Information Systems CLEP Part 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

data dictionary

A DBMS uses the _____ to perform validation checks.

harmful program that hides within or looks like a legitimate program

A Trojan horse, one of the most serious threats to computer security, is a(n) __________.

form

A ____ is a window on a screen that provides areas for entering or changing data in a database.

P2P

A ____ network is an Internet network, on which users connect directly to each other's hard disks and exchange files directly.

local area network (LAN)

A _____ is a network that connects computers and devices in a limited geographical area, such as a home, school computer laboratory, or office building.

shortcut

A _____ is an icon on the desktop that provides a user with immediate access to a program or file.

host

A _____ is any computer that directly connects to a network.

kilobyte (KB or K)

A _____ is equal to exactly 1,024 bytes, but computer users often round it down to 1,000 bytes to simplify memory and storage definitions.

byte

A _____ is the smallest element in an electronic image.

bit

A _____ is the smallest unit of data a computer can process.

Zip disk

A _____ looks similar to a floppy disk but has much greater storage capabilities—up to the equivalent of 170 standard floppy disks.

Smart Phone

A person on a budget who wants a device with PDA-capabilities and the ability to send and receive e-mail would be best advised to purchase a(n) __________.

check digit

A program determines the _____ by applying a formula to the numbers in the primary key.

newsreader

A program that stores and distributes newsgroup messages is called a _____.

larger, more difficult

A ring network can span a _____ distance than a bus network, but it is ___________ to install.

POS (point of sale)

A(n) ___ system is a special kind of order-processing system that records purchases, processes credit or debit cards, and updates inventory.

servlet

A(n) _____ is an interpreted program that runs on the server.

image processing system

A(n) _____ is similar to an electronic filing cabinet that provides access to exact reproductions of the original documents.

consistency check

A(n) _____ tests the data in two or more associated fields to ensure that the relationship is logical.

optical mouse

A(n) _____ uses devices that emit and sense light to detect the mouse's movement.

solution algorithm

A(n) _____, also called program logic, is a graphical or written description of the step-by-step procedures to solve the problem.

see documents formatted as they would look in print

Acrobat Reader enables users to __________.

relatively limited

An important difference between a client/server network and mainframe architecture is that a client/server network typically connects a __________ number of computers.

CMOS

During a cold boot on a personal computer, the POST (power-on self-test) results are compared with data in a _____ chip.

node

Each computer or device on a local area network, called a _____, often shares resources such as printers, large hard disks, and programs.

Windows XP

Examples of network operating systems include all of the following except _____.

workgroup computing

Groupware is a component of a broad concept called _____, which includes network hardware and software that enables group members to communicate, manage projects, schedule meetings, and make decisions.

tags

HTML (Hypertext Markup Language) uses ____ to specify how a document should be formatted.

nonlinear

Hypermedia is made up of a ____ combination of text, audio, video, and graphical components that are linked electronically.

compromised computer

In computer language, a zombie is a(n) __________.

digitizer

Large-scale applications sometimes refer to a graphics tablet as a _____.

relational

Most _____ database products for midrange servers and mainframes include SQL.

JPEG and GIF

Of the graphics formats that exist on the Web, the two more common are _____ formats because of their smaller file sizes.

run-time error

One purpose of using test data is to try to cause a _____, which is an error that occurs while a program is executing.

listen to music, movies, play games

One study reported that mainframe computers process more than 83 percent of transactions around the world. Mainframes can perform all of the following functions except allow users to __________, watch _________, and _____ _______.

heel of the hand, pivot point

Repetitive strain injuries are a major problem in the United States today. To prevent repetitive strain injury, computer users should take all of the following precautions except using the __________ as a _________ while typing or using the mouse.

cyberterrorist

Someone who uses the Internet or a network to destroy or damage computers for political reasons is a ___________.

Xeon and Itanium

The _____ processor(s) is/are ideal for workstations and low-end servers.

Tablet PC

The primary input device for a _____ is a digital pen, which allows users to write on the device's screen.

packet-switching

The technique of breaking a message into individual packets, sending the packets along the best route available, and then reassembling the data is called _____.

is open source software

Unlike Vista, Linux ____________.

Excel

Web page authoring software includes all of the following except ____.

HTML

Widely used procedural programming languages that the industry recognizes as standards include all of the following except _____.

batch

With ____ processing, the computer collects data over time and processes all transactions later, as a group.

OLTP (online transactional processing)

With ____, the computer processes each transaction as it is entered.

third-generation language (3GL)

With a procedural language, often called a _____, a programmer uses a series of English-like words to write instructions.

Optical mark recognition (OMR)

____ devices read hand-drawn marks such as small circles or rectangles.

Parallel conversion

_____ consists of running the old system alongside the new system for a specified time.

memo

_____ is a common data type in a database that consists of lengthy text entries.

J2EE (Java 2 Platform Enterprise Edition)

_____ is a set of technologies by Sun Microsystems that allows programmers to develop and deploy Web services for an enterprise.

Freeware

_____ is copyrighted software provided for an unlimited time at no cost to a user.

Windows XP 64-Bit Edition

_____ is designed for workstations that use an Itanium 2 processor.

American Standard Code for Information Interchange (ASCII)

_____ is the most widely used coding scheme used to represent data.


Conjuntos de estudio relacionados

Knewton Alta Lesson 2 Assignment

View Set

Fundamentals Chapter 9: Teaching and Counseling 1-4

View Set

Deleon Chemistry- Chapter 3 test answers

View Set

Sociological Theories of Gender Inequality

View Set

Ch 8: Variable Contracts and Municipal Fund Securities

View Set

CompTIA Security+ Sy0-601: Cryptography Basics (Mike Meyers)

View Set

Chapter 28 scrotal and penile sonography

View Set

CHAPTER 10 LESSON 2: FAT-SOLUBLE VITAMINS

View Set