. She is interested in gaining exposure to the most useful and current programming languages and techniques. One of the languages that Kelley is learning is ____, an object-oriented programming language that is commonly used to write Web applications.
Java
____ is the language used by students taking the Advanced Placement (AP) Computer Science exam.
Java
Some languages are traditional programming languages for developing applications; others, such as markup and scripting languages like HTML, XHTML, and ____, are designed to be used to create Web pages.
JavaScript
____ was developed to enable Web authors to implement interactive content on Web sites, such as to animate an item, or pop up a window to point to an item.
JavaScript
____ is the most widely used mobile operating system in the United States.
MAC OS
The first official recorded use of the word "bug" in the context of computing is associated with the temporary failure of the ____ computer.
Mark II
____ are programs designed to play audio and video files.
Media players
DBMSs available for use on personal computers include ____ and Corel Paradox.
Microsoft Access
One of the most common painting programs is ____.
Microsoft Paint
Managers are usually classified into three categories: executive, ____, and operational.
Middle
Class diagrams and use case diagrams are used to illustrate systems that are based on the concept of ____.
Objects
In traditional system development, the phases of system development are carried out in a preset order.
True
____ databases are designed to store a collection of summarized data for quick and easy data analysis.
Multidimensional
Text messaging is a form of messaging frequently used by mobile phone users. If the messages also include photos, audio, or video, ____ is used instead.
Multimedia Messaging Service (MMS)
____ refers to the ability of an operating system to have more than one program open at one time.
Multitasking
The term ____ refers to a wide variety of different database technologies that were developed in order to overcome some of the limitations of relational databases.
NoSQL
Procedures are small sections of program code also called modules or subprograms.
True
A computer's ____ is a collection of programs that manage and coordinate the activities taking place within the computer.
Operating System
____ managers include supervisors, office managers, foremen, and other managers who supervise non-management workers.
Operational
____ input data from special forms to score or tally exams, questionnaires, ballots, and so forth.
Optical mark readers (OMRs)
It is important to realize that with a markup language like HTML, the Web browser, Web browser settings, and device used to display the Web page ultimately determine what the Web page will look like.
True
Java source code cannot be converted into object code using a Python compiler.
True
Case-Based Critical Thinking Questions Case 14-2 The JL Group is a political think tank that is incorporating new media into their analyses. The JL Group is in the process of creating dynamic Web pages to poll politically aware young adults. They are interested in creating scripts that are compatible with many types of databases; therefore, they decide to use the ____ language.
PHP
____ was created to fill the need for a teaching tool to encourage structured programming.
Pascal
____ is a scam that redirects traffic intended for a commonly used Web site to a spoofed Web site set up in an effort to obtain users' personal information.
Pharming
____ is used to plan, schedule, track, and analyze the tasks involved in a project, such as the construction of a building or the schedule for preparing a large advertising campaign for a client.
Project management software
____ are particularly useful for individuals who need to scan barcodes while on the go.
Portable barcode readers
____ can be used, copied, modified, and distributed to others without restrictions.
Public domain software
Application programs can help users write their own programs in a form the computer can understand using a programming language such as Visual Basic, COBOL, C++, Java, or ____.
Python
One of the most common 2D barcodes, the ____ code represents data with a matrix of small squares.
QR
Network ports are used to connect a computer to a computer network via a networking cable—typically a cable using a(n) ____, which looks similar to a telephone connector but is larger.
RJ-45 connector
____ is an online tool designed for delivering news articles, blogs, and other content regularly published to a Web site.
RSS
Larger computers—such as high-end servers, mainframes, and supercomputers—sometimes use operating systems designed solely for that type of system.
True
The ____ is a tool in versions of Microsoft Office starting with Office 2007 that consists of tabs, which contain groups of related command buttons for the program being used.
Ribbon
Linux is increasingly being used with both mainframes and supercomputers.
True
Case-Based Critical Thinking Questions Case 13-1 The Rainbow Trout Company specializes in developing software that is used by amateur and professional fishermen with a wide variety of needs. As such, the company often work on projects with constantly changing requirements. The Rainbow Trout Company maintains a database of clients. To search through this database, they use ____, a 4GL.
SQL
Case-Based Critical Thinking Questions Case 13-2 Kelly is a college sophomore majoring in computer science. She is interested in gaining exposure to the most useful and current programming languages and techniques. During the summer, Kelly will be writing a compiler as part of a research project. To prepare, she is learning ____, a functional language.
Scheme
Most operating systems include security features, such as an option to download and install ____ automatically from the operating system's manufacturer on a regular basis.
Security patches
Once a file management program is open, you can look at the folders and files stored on your computer.
True
The ____ Web is a predicted evolution of the current Web in which all Web content is stored in a manner similar to data in a database so that it can be retrieved easily when needed to fulfill user requests.
Semantic
____ programs are software programs that are distributed on the honor system.
Shareware
Many business software services are offered as ____, including applications geared for collaboration, scheduling, customer service, accounting, project management, and more.
Software as a Service (SaaS)
Font face refers to a named collection of text characters that share a common design, such as Calibri or Times New Roman.
True
____ refers to the complete malfunction of a computer system.
System failure
____ consists of the operating system and utility programs that control your computer and allow you to use it.
System software
____ are made up of related records.
Tables
If a device driver file is deleted, becomes corrupted, or has a conflict with another piece of software, then the device will no longer work.
True
If an application is going to need to interact with existing programs, it may need to be coded in the same language as those other programs.
True
Once the system containing the program is up and running, the implementation process of the program implementation and maintenance phase is complete.
True
In 1950, Alan Turing—one of the first AI researchers—argued that if a machine could successfully appear to be human to a knowledgeable observer, then it should be considered intelligent.
True
____ cookies are cookies placed on your hard drive by a company other than the one associated with the Web page that you are viewing—typically a Web advertising company.
Third-Party
Case-Based Critical Thinking Questions Case 3-1 Dan is a small business owner who depends on his computer to keep track of customer and sales data. He is investigating storage options because it is critical for him to ensure that his data is safe in the event of a computer failure. A friend of Dan suggests to him that he can use an external hard drive for his data storage and backup needs. To use an external hard drive, Dan should make sure that his computer has an available USB or ____ port.
Thunderbolt
A program bug is an error that causes a program to malfunction.
True
A(n) macro is a sequence of saved actions (such as keystrokes, mouse clicks, and menu selections) that can be replayed whenever needed within the application program in which it was created.
True
Although Linux originally used a command line interface, most recent versions of Linux programs use a graphical user interface.
True
An emerging type of system is the digital ecosystem, which is the collection of people, products, services, and business processes related to a digital element.
True
An information system that combines geographic information with other types of data (such as information about customers, sales, and so forth) in order to provide a better understanding of the relationships among the data, is called a geographic information system (GIS).
True
As you work on your computer, the operating system continuously manages your computer's resources and makes them available to devices and programs when they are needed.
True
Before running code written in any programming language, be sure you know how to interrupt program execution in case you have a logic error and the program becomes stuck in an endless loop.
True
DSSs are most often used by middle and executive managers for unstructured decisions, which often need to be based on unpredictable events or incomplete knowledge.
True
Digital badges consist of icons that represent academic achievements or acquired skills.
True
Disk management programs diagnose and repair problems related to your hard drive.
True
File compression programs reduce the size of files so they take up less storage space on a storage medium or can be transmitted faster over the Internet.
True
File extensions should not be changed by the user because the operating system uses them to identify the program that should be used to open the file.
True
To keep a desktop computer or a server powered up when the electricity goes off in addition to protecting against power fluctuations, a(n) ____, which contains a built-in battery, can be used.
UPS
Case-Based Critical Thinking Questions Case 1-1 Sarah is a busy real estate agent with a growing clientele. She is looking to purchase a new computer and software so that she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch up photos of real estate properties. Sarah stores digital photographs of houses she is previewing. She needs to be able to copy these to the computer at her office. What type of storage device should she use?
USB Flash Drive
Case-Based Critical Thinking Questions Case 3-2 Rodney owns a computer that he uses to work, keep in touch with friends and family, watch movies, listen to music, and use the Internet. Rodney wants to be able to easily carry files with him wherever he goes but he also has a tendency to lose things. Knowing this, he should probably save those files on a ____ drive which he can then attach to his backpack.
USB flash
Case-Based Critical Thinking Questions Case 2-1 Jess is a musician who has just bought a new computer. Now she need to figure out how to connect this computer to the devices that were connected to her old computer. To connect her external hard drive, in which all of her music files are stored, to the computer, Jess needs to use a ____.
USB port
The ____ allows 127 different devices to connect to a computer via a single USB port on the computer's system unit.
USB standard
____ is one of the most widely-used versions of Linux.
Ubuntu
Ultraportables conforming to Intel's standards can be marketed as ____.
Ultrabooks
The keyboard shortcut [Ctrl]+[Z] is used to ____ the last change to the document.
Undo
Case-Based Critical Thinking Questions Case 5-2 Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on basic utility programs. Andrea advises Dean to remove unnecessary programs from his computer by using a(n) ____ utility.
Uninstall
The means by which an operating system or any other program interacts with the user is called the
User interface
____ create the menus, forms, and input screens used with a program or database.
User interface (UI) builders
In ASPs, the code to tie the database to the Web site is typically written in JavaScript or ____.
VBScript
Case-Based Critical Thinking Questions Case 8-2 Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports. Brenda also orders movies and television through the Internet via a(n) ____ provider, which allows users to download video for a fee.
VOD
____ memory allows you to use more memory than is physically available on your computer.
Virtual
are designed to be used with everyday objects, such as home appliances, gaming consoles, digital cameras, e-readers, digital photo frames, ATMs, toys, watches, GPS systems, home medical devices, voting terminals, and cars.
Virtual operating systems
Today, the standard term for placing telephone calls over the Internet or any other type of data network is ____.
VoIP
An example of a Wi-Fi security standard is ____.
WPA
____ refers to driving around an area with a Wi-Fi-enabled device to find a Wi-Fi network in order to access and use it without authorization.
War driving
____ generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online.
Web 2.0
____ is typically free and virtually all ISPs used with personal computers include e-mail service in their monthly fee.
Web-based e-mail
____ refers to any instruction delivered via the Web.
Web-based training (WBT)
Case-Based Critical Thinking Questions Case 5-1 Janet is studying operating systems as part of her Understanding Computers 101 class. After learning about the different types of operating systems, she realizes that she uses a number of them in her daily life. All the computers in Janet's school computer lab have the latest version of Windows installed, which is ____.
Windows 10
Case-Based Critical Thinking Questions Case 2-2 Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit documents. Recently, he has come to realize that in order to keep the computer performing at its best, he needs to carry out regular system maintenance on the computer. Jack can use the ____ program to locate and delete temporary files, such as installation files, Web browsing history, and files in the Recycle Bin.
Windows Disk Cleanup
Windows 10 replaces older mobile versions of Windows, including ____ and Windows RT, as well as older embedded versions of Windows.
Windows Phone Dragon
Case-Based Critical Thinking Questions Case 5-1 Janet is studying operating systems as part of her Understanding Computers 101 class. After learning about the different types of operating systems, she realizes that she uses a number of them in her daily life. Janet recently purchased a new Apple computer. The operating system of that computer is ____.
Windows Vista
One reason a computer might become inefficient is that when programs are uninstalled, pieces of the program are sometimes left behind or references to these programs are left in operating system files such as the ____.
Windows registry
Case-Based Critical Thinking Questions Case 1-1 Sarah is a busy real estate agent with a growing clientele. She is looking to purchase a new computer and software so that she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch up photos of real estate properties. Sarah has hired a programmer to create a Web page for her business. What type of programming language will the programmer most likely use?
XHTML
Public key encryption utilizes a pair of encryption keys obtained through ____ .
a Certificate Authority
Media that allow random access are sometimes referred to as ____ media.
addressable
Case-Based Critical Thinking Questions Case 13-1 The Rainbow Trout Company specializes in developing software that is used by amateur and professional fishermen with a wide variety of needs. As such, the company often work on projects with constantly changing requirements. The Rainbow Trout Company uses the ____ approach, which organizes teams of people working closely together so that continuous learning and adaptation can occur as the project is developed.
agile software development
By their very nature, online communications lend themselves to ____.
anonymity
Access control at many businesses and organizations is provided by ____, which allow only authorized individuals to enter an office building, punch in or out of work, or access the company network via an access card or a fingerprint or hand scan.
authentication systems
To determine if the information from a Web page can be trusted, you should evaluate both the ____ and the source.
author
Most tracking software do not ____.
automatically send videos and photos of possible suspects to law enforcement
A ____ is an optical code that represents data with bars of varying widths or heights.
barcode
For an extra level of security, some smart cards today store ____ data in the card and use that data to authenticate the card's user before authorizing the smart card transaction.
biometric
Case-Based Critical Thinking Questions Case 8-1 Anthony is passionate about politics and enjoys sharing and discussing his views with others over the Internet. Every day, Anthony makes a new post to his personal ____, which is a Web page that displays entries in chronological order.
blog
Case-Based Critical Thinking Questions Case 3-2 Rodney owns a computer that he uses to work, keep in touch with friends and family, watch movies, listen to music, and use the Internet. If Rodney wants to record music files onto a CD, he needs to make sure that his operating system has CD-____ capabilities.
burning
A ____ is an electronic path over which data can travel.
bus
The ____ allows a core to communicate with other CPU components, such as the memory controller and other cores.
bus interface unit
Case-Based Critical Thinking QuestionsCase 12-1 Mary is entering her senior year of college. She has a meeting on Friday with her advisor to discuss her career plans. Mary is also interested in identifying the business needs of a system and ensuring the systems meet those needs. Her advisor will probably tell her to look into becoming a ____.
business analyst
Although more expensive than conventional outsourcing since it requires organizing its own facilities and hiring employees in a foreign country, ____ does give a company much more control over the employees and procedures used than with conventional outsourcing.
captive offshoring
In a worksheet, the intersection of a row and a column is called a ____.
cell
With a ____, the databases used by the system are all located on a single computer, such as a server or mainframe computer.
centralized database system
The key characteristics for an OODBMS (including objects, attributes, methods, ____, and inheritance) are similar to the object-oriented programming principles.
classes
Case-Based Critical Thinking Questions Case 13-1 The Rainbow Trout Company specializes in developing software that is used by amateur and professional fishermen with a wide variety of needs. As such, the company often work on projects with constantly changing requirements. To allow everyone, not just the original programmer, to understand the source code of a program, the Rainbow Trout Company follows a set of ____—a list of rules designed to standardize programming styles.
coding standards
In ____, the table field involved in the changes is locked until the changes to that field have been completed.
column-level locking
Touch screens allow the user to touch the screen with his or her finger to select ____ or otherwise provide input to the device associated with the touch screen.
commands
In addition to the four primary computer operations, today's computers almost always perform ____ functions.
communications
A ____ is designed for a specific programming language and translates programs written in that language into machine language so they can be executed.
compiler
A circuit board is a thin board containing ____ and other electronic components.
computer chips
A ____ is a collection of computers and other devices that are connected in order to enable users to share hardware, software, and data, as well as to communicate electronically with each other.
computer network
Case-Based Critical Thinking Questions Case 1-2 Jamie is interested in pursuing some aspect of computer technology as a career. He is very comfortable working with PCs and has a broad knowledge of the typical systems and applications software that people use. He has always enjoyed working closely with people and has a good facility for explaining how technical systems work. From the description provided, what type of computer-related job would Jamie probably enjoy the most?
computer operations personnel
____ refers to the use of computers to help manage manufacturing operations and control the machinery used in those processes.
computer-aided manufacturing (CAM)
Many Web pages today use ____—small text files that are stored on your hard drive by a Web server—to identify return visitors and their preferences.
cookies
If a new database is to be used with existing data, the data needs to be transferred from the old files to the new system—a process called ____.
data migration
A(n) ____ is used to display output from a computer to a wall or projection screen.
data projector
A(n) ____ is responsible for setting up and managing large databases within an organization.
database administrator
The ____ takes instructions from the prefetch unit and translates them into a form that the control unit can understand.
decode unit
In addition to their full versions, some commercial software is available in a ____ or trial version.
demo
To supplement backup procedures, businesses and other organizations should have a(n) ____.
disaster recovery plan
In a(n) ____ check, the programmer "walks" through the program design, keeping track of the values of any loop counters and other variables in a tracing table to ensure the program does what it is intended to do.
desk
Case-Based Critical Thinking Questions Case 12-2 Mother Goose Computing, Inc. provides computational biology consulting services. They are currently updating several of their systems. For the genomics division, Mother Goose is planning to replace the old system by the new one all at once. This is called a ____ conversion.
direct
With ____, the computer uses each record's primary key field and a mathematical formula called a hashing algorithm to determine a unique address that identifies where the record is physically stored in the database file.
direct organization
To speed up magnetic hard drive performance, ____ is often used.
disk caching
Case-Based Critical Thinking Questions Case 4-2 Lisa is a student who regularly uses the computers at her local Internet café to listen to music, talk to her friends and family through the Internet, and play computer games. The Internet café provides ____ on some computers so that users can both listen and talk through the device during a telephone call made through the computer without disturbing other users.
headsets
Many schools, particularly college campuses, today have wireless ____ that allow students to connect their devices wirelessly to the Internet and to campus resources from anywhere on campus.
hotspots
Enterprise storage systems typically use fast Fibre Channel or ____ connections and are scalable so more hard drives can be added as needed up to the maximum system capacity.
iSCSI
When data is processed into a meaningful form, it becomes ____.
information
The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.
information privacy
Conventional CD discs use ____ lasers.
infrared
Case-Based Critical Thinking Questions Case 15-1 IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. Another client has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which technology would be useful in this case?
kill switch hard drives
Case-Based Critical Thinking Questions Case 4-1 Stacey is the office manager for a small business and is looking for a new printer and scanner for her office. After doing some research into printers, Stacey decides to buy a(n) ____ printer, since they are the standard for business documents and are typically faster and have better quality output than other types of printers.
laser
A ____ typically rests on the desk or other flat surface close to the user's computer, and it is moved across the surface with the user's hand in the appropriate direction to point to and select objects on the screen.
mouse
Common input devices include the keyboard, ____, and integrated video cameras.
mouse
____ refers to guidelines for online behavior.
netiquette
The process of evaluating and correcting the structures of the tables in a database to minimize data redundancy is called ____.
normalization
CD-ROM discs and DVD-ROM discs are ____ optical discs that come prerecorded with commercial products.
read-only
Hard disks are permanently sealed inside the hard drive case, along with the ____ and an access mechanism.
read/write heads
A ____ is a collection of related fields.
record
Case-Based Critical Thinking Questions Case 6-2 Bryan has just started an internship in which he uses a database frequently. The database contains information about the company's employees. Bryan's supervisor senses that he is anxious about using the database and drops by to give him a short tutorial. The supervisor explains that each employee's information forms a separate ____.
record
Case-Based Critical Thinking Questions Case 14-2 The JL Group is a political think tank that is incorporating new media into their analyses. The JL Group has gathered data on voting habits. In order to make sure that respondents cannot claim to have voted in more elections than is possible given their age, ____ rules can be assigned to the database tables.
record validation
A ____ partition contains the data necessary to restore a hard drive back to its state at the time the computer was purchased and is designed to be used only if the computer malfunctions.
recovery
The most common type of database used with personal computers today is a ____.
relational database
The ____ is the most widely used database model today.
relational database management system (RDBMS)
There are a number of special Web pages, called ____, available to help you locate what you are looking for on the Internet.
search sites
One advantage of a dial-up connection is ____.
security
Some worms are specifically written to take advantage of newly discovered ____ in operating systems and e-mail programs before the security patch to correct that vulnerability is available.
security holes
To facilitate using a computer lock, most portable computers today come with a ____—a small opening built into the system unit case designed for computer locks.
security slot
The time required to move the read/write heads to the cylinder that contains (or will contain) the desired data is called ____.
seek time
With a ____, the direction that the program control takes depends on the results of a certain condition.
selection control structure
____ devices can withstand being dropped or submerged into water.
semi-rugged
A ____ is a large screen computer either built into a table or designed to be used on a table that allows multi-touch input from multiple users.
table PC
Most ____ programs are available to try free of charge, but typically require a small fee if you choose to use the program regularly.
shareware
____ refers to typing your entire e-mail message or online post using capital letters.
shouting
A presentation graphics program contains an assortment of tools and operations for creating and editing slides, including preformatted ____ containing placeholders for the various elements in the slide.
slide layouts
Case-Based Critical Thinking Questions Case 2-1 Jess is a musician who has just bought a new computer. Now she need to figure out how to connect this computer to the devices that were connected to her old computer. Jess has pictures from her old computer saved on a flash memory card. To transfer these to her new computer, she will insert the card into a(n) ____.
slot
The term ____ refers to the programs or instructions used to tell the computer hardware what to do.
software
Related software programs (such as a group of graphics programs, utility programs, or office-related software) are sometimes sold bundled together as a ____.
software suite
Case-Based Critical Thinking Questions Case 4-2 Lisa is a student who regularly uses the computers at her local Internet café to listen to music, talk to her friends and family through the Internet, and play computer games. Lisa needs to make sure that the computer that she is using has a ____ attached to it for her to be able to hear music and the sounds of a computer game.
speaker
A ____ is a group of values and other data organized into rows and columns, similar to the ruled paper worksheets traditionally used by bookkeepers and accountants.
spreadsheet
Case-Based Critical Thinking Questions Case 2-2 Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit documents. Recently, he has come to realize that in order to keep the computer performing at its best, he needs to carry out regular system maintenance on the computer. Jack can speed up his computer by scanning it for viruses and ____.
spyware
A ____ is the hardware where data is actually stored.
storage medium
A ____ is a separate piece of hardware containing multiple high-speed hard drives.
storage server
A ____ is responsible for maintaining a large, multiuser system.
system administrator
____ is the phase of system development in which the current system and identified problems are studied in depth and the needs of system users are assessed.
system analysis
To synchronize all of a computer's operations, a ____, which is located on the motherboard, is used.
system clock
Each step of the ____ results in some type of documentation that carries forward to the next step in the cycle.
system development life cycle
Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. In order to lessen the chances of his main e-mail address getting spam, he uses a ____ e-mail address when shopping online.
throw-away
The means by which an operating system or any other program interacts with the user is called the ____.
user interface
Case-Based Critical Thinking Questions Case 14-2 The JL Group is a political think tank that is incorporating new media into their analyses. The employees of JL Group who use the database of the company for their daily work, without having knowledge of how the underlying database is structured, interact with the database ____.
using the user interface
In a computer program, ____ are named memory locations that are defined for that particular program and are used to store the current value of data items used in the program.
variables
Fourth-generation languages (4GLs) are sometimes called ____.
very high-level languages
One of the most popular ____ options is Netflix.
video-on-demand
An inventory management system that goes beyond just managing inventory to act as a complete distribution system (including inventory, order, shipping, and transportation management among other features) is often referred to as a ____ management system (WMS).
warehouse