Information Systems CLEP Part 1
data dictionary
A DBMS uses the _____ to perform validation checks.
harmful program that hides within or looks like a legitimate program
A Trojan horse, one of the most serious threats to computer security, is a(n) __________.
form
A ____ is a window on a screen that provides areas for entering or changing data in a database.
P2P
A ____ network is an Internet network, on which users connect directly to each other's hard disks and exchange files directly.
local area network (LAN)
A _____ is a network that connects computers and devices in a limited geographical area, such as a home, school computer laboratory, or office building.
shortcut
A _____ is an icon on the desktop that provides a user with immediate access to a program or file.
host
A _____ is any computer that directly connects to a network.
kilobyte (KB or K)
A _____ is equal to exactly 1,024 bytes, but computer users often round it down to 1,000 bytes to simplify memory and storage definitions.
byte
A _____ is the smallest element in an electronic image.
bit
A _____ is the smallest unit of data a computer can process.
Zip disk
A _____ looks similar to a floppy disk but has much greater storage capabilities—up to the equivalent of 170 standard floppy disks.
Smart Phone
A person on a budget who wants a device with PDA-capabilities and the ability to send and receive e-mail would be best advised to purchase a(n) __________.
check digit
A program determines the _____ by applying a formula to the numbers in the primary key.
newsreader
A program that stores and distributes newsgroup messages is called a _____.
larger, more difficult
A ring network can span a _____ distance than a bus network, but it is ___________ to install.
POS (point of sale)
A(n) ___ system is a special kind of order-processing system that records purchases, processes credit or debit cards, and updates inventory.
servlet
A(n) _____ is an interpreted program that runs on the server.
image processing system
A(n) _____ is similar to an electronic filing cabinet that provides access to exact reproductions of the original documents.
consistency check
A(n) _____ tests the data in two or more associated fields to ensure that the relationship is logical.
optical mouse
A(n) _____ uses devices that emit and sense light to detect the mouse's movement.
solution algorithm
A(n) _____, also called program logic, is a graphical or written description of the step-by-step procedures to solve the problem.
see documents formatted as they would look in print
Acrobat Reader enables users to __________.
relatively limited
An important difference between a client/server network and mainframe architecture is that a client/server network typically connects a __________ number of computers.
CMOS
During a cold boot on a personal computer, the POST (power-on self-test) results are compared with data in a _____ chip.
node
Each computer or device on a local area network, called a _____, often shares resources such as printers, large hard disks, and programs.
Windows XP
Examples of network operating systems include all of the following except _____.
workgroup computing
Groupware is a component of a broad concept called _____, which includes network hardware and software that enables group members to communicate, manage projects, schedule meetings, and make decisions.
tags
HTML (Hypertext Markup Language) uses ____ to specify how a document should be formatted.
nonlinear
Hypermedia is made up of a ____ combination of text, audio, video, and graphical components that are linked electronically.
compromised computer
In computer language, a zombie is a(n) __________.
digitizer
Large-scale applications sometimes refer to a graphics tablet as a _____.
relational
Most _____ database products for midrange servers and mainframes include SQL.
JPEG and GIF
Of the graphics formats that exist on the Web, the two more common are _____ formats because of their smaller file sizes.
run-time error
One purpose of using test data is to try to cause a _____, which is an error that occurs while a program is executing.
listen to music, movies, play games
One study reported that mainframe computers process more than 83 percent of transactions around the world. Mainframes can perform all of the following functions except allow users to __________, watch _________, and _____ _______.
heel of the hand, pivot point
Repetitive strain injuries are a major problem in the United States today. To prevent repetitive strain injury, computer users should take all of the following precautions except using the __________ as a _________ while typing or using the mouse.
cyberterrorist
Someone who uses the Internet or a network to destroy or damage computers for political reasons is a ___________.
Xeon and Itanium
The _____ processor(s) is/are ideal for workstations and low-end servers.
Tablet PC
The primary input device for a _____ is a digital pen, which allows users to write on the device's screen.
packet-switching
The technique of breaking a message into individual packets, sending the packets along the best route available, and then reassembling the data is called _____.
is open source software
Unlike Vista, Linux ____________.
Excel
Web page authoring software includes all of the following except ____.
HTML
Widely used procedural programming languages that the industry recognizes as standards include all of the following except _____.
batch
With ____ processing, the computer collects data over time and processes all transactions later, as a group.
OLTP (online transactional processing)
With ____, the computer processes each transaction as it is entered.
third-generation language (3GL)
With a procedural language, often called a _____, a programmer uses a series of English-like words to write instructions.
Optical mark recognition (OMR)
____ devices read hand-drawn marks such as small circles or rectangles.
Parallel conversion
_____ consists of running the old system alongside the new system for a specified time.
memo
_____ is a common data type in a database that consists of lengthy text entries.
J2EE (Java 2 Platform Enterprise Edition)
_____ is a set of technologies by Sun Microsystems that allows programmers to develop and deploy Web services for an enterprise.
Freeware
_____ is copyrighted software provided for an unlimited time at no cost to a user.
Windows XP 64-Bit Edition
_____ is designed for workstations that use an Itanium 2 processor.
American Standard Code for Information Interchange (ASCII)
_____ is the most widely used coding scheme used to represent data.