Information Systems CLEP

¡Supera tus tareas y exámenes ahora con Quizwiz!

An 8-bit video card (also called 8-bit color) uses 8 bits to store information about each pixel and thus can display _____ different colors.

256

_____ enables users to write and print checks, track checking account activity, and update and reconcile balances on demand.

Accounting software

A popular plug-in application that enables readers to view, navigate, and print files in Portable Document Format is __________.

Acrobat Reader

_____ allows users to share documents with others in real time.

An online meeting

____ processing implies that there is no interaction with the user while the program is being executed.

Batch

To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the _____.

Business Software Alliance (BSA)

Using _____, engineers can test the design of a car or bridge before it is built.

CAE

The _____ standard defines how a Web server communicates with outside sources.

CGI (common gateway interface)

_____ software tracks leads and inquiries from customers, stores a history of all correspondence and sales to a customer, and allows for tracking of outstanding issues with customers.

CRM

_____ is a certification that tests advanced knowledge of installing, configuring, and operating LANs and WANs.

Cisco Certified Network Professional (CCNP)

When a user specifies a domain name, a _____ translates the domain name into its associated IP address so data can route to the correct computer.

DNS server

_____ is the delivery of education at one location while the learning takes place at other locations.

Distance learning (DL)

_____ is the process of a computer receiving information, such as a Web page, from a server on the Internet.

Downloading

A special kind of DSS, called a(n) ____, supports the strategic information needs of executive management.

EIS

The 1986 _____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.

Electronic Communications Privacy Act (ECPA)

_____ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.

Ergonomics

_____ is used primarily on mainframe computers and high-end servers.

Extended Binary Coded Decimal Interchange Code (EBCDIC)

_____ is a common data type in databases that consists of Web addresses that link to a document or Web page.

Hyperlink

____ uses the Internet, instead of the public switched telephone network, to connect a calling party and one or more called parties.

Internet telephony

Some mailing lists are called _____, named after a popular mailing list software product.

LISTSERVs

The banking industry almost exclusively uses ____ for check processing.

MICR

Some users input music and other sound effects using external _____ devices such as an electronic piano keyboard.

MIDI

Popular database management systems include all of the following except __________.

Mac OS X

_____ is a set of technologies from Microsoft that allows almost any type of program to run on the Internet or an internal business network.

NET

_____ is a process designed to ensure the data within the relations (tables) in a relational database contains the least amount of duplication.

Normalization

All of the following are SQL keywords except ____.

OBJECT

_____ software enables users to convert an image from a fax modem to text and then edit it.

Optical character recognition (OCR)

____ software allows users to track, control, and manage the events, resources, and costs of a project.

Project management

_____ is free software that has been donated for public use and has no copyright restrictions.

Public-domain software

Microsoft ____ is an example of a personal DTP program.

Publisher

A _____ has pins on opposite sides of the circuit board that connect together to form one set of contacts.

SIMM (single inline memory module)

Hyperstudio is a multimedia authoring software application that allows users to create presentations called ____.

Stacks

_____ enables users to listen to music as it downloads to their computers.

Streaming audio

Bell Labs licensed _____ for a low fee to numerous colleges and universities, where the operating system obtained a wide following.

UNIX

A Web page has a unique address, called a ____.

URL

To add special multimedia effects and interactive capabilities to Web pages, programmers use all of the following scripting languages except __________.

Vista

_____ is the process of collecting data from the Internet as a source for a data warehouse.

Web farming

A wireless portal is a portal specifically designed for _____.

Web-enabled mobile devices

Which of the following is not required for video conferencing?

Webcam

On the Web, ____ involves the display of 3-D images that users explore and manipulate interactively.

XML

Integrated case products, sometimes called I-CASE or a CASE workbench, include which of these capabilities?

a. Project dictionary b. Code generators c. Diagrams and prototyping d. Quality assurance e. All of the above

A(n) _____ is a compiled program that runs on the client.

applet

CIM software _____.

assists support personnel in providing the best solutions for customers

When using a search engine, use a(n) ____ after the search word to find plurals or variations of that word.

asterisk

A(n) _____ version is a test version of a system is not ready for release but is stable enough to be tested by end users.

beta

Tools that a systems analyst uses for process modeling include all of the following except _____.

class diagrams

To "cut" involves removing a portion of a document and storing it in a temporary storage location, sometimes called a _____.

clipboard

A program has its own documentation, called _____.

comments

A(n) _____ verifies that a required field contains data.

completeness check

Entry-level jobs for graduating _____ students include database analyst, software engineer, systems programmer, computer technician, and computer consultant.

computer science (CS)

Many large businesses have _____ software, which allows the company to provide a personalized touch and customized service to its customers.

customer relationship management (CRM)

A multidimensional database uses the idea of a ____ to represent the dimensions of data available to a user.

data cube

A _____ is a special window that provides information, presents available options, or requests a response.

dialog box

The gap between those who have access to computers and those who do not is referred to as the ____.

digital divide

In a computer processor, the control unit __________.

directs and coordinates most of the operations in the computer

In object-oriented (OO) design, the concept of packaging data and procedures into a single object is called _____.

encapsulation

Many large companies use the words, ____, to refer to the huge network of computers that meets their diverse computer needs.

enterprise computing

A(n) _____ is an action to which an object-oriented program responds.

event

Wireless transmission media used in communications include all of the following except _____.

fiber-optic cable

A GPS receiver is a handheld, mountable, or embedded device that can contain all of the following except a(n) _____.

floppy disk

A(n) _____ program interacts with a DBMS, which in turn interacts with the database.

front-end

A _____ equals approximately 1 billion bytes.

gigabyte (GB)

A _____ is a mathematical formula that can be used to encrypt and decrypt sensitive data.

hash

A ____ is an area with the capability of wireless Internet connectivity.

hot spot

The _____ is the most important data and information gathering technique for the system developer.

interview

A major shortcoming of a ring network is that __________.

it can not span as large a distance as a bus network can

The two main components of an expert system are ____.

knowledge base and inference rules

Many FTP sites require a(n) ____ to access files.

login name and password

A popular Web-based type of discussion group that does not require a newsreader is a ____.

message board

A _____ is a high-speed network that connects networks in an area such as a city or town and handles the bulk of communications activity across that region.

metropolitan area network (MAN)

Examples of _____ are real estate agents, insurance agents, meter readers, package delivery people, journalists, consultants, and students.

mobile users

With ISDN, the same telephone line that could carry only one computer signal now can carry three or more signals at once through the same line, using a technique called _____.

multiplexing

A _____ installs, configures, and maintains LANs, WANs, intranets, and Internet systems.

network administrator

All of the following are recommended defenses against botnets, DoS attacks, and spoofing except __________.

never opening e-mail attachments

Business software suites typically include all of the following programs except ____.

note taking

The machine language version that results from compiling a 3GL is called the _____.

object code or object program

When a computer sends data over the Internet, the data is divided into small pieces called _____.

packets

The _____ is the destructive event or prank a malicious-logic program is intended to deliver.

payload

With a _____, only one location in the company uses a new system, so it can be tested.

pilot conversion

Manufacturers often use _____ to represent the sharpness of an image on a display screen.

pixels per inch (PPI)

In a grocery store, a(n) _____ is a combination of an electronic cash register, bar code reader, and printer.

point of sale (POS) terminal

Client/server network architecture usually ___________.

provides several computers with data and resources from a single computer

A _____ identifies the product(s) a systems analyst wants from a vendor.

request for quotation (RFQ)

For small business and home networks, a ____ allows multiple computers to share a single high-speed Internet connection such as a cable modem or DSL modem.

router

When computer users _____ a document, the computer transfers the document from memory to a storage medium.

save

Spyware in a computer __________.

secretly collects information about the user, often related to the person's Web-browsing habits

A(n) _____ allows the user to choose specific files to backup, regardless of whether or not the files have changed since the last incremental backup.

selective backup

A _____ is a legal agreement that permits users to install software on multiple computers, usually at a volume discount.

site license

A ____ is a thin desktop monitor that detaches from the computer to function as a portable wireless touch screen, which can access the computer remotely.

smart display

A _____ works with the analyst, programmer, and user to create documentation and user materials.

technical writer

A(n) ____ is a group of processing steps that are treated as a single activity to perform a desired result.

transaction

A Web browser program allows _____.

users to access and view Web pages on the Internet

Commonly used methods to retrieve and maintain data in a database include all of the following except _____.

validation rules

An integration test _____.

verifies that an application works with other applications

A unit test _____.

verifies that each individual program works by itself

When a mobile user connects to a main office using a standard Internet connection, a _____ provides the mobile user with a secure connection to the company network server.

virtual private network (VPN)

A _____ is a window on the screen that displays notes and drawings simultaneously on the screens of all participants in a video conference.

whiteboard

A _____ is a program that assists in the management and tracking of all the activities in a business from start to finish.

workflow application

Compressed files are also called __________ files.

zipped

The computer that a hacker uses to execute a DoS or DDoS attack, known as a _____, is completely unaware that it is being used to attack other systems.

zombie


Conjuntos de estudio relacionados

Chapter 7 - CAPM & APT, Multiple Choice Questions for Investments quiz, Investments quiz 2 part #2, Investments Quiz #2 Part 1

View Set

Chapter 17: Commercial Bank Operations

View Set