Final Study Guide

¡Supera tus tareas y exámenes ahora con Quizwiz!

Your database was damaged due to hardware failure. What can you use to restore it? a. a backup c. restoration hardware b. imaging software d. a wizard

A. A backup

You are looking for the best protection against data loss. Which of the following will you use? a. archival backup c. selective backup b. differential backup d. partial backup

A. Archival backup

Which of the following is the least likely technology PANs would use? a. Bluetooth c. Wi-Fi b. peer-to-peer d. special USB cables

A. Bluetooth

You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology? a. CAPTCHA c. two-step verification b. CERT/CC d. serial authentication.

A. CAPTCHA

You are storing a new worksheet online for members of your project team to be able to share access to it. What kind of computing is this an example of? a. cloud c. disperse b. digital d. liberated

A. Cloud

If you are running a check to ensure that a required field contains data, or the correct minimum number of characters, what kind of check are you running? a. completeness c. range b. alphabetic d. check digit

A. Completeness

Which of the following is a collection of unprocessed items, which can include text, numbers, images, audio, and video? a. Data c. Information b. Output d. Input

A. Data

Which of the following is a collection of data organized in a manner that allows access, retrieval, and use of that data? a. database c. spreadsheet b. server d. webbase

A. Database

In Internet terminology, what is the term, google.com, called? a. domain name c. webpage protocol b. Internet service provider d. TLD

A. Domain Name

If you are looking for an online social network that allows you to stay current with the daily activities of those you are following, which of the following is the best match for you? a. Facebook c. LinkedIn b. Twitter d. Digg

A. Facebook

A friend of yours was talking on a mobile phone and her attention was diverted from something that was happening around her while she was on the phone. What phenomenon does this illustrate? a. inattentional blindness c. distracted vision b. failure to integrate d. visual inactivity

A. Inattentional blindness

What is an EULA intended to do? a. license software for individual use b. outline computer activities for which the computer and network may or may not be used c. contract with an outside organization to provide security and recovery services for a network d. establish a network of computers, such as a homegroup

A. License software for individual use

Which of the following is a technology that reads hand-drawn marks such as small circles or rectangles? a. OMR c. OCR b. TCR d. MICR

A. OMR

Which of the following is a utility that detects and protects a computer from unauthorized intrusions? a. personal firewall c. threat neutralizer b. antihacker d. protection utility

A. Personal Firewall

An engineer who needs to manage new product development might use what type of software? a. project management software b. engineering management software c. product development management software d. process management software

A. Project Management Software

Which of the following is a request for specific data from a database? a. query c. resample b. formula d. function

A. Query

Which term does a user of a relational database use to refer to a record? a. row c. column b. table d. attribute

A. Row

If a manufacturer is looking for memory that is very durable and shock resistant, which kind of technology might it use in its laptops? a. SSDs c. platters b. hard disks d. DVD drives

A. SSDs

Your business is looking to rely on cloud computing services to provide system backup and the archiving of earlier versions of files, for example. What is the term for this? a. Storage as a Service c. Data as a Service b. Software as a Service d. Platform as a Service

A. Storage as a Service

Which of the following kinds of software consists of the programs that control or maintain the operations of a computer and its devices? a. system c. management b. application d. program

A. System

Your instructor has asked you to perform some research regarding a computer's capability of distinguishing spoken words. What is the best search term to use for your research? a. voice recognition c. speech differentiation b. digital voice input d. speech identification

A. Voice recognition

Which of the following best describes e-commerce? a. a customer (consumer) experience requiring the Internet, cash, a shopping cart, and videos b. a business transaction that occurs over an electronic network such as the Internet c. the sale of electronic goods and services that enable an Internet connection d. a transaction between two businesses that are bartering and auctioning goods and services via secure telephonic connections

B. A business transaction that occurs over an electronic network such as the Internet

Which of the following technologies is your new wireless headset most likely to use? a. TCP/IP c. IrDA b. Bluetooth d. RFID

B. Bluetooth

Which of the following allows access to high-speed Internet services through the cable television network? a. cable transceiver c. cable receiver b. cable modem d. cable dialer

B. Cable Modem

Some computers improve hard disk access time by using which of the following, which consists of memory chips that store frequently accessed items? a. warehouse c. base b. disk cache d. home

B. Disk cache

You want to interact with a touch screen. Which of the following do you use? a. telemetry c. apps b. gestures d. servlets

B. Gestures

Which of the following conveys meaning and is useful to users? a. Data c. Input b. Information d. Output

B. Information

Which of the following is equal to approximately one million characters? a. kilobyte c. gigabyte b. megabyte d. terabyte

B. Megabyte

Items on a storage medium remain intact even when power is removed from the computer. What term describes this characteristic? a. nonversatile c. nonviolate b. nonvolatile d. nonviolent

B. Nonvolatile

You want to find a device that can connect to your mobile device and enable you to print. Which of the following do you use? a. embedded computer c. telemetry b. peripheral d. integrated system

B. Peripheral

Which of the following identify the five steps in web publishing? a. load plug-ins; deploy the website; maintain the website; update the website; upgrade the web server b. plan the website; design the website; create the website; host the website; maintain the website c. plan, analyze, and design the website; plan and purchase servers and server software; create and deploy the website; test the website for both commercial and consumer use; modify the website based on analytics developed through the website use d. plan the website; design the website; create and deploy the website; update the website; create usage analytics for further website enhancements

B. Plan the website; design the website; create the website; host the website; maintain the website

Which of the following are you, as a marketing manager, most likely to use to schedule the processes required in a new advertising campaign you are running? a. personal finance c. calendar management b. project management d. software suite

B. Project Management

You are looking to implement a high-speed network with the sole purpose of providing storage to other attached servers. Which of the following will you implement? a. SCSI c. EIDE b. SAN d. eSATA

B. SAN

Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge? a. hacker c. cyberextortionist b. script kiddie d. cyberterrorist

B. Script Kiddie

Which of the following is the term for unsolicited mail messages? a. e-junk c. malware b. spam d. mail output

B. Spam

Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network? a. rebuking c. transmitting b. spoofing d. victimizing

B. Spoofing

Computer memory and computer storage are available in varying sizes. Which of the following is the largest amount of memory or storage? a. kilobyte (KB) c. megabyte (MB) b. terabyte (TB) d. gigabyte (GB)

B. Terabyte

What is the purpose of memory management? a. to store data in the most efficient manner b. to optimize the use of RAM c. to start the computer and operating system quickly d. to allocate system resources stored in ROM

B. To optimize the use of RAM

You want to clear the memory on your mobile device. Which of the following is sufficient? a. cold boot c. new boot b. warm boot d. soft boot

B. Warm boot

Why is a fragmented disk slower than one that is defragmented? a. A fragmented disk contains temporary Internet files and unused program files that need to be deleted. b. A fragmented disk contains programs that were deleted using Windows Explorer. c. A fragmented disk has many files stored in noncontiguous sectors. d. A fragmented disk has no index.

C. A fragmented disk has many files stored in noncontiguous sectors.

When a computer is running multiple programs concurrently, what is the program that is in the foreground called? a. main program c. active program b. open program d. primary program

C. Active program

Which of the following interprets and carries out the basic instructions that operate a computer? a. control unit c. CPU b. binary device d. compressor

C. CPU

Which of the following terms is the number of bytes (characters) a storage medium can hold? a. resolution c. capacity b. dimensionality d. retention

C. Capacity

Which of the following is an example of data on a grade report? a. total semester hours c. course names b. grade point average d. total credits

C. Course Names

What is another term for a computer programmer? a. scripter c. developer b. coder d. reporter

C. Developer

Which of the following can be used to create a software registration number, sometimes illegally? a. BSA c. keygen b. decryption key d. public key

C. Keygen

Which of the following do you need to verify that you are the holder of the bank card at your local bank branch? a. skimmer c. PIN b. account code d. transaction ID

C. PIN

You purchase a spreadsheet program for your computer from a vendor who mass-produces software. What is the term for this type of software? a. popular c. retail b. platform d. prepared

C. Retail

Which of the following allows a computer or mobile device's processor to continue interpreting and executing instructions while a printer prints? a. paging c. spooling b. thrashing d. buffing

C. Spooling

Which network type connects each computer and device to a central device? a. a bus network c. a star network b. a ring network d. a core network

C. Star Network

Which of the following statements is not true about solid state media? a. Flash memory chips are a type of solid state media. b. They consist entirely of electronic components, such as integrated circuits. c. They contain moving parts. d. They are more durable and shock resistant than other types of media.

C. They contain moving parts

The amount of data, instructions, and information that can travel over a communications channel sometimes is called which of the following? a. broadband c. baseband b. latency d. bandwidth

D. Bandwidth

A DBMS uses which of the following to perform validation checks? a. data server c. data warehouse b. data mart d. data dictionary

D. Data Dictionary

When your sister goes to work, what scientific discipline is used in the design of her workplace to incorporate comfort, efficiency, and safety for her? a. human entomology c. form technics b. factoronomics d. ergonomics

D. Ergonomics

The faster the clock speed, the more of these the processor can execute per second. What are they? a. registers c. arguments b. functions d. instructions

D. Instructions

What is the purpose of an Internet Protocol address (IP address)? a. It specifies whether a computer is using a broadband network or a direct-dial network. b. It differentiates between a server computer and a client computer and contains codes to identify whether the computer can send data or receive data. c. It contains the protocol schema used to identify whether the computer is on a wired or wireless network. d. It uniquely identifies the location of each computer or device connected to the Internet.

D. It uniquely identifies the location of each computer or device connected to the internet.

Digital communications describes a process in which two or more computers or devices transfer all of the following EXCEPT ____. a. data c. instructions b. information d. networks

D. Networks

Which of the following technologies is the new tollbooth on the local highway most likely to use? a. TCP/IP c. IrDA b. Bluetooth d. RFID

D. RFID

Which of the following are the fastest, most powerful computers — and the most expensive? a. desktop computers c. midrange servers b. notebook computers d. supercomputers

D. Super Computers

When your friend turns off her computer, what kind of memory loses its contents? a. partial b. static L1 ROM c. digital fixed memory when installed on memory modules d. volatile

D. Volatile

Which of the following describe computer memory? a. electronic components that store, among other things, instructions waiting to be executed by the processor b. chips stored on the computer processor board that interact with both the system unit and the processor in order to extract the data required for processing c. a series of digital devices embedded within computers that interprets commands from computer users and remembers them for future reference in order to increase the processing power of a computer d. manufactured devices that store a single digital address at a time in order to facilitate an orderly transfer of data within a computer

a. Electronic components that store, among other things, instructions waiting to be executed by the processor

In sequence, traditional system development contains five phases. What are they? a. planning, analysis, design, implementation, support and security b. analysis, implementation, support and security, design, planning c. support and security, design, planning, analysis, implementation d. implementation, analysis, support and security, planning, design

a. Planning, analysis, design, implementation, support and security

When a user types data on a keyboard, what is occurring? a. The user is using an input device to enter input into the memory of the computer. b. The user is issuing a command that is stored in the memory of the computer and then is transformed into input data for use with a program. c. The user is employing an input device (the keyboard) to tell the computer what tasks to perform and how to perform them. d. The user is entering information that will be transferred to the CPU for interpretation and then to storage so that the information will be available when needed.

a. The user is using an input device to enter input into the memory of the computer.

Which of the following describes an information system? a. a network of computers that enables the transfer of information from one computer to another, such as the Internet b. a collection of hardware, software, data, people, and procedures that work together to produce quality information c. a group of data professionals who work together to enhance communications systems d. a series of activities such as analysis and design in the process of distributing information on a large scale

b. A collection of hardware, software, data, people, and procedures that work together to produce quality information

What is the definition of software? a. a collection of unprocessed text, numbers, images, audio, and video b. a series of related instructions that tells a computer or mobile device the tasks to perform and how to perform them c. an instruction issued by replying to a question that is displayed d. an instruction that causes a single specific action to be performed

b. A series of related instructions that tells a computer or mobile device the tasks to perform and how to perform them

What does an interpreter do? a. translate program code from a first- to a second-generation language b. reads a code statement, converts it to one or more machine language instructions, and executes the instructions c. includes common programming instructions so a programmer can reuse them, saving time and reducing error d. a program that converts the entire source program into machine language and saves it on storage media for execution later

b. Reads a code statement, converts it to one or more machine language instructions, and executes the instructions

Which of the following statements is not true about Internet and network attacks? a. No central administrator is present on the Internet. b. It is usually the responsibility of the network administrators to take measures to protect a network from security risks. c. Information kept on an organization's premises has a higher security risk than information transmitted over networks. d. Internet and network attacks that jeopardize security include malware, botnets, denial of service attacks, back doors, and spoofing.

c. Information kept on an organization's premises has a higher security risk than information transmitted over networks.

If you follow the advice of your instructor and use CBT to learn about programming languages, how would you learn? a. You would access content by teachers from a web site designed to reinforce what you already know about programming. b. You would answer a series of questions from your instructor and then, based on your answers, your instructor would assign books to read and programs to review. c. Typically you would employ self-paced instruction to use and complete exercises presented on your computer. d. You would use simulations.

c. Typically you would employ self-paced instruction to use and complete exercises presented on your computer.

Which of the following is true about the database approach? a. Data in a database is less vulnerable than data in file processing systems. b. Unauthorized users are unable under any circumstances to gain access to a single database file that contains personal and confidential data. c. Business and home users often work with databases because of their numerous advantages. d. A database is never more complex than a file processing system.

d. A database is never more complex than a file processing system.

What happens when the computer is thrashing? a. A hacker is attempting to circumvent antivirus software and firewalls. b. Items are being released from being stored in memory because the processor no longer requires them. c. The computer is exchanging data between memory and storage. d. The operating system spends too much of its time paging, instead of executing application software.

d. The operating system spends too much of its time paging, instead of executing application software.

Which of the following items are required in order for your company to conduct a videoconference? a. network, television screen, tablet PCs, microphone b. videoconferencing software or web app, speakers, communications-enabled eyeglasses for each participant c. video camera, digital pens, microphone d. videoconferencing software or web app, microphone, video camera

d. Videoconferencing software or web app, microphone, video camera


Conjuntos de estudio relacionados

Ch 10: The Formation of Traditional and E-Contracts

View Set

Vocabulary Workshop Level G Units 1 - 8

View Set

CA Life, Health and Accidental Exam Prep 3

View Set

Lesson 5 - Roman Catholic Church in Medieval Europe

View Set

Vocabulary Workshop Level E, Unit 9, Vocabulary Workshop Level E, Unit 15, Vocabulary Workshop Level E, Unit 14, Vocabulary Workshop Level E, Unit 13, Vocabulary Workshop Level E, Unit 12, Vocabulary Workshop Level E, Unit 11, Vocabulary Workshop Lev...

View Set

FP: Terminology: 1. General Terminology

View Set