business computer science final
What combination of words and Boolean operators would display all audio files about chiropractic?
.mp3 AND chiropractic
Which is NOT a file extension used by Microsoft Office programs?
.pff
Which of the following extensions is associated with a video file?
.wmv
Eight bits equals ________ byte(s).
1
When you purchase software in a box, reading the ________ is important to know if the software will function properly.
system requirements
________ printers create an image by heating specially coated heat-sensitive paper that changes color where the heat is applied.
thermal
Which statement about vacuum tubes is NOT accurate?
they seldom need
C++ is an example of a ________-generation language.
third
Bold, Italic, and Underline are ________, which means that you can click the button one time to turn the formatting on and click it again to turn it off.
toggle buttons
A 12-point font is larger than a 10-point font.
true
The primary key field uniquely identifies a record in a table.
true
Which is NOT a mobile embedded operating system?
unix apache
Which of the following is NOT a Windows user account type?
visitor
When a company pays people to hack into its own system, it calls in ________ hackers.
whitehat
A(n) ________ is a high-end desktop computer or one that is connected to a network in a business setting.
workstation
________ communication allows you to send a message that the receiver can access later.
Asyncrouse
Adware does NOT affect your computer's performance.
F
If the website is well designed, then the information on the site is probably credible.
F
Pandora is the most popular web browser for people using Macs.
F
Podcasts can be either radio-like or TV-like programs that are aired live on the Internet.
F
Satellite broadband service speeds are comparable to those of cable.
F
Spam CANNOT be sent as a text message.
F
________ is the authoring language that defines the structure of a webpage.
HTML
What is the Internet backbone?
High speed connection between networks
The ________ was created to make it easier for victims to report cybercrimes.
Internet Crime Complaint center
Which statement about a logic bomb is FALSE?
It can spread to other machines
Which statement about email is FALSE?
It cannot be accessed by hackers
The 4G network standard includes ________ technologies.
LTE
________ allows the user to selectively extract data from different viewpoints.
Online analytical processing (OLAP)
Which is the correct order of the phases in the SDLC?
Planning, analysis, design, implementation and testing, maintenance
Once a computer is infected, a virus can use an email program to send out copies of itself.
T
What was the ARPANET?
The origins of the Internet
Which statement about cookies is FALSE?
They cannot collect information you do not want to share
Alan Turing is known for developing ________.
a test that tests a machine's ability to display intelligent behavior programming
Which of the following is NOT part of Microsoft Office Online web apps?
access
The desired output from the ________ phase of the SDLC is a list of requirements for a new system.
analysis
Which type of memory is very fast and is located close to the processor?
cache
The intersection of a row and a column in a spreadsheet is called a ________.
cell
Businesses should use a ________ network to share resources.
client server
Smartphones use ________ technology, allowing users to perform several functions with one device.
convergence
When you trust the collective opinion of a crowd of people rather than an expert, it is known as ________.
crowd sourcing
________ raises money from multiple small investors rather than a few large ones.
crowdfunding
When using Windows, to select all the folders in a window you simultaneously press the ________ and A keys.
ctrl
A GIS can be used by local municipalities to ________.
design emergency routes
________ computers offer the most speed, power, and upgradability for the lowest cost.
desktop
The ________ was the first working, digital, general-purpose computer.
eniac
Using a report to enter data into a database decreases the frequency of data entry errors.
false
When the CPU retrieves an instruction from the main memory, that is known as the ________ process.
fetch
A(n) ________ is a single piece of information in a record in a database.
field
________ software blocks unauthorized access to your computer.
firewall
________ is a small, portable, solid-state drive.
flash drive
Which of the following is NOT a type of programming error?
grammatical
Wireless access points that are available in public spaces are called ________.
hotspots
Which is a type of data that can be stored in an object-oriented database?
images,audio, and video
In what phase of the SDLC does testing occur?
implementation
Which of the following is NOT true about a keypad?
it contains special,
In which text alignment option are the left and right margins even?
justified
ZIP files use what type of compression?
lossless
The Windows ________ utility rearranges files on a hard drive in order to improve efficiency.
optimize drives
,Which would be the strongest password?
p@55W0?d
________ redirects you to a phony website by hijacking a domain name.
pharming
Which device uses one or more pens to draw an image on a roll of paper?
plotter
A third-party program, such as Adobe Flash Player, is considered to be a(n) ________.
plug in
A(n) ________ is a larger, planned update that addresses multiple problems or adds multiple features.
service pack
Podcasts allow time ________, so you can listen on your own schedule.
shifting
An intelligent personal assistant app for Apple devices that allows you to speak using natural language is known as ________.
siri
You should use a(n) ________ account for everyday computing on a computer running Windows.
standard
Formatting marks do not print.
true
When information is duplicated in multiple places, it is known as data redundancy.
true
Which symbol is allowed in file names?
underscore
The macOS operating system is based on ________.
unix
To secure your wireless network at home, you should ________.
use wireless encryption with a difficult passphrase
Which is NOT a CODIS index?
victims
Before November 2017, tweets were limited to ________ characters each.
140
A binary code using eight bits has ________ different possible combinations.
256
Which printer creates a model by building layers of a material such as resin or metal?
3D
Fifth-generation programming languages are primarily used in ________ applications.
AI
What technology allows computers to think and act more like people?
AI
The central processing unit consists of the control unit and the ________.
ALU
Which operator is used to return search results that include two specific words?
AND
The ________ allows a program to request a service such as printing from the operating system.
API
The ________ allows programs to run on computers with different hardware configurations.
API
Which of the following is a server-side programming technology?
ASP
________ is an example of a wearable computer.
An Apple Watch
________ e-commerce allows anyone to sell or trade items online.
C2C
What is the oldest optical disc still in use today?
CD
Which storage disc has a capacity of about 700 MB?
CD
The ________ is the brain of the computer.
CPU
Files saved to a hard disk are stored in ________.
Clusters
The ________ enables users to enter a friendly name like google.com instead of an address like 74.125.224.72.
DNS
________ technologies use telephone lines to carry digital signals.
DSL
The Internet was originally created as a communication system for the ________.
DoD
The ________ was first designed to calculate artillery firing tables.
ENIAC
A black-hat hacker attempts to find security holes in a system to prevent future hacking.
F
A viral video is one that can infect your computer with malware.
F
Today's processor speeds are measured in ________.
GHz
The ________ is a tracking system created by the U.S. Department of Defense that uses satellites for navigation.
GPS
Which organization coordinates the Internet naming system?
ICANN
________ allows you to communicate with one person at a time.
IM
74.125.224.72 is an example of a(n) ________.
IP
Which of the following is NOT a cloud service provider?
Intel
Which of the following is NOT a Boolean operator?
NOR
When the Internet backbone was privatized, five large ________ Access Points made up the new backbone.
Network
Microsoft Office is an example of a(n) ________.
OSS
When you connect a printer to your computer, ________ allows the operating system to detect the printer to make setup easier.
PnP
________ is used to make a website easier to find by both people and software and increases a webpage ranking in search engine results.
SEO
When you set up your wireless router, you should change the ________, which is also called the wireless network name.
SSID
Using social media sites to sell services is called ________.
Social media marketing (SMM)
A captcha is a series of distorted letters and numbers that are difficult for automated software to read but relatively easy for humans to read.
T
A company releasing a new product could use a Facebook Page to promote its release.
T
VoIP uses the Internet to transmit calls instead of phone lines or cellular towers.
T
In modern computers, FireWire ports have been largely replaced by ________ and Thunderbolt ports.
USB
________ is the largest online video-hosting site in the world.
YouTube
A ________ is the smallest unit of digital data.
a bit
A router is a form of security because it ________.
acts like a firewall
You would install a(n) ________ if you wanted to enable new capabilities in your web browser.
add on
When using Windows to make changes, install hardware, or configure settings, you need to use the ________ account on your computer.
admin
An end user license agreement represents which of the following?
agreement between the user and the software publisher
A(n) ________ is a procedure that you would use to solve a problem.
algorithm
A moderated chat room ensures that ________.
all content is screened
To protect your computer from adware, you would purchase ________ software.
antispyware
The programs that make up the Control Panel are sometimes referred to as control panel ________.
applets
A computer can be a flexible and powerful tool by using what type of software?
application
The Subscriber Identity Module (SIM card) stores all the following information on a mobile device, EXCEPT ________.
apps
The test that a transaction processing system uses to make sure that transactions are fully completed or aren't undertaken at all is known as ________.
atomicity
An .mp3 file extension indicates that the file is a(n) ________ file.
audio
In a virtual community, you can communicate with other people by using a(n) ________.
avatar
When sending one email to everyone in your address book, you should use the ________ field to keep their addresses private.
bcc
The pre-release version of a program that is provided to some users and developers to preview and test before the final version is released, is called a(n) ________ version.
beta
________ is the application of information technology to the field of biology.
bioinformatics
A ________ changes your home page and redirects you to other websites.
browser hijacker
Wikis are designed for ________, which is allowing people to contribute more than just posting a response.
callaboration
A(n) ________ is a computer that connects to or requests services from a server.
client
Which of the following is NOT a valid character in a file name?
colon
An email claiming that you have won a lottery might be an example of ________.
computer fraud
The ________ Act passed by the U.S. Congress in 1986 made it a crime to access classified information.
computer fraud n abuse
A(n) ________ improves over time by learning from its interactions.
congnitive cimputing system
A ________ computer has a screen that can swivel and fold to resemble a tablet.
convertible notebook
Word's mail merge feature joins a main document and a ________ to create customized letters or labels.
data source
The Windows ________ utility looks for files that can safely be deleted to free up disk space.
disk cleanup
________ computers are present in such diverse applications as gasoline pumps, home appliances, and traffic lights.
embedded
A header prints at the bottom of every page.
false
Making money through in-app purchases is common in ________ software.
freemium
________ can be used at no cost for an unlimited period of time.
freeware
________ computing refers to the efficient and eco-friendly use of computers.
green
Hacking to make a political statement is called ________.
hacktivism
The online free storage provided by Apple is called ________.
icloud
In what phase of the SDLC does user training take place?
implementation
Which is NOT an advantage of data normalization?
increases database development time
The iPhone, iPad, and iPod touch use the ________ operating system.
ios
Which of the following is a client-side programming technology?
javascript
The most common printer used in businesses is the ________ printer.
laser
A(n) ________ is a type of internal storage used in digital cameras.
memory card
________ software can be copied, modified, and redistributed without paying a fee.
open source
A Facebook ________ is used to promote an organization, a product, or a service.
page
File Explorer includes ________ access items on the Navigation pane to help you work more easily.
quick
Which of the following is NOT a SQL relational keyword?
quit
The ________ database is the most popular type used by businesses.
relational
To print data or display it in an easy-to-read format, a ________ can be used.
report
Using System ________ returns your operating system to a previous point in time.
restore
Highlighting an area of text with your mouse so it can be edited, formatted, copied, or moved is called:
selecting text
Sophia heard about some media software with a free trial download. She thought it would be a good idea to try it before buying. She is using which type of proprietary software?
shareware
Antivirus software uses ________ to search for known viruses.
signature checking
An email ________ is a block of text that is automatically put at the end of your messages.
signature line
________ sites let users evaluate hotels, movies, games, books, and other products and services.
social reviewing
All of the following are examples of malware, EXCEPT ________.
spam
In addition to performing calculations, ________ organize data that can be sorted and filtered, making the data functional for lists and schedules.
spreadsheets
When one business provides services for another, it is a type of e-commerce called ________.
B2B
When you buy a textbook online from Amazon.com, you are participating in ________ e-commerce.
B2C
Which of the following items below is NOT a cloud service offering?
BaaS
Asynchronous communication happens in real-time with two or more people online at the same time.
F
The United States government developed the naming system for the Internet.
F
The only authority responsible for investigating cybercrime in the United States is the FBI.
F
The only program you need to fully protect your computer is a good antivirus program.
F
The original use of the Internet was to conduct business between corporations and its customers.
F
The top-level domain used by the government is .net.
F
You can only edit content on a wiki if you are the original author.
F
________ provides a programming environment to develop, test, and deploy custom web applications.
PaaS
Which of the following types of memory is nonvolatile?
ROM
You can subscribe to ________ feeds to stay up-to-date on podcasts and news feeds.
RSS
________ involves the delivery of applications — web apps — over the Internet.
SaaS
A criminal might obtain personal information by capturing what is typed on a keyboard by installing a keylogger program
T
A search engine is essentially a large database of indexed webpages.
T
A social bookmarking site allows you to share your bookmarks with others online.
T
ARPANET is the name first given to the Internet.
T
All the computers connected to the Internet are given a unique IP address.
T
Another name for a bot is a zombie.
T
Antispyware software prevents adware software from installing itself on your computer.
T
Asynchronous online communication technology lets you send a message that the receiver can access later.
T
By using tabbed browsing, you can have multiple home pages.
T
Cyber criminals can be difficult to catch because many of the attacks originate outside the United States.
T
Cyber-stalking is serious because the person demonstrates a pattern of harassment and poses a credible threat of harm.
T
DSL is normally slower than cable Internet access.
T
Dial-up Internet access is the slowest type of Internet connection.
T
Encryption converts plain text into ciphertext.
T
FTTH uses fiber-optic cables.
T
Firewalls can be implemented by hardware and/or software.
T
Google has a search tool called Google Scholar that you can use for research.
T
Having quick access to features in a browser is often done through a browser toolbar.
T
In a virtual world, you can select an avatar as a virtual body.
T
Internet2 is much faster than the Internet because it has a fiber optic backbone.
T
It is recommended that you have more than one web browser installed on your computer.
T
Mobile browsers are optimized to be viewed on small screens.
T
On a Windows computer, the User Account Control notifies you before changes are made to your computer.
T
One way to access email is to read it online through a webmail interface.
T
Phishing and pharming attempts are successful because they appear to be from legitimate websites.
T
Ransomware is malware that prevents you from using your computer until you pay a fine or fee.
T
Search engine optimization (SEO) is used to make a website easier to find.
T
Social networks have changed TV watching from a passive experience to an active, social experience.
T
TLDs often represent the type of website that is being visited.
T
The 4G cellular network standard includes WiMAX Mobile Internet technology.
T
The OR operator is used to return results that include either of two specific words.
T
The Subject line of an email message helps the recipient know what the message is going to be about.
T
The biggest difference between cyberbullying and cyber-harassment is that one involves minors and the other occurs between adults.
T
Twitter is an example of a microblogging site.
T
User-generated content refers to the fact that anyone can put content on the web.
T
Using the Boolean operator NOT means the results must include the first word but cannot include the second word.
T
When you perform a search for the term aquarium from a computer in Kansas City, your results will most likely be different than if you perform the same search while you are in Seattle.
T
Worms spread over network connections without any help from users.
T
You should be wary about entering your credit card number into a website whose URL does not begin with https.
T
qA browser plug-in is a third-party program, such as Adobe Reader.
T
.com is an example of a(n) ________.
TLD
Which of the following types of data are NOT stored in RAM?
bios setting
________ hackers hack into systems to steal or vandalize.
blackhat
A ________ is similar to an online journal, in which you can write about anything you want to share.
blog
Which of the following is a short-range wireless technology?
bluetooth
You can use a social ________ site to save and share your favorites online.
bookmarking
A distorted series of letters and numbers, called a ________, is used to ensure that you are a human and not a computer.
captcha
________ is the process of converting an algorithm into a language the computer can understand.
coding
The cyberbullying of one adult by another adult, using a computer is known as ________.
cyber harass
________ is an unlawful attack on computers or networks done to intimidate a government or its people.
cyber terroism
Windows ________ helps to protect a computer from viruses and spyware.
defender
Without ________, the computer would not know how to use new hardware.
device drivers
The least expensive form of Internet connection is ________.
dial up
A data ________ defines the fields in a database and the type of data that each field contains.
dictionary
All the information someone can find out about you by searching the web is called your ________.
digital footprint
Clicking on the words New Slide and down-pointing arrow:
displays a gallery
Linux ________ include the OS, various utilities, software applications, and an office suite.
distros
In the URL http://www.irs.gov, irs is the ________.
domain name
________ is a form of freeware, where the developers accept contributions for themselves or for nonprofit organizations.
donationware
________ are found on the motherboard and are used to attach your hard disk.
drive controllers
________ is an example of asynchronous communication.
Which operating system is specialized, has limited function, and can run on simple hardware?
embedded
________ is the study of the relationship between workers and their workspaces.
ergonomics
A wired network interface card is sometimes call a(n) ________ card.
ethernet
Today, the backbone of the Internet is composed of numerous Internet ________ Points around the world.
exchange
A doctor may use a(n) ________ to help diagnose an illness.
expert system
Knowledge engineers develop ________, which are programmed to make decisions in real-life situations.
expert systems
A DBMS will define a data type for you by evaluating the data currently entered into the fields.
false
A background style must be applied to all slides in a presentation.
false
A client-side program requires that special software be installed on your computer.
false
A data flow diagram is not used to help highlight a system's deficiencies.
false
A data warehouse is used to discover relationships among data items.
false
A database controller (DBC) is a person who oversees database systems.
false
A decision support system is made up of a knowledge base and an inference engine.
false
An algorithm cannot be mapped using a flowchart.
false
Assembly language is a first-generation language.
false
Coding is the first step in the program development cycle.
false
Fuzzy logic simulates human thinking by emulating neurons in the brain.
false
Logic errors are easier to find than syntax errors because they prevent the program from running.
false
Making a series of smaller payments for the use of software is known as micropayments.
false
Microsoft Excel is an example of a DBMS.
false
Software development kits encourage programmers to develop software using a bundle of libraries and tools that are developed for any platform.
false
The test that a transaction processing system uses to make sure that each transaction is independent is known as durability.
false
In a database, title, author, publication date, and ISBN are examples of ________.
fields
Default programs are associated with which of the following?
file types
Which of the following applications is NOT part of an office application suite?
financial
The ________ in macOS is used to locate and arrange files, folders, and applications.
finder
To change the program that opens a file in macOS, which of the following would be used?
finder
An Excel spreadsheet is an example of a(n) ________ database.
flat
Which is NOT a modern source of installing software?
floppy drive
A graphic view of an algorithm is called a ________.
flowchart
The most common way to enter data into a database, is to use a(n) ________.
form
________ make data entry easier because they can be set up to match the layout of a paper document.
forms
Which generation of programming languages is closer to natural language but still requires some programming knowledge?
fourth generation
________ is similar to the way people think, acknowledging that not everything can be answered as a yes or no question.
fuzzy logic
________ contains the tasks and dates for a project and shows the schedule and progress of the project in a graphic.
gantt chart
Which of the following is an example of a personal Software-as-a-Service (SaaS)?
google drive
The # symbol used by Twitter is called a(n) ________.
hashtag
The type of folder structure created by Windows is known as a ________.
hiearchy
When you enter your credit card information in a website, you know the website is encrypted when you see ________ in the address bar.
https
What project was coordinated by the U.S. Department of Energy and the National Institutes of Health?
human genome project
Windows maintains a(n) ________ on your system that helps to speed up searches.
index
A(n) ________ is a set of rules that are used to apply a knowledge base to each situation.
inference engine
A database is a collection of ________ that has been organized in a meaningful way.
information
The most common personal printer is the ________ printer.
inkjet
Which of the following is a method of synchronous online communication?
instant messaging
The fetch-and-execute cycle is also called the ________ cycle.
instruction
Third-generation computers are characterized by the use of ________.
integrated circuits
Which of the following types of storage has a relatively low price per GB, fast transfer speed, and is secure inside a system unit?
internal hard drive
Which of the following would NOT be a recommended place to back up computer files?
internal hard drive
The term "cloud" in cloud computing refers to ________.
internet
Ubiquitous computing is also called ________.
invisible computing
Which of the following is NOT a characteristic of the DisplayPort interface?
it is an analog interface
Which is NOT an advantage of using a cloud storage service?
it is faster than other backup options
A GIS is made up of datasets, also called ________, of geographically referenced information about Earth's surface.
layers
In the Windows operating system, the Documents, Music, Pictures, and Videos folders are known as ________.
libraries
When using a Windows PC, you can use a ________ to organize similar files that are located in different locations.
library
What formatting character displays between words?
light dots
________ is a social network that is designed for business connections.
The Android operating system is the embedded version of ________.
linux
In an office acceptable use policy (AUP), which of the following might be prohibited?
logging into ebay
A ________ error is an error in programming design that results in an unexpected outcome.
logic
To ensure that a person does not misspell Wednesday in a field, a(n) ________ list can be used.
lookup
In Excel, you can use ________ to automate tasks.
macros
Hard drives store data ________.
magnetically
The SDLC follows the development of a system from planning to the final stage, ________.
maintenance
An expert system is a computer programmed to ________.
make decisions in real life situation
Clickjacking results in ________.
malware posting unwanted links on your Facebook page
The collection of websites that enable users to create user-generated content, connect, network, and share is called social ________.
media
The ________ is a complex circuit that enables it to act as the brain of the computer.
microprocessor
Fourth-generation computers use ________.
microprocessors
Pixels are most closely associated with ________.
monitors
________ Law predicted that the number of transistors placed on an integrated circuit would double approximately every two years.
moores
Which of the following is NOT an example of an expansion card?
motherboard
Data in a ________ database are stored in data cubes.
multidimensional
Wi-Fi that is made available in some cities and towns is known as ________ Wi-Fi.
municipal
A system that simulates human thinking by emulating the biological connections of the brain is called ________.
neural network
Web apps which will run on any device with a supported browser and Internet access are called platform-________.
neutral
Which Boolean operator would you use to exclude a term in your search results?
not
Which of the following screen elements is displayed below the Slide pane and allows you to type additional slide information?
notes pane
Which of the following is a network operating system (NOS)?
novell
The science and telecommunications industries would most likely use the ________ database type.
object orientated
When you define objects and the actions that can be performed on them, you are using ________ programming.
object orientated
Which Word screen element displays a list of commands related to things you can do with a document such as opening, saving, printing, or sharing?
office button
The free online storage provided by Microsoft is called ________.
one drive
In a relational database for vehicles, a ________ relationship occurs when each vehicle record may link to several repair records, but each repair can link to only one vehicle.
one to many
The ________ is the most important software on a PC.
operating system
________ software provides the user with an interface to communicate with the computer's hardware.
operating system
Forcing a processor to run at speeds higher than it was designed to perform is known as ________.
overclocking
________ recommends music to you based on your listening preferences.
pandora
________ uses multiple processors, or multi-core processors, to share processing tasks.
parallel processing
A(n) ________, also known as a hotfix, addresses individual software problems as they are discovered.
patch
The sequence of folders to a file or a folder is known as the file's ________.
path
Another name for the actual attack caused by a virus is a ________.
payload
A ________ enables you to manage your email, calendar, contacts, and tasks—all in one application.
personal information manager
A method by which the CPU can be processing four instructions at the same time is called ________.
pipelining
A ________ sets aside a portion of a slide and serves as a holder for text or other content such as pictures, graphics, or charts.
placeholder
In the ________ phase of the SDLC, the project team is assembled and the feasibility studies are completed.
planning
An online environment for programming that allows development, testing, and deploying custom applications is called ________.
platfrom as a service
Adobe Acrobat and Adobe Reader are associated with which type of file?
portable document format
In a one-to-one relationship, both tables use the same ________ to link two records.
primary key
The ________ a set of five steps that a programmer follows to create a computer program.
program development cycle
A ________ helps you to complete projects, keep within your budget, stay on schedule, and work with others.
proj mgmt program
File information such as type, size, and date are called file ________.
properties
In the URL http://www.irs.gov, http is the ________.
protocol
________ conveys the steps of an algorithm using English-like statements that focus on logic, not syntax.
pseudocode
To share files with other users of the same computer using macOS, you would place them in the ________ folder.
public
A ________ could be used to retrieve all the phone numbers from a student database.
query
A ________ contains the information for a single entity in the database.
record
A(n) ________ contains information about a single entry in a database.
record
If your computer has a ________, someone else can gain access to it undetected.
rootkit
A ________ connects two or more networks together.
router
Which device on a network performs network address translation?
router
Which broadband service are you likely to use if you live in a very remote area?
satellite
Which is NOT an adaptive input device?
standard mouse
When you start the Word program, what do you need to do to create a new document?
start typing
Procedural programming involves ________.
step by step list
________ technology is used for sending email messages.
store and forward
Which of the following is NOT a function of the CPU?
store data
Which would make the best primary key in a table?
student ID
A(n) ________ allows someone to use software for a monthly or yearly fee.
subscription
________ are very expensive, complex computer systems used in weather forecasting and medical research.
supercomputers
If you misspell a command word in a computer program, you have created a ________ error.
syntax
The rules that ensure the correct construction of commands in a programming language is called the ________.
syntax
The ________ software makes the computer run.
system
The ________ is the logical model of a new system.
system specification report
The ________ houses the power supply, memory, and drive bays of the computer.
system unit
In a database, a ________ stores data in rows and columns.
table
In a database, related records are organized into one or more ________.
tables
Default file type associations determine ________.
the application that will open when you double-click the file name in File Explorer
________ consists of these four components: input, processing, storage, and output.
the info cycle
Distributed computing distributes ________.
the processing of tasks across
Which of the following is a form of solid-state storage?
thumb drive
Adding a browser ________ gives you quick access to the features of the application that installed it.
toolbar
A(n) ________ is most commonly found on a notebook computer.
touchpad
The concentric circles on a hard disk are called ________.
tracks
The FTP protocol is used to ________.
transfer files
Second-generation computers used ________.
transistors
What is NOT true about pop-up blockers?
triggered by cookies
A ________ appears to be a legitimate program, but is actually something malicious.
trojan horse
A datacenter is a facility designed to house a company's servers and other equipment in a secure and controlled environment.
true
A feasibility study is used to determine if a project should proceed.
true
A first-generation language executes very quickly but takes a lot of effort to write and debug.
true
A hotfix resolves individual software problems as they are discovered.
true
A many-to-many relationship exists when a book has multiple authors and the authors have written many different books.
true
A rootkit is a set of programs that enables someone to gain control over a computer system surreptitiously.
true
A service pack is a large, planned software update that addresses multiple problems or adds multiple features.
true
A template contains information such as presentation styles, bullet type and size, fonts, and backgrounds.
true
An expert system is used to simulate human judgment to solve problems.
true
Control structures are used to show the logic and the flow of data processing.
true
Cyber-harassment is defined as cyberbullying between adults.
true
Durability, as related to transaction processing, means that once a transaction has been completed, it cannot be undone.
true
Flowcharts are used to show the flow of logic through an algorithm.
true
Formatting means changing the look of the text, layout, or design of a slide.
true
In object-oriented programming, an object defined in one program can be reused in a different program.
true
Most of the modern programming languages are 3GL and require programmers to have a considerable amount of programming knowledge.
true
Neural networks are used for data mining and speech recognition.
true
One of the purposes of the project team is to identify the scope of the project and define the objectives.
true
One way to display the data in a table is by creating a report.
true
The Integrated Automated Fingerprint Identification System database contains fingerprints of those who have served in the armed forces or work in the federal government and law enforcement.
true
The Integrated Automated Fingerprint Identification System is considered to be a biometric database.
true
The National Missing Person DNA database is part of the CODIS system.
true
The System Development Life Cycle is a traditional model used to develop an information system.
true
The advantage to using a PaaS system is the elimination of local administration, hardware, and software.
true
The geographic information system combines layers of geographically referenced information about Earth's surface.
true
To open an existing presentation, you must first click on the Office button.
true
When designing a database, you should have separate fields for a person's first and last names.
true
When developing an algorithm, pseudocode statements focus on logic, not syntax.
true
________ is an example of a microblogging site that allows a limited number of characters in a post.
The ________ is an early computer created in 1951, which was used to predict election results.
univac
A data ________ rule would prevent a user from entering text in a date/time field.
validation
Which File Explorer tab will display commands that enable you to change the way objects in a file list are displayed?
view
The difference between a virus and a worm is a ________.
virus needs a host file, but a worm does not
The SDLC, the traditional model for system development, is also called the ________ model.
waterfall
The tools that allow users to create content and have changed the way people communicate and collaborate on the web are known as:
web 2.0
Programs that interpret HTML to display webpages are called ________.
web browsers