Intro to Computing

¡Supera tus tareas y exámenes ahora con Quizwiz!

Device Manager (I/O Supervisor)

- Controls I/O devices to ensure they don't clash.

Real-time Processing (online processing)

- Immediate processing of requests as they occur. (Eg, credit card processing in eCommerce)

Binary Digits

0's and 1's

Kilobyte (KB)

1024 bytes, Megabyte (MB) = 1000kb, Gigabyte (GB) = 1000MB

Mainframe Computer

1960's, very large, can handle multiple-users and complex calculations simultaneously (government computers).

Byte

1byte = 8 bits (consecutive digits, Eg, 01101111 = 1byte, 11110111 = 1byte), 256 possible characters

Which of the following professional certifications qualifies an IT specialist to provide network support for a particular brand of networking products?

A Certified Novell Administrator, or CNA, is certified to provide network support for Novell networking products. A Sun Certified Programmer for the Java 2 Platform is certified to program in Java, a programming language that is popular with Web-based applications.

Each of the following represents a type of error detection EXCEPT

A Hamming code is a data code that is used in performing error correction. Arithmetic checksum, cyclic redundancy checksum, and simple parity all represent types of error detection.

A communications network that connects computer hardware devices that are within close physical proximity is known as a(n)

A LAN, or local area network, is a communications network that connects computer hardware devices that are within close physical proximity. A PBX (private branch exchange) is also a type of local network, but it connects telephone extensions rather than computer hardware.

Which of the following professional certifications qualifies an individual to analyze business requirements to design and implement computer infrastructures based on the Windows platform and Microsoft Servers software?

A Microsoft Certified Systems Engineer (MCSE) is qualified to analyze business requirements to design and implement computer infrastructures based on Windows and Microsoft Servers software. A Microsoft Certified Application Developer (MCAD) develops and maintains applications software.

Which of the following is a seemingly useful program that hides a computer virus?

A Trojan horse is a seemingly useful program that hides a computer virus. Trojan horses can also hide logic bombs. A logic bomb contains instructions for a malicious action to be executed based on specific conditions or the occurrence of a triggering event.

An information technology specialist who is interested in creating and maintaining Internet sites would most likely look for a job position as a

A Web application developer is responsible for creating and maintaining Internet sites. A specialist who wishes to work directly with Web sites would most likely look for a Web application developer position. A computer operator generally works with hardware, keeping systems operational.

A binary search algorithm is an example of a(n)

A binary search algorithm is an example of a recursive structure. In recursive structures, a set of instructions is repeated as a subtask of itself. Selection sorts and insertion sorts are examples of iterative structures, in which a set of instructions is completed and then repeated in its entirety.

Which of the following terms refers to the most basic binary on/off signal?

A bit is the most basic binary on/off signal. A byte is comprised of a set of bits.

Which of the following is used to connect two existing compatible networks to form a larger single network?

A bridge is a coupling device that connects two existing compatible networks to form a larger single network. A router is a device that links two individual networks whose characteristics are not compatible. Individual networks linked by a router continue to function as independent networks.

Ring Network

A bus network that forms a complete circle (capable of two-way communication so if one link fails the others still work)

How many alphanumeric characters are stored within one byte?

A byte stores exactly one character. A character is made up of eight bits.

A method used to encrypt and decrypt text is known as a(n)

A cipher is a method used to encrypt and decrypt text.

Which of the following types of local area networks consists of requesting computers and supplying devices that satisfy those requests?

A client/server network is a local area network model that consists of requesting computers (clients) and supplying devices (servers). Peer-to-peer networks are local area networks that do not rely on servers. PDN and X.25 are types of wide area networks.

Synchronous

A clock synchronizes the transfer of data. Very Fast

Which of the following types of user interfaces requires a user to instruct the computer by typing in codes or words?

A command-line user interface requires the user to instruct the computer by typing in codes or words. Windows is an example of a graphical-user interface, which uses images to represent options. A menu-driven interface allows the user to choose a command option from a menu.

A complete data type consists of a predetermined storage system and a collection of

A complete data type consists of two elements: a predetermined storage system and a collection of predefined operations. Primitive operations are associated specifically with primitive data types, but a complete data type can encompass other data types in addition to primitive data types. Abstract data types are user-defined data types that are complete because they include definitions of operations.

A computer hard disk stores information in units known as

A computer hard disk stores information in units known as sectors. Each sector is made up of an address and a data block with a certain number of characters.

Which of the following computer components is an electronic device that interprets instructions and performs requested operations?

A computer processor is an electronic device that interprets instructions and performs requested operations. Caches are specific types of storage areas within the computer.

A computer that is NOT connected to a network is referred to as a

A computer that is not connected to a network is referred to as a standalone computer. A workstation is a computer that is physically connected to a network.

On which of the following types of primary storage can a computer user load read-only programs and data?

A computer user can load read-only programs and data on PROM, which is programmable read-only memory.

Which of the following represents the principle piece of systems software on any computer?

A computer's operating system represents its principle piece of systems software. Utility programs are also classified as systems software, but they are less important than the operating system, which drives the main functions of the computer. Spreadsheet and database management programs are types of applications software, not systems software.

Who of the following is most likely to be involved in perpetrating computer data theft?

A cracker is a computer vandal who is skilled at gaining unauthorized access into computer systems. Crackers are therefore most likely to be involved in perpetrating computer data theft and other crimes. A spammer sends unauthorized and unwanted e-mail.

Which of the following is a computer utility that functions by restoring a file that has accidentally been deleted?

A data recovery utility functions by restoring, or undeleting, files that have accidentally been deleted.

Which of the following terms is commonly used to refer to a collection of related data or files pertaining to a particular subject?

A database is a collection of related data or files pertaining to a particular subject. Records and fields are two of the components that make up databases.

A software development tool that enables programmers to track down hard-to-find logic errors is known as a

A debugger is a software development tool that enables programmers to track down hard-to-find logic errors within a program.

Which of the following is NOT a characteristic of a digital signal?

A digital signal is discrete, finite, and absolutely replicable. It does not degrade with reproduction the way that an analog signal does. Instead, it can be reproduced an infinite number of times with an exact degree of accuracy.

Which of the following effects is most likely the result of running a disk defragmenter program?

A disk defragmenter program rewrites all of the files on a hard disk to contiguous sectors. This process reduces the amount of time required for the hard disk to access files. As a result, after defragmentation, the computer's hard disk operates more quickly.

Which of the following is an example of a secondary storage component?

A disk drive is an example of a secondary storage component. RAM and ROM are part of the computer's main memory, or primary storage.

Which of the following terms is used to refer to a computer system that is designed to continue to operate even if important components fail?

A fault-tolerant computer system is designed to continue to operate even if important components fail. Using an uninterruptible power source (UPS) is one method of enabling a computer system to continue operating even if a power source fails.

Each of the following represents a network topology EXCEPT

A gateway is not a type of network typology. It is an interface that facilitates communication between dissimilar networks. Star, bus, and ring all represent types of network topologies.

Which of the following is an operating system program that loads other operating system programs and applications programs to RAM as they are needed?

A kernel is an operating system program that loads other operating system programs and applications programs to RAM as they are needed.

How many bytes of memory are contained in a kilobyte?

A kilobyte contains 1,024 bytes of memory. The number of 1,000 bytes is inaccurate because computer numbering systems are based on twos instead of tens.

Each of the following represents a method for connecting a computer to the Internet EXCEPT

A logon is not a method for connecting a computer to the Internet. Individuals are usually required to logon to an account in order to gain Internet access. DSL, dial-up, and wireless all represent methods for connecting computers to the Internet.

Which of the following helps to increase productivity by combining several command keystrokes into one or two keystrokes?

A macro helps to increase productivity by combining several command keystrokes into one or two keystrokes. A procedure is a set of instructions for performing a particular task.

A program consisting of recorded keystrokes that can be called on to execute those keystrokes to accomplish a task is known as a(n)

A macro is a program consisting of recorded keystrokes that can be called on to execute those keystrokes to accomplish a task. Macros can be run within specific programs, such as spreadsheet programs, to save time by automating repetitive tasks. Commands are executed by macros in an automated manner

Which of the following is typically NOT required to run multimedia applications on a computer?

A microphone is not necessarily required to run multimedia applications on a computer. Sound cards, high-resolution color monitors, and CD-ROM drives are all typically required to run multimedia applications, as are speakers and fast computer processors.

Which of the following computer peripherals converts data into a signal that can be transmitted over a telephone line?

A modem is a computer device that converts data into a signal that can be sent over a telephone line. A token ring is a type of network through which computers can be connected.

A network that is operated by a single organization is known as a

A network that is operated by a single organization is known as a domain.

An Internet bulletin board through which individuals can use an Internet browser to post and read messages discussing various topics is known as a(n)

A newsgroup is an Internet bulletin board through which individuals can use an Internet browser to post and read messages discussing various topics. A listserv is an Internet mailing list that sends e-mails directly to users.

A software module that is integrated into a browser or other application to give the application additional capabilities is known as a(n)

A plugin is a software module that is integrated into a browser or other application to give the application additional capabilities.

An Internet user who wishes to start on the Internet at a Web site that contains a broad array of information and services would be most likely to choose a(n)

A portal is a Web site that contains a broad array of information and services. Portals represent good starting points for the Internet.

A set of instructions for performing a task to be accomplished is known as a

A procedure is a set of instructions for performing a task to be accomplished. A procedure's header is a definitional statement that begins the procedure.

Each of the following represents a type of language translator used in the software development process EXCEPT

A report generator is not a type of software language translator. It is a program that produces reports for end-users. Assemblers, compilers, and interpreters are all types of language translators.

A resource discovery tool that enables users to find information quickly on the Internet is known as a(n)

A resource discovery tool that enables users to find information quickly on the Internet is known as a search engine.

Which of the following computer utilities is used for the purpose of preventing static images from burning into the screens of computer monitors?

A screen saver is used for the purpose of preventing static images from burning into the screens of computer monitors. (Screen savers are still used for this purpose despite the fact that images can't actually "burn into" computer screens.) A temperature monitor tracks the temperature of the computer processor and system unit.

A set of rules that computers use to communicate with each other is known as a(n)

A set of rules that computers use to communicate with each other is known as a protocol. Information is transmitted over the Internet in packages called packets.

Which of the following terms denotes a graphical-user interface added as an outer layer to an operating system?

A shell is a graphical-user interface added as an outer layer to an operating system. DOS and OS/2 are different types of operating systems.

Device Driver

A small piece of software which contains instructions for the OS on how to work with a particular device

Which of the following refers to a self-organizing group that operates efficiently through the use of social networking?

A smart mob is a group that organizes and operates efficiently through the use of social networking technologies, such as texting. Smart mobs typically organize for political or activism purposes, coming together and disbanding in a synchronized manner on short notice.

Which of the following is an output device?

A speaker is an output device that allows a user to hear audio output. Mice, joysticks, and trackballs are all examples of input devices.

Each of the following represents a type of systems software EXCEPT

A spreadsheet program is not a type of systems software. Instead, it is a type of applications software. Language translators, operating systems, and utilities are all types of systems software.

Which of the following types of networks consists of computers connected to a central host computer?

A star network consists of computers connected to a central host computer. A bus network consists of computers connected by a common communication line. A ring network consists of computers connected via a closed circular path.

Each of the following refers to a single-user computer system EXCEPT

A supercomputer is a specialized type of multi-user system. Supercomputers are primarily used for high-speed scientific applications. PCs, desktop systems, and laptops are single-user computer systems.

Each of the following represents a method for restricting access to a computer system EXCEPT

A trap door is a method through which individuals can enter a computer system by bypassing normal security protocols. Passwords, user IDs, and biometrics all represent methods for restricting access to computer systems.

Which of the following enables a user to communicate or interact with an operating system?

A user interface enables a user to communicate or interact with an operating system.

A utility is a type of

A utility is a type of systems software. Operating systems and language translators are also types of systems software.

Types of Network Cable

ARCnet (old, not used now), Ethernet (fast, supports 1,024 workstations), Fiber-opno..just have read them and be awaretic cable (uses lasers, very expensive)

The Internet was launched in 1969 with the development of which of the following?

ARPANET, developed by the U.S. Defense Department in 1969, eventually evolved into the Internet. Altair 8800 and Apple II were types of personal computers. Lotus 1-2-3 is the name for an electronic spreadsheet program.

Star Topology

All computers (node) is connected to a central computer (expensive)

Which of the following terms is used to describe an Internet mailing list?

An Internet mailing list is also known as a listserv. Unlike listservs, which send e-mails directly to individuals, newsgroups are accessed through using Internet browsers.

Which of the following refers to a small program that is embedded in a Web page and interpreted and executed by a Web browser?

An applet is a small program that is embedded in a Web page and interpreted and executed by a Web browser. Hyperlinks and hot images permit navigation between pages on the Internet.

Which of the following software development tools generates code based on a detailed explanation of the data that needs to be processed?

An application generator creates software code based on a detailed explanation of the data that needs to be processed. Once the programmer has provided the description, the application generator then generates the code needed to create a program to perform the specified task.

Which of the following translates assembly-language software programs into machine language?

An assembler is a program that translates assembly-language software programs into machine language. Profilers collect statistics about programs to help computer systems run more efficiently.

Each of the following represents an Internet search engine EXCEPT

An emoticon is an Internet symbol used to convey emotions. Google, Dogpile, and AltaVista are all names of Internet search engines.

In the area of artificial intelligence, an interactive computer system that simulates the human thought process by responding to questions, asking for clarification, and making recommendations is known as a(n)

An expert system is an interactive computer system that simulates the human thought process by responding to questions, asking for clarification, and making recommendations.

A unique value that allows a database to access information regarding an individual record is known as a(n)

An index is a unique value that allows a database to access information regarding an individual record.

An individual who wishes to send a text document via e-mail will most likely send the document as a(n)

An individual who wishes to send a text document via e-mail will most likely send the document as an attached file. A GIF is a type of digital image file.

Which of the following types of modems is a circuit board that plugs into one of a computer's expansion slots?

An internal modem is a circuit board that plugs into one of a computer's expansion slots. A fax modem is a type of modem that emulates a fax machine. It can be either internal or external. External modems connect to the computer via an external port.

In algorithmic processes, a collection of instructions that is completed as a set and then repeated in a looping manner is known as a(n)

An iterative structure is a collection of instructions that is repeated in a looping manner within an algorithmic process. In iterative structures, instructions are completed as a set and then repeated.

Which of the following is NOT a basic component of computer hardware?

An operating system is not a component of computer hardware. It is a type of computer software. The computer's operating system controls all of the computer's activities.

An ordered set of executable steps that defines how a task is performed is known as a(n)

An ordered set of executable steps that defines how a task is performed is known as an algorithm. Casing is a method for naming algorithms within software programs.

An organization that provides users with access to the Internet is known as a(n)

An organization that provides users with access to the Internet is known as an ISP, or Internet service provider. TCP/IP represents a protocol for transmitting data over the Internet.

Software Development Methods - Waterfall

Analysis (feasibility study), Design, Implementation (conversion from old to new software), Maintenance (updates, troubleshooting etc.) [ADIM]

Peripheral Devices

Any external equipment (Eg, a scanner, a printer, a mouse)

Which of the following is a notation for representing the syntax of a programming language?

Backus-Naur Form (BNF) is a notation for representing the syntax of a programming language.

Which of the following terms is commonly used to refer to the capacity of an Internet communication channel to transmit digital signals?

Bandwith is the term used to refer to the capacity of an Internet communication channel to transmit digital signals between computers and over the Internet. DSL, cable, and broadband represent types of Internet access.

Which of the following data types can take on only the values true or false?

Boolean data types can take on only the values true or false. Character data types refer to data consisting of symbols. Real and integer data types refer to numeric data.

Conversion to a New Software or System Parallel Conversion

Both old and new software are used side by side to compare performance

Which of the following represents the generic term for high-speed Internet access?

Broadband is the generic term for high-speed Internet access. POTS is an acronym for "plain old telephone services." Telephone, or dial-up, connections are low-speed forms of Internet access.

An engineer who needs to use a vector graphics software program in order to manipulate individual objects on the computer screen would most likely use

CAD software programs, or computer-aided design programs, are vector graphics programs that enable users to manipulate individual objects on the computer screen. CAD programs are generally used by engineers and scientists. Authoring software is used in the development of integrated multimedia presentations.

Which of the following functions is performed by cache memory?

Cache memory holds only those instructions and data that are likely to be needed next by the processor. The instructions needed to boot a PC and load its operating system to RAM are contained in the computer's BIOS software.

Half-duplex

Can only Send OR Recieve at one time. Each computer takes it's turn

Network Hub

Central hardware device to which all computers in the LAN are connected.

Coding of a software program is usually accomplished during which of the following stages of the software life cycle?

Coding of a software program involves translating the design of the program into actual computer code. This process is accomplished during the implementation phase of the software life cycle.

Token Ring Network

Combination of Ring and Star (not used now, used Token Passing)

In the software development process, a language translator that converts a high-level language program into machine language for later execution is known as a

Compilers convert high-level language software programs into machine language for later execution. Interpreters convert high-level language programs into machine language for immediate execution.

(CISC)

Complex Instruction Set Computer

Which of the following performs a computer's computations and logical operations?

Computations and logical operations are performed by a computer's ALU, or arithmetic and logic unit. A system bus is a component that helps data to move around the computer's motherboard.

Computer memory chips are physically installed on which of the following?

Computer memory chips are physically installed within the computer on SIMMs, single in-line memory modules. Memory chips may also be installed on dual in-line memory modules, or DIMMs.

Data transfer rates are usually measured in terms of which of the following units of time?

Data transfer rates are usually measured in seconds.

During the instruction-execution cycle, decoding takes place in which of the following components of the control unit?

Decoding takes place in the instruction register (IR), located within a processor's control unit.

System Utilities

Defrag, Scandisk..software that maintains the OS in good working order.

Software Development Methods - Prototyping

Design a working prototype and see if it works well....make adjustments.....final version.

Which of the following types of application programs is intended for the design and layout of complex documents on a personal computer?

Desktop publishing application programs are intended for the design and layout of complex documents on a personal computer.

Which of the following types of programs allows a user to send and receive e-mail through a program on his or her computer?

E-mail client software allows a user to send and receive e-mail through a program on his or her computer. Web-based e-mail is sent through interaction with a Web site.

Which of the following computer programs, designed by Joseph Weizenbaum of MIT in the 1960s, was designed to converse in English and to imitate a psychotherapist?

ELIZA was a computer program designed by Joseph Weizenbaum in the 1960s to converse in English and to imitate a psychotherapist. Lisa was a precursor to the Apple Macintosh computer. Lisa, marketed unsuccessfully by Apple, was the first commercial computer with a purely graphical operating system.

Bus Network

Each computer is connected to the next in the line (inexpensive, if one link fails the whole network fails)

Network Node

Each computer on the network

Bit

Each individual binary digit (always either a 0 or a 1)

On a traditional magnetic disk, each track contains

Each track on a traditional magnetic disk contains the same number of sectors. On the tracks closest to the center of the disk, the bits of the sectors are stored more compactly than are the bits stored in those sectors on tracks near the edge of the disk. The number of tracks on a disk varies greatly across disk systems.

Hardware

Eg, Monitor, Printer, CPU, Hard Drive

Output Devices

Eg, Monitor, Printer, Speakers

Input Devices

Eg, Mouse, Keyboard

Each of the following is a type of operating system EXCEPT

Excel is not a type of operating system. It is a spreadsheet program, which is a type of applications software.

Which of the following allows a user to download and upload files on the Internet?

FTP stands for file transfer protocol, a protocol that allows a user to download and upload files on the Internet.

The argument that negative personal information, such as criminal records, should be in the public domain is supported by who of the following?

Federal judge Richard Posner advanced the argument that negative personal information should be in the public domain.

Which of the following was the precursor of modern database management software?

File management software was the precursor of modern database management software.

Each of the following is an example of a desktop publishing application program EXCEPT

FileMaker Pro is not an example of a desktop publishing application. It is an example of a database management software program.

Which of the following is used in graphics programs to produce new two-dimensional digital images by combining an original image with a mathematical function?

Filtering is the process whereby new two-dimensional digital images are produced by combining an original image with a mathematical function. Lathing, extrusion, and solid modeling are all techniques used in the creation of three-dimensional graphics.

Which of the following types of software licenses usually does NOT require a fee for long-term use?

Freeware is software that can be used without a fee over the long term. Shareware licenses allow users to try the software for a period of time without a fee, but users are generally required to pay for shareware use after the trial period.

Each of the following represents a type of software program control mechanism EXCEPT

Functions represent units of programming code that perform specific procedures. Sequential, looping, and conditional are all types of control mechanisms.

Who of the following led an effort that laid the foundation for the development of COBOL in 1959?

Grace Murray Hopper led an effort that laid the foundation for the development of COBOL in 1959. John Kemeny and Thomas Kurtz helped to develop BASIC in 1964.

Personal Digital Assistant (PDA)

Hand held, personal organization software (Eg, calendar, address book, notepad, email)

Network Operating System

Handles all communication between computers (Eg, Windows NT)

Network Topology

How the computers are linked together.

Which of the following are devices that allow the computer to interact with other users and machines?

I/O devices are input/output units that allow the computer to interact with other users and machines.

Conditional Statements

IF, ELSE, THEN... (Eg, IF 2+2*3 < 15 THEN PRINT "YES", ELSE PRINT "NO")

In Boolean logic, the value of the expression NOT (y > 7) is

In Boolean logic, the value of the expression NOT (y > 7) is true if the expression y > 7 is false. The expression y > 7 is false whenever y is less than 7. If y has the value 6, then the expression y > 7 is false, and the value of the expression NOT (y > 7) is true.

In C++ programming language, the output stream is known as

In C++, the output stream is known as cout. Cin represents the input stream.

Which of the following represents an input statement in C++?

In C++, the statement "cin >> Radius;" represents an input statement. The statement "cout << Circumference" represents an output statement.

In the Windows operating system, file directories are represented by

In Windows, file directories are represented by folders. Taskbars reflect the computer's active applications.

In a GUI, the display screen is divided into sections by

In a GUI, or graphical-user interface, windows are used to divide the display screen into sections.

Which of the following indicates the point on a computer screen at which a user may enter a command for the computer?

In a command-driven user interface, the cursor indicates the point at which a user may enter a command or type in data. Cursors may be represented, for instance, by blinking rectangles of light.

In a traditional filing system, files that are NOT linked together are known as

In a traditional filing system, files that are not linked together are known as flat files. Schemas are descriptions of entire database structures that are used by database software to maintain a database.

In the operating system titled MS-DOS 6.2, the number 6 refers to which of the following?

In an operating system title, the number before the period (6 in this case) refers to the version of the operating system. The number after the period (2 in this case) refers to a particular release of a given version.

Concerning issues of computer ethics, statements that indicate what individuals should do under certain circumstances are known as

In computer ethics, normative statements are those that indicate what individuals should do under particular circumstances. Descriptive statements describe how people behave under particular ethical rules.

In declarative programming logic, a collection of statements that is self-contradictory is said to be which of the following?

In declarative programming logic, a collection of statements that is self-contradictory is said to be inconsistent. Clause form statements are connected by the Boolean operation OR.

In executing a software program, which of the following control mechanisms represents the default case?

In executing a software program, the sequential control mechanism represents the default case. Sequential control occurs automatically if there are no instances of other types of control mechanisms.

In the software development process, which of the following represents an advantage of using an interpreter over a compiler?

In general, an advantage of using an interpreter over a compiler is that programs are easier to develop. The interpreter requires only one step before the program can be executed. Choice B is incorrect, because programs execute faster when compilers are used instead of interpreters.

Which of the following represents an advantage of the network database model over the relational database model?

In general, network database models operate more efficiently than do relational database models. Network databases can generally retrieve results more quickly than can relational databases. However, network databases lack the flexibility of relational databases.

In which of the following types of database models are files connected by means of physical links or addresses?

In network database models, files are connected by means of physical links or addresses. Relational database models connect files using logical relationships rather than physical links or addresses.

In network etiquette, the Internet equivalent of shouting is expressed through the use of which of the following?

In network etiquette, shouting is usually expressed through the use of text written in all capital letters. Text written in all capital letters should therefore generally be avoided, unless a communicator intends to convey shouting.

Local Area Network (LAN)

In one room, or one building

In which of the following types of database models are files connected on the basis of logical relationships between data?

In relational database models, files are connected on the basis of logical relationships between data. In network database models, files are connected by means of physical links or addresses.

In simple parity error detection, which of the following is the ratio of parity bits to data bits?

In simple parity error detection, the ratio of parity bits to data bits is 1:7. One parity bit is included for every 7 bits of data to be transmitted.

Personal Computer (PC)

In the home

Which of the following types of mobile devices were analog devices?

In this context, the letter G refers to a "generation" of mobile devices. The first-generation (1G) devices were analog devices. Second-generation (2G) devices were the first digital devices.

Information is transferred on the World Wide Web through which of the following?

Information is transferred on the Web through the use of HTTP, or hypertext transfer protocol. HTML is used to format the information that is transferred.

A company's Webmaster generally performs all of the following duties EXCEPT

Installation of network hardware would most likely be the responsibility of a network administrator rather than a Webmaster. Webmasters generally maintain Web servers, monitor Internet traffic, and respond to inquiries regarding Web site operations. They may also help design and update Web pages.

Integrated collections of computer-based media are known as

Integrated collections of computer-based media are known as multimedia. Multimedia projects can include both animation and digital video, along with sound, text, graphics, and photos. Most multimedia applications are shipped on CD-ROM, but not all CD-ROMs contain multimedia.

Intellectual property rights protect which of the following?

Intellectual property rights protect intangible creative works. Specifically, they protect the creative expression underlying a particular physical work, such as a software program.

Which of the following is a commonly used Internet browser?

Internet Explorer, produced by Microsoft, is a commonly used Internet browser.

Internet searches are usually conducted through the use of which of the following?

Internet searches are usually conducted through the use of keywords. Keyword search terms can be singular or combined together in a phrase.

Which of the following types of cache is built into the computer processor?

L1, or Level 1, cache is built into a computer processor. L2, or Level 2, cache sits between the processor and a computer's RAM.

A LAN can generally extend up to how many kilometers?

LANs are normally used for networks housed within a single room or building. They generally extend up to 50 kilometers.

Which of the following is an open source operating system?

Linux is an open source operating system. Its source programming code is freely available to users without licensing restrictions.

Network Protocol

Locks files that are currently being accessed so there won't be any conflict between computers.

MS-DOS was the primary PC operating system during which time period?

MS-DOS was the primary PC operating system from 1981 through the mid 1990s.

Which of the following types of computers is designed to serve the largest number of users at one time?

Mainframe computers were designed to serve hundreds of users at one time. Minicomputers served smaller numbers of users, usually in the dozens. Microcomputers and desktop systems are designed to serve single users.

Which of the following stages of the software life cycle usually occurs after a program has been tested and debugged?

Maintenance of a software program usually occurs after a program has been tested and debugged. The program is analyzed, designed, and then coded before it is tested.

Each of the following represents a mass storage device EXCEPT

Mass storage devices store information in machine-readable form for access by a computer. Examples of mass storage devices include floppy disks, hard disks, and tapes. A laser printer is not a mass storage device; instead, it represents information in human-readable form.

Operating System (OS)

Master Program

Central Processing Unity (CPU)

Microprocessor, controls the computer. 1) Arithmetic Logic Unit 2) Control Unit 3) Registers

Microsoft Corporation was co-founded in 1975 by

Microsoft Corporation was co-founded in 1975 by Bill Gates and Paul Allen. Steven Jobs and Steve Wozniak co-founded Apple Computer in 1976.

Each of the following represents an example of a graphics software program EXCEPT

Microsoft Word is an example of a word processing program, not a graphics software program. Adobe Illustrator, CorelDRAW, and Windows XP Paint are all examples of graphic software programs.

The transmission medium for a mobile network is which of the following?

Mobile networking works through wireless transmission. The transmission medium is air. Twisted pair cable and coaxial cable both contain copper wire, and optical fibers are made of glass.

Modern graphical-user interfaces most likely replaced virtually all prior computer interfaces because they

Modern graphical-user interfaces replaced virtually all prior computer interfaces because they did away with the need to use text-oriented command languages. Text-oriented command languages were generally very cumbersome to use. Choices C and D are incorrect, because these represent functions of operating systems.

Each of the following represents a phase within the software life cycle EXCEPT

Modularity does not represent a phase within the software life cycle. It is a term used to refer to the division of software into manageable units.

Modem

Modulator/Demodulator. Converts digital signal to analog signal (for sending down phone lines) and vice versa.

Multiprogramming

More than one program can run at the same time (Eg, OS and several applications)

Multithreading

Multiple instances of the same software can be opened at the same time

Which of the following terms is used to refer to the execution of more than one computer program concurrently for a single user?

Multitasking is the term used to refer to the execution of more than one computer program concurrently for a single user. The computer takes turns executing each of the programs, so the programs are executed concurrently rather than simultaneously. Multiprocessing refers to the simultaneous processing of multiple programs by multiple computers.

During data communications, which of the following represents random electronic signals that can modify encoded signals in unpredictable ways?

Noise is the term given to random electronic signals that can modify encoded signals in unpredictable ways. A codec is a pair of methods that compresses and decompresses data.

On a spreadsheet document, a rectangular block of cells is called a

On a spreadsheet document, or worksheet, a rectangular block of cells is called a cell range. A cell address is the combination of column letter and row number that identifies a particular cell.

On a spreadsheet document, the intersection of a column and a row is called a(n)

On a spreadsheet document, the intersection of a column and a row is commonly called a cell. An entry bar is the area on a spreadsheet where information is entered for a specific cell.

Asynchronous

One bit is sent after the other. A START and a STOP BIT are sent to mark the beginning and end of each message. (Telephone lines)

One byte of information contains exactly

One byte of information contains exactly 8 bits.

Client/Server

One central computer hold all the files (server), other computers (clients) access the server (also called workstations). Print Server, Database Server, File Server, Web Server, Mail Server (each serves a specific purpose)

Conversion to a New Software or System Phased Conversion

One department starts using the new software, then another department, then another.

Conversion to a New Software or System Pilot Conversion

One department uses the new software to see if they like it.

Multitasking

One program operates in the foreground while others operate silently in the background.

Which of the following is an encryption system for Internet use?

PGP stands for Pretty Good Privacy, an encryption system developed for Internet use by Phil Zimmerman in 1991. ITAR, or International Traffic in Arms Regulations, is a set of U.S. regulations governing encryption software.

Which of the following types of software programs relies primarily on bit-mapped graphics?

Paint software programs rely primarily on bit-mapped graphics (also known as raster graphics). Draw software programs rely primarily on vector graphics.

Which of the following refers to the process of attempting to fraudulently obtain private online account information by pretending to be a trusted business entity?

Phishing refers to the process of attempting to obtain account passwords, usernames, or other secure information by pretending to be a trusted entity. Phishing is a type of scam, or fraudulent act. Spamming involves sending unrequested email communications, particularly advertisements, to large numbers of recipients simultaneously.

Which of the following terms is commonly used to refer to the process whereby a computer begins executing another instruction before the current instruction is completed?

Pipelining is the term used when a computer processor begins executing another instruction before the current instruction is completed.

Which of the following is the name given to data before any encryption has been performed?

Plaintext is the name given to data before any encryption has been performed. Once the data has been encrypted, it is known as ciphertext. Keys are used to create ciphertext and unlock encrypted messages.

Gantt Chart

Plots out the time allocated to each step in the software development process

Procedural programming languages are also known as which of the following?

Procedural programming languages are also known as imperative languages. Functional, object-oriented, and declarative languages each represent different programming language paradigms.

Software

Programs

Which of the following is an example of a declarative programming language?

Prolog is an example of a declarative programming language. C is an example of a procedural language. C++ and Java are both object-oriented programming languages.

Each of the following represents a use of information technology that could potentially pose a threat to individual privacy EXCEPT

Protecting networks by requiring passwords is not likely to pose a threat to individual privacy. Individual privacy can be potentially threatened by uses of technology that enable organizations to gain access to an individual's personal information, such as health history, contact information, and genetic profiles.

Spooler

Puts PRINTER requests into a queue for orderly printing.

RAM units are capable of which of the following?

RAM units are capable of both sending and receiving memory content.

Each of the following represents a type of digital image format EXCEPT

RGB is not a type of digital image format. It is a type of system for representing color in digital images. TIFF, GIF, and PNG are all digital image formats.

RAM

Random Access Memory (info can be read from AND written to it

Which of the following types of memory represents a computer's primary working memory?

Random access memory (RAM) is a computer's primary working memory. RAM enables data to be both read and written. Read-only memory (ROM) cannot be altered by a computer user.

Software Development Methods - Object-oriented Development

Re-usable pre-existing "objects" are used to create a new product.

ROM

Read Only Memory (info can only be read from it), Info placed at the factory

(RISC)

Reduced Instruction Set Computer

Warm Boot

Restarting the computer without turning it off altogether.

Which of the following represents the standard language for querying relational databases?

SQL is the standard language for querying relational databases. SEQUEL is the name of an early query language that preceded SQL. QWERTY is the name for the standard computer keyboard layout, and Paradox is a type of database management program.

Batch Processing

Saves up requests and then performs them all at one time. (.BAT files on a PC)

Which of the following prevents individuals from gaining access to a computer without a password?

Security utilities prevent unauthorized computer access. They prohibit individuals from accessing the computer without a password.

Full-duplex

Send AND Receive at the same time

PERT Chart (Program Evaluation and Review Techniques)

Shows the ORDER in which different tasks must be completed.

Wide Area Network (WAN)

Spread out over large area (two buildings, a city, a state, a country, the world)

Spreadsheet documents are commonly referred to as

Spreadsheet documents are commonly referred to as worksheets. Tables and forms are commonly used within database management programs. Templates are commonly used within word processing programs.

Each of the following is a common trait of most spreadsheet programs EXCEPT

Spreadsheet programs do not require the user to define tables before data is entered. This characteristic applies to database management programs. In spreadsheet programs, data is entered directly into worksheets without the requirement of preliminary definitions.

Communications Protocol

Standard set of rules so that each computer can understand the other.

Pseudocode

Standardized, plain English coding language. Always follows Order of Operations (Parentheses, Exponents, Multiplication/Division, then Add/Subtract - P.E.M.D.A.S.)

Cold Boot

Starting the computer with the ON/OFF button

The director of information services within an organization is most likely referred to as the

The CIO, or chief information officer, is usually the title of the director of information services within an organization. A CEO, or chief executive officer, handles executive decision making. A COO, or chief operating officer, usually oversees the organization's business operations.

The Clipper Chip is an example of which of the following?

The Clipper Chip encryption scheme, developed by the U.S. government, is an example of an escrowed key cipher, in which a third party controls the secret key in escrow. The RSA algorithm is a public key cipher system.

When the IBM PC was introduced, it ran on which of the following microprocessors?

The IBM PC originally ran on the Intel 8088 microprocessor. IBM chose this 8-bit processor because of the wide availability of 8-bit components. The Intel 8086 processor had been developed by the time that the IBM PC was introduced, but IBM chose against using this 16-bit processor because most available peripheral equipment was compatible only with 8-bit processors at that time.

Which of the following enables individuals to join and participate in Internet group chat sessions?

The IRC protocol enables individuals to join and participate in Internet chat sessions. IRC stands for Internet Relay Chat.

Which of the following types of computer processors has special enhancements for running multimedia applications?

The Intel MMX computer processor has special enhancements for running multimedia applications. The Intel Celeron processor is an economy processor designed for entry-level computer systems.

Which of the following ensures that information being transmitted over the Internet is routed to its proper destination?

The Internet transmissions protocol is known as TCP/IP. The first part of this protocol, TCP, sets the rules for packaging of information into packets. The second part of the protocol, IP, ensures that each packet of information is routed to its proper address.

Which of the following personal computers, introduced in 1984, pioneered the graphical user interface (GUI)?

The Macintosh personal computer, introduced by Apple Computer in 1984, pioneered the graphical user interface (GUI). The Apple II was introduced by Apple Computer in 1977, and the IBM PC was introduced in 1981. Windows represents a graphical user interface operating system, not a type of personal computer.

Which of the following was a well-publicized macro virus that caused itself to be sent to individuals in a user's Outlook contact list?

The Melissa virus was a well-publicized macro virus that caused itself to be sent to individuals in a user's Outlook contact list. SQL Slammer was a rapidly spreading worm virus.

The first commercially viable computer, placed in operation at the U.S. Bureau of the Census in 1951, was known as the

The UNIVAC 1 was the first commercially viable computer. It was placed in operation in 1951 at the U.S. Bureau of the Census. The IBM 650 was introduced in 1954. IBM made its commitment to develop computers after the success of the UNIVAC 1.

Who of the following invented the World Wide Web in 1989?

The World Wide Web was invented in 1989 by former Swiss physicist Tim Berners-Lee. John von Neumann proposed a new type of logical organization, or architecture, for computers. Jack S. Kilby invented the first integrated circuit in 1958.

Which of the following abbreviations represents a data transfer rate of approximately 1 million bits per second?

The abbreviation 1 Mbps represents a data transfer rate of approximately 1 million bits per second. The abbreviation 1 Gbps represents a data transfer rate of approximately 1 billion bits per second. The abbreviations 1 MB (1 megabyte) and 1 Mbits (1 megabit) represent static units of measurement rather than data transfer rates, because they are not expressed in terms of time.

An operation to determine whether one symbol occurs before another in alphabetical order would most likely be performed on which of the following data types?

The character data type refers to data expressed using symbols. An operation to determine alphabetical order of symbols would most likely be performed on data of the character data type. Float and real data types refer to numeric data.

Which of the following is normally used to measure the clock speed of a computer?

The clock speed of a computer is normally measured in terms of megahertz, or millions of cycles per second. Megabytes are normally used to measure storage rates. When they are expressed in terms of time, megabytes and megabits are also used to measure data transfer rates.

Which of the following types of programming language paradigms views programming as involving the development of precise statements regarding a problem to be solved?

The declarative paradigm views programming as involving the development of precise statements regarding a problem to be solved. The procedural paradigm defines the programming process as involving the development of a series of commands that can be carried out by a computer to accomplish a desired result. The functional paradigm views program development as connecting functions that each accept inputs and produce outputs.

Which of the following performs the function of booting a computer?

The function of booting, or starting, a computer is performed by the computer's operating system. PIM software is a type of applications software that accomplishes personal information management tasks. A system doctor program is a type of utility that checks the health of a computer system.

Which of the following is considered to be noncomputable?

The halting problem is the problem of trying to predict in advance whether a program will terminate if it is begun under particular conditions. The halting problem is considered unsolvable, or noncomputable, because its solution lies beyond the capacity of any computer. Unary addition, polynomial problems, and insertion sorts are all computable.

The hexadecimal numbering system uses which of the following?

The hexadecimal numbering system is a base 16 number system. Base 2 is used by the binary numbering system, while base 10 is used by the decimal numbering system.

The host that services a user's e-mail is known as a(n)

The host that services a user's e-mail is known as an e-mail server. E-mail is normally received in the inbox of an e-mail program.

Which of the following terms is commonly used to refer to the single circuit board that contains a computer's processor, temporary memory, and other electronic components?

The motherboard is the single circuit board that contains a computer's processor, temporary memory, and other electronic components.

A company's LAN would most likely be designed and maintained by which of the following?

The network administrator in an organization is responsible for designing and maintaining the organization's networks, including local area networks (LANs) and wide area networks (WANs). A DBA, or database administrator, specializes in maintaining databases.

Which of the following types of programming language paradigms divides a program into units that describe entities with specific attributes or capabilities?

The object-oriented paradigm divides programs into units that describe entities, or objects, with specific attributes or capabilities. Applicative languages are another name for functional programming languages, which operate by connecting functions via their inputs and outputs.

Which of the following terms is commonly used to refer to the overall conceptual design of a computer system?

The overall conceptual design of a computer system is commonly referred to as a system's architecture.

Which of the following represents an advantage of parity bit error detection?

The primary advantage of parity bit error detection is that this method is inexpensive. It costs only one bit per byte of transmitted data. The fact that parity bit checking is designed to detect only single bit changes represents a disadvantage of the method.

Each of the following represents an example of a WAN EXCEPT

The private branch exchange (PBX) is a telephone switching system that is an example of a local network. PDN, SNA, and ARPANET are all examples of wide area networks, or WANs.

Which of the following terms is used to refer to an information retrieval technique that allows the computer to access information directly, without having to go through a defined series of locations?

The random access retrieval technique allows a computer to access information directly, without having to go through a defined series of locations. Sequential access retrieval mechanisms require the computer to go through a particular sequence of locations.

Which of the following is a protocol that allows a user to establish a remote connection with a computer that is linked to the Internet?

The telnet process allows a user to establish a remote connection with a computer that is linked to the Internet. Ping is a diagnostic program that indicates whether a computer is properly connected to the Internet.

Which of the following terms is used to refer to a type of software license that is permanent and does not require renewal?

The term "perpetual license" is used to refer to software licenses that are permanent and do not require renewal. Subscription licenses must be renewed after a certain period. The term OEM is used to indicate an Original Equipment Manufacturer's license for software that comes already installed on computer hardware.

Which of the following terms is used to refer to the meaning expressed by a programming language?

The term "semantics" is used to refer to the meaning expressed by a programming language. The syntax of the language is its grammatical structure. Rules are used to define the syntax of a programming language.

The ultimate mission of a computer virus is known as its

The ultimate mission of a computer virus is known as its payload. A time bomb is a type of computer virus that is triggered by a certain event in time. Michelangelo is a type of time bomb virus.

Which of the following methods allows for the integration of an entire computer processor on a single microchip?

The very-large-scale integration (VLSI) method allows for the integration of an entire computer processor on a single microchip. This method is used to design and fabricate most computer processors today.

Which of the following features of a word processing program automatically handles the end of a typed line for the user, eliminating the need to press Enter or Return when the end of the line is reached?

The word-wrap feature of a word processing program automatically handles the end of a typed line for the user. The word-wrap feature automatically places text on the next line, eliminating the need for the user to press Enter or Return when the end of the line is reached.

In order to preserve the most formatting information when saving a text document, which of the following types of word processing file formats should be used?

To preserve the most formatting information when saving a text document, the RTF file format should be used.

Which of the following processes involves reversing the results of the last delete operation that has taken place on a computer?

To undelete means to restore by reversing the results of the last delete operation that has taken place on a computer. To backup means to save additional copies of computer files for use in case working copies are damaged.

Token Passing

Token is passed like a "baton" between computers. The one which currently holds the token has access to files

Conversion to a New Software or System Plunge

Total and immediate switch to new software

Telecommunications

Transmitting computer data over a network.

Copyright law allows the purchaser of a copy of a software program to

Under copyright law, an individual who purchases a copy of a software program may legally make a backup, or archival, copy of the program. Only the owner of the software copyright has the rights to produce derivatives of the program, distribute copies of the program, or make multiple copies of the program.

The Unicode character encoding system has which of the following types of code?

Unicode is a 16-bit encoding system. ASCII is a 7-bit encoding system, and ANSI is an 8-bit encoding system.

Which of the following represents the current worldwide character encoding standard?

Unicode represents the current worldwide character encoding standard. ASCII and ANSI are both older, 128-character systems that were replaced by Unicode because they weren't sufficient for encoding languages with many characters, such as Japanese.

Unsolicited and unwanted e-mail is known as

Unsolicited and unwanted e-mail is known as spam. Filtering programs enable e-mail software to filter out spam received by a user.

User-defined data types that include definitions of operations are known as

User-defined data types that include definitions of operations are known as abstract data types. Real, or float, data types are primitive data types and are not user-defined.

Software Development Methods - Rapid Application Development (RAD)

Uses computer applications to speed up the development process.

Which of the following types of digital graphics is comprised of geometric shapes?

Vector graphics are comprised of digital geometric shapes. Bit-mapped graphics are comprised of dots called pixels. Raster graphics are another name for bit-mapped graphics.

Expanded memory space that is borrowed from a system's hard disk is known as

Virtual memory is expanded memory space that is borrowed from the hard disk of a computer.

Which of the following is NOT a function of a computer's operating system?

Virus protection is not performed by a computer's operating system. Instead, it is performed by antivirus software programs, which are computer utilities.

The first spreadsheet software was

VisiCalc was the first spreadsheet program. Its development helped popularize the use of personal computers in the early 1980s. Lotus 1-2-3, Microsoft Excel, and Quattro Pro are spreadsheet programs that were developed after VisiCalc.

Which of the following types of memory loses data when the power to a computer is turned off?

Volatile memory loses data when the power to a computer is turned off. Nonvolatile memory retains its data even when electric power is disrupted. Flash memory and PROM are both examples of nonvolatile memory.

Web pages are created primarily through the use of which of the following?

Web pages are created primarily through the use of hypertext markup language (HTML) tags.

Multiprocessing

When a computer has more than one CPU and can process multiple requests at the same time

When text is cut or copied within a word processing program, it is automatically saved to which of the following areas of memory?

When text is cut or copied within a word processing program, it is automatically saved to an area of memory known as the clipboard.

Which of the following enables an instant message user to sketch and illustrate ideas?

Whiteboarding is a capability of some instant messaging software that enables a user to sketch and illustrate ideas. Internet telephone and audio mail provide for audio, rather than visual, communication.

A graphical-user interface that is added to an operating system is known by each of the following terms EXCEPT

Windows is the name for a particular type of operating system. The remaining three terms can be used interchangeably to refer to a graphical-user interface that is added to an operating system.

In a database applications program, a file is comprised of groups of

Within databases, files are comprised of groups of records. Records contain multiple fields that store different types of information about a subject.

Word processed texts that are aligned at both the left and right margins are referred to as

Word processed texts that are aligned at both the left and right margins are referred to as justified. Centered texts are aligned at the center of the document. Ragged right texts are aligned at the left margin only.

Which of the following is produced using Lempel-Ziv encoding?

Zip files are produced using data compression based on Lempel-Ziv encoding. RLE (run-length encoding) and Huffman coding represent alternative data compression schemes.

Network Interface Card (NIC)

connects each computer in the network by cables.

Peer-to-peer

every computer is equal and share equal access to each other's files

Which of the following steps generally comes first within the software life cycle?

the analysis step generally comes first within the software life cycle. During the analysis phase, developers identify what the software should accomplish.

Network

two or more computers connected together


Conjuntos de estudio relacionados

[Java] Complete Final Study Guide (Chapters 1-10)

View Set

Chapter 19 Accounting for Income Tax

View Set

Types of Life Insurance Policies

View Set

Chapter 19: Normal Newborn: Processes of Adaptation

View Set

Chapter 1: Introduction to Information Technology— Hardware, Software, and Telecommunications

View Set