Final Exam CS1 True/False
Typically, four page layouts are created for Web sites
False
While two-factor authentication systems are common in the United States, they are not widely used in other countries
False
Paragraph formatting changes an entire paragraph at one time, such as specifying the line spacing for a particular paragraph.
True
Python programs run on computers using the Windows, Linux, UNIX, Mac OS X, or OS/2 operating systems, as well as on Palm and Nokia mobile devices
True
SSDs are an especially attractive option for portable computers and mobile devices.
True
Unlike ASCII, Unicode is a universal coding standard designed to represent text-based data written in any language, including those with different alphabets.
True
Using the Save As option of the File menu before editing a document is a good idea, so you can return to the original version, if needed.
True
When comparing the zoom capabilities of a digital camera, look for optical zoom, not digital zoom, specifications
True
One-dimension (1D) barcodes contain data only vertically
False
AJAX applications require more bandwidth than conventional Web applications.
False
An emerging sport robotic application is the exoskeleton suit.
False
Biometric authentication uses information that an individual should know or can easily remember.
False
Development rights of a software program specify the allowable use of the program.
False
Each pixel on an LCD display emits light in the necessary color
False
In a typical word processing program, a footer is text entered by the user that appears at the top of each page.
False
MISs are typically interactive and provide information on demand whenever a decision needs to be made.
False
One feature that makes a Web page accessible to a broader audience includes meaningful text-based hyperlinks—such as Click Here instead of How to Contact Us.
False
Operating systems manage and process data from its generation (such as data resulting from orders, documents, and other business transactions) through its conversion into information.
False
Portable barcode readers are always used in point-of-sale (POS) systems.
False
RFID tags need to be within line of sight of a reader
False
ROM (read-only memory), also called main memory, is used to store the essential parts of the operating system while the computer is running.
False
Repairing or restoring data that has become corrupt, perhaps as the result of a storage media error or computer virus, is a database analysis activity.
False
Several of the original ports used with desktop computers—such as the parallel ports traditionally used to connect printers—are now considered standard ports.
False
Storage media are volatile.
False
Structure charts are used to illustrate the step-by-step logic that is to take place within a program, module, or method.
False
The BMP format uses lossless compression, similar to GIF, but it sometimes compresses more efficiently than GIF format for many nonphotographic images, which results in slightly smaller file sizes.
False
The data dictionary includes data located in the database tables.
False
The database models more commonly used today include the hierarchical, network, and multidimensional models
False
Three common types of language translators are compilers, interpreters, and coders
False
With rewritable optical media, the laser permanently alters the disc surface.
False
XML focuses on identifying the format of data—not the data itself.
False
A graphics tablet is also called a digitizing tablet.
True
A structured program is divided into individual modules; each module represents a specific processing task.
True
Although Linux originally used a command line interface, most recent versions of Linux programs use a graphical user interface.
True
Data integrity refers to the accuracy of data.
True
Different browsers and screen resolutions allow different amounts of room to display Web page content.
True
Each location in memory has an address.
True
Each pixel in a monochrome graphic can be only one of two possible colors (such as black or white).
True
Fixed wireless Internet access is similar to satellite Internet in that it uses wireless signals, but it uses radio transmission towers instead of satellites.
True
Hashing procedures usually result in two or more records being assigned the same storage address, an event known as a collision
True
If an application is going to need to interact with existing programs, it will likely be coded in the same language as those other programs.
True
In spreadsheet programs, when absolute cell references are used, formulas are copied exactly as they are written
True
Linux is increasingly being used with both mainframes and supercomputers
True
Many new personal computers come with a C drive partition ready to use for programs and data and another logical drive set up as a recovery partition
True
Most databases created today do not use the hierarchical or network models; these models are generally used with legacy systems that are still operational and must be maintained
True
Most software programs display their licensing agreements at the beginning of the installation process
True
Multimedia refers to any type of application or presentation that involves more than one type of media, such as text, graphics, video, animation, and sound.
True
Sans serif typefaces, such as Arial, do not have serifs and are frequently used for titles, headings, Web page banners, and other text elements that usually are displayed larger than body text or that otherwise need a more distinctive appearance.
True
Spreadsheet templates are available to help users quickly create common types of business documents, such as balance sheets, income statements, invoices, and purchase orders.
True
Tablet PCs can use either a slate or a convertible tablet PC design
True
The Internet Society (ISOC) provides leadership in addressing issues that confront the future of the Internet and oversees the groups responsible for Internet infrastructure standards
True
To protect against data loss caused by a database failure, accidental deletion, or other problem that renders the main copy of a database unusable, stringent backup procedures should be implemented.
True
While the memory used for disk caching can be a designated portion of RAM, today's hard drives typically use a disk cache consisting of memory chips located on a circuit board inside the hard drive case.
True
With most programs, compiling or interpreting a program will result in errors—the assembling process consists of locating and correcting these errors
True