Module 11: Database, Chapter 11 - Databases,

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

To be considered a reliable online source, author information for the content should appear on the page.

True

Virtual reality simulates a three-dimensional environment with which users can explore and interact.

True

Synchronous

Type of communication technology that requires all participates to be online at the same time

Webmail

Type of email that use the browser and an email account provided through an online service to send and receive emails

Local

Type of email that uses an email client in an email account provided by an ISP to send and receive emails

What are the two companding law types?

U and A

A software license agreement typically does not allow you to _____.

UPLOAD COPIES AND SHARE FILES

You can run multiple operating systems on one computer using __ machines.

Virtual

A self-distributing program that seeks out security vulnerabilities is called a(n) ____.

WORM

configuring a computer so that it will respond to network activity when the computer is in a sleep state

Wake on LAN

If you want to be able to power up a computer remotely, what feature should you use?

Wake-on LAN

A network interface card sends data between a computer and the network.

Yes

A specific touch motion you use to issue commands is called a gesture.

Yes

A spreadsheet app is a type of productivity software.

Yes

A stylus is an input device.

Yes

All devices include a video card.

Yes

An VPN allows a mobile user to connect securely over the Internet.

Yes

An operating system manages system resources including RAM.

Yes

Brownouts can damage components over time.

Yes

External hardware can be connected without wires or cables.

Yes

Ink-jet printers use pressurized nozzles to spray ink onto paper.

Yes

It's smart to assume that emails and texts may be shared without your knowledge.

Yes

It's smart to assume that emails and texts may be shared without your knowledge. Yes No

Yes

Most application software apps open in a window on the screen.

Yes

Most file managers include a way to create a folder through the Save dialog box.

Yes

Shutting down a device powers it off completely.

Yes

Solid state drives are more durable than hard disk drives.

Yes

Some tracking devices include an alarm that sounds if the device moves out of range.

Yes

The Windows 10 Snap feature lets you quickly maximize a window's height.

Yes

Tier 1 networks provide the main travel routes for Internet data.

Yes

You can search for apps by name or functionality.

Yes

Does PCM use a sign bit?

Yes, PCM uses sign-magnitude codes, where the most significant bits the sign and the rest represents the magnitude.

Spencer's blog claims that national parks are the best vacation destinations. Which evidence is best for developing his claim?

a personal account from a park visitor who describes positive adventures at Grand Canyon and Yellowstone parks

Candice would like to include a photo in her blog post persuading readers to visit the new local farmer's market. Which photo would most enhance her post?

a photo of a smiling family selecting colorful produce together

Avery would like to include an interactive element in a blog post persuading readers to try yoga. Which would most enhance her post?

a request for comments from yoga fans

Vine

a social video sharing service in which users create and engagement with short-form, six-second video clips. Videos published through the service are easily shared across other social platforms such a Twitter and Facebook.

Christian would like to include a graphic in a blog post persuading readers to raise money for the local animal shelter. Which graphic would most enhance his post?

a table illustrating a decline in shelter funding over the past decade

the root directory is the main

files added on the drive

software

formed by programs that set up a computer to do a specific task.

operating system

software that helps a computer operate efficiently and keep track of data

Which multimedia choice would be most effective in persuading blog readers to learn to play a musical instrument?

an interview with a successful popular musician

My first driving lesson was a disaster. The only thing I knew... The purpose of Ally's blog is to

entertain with humorous anecdotes.

Jared created a blog to describe his traveling adventures. The main purpose of his blog is most likely to

entertain.

Malware _______ are delivery methods that take advantage of security flaws.

exploits

Benefits of donating computer equipment include __. Select all that apply.

extending the useful life of the device / helping someone who can't afford a new device / keeping e-waste out of landfills / avoiding having the device waste space in your home/office

Most social networks serve only one purpose or one type of user.

false

Only people who join an online community are part of a social network.

false

The goal of crowdsourcing is to gain support only from those in your immediate social circle.

False

The goal of crowdsourcing is to gain support only from those in your immediate social circle. True False

False

In a hierarchical database, a child node cannot be added unless:

A parent node is added first.

To use Remote Desktop, the computer you access remotely can be running Windows 8 Home Edition or Windows 8.1 Professional.

False

When a user logs on to a Windows 7 computer using Remote Desktop, users that are logged on locally are unaffected.

False

When creating an email address, you should use the maximum allowed number of characters. True False

False

FriendFeed

A versatile social network service that facilitates conversation and aggregation of RSS feeds.

data warehouse

A(n) ______ database is a huge database used to analyze transactions.

relational

A(n) ______ database stores data in tables that consist of rows and columns.

check digit

A(n) ______ is a number(s) or character(s) appended to or inserted in a primary key value.

object

A(n) ______ is an item that contains data, as well as the actions that read or process the data.

field

A(n) ______ is the smallest unit of data a user accesses.

benchmark

A(n) ______ test measures the performance of hardware or software.

interpreter

A(n) ______ translates and executes one instruction at a time and converts it to machine language.

client side

A(n) _______ script runs in your browser.

attribute

A(n) ____________ provides additional information about an element.

Advantages of web apps include _______.

A. no need to install an app B. collaboration with coworkers and friends C. available anywhere with an Internet connection

Computer-aided manufacturing (CAM) offers which possible benefits?

A. reduced waste C. increased production flexibility

You can use a browser to _____.

A. research information C. work in web apps D. watch videos

To be successful in professional messaging, you should _____.

A. share articles about the latest industry trends C. connect with current and former colleagues D. upload photos and media clips from a conference you organized

Typical uses of wikis include _____.

A. sharing research B. company knowledge base C. virtual workspaces

A small sequence within a process is called a(n) _____.

A. thread

A laptop (notebook) typically includes a _______.

A. touchpad or trackpad B. keyboard

The two categories of system software are _______.

A. utilities and operating systems

When drawing over an existing object in a paint app, __.

A. you are replacing the existing object

Some benefits of podcasts include _____. Select all that apply. A. ability to listen offline B. can be created at low cost C. wide variety of content D. broadcast over the radio

A;B;C

Typical uses of wikis include _____. Select all that apply. A. sharing research B. company knowledge base C. virtual workspaces D. online banking

A;B;C

Default folders common to email software include _____. Select all that apply. A. Trash B. Inbox C. Bookmarks D. Archive

A;B;D

To be successful in professional messaging, you should _____. Select all that apply. A. share articles about the latest industry trends B. post status updates of your weekend plans C. connect with current and former colleagues D. upload photos and media clips from a conference you organized

A;C;D

Users can obtain an email address through a(n) _____. Select all that apply. A. Internet service provider B. computer C. postal service D. webmail service

A;D

A(n) _____ defines who can access a network or device, when they can access it, and what actions they can take.

ACCESS CONTROL

Sideloading is the act of installing _______.

APPS FROM OTHER SOFTWARE

A firewall monitors network traffic and allows only _______.

AUTHORIZED ACCESS

A(n) __ defines who can access a network or device, when they can access it, and what actions they can take.

Access control

a small app or add-on that can be downloaded from a website along with a webpage and is executed by IE to enhance the webpage

ActiveX control

True

Agile development guidelines emphasize adaptation of goals and continuous improvement of the software or app. (T/F)

Common blog software features include _____. Select all that apply. A. the ability to add photos B. labeling or tagging of posts C. social media sharing tools D. theme or template chooser

All of them

The problem with a hierarchical database is that if one parent node is deleted, what then happens?

All the subordinate child nodes are also deleted

Company Database

Also called shared database. Stored on a mainframe, users throughout the company have access to the database through their personal computers linked by a network

bug

An error in software code is often called a ____________.

Speech recognition refers to a computer's ability to record and edit human speech.

False

"A(n) ________ is a group of related characters. A) Record B) Field C) Entity D) Attribute"

Field

False

File processing systems require more memory and processing power than databases. (T/F)

Most major corporations today use what type special hardware and software to control access to their internal networks?

Firewalls

A database administrator (DBA) may perform which roles? Select all that apply.

Follows database security protocols, controls user access to the database, defines database structure, manages day-to-day operations of a database

Common Data Item

In a relational database, all related tables must have a common data item or key field enabling information stored in one table to be linked with information stored in another

D

In a script, what does the following line of code do? google.script.run.getDriveUsed(); A. It loads the Google webpage. B. It runs a script named google. C. It creates a script named getDriveUsed. D. It runs a function named getDriveUsed(). E. It sends the message "getDriveUsed" to Google.

rollforward

In a(n) ______, the DBMS uses the log to reenter changes made since the last save or backup.

failure

In case something goes wrong during processing, you can include a __________ handler in a webpage script.

Describe the "sharing" advantage to having a database.

In organizations, information from one department can be readily shared with others

table

In some database programs, a data file is referred to as a(n) ______.

A mobile app is a desktop app that you open on a mobile device.

No

A padlock icon in the address bar indicates the current website is unsafe.

No

A search site is the same thing as a search engine.

No

A specialty search engine searches only websites that require a subscription.

No

A standard account gives you full access to add other accounts on the operating system.

No

A web app can be downloaded through a device's app store.

No

A web app is an app that you access instead of a web browser.

No

All recipients are able to see the Bcc line of an email message.

No

All recipients are able to see the Bcc line of an email message. Yes No

No

B2B e-commerce relies increasingly on in-person sales calls to businesses.

No

Cellular networks send and receive data via an Internet service provider (ISP).

No

Clicking the Save button always saves a file to the hard drive.

No

Encryption is an effective replacement for a firewall.

No

If you have a question during a webinar, you should unmute yourself and interrupt the presenter before he/she moves on to another topic.

No

If you have a question during a webinar, you should unmute yourself and interrupt the presenter before he/she moves on to another topic. Yes No

No

If you review products on your blog, you shouldn't tell readers if you're being compensated by the manufacturer. Yes No

No

In order to support file sharing, your PC must run a network operating system.

No

Microblogs are for personal use only and cannot be utilized by corporations or institutions. Yes No

No

Most social networks serve only one purpose or one type of user.

No

Most social networks serve only one purpose or one type of user. Yes No

No

Moving a folder makes a copy of the folder and places it in another location.

No

Navigating folders involves deleting and moving them.

No

Once you have added a friend or follower on a personal social network, you shouldn't remove them.

No

Once you have added a friend or follower on a personal social network, you shouldn't remove them. Yes No

No

Online fraud does not affect your credit score.

No

Only people who join an online community are part of a social network.

No

Only people who join an online community are part of a social network. Yes No

No

Random access memory is a permanent storage location.

No

Synchronous online classes allow students to participate on their own schedule.

No

Teleconferencing enables hundreds of participants to read and respond to posts over a period of months or years.

No

Teleconferencing enables hundreds of participants to read and respond to posts over a period of months or years. Yes No

No

To exchange messages on a social network, you must use a dedicated texting app.

No

To exchange messages on a social network, you must use a dedicated texting app. Yes No

No

To open a saved file, you must first open the app used to create the file.

No

Video-sharing sites offer exclusively free content.

No

Parent Node

Node one level above the node being considered in a hierarchical database or network. Each entry has one parent node, although a parent may have several child nodes (also called one-to-many relationship)

"These databases store not only data but also instructions to manipulate the data. A) Hierarchical B) Network C) Object-Oriented D) Multidimensional"

Object-Oriented

Which database model organizes data using classes, objects, attributes, and methods?

Object-Oriented Database

Retweet

Occurs when someone on Twitter sees your message and decides to re-share it with his or her followers. A retweet button allows them to quickly resend the message with attribution to the original sharer's name.

Forum

Often uses a monitor to approve messages before they are posted for others to read

The most significant limitation to a hierarchical database is the rigid structure:

One parent only per child, and no relationships or connections between the child nodes themselves

instant messaging

One-on-one real time messaging

What is another name for Real-Time Processing?

Online Processing

Which of these is an ergonomic guideline to technology use?

Proper physical alignment by using the right chair and aids.

Data Manipulation Subsystem

Provides tools for maintaining and analyzing data

Application Generation Subsystem

Provides tools to create data entry forms and specialized programming languages that interface or work with common languages

Business Directories

Providing addresses, financial and marketing information, products, and trade and brand names

Paperless society

Providing and storing information electronically instead of on a piece of paper are characteristics of a_________?

Text Databases

Providing articles from business publications, press releases, reviews on companies and products, and so on

What is Quad Phase-Shift Keying?

QPSK (4-PSK) is a from of angle-modulation, four output phases are possible for a single carrier frequency.

blog

Short name for a web log; an online journal that typically includes the author's personal profile and entries, and may also include photos and videos

Common Bluetooth device problems include which of the following? Select all that apply.

Signal interference, Low battery, and pairing issues.

wiki

Simple web pages that can be edited by other users.

Refurbisher

So many repairs computer equipment so it can be sold and distributed to others is called______?

The default value of the security level in IE is Medium-high.

True

TCP/IP

Network protocol that defines how to route data across the network

Hashtag

A tag used on a variety of social networks as a way to annotate a message; a word or phrase preceded by a "#" . Used to categorize information and make it easily searchable for users.

viral

A term used to describe an instance in which a piece of content -- YouTube video, blog article, photo, etc. -- achieves noteworthy awareness. Viral distribution relies heavily on word of mouth and the frequent sharing of one particular piece of content all over the internet.

What are the two most popular web server applications?

Apache IIS

"In this subsystem, a user can create data entry forms. A) Data Administration B) DBMS Engine C) Data Definition D) Application Generation"

Application Generation

ideloading is the act of installing __.

Apps from somewhere other than your device's app store

tagging

Assignment of keywords to describe content (such as photos, videos, blog posts, or websites); often used in social bookmarking to help users find relevant content.

"A data field that represents a description or characteristic of some entity. A) Character B) Attribute C) Record D) Entity"

Attribute

"In the object-oriented database model, this term is the equivalent to a field in a relational model. A) Entity B) Class C) Method D) Attribute"

Attribute

Vampire devices

Computers in home electronics that draw power even when they are turned off are called______?

"Which of the following is an advantage of using multidimensional databases? A) Smaller Hard Disk Usage B) Network Ability C) Simpler Relationships D) Conceptualization"

Conceptualization

False

Continuous backup is inexpensive because the data is constantly being backed up. (T/F)

assembler

Converts assembly code into machine code

logical

Detailed analysis sometimes is called ______ design.

Read the terms and privacy statements

Determine how a website uses your browsing history

Processing Rights

Determining which people have access to what kinds of data in the database

"The data ________ or schema contains a description of the structure of data in the database. A) Attribute B) Generation C) Entity D) Dictionary"

Dictionary

Podcast

Digital audio files for users to download and play back later; often offered as a syndicated feed that users can subscribe to via RSS or iTunes

What is Digital Communications?

Digital communications is the transfer of information in digital form

A disk utility is a tool for __.

Improving performance

extensible

In XML, ___________ means it accommodates new tags, even user-defined ones.

One-to-Many Relationship

In a hierarchical database, each entry has one parent node, and a parent may have several child nodes

Many-to-Many Relationship

In a network database, each child node may have more than one parent node and vice versa

a method to control access to a folder or file and can apply to local users and network users

NTFS permissions

TRUE or FALSE: The logical arrangement of data in a database is called the database model.

TRUE

TRUE or FALSE: The logical view of data focuses on meanings and content of the data.

TRUE

"A(n) ________ is a collection of related records. A) Entity B) Field C) Table D) Attribute"

Table

All database software includes features for storing data in a __.

Table

size

The field ______ defines the maximum number of characters a field can contain.

List the components of data organization from smallest (simpilest) to largest (most complex).

"1) Character 2) Field 3) Record 4) Table 5) Database"

What are the two significant advantages that a multidimensional database has over a relational database?

"1) Conceptualization 2) Processing speed"

List the five basic DBMS subsystems.

"1) DBMS engine 2) Data definition 3) Data manipulation 4) Application generation 5) Data administration"

What are the five parts or subsystems of a DBMS software?

"1) DBMS engine 2) Data definition 3) Data manipulation 4) Application generation 5) Data administration"

Data is recorded as ___1___ that are typically grouped together into ___2___ that represent characters using a coding scheme such as ___3___ .

"1) Digital bits 2) Bytes 3) Unicode"

What are the five database models?

"1) Hierarchical 2) Network 3) Relational 4) Multidimensional 5) Object-oriented"

What are the four types od databases?

"1) Individual 2) Company 3) Distributed 4) Commercial"

What are some examples of commercial databases?

"1) ProQuest Dialog—offers business information, as well as technical and scientific information. 2) Dow Jones Factiva—provides world news and information on business, investments, and stocks. 3) LexisNexis—offers news and information on legal news, public records, and business issues."

What is DBMS?

"Database Management System ~ A special software required to create, modify, and gain access to a database"

program editor

Word-processing interface that programmers use to write code

To which group does Windows give access to folders that you create which are not part of your user profile?

Authenticated Users

Vlogs

Authors of ___________ manily post video clips

True

A consistency check tests the data in two or more associated fields to ensure that the relationship is logical and that the data is in the correct format. (T/F)

dictionary

A data ______ contains data about each file in the database and each field in those files.

TRUE or FALSE: Querying the database and generating reports is assisted by the application generation subsystem.

"FALSE: Analysis tools support viewing all or selected parts of the data, querying the database, and generating reports. Specific tools include Query-by-Example and a specialized programming language called Structured Query Language (SQL)"

TRUE or FALSE: Individual databases are the foundation of management information systems.

"FALSE: COMPANY databases are the foundation for management information systems"

TRUE or FALSE: Data consists of only numbers, letters, and symbols.

"FALSE: Data includes - ~ Audio captured, interpreted, and saved using microphones and voice recognition systems ~ Music downloaded from the Internet and saved on smartphones, tablets, and other devices ~ Photographs captured by digital cameras, edited by image editing software, and shared with others over the Internet ~ Video captured by digital video cameras, TV tuner cards, and webcams"

TRUE or FALSE: A hierarchical database uses many-to-many relationships.

"FALSE: ~ A hierarchical database uses ONE-to-many relationship ~ A network database uses many-to-many relationships."

TRUE or FALSE: A record is a collection of related tables.

"FALSE: ~ A record is a collection of related FIELDS ~ A database is an integrated collection of logically related tables"

TRUE or FALSE: In an object-oriented database, attributes are specific instances of a class that can contain both data and instructions to manipulate the data.

"FALSE: ~ OBJECTS are specific instances of a class that can contain both data and instructions to manipulate the data ~ Attributes are the data fields an object possesses"

TRUE or FALSE: In a distributed database, all the data must be physically located in one place.

"FALSE: ~ The data in a company is stored in several locations and is accessible through a variety of communications networks. The database, then, is a distributed database"

RSS Feed

"Really simple syndication" that automatically broadcasts updated content to everyone who subscribes to it; the flow of data to subscribers is called a "feed."

Batch Processing

"~ ""Later"" ~ Data is collected over several hours, days, or even weeks ~ IData is processed all at once as a "batch." ~ Ex: A credit card bill reflects batch processing. During the month, purchases are charged to the card. Each time charged, an electronic copy of the transaction is sent to the card company. At some point in the month, the data processing dept. puts all transactions together and processes them at one time. A single bill is sent totaling the amount owed."

Real-Time Processing

"~ ""Now"" ~ Occurs when data is processed at the same time the transaction occurs ~ Ex.: When one requests funds at an ATM, real-time processing occurs. "

Record

"~ A collection of related fields ~ Represents a collection of attributes that describe an entity ~ Example: The payroll record for an employee consists of the data fields describing the attributes for one employee. These attributes are First Name, Last Name, Employee ID, and Salary."

Table

"~ A collection of related records ~ Example: The Payroll Table would include payroll information (records) for the employees (entities) all together as a whole."

Data Cube

"~ A multidimensional data model. ~ Data can be viewed as a cube with three or more sides consisting of cells. ~ Extends the two-dimensional data model to include additional or multiple dimensions"

Multidimensional Database

"~ A variation and an extension of the relational data model. ~ Data can be viewed as a cube with three or more sides consisting of cells. ~ Each side of the cube is considered a dimension of the data; thus, complex relationships between data can be represented and efficiently analyzed. ~ Sometimes called a data cube and designed for analyzing large groups of records."

Database

"~ An integrated collection of logically related tables. ~Example: The Personnel Database would include all related employee tables, including the Payroll Table and the Benefits Table."

List some kinds of databases that are available to help users with both general and specific business purposes.

"~ Business directories ~ Demographic data ~ Business statistical information ~ Text databases ~ Web databases "

Object-oriented databases organize data by using:

"~ Classes ~ Objects ~ Attributes ~ Methods"

Data Dictionary or Schema

"~ Contains a description of the structure of data in the database. ~ For a particular item of data, it defines the names used for a particular field. ~ It defines the type of data for each field (text, numeric, time, graphic, audio, and video)"

Database Model

"~ DBMS programs are designed to work with data that is logically structured or arranged in a particular way. ~ Defines rules and standards for all data in a database"

Field

"~ Group of related characters ~ The name, ""Brown"" is in the data field for the Last Name of an employee. It consists of the individual letters (characters) that make up the last name. ~ Represents an attribute of some entity "

Database Administrator (DBA)

"~ Highly trained computer specialists that interact with the data administration subsystem. ~ Additional duties include determining processing rights"

Data Maintenance

"~ Maintaining data ~ Involves adding new data, deleting old data, and editing existing data"

What are some of the privacy concerns with databases?

"~ May be used for the wrong purposes ~ Illegal use of data ~ Unauthorized users gaining/granting access to a database"

What components do information systems consist of?

"~ People ~ Procedures ~ Software ~ Hardware ~ Data ~ Internet"

DBMS Engine

"~ Provides a bridge between the logical view of the data and the physical view of the data. ~ When users request data (logical perspective), the DBMS engine handles the details of actually locating the data (physical perspective)"

What are four advantages to having databases?

"~ Sharing ~ Security ~ Less data redundancy ~ Data integrity"

What are the advantages of having databases?

"~ Sharing ~ Security ~ Less data redundancy ~ Data integrity"

What are the 4 Digital Modulation?

-ASK (amplitude shift keying): The amplitude of the carrier is varied proportional to the information signal. -FSK (frequency shift keying): The frequency of the carrier is varied proportional to the information signal. -PSK (phase shift keying): The phase of the carrier is varied proportional to the information signal. -QSK (quadrature shift keying): The amplitude and phase of the carrier is varied proportional to the information signal.

Disadvantages of Digital Communication?

-Considerable bandwidth size is required by a digital signal. -Digital communication circuits are usually more complex than analog circuits.

What is Traditional PCM?

-In traditional PCM, the analog signal is sampled and converted into a sequence of parallel binary words by an A/D converter. -The parallel binary output word is converted into a serial signal by a shift register.

What are the Benefits of Digital Communication??

-Noise Immunity: Digital signals, which are usually binary, are more immune to noise than analog signals. -Error Detection and Correction and security coding: With digital communication, transmission errors can usually be detected and corrected. -Compatibility with Time-Division Multiplexing: Digital data communication is adaptable to time division multiplexing schemes. Multiplexing is the process of transmitting two or more signals simultaneously on a single channel. -Digital ICs: Digital ICs are smaller and easier to make than linear ICs, so therefore can be more complex and provide greater processing capability. -Digital Signal Processing (DSP): DSP is the processing of analog signals by digital methods. This involves converting an analog signal to digital and then processing with a fast digital computer. Processing means filtering, equalization, phase shifting, mixing, and other traditionally analog methods.

What are advantages of Digital Transmission?

-The primary advantage of digital transmission over analog transmission is noise immunity. -Digital signals are inherently less susceptible than analog signals to interference caused by noise because with digital signals it is not necessary to evaluate the precise amplitude, frequency,or phase to ascertain its logic condition. -Digital signals are also better suited than analog signals for processing and combining using multiplexing. -It is much simpler to store digital signals than analog signals, and the transmission rate of digital signals can be easily changed to adapt to different environments and to interface with different types of equipment.

What are the disadvantages of Digital Transmission?

-The transmission of digitally encoded analog signals requires significantly more bandwidth than simply transmitting the original analog signal. -Bandwidth is one of the most important aspects of any communications system because it is costly and limited. -Also, analog signals must be converted to digital pulses prior to transmission and converted back to their original analog form at the receiver, thus necessitating additional encoding and decoding circuitry. -In addition, digital transmission requires precise time synchronization between the clocks in the transmitters and receivers. Finally, digital transmission systems are incompatible with older analog transmission systems.

What causes Intersymbol interference?

-Timing inaccuracies: particularly in the receiver, the timing (clocking information) is derived from the received signal. If the signal is contaminated by noise, inaccurate sample timing can occur. -Insufficient bandwidth: As the bandwidth of the channel is reduced, the intersymbol interference is more likely to occur. -Amplitude distortion: If the channel characteristics depart from what is expected, the peaks of the pulse are reduced. -Phase distortion: phase distortion occurs when the different frequency components of the pulse propagate at different rates thru the channel.

Profile

. A personalized page that an individual creates on a social network site; typically provides space for a photo, contact information, and a variety of other personal details.

What are the four basic forms of pulse modulation?

1. Pulse-amplitude modulation (PAM) 2. Pulse-width modulation (PWM) 3. Pulse-position modulation (PPM) 4. Pulse-code modulation (PCM).

What is the relationship between dynamic range and a number of bits in PCM code?

2^n=DR+1 To solve for n -> n = log(DR+1)/log(2)

What port is utilized by the Remote Desktop service?

3389

Which of the following most likely indicates an app update?

4.3-4.4

The form of communication that does not require participants to be online at the same time is called _______. A. asynchronous B. asynchronies C. asynchronicity D. asymptotic

A

What type of social media site is best suited for posting a how-to video series? A. media sharing B. file sharing C. blogging D. virtual social worlds

A

Relation

A table in a relational database in which data elements are stored in rows and columns

True

A DBMS uses the data dictionary to perform validation checks. (T/F)

Boolean

A Yes/No data type also is called ______.

composite

A ________ consists on multiple fields.

compiler

A ____________ translates source code written in high-level languages into machine code that a processor can read.

False

A back end is a program that generally has a more user-friendly interface than the DBMS. (T/F)

Email server

A computer that routes email messages through that work

News Feed

A feed full of news. On Facebook, the News Feed is the homepage of users' accounts where they can see all the latest updates from their friends. The news feed on Twitter is called Timeline.

Object-Oriented Database

A more flexible type of database that stores data as well as instructions to manipulate data and is able to handle unstructured data such as photographs, audio, and video

Child Nodes

A node one level below the node being considered in a hierarchical database or network

Pinterest

A photo sharing social network that provides users with a platform for uploading, saving, and categorizing "pins" through collections called "boards." Boards are typically organized by theme, such as: Food & Drink, Women's Fashion, Gardening, etc. Users have the ability to "pin" and "repin" content that they like to their respective boards.

Twitter

A popular social networking service that facilitates real-time personal "status updates" through short broadcasts (up to 140 characters) to other subscribers. Users connect with each other by "following" or having "followers." See microblog.

Structured Query Language (SQL)

A program control language used to create sophisticated database applications for requesting information from a database

False

A query language consists of complex, abbreviated statements that allow users to specify data they want to display, print, store, update, or delete. (T/F)

False

A relational database can store more than two dimensions of data. (T/F)

selfie

A self-portrait that is typically taken using the reverse camera screen on a smartphone or by using a selfie stick (a pole that attaches to your camera). Selfies are commonly shared on social media networks like Instagram, Twitter, and Facebook using the hashtag #selfie.

snapchat

A social app that allows users to send and receive time-sensitive photos and videos known as "snaps," which are hidden from the recipients once the time limit expires (images and videos still remain on the Snapchat server). Users can add text and drawings to their snaps and control the list of recipients in which they send them to.

methodology

A software development _____________ provides a framework for designing, writing, and testing software.

Query-by-Example

A specific tool in database management that shows a blank record and lets you specify the information needed, like the fields and values of the topic you are looking to obtain

The concept of Morals refers to which of the following?

A. A personal sense of right and wrong

What are potential advantages of telecommuting?

A. Ability to balance work and family B. Companies save money on office space D. Flexible work schedule

You type out a few sentences in an MS Word file, and save it on your desktop. How is this data stored in the computer?

A. As a combination of 1s and 0s

Which type of network connects devices attached to or implanted in the body?

A. BAN

Smartphones are designed to include hardware for _______.

A. GPS navigation C. image sensing D. WiFi conectivity

Helga runs a website on which she sells houseplants. She also earns through pay-per-click advertising that allows search engines to show targeted ads on her site. Which of these products are likely to be advertised on her website? Please select all answers that apply. Select all that apply.

A. Gardening gloves B. Terracotta planters C. Garden scissors D. Watering cans

Risks of technology addiction include which of the following?

A. Inability to complete routine tasks. B. Feeling irritated when not online. C. Reliance on dopamine surges from texts and other notifications.

Users can obtain an email address through a(n) _____.

A. Internet service provider D. webmail service

Which of these devices will eventually need to be recycled?

A. LCD monitor B. smartphone C. television D. laptop

You can place file and app icons on the desktop in which of the following operating systems?

A. Microsoft Windows B. macOS C. Linux

Which of these is an ergonomic guideline to technology use?

A. Proper physical alignment by using the right chair and aids.

Hardware specifications include which of the following?

A. RAM D. CPU

A digital wellness plan includes which of the following?

A. Self-assessment B. Support and accountability D. Creating action items

In which of these ways are a mobile version and a desktop version of a successful app likely to be different?

A. The mobile version presents content more concisely than the desktop version. B. The mobile version provides a touch-based user interface as opposed to the desktop version. C. The mobile version displays the most relevant information first, as opposed to the desktop version.

Default folders common to email software include _____.

A. Trash B. Inbox D. Archive

A mobile operating system is optimized for ____.

A. a touch screen B. fast file transfer D. WiFi connectivity

Some advantages of web app platforms include _______.

A. ability to get started immediately on a task B. interface is often similar to native apps you already use C. online/cloud storage

A(n) _____ defines who can access a network or device, when they can access it, and what actions they can take.

A. access control

Cloud storage is ______.

A. an Internet service that provides remote data storage B. a safe and easy backup option for many consumers D. good for sharing links to large files

The form of communication that does not require participants to be online at the same time is called _______.

A. asynchronous

Which of the following are characteristics of an effective presentation?

A. contains one idea per slide B. tells a story

Audio playback software allows you to do which of the following?

A. create playlists C. purchase new music D. stream music

Places you can recycle electronics include _____.

A. device manufacturers B. community recycling centers D. some hardware and electronics stores

File compression is useful for _____.

A. emailing a large file C. creating an archive of older documents D. saving storage space on a drive

Benefits of donating computer equipment include _____.

A. extending the useful life of the device B. helping someone who can't afford a new device C. keeping e-waste out of landfills D. avoiding having the device waste space in your home/office

A database administrator (DBA) may perform which roles? Select all that apply.

A. follows database security protocols B. controls user access to the database C. defines database structure D. manages day-to-day operations of a database

What is consumer-to-consumer e-commerce?

A. individuals selling to individuals online

Which of the following are signs of excessive Internet use?

A. irritability when offline B. sleep deprivation

Address spoofing makes an address appear legitimate by masking ______.

A. its true destination

What type of social media site is best suited for posting a how-to video series?

A. media sharing

Social Bookmarking

An increasingly popular way to locate, classify, and rank resources through shared lists of user-created Internet bookmarks. Users store lists of personally interesting Internet resources, which can be made publicly accessible; resources can be classified with informally assigned user-defined keywords (or tags). Examples are Delicious and Diigo.

social network

An online community where individuals create a personal profile and search for, and stay connected to, friends. Examples are Facebook and MySpace.

Flickr

An online photo-sharing network where users create a short personal profile, post photos, and make comments; they can also create groups (for events or organizations), invite friends, organize photo albums, and allow group members to post photos. Photos can be tagged, which allows others to find photos based on the content

delicious

An online service for saving your Internet bookmarks, tagging them, sharing with others, and seeing what others are bookmarking.

Facebook

An online social network that began exclusively on college campuses and is now used extensively by the general public. Individual users create a personal profile, invite friends to view it, and use various features to communicate, form groups, play games, support causes, and more. Facebook uses one profile template, which creates a uniform, clean look across the network of users.

Processing speed

Analyzing and querying a large multidimensional database can be much faster. For example, a query requiring just a few seconds on a multidimensional database could take minutes or hours to perform on a relational database.

When attempting to access a remote computer on which your user name and password do not exist, what user group will you be placed in?

Anonymous users

What is a primary key?

Another name for a key field

Describe how geotagging is used in social networking. A. It assesses the quality of a connection to a network server. B. It assigns a location to a posted image or video. C. It allows a user to enter certain sections of a social network. D. It analyzes usage statistics based on login locations.

B

Digital communication methods transfer data in _____________ format. A. analog B. binary C. email D. synchronous

B

Which of the following most likely indicates an app update?

B. 4.3 to 4.4

How are desktop and mobile operating systems similar?

B. Both feature a graphical user interface (GUI).

Which element of digital citizenship emphasizes knowledge of copyright protection and intellectual property?

B. Digital law

Describe how geotagging is used in social networking.

B. It assigns a location to a posted image or video.

Overheating caused by direct sunlight can damage the _____.

B. LCD screen C. processor D. hard drive

Common features of video conference services include _____.

B. ability to exchange files C. screen sharing D. collaborative whiteboards

Photo-editing apps let you do which of the following?

B. add text C. remove blemishes D. crop

A video doorbell can assist you by _____.

B. alerting your phone when someone approaches the door D. allowing you to talk to a visitor even if you're not home

Digital communication methods transfer data in _____________ format.

B. binary

Speech recognition does which of the following to understand your meaning?

B. considers context D. analyzes phonemes

Uber's automated commercial trucks require a human driver to______.

B. handle off-highway driving

A sponsored link is defined as a _____.

B. link from an advertiser to a product or service related to the search

Online politeness involves _____.

B. matching the form of a communication to the content C. considering the future life of an online interaction D. respect and consideration

Which of the following are examples of pointing devices?

B. mouse C. touchpad

A computer typically connects to a router via a _______.

B. network interface card

Each computer or device on a network is called a(n) _____.

B. node

A switch sends data ______.

B. only to the intended device

Open websites typically include ____.

B. personal websites C. commercial sites

A plug-in enables a browser to _____.

B. play or display certain multimedia files

Robotics is the development and study of _____.

B. programmable machines

Elements that have little or no effect on search results include ____.

B. stop words D. capital letters

The term "network architecture" refers to _____.

B. the structural configuration of a network

Modern processors often have ____ levels of cache.

B. three

Natural language processing is AI that ______.

B. understands human languages

The purpose of biometric input is to _____.

B. verify identification and authentication

On-demand media is media that is available _____.

B. whenever a user chooses

a group that can back up and restore any files on a Windows system regardless of access permissions to these files

Backup Operators

A small notification that displays only a number on an app icon is called a __.

Badge

"A monthly bank credit card bill is the result of ________ processing. A) Real-Time B) Group C) Consignment D) Batch"

Batch

"Users of a(n) ________ database have access through their personal computers linked to local or wide area networks. A) Commercial B) Individual C) Company D) Distributed"

Company

"In ________, data from transactions are collected over time and then processed all at once. A) Batch Processing B) Group Processing C) Real-Time Processing D) Consignment Processing"

Batch Processing

What are two different methods used to handle common record-keeping activities such as payroll and sales orders for data to be processed?

Batch Processing and Real-Time Processing

What is baud rate?

Baud, refers to the rate of change of a signal on the transmission medium after encoding and modulation have occurred. Baud rate refers to the number of signal or symbol changes that occur per second. Baud is a unit of transmission rate

Asynchronous

Because the blogger doesn't need to be online at the same time that readers are a blog is considered ___________ communications

What is bit rate?

Bit rate refers to the rate of change of a digital information signal, which is usually binary. Number of data bits (that's 0's and 1's) transmitted in one second. For example, 2400 bits per second (bps) means 2400 zeros or ones can be transmitted in one second.

How are desktop and mobile operating systems similar?

Both feature a graphical user interface (GUI).

Which blog statement is an example of a claim?

Budgeting is an important skill for teenagers to develop and practice before leaving home.

What type of database is a common operational or commonly used files shared in an organization?

Company Database

Email address

Components include a username ID the "@" symbol and the name of the email provider

SMS technically restricts the length of text messages to ____ alphanumeric characters. A. 140 B. 150 C. 160 D. 180

C

Which of the following protocols syncs messages across multiple devices? A. SMTP B. POP C. IMAP D. HTTP

C

SMS technically restricts the length of text messages to ____ alphanumeric characters.

C. 160

Which of these apps would help a visually impaired person with a visual disability the most?

C. A screen reader app

__ blends digital elements with the physical world around you.

C. Augmented reality

_____ blends digital elements with the physical world around you.

C. Augmented reality

Browser extensions are made using _______.

C. HTML, CSS, and Javascript

Which of the following protocols syncs messages across multiple devices?

C. IMAP

The short-range two-way communication technology behind contactless payments is called ____.

C. Near Field Communication (NFC)

_______ recognition converts scanned documents into editable text.

C. Optical character

To draw a perfect square with the rectangle tool, hold the _______ key.

C. SHIFT

________ allows the OS to manage multiple print jobs.

C. Spooling

Which of these is not a malware and not harmful to your computer?

C. Utility software

_____ graphics are mathematical instructions for creating lines, curves, and shapes.

C. Vector

_____ analysis shows how different variables affect an outcome.

C. What-if

Sideloading is the act of installing _______.

C. apps from somewhere other than your device's app store

A cellular standard is a set of technical specifications for one type of _______.

C. cellular transmissions

Some software lets you choose between standard and _____ installation.

C. custom

Malware _______ are delivery methods that take advantage of security flaws.

C. exploits

The root directory is the main list of _______.

C. files and folders on the drive

Solid state hard drives are a type of _________ memory.

C. flash

What are the divisions of a company often called?

C. functional units

A disk utility is a tool for _____.

C. improving performance

What is the act of posting personal, eyewitness accounts of events as they occur called?

C. live blogging

LinkedIn is known for helping you _______.

C. maintain a professional network B. post your work history, skills, and achievements

Which of the following are the primary advantages of wired networks over wireless networks?

C. speed of data transfer D. security

The main categories of software are _______.

C. system B. application D. development

Net neutrality is the concept that one website has ______.

C. the same value or priority as any other website

A self-distributing program that seeks out security vulnerabilities is called a(n) ____.

C. worm

In Windows, you can select multiple files that are not listed sequentially by holding the __ key while clicking with the mouse.

CTRL

In Windows, you can select multiple files that are not listed sequentially by holding the ______ key while clicking with the mouse.

CTRL

True

Census records, stock values, and corporate sales data is structured. (T/F)

"The most basic logical element of data is a ________. A) Bit B) Word C) Binary D) Character"

Character

Embed

Click Share and then click ________to copy the code needed to include a YouTube video on a webpage.

IDE

Collection of software development tools

"LexisNexis is an example of a(n) ________ database. A) Individual B) Commercial C) Distributed D) Company"

Commercial

"These types of databases are also called information utilities or data banks. A) Distributed B) Individual C) Shared D) Commercial"

Commercial

What type of database has information utilities or data banks available to users on a wide range of topics?

Commercial Database

"Access to these databases is offered to the public or selected outside individuals, for a fee. A) Data Warehouses B) Commercial Databases C) Company Databases D) Distributed Databases"

Commercial Databases

Tables can be related or connected to other tables by:

Common key fields

Protocol

Communications standard that specifies the method and speed that device is used to transmit data

"The combined information presented on this type of database can be used to change the whole merchandising strategy of a store. A) Commercial B) Individual C) Company D) Distributed"

Company

Web Databases

Covering a wide range of topics, including all of those previously mentioned. As mentioned earlier, web search sites like Google maintain extensive databases of available Internet content.

Financial fraud

Crime usually committed by identity thieves

Which of the following is an exception to why it is a good idea to follow netiquette? A. So that we do not hurt a friend or a coworker. B. So that we do not harm a friend or a coworker on a personal or professional level. C. So that we do not waste other people's time. D. So that we do not present objective analyses of current issues online.

D

_______ technology is a feature that allows one device to identify the status of another. A. Participation B. Proximity C. Present D. Presence

D

Which of the following has the function of directing that data intended to reach a specific location along the right path?

D. A router

When using a Windows Internet browser, pressing _____ reloads a page.

D. F5

_______ technology is a feature that allows one device to identify the status of another.

D. Presence

Which of the following is an exception to why it is a good idea to follow netiquette?

D. So that we do not present objective analyses of current issues online.

A search operator is a _____.

D. character, word, or symbol you can enter to narrow a search

According to the EPA, the fastest-growing part of the local waste stream is _____.

D. electronic waste

CRT monitors are considered dangerous due to the amount of _____ they contain

D. lead

An application programmed to run on a specific platform is called a ____.

D. native app

Cookies that remain on your device indefinitely are called ______.

D. persistent

Which of the following is an example of B2C e-commerce?

D. purchasing items online with a store credit card

All database software includes features for storing data in a _____.

D. table

"This subsystem defines the logical structure of the database by using a data dictionary or schema. A) Data Manipulation B) Application Generation C) Data Administration D) Data Definition"

Data Definition

"The analysis tools associated with the ________ subsystem include query-by-example and structured query languages (SQL). A) Application Generation B) Data Manipulation C) Attribute Analysis D) Data Administration"

Data Manipulation

"Information collected by an organization from a variety of external and internal databases is stored in this special type of database. A) Data Warehouse B) Commercial Database C) Company Database D) Company Warehouse"

Data Warehouse

"________ ensures that there aren't multiple sources of the same data. A) Security B) Data integrity C) Reliability D) Sharing"

Data integrity

Describe the structure and functionality of a hierarchical database.

Database in which fields or records are structured in nodes. Organized in the shape of a pyramid, and each node is linked directly to the nodes beneath it. Also called one-to-many relationship.

Hierarchical Database

Database in which fields or records are structured in nodes. Organized in the shape of a pyramid, and each node is linked directly to the nodes beneath it. Also called one-to-many relationship.

True

Database software is another term for a DBMS. (T/F)

Distributed Database

Database that can be made accessible through a variety of communications networks, which allow portions of the database to be located in different places

Network Database

Database with a hierarchical arrangement of nodes, except that each child node may have more than one parent node. Also called many-to-many relationship.

Data Definition Subsystem

Defines the logical structure of the database by using a data dictionary or schema

Attribute

Description or characteristic

"If all the data in a database is not physically located in one place, it would be a(n) ________ database. A) Individual B) Web C) Commercial D) Distributed"

Distributed

"In a(n) ________ database, not all the data in a database is physically located in one place. A) Distributed B) Commercial C) Individual D) Company"

Distributed

What type of database is spread geographically and accessed using database server?

Distributed Database

Implementation

During which phase of system development would you develop any necessary programs and apps?

Where are individual databases stored?

Either on the user's hard-disk drive or on a LAN file server

Which blog statement is an example of a claim?

Elbow Lake is a valuable natural resource that needs protection.

Email message

Electronic document transmitted on a computer network

File compression is useful for __. Select all that apply.

Emailing a large file. Creating an archive of older documents. Saving storage space on a drive.

For most employee databases, what is a key field?

Employee ID number

A virtual machine is defined as a(n) __.

Emulation of a computer system

What is Energy per bit-to-noise power density ratio

Energy per bit-to-noise power density ratio is used to compare digital modulation systems that use different bit rates (transmission times), modulation schemes (FSK,PSK,QAM) or encoding techniques (M-ary). 𝐸𝑏/𝑁0 (is a kind of SNR)

Commercial Database

Enormous database an organization develops to cover certain particular subjects. Access to this type of database is usually offered for a fee or subscription. Also known as data bank and informational utility.

Wiki

Everyone in your group can access and edit it collaborative website Know as _________

debugger

Examines software code line by line to identify errors

credit reporting

Experian, Equifax, and Transunion are all types of ______ companies.

What is an Eye Pattern?

Eye pattern is a convenient technique to determine the effects of the degradation introduced in the pulse as it travel thru the channel.

A padlock icon in the address bar indicates the current website is unsafe.

FALSE

False

FIP addresses concerns regarding security of information protocols. (T/F)

Data

Facts or observations about people, places, things, and events.

Developing accessible online content reduces digital inclusion.

False

On the IE General tab you can block cookies.

False

Text messaging

Form of communication that is also called SMS for a short message service

Smartphones are designed to include hardware for __. Select all that apply.

GPS navigation, image sensing, WiFi connectivity

Object-Oriented Database Organization: "Classes"

General definitions

In logical view data, how is data categorized?

Groups or categories

User accounts that are issued a temporary user profile that is deleted when the user signs out are members of what group?

Guests group

False

HTML is a programming language. (T/F)

Data Administration Subsystem

Helps to manage the overall database, including maintaining security, providing disaster recovery support, and monitoring the overall performance of database operations

"Each entry in a(n) ________ database has one parent node, with the parent node having several child nodes. A) Relational B) Object-Oriented C) Multidimensional D) Hierarchical"

Hierarchical

"In a(n) ________ database, any action on one element immediately affects the elements related to it. A) Hierarchical B) Multidimensional C) Object-Oriented D) Relational"

Hierarchical

"In this database model, the fields or records are structured in nodes. A) Relational B) Hierarchical C) Multidimensional D) Object-Oriented"

Hierarchical

Which database model has data structured in nodes organized like an upside-down tree; each parent node can have several children; each child node can have only one parent?

Hierarchical Database

When all users on a network require the same access to all resources, what type of network model should you use?

Homegroup

Relational Database

In this structure, there are no access paths down a hierarchy. Rather, the data elements are stored in different tables, each of which consists of rows and columns

"A(n) ________ database is a collection of integrated files primarily used by just one person. A) Company B) Distributed C) Commercial D) Individual"

Individual

"In this type of database, the data and the DBMS are stored either on the user's hard-disk drive or on a LAN file server. A) Company B) Individual C) Commercial D) Web"

Individual

What type of database integrates files used by just one person?

Individual Database

Differentiate between the individual database and the company database.

Individual databases are used by one person and stored on ones personal computer/device. Company databases are stored on central servers and accessed by multiple people

What is Information Capacity?

Information capacity is a measure of how much information can be propagated through a communication system and is a function of the bandwidth and transmission time. It represents the number of independent symbols that can be carried through a system in a given unit of time

Object-Oriented Database Organization: "Methods"

Instructions for retrieving or manipulating attribute values

"If Mr. Smith's bike has been sent to his new address, but the bill to his old one, it can most likely be attributed to a lack of data ________. A) Integrity B) Maintenance C) Redundancy D) Administration"

Integrity

Individual Database

It is a collection of integrated files primarily used by just one person. Typically, the data and the DBMS are under the direct control of the user. They are stored either on the user's hard-disk drive or on a LAN file server

What is Quadrature QAM?

It is a form of digital modulation similar to PSK except the information is contained in both the amplitude and phase of the transmitted carrier.

Address spoofing makes an address appear legitimate by masking __.

Its true destination

Each record in a table has at least one distinctive field, uniquely identifying the record, called the ___1___ .

Key Field

Which of these devices will eventually need to be recycled? Select all that apply.

LCD monitor, smartphone, tv, and laptop.

CRT monitors are considered dangerous due to the amount of __ they contain.

Lead

"This commercial database offers news and information on legal, public records, and business issues. A) CSi B) Proquest Dialog C) Dow Jones Factiva D) Lexisnexis"

Lexisnexis

You can place file and app icons on the desktop in which of the following operating systems? Select all that apply.

Linux, Microsoft Windows, and MacOS

End users and most computer professionals are concerned with what view perspective of data, as they are involved with actually using the data with application programs?

Logical View

Which perspective view of data focuses on the meaning, content, and context of the data?

Logical View

machine, assembly

Low-level programming languages include ________ language and _________ language.

What is M-ary Encoding?

M-ary is a term derived from the word binary. M simply represent a digit that corresponds to the number of conditions, levels or combinations possible for a given number of binary variables.

forms

Many programs today use ______ on a webpage as their front end.

"In a(n) ________ database, a node may be reached through more than one path with the help of pointers. A) Multidimensional B) Object-Oriented C) Network D) Relational"

Network

Which database model is like hierarchical except that each child can have several parents?

Network Database

Microblog

Members of a __________ such as Twitter can post messages of up to 140 characters or links to webpages

"Object-oriented databases organize data using objects, classes, attributes, and ________. A) Characters B) Methods C) Networks D) Entities"

Methods

What is an example of a DBMS designed for personal comoputers?

Microsoft Access

Windows 10 features what new web browser, which is designed to replace Internet Explorer?

Microsoft Edge

"A(n) ________ database, sometimes called a data cube, allows data to be viewed as a cube having three or more sides and consists of cells. A) Multidimensional B) Relational C) Hierarchical D) Object-Oriented"

Multidimensional

Which database model has data stored in data cubes with three or more dimensions?

Multidimensional Database

Conceptualization

Multidimensional databases and data cubes provide users with an intuitive model in which complex data and relationships can be conceptualized.

How many bits in an 8-PSK?

N = 3, M = 8. I, C and Q

The equation for M-ary Encoding in terms of number of bits necessary is?

N = log2 M or 2N=M

What type of permission should you set to control access to files and folders by local and network users?

NTFS on NTFS volumes only

What two applications are an example of a mail server and a mail client application, respectively?

Outlook Exchange

What protocol must be supported by routers in order to utilize Remote Assistance Easy Connect?

PNRP

Entity

Person, place, thing, or object

What is the individual database also called?

Personal Computer Database

Typically, only very specialized computer professionals are concerned with what view perspective of data?

Physical View

Which perspective view of data focuses on the actual format and location of the data?

Physical View

What are the two perspectives to view data?

Physical View and Logical View

"Which view of data deals with how the data is actually formatted and located? A) physical view B) logical view C) information view D) technical view"

Physical view

A plug-in enables a browser to __.

Play or display certain multimedia files

"A network database utilizes these special connections between parent nodes and child nodes that allow multiple paths between records. A) Connectors B) Links C) Strings D) Pointers"

Pointers

"In a network database, a node may be reached through more than one path with the help of ________. A) Strings B) Pointers C) Links D) Connectors"

Pointers

Nodes

Points connected like the branches of an upside-down tree

How. Third party cookie can end up on your computer

Posted add on the website

a group that exists on Windows 8/7/Vista for backwards compatibility purposes with Windows XP

Power Users

"A field that uniquely identifies each record. A) Id B) Primary Key C) Common D) Numeric"

Primary Key

"The duties of a database administrator include determining which people have access to what kinds of data in the database; these are referred to as ________ rights. A) Analysis B) Management C) Processing D) Application"

Processing

2

Processing (CPU)

3

Produces information (output)

"The analysis tools associated with the data manipulation subsystem that support querying databases include ________ and structured query languages (SQL). A) Query-By-Example B) Data Redundancy C) Attribute Analysis D) Data Definition"

Query-By-Example

4

RAM

What NTFS permissions should you assign if the user should be able to create folders and files and open files to read data, but not delete files? (Choose all that apply.)

Read Write

"In ________, data is processed at the same time the transaction occurs. A) Batch Processing B) Group Processing C) Real-Time Processing D) Consignment Processing"

Real-Time Processing

"________ processing is also known as online processing. A) Real-time B) Batch C) Consignment D) Group"

Real-time

"A collection of related fields such as a person's name, address, and age. A) Character B) Record C) Field D) File"

Record

"A(n) ________ represents a collection of attributes that describe an entity. A) Record B) Character C) Attribute D) Entity"

Record

"Having several instances of the same data is called data ________. A) Repetition B) Duplication C) Doubling D) Redundancy"

Redundancy

"The scenario wherein many files about the same person exist across different departments within an organization is called data ________. A) Repetition B) Doubling C) Redundancy D) Duplication"

Redundancy

Draw a Delta Modulation Transmitter

Refer to lecture 6 slide 28

Draw the Delta Modulation Receiver

Refer to lecture 6 slide 32

Draw a QPSK Transmitter

Refer to slide 14 on lecture 4

Draw the QPSK Receiver

Refer to slide 21 on lecture 4

"In the ________ database, data elements are stored in different tables, each of which consists of rows and columns. A) Network B) Hierarchical C) Object-Oriented D) Relational"

Relational

"This type of database is organized into many tables with common data items (key fields) linking the tables to one another. A) Hierarchical B) Multidimensional C) Relational D) Network"

Relational

What database model is most common for personal use?

Relational Database

Which database model has data stored in tables consisting of rows and columns?

Relational Database

Which database models (out of the five) are most popular today?

Relational, Multidimensional, and Object-Oriented

"Which of the following is not an advantage of using a database? A) Security B) Reliability C) Sharing D) Data Integrity"

Reliability

gives a user access to a Windows desktop from anywhere on the Internet

Remote Desktop Connection

code library

Repository of pre-existing software code for common functions

To close a window in Windows 10, you can __. Select all the apply.

Right-click its button on the taskbar, then click close window. Click the Close button in the upper-right corner of the window. Click the Close button in the window's thumbnail on the taskbar.

To draw a perfect square with the rectangle tool, hold the __ key.

SHIFT

"Analysis tools that support viewing all or selected parts of data, querying the database, and generating reports include query-by-example as well as a specialized programming language called ________. A) SQL B) HTML C) XML D) VBA"

SQL

An operating system uses available storage space on a startup drive for _____.

STORING PROGRAMS, APPS, AND REALITY

beta

Software publishers distribute ___________ versions of their software to identify problems before the software is released to the public.

Object-Oriented Database Organization: "Objects"

Specific instances of a class that can contain both data and instructions to manipulate the data

__ allows the OS to manage multiple print jobs.

Spooling

802.11

Standards that wireless fidelity devices use

In a hierarchical database, to find a particular field, you have to:

Start at the top with a parent and trace down the tree to a child

Shred documents and monitor accounts

Steps you can take to protect personal information

5

Storage

TRUE or FALSE: Typically, one of the duties of a database administrator is to interact with the data administration subsystem.

TRUE

In a hierarchical database, the nodes farther down the system are ___1___ to the ones above.

Subordinate

Demographic Data

Such as county and city statistics, current estimates on population and income, employment statistics, census data, etc.

Business Statistical Information

Such as financial information on publicly traded companies, market potential of certain retail stores, and other business data and information

A network interface card sends data between a computer and the network.

TRUE

A spreadsheet app is a type of productivity software.

TRUE

Brownouts can damage components over time.

TRUE

Most application software apps open in a window on the screen.

TRUE

Some tracking devices include an alarm that sounds if the device moves out of range.

TRUE

TRUE or FALSE: A commercial database is generally an enormous database that an organization develops to cover particular subjects.

TRUE

TRUE or FALSE: Data redundancy can occur due to lack of data integrity.

TRUE

TRUE or FALSE: Database tables can be related or connected to other tables by common key fields.

TRUE

TRUE or FALSE: In a network database, a node can be traced down through different branches.

TRUE

TRUE or FALSE: In a network database, nodes may have a many-to-many relationship.

TRUE

TRUE or FALSE: In order to create, modify, and gain access to a database, special software, called the database management system, is required.

TRUE

TRUE or FALSE: Relational database tables require a common data item.

TRUE

TRUE or FALSE: The ATM works on the principle of real-time processing.

TRUE

TRUE or FALSE: The company database may be stored on a central database server and managed by a database administrator.

TRUE

TRUE or FALSE: The database in which data elements are organized using classes, objects, attributes, and methods is called the object-oriented database.

TRUE

WiMAX

Technology also known as the 802.16 standard that computers and devices use to communicate wirelessly across long distances

Wifi

Technology that computers and devices use when communicating via radio waves across a medium distance

Presence

Technology used In IM, which lets one computing device identify the status of another

What is 8-QAM?

The 8-QAM is an M-ary technique were M = 8, the output signal of an 8-QAM is not constant in amplitude.

Blogosphere

The __________ is the World Wide Web collection of blogs

What is coding efficiency?

The coding efficiency is a numerical indication of how efficiently a PCM code is utilized. Is the ratio of the minimum number of bits required to achieve a certain DR to the actual number of bits used. 𝑐𝑜𝑑𝑖𝑛𝑔 𝑒𝑓𝑓𝑖𝑐𝑖𝑒𝑛𝑐𝑦 = (𝑚𝑖𝑛𝑖𝑚𝑢𝑚 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑏𝑖𝑡𝑠 (𝑖𝑛𝑐𝑙𝑑𝑖𝑛𝑔 𝑠𝑖𝑔𝑛 𝑏𝑖𝑡))/ (𝑎𝑐𝑡𝑢𝑎𝑙 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑏𝑖𝑡𝑠 (𝑖𝑛𝑐𝑙𝑑𝑖𝑛𝑔 𝑠𝑖𝑔𝑛 𝑏𝑖𝑡)) 𝑥100

Object-Oriented Database Organization: "Attributes"

The data fields an object possesses

Geotag

The directional coordinates that can be attached to a piece of content online. For example, Instagram users often use geotagging to highlight the location in which their photo was taken.

In which of these ways are a mobile version and a desktop version of a successful app likely to be different? Select all that apply.

The mobile version presents content more concisely than the desktop version. / The mobile version provides a touch-based user interface as opposed to the desktop version. / The mobile version displays the most relevant information first, as opposed to the desktop version.

Character

The most basic logical data element. It is a single letter, number, or special character, such as a punctuation mark, or a symbol, such as $

What is Dynamic Range for PCM?

The number of PCM bits transmitted per samples is determined by several variables (maximum allowable input amplitude, resolution and dynamic range). Dynamic range is the ratio of the largest possible magnitude to the smallest possible magnitude (other than 0V) that can be encoded by the DAC in the receiver. DR = Vmax / Vmin (unitless ratio)

What is Binary Phase shift Keying?

The phase of the carrier is varied proportional to the information signal. For binary PSK, N = 1 and M = 2. One phase represent the logic 1 and the other phase represent the logic 0. As the input changes, the output phase shifts between two angles that are separated by 180 degrees.

True

The program specification package identifies required programs and the relationship among each program, as well as the input, output, and database specifications. (T/F)

handle

The term used to describe someone's @username on Twitter.

C

The three steps in creating a computer program are to identify a problem, develop a solution, and _____________. A. design an algorithm B. select a programming language C. solve the problem D. distribute the software E. describe the problem

What is the most valuable feature of relational databases?

Their simplicity

A small sequence within a process is called a(n) __.

Thread

The____of a poem is the attitude of the text toward the subject and theme.

Tone

A mobile operating system is optimized for __. Select all that apply.

Touch screen, ... file transfer, and wifi connectivity

A submenu is usually identified by a(n) __.

Triangle symbol

Digital equity occurs when people of all socioeconomic levels, locations, physical disabilities, and learning differences have full access to information technology, including all necessary tools, training, and content.

True

If a Windows computer belongs to a domain, all security is managed by the network administrator for the entire network.

True

Which of these is not a malware and not harmful to your computer?

UTILITY SOFTWAE

What are some measures that can be taken to ensure a database's security?

Use firewalls to protect internal networks

Describe the "security" advantage to having a database.

Users are given passwords or access only to the kind of information they need

cyberbullying

Users web technologies to humiliate, torment, or badger an individual

What is Delta Modulation PCM?

Uses a single-bit PCM code to achieve digital transmission of analog signals. With delta modulation only a single bit is transmitted, which simply indicates whether that sample is larger or smaller than the previous sample.

Green computing

Using computers and environmentally responsible ways is called _______?

Which of these is not a malware and not harmful to your computer?

Utility software

__ graphics are mathematical instructions for creating lines, curves, and shapes.

Vector

The purpose of biometric input is to __.

Verify identification and authentication

E

What are the three functions that a computer program performs? A. input, storage, and output B. test, retest, and solve C. read, calculate, and write D. analyze, process, and display E. input, process, and output

__ analysis shows how different variables affect an outcome.

What-if

Data Redundancy

When an organization has multiple files on the same subject or person

True

When an organization uses the database approach, many programs and users share the data in the database. (T/F)

Creative reuse

When people make new objects from computer parts they are practicing for my recycling called__________?

Data Integrity

When there are multiple sources of data, each source may have variations

objects in the database

When you edit a database, what are you actually editing?

Object

Which data type sometimes is called BLOB?

D

Which of the following is an example of a task performed by a server-side script? the following is an example of a task performed by a server-side script? A. playing a video in your browser B. providing a navigation bar for navigating a website C. displaying a message before you submit an online form D. validating the entries in an online form E. presenting an online form to complete

D

Which of the following is an option you can select when embedding a YouTube video on a webpage? A. video length B. whether to show ads C. whether to show the name of the video author D. video size E. video resolution

focus group

Which of the following is another term for a JAD session?

A

Which of the following is not a component of XML? A. menu B. declaration C. elements D. attributes E. tags

True

With the database approach, the data is independent of the programs that access the data. (T/F)

Pointers

Within a network database, pointers are additional connections between parent nodes and child nodes. Thus, a node may be reached through more than one path and can be traced down through different branches

Describe the "less data redundancy" advantage to having a database.

Without a common database, individual departments have to create and maintain their own data, and data redundancy results. Redundant data causes inefficient use of storage space and data maintenance problems.

E

You can think of a database as a _____________________. A. list of data B. spreadsheet file C. set of document tabs D. long word-processing document E. folder of different objects

When mapping a drive, you can type in the path to the shared folder on the host computer. What is the syntax for the path?

\\server\sharedfolder

Validation

______ compares data with a set of rules or values to determine if the data meets certain criteria.

Isolated

______ data is stored in separate files in different departments.

Attachment

______ data type is used for a document or image that is attached to the field, which can be opened in the program that created the document or image.

validity check

___________ determines whether a number is within a specified range.

Which best connects a multimedia element to a blog's purpose?

a caption

The statement "Drivers must avoid texting" is an example of .

a claim

Which multimedia choice would be most effective in persuading blog readers to plant a vegetable garden?

a clip of an interview with a successful teenaged gardener

Central Processing Unit (CPU)

a complex interrogated circuit consisting of millions of electronic parts and is primarily responsible for converting input into meaningful output.

agumented reality

a type of VR that uses an image of an actual place or things that adds digital information to it.

What statement about user accounts and groups is NOT true?

a user account can belong to only one group at a time

Micah would like to include a video clip in a blog post persuading readers to volunteer at the school spring carnival. Which clip would most enhance his post?

a video montage, set to upbeat music, of last year's carnival

Common features of video conference services include __. Select all that apply.

ability to exchange files, screen sharing, collaborative whiteboards

Some advantages of web app platforms include __. Select all that apply.

ability to get started immediately on a task, interface is often similar to native apps you already use, online/cloud storage

1

accepts data(input)

Photo-editing apps let you do which of the following? Select all that apply.

add text, remove blemishes, crop

the folders that are shared by default on a network domain that administrator accounts can access

administrative shares

If it's spring cleaning time at your house, please consider giving me a call!... The purpose of Liam's blog is to

advertise his window washing service.

Hannah created a blog to help readers find and purchase her new album. The main purpose of her blog is to

advertise.

computer

an electronic device, operating under the control of instructions stored in its own memory

webinar

an online seminar or presentation that is hosted by an individual or a company. Most often, the host requires attendees to fill out a form before granting them access to stream the audio and slides. In marketing, webinars are held to educate audiences about a particular topic while opening up the floor for a discussion to occur on social media using the webinar's unique hashtag.

Which of the following is NOT true about Remote Desktop?

by default all users can access Remote Desktop

smallest byte

byte

Structured Query Language (SQL)

consists of complex, abbreviated statements that allow users to specify data they want to display, print, store, update, or delete.

Which of the following are characteristics of an effective presentation? Select all that apply.

contains one idea per slide, tells a story

Audio playback software allows you to do which of the following? Select all that apply.

create playlists, purchase new music, stream music

Places you can recycle electronics include __. Select all that apply.

device manufacturers / community recycling centers / some hardware and electronics stores

What task can't be performed from the IE General tab?

disable file downloads

a console available only in Windows Professional and business editions that is used to control what users can do and how the system can be used

gpedit.msc

Which of the following protocols syncs messages across multiple devices?

imap

permissions assigned by Windows that are attained from a parent object

inherited permissions

Hard Drives

internal (magnetic hard disc drives,solid state drive) external (usb flash drive, optical media)

Which of the following are signs of excessive Internet use? Select all that apply.

irritability when offline / sleep deprivation

direct conversion

is the implementation of the new system and the immediate discontinuance of the old system.

When researching evidence to develop a claim, which are credible sources for a blogger to use? Check all that apply.

libraries encyclopedias major newspapers .gov or .edu websites

What is the act of posting personal, eyewitness accounts of events as they occur called?

live blogging

You can place file and app icons on the desktop in which of the following operating systems?

microsoft os, linux, mac os

What command launches the Remote Desktop client for Windows?

mstsc

A mobile app is a desktop app that you open on a mobile device.

no

Navigating folders involves deleting and moving them.

no

When using Group Policy to configure QoS, what options are available? (Choose all that apply.)

outbound traffic can be throttled the priority is a number from 0 and 63

cookies that remain in your device constant

persistent

Learning to speak a new language is one of the best decisions I ever made! This summer, ... I hope all my friends get inspired to learn a language, too! The purpose of Jackson's blog is to

persuade readers to learn a language.

Cheyenne created a blog to motivate readers to try mountain biking. The main purpose of her blog is to

persuade.

Regarding the use of Group Policy, what statement is NOT accurate?

policies can be applied to a computer

When working with a workgroup, what statement is accurate regarding which folders to use to hold shared data?

private data for each user should be kept in their C:\Users folder

application software

programs that help you perform specific tasks when using your computer or device.

What kind of a computer intercepts requests that a browser makes of a server and can cache received content?

proxy server

Hardware specifications include which of the following?

ram and cpu

operating system

responsible for coordinating the resources and software. manages interaction between hardware and software.

What statement about controlling access to folders and files is accurate?

rights are assigned to accounts

Computer Program

series of instructions that tell a computer how to carry out a processing task.

a method to control access to a shared folder and can be assigned to NTFS or FAT volumes

share permissions

Cloud storage

storing electronic files on the internet instead of a local computer google drive, Microsoft one drive, drop box

The author's purpose is

the primary reason the author wrote the text.

Net neutrality is the concept that one website has ______.

the same value/priority

artificial intelligence

the technology use of logic and prior experience to simulate human intelligence.

virtual reality

the use of computers to simulate a real or imagined environment that appears as a three-dimensional space

What is a valid reason for wanting to configure a proxy server in Internet Explorer?

to connect to secured websites on a corporate network VPN

Most file managers include a way to create a folder through the Save dialog box.

true

Storage device problems can prevent a computer from starting up properly.

true

Web spiders or crawlers search the Internet for new and updated webpages.

true

ncoming rules control which programs and services on the network are allowed to access your device.

true

The best way for a blogger to respond to readers' counter arguments is to .

use evidence in a rebutal

Which of the following are true about NTFS permissions? (Choose all that apply.)

when a subfolder is created, it is assigned the permissions of its parent folder if NTFS permissions conflict locally, the more liberal permission applies

When utilizing both share and NTFS permissions, what statement is inaccurate?

when you copy a file, the file takes on the permissions of the destination folder

On-demand media is media that is available __.

whenever a user chooses

Many productivity web apps support real-time collaboration.

yes

Some assistive devices allow users to input data via Morse code.

yes

biggest byte

zettabyte

Why use Offset PSK?

›Because the change in the Q or the I channel occur at a different time, there is never more than a 90 degrees shift in the output phase. In convectional QPSK, the 00 to 11 input (or 11 to 00) causes a 180 degrees shift of the out put. Therefore an advantage of OQPSK is the limited phase shift that must be imparted during modulation.

What is Companding?

›Companding is the process of compressing and then expanding. ›With companding, the higher amplitudes analog signals are compressed (amplified less than the lower amplitude) prior to transmission and then expanded (amplified more than the lower amplitude signals) in the receiver.

What is Pulse Modulation?

›Pulse modulation is the process of changing a binary pulse signal to represent the information to be transmitted. ›PM consists essentially of sampling analog information signals and then converting those samples into discrete pulses and transporting the pulses from a source to a destination over a physical transmission medium.

What is Probability Error and Bit Error Rate (BER)

›Similar but not the same. ›P(e) is a theoretical (mathematical) expectation of the bit error performance for a given system. ›BER is an empirical (historical) record of a system actual bit error performance. ›A BER is measured and compared with the P(e).

What is Signal-to-quatization noise?

›The PCM coding schemes that we have studied so far consist of linear codes, which means that the magnitude change between any two consecutive codes is the same. ›So the magnitude of their quantification error is also the same. Qe = resolution/2

What is IDLE channel noise?

›When there is no analog input data, the only input to the PAM sampler is the random, thermal noise. ›This noise is called idle channel noise and is converted to a PAM sample just as if it was a signal. In other words, the input noise is quantified by the ADC. Midtread quantisation can fix this


Kaugnay na mga set ng pag-aaral

insurance exam problems to review

View Set

Nursing 202 Immune System disorders - Module D

View Set