Technology in action Final study set

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A ________ check compares the values of data in two or more fields to see whether those values are reasonable.

consistency

Twisted-pair cable

consists of pairs of copper wires twisted around each other and covered by a protective sheath

frame

container that can hold multiple data packets

client/server network

contains servers as well as client computers

Keywords in a programming language that redirect the flow of a program based on a decision are called ________.

control structures

An analog-to-digital converter chip ________.

converts the sound waves from voice into digital signals

Processing performance is affected by the number of processing paths called ________.

cores

Moodle and Blackboard are examples of ________.

course management software

Data in a multidimensional database is organized in a ________ format.

cube

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

cybercrime

Using your computer for non-work activities while you are being paid to do your job is known as ________.

cyberloafing

In a relational database, what is a relationship?

d. A link between tables that defines how the data are related

Which of the following is NOT a typical disadvantage associated with databases?

d. Database information cannot be changed once it is entered.

________ is the process of reducing data redundancy by recording data only once.

d. Normalization

All of the following are examples of network operating systems, EXCEPT ________. a. Windows Server b. Linux c. UNIX d. OS X Mountain Cougar

d. OS X Mountain Cougar

Which of the following is NOT a likely primary key?

d. Street address

Data in a multidimensional database is organized in a ________ format.

d. cube

A database schema is also called a(n) ________.

d. data dictionary

Classification, affinity grouping, and estimation are ________ methods used by managers to make their data more meaningful.

d. data mining

An example of ________ is customer demographic data purchased from third parties or statistics compiled by the federal government.

d. external data

The Siri speech-recognition feature on Apple's iPhone 4s is an example of a ________.

d. natural language processing (NLP) system

A ________ relationship indicates that for each record in a table, there is only a single corresponding record in a related table.

d. one-to-one

The _______ is(are) the group of programs that controls how your computer functions. a. utility programs b. application software c. user interface d. operating system

d. operating system

SQL uses ________ to extract records from a database by using English-like expressions that have variables and operations.

d. relational algebra

A ________ displays a subset of data from a table (or tables) based on the criteria specified.

d. select query

Nontraditional data such as audio clips, video clips, pictures, and very large documents are called ________ data.

d. unstructured

A database schema is also called a(n) ________.

data dictionary

packet

data is broken into small segments

Which of the following is NOT a data source for a data warehouse? A. Internal sources B. External sources C. Data mine D. Clickstream data

data mine

Classification, affinity grouping, and estimation are ________ methods used by managers to make their data more meaningful.

data mining

An Internet connectivity plan is also known as a ________.

data plan

Each of the following is a computer subsystem EXCEPT the:

data subsystem

The ________ is the maximum speed at which data can be transmitted between two nodes on a network.

data transfer rate

The ___ ____ indicates what type of data can be stored in a field.

data type

A ________ is a collection of related data that can be stored, sorted, organized, and queried.

database

A data dictionary is also called a(n) ________.

database schema

An Internet connectivity plan is also known as a ________.

dataplan

A value that automatically appears in a field unless the user enters a different value is called a(n) ______ value

default

route

designed to send information between two networks,

IDE

developmental tool to help programmers write, compile, and test programs

Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS

device driver

Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS.

device driver

Network adapters

devices that perform specific tasks to enable nodes to communicate on a network

A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.

digital signal processor

The OS allows you to organize the contents of your computer in a hierarchical structure of ________.

directories

The unique identification number assigned to your computer when you connect to the Internet is known by all of the following, EXCEPT ________ A. dotted quad B. dotted period C. dotted decimal D. IP address

dotted period

In Windows, a file path starts with a ________.

drive letter

For business networks, which of the following is NOT a main cable type? A. Twisted-pair B. Coaxial C. Duplex D. Fiber-optic

duplex

A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses.

dynamic

media access control

each network adapter has a physical address similar to a serial number on an appliance

Which of the following is NOT an advantage of using networks as compared to a stand-alone computer?

ease of maintenance and administration

With Windows Explorer, you can perform all of the following file management actions EXCEPT:

editing files

All of the following are extra precautions you can take to secure a wireless network, EXCEPT ________. A. change your network name (SSID) B. enable SSID broadcast C. turn on security protocols D. create a passphrase

enable SSID broadcast

Network adapters ________.

enable nodes in a network to communicate with each other

All of the following are part of the machine cycle, EXCEPT ________. A. fetch B. encode C. execute D. store

encode

CD ripping refers to ________.

encoding CDs to MP3 format

A(n) ________ virus runs a program that searches for common data files, compresses them, and makes them unusable.

encryption

Computer-aided design software is used primarily by ________.

engineers to create models

The most likely method a hacker would use to access a computer is ________.

entering through its Internet connection

The description of what a program should do if the input data are invalid is called ________.

error handling

An example of ________ is customer demographic data purchased from third parties or statistics compiled by the federal government.

external data

Which transmission medium transmits data the fastest?

fiber optic cable

Which transmission medium is able to transmit data the fastest?

fiber-optic cable

C:\Documents\Spring 2012\CIS 101\Term Paper\Computer Technology is an example of a ________.

file path

The location of a file is specified by its ________.

file path

A ________ keeps your computer safe by confirming who is trying to access it.

firewall

One way to increase security on a network is by installing a ________.

firewall

When setting up a network, you should set up any computers running the Microsoft Windows 7 operating system ________.

first

Which of the following is NOT a type of electronic database?

flat-file

Which of the following provides a representation of patterns that an algorithm comprises?

flowchart

Referential integrity means that for each value in the ____ _____ field of a table, there is a corresponding value in the primary key of the related table.

foreign key

SQL is an example of a ________-generation language.

fourth

The CPU is connected to the system memory by the ________.

front side bus

local area network (LAN)

generally small group of computers and peripherals linked together over a relatively small geographic area

CPU speed, also called clock speed, is currently measured in ________.

gigahertz

Microsoft Windows and Mac OS use a ________ interface.

graphical user

communications server

handles all communications between the network and other networks, including managing internet connectivity

data collisions

happen when two computers send data at the same time and the sets of data collide somewhere in the media

The purpose of network address translation (NAT) is to ________.

hide user IP address from the Internet

A cyberspace ________ is an attempt to make someone believe something that is untrue.

hoax

Due to the expansion of media files on home computers, ________ options are now being marketed; however, they are not as full featured as their business-world counterparts.

home network server

A ________ topology is created when more than one topology is used to build a network.

hybrid

________ provides high-speed information processing by enabling a new set of instructions to start before the previous set is finished.

hyperthreading

true

if else and For Next are examples of keywords.

unshielded twisted-pair (UTP)

if it does not contain a layer of foil shielding on a twisted-pair cable it is called

When data is changed or modified, failure to update the data in all appropriate places results in data __________.

inconsistency

To make sure your computer performs reliably, you can do all of the following EXCEPT:

increase the front side bus speed

Cascading style sheets have a hierarchy of styles that include all of the following EXCEPT:

independent

A(n) ____ ______ is a software-based solution used to gather and analyze business information.

information system

Network, database, and Web server administrators are generally considered part of the ________ department.

information systems

In object-oriented programming, ________ allows a new class to automatically pick up all the data and methods of an existing class.

inheritance

A typical ________ is made up of one or more network switches to which ISPs connect.

internet exchange point

A special numerical code that prioritizes device requests from the operating systems is called ________.

interrupt handler

A(n) ________ is used exclusively within a corporation or organization.

intranet

A(n) ________ is used exclusively within a corporation.

intranet

Which of the following would be a name of a Microsoft Access file?

inventory.accdb

packet screening

involves having external screening router examining incoming data packets to ensure that originated from or are authorized by valid users on internal network

virtualization

involves using specialized software to make individual physical servers behave as though they are more that one physical device

star topology

is most widely developed client/server network layout today because it offers the most flexibility for a low price

Web-based application software is software that ________.

is stored completely on a Web server instead of your hard drive

When you want to extract data from two or more tables, you use a(n) ________ query

join

When you want to extract data from two or more tables, you use a(n) ________ query.

join

The ________ is responsible for managing the processor and all other components of the computer system, and is an essential part of the operating system.

kernel

Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.

keystroke loggers

An expert system and a natural language processing system are both ________.

knowledge-based systems

ASP

language that builds Web sites with interactive capabilities

XML

language that enables users to define their own tags

VBScript

language that introduces dynamic decision making into Web pages

java

language used to create applets that are delivered over the Web

A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT ________. A. use your debit card information to purchase items illegally B. assume your identity C. steal your logon and passwords for various accounts D. launch a denial of service (DoS) attack on your computer

launch a denial of service (DoS) attack on your computer

Throughput, the actual speed of data transfer that is achieved in a network, is usually ________.

less than or equal to the data transfer rate

Windows 7 introduces the concept of ________, which are folders that gather files from different locations and display the files as if they were all saved in a single folder.

libraries

A peer-to-peer network is an example of ________ administration.

local

A(n) ________ error is caught when the program executes.

logical

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

logical port blocking

A(n) ________ is custom-built miniprogram that allows you to execute a complicated sequence of steps with a single command.

macro

What is the final step of the system development life cycle?

maintenance and evaluation

Running the Disk Defragmenter utility will ________.

make the hard drive work more efficiently

switch

makes decisions, based on the MAC address of the data, as to where the data is to be sent and infracts it to the appropriate network node

print servers

manage all client-requested printing jobs for all printers on a network, which helps clients computer to compete more productive work by releasing them of printing duties

In a multidimensional database, each data cube has a _______ attribute, which is the main type of data that the cube is tracking.

measure

network operating system

meets to be installed on each client computer and server connected to the network to provide the services necessary the them to communicate

A ________ is approximately 1 million bytes.

megabyte

Front side bus speed is measured in ________.

megahertz

The small circuit boards that hold a series of RAM chips are called ________.

memory modules

Data describing other data in a database are called ________

metadata

Which of the following is specialized software made to display Web pages on a cell phone?

microbrowser

When referring to hard drives, access time is measured in ________.

milliseconds

Data staging consists of all of the following steps EXCEPT:

mining of data

Data staging consists of all of the following steps, EXCEPT ________. A. transformation of data B. mining of data C. storage of data in a warehouse D. extraction of data

mining of data

Data staging consists of all of the following steps, EXCEPT ________. extraction of data storage of data in a warehouse transformation of data mining of data

mining of data

A base transceiver station receives a request for cellular service and passes that request to a central location called a ________.

mobile switching center

Which of the following is NOT a benefit of having computers networked?

monitoring for efficiency

The speech-recognition feature of Microsoft Windows is an example of a ________.

natural language processing (NLP) system

A ________ runs a full-featured operating system and weighs less than two pounds.

netbook

A ________ allows multiple users to connect to the Internet through one connection.

network

A(n) ________ is a device connected to a network such as a computer or a game console.

node

Each device connected to a network is called a(n) ________.

node

Flash memory, used by most MP3 players, is a type of ________.

nonvolatile memory

In a database, ________ fields store numbers used to perform calculations.

numeric

In a database, a chart is stored in a(n) ________ field.

object

The type of software that is free and available with few licensing and copyright restrictions is known as ________ software.

open source

The _______ manages the flow of data and information through the computer system by coordinating the hardware, software, user interface processor, and system memory.

operating system

The most essential software in your computer system is the ________.

operating system software

When a business hires a third-party firm to provide services they once offered themselves, it is called ________.

outsourcing

Running the CPU at a faster speed than the manufacturer recommends is called ________.

overclocking

Data are sent through a network on bundles called ________

packets

In the URL http://www.pearsonhighered.com/techinaction, the portion labeled "techinaction" is the ________.

path

Which of the following is the process of sharing files between two or more computers?

peer-to-peer (P2P) sharing

FBI-related scams involve ________.

people pretending to represent official organizations

When malicious code is planted on your computer and alters your browser's ability to find Web addresses it is known as ________.

pharming

Microsoft's ________ enables you to create a 3-D walkthrough of your favorite vacation places.

photosynth

The amount of RAM that is actually on the memory modules in your computer is the ________ memory.

physical

Using a network without the network owner's permission is known as ________.

piggybacking

With regard to computer protection, quarantining is defined as ________.

placing a found virus in a secure area on the hard drive

The combination of operating system and processor in a computer is referred to as a computer's ________.

platform

Individual Internet users enter an ISP through a(n) ________.

point of presence

Which of the following classifications of viruses can change its own code to avoid detection? A. Stealth B. Multipartite C. Polymorphic D. Worm

polymorphic

An iPod is an example of a ________.

portable media player (PMP)

What is the first step of the system development life cycle?

problem and opportunity identification

email server

process and deliver incoming and outgoing email

All of the following are types of multimedia and entertainment software, EXCEPT ________. A. digital audio software B. gaming software C. drawing software D. productivity software

productivity software

compiler

program that understands both the syntax and the machine language

source-code

programmers' instructions written in a higher-level language

Software refers to a set of instructions that tells the computer what to do. These instruction sets are called ________.

programs

Open system Internet protocols replaced ________ system Internet protocols.

proprietary

In the URL http://www.pearsonhighered.com/techinaction, the portion labeled "http" is the ________.

protocol

database server

provides client computers with access to information stored in databases

A(n) ________ server acts as a liaison between an intranet and the Internet.

proxy

Which of the following is/are NOT part of a program's problem statement?

pseudocode, or the text-based approach to documenting the algorithm

All of the following involve tasks for network administration, EXCEPT ________. A. installing new computers and devices on the network B. updating and installing new software on the network C. setting up proper security for a network D. purchasing initial equipment for the network

purchasing initial equipment for the network

A print server uses a print ________ as a software holding area for printing jobs.

queue

A wireless network uses which of the following as its transmission medium?

radio waves

A ________ check allows you to set credits allowed for students during one quarter from 0 to 21.

range

Robotic cameras used by television stations for sports events require a ________ operating system

real-time

Some video games require a ________ operating system.

real-time

At a minimum, what content must all data packets contain?

recipient's address, sender's address, reassembling instructions, and data

In a database, a ________ is a group of related fields.

record

If a business keeps two lists, one for employee payroll and one for employee benefits information, both containing name and address information, this is an example of data ________.

redundancy

Which of the following is NOT a cascading style sheet layer? A. External B. Referenced C. Embedded D. Inline

referenced

________ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table.

referential integrity

network topology

refers to the physical or logical arrangement of computers, transmission media, and other network components

The ________ contains all of the different configurations used by the OS and by other applications.

registry

Which type of database excels in the storage of structured, analytical data?

relational

access card reader

relatively cheap device that ready information from a magnetic strip on the back of a credit card like access card

LogMeIn is an example of a ________.

remote access service for mobile devices

Decision points consist of binary decisions and ________.

repeating loops

In Windows, you can create ________ to reset your system in the case of a malfunction.

restore points

If fair allocation of network access is a major requirement of the network, choose a(n) ________ topology.

ring

A(n) ________ allows sharing of a broadband Internet connection.

router

Which of the following devices are used to send data between two networks?

routers

Sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network?

routers and switches

Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?

sampling rate

authentication server

server that keeps track of who is logging on to the network and which services on the network are available to each user

cloud servers

servers that are maintained by hosting companies and that are connected to networks via the internet

All of the following are benefits of networks EXCEPT, ________. A. sharing an Internet connection B. sharing printers and other peripherals C. sharing files D. sharing an operating system

sharing an operating system

Where will you find Xcode?

shipped with OS X

Text messaging is also called ________.

short message service (SMS)

The most full-featured and powerful cell phones are put in the category of ________.

smartphones

A computer network is defined as two or more computers connected with ________ so that they can communicate with each other.

software and hardware

Another way to obtain software is through ________, where a vendor hosts the software online over the Internet and you do not have to install it on your computer.

software as a service

course management

software used by instructors

tax preparation

software used in personal finance

desktop publishing software

software used to create newsletter

computer-aided

software used to design buildings

video editing

software used to make movies

A ________ uses electronic memory and has no motors or moving parts.

solid state drive

All of the following are examples of optical drives, EXCEPT ________. A. solid-state disc B. compact disc C. digital video disc D. Blu-ray disc

solid-state disc

All of the following are examples of optical drives, EXCEPT ________. A. solid-state disc B. compact disc C. digital video disc D. Blu-ray disc

solid-state drive

metropolitan area network (MAN)

sometimes governments organizations or civic groups establish WANS to link users in a specific geographic area

A(n) ________ enables the computer to drive the speaker system.

sound card

device driver

special communication software installed on all cline computers in a client/server network

token

special data packed used to pass data around

The type of software that is best used to create a simple budget is ________.

spreadsheet software

The four functions of the computer include input, process, output, and ________.

storage

SMS delivers messages to the appropriate mobile device using ________ technology.

store-and-forward

A(n) ________ is a specially designed computer that can perform complex calculations extremely fast

supercomputer

During the virtual memory process, the operating system moves data to a temporary storage area on the hard drive called the ________ file.

swap

A(n) ________ keeps track of data packets and, in conjunction with network interface cards, helps the data packets find their destination without running into each other on an Ethernet network.

switch

The star topology uses a central ________ to connect all network nodes.

switch

Ensuring that two devices, for example, a PC and a cell phone or smartphone, have the same files is the process of ________.

synchronizing

Every software program has a set of ________ that specify the minimum recommended standards for the operating system, processor, RAM, and hard drive capacity.

system requirements

A video card is an expansion card installed inside your ________

system unit

A video card is an expansion card installed inside your ________.

system unit

In a database, a group of related records is called a(n) ________.

table

In databases, information is organized in ________

tables, records and fields

A ________ was the first device with touch-screen capabilities.

tablet PC

<b> and <i> are examples of HTML ________.

tags

The ends of the cable in a bus network use a(n) ________ to absorb a signal so that it is not reflected back onto parts of the network that have already received the signal.

terminator

Which of the following allows you to download and play music with restrictions enforced about its use?

tethered downloads

All of the following are examples of multimedia, EXCEPT ________. A. streaming video B. text C. MP3 music files D. graphics

text

scalability

that more users can be added easily without affecting the performance of the other network nodes

Cache memory levels are determined by ________.

the chip's proximity to the CPU

The CPU consists of which two parts?

the control unit and the arithmetic logic unit

passive topology

the devices attached to a bus network do nothing to move data along the network

open systems interconnections

the institute of Electrical and electronics Engineers has taken the lead in establishing recognized worldwide networking protocols, including a standard of communications called

tunneling

the main technology for achieving VPN.

All of the following are used to classify network architectures, EXCEPT ________. A. the distance between nodes B. the protocol used to exchange data between nodes C. the communication medium used to transport data D. the number of nodes on the network

the number of nodes on the network

Moore's Law is a rule that predicts ________.

the pace at which CPUs improve

authentication

the process whereby users prove they have authorization to use a computer network

token method

the sending node then generates a new token and this starts the going around ring again

information assurance

the set of measures intended to protect and defend inflation and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation

Network architectures are classified according to ________.

the way in which they are managed and the distance between their nodes

Network architectures are classified according to ________.

the way they are controlled and the distance between their nodes

All of the following are considered cybercrimes, EXCEPT ________. A. identity theft B. non-delivery of merchandise C. theft of a cell phone D. hacking

theft of a cell phone

All of the following are true about real-time operating systems (RTOS), EXCEPT ________. A. they are also called embedded systems B. they are programs with specific purposes C. they require significant user interaction D. they are written specifically for the needs of the device

they require significant user interaction

FORTRAN, C++, and Java are all ________-generation languages.

third

decentralized

this me ants that users are responsible for creating their own data backups and for providing security for their computers

A ________ is a virus that is triggered on a certain date.

time bomb

A ________ is passed from computer to computer around the ring of a ring topology network.

token

Ring networks use the ________ method to avoid data collisions.

token

The method of algorithm creation used when a programmer breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks is called ________.

top-down design

In the URL http://www.pearsonhighered.com/techinaction, the portion labeled ".com" is the ________.

top-level domain

The root DNS servers know the location of all DNS servers that contain the master listings for an entire ________.

top-level domain

network administrators

training in computer and peripheral maintenance and repair, networking design, and the installation of networking software

interpreter

translates source code line by line into intermediate form

Normal telephone wire is ________.

twisted-pair cable

The most popular transmission media option for wired Ethernet networks is ________.

unshielded twisted-pair (UTP) cable

Nontraditional data such as audio clips, video clips, pictures, and very large documents are called ________ data.

unstructured

The percentage of time your CPU is working is referred to as CPU ________.

usage

Coaxial cable

used for televisions. has 4 components

Microsoft SilverLight

used to develop rich multimedia and interactive Web applications

web server

used to host a web site so it will be available thought the internet

The _______ of the operating system allows the user to communicate with the computer system.

user interface

biometric authentication devices

uses some unique characteristic of human biology to identify authorized users

virtual private network

uses the public internet communications infrastructure to build a secure private network among various locations

wireless media

usually add-ons that extend or improve access to a wired network

Which of the following types of programs help manage system resources such as the hard drive?

utility programs

Multimedia software includes all of the following, EXCEPT ________. A. image-editing software B. animation software C. utility software D. audio-editing software

utility software

_______ is the process of ensuring that the data entered into a field meets specified guidelines.

validation

A(n) _____ _____ is generally defined as part of the data dictionary and is specified in the field properties for each field.

validation rule

Software designed for a specific industry is known as ________ software.

vertical market

An expansion card that translates binary data into images is a(n) ________.

video card

guest servers

virtual servers sunning on a host machine

Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a process called ________ programming.

visual

Broadcasting your video to a live audience over the Web is referred to as ________.

webcasting

transmission media

whether for wired or wireless communications technology, comprise the physical system that data takes to flow between devices on the network

Most ________ allow you to connect wireless and wired computers to the same network.

wireless routers

The appropriate software to use for creating research papers is ________

word processing software

A(n) ________ takes advantage of file transport methods to spread on their own.

worm

All of the following are advantages of notebook computers EXCEPT:

you get more speed for a lower price

________ is a text-based approach to documenting an algorithm. A) Flowcharting B) Pseudocode C) Diagramming D) Flow analysis

B) Pseudocode

Which of the following development environments enables Web sites to talk to each other easily by introducing a standard way for software to interact through Web services? A) RAD B) The .NET Framework C) JavaScript D) PHP (hypertext preprocessor)

B) The .NET Framework

A(n) ________ is a set of specific, sequential steps that describe in natural language exactly what the computer must do to complete its task.

B) algorithm

Corona and Magmito can be used to develop ________. A) complex Web applications B) apps for smartphones C) Mac software D) Web pages

B) apps for smartphones

Keywords in a programming language that redirect the flow of a program based on a decision are called ________. A) pseudocode B) control structures C) directions D) operators

B) control structures

The description of what a program should do if the input data are invalid is called ________. A) exception handling B) error handling C) exception trapping D) error trapping

B) error handling

A variable declaration tells the operating system to allocate storage space ________.

B) in RAM

The first-generation language is ________. A) BASIC B) machine language C) COBOL D) assembly language

B) machine language

An alternative approach to systems development, called ________, makes use of a prototype at the beginning of the project. A) the waterfall method B) rapid application development (RAD) C) the iterative method D) integrated development (ID)

B) rapid application development (RAD)

Who is responsible for writing internal documentation for software programs?

B) technical writers

P2P networks become difficult to manage when they are expanded beyond __________ users. A. 5 B. 10 C. 20 D. 50

B. 10

Windows 8 is offered in ______ versions. A. 1 B. 2 C. 3 D. 4

B. 2

If a numeric field has a size of 5, which is the highest number it can hold? A. 5 B. 99999 C. 55555 D. 50000

B. 99999

A set of rules for exchanging electronic information is called ______. A. handshaking B. a computer protocol C. DHCP D. an open system protocol

B. A Computer Protocol

Which type of virus was the famous Michelangelo virus? A. A worm B. A time bomb C. A script virus D. An e-mail virus

B. A time bomb

Which statement pertaining to system reliability is FALSE? A. Having the latest version of software products can make your system more reliable B. An accumulation of temporary Internet files has no effect on your computer's overall performance. C. You can clean out unnecessary programs from your Startup folder. D. When you defrag your hard drive, it works more efficiently

B. An accumulation of temporary Internet files has no effect on your computer's overall performance.

The most popular tablet operating system was developed by _______. A. Microsoft B. Apple C. Google D. Symbian

B. Apple

________ is the maximum speed at which data can be transferred between two nodes. A. Throughput B. Bandwidth C. Band Speed D. Through Speed

B. Bandwidth

Which of the following devices sends data from one collision domain to another? A. Switch B. Bridge C. Link D. Band

B. Bridge

Which of the following networks is most known for data collisions? A. Star B. Bus C. Hierarchical D. Cluster

B. Bus

Which of the following activities is carried out by the arithmetic logic unit (ALU)? A. Movement of read/write heads B. Completion of all arithmetic calculations C. Creation of virtual memory D. Coordination of all other computer components

B. Completion of all arithmetic calculations

Creating and disseminating ______ is one of the most widespread types of crimes. A. Spam B. Computer viruses C. fake credit cards D. FBI related scams

B. Computer viruses

In most current systems ______ is the type of RAM used. A. DDR2 B. DDR3 C. DDR4 D. DDR5

B. DDR3

A _____ server takes a pool of IP addresses and shares them with hosts on the network on an as-needed basis. A. DOM B. DHCP C. CDIR D. CGI

B. DHCP

the computer port that is used to connect televisions and DVD players is the _____. A. VGA B. DVI C. HDMI D. LCD

B. DVI

What does the acronym DBMS stand for? A. Database modeling system B. Database management system C. Data building and modeling system D. Data browsing and management system

B. Database management system

Which of the following Windows utility programs arranges pieces of files on your hard drive in sequential order? A. Disk cleanup B. Disk Defragmenter C. Error Checking D. Task manager

B. Disk Defragmenter

All of the following are part of the machine cycle, EXCEPT _____. A. Fetch B. Encode C. Execute D. Store

B. Encode

Laptops are often equipped with a(n) ________ slot that allows you to read flash memory cards such as CompactFlash, memory sticks, and secure digital cards. A. eSATA B. ExpressCard C. USB D. FireWire

B. ExpressCard

________ cable is NOT subject to electromagnetic interference or radio frequency interference. A. Twisted-pair B. Fiber-optic C. Polycarbonate D. Coaxial

B. Fiber-optic

What utility takes out redundancies in a file to reduce the file size? A. Disk cleanup B. File Compression C. Error-checking D. System restore

B. File Compression

Live bookmarks is a feature in ___________ that adds the technology old RSS feeds to bookmarks. A. Safari B. Firefox C. Internet Explorer D. Chrome

B. Firefox

A _________ keeps your computer safe by confirming who is trying to access it. A. Gateway B. Firewall C. Hub D. Switch

B. Firewall

______ keyboards can be rolled up and put in your backpack. A. Virtual laser B. Flexible C. Elastic D. Dvorak

B. Flexible

______ keyboards can be rolled up and put in your backpack. A. Virtual laser B. Flexible C. Elastic D. Dvorak

B. Flexible

_______ are shortcut keys that you press to perform special tasks; each software application has its own set of tasks assigned to these keys. A. Alt keys B. Function keys C. Control (Ctrl) keys D. Windows keys

B. Function Keys

A visual search engine that uses pictures from our smartphone to search the Web for more information is known as ______. A. Google Glasses B. Google Goggles C. Explorer Eyes D. Explorer Shades

B. Google Goggles

Which of the following was created especially for the transfer of hypertext documents across the Internet? A. SSL B. HTTP C. TLS D. HTML

B. HTTP

A(n) ______ address is a unique number that identifies a computer, server, or device connected to the Internet. A. TCP B. IP C. CGI D. NetBIOS

B. IP

Which of the following is NOT a main operation of a database management system (DBMS)? A. Creating databases and entering data B. Implementing data mining C. Viewing and sorting data D. Outputting data

B. Implementing data mining

Computers gather data, which means that they allow users to ________ data. A. present B. Input C. output D. Store

B. Input

The _____ provides leadership for the orderly growth and development of the Internet. A. W3C B. Internet Society C. ICANN D. IEEE

B. Internet Society

Which of the following statements describes dynamic decision making? A. It occurs during the second phase of the SDLC. B. It is the ability of a Web page to decide how to display itself based on choices the reader makes. C. It is an alternative method used in system designs. D. It is part of the flowcharting phase of algorithm creation.

B. It is the ability of a Web page to decide how to display itself based on choices the reader makes.

Which language is used for applications that need to collect information from networked computers? A. HTML B. Java C. COBOL D. FORTRAN

B. Java

Which of the following statements about Java is False? A. Its object- oriented model enables programmers to benefit from it large set of existing classes. B. Java can run only on a Windows operating system C. The Java program can run on an CPU or operating system D. Java needs to be compiled only once

B. Java can run only on a Windows operating system

____ is a scripting language that's often used to add interactivity to Web pages. A. Visual Basic B. JavaScript C. C-Script D. C#

B. JavaScript

Most supercomputers use the ________ operating system. A. UNIX B. Linux C. Windows D. iOS 5

B. Linux

A _____________ is a virus that is attached to documents such as a word or excel files. A. script virus B. Macro virus C. Polymorphic Virus D. Worm

B. Macro virus

The rule of thumb that predicts that CPU capacity will double every two years is called ______. A. CPU Rule B. Moore's Law C. Intel's Law D. Express Rule

B. Moore's Law

The latest version of the Mac OS X is the ______. A. Snow leopard B. Mountain Lion C. Mountain Cougar D. Snow Tiger

B. Mountain Lion

A _______ enables your computer to connect to other computers or to the Internet A. Video card B. Network interface card (NIC) C. Sound card D. Controller card

B. Network interface card (NIC)

_____ lines are high-speed, fiber-optic communications lines. A.T B. OC C. DSL D. Cable

B. OC

All of the following are examples of database software, EXCEPT _____. A. Oracle B. OneNote C. My SQL D. Access

B. OneNote

4. _____ software helps you manage e-mail, contacts, calendars, and tasks in one place. A. database B. Personal information manager C. spreadsheet D. word processing

B. Personal information manager

________ software helps you manage e-mail, contacts, calendars, and takes in one place. A. Database B. Personal information manager C. Spreadsheet D. Word processing

B. Personal information manager

Microsoft's _______ enables you to create a 3-D walkthrough of your favorite vacation places. A. Photostitch B. Photosynth C. Photosync D. Photosee

B. Photosynth

Which of these statements about physically protecting your computer is FALSE? A. The computer should sit on a flat level surface. B. Power surges can be blocked by using a computer surround. C. It is best to unplug computers during an electrical storm. D. Old surge protectors can deliver power to your computer without protecting it.

B. Power surges can be blocked by using a computer surround.

_________ is the process of translating a task into a series of commands that a computer will use to perform the task. A. SDLC B. Programming C. Flowcharting D. Diagramming

B. Programming

Software refers to a set of instructions that tells the computer what to do. These instructions set are called ______. A. database B. programs C. peripherals D. Devices

B. Programs

The area that holds all the instructions the computer needs to start up when it is powered on is ______. A. RAM B. ROM C. USB D. CPU

B. ROM

Which of the following is NOT a cascading style sheet layer? A. External B. Referenced C. Embedded D. Inline

B. Referenced

Which protocol is used to transmit e-mail over the Internet? A. FTP B. SMTP C. HTTP D. VolP

B. SMTP

Where will you find Xcode? A. Shipped with Windows 7 B. Shipped with OS X C. As an add-on as a downloadable complier D. As code behind Web pages

B. Shipped with OS X

Which program provides a seven layer overwrite for the Mac operating system? A. File shredder B. Shredlt X C. Eraser D. Wipe

B. Shredlt X

A _____ uses electronic memory and has no motors or moving parts. A. Mechanical hard drive B. Solid state drive C. Blu-ray disc D. Digital video disc

B. Solid state drive

All of the following are media management software used to organize music, video, and pictures, EXCEPT _____. A. Windows Media Player B. Sony Sound Forge C. Apple Itunes D. Winamp

B. Sony Sound Forge

One virus called _______ is used to trick users into downloading an infected file to their phone, which steals online banking information. A. Spyware Mobile Banking B. Spyeye Mobile Banking C. Spyware Online Banking D. Spyeye Online Banking

B. Spyeye Mobile Banking

. ______ is the main suite of protocols used on the Internet. A. FTP B. TCP/IP C. SMTP D. UDP

B. TCP/IP

The browser feature where tabs are independent of each other is known as ______. A. Pinned tabs B. Tab isolation C. Tear off tabs D. Session tabs

B. Tab Isolation

Which of the following does NOT occur during the power-on self-test? A. The video card and video memory are tested. B. The OS is moved into RAM. C. The BIOS is identified. D. Memory is tested

B. The OS is moved into RAM.

The CPU consists of which two parts? A. The arithmetic logic unit and the front side bus B. The control unit and the arithmetic logic unit C. The control unit and the front side bus D. The control unit and cache memory

B. The control unit and the arithmetic logic unit

_______ is a social networking service that enables you to exchange short text messages with your friends or "followers." A. Facebook B. Twitter C. MySpace D. Yahoo! Text

B. Twitter

Which of the following types of programs help manage system resources such as the hard drive? A. Application software B. Utility programs C. Productivity software D. Application programming interfaces

B. Utility programs

RAM is a ______ storage location A. Permanent B. Volatile C. Nonvolatile D. Network

B. Volatile

You can block logical ports to invaders and make your computer invisible to others on the internet by installing _____. A. a packet sniffer B. a firewall C. a packet filter D. antivirus software

B. a firewall

QuickBooks and Peachtree are examples of _______ software. A. educational B. accounting C. course management D. gaming

B. accounting

A(n) _________ server tracks who is logging on to the network as well as which services on the network are available to each user. A. gateway B. authentication C. dedicated D. file

B. authentication

In a transaction-processing system, if transaction data are accumulated until a certain point and then many transactions are processed all at once, this is called ______ processing. A. delayed B. batch C. real-time D. group

B. batch

In a transaction-processing system, if transaction data are accumulated until a certain point and then many transactions are processed all at once, this is called ________ processing. A. delayed B. batch C. real-time D. group

B. batch

Computer use the _____ language consisting of 0's and 1's. A. symbol B. binary C. byte D. system

B. binary

________ viruses are often transmitted by a flash drive left in a USB port. A. logic bomb B. boot-sector C. macro D. encryption

B. boot-sector

With object-oriented analysis, programmers identify categories of input that are part of the problem into ______. A. blocks B. classes C. units D. tables

B. classes

Which of the following is NOT a common network topology? A. star B. cluster C. bus D. ring

B. cluster

Computers that typically use special security protocols to protect personal, sensitive buyer information are known as ______ servers. A. point of sale B. commerce C. business D. Web

B. commerce

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? A. social networking B. cybercrime c. phishing d. hacking

B. cybercrime

The unique identification number assigned to your computer when you connect to the Internet is known by all of the following, EXCEPT A. dotted quad B. dotted period C. dotted decimal D. IP address

B. dotted period

All of the following are extra precautions you can take to secure a wireless network, EXCEPT ________. A. change your network name (SSID) B. enable SSID broadcast C. turn on security protocols D. create a passphrase

B. enable SSID broadcast

Network adapters _________. A. are built into the motherboard on each node B. enable nodes in a network to communicate with each other C. are always Ethernet NICS D. are necessary only on servers in a client/server network

B. enable nodes in a network to communicate with each other

All of the following are parts of the machine cycle, EXCEPT ______. A. fetch B. encode C. execute D. store

B. encode

CD ripping refers to _______. A. stealing songs off the Internet B. encoding CDs to MP3 format C. creating your own CDs from your MP3 collection D. erasing content on a CD

B. encoding CDs to MP3 format

The binary sequence that instructs the CPU to run the programming code is called a(n) ________. A. source file B. executable program C. base code D. interpreted program

B. executable program

An example of ________ is customer demographic data purchased from third parties or statistics compiled by the federal government. A. internal data B. external data C. imported data D. metadata

B. external data

A _____ temporarily displays records that match the specified criteria. A. sieve B. filter C. validation rule D. field constraint

B. filter

A _________ keeps your computer safe by confirming who is trying to access it. A. gateway B. firewall C. hub D. switch

B. firewall

Presentation software includes all of the following features, EXPECT______. A. animation effects B. formulas C. transitions D. themes

B. formulas

Adware and spyware are referred to collectively as __________. A. viruses B. grayware C. altertware D. firmware

B. grayware

A variable declaration tells the operating system to allocate storage space _____. A. on the bus B. in RAM C. in the CPU D. on the hard drive

B. in RAM

Data ______ means that the data contained in a database is accurate and reliable. A. efficiency B. integrity C. redundancy D. consistency

B. integrity

A special numerical code that prioritizes device requests from the operating systems is called _______. A. event B. interrupt handler C. interrupt D. spooler

B. interrupt handler

A(n) _________ is used exclusively within a corporation or organization. A. VPN B. intranet C. extranet D. Internet

B. intranet

When you want to extract data from two or more tables, you use a(n) _____ query. A. select B. join C. relational D. object

B. join

A(n) _____ is custom built miniprogram that allows you to execute a complicated sequence of steps with a single command. A. micro B. macro C. application D. applet

B. macro

Data staging consists of all of the following steps, EXCEPT ________. A. transformation of data B. mining of data C. storage of data in a warehouse D. extraction of data

B. mining of data

10. For the nodes on a network to communicate with each other and access the network, each node needs a __________. A. DSL modem B. network adapter C. network interface card D. router

B. network adapter

An _____ needs to be installed on each client computer and server connected to the network to provide the services necessary for them to communicate. A. application software B. network operating system C. protocol guideline D. switch

B. network operating system

Client/Server networks are controlled by a central server that runs a special piece of software called _______. A. Windows 7 B. network operating system (NOS) C. firewall D. firmware

B. network operating system (NOS)

8. A(n) ________ is a device connected to a network such as a computer or a game console. A. architecture B. node C. server D. modem

B. node

In a database, ______ fields store numbers used to perform calculations. A. date B. numeric C. computational D. alphanumeric

B. numeric

In a database, a chart is stored in a(n) ______ field. A. text B. object C. memo D. hyperlink

B. object

After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered ________. A. data B. output C. input D. a process

B. output

When malicious code is planted on your computer and alters your browser's ability to find Web addresses it is known as ________. A. phishing B. pharming C. pretexting D. phlying

B. pharming

With regard to computer protection, quarantining is defined as ________. A. updating your antivirus software B. placing a found virus in a secure area in the hardware C. repairing an infected file d. deleting an infected file

B. placing a found virus in a secure area in the hardware

Adobe Reader, Flash Player, and Quick time Player are all examples of special software programs called _____. A. aggregators B. plug-ins C. podders D. browsers

B. plug-ins

Which statement about selecting the right programming language for a project is FALSE? A. some programming languages might take up too much space for a particular project B. programming languages require the same amount of time to execute C. select a language that is easy for programmers to use and maintain D. Certain languages are customized to support a UNIX or Windows environment

B. programming languages require the same amount of time to execute

A print server uses a print ____ as a software holding area for printing jobs. A. stack B. queue C. buffer D. heap

B. queue

A ______ check allows you to set credits allowed for students during one quarter from 0 to 21. A. completeness B. range C. consistency D. numeric

B. range

If a business keeps two lists, one for employee payroll and one for employee benefits information, both containing name and address information, this is an example of data ________. A. integrity B. redundancy C. completeness D. normalization

B. redundancy

If fair allocation of network access is a major requirement of the network, choose a _______ topology. A. cluster B. ring C. bus D. star

B. ring

Division by zero is a(n) ________ error that is caught when the program executes. A. compiler B. runtime C. syntax D. execution

B. runtime

The "s" in "https" stands for _____. A. secure socket lock B. secure socket layer C. secure socket link D. secure socket line

B. secure socket layer

SSID stands for ________. A. service set identity B. service set identifier C. service security identity D. service security identifier

B. service set identifier

An IP address that does not change and is usually assigned manually by a network administrator is called a _________. A. dynamic address B. static address C. fixed address D. stationary address

B. static address

An _________ is a specially designed computer that can perform complex calculations extremely fast. A. desktop computer B. supercomputer C. mainframe computer D. embedded computer

B. supercomputer

The ends of the cable in a bus network use a(n)_____ to absorb a signal so that it is not reflected back onto parts of the network that have already received the signal. A. endcap B. terminator C. stopper D. block

B. terminator

13. All of the following are examples of multimedia EXCEPT _______. A. streaming video B. text C. MP3 music files D. graphics

B. text

The method of algorithm creation used when a programmer breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks is called ________. A. object-oriented analysis B. top-down design C. bottom-up design D. coding design

B. top-down design

The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a ________. A. stylus B. touch pad C. game control D. trackball

B. touch pad

Normal telephone cable is a type of ________. A. fiber-optic cable B. twisted-pair cable C. coaxial cable D. Ethernet cable

B. twisted-pair cable

All of the following are types of computer users, EXCEPT ______. A. mobile user B. typical user C. power user D. casual user

B. typical user

The ________ is a program that manages the data between the operating system and all input and output devices attached to the system.

BIOS

In object-oriented terms, another name for a method is a(n) ________.

Behavior

Large object data in binary form

Binary Large Object

Which is the fastest type of optical drive on the market?

Blu-ray drives

Which of the following uses radio waves to transmit data signals over short distances and does not need a direct line of sight?

Bluetooth

true

Boolean data types are used to represent true-false values.

In the Windows operating system, the hard drive is represented as the ________.

C drive

How many steps are there in the system development life cycle?

C) 6

Which of the following is taught as the beginning computer language at many colleges and universities?

C) Java

Which of the following statements about Java is FALSE?

C) Java can run only on a Windows operating system.

The star topology uses a central ________ to connect all network nodes. A) terminator B) gateway C) switch D) router

C) switch

The loop decision point consists of three features: an initial value, a set of actions to be performed, and a(n) ________. A) class B) operator C) test condition D) testing plan

C) test condition

Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a process called ________ programming.

C) visual

Java and ________ are introductory programming languages taught at many colleges and universities.

C++

Which language do programmers use if the problem requires a lot of number crunching?

C++

There are ____ levels of cache memory. A. 5 B. 2 C. 3 D. 4

C. 3

IPv4 allows for approximately________ different IP addresses. A. 4 million B. 400 million C. 4 billion D. 40 billion

C. 4 billion

How many steps are there in the system development life cycle? A. 4 B. 5 C. 6 D. 10

C. 6

_________ floods a computer with requests until it shuts down and refuses to answer any requests for information. A. A Trojan horse B. A polymorphic virus C. A DDoS attack D. Port blocking

C. A DDoS attack

Which of the following is NOT a main characteristic associated with desktop computers as compared to notebooks? A. A desktop computer requires more space. B. A desktop computer is harder to move around. C. A desktop computer is more expensive. D. A desktop computer is easier to expand.

C. A desktop computer is more expensive.

Which of the following is NOT one of the four major data processing functions of a computer? A. Gathering data B. Processing data into information C. Analyzing the data or information D. Storing the data or information

C. Analyzing the data or information

A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as an _____. A. index B. navigation bar C. breadcrumb trail D. cookie trail

C. Breadcrumb Trail

A client/server network is an example of ________ administration A. Local B. Wide Area C. Central D. Corporate

C. Central

What is Google's first attempt at a netbook where all applications and files are stored on the Web? A. Google docs B. Gmail C. Chromebooks D. Cloud Computing

C. Chromebooks

The concept of the Internet was developed in response to the ______ War. A. Korean B. Vietnam C. Cold D. Big

C. Cold

CAPTCHA stands for _______. A. Completely Amazing Public Turing Test to Tell Computers and Humans Apart B. Completely Automated Private Turing Trial to Tell Computers and Humans Apart C. Completely Automated Public Turing Test to Tell Computers and Humans Apart D. Complete Automated Public Turing Trial to Tell Computers and Humans Apart

C. Completely Automated Public Turing Test to Tell Computers and Humans Apart

The ______ is used in combination with other keys to perform shortcuts and special tasks. A. Toggle key B. Function key C. Control (Ctrl) key D. Windows key

C. Control (Ctrl) key

Data in a multidimensional database is organized in a _______ format. A. Linear B. Table C. Cube D. Cellular

C. Cube

The protocol using port 53 is ______. A. FTP control B. STMP C. DNS D. HTTP

C. DNS

Which of the following is NOT a data source for a data warehouse? A. Internal sources B. External sources C. Data mine D. Clickstream data

C. Data mine

For business networks, which of the following is NOT a main cable type? A. Twisted-pair B. Coaxial C. Duplex D. Fiber-optic

C. Duplex

______ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home. A. Mainframe B. Desktop C. Embedded D. Internal

C. Embedded

IC3 is a partnership between the _________. A. FBI and local police departments B. FBI and National Defense Department C. FBI and National White Collar Crime Center D. National White Collar Crime Center and National Defense Department

C. FBI and National White Collar Crime Center

The amount of RAM recommended for most systems today is measured in _______. A. KB B. gigahertz C. GB D. megahertz

C. GB

A ________ is a network located in your home that connects to all your digital devices. A. MAN B. WAN C. HAN D. LAN

C. HAN

A ________ network is located in your home that connects to all your digital devices. A. MAN B. WAN C. HAN D. LAN

C. HAN

Special symbols called tags are used in which of the following languages? A. BASIC B. Java C. HTML/XHTML D. C++

C. HTML/XHTML

Which protocol transfers HTML data from servers to browsers? A. UDP B. FTP C. HTTP D. TCP

C. HTTP

. Which of the following is something a network adapter does NOT do? A. It uses high-powered signals so data can move easily over network transmission media. B. It allows or denies access to the computer in which it is installed. C. It verifies that all information transmitted from the computer is correctly received by the recipient. D. It breaks down data and puts it into packets.

C. It verifies that all information transmitted from the computer is correctly received by the recipient.

Rules for creating passwords include all of the following, EXCEPT ____. A. Keep your password a secret B. Change your password frequently C. Keep your password written down and stored in any easy-to-remember location D. Create a hard-to-guess password, with a combination of letter, numbers, and symbols

C. Keep your password written down and stored in any easy-to-remember location

Which of the following was the first widely used operating system installed in personal computers? A. Symbian OS B. Microsoft Windows C. MS-DOS D. Linux

C. MS-DOS

Running the Disk Defragmenter utility will ______. A. Detect and remove spyware B. Clear out temporary Internet files C. Make the hard drive work more efficiently D. Clean out your Startup folder

C. Make the hard drive work more efficiently

3. A network used to communicate among devices close to one person is called a ________. A. MAN B. LAN C. PAN D. WAN

C. PAN

In the URL http://www.pearsonhighered.com/techinaction, the portion labeled "techinaction" is the A. protocol B. domain name C. path D. top-level domain

C. Path

Which of the following is the largest unit of measure for the size of a computer file? A. Megabyte B. Gigabyte C. Petabyte D. Terabyte

C. Petabyte

Google ______ is a popular application that lets you edit images and helps to organize and share your digital images. A. Snapfish B. Shutterfly C. Picaso D. Rembrand

C. Picaso

Which of the following classification of viruses can change its own code to avoid detection? A. Stealth B. Multipartite C. Polymorphic D. Worm

C. Polymorphic

What is the first step of system development life cycle? A. Design B. Analysis C. Problem and opportunity identification D. Development and documentation

C. Problem and opportunity identification

Open system internet protocols replaced _____ system Internet protocols. A. Restricted B. Closed C. Proprietary D. Private

C. Proprietary

All of the following are examples of permanent storage, EXCEPT ________. A. hard drive disk B. DVD C. RAM D. USB Drive

C. RAM

________ is the abbreviation for the place in the computer where the programs and data the computer is currently using are stored. A. ROM B. CPU C. RAM D. USB

C. RAM

Wireless internet is available using _________. A. Fiber Optics B. Satellite C. Radio Waves D. DSL

C. Radio Waves

Podcasts deliver their content using ______. A. Aggregator B. Google Reader C. Really Simple Syndication D. iTunes

C. Really Simple Syndication

Which of the following is NOT a type of management information system (MIS) report? A. Detail B. Summary C. Redundancy D. Exception

C. Redundancy

Another way to obtain software is through ______, where a vendor hosts the software online over the Internet and you do not have to install it on your computer. A. Open Source as a service B. Proprietary as a service C. Software as a service D. Webware as a Service

C. Software as a service

On a Windows 7 system, you can determine the amount of RAM by looking in the ______ window. A. Performance B. Memory C. System Properties D. Utilities

C. System Properties

Which of the following is the final stage of the program development life cycle (PDLC)? A. Making the plan B. COding C. Testing and documentation D. Debugging the code

C. Testing and documentation

Which statement does not describe fifth-generation languages? A. They are the most "natural" of the languages B. Problems are presented as a series of facts or constraints rather than a specific algorithm C. They use a set of short, English-based commands (such as SUB) that speak directly to the CPU D. The system of facts can be queried

C. They use a set of short, English-based commands (such as SUB) that speak directly to the CPU

In the URL http://www.pearsonhighered.com/techinaction, the protion labeled ".com" is the _______. A. domain name B. host C. top-level domain D. protocol

C. Top-level domain

All of the following operating systems support P2P networking, EXCEPT ________. A. Windows B. OS X C. Unix D. Linux

C. Unix

A ________ uses the public Internet communications infrastructure to build a secure, private network. A. LAN B. WAN C. VPN D. MAN

C. VPN

Which of the following would NOT be used to build Web sites with interactive capabilities? A. Active Server Pages B. PHP (hypertext preprocessor C. Visual Basic D. Java Server Pages

C. Visual Basic

Which of the following are personal video journal entries posted on the web? A. Podcasts B. Newsgroups C. Vlogs D. Blogs

C. Vlogs

A _______ is a Website where anyone can add, remove, or edit its content. A. blog B. podcast C. wiki D. webcast

C. Wiki

______ enables users to define their own data-based tags and facilitates exchange of information between Web sites. A. HTML B. XHTML C. XML D. PHP

C. XML

What is CSMA/CD? A. a type of network topology B. a special signal of a star network C. a method used to avoid data collisions D. the central communication device on a star or ring network

C. a method used to avoid data collisions

System software does all of the following, EXCEPT ______. A. help run the computer B. coordinate instructions between application software and the company's hardware devices C. add graphics and pictures to files D. help manage system resource

C. add graphics and pictures to files

An individual trained in the design and building of databases is called a database ________. A. master B. technician C. administrator D. analyst

C. administrator

The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n) _______. A. flowchart B. structure chart C. algorithm D. pseudocode

C. algorithm

An ______ is a small program that resides on a server designed to be downloaded and run on a client computer. A. CGI Script B. style sheet C. applet D. hypertext document

C. applet

When a client computer connects to a network and requests the use of Microsoft Office 2010, the ______ server delivers the software to the client computer. A. communication B. database C. application D. file

C. application

The main path, analogous to the interstate highway system, of the Internet along which data travel the fastest is known as the Internet _______. A. open system B. highway C. backbone D. cache

C. backbone

Before its final commercial release, software is often provided free or at a reduced cost in a(n) ________ version to certain test sites or to interested users. A. alpha B. release to manufacturers (RTM) C. beta D. general availability (GA

C. beta

The term "bit" is short for ______. A. megabyte B. binary language C. binary digit D. binary number

C. binary digit

Unstructured data such as video clips and pictures are known as _____ because of the way they are encoded. A. hyperlink fields B. multidimensional data C. binary large objects (BLOBs) D. metadata

C. binary large objects (BLOBs)

Errors in computer software are called _______. A. ants B. insects C. bugs D. spiders

C. bugs

For performing common tasks, Windows 8 has special shortcuts called ______. A. bracelets B. pins C. charms D. apps

C. charms

____ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission. A. packet switching B. An open circuit C. Circuit switching D. A closed circuit

C. circuit switching

Running the Disk Cleanup utility is a quick way to ______. A. defrag your hard drive B. remove spyware programs C. clear out unnecessary files D. clean out your Startup folder

C. clear out unnecessary files

Translating an algorithm into a programming language is called _________. A. interpreting B. compiling C. coding D. executing

C. coding

The process by which program code is converted into machine language is called _______. A. documentation B. variable declaration C. complication D. execution

C. complication

A _____ check compares the values of data in two or more fields to see whether those values are reasonable. A. correctness B. range C. consistency D. numeric

C. consistency

Processing performance is affected by the number of processing paths called ______. A. speed B. chips C. cores D. stars

C. cores

Moodle and Blackboard are examples of ________. A. utility software B. educational software C. course management software D. gaming software

C. course management software

A(n) ________ software installation enables you to decide which features you want to install on the hard drive. A. full B. upgrade C. custom D. new

C. custom

QuarkXPress and Adobe InDesign are examples of ______ software. A. image-editing B. word processing C. desktop publishing D. video-editing

C. desktop publishing

The flowchart shape for a binary decision is a(n)_______. A. parallelogram B. rectangle C. diamond D. oval

C. diamond

The OS enables you to organize the contents of your computer in a hierarchical structure of ________. A. files B. libraries C. directories D. drives

C. directories

Management information systems (MIS) provide reports called __________, which show conditions that are unusual or need attention from users of the system. A. detail reports B. summary reports C. exception reports D. expert reports

C. exception reports

C:\Documents\Spring 2012\CIS 101\Term Paper\Computer Technology is an example of a _______. A. file extension B. file type C. file path D. file list

C. file path

A ________ is named after a housing construction feature that slows the spread of fires from house to house. A. firehouse B. wallfire C. firewall D. fire protector

C. firewall

In a spreadsheet, equations you build yourself using values and cell references are called _____. A. functions B. calculations C. formulas D. values

C. formulas

In a spreadsheet, equations you build yourself using values and cell references are called ______. A. functions B. calculations C. formulas D. values

C. formulas

SQL is an example of a _______-generation language. A. second B. third C. fourth D. fifth

C. fourth

Which of the following is the name of Microsoft Access File? A. inventory.xlsx B. inventory.wpd C. inventory.accdb D. inventory.bm

C. inventory.accdb

Which of the following is the name of a Microsoft Access file? A. inventory.xlsx B. inventory.wpd C. inventory.accdb D. inventory.bmp

C. inventory.accdb

Web-based application software is software that ______. A. enables you to create Web pages B. is installed by the computer manufacturer C. is stored completely on a web server instead of your hard drive D. does not need an Internet connection

C. is stored completely on a web server instead of your hard drive

A(n) __________ error is caught when the program executes. A. internal B. syntax C. logical D. execution

C. logical

Large, expensive computers that support hundreds of users simultaneously are called ______. A. supercomputers B. maxicomputers C. mainframes D. powercomputers

C. mainframes

A ________ is approximately 1 million bytes. A. gigabyte B. kilobyte C. megabyte D. terabyte

C. megabyte

When referring to hard drives, access time is measuring in _______. A. hertz B. bps C. milliseconds D. kilobytes

C. milliseconds

A _____ allows multiple users to connect to the Internet through one connection A. file server B. hub C. network D. packet screener

C. network

A _____ relationship indicates that for each record in a table, there is only a single corresponding record in a related table. A. many-to-one B. one-to-many C. one-to-one D. many-to-many

C. one-to-one

. The most essential software in your computer system is the ________. A. security B. antivirus C. operating system D. productivity

C. operating system

Information is most closely related to which of the following? A. input B. methods C. output D. processes

C. output

Running the CPU at a faster speed than the manufacturer recommends is called _____. A. fetching B. clock speed C. overclocking D. hyperthreading

C. overclocking

Data are sent through a network on bundles called ______. A. packages B. pouches C. packets D. switches

C. packets

Using a network without the network owner's permission is known as ________. A. hijacking B. chillijacking C. piggybacking D. hybacking

C. piggybacking

A __________ virus changes its own code or periodically rewrites itself to avoid detection. A. multipartite B. stealth C. polymorphic D. polypertite

C. polymorphic

In a transaction-processing system (TPS), if the TPS database is queried and updated while the transaction is taking place, this is called ________ processing. A. direct B. batch C. real-time D. immediate

C. real-time

In a database, a ________ is a group of related fields. A. file B. list C. record D. table

C. record

1. A _________ displays a subset of data from a table (or tables) based on the criteria specified. A. database query B. join query C. select query D. criteria query

C. select query

A(n) ________ enables the computer to drive the speaker system. A. video card B. surround card C. sound card D. speaker card

C. sound card

Every software program has a set of ______ that specify the minimum recommended standards for the operating system, processor, RAM, and the hard drive capacity. A. specifications B. programming instructions C. system requirements D. help files

C. system requirements

A video card is an expansion card installed inside your ______. A. Monitor B. VGA hookup C. system unit D. video memory

C. system unit

All of the following are features of the most popular Web browsers, EXCEPT ______. A. tabbed browsing B. pinned browsing C. tacked browsing D. tear-off tabs

C. tacked browsing

Network architectures are classified according to _______. A. the distance between the hub and the router B. the bandwidth supplied by the connection C. the way in which they are managed and the distance between their nodes D. the speed at which they processor runs

C. the way in which they are managed and the distance between their nodes

All of the following are considered cybercrimes, EXCEPT ____. A. identity theft B. non-delivery of merchandise C. theft of a cell phone D. hacking

C. theft of a cell phone

All of the following are true about real-time operating systems (RTOS), EXCEPT _______. A. they are also called embedded systems B. they are programs with specific purposes C. they require significant user interaction D. they are written specifically for the needs of the de

C. they require significant user interaction

FORTRAN, C++, and Java are all ________-generation languages. A. first B. second C. third D. fourth

C. third

Ring networks use the ________ method avoid data collisions. A. packet screening B. active-check C. token D. passive-check

C. token

An integrated development environment (IDE) is a ________. A. program that helps interpret code B. tool that helps programmers as they enter program code, highlighting keywords and alerting them to typos C. tool that helps programmers write and test their programs D. program that translates code into binary 1s and 0s, ignores comments, and helps programmers input correct, appropriate code

C. tool that helps programmers write and test their programs

Display screens that respond to commands initiated with your finger or a stylus are called ______. A. touch pads B. track points C. touch screens D. track screens

C. touch screens

6. The most popular transmission media option for wired Ethernet networks is __________. A. fiber-optic cable B. power-line cable C. unshielded twisted-pair (UTP) cable D. coaxial cable

C. unshielded twisted-pair (UTP) cable

All of the following are tips for a great presentation, EXCEPT ______. A. limit bullet points per slide to four to six B. use images to convey a thought or illustrate a point C. use a variety of animations on most slides D. keep the font size large enough to be read from the back of the r

C. use a variety of animations on most slides

All the following are tips for professional e-mail etiquette EXCEPT: A. be concise to the point B. use spell-checker and proofread before sending C. use abbreviations such as "u", "r", and "BRB" to make the email shorter. D. include a meaningful subject line

C. use abbreviations such as "u", "r", and "BRB" to make the email shorter

Multimedia software includes all of the following, EXCEPT _______. A. image-editing software B. animation software C. utility software D. audio-editing software

C. utility software

A ________ is an expansion card that's installed inside the system unit to translate data into images. A. graphic processing unit B. audio card C. video card D. memory card

C. video card

The process of optimizing RAM storage by borrowing hard drive space is called _____. A. Thrashing B. swap file C. virtual memory D. page file

C. virtual memory

A data ________ is a large-scale electronic repository of data that contains and organizes all of an organization's data in one place. A. mart B. chain C. warehouse D. storehouse

C. warehouse

A ________ is a Microsoft office feature that walks you through steps to complete a complicated task. A. template B. macro C. wizard D. function

C. wizard

The appropriate software to use for creating research paper is _____. A. spreadsheet software B. presentation software C. word processing software D. database software

C. word processing software

All of the following are a type of e-commerce business, EXCEPT ________. A. B2C B. B2B C. C2C D. C2B

C2B

________ provides a methodology by which a browser can request that a program file be run rather than just being delivered to the browser.

CGI

CHAPTER 7

CHAPTER 7

The control unit is one component of the ________.

CPU

________ allow developers to create formatting templates that organize and combine the attributes of objects on a Web page.

Cascading style sheets

Which of the following UTP cable types is the cheapest and often used in home networks?

Cat 5E

Which of the following is NOT a type of UTP cable you would use in a wired Ethernet home network? A. Cat 5E B. Cat 6 C. Cat 6A D. Cat 7B

Cat 7B

A. a new class can automatically pick up all of the data and methods of an existing class B. defined by information and actions C. the ability to apply classes from other projects to a new project D. another term for a behavior E. another term for information

Class B Data E Inheritance A Method D Reusability C

Companies use a software program on their Web sites to capture information about each click that users make as they navigate through the site. This data is referred to as _____.

Clickstream data

Which of the following is NOT a common network topology? A. Star B. Cluster C. Bus D. Ring

Cluster

The concept of the Internet was developed in response to the ________ War.

Cold

Ensures that all fields defined as required have data entered in them

Completeness Check

engineers to create models

Computer-aided design software is used primarily by:

A ________ check compares the values of data in two or more fields to see whether those values are reasonable

Consistency

Compares the values of data in two or more fields to see if these values are reasonable

Consistency Check

Which of the following statements about cookies is NOT true? A. Cookies obtain your personal information by searching your hard drive. B. Cookies are text files. C. Cookies help companies determine the traffic flow through their Web site. D. Some companies sell the personal information found in cookies to other companies.

Cookies obtain your personal information by searching your hard drive.

Which of the following is NOT one of the four main operations of a DBMS? "Creating databases and entering data" "Extracting (or querying) data" "Viewing (or browsing) and sorting (or indexing) data" "Creating a data dictionary"

Creating a data dictionary

proprietary

Custom software, developed to address the needs of a specific company, is known as ________ software.

PROLOG is an example of a ________. A) 2GL B) 3GL C) 4GL D) 5GL

D) 5GL

Which of the following is FALSE about servers? A) Servers are the workhorses of the client/server network. B) Servers interface with many different network users. C) A file server stores and manages files for a network. D) All networks require at least two servers

D) All networks require at least two servers

Which of the following is NOT an advantage of using networks as compared to a stand-alone computer? A) Enable software sharing B) Facilitate knowledge sharing C) Enhanced communication capabilities D) Ease of maintenance and administration

D) Ease of maintenance and administration

Small Java-based programs are called ________.

D) Java applets

________ is a powerful programming language used to build a wide range of Windows applications.

D) Microsoft Visual Basic

________ is the process of translating a task into a series of commands that a computer will use to perform that task.

D) Programming

________ is the instructions programmers have written in a higher-level language. A) Executable code B) Base code C) Compiled code D) Source code

D) Source code

During which phase of the system development life cycle are flowcharts and data-flow diagrams developed?

D) design

A ________ is a visual diagram of a process, including the decisions that need to be made along the way. A) structure chart B) Gantt chart C) data-flow diagram D) flowchart

D) flowchart

In object-oriented programming, ________ allows a new class to automatically pick up all the data and methods of an existing class.

D) inheritance

The two main types of decision points are the binary decision and the ________.

D) loop

The maximum memory you can install using the 64-bit version of Windows 8 Pro is ____ GB. A. 4 B. 16 C. 176 D. 192

D. 192

4. The internet is ______. A. an internal communication system for a business B. a communication system for the U.S. government C. the same as the Web D. A large network of networks

D. A large network of networks

UNIX was developed by Ken Thompson and Dennis Richie who worked at _____. A. IBM B. Microsoft C. Xerox D. AT&T's Bell Labs

D. AT&T's Bell Labs

All of the following are a type of e-commerce business, EXPECT _____. A. B2C B. B2B C. C2C D. C2B

D. C2B

_____ provides a methodology by which a browser can request that a program file be run rather than just being delivered to the browser. A. PGP B. ACK C. POP D. CGI

D. CGI

_______ allow developers to create formatting templates that organize and combine the attributes of objects on a Web page. A. HTML tags B. Applets C. Key pairs D. Cascading style sheets

D. Cascading style sheets

Which of the following is NOT a type of UTP cable you would use in a wired Ethernet home network? A. Cat 5E B. Cat 6 C. Cat 6A D. Cat 7B

D. Cat 7B

5. ________ is software that takes an existing Internet connection and turns it into a wireless hotspot. A. Netify B. Multiply C. Mobilefy D. Connectify

D. Connectify

Which of the following is NOT a typical disadvantage associated with databases? A. Databases can be expensive to set up. B. Databases are usually more complex to administer. C. Databases are more complex to construct. D. Database information cannot be changed once it is entered.

D. Database information cannot be changed once it is entered.

Which of the following is the first stage of the program development life cycle (PDLC)? A. Making the plan B. Coding C. Writing the plan D. Describing the problem

D. Describing the problem

Which of the following statements concerning IP addresses is TRUE? A. Static IP addresses change often B. Dynamic IP addresses are assigned manually by a network administrator C. ISPs must maintain a pool of IP addresses for all their subscribers D. Dynamic addressing is normally handled by DHCP.

D. Dynamic addressing is normally handled by DHCP.

In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of _______. A. Eight bytes B. Eight kilobytes C. Eight characters D. Eight bits

D. Eight Bits

_______ interference is a type of signal interference in wired transmission media that can be caused by fluorescent lights or machinery with motors or transformers. A. Radio frequency interference B. Transitional C. Crosstalk D. Electromagnetic

D. Electromagnetic

All of the following are examples of educational and reference software EXCEPT _____. A. Test Preparation B. Trip planning C. Genealogy D. EverQuest

D. EverQuest

Which transmission medium transmits data the fastest? A. Twisted-pair cable B. Coaxial cable C. Wireless D. Fiber-Optic cable

D. Fiber-Optic cable

All of the following are names for a flash drive, EXCEPT ______. A. Jump drive B. USB drive C. Thumb drive D. Hard drive

D. Hard drive

Which is NOT a networking protocol? A. Apple File Protocol (AFP) B. NetBios Extended User Interface (NetBEUI) C. Internet Packet Exchange (IPX) D. HyperText Transfer Protocol (HTTP)

D. HyperText Transfer Protocol (HTTP)

The Web is based on the _________ Protocol. A. Hypertext Transfer B. Hypertext Trade C. Hypertext Transmit D. Hypertext Translate

D. Hypertext Transfer

A(n) _________ address is the address external entities use to communicate with your network. A. AL B. MAC C. WI D. IP

D. IP

_______ is an IP addressing scheme that uses 128-bit addressing. A. IPS B. IP128 C. IPv4 D. IPv6

D. IPv6

_____ is the ability of two or more people to chat over the Internet in real time. A. VoIP B. Texting C. Remote handshaking D. Instant messaging

D. Instant messaging

Which of the following is NOT true about data? A. It represents a fact, a figure, or an idea. B. It can be a number, a word, or a picture. C. It can be a recording of sound. D. It has been organized or presented in a meaningful way.

D. It has been organized or presented in a meaningful way.

Small Java-based programs are called __________. A. Java classes B. JSPs C. JavaScripts D. Java applets

D. Java applets

In public-key encryption, two keys, known as a ______ are created--one for coding--one for decoding. A. Code keys B. Public/private keys C. Keytags D. Key pair

D. Key Pair

What is another name for the physical address assigned to each network adapter? A. Network Access Control (NAC) B. Physical Address Control (PAC) C. Network Physical Address (NPA) D. Media Access Control (MAC)

D. Media Access Control (MAC)

______ is a Web-based universal chat service that lets you communicate with users on a variety of IM services from an computer without having to install a special program, A. Trillian B. Digsby C. AIM D. Meebo

D. Meebo

The top three operating systems for personal computers are_____. A. Microsoft Windows, Mac OS X, and Android 3.0 B. Mac OS X, Android 3.0, and UNIX C. Microsoft Windows, Android 3.0, and Linux D. Microsoft Windows, Mac OS X. and Linux

D. Microsoft Windows, Mac OS X. and Linux

XO is the name of the computer provided by the ______ initative. A. IT Beta B. Computers for All C. Digikid D. One Laptop per Child

D. One Laptop per Child

A ______ is a network used by one person connected via wireless media. A. WAN B. LAN C. MAN D. PAN

D. PAN

Individual Internet users enter an ISP through a(n) _________. A. NAP B. T line C. Optical Carrier (oc line) D. Point of Presence (POP)

D. Point of Presence (POP)

The "fathers" of the internet are Vinton Cerf and _______. A. Robert Cailliau B. Tim Berners-Lee C. Bill Gates D. Robert Kahn

D. Robert Kahn

________ are often equipped to act as hardware firewalls. A. Repeaters B. Switches C. Jammers D. Routers

D. Routers

All of the following are procedures you can follow ensure your system performs reliably, EXCEPT ____. A. Run the Disk Defragmenter B. Run spyware and adware removal programs C. Install a reliable antivirus package D. Run key utilities only when you can observe the process

D. Run key utilities only when you can observe the process

The number of pixels displayed on the screen is known as _____. A. contrast ratio B. aspect ratio C. brightness resolution D. screen resolution

D. Screen Resolution

Using the Web to communicate and share information with our friends and others is known as _____. A. emailing B. friend networking C. instant messaging D. social networking

D. Social Networking

_________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet. A. Adware B. Malware C. Shareware D. Spyware

D. Spyware

______ software is the software that helps run the computer and coordinate instructions between the computer and the hardware devices. A. Application B. Recovery C. Backup D. System

D. System

What type of computer is the Apple iPad? A. Notebook B. Netbook C. Tablet PC D. Tablet computer

D. Tablet Computer

You can use the Windows _______ to check on a nonresponsive program. A. System restore B. Backup utility C. Explorer D. Task Manager

D. Task Manager

The unique address for a particular Web site is the ______. A. protocol B. domain name C. path D. URL

D. URL

All of the following are terms related to part of the boot process, EXCEPT A. ROM B. BIOS C. RAM D. USB

D. USB

The _____ of the operating system enable the user to communicate with the computer system. A. Window B. Modem C. Network adapter card D. User interface

D. User interface

______ is a consortium of organizations that develops Web protocols and sets standards. A. IETF B. ISOC C. Internet Society D. W3C

D. W3C

Software that enables you to display and interact with text and other media on the Web is a _______. A. client B. server C. client/server network D. Web browser

D. Web browser

______ uses continuous audio and video feeds. A. Podcasts B. Wikis C. Instant messaging D. Webcasts

D. Webcasts

In databases, information is organized in _______. A. tables B. records C. fields D. all of the above

D. all of the above

All of the following are the main functions of antivirus software, EXCEPT _______. A. Looking for virus signatures B. quarantining viruses C. inoculating key files D. assassinating all viruses

D. assassinating all viruses

Facial recognition is an example of ________ authentication. A. access B. photo C. verification D. biometric

D. biometric

The intersection of a row and a column in a spreadsheet program is known as a _______. A. label B. formula C. function D. cell

D. cell

All of the following are top cybercrimes reported to IC3 in 2011, EXCEPT __________. A. Identity Theft B. non-auction/non-delivery of merchandise C. advance fee fraud D. child pornography

D. child pornography

MS-DOS first used a(n) _______ interface. A. menu-driven B. graphical-user C. event-driven D. command-driven

D. command-driven

A database schema is also called a(n)____. A. information system B. summary report C. relation D. data dictionary

D. data dictionary

Classification, affinity grouping, and estimation are _________ methods used by managers to make their data more meaningful. A. modeling B. staging C. artificial intelligence D. data mining

D. data mining

In object-oriented programming, ________ allows a new class to automatically pick up all the data and methods of an existing class. A. reusability B. regression C. compilation D. inheritance

D. inheritance

The cell address C5 indicates that the cell ______. A. contains a label values of "C5" B. is at row C, column 5 of the worksheet C. is used in a formula involving the value "C5" D. is at column C, row 5 of the worksheet

D. is at column C, row 5 of the worksheet

In a network that uses the star topology, the signal that is sent to indicate a signal collision is called a ____. A. hit B. crash C. stop D. jam

D. jam

A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT _______. A. use your debit card information to purchase items illegally B. assume your identity C. steal your logon and passwords for various accounts D. launch a denial of service (DoS) attack on your computer

D. launch a denial of service (DoS) attack on your computer

All of the following are ways that can infect your computer with a virus, EXCEPT _________. A. sharing flash drives B. downloading video files from peer-to-peer sites C. downloading or running an e-mail attachment file D. logging into e-mail

D. logging into e-mail

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as __________. A. packet filtering B. packet switching C. static addressing D. logical port blocking

D. logical port blocking

The small circuit boards that hold a series of RAM chips are called _______. A. flash memory cards B. expansion cards C. virtual memory D. memory modules

D. memory modules

The amount of RAM that is actually on the memory modules in your computer is the _____ memory. A. virtual B. nonvolatile C. permanent D. physical

D. physical

All of the following are types of multimedia and entertainment software, EXCEPT ______. A. digital audio software B. gaming software C. drawing software D. productivity software

D. productivity software

An editor is a ________. A. program that helps compile code B. tool that helps programmers as they enter program code, highlighting keywords and alerting them to typos C. tool that helps programmers write and test their programs D. program that translates code into binary 1s and 0s, ignores comments, and helps programmers input correct, appropriate code

D. program that translates code into binary 1s and 0s, ignores comments, and helps programmers input correct, appropriate code

7. All of the following involve tasks for network administration, EXCEPT ________. A. installing new computers and devices on the network B. updating and installing new software on the network C. setting up proper security for a network D. purchasing initial equipment for the network

D. purchasing initial equipment for the network

A(n) __________ is a way of retrieving information from one or more table that defines a particular subset of data. A. validation rule B. field constraint C. enquiry D. query

D. query

Robotic cameras used by television stations for sports events require a ______ operating system. A. single-user, single-task B. single-user, multitask C. multiuser D. real-time

D. real-time

Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network. A. viewing B. Browsing C. filtering D. screening

D. screening

2. All of the following are benefits of networks EXCEPT, _________. A. sharing an Internet connection B. sharing printers and other peripherals C. sharing files D. sharing an operating system

D. sharing an operating system

A subset of e-commerce that uses social networks to assist in marketing and purchasing products is known as _____. A. Social businesses B. social shopping C. social enterprise D. social commerce

D. social commerce

A(n) ______ is an input device that looks like a pen. A. joystick B. e-pen C. pointer D. stylus

D. stylus

In a database, a group of related records is called a(n) ________. A. memo B. field C. object D. table

D. table

Cache memory levels are defined by ______. A. the amount of storage space on chip B. the physical size of the chip C. the speed of the chip D. the chip's proximity to the CPU

D. the chip's proximity to the CPU

All of the following are used to classify network architectures, EXCEPT _____________. A. the distance between nodes B. the protocol used to exchange data between nodes C. the communication medium used to transport data D. the number of nodes on the network

D. the number of nodes on the network

A _____ is a virus that is triggered on a certain date. A. worm B. script C. logic bomb D. time bomb

D. time bomb

The root servers know the location of all DNS servers that contain the master listings for an entire ______. A. IP address B. subdomain C. Web site D. top-level domain

D. top-level domain

The _____ of the operating system enables the user to communicate with the computer system. A. window B. modem C. network adaptor card D. user interface

D. user interface

A(n) _______ is a small program that performs general housekeeping tasks for your computer. A. operating system B. user interface C. application software D. utility program

D. utility program

Software designed for specific industry is known as _____. A. multimedia B. general business C. project management D. vertical market

D. vertical market

In a _________ system, each step is dependent on the previous step being completed first. A. top-down B. rapid development C. bottom-up D. waterfall

D. waterfall

The current version of wireless Ethernet is ______. A. 802.11m B.802.11g C.802.11p D.802.11n

D.802.11n

Application software specifically designed to interact with the user to capture and analyze data

DBMS

In most current systems ________ is the type of RAM used.

DDR3

A(n) ________ server takes a pool of IP addresses and shares them with hosts on the network on an as-needed basis.

DHCP

The protocol using port 53 is ________.

DNS

Data contained in the database is accurate and reliable

Data Integrity

All of the following are advantages of using a database except _____. "Maintaining Data Integrity" "Data Redundancy" "Flexible Use of Data" "Information Sharing"

Data Redundancy

Occurs when there is duplicate information in tables

Data Redundancy

Indicates what type of data can be stored in the field

Data Type

___________ is the process of ensuring that data entered into a database is correct (or at least reasonable) and complete.

Data Validation

________ helps to ensure data integrity by maintaining information in only one place.

Data centralization

true

Data is the raw input that users have at the start of a job.

_______ ________ are a way of breaking down large data warehouses into smaller, more manageable pieces.

Data marts

What is important to remember when designing a database? "Data redundancy leads to wasted time and increased errors. Design your database to avoid redundancy" "Formatting is as important as data layout" "To design a database, a person must know a programming language such as SQL" "Databases are appropriate for maintaining small amounts of data but not so much for large amounts")

Data redundancy leads to wasted time and increased errors

Collection of related data that can be easily stored, sorted, organized, and queried

Database

DBMS stands for ___________

Database management system .

The process of running a program over and over to find errors and make sure the program behaves in the way it should is known as ________.

Debugging

________ is the process of identifying and removing errors in programming code.

Debugging

Helps managers develop solutions for specific problems

Decision Support System

If all students at a college were from New Jersey, the "State" field could be set to a _____. "Test Value" "Foreign Key" "Default Value" "Standard Value"

Default Value

__________ are the values the database uses for the field unless the user enters another value.

Default Values

In the ________ step of the system development life cycle, a detailed plan is generated for the programmers to follow.

Design

Which of the following Windows utility programs arranges files on your hard drive in sequential order?

Disk Defragmenter

develop and documentation

During which phase of the system development life cycle are flowcharts and data-flow diagrams developed?

Which of the following statements concerning IP addresses is TRUE? A. Static IP addresses change often. B. Dynamic IP addresses are assigned manually by a network administrator. C. ISPs must maintain a pool of IP addresses for all of their subscribers. D. Dynamic addressing is normally handled by DHCP.

Dynamic addressing is normally handled by DHCP.

Broad-based software systems that integrate multiple data sources and tie together the various processes of an enterprise to enable information to flow more smoothly

Enterprise Resource Planning System

A(n) ________ program is the binary sequence that has been translated from source code by a compiler for use by the CPU.

Executable

________ involves putting data into an electronic file in a format that another application can understand.

Exporting

Notebooks are often equipped with a(n) ________ slot that allows you to read flash memory cards such as CompactFlash, Memory Sticks, and Secure Digital cards.

ExpressCard

The acronym XML stands for ________.

Extensible Markup Language

(True/False) A data warehouse includes data that pertains to just one period in time

FALSE

(True/False) All of the data in a relational database is stored in the same table

FALSE

(True/False) All related data , even simple tasks, should be housed in a database to create organized information

FALSE

(True/False) Data integrity means that the data contained in a database is safe from hackers and corrpution

FALSE

(True/False) Data mining is the process by which great amounts of data are normalized

FALSE

(True/False) Forecasting allows managers to assign a value, based on some criterion, to data

FALSE

(True/False) Primary keys have to be numbers that are already contained in the database

FALSE

(True/False) Small slices of a data warehouse are called data mines

FALSE

(True/False) There are no disadvantages associated with using databases

FALSE

(True/False) Transaction processing means that transaction data is accumulated until a certain point is reached, and then a number of transactions are processed all at once

FALSE

3D sound cards are bidirectional.

FALSE

3D sound is the same as surround sound.

FALSE

A P2P network needs network operating system software installed on every node.

FALSE

A network-ready device is a device that might be attached to a network but still has to connect to a networked computer first.

FALSE

A switch is a network navigation device that merely retransmits a signal to all other nodes attached to it.

FALSE

A tiled window cannot be resized.

FALSE

Accessing data from the hard drive to send to the CPU is faster than accessing data from RAM.

FALSE

All computers do not need an operating system.

FALSE

An attribution license allows anyone to use, modify, and copy your work, but only for noncommercial purposes.

FALSE

CMOS is a special kind of memory that uses a great deal of power.

FALSE

Cache memory is a form of ROM.

FALSE

Cell phones do not require special service providers to connect to the Internet.

FALSE

Current cell phones and smartphones feature cameras that are just as powerful as stand-alone digital cameras.

FALSE

Current wireless Ethernet networks in the United States are based on the IEEE 802.3 standard.

FALSE

Ethernet networks are always connected using twisted-pair cable technology.

FALSE

Flash memory is volatile.

FALSE

In a peer-to-peer network, one computer acts as the server.

FALSE

It is not possible to configure a client/server network for home use.

FALSE

Level 1 cache memory always contains more storage area than Level 2 cache.

FALSE

Limiting your signal range does not help increase wireless network security.

FALSE

MAN stands for mobile area network.

FALSE

MP3 files can be played only on iPods

FALSE

Moore's Law predicts that the number of transistors inside a CPU will triple every 18 months.

FALSE

Notebook and desktop processors are basically the same and therefore interchangeable.

FALSE

One of the advantages of VoIP is that an interruption in power does not interrupt the ability to make calls.

FALSE

P2P networks are more commonly used in small businesses than in homes

FALSE

RAM is nonvolatile storage.

FALSE

RAM is stored directly on the CPU.

FALSE

RAM is your computer's permanent storage space for data that is entered from the keyboard.

FALSE

Safe boot is a special diagnostic mode designed for troubleshooting errors that occur during the boot process.

FALSE

The Apple iPhone uses a Microsoft operating system.

FALSE

The Mac OS does NOT support P2P networking.

FALSE

The Microsoft Video file format uses an extension of .mpg.

FALSE

The combination of a computer's operating system and application software is referred to as the computer's platform.

FALSE

The conversion rate is the number of times per second music is measured and converted into a digital value.

FALSE

The cost of a P2P network is slightly greater than the cost of a client/server network.

FALSE

The percentage of time that your CPU is working is referred to as processing time.

FALSE

The video subsystem is made up of the video card and speakers.

FALSE

There are more virus attacks on cell phone and smartphones than there are on PCs.

FALSE

Thunderbolt can carry three channels of information on the same connector.

FALSE

Tiles view is the most interactive view of a Windows folder.

FALSE

Twisted-pair cable is made up of plastic or glass fibers that transmit data at extremely fast speeds.

FALSE

Upgrading your CPU can increase how quickly data can move to or from the CPU.

FALSE

WEP is a stronger form of security than WAP.

FALSE

When virtual memory is in use, the condition of excessive paging is called swapping.

FALSE

When your computer runs out of RAM, the operating system borrows space from the CPU.

FALSE

You can send messages that include text, sound, images, and video clips using SMS.

FALSE

If you regularly download and upload files, chances are that you are using ________.

FTP

T/F A data-flow diagram provides a visual representation of an algorithm.

False

T/F An information system is the set of steps that needs to be followed to ensure that software development proceeds in an orderly fashion.

False

T/F During the program debugging stage, the software is tested by the people who will use the program.

False

T/F PROLOG is an example of a fourth-generation programming language.

False

T/F Programming languages are often classified in groups called eras.

False

T/F Syntax errors are caught only at runtime.

False

T/F Third-generation languages use a set of short, English-like commands that speak directly to the CPU.

False

T/F int, float, char, and bool are examples of operators.

False

A category of information in a database table

Field

Another name for the primary key is the key _____

Field

________ size defines the maximum number of characters or digits that a particular field can hold.

Field

Property that must be satisfied for an entry to be accepted into the field

Field Constraint

Defines the maximum number of characters or numbers that a field can hold

Field Size

The name of the free Internet browser from Mozilla is ________.

Firefox

machine

First-generation languages are known as ________ languages.

false

First-generation programming languages use symbols and commands to help programmers tell the computer what to do.

design

Flowcharts and data flow diagrams are used during which step of the SDLC?

________ are shortcut keys that you press to perform special tasks; each software application has its own set of tasks assigned to these keys.

Function keys

The amount of RAM recommended for most systems today is measured in ________.

GB

Two types of video memory are ________.

GDDR3 and GDDR5

________ is a special copyleft license used for software.

GNU

A ________ performs the same kind of computational work that a CPU performs but is specialized to handle 3-D graphics and image and video processing.

GPU

________ are easy-to-use mini desktop programs that give you information at a glance or quick access to frequently used tools including weather information, calendar items, or games.

Gadgets

Which of the following is NOT an example of an instant messenger service? A. GoogleTalk B. Windows Live Messenger C. Jabber D. Google Docs

Google Docs

Which of the following is NOT an example of an instant messenger service? A. Google Talk B. Windows Live Messenger C. Jabber D. Google Docs

Google Docs

A visual search engine that uses pictures from our smartphone to search the Web for more information is known as ________.

Google Goggles

In a database, an object field is used for storing __________. "Variable-length text and numbers" "Graphics and audio content" "Fixed-length text and numbers" "Data about physical objects such as computers"

Graphics and audio content

A ________ is a network located in your home that connects to all your digital devices.

HAN

A ________ is a network located in your home that is used to connect all of your digital devices.

HAN

________ is a single cable that carries all audio and video information from devices connected to a TV to the TV itself.

HDMI

false

HTML and XHTML are NOT programming languages.

Special symbols called tags are used in which of the following languages?

HTML/XHTML

Which is NOT a networking protocol?

HyperText Transfer Protocol (HTTP)

Which is NOT a networking protocol? A. Apple File Protocol (AFP) B. NetBIOS Extended User Interface (NetBEUI) C. Internet Packet Exchange (IPX) D. HyperText Transfer Protocol (HTTP)

HyperText Transfer Protocol (HTTP)

________ provides high-speed information processing by enabling a new set of instructions to start before the previous set has been finished.

Hyperthreading

________ is the organization responsible for the Internet's domain name system and IP address allocation.

ICANN

A(n) ________ address is a unique number that identifies a computer, server, or device connected to the Internet.

IP

________ is an IP addressing scheme that uses 128-bit addressing.

IPv6

________ printers have tiny hammer-like keys that strike the paper through an inked ribbon.

Impact

Which of the following is NOT a main operation of a database management system (DBMS)? A. Creating databases and entering data B. Implementing data mining C. Viewing and sorting data D. Outputting data

Implementing data mining

waterfall

In a ________ system, each step is dependent on the previous step being completed first.

In a database, ________ fields store numbers used to perform calculations.

In a database, ________ fields store numbers used to perform calculations.

record

In a database, a collection of related fields is a(n) ________.

field

In a database, a(n) ________ is a data category such as "First Name" or "Street Address."

formulas

In a spreadsheet, equations you build yourself using values and cell references are called:

inheritance

In object-oriented programming, ________ allows a new class to pick up all the characteristics of an existing class.

data and methods

In object-oriented programming, each object from a given class is described by its

derived

In object-oriented terms, a new, modified class is called a(n) ________ class.

values

In spreadsheet software, ________ are the numerical data that represents a quantity or an amount and are often the basis for a calculation.

analysis

In the ________ phase, the problem is explored in depth and program specifications are developed.

maintenance and evaluation

In the ________ step of the system development life cycle (SDLC), the system's performance is monitored to determine if it meets the needs of the end user.

problem statement

In the program development life cycle, the ________ is a clear description of what tasks the computer must accomplish and how a program will execute these tasks and respond to unusual situations.

insurance

In which industries is COBOL still commonly used?

A(n) ________ language is executed one line at a time, as each line is translated.

Interpreted

Which of the following is NOT a function of the operating system?

It manages the removal of spyware

Which of the following is something a network adapter does NOT do? A. It uses high-powered signals so data can move easily over network transmission media. B. It allows or denies access to the computer in which it is installed. C. It verifies that all information transmitted from the computer is correctly received by the recipient. D. It breaks down data and puts it into packets.

It verifies that all information transmitted from the computer is correctly received by the recipient.

Which of the following is something a network adapter does NOT do? A. It uses high-powered signals so data can move easily over network transmission media. B. It allows or denies access to the computer in which it is installed. C. It verifies that all information transmitted from the computer is correctly received by the recipient. D. It breaks down data and puts it into packets.

It verifies that all information transmitted from the computer is correctly received by the recipient.

Which of the following statements is NOT true about the JPEG file format?

JPEGs are larger than raw files

When you want to extract data from two or more tables, you can use a(n) _____ query

Join

The primary key is a unique field also referred to as _____.

Key Field

control structures

Keywords in a programming language that allow the programmer to redirect the flow of the program based on a decision are called

Which of the following is not a category of information systems? "Management Information System" "Office Support System" "Knowledge-Based System" "Transaction Processing System"

Knowledge-Based System

Which of the following is NOT an example of a WAN?

LANs connected in a single building

The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.

MAC

A large network designed to provide access to a specific geographic area, such as a large city is a ________.

MAN

Which of the following was the first widely used operating system installed in personal computers?

MS-DOS

Which of the following was the first widely used operating system installed in personal computers?

MS-Dos

Which of the following is a single-user, multitask operating system?

Mac OS

The Apple iPhone uses a version of ________ as an operating system.

Mac OS X

First-generation languages are known as ________ languages.

Machine

Apple developed ________ Mouse, which is the first multitouch wireless mouse.

Magic

Information system that produces management reports

Management Information System

All of the following are part of the process of data staging for a data warehouse except _____. "Storage" "Extraction" "Transformation" "Normalization"

Normalization

The process of eliminating data redundancy by ensuring that tables in a database pertain to a single topic is called _____.

Normalization

Confirms that only numbers are entered in the field

Numeric Check

The newest cell/smartphone displays are ________, which allow bright, sharp imaging and draw less power.

OLED

Databases that contain not only data, but also methods of processing or manipulating that data are called ____________ databases.

Object-Oriented

Designed to assist employees in accomplishing their day-to-day tasks and to improve communications

Office Support System

A(n) ________ is designed to improve communications and assist employees in accomplishing their daily tasks.

Office Support System (OSS)

XO is the name of the computer being provided by the ________ project.

One Laptop per Child

A _____ relationship indicates that for each record in a table, there is only one corresponding record

One-to-Many

Transaction processing done in real time

Online Transaction Processing

The most essential software in your computer system is the ________.

Operating System

Information is most closely related to which of the following?

Output

A ________ is a network used by one person connected via wireless media.

PAN

A network used to communicate among devices close to one person is called a ________.

PAN

5th

PROLOG (PROgramming LOGic) is an example of a ________ generation language.

In a(n) ________ network, each node connected to the network communicates directly with every other node.

Peer-to-peer

________ networks do not require a dedicated server.

Peer-to-peer

Which of the following is the largest unit of measure for the size of a computer file?

Petabyte

Which of these statements about physically protecting your computer is FALSE?

Power surges can be blocked by using a computer surround

Which of these statements about physically protecting your computer is FALSE? A. The computer should sit on a flat level surface. B. Power surges can be blocked by using a computer surround. C. It is best to unplug computers during an electrical storm. D. Old surge protectors can deliver power to your computer without protecting it.

Power surges can be blocked by using a computer surround.

Each record must have a unique field called a(n) ________ field.

Primary Key

service

Problems discovered after the commercial release of a program are generally addressed by downloadable software updates, also known as ________ packs.

A. data expected to be provided B. rules for transforming the input into output C. information expected to be produced D. starting point of programming work E. violation of the strict, precise set of rules that define a language

Processing B Problem Solving D Inputs A Syntax Error E Outputs C

comments

Programmers can insert ________ into program code to clarify sections of code.

________ is the process of translating a task into a series of commands that a computer will use to perform that task.

Programming

The standard keyboard is known as the ________ keyboard.

QWERTY

SQL is a(n) __________. "Type of database architecture" "Query Language" "Application Programming Language" "Relational database program"

Query Language

All of the following can be used for backing up data files EXCEPT:

RAM

________ is the abbreviation for the place in the computer where the programs and data the computer is currently using are stored.

RAM

Kernel memory is ________.

RAM memory used by the operating system

The basic input/output system is stored on a ________ chip.

ROM

The operating system of a cell phone is stored in ________.

ROM

Ensures that data entered into the database falls within a certain span of numbers

Range Check

Podcasts deliver their content using ________.

Really Simple Syndication

Which of the following is NOT type a of management information system (MIS) report?

Redundancy

Which of the following is NOT type a of management information system (MIS) report? A. Detail B. Summary C. Redundancy D. Exception

Redundancy

false

Regeneration allows programmers to easily reuse existing classes from other projects, enabling them to quickly produce new code.

____________ databases are characterized by logical linkages between tables via primary and foreign keys.

Relational

A(n) ____________ organizes data in table format by logically grouping similar data into relations (or tables that contain related data).

Relational Database

Which protocol is used to transmit e-mail over the Internet?

SMTP

In Access, the Simple Query Wizard uses ________ to create a query.

SQL

A(n) ________ uses the same kind of memory that flash drives use and have no spinning platters or motors.

SSD

false

Second-generation languages use a sequence of bits-1s and 0s.

Transport Layer Security (TLS) and ________ are two protocols that provide data integrity and security for Internet transmission.

Secure Sockets Layer

All of the following are benefits of networks EXCEPT, ________. A. sharing an Internet connection B. sharing printers and other peripherals C. sharing files D. sharing an operating system

Sharing an operating system

java applets

Small Java-based programs are called

vertical market

Software designed for a specific industry is known as ________ software.

application software

Software that lets you do tasks at home, school, and work is called:

All of the following are media management software used to organize music, video, and pictures, EXCEPT ________. A. Windows Media Player B. Sony Sound Forge C. Apple iTunes D. Winamp

Sony Sound Forge

c++

Special symbols called tags are used in which of the following languages?

One virus called ________ is used to trick users into downloading an infected file to their phone, which steals online banking information.

Spyeye Mobile Banking

________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet.

Spyware

Which of the following is not a possible primary key? "Social Security Number" "Driver's License Number" "Street Address" "Student ID Number"

Street Address

Database query language

Structured Query Language

SQL stands for ________.

Structured Query Language

Provides a consolidated picture of detailed data

Summary Report

Windows uses a memory-management technique known as ________ to monitor which applications you use the most and preloads them into your system memory.

SuperFetch

All of the following can be considered to be network operating systems EXCEPT:

Symbian OS

A. sentences in programming code B. agreed-on set of rules defining how the language must be structured C. coding symbols that represent fundamental actions of a language D. specific words with predefined meanings in a programming language

Syntax B Statements A Data Types E Operators C Key words D

On a Windows system, you can determine the amount of RAM by looking in the ________ window.

System Properties

utility

System software includes the operating system and ________ programs that help manage resources

(True/False) "Data integrity" means that that data contained in the database is accurate and reliable

TRUE

(True/False) A consistency check compares the values of data in two or more fields in a database to see if these values are reasonable

TRUE

(True/False) A record is a group of related database fields

TRUE

(True/False) Almost all relational databases today use structured query language, or SQL

TRUE

(True/False) Data dictionary and database schema refer to the same thing

TRUE

(True/False) Data mining is the process by which large amounts of data are analyzed to spot otherwise hidden trends

TRUE

(True/False) Data redundancy in a database can result in a waste of data entry time, storage space, and processing time

TRUE

(True/False) Databases provide for data centralization

TRUE

(True/False) Databases, data warehouses, and data marts are integral parts of information systems because they store the information that makes information systems functional

TRUE

(True/False) If you are going to store a phone number as a 10-digit number with no formatting, then the number data type is appropriate for that field

TRUE

(True/False) Information systems are software-based solutions used to gather and analyze information

TRUE

(True/False) Many businesses mine data to understand their customers better

TRUE

(True/False) Object-oriented databases are adept at handling unstructured data such as audio clips, video clips, pictures, and extremely large documents

TRUE

(True/False) Precautions must be taken to guarantee that information entered into a database is in a useful format

TRUE

(True/False) Real-time processing means that the database is queried and updated while the transaction is taking place

TRUE

(True/False) The objective of an ERP is to accumulate all information relevant to running a business in a central location and make it readily available to whomever needs the information to make decisions

TRUE

(True/False) The two main advantages of multidimensional databases are that they can easily be customized to provide information to a variety of users (based on their need) and they can process data much faster than pure relational databases can

TRUE

(True/False) To establish a relationship between two tables, both tables must have a common field

TRUE

A Blu-ray burner will most likely record both CDs and DVDs.

TRUE

A client computer is the computer on which users accomplish specific tasks.

TRUE

A common-driven-interface is one in which you enter commands to communicate with the computer system.

TRUE

A computer's memory subsystem is made up only of RAM.

TRUE

A digital camera's resolution in measured in megapixels.

TRUE

A firewall can come in either software or hardware form.

TRUE

A microbrowser is a special Internet browser made for mobile devices.

TRUE

A multiuser operating system is also described as a network operating system.

TRUE

A printer connected to a wireless network is considered to be a node on that network.

TRUE

A single computer can function as both a client and a server, but performance will be degraded.

TRUE

A virtual phone number can be assigned to your cell phone or smartphone to keep your true number private.

TRUE

All desktop and notebook systems sold today are network ready

TRUE

Although 802.11n will work with 802.11g adapters, you will not achieve 802.11n data transfer rates unless all adapters are 802.11n.

TRUE

Boot Camp is a utility that allows you to run Windows and Mac OS X at the same time.

TRUE

Cell phones can fall victim to viruses.

TRUE

DRM-free music can legally be moved from system to system

TRUE

DRM-free music is music that has been released without any digital rights management.

TRUE

Every computer is designed with a maximum limit on the amount of RAM it can support.

TRUE

External hard drives are an ideal solution when you need more storage than a flash drive can provide.

TRUE

Full-featured GPS systems can play MP3 files, display photos, and connect to the Internet.

TRUE

Hard drive access time is measured in milliseconds.

TRUE

Hard drives have been growing in storage capacity by about 50 percent each year.

TRUE

Hard drives have the largest capacity of any storage device.

TRUE

If you install a device that is not PnP, you will be prompted to install a driver.

TRUE

In Safe mode, only the essential devices of the system function.

TRUE

Installing a device driver can sometimes cause system instability.

TRUE

It is generally better to extend your wired network using wireless technology than to use repeaters or splice cable.

TRUE

Level 2 cache is slightly farther away from the CPU than Level 1 cache or on a separate chip.

TRUE

Linux does not have a default user interface.

TRUE

Linux is an open source operating system that can be used both on personal computers and as a networking operating system.

TRUE

Live Icons allow you to preview the actual contents of a specific file or folder from within a window without actually having to open the file.

TRUE

MMS allows you to save all, none, or part of a message.

TRUE

MMS stands for Multimedia Message Service.

TRUE

Most computers today come with Ethernet adapters already installed.

TRUE

Netbooks are more powerful than cell phones and smartphones because they run a full-featured operating system.

TRUE

Not all PMP devices are necessarily just music players.

TRUE

PnP stands for Plug and Play.

TRUE

Raw files are larger than JPEG files.

TRUE

Saving a file as a JPEG actually means that you will lose a bit of detail.

TRUE

Solid state drives have no platters or motors.

TRUE

Some cell phones come equipped with a keyboard for faster typing of e-mail and text messages.

TRUE

Temporary data and instructions are not stored on the hard drive because it is faster to retrieve data from RAM.

TRUE

Text prediction algorithms provide a list of popular words and save typing time when using text messaging.

TRUE

The CPU is located on the motherboard.

TRUE

The High Contrast accessibility feature allows you to select a color scheme setting in which you control the contrast between text and background.

TRUE

The Internet is an example of a client/server network.

TRUE

The Windows Backup and Restore Utility allows you to make a duplicate copy of all the data on your hard drive.

TRUE

The amount of memory your video card needs depends on what you want to display on your monitor.

TRUE

The control unit coordinates the activities of all computer components except for the CPU itself.

TRUE

The most recent version of the Mac operating system is called Mac OS X.

TRUE

The practice of piggybacking is illegal in many places.

TRUE

The type of processor in the computer dictates which operating system a desktop uses.

TRUE

The use of multiple cores on one CPU chip allows the execution of two or more sets of instructions at the exact same time

TRUE

The user interface is part of a computer's operating system.

TRUE

There are digital cameras on the market that can play both music and videos.

TRUE

Upgrading your operating system to the newest version might help increase system reliability.

TRUE

Video cards often include their own RAM.

TRUE

VoIP can be considered an alternative to a traditional landline phone service.

TRUE

WML refers to the format used to create Web content for cell phones and smartphones.

TRUE

When a network is created to provide Internet access to a specific geographic area, that network will generally be designated as a MAN.

TRUE

When converting analog waves to digital waves, the higher the sampling rate, the more accurately the original wave can be re-created.

TRUE

When using Windows, you should create a restore point before installing new software.

TRUE

Windows 7 will run with 1 GB of RAM, but the system might be challenged by limited resources, especially with graphic-intensive programs.

TRUE

Wireless networks are more vulnerable to attack than wired networks.

TRUE

With the Plug and Play standard, adding hardware to your computer becomes easier.

TRUE

With video editing software, you can review video clips frame by frame.

TRUE

You can download a version of Linux from the Internet for free.

TRUE

You can use System Restore to restore your system's settings back to a specific date when everything was working properly.

TRUE

You can use the Windows ________ to check on a nonresponsive program.

Task Manager

If you want to automatically defragment your hard drive every week, you can set a predetermined time using the ________.

Task Scheduler

________ is the use of equipment to provide voice communications over a distance.

Telephony

Which of the following is the first step in the boot process?

The BIOS is activated by powering on the CPU

Which of the following does NOT occur during the power-on self-test?

The OS is moved into RAM

Which of the following does NOT occur during the power-on self-test? A. The video card and video memory are tested. B. The OS is moved into RAM. C. The BIOS is identified. D. Memory is tested.

The OS is moved into RAM

portability

The ability to create programs with higher-level programming languages that can be moved from one type of computer to another is called:

extensible markup language

The acronym XML stands for ________.

Which of the following statements concerning IPv4 addresses is FALSE?

The addresses are 16-bit numbers

Which of the following is NOT a step in the boot process?

The antivirus program checks all files for viruses

what-if

The automatic recalculation ability of spreadsheet software makes it easy to perform ________ analysis.

executable program

The binary sequence that instructs the CPU to run the programming code is called a(n)

The CPU consists of which two parts?

The control unit and the arithmetic logic unit

compilation

The process by which program code is converted into machine language is called

Which of the following statements about object-oriented databases is FALSE? A. They are more complex than relational databases. B. They use a query language to access and manage data. C. They are good at handling unstructured data. D. They store data in table format.

They store data in table format

Which statement does NOT describe fifth-generation languages? A. They are the most "natural" of languages. B. Problems are presented as a series of facts or constraints rather than as a specific algorithm. C. They use a set of short, English-based commands (such as SUB) that speak directly to the CPU. D. The system of facts can be queried.

They use a set of short, English-based commands (such as SUB) that speak directly to the CPU.

________ languages use symbols and commands to help programmers tell the computer what to do.

Third-generation

________ is new technology that supports fast transfer rates of 10 Gb/s.

Thunderbolt

In a Windows folder, to display files and folders as icons in list form, use ________ view.

Tiles

The World Wide Web was invented by ________.

Tim Berners-Lee at CERN

Mac OS X includes a backup utility called ________.

Time Machine

actionscript

To develop Web-based multimedia, Adobe Flash includes a programming language named ________, which is similar to JavaScript in its keywords, operators, and classes.

Which of the following is a reason for creating a list instead of creating a database? "To organize data for simple tasks" "To prevent data inconsistency" "To prevent data redundancy" "To make it easier to share data in a central location"

To organize data for simple tasks

A(n) ______________ is used to keep track of everyday business activities.

Transaction Processing System

Supports order processing, payroll, and other routine transactions

Transaction Processing System

coding

Translating an algorithm into a programming language is called ________.

T/F Actual programming takes place in the development and documentation step of the SDLC.

True

T/F An algorithm is a set of specific, sequential steps that describe in natural language exactly what the computer must do to complete its task.

True

T/F Data is the raw input that users have at the start of the job.

True

T/F HTML and XHTML are NOT programming languages.

True

T/F In a program, a variable declaration tells the operating system that the program needs to allocate storage space in RAM.

True

T/F Programming languages can be read by humans.

True

T/F Repetitive tasks are ideal candidates for computerization.

True

________ is a social networking service that enables you to exchange short text messages with your friends or "followers."

Twitter

Which of the following operating systems is used primarily with mainframes as a network operating system?

UNIX

The unique address for a particular Web site is the ________.

URL

All of the following are terms related to part of the boot process EXCEPT:

USB

All of the following are terms related to part of the boot process, EXCEPT ________ A. ROM B. BIOS C. RAM D. USB

USB

The most common way to connect devices to a computer is to use the ________ port.

USB

To transfer files from your computer to a portable media player (PMP), most newer PMPs use a ________ port or a FireWire port.

USB 2.0

All of the following operating systems support P2P networking, EXCEPT ________. A. Windows B. OS X C. Unix D. Linux

Unix

A(n) ________ is a small program that performs general housekeeping tasks for your computer.

Utility Program

A ________ uses the public Internet communications infrastructure to build a secure, private network.

VPN

Criteria used to ensure that data entered into the database is correct (or at least reasonable) and complete

Validation Rules

The process of optimizing RAM storage by borrowing hard drive space is called ________.

Virtual Memory

3d

Virtual reality is a simulated ________ environment that a user can manipulate and explore as if he or she were in that world.

A powerful programming language used for prototyping Windows applications is ________.

Visual Basic

Which of the following would NOT be used to build Web sites with interactive capabilities? A. Active Server Pages B. PHP (hypertext preprocessor) C. Visual Basic D. Java Server Pages

Visual Basic

________ is a form of voice-based Internet communication that turns a standard Internet connection into a means to place phone calls, including long-distance calls.

VoIP

Web content specially designed for viewing via a cell phone or smartphone is written in a format called ________.

WML (Wireless Markup Language)

When you access CNN or Intel's Web site you are accessing it through a ________ server.

Web

problem and opportunity identification

What is the first step of the system development life cycle?

information

When creating a problem statement, the ________ is the result the user requires from the data.

C++

Which language do programmers use if the problem requires a lot of number crunching?

Java

Which language is used for applications that need to collect information from networked computers?

.NET framework

Which of the following development environments enables Web sites to talk to each other easily by introducing a standard way for software to interact through Web services?

freeware

Which of the following is software that you can use for an unlimited time at no charge?

visual basic

Which of the following is the programming language often used to build Windows applications

pseudocode

Which of the following is/are NOT part of a program's problem statement?

It is the ability of a Web page to display itself based on choices the reader makes.

Which of the following statements describes dynamic decision making?

structured classes

Which of these elements is NOT common to all programming languages?

They use a set of short, English-based commands (such as SUB) that speak directly to the CPU.

Which statement does NOT describe fifth-generation languages?+

customer relationship management software

Which type of software stores client information in one central database for use by sales professionals?

________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.

White-hat

technical writers

Who is responsible for writing internal documentation for software programs?

The version of Windows 7 that is most appropriate for high-end PC users, gamers, and multimedia professionals is ________.

Windows 7 Ultimate

Windows 7 incorporates ________, which enables you to migrate files and settings from a Windows Vista system to a Windows 7 system via a network connection.

Windows Easy Transfer

WPA stands for ________.

Wireless Protocol Access

classes

With object-oriented analysis, programmers identify all the categories of input that are part of the problem into

What has spawned Mathematical Markup Language and Wireless Markup Language?

XML

All of the following are forms of RAM EXCEPT:

XRAM

Which of the following statements concerning the Windows Recycle Bin is TRUE?

You can restore files that have been moved to the Recycle Bin

true

You must use decision points to develop an algorithm that includes unpredictable steps.

keywords

______ are words that are reserved in a specific programming language due to their predefined meanings.

logical

_______ errors are caught only when the program executes.

productivity

_______ software includes programs that enable you to perform various tasks generally required in home, school ,and business.

decision points

________ are points at which a program must choose from a range of different actions based on the value of its current inputs.

keywords

________ are words that are reserved in a specific programming language due to their predefined meanings.

top-down

________ design is a systematic approach in which a problem is broken down into a series of high-level tasks.

JAD, joint application development

________ helps designers adapt to changes in program specifications quickly and helps ensure successful, useful results.

programming

________ involves identifying which parts of a task a computer can perform, describing those tasks in a very specific and complete manner, and translating this description into the language spoken by the computer's CPU.

blender

________ is a free, open source program that supports home video game production by collecting a number of tools into one package.

java

________ is a language that, due to its object-oriented model, allows programmers to benefit from its large set of existing classes.

pseudocode

________ is organized like an outline, with various levels of indentation to indicate the sequence of actions within the program.

third generation

________ languages use symbols and commands to help programmers tell the computer what to do.

integrated help

________ means the help documentation is built directly into the software instead of being provided in printed manuals

open source

________ programs are free on the condition that any changes you make to improve the source code also must be distributed for free.

software

________ refers to a set of instructions that tells a computer what to do.

system

________ software helps run the computer and coordinates instructions between application software and the computer's hardware.

multimedia

________ software includes image, video, and audio editing software.

virtual reality

________ software turns artificial environments into realistic experiences.

Enterprise resource planning, ERP

________ systems consolidate multiple systems into one and improve the coordination of business areas across multiple departments.

prototyping

________, building a small program model, is a form of rapid application development (RAD).

Which of the following is necessary if you want your Ethernet network to connect to the Internet through a DSL or cable modem?

a DSL/cable router

A set of rules for exchanging electronic information is called ________.

a computer protocol

honey pot

a computer system that is set up to attract unauthorized users by appearing to be a key part of a network or a system that contains something of great value

server

a computer that both sites and shares resources on a network

client

a computer that request those records

wireless network interface card

a computing device that connects to a network using wireless access needs to have a special network adapter card

terminator

a device that absorbs a signal so that it is not reflected back onto parts of the network that have already received it

bridge

a device that is used to send dat between these different collisions domains

You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________.

a firewall

network

a group of two or more computers that are configured to share information and resources such as printers, files, and databases

bastion host

a heavily secured server located on a special perimeter network between the companies secure internal network and the firewall

Digital formats are descriptions of signals as ________.

a long string of numbers

Opera Mobile is an example of ________.

a microbrowser

Which of the following is NOT an example of a network node?

a mouse

Client/server networks are controlled by a central server that runs a specialized piece of software called ________.

a network operating system (NOS)

personal area network (PAN)

a network used to connect computing devices that are in close proximity to each other

The most common type of home network is ________.

a peer-to-peer (P2P) network

intranet

a private network set up by a business or an organization that is use exclusively by a select group of employees, customers, and suppliers, volunteers, or supporters

file server

a server that stores and manages files for network users

dedicated server

a server used to fulfill one specific function, such as handling email

protocol

a set of rules for exchanging communication

print que

a software holding area for print jobs

Which of the following devices translates electronic data into radio waves?

a transceiver

shielded twisted-pair (STP)

a twisted-pair cable that contains a layer of foil shielding the reduce interference

Which of the following devices is needed to share an Internet connection on a wireless network?

a wireless router

_______ is the branch of computer science that deals with the attempt to create computers that think like humans.

a. Artificial intelligence

________ helps to ensure data integrity by maintaining information in only one place.

a. Data centralization

Which of the following is NOT a main operation of a database management system (DBMS)?

a. Implementing data mining

Which of the following statements about object-oriented databases is FALSE?

a. They store data in table format.

Which of the following operating systems is used primarily with mainframes as a network operating system? a. UNIX b. Mac OS c. Symbian OS d. Windows Vista

a. UNIX

An individual trained in the design and building of databases is called a database ________.

a. administrator

Management information systems (MIS) provide reports called ________, which show conditions that are unusual or need attention from users of the system.

a. exception reports

A ________ temporarily displays records that match the specified criteria.

a. filter

In a data warehouse, data gathered from sales, billing, and inventory departments are examples of ________ sources.

a. internal data

Data staging consists of all of the following steps, EXCEPT ________.

a. mining of data

Each record must have a unique field called a(n) ________ field.

a. primary key

A data ________ is a large-scale electronic repository of data that contains and organizes all of an organization's data in one place.

a. warehouse

When referring to hard drives, seek time and latency are the two factors that make up ________.

access time

QuickBooks and Peachtree are examples of ________ software.

accounting

proxy server

acts a a go-between connection computers on the internal network with those on the external network (internet)

application server

acts as a reposition for application software

jam signal

alerts that a data collision occurred

Text prediction ________ provide a list of popular words and save typing time when using text messaging.

algorithms

centralized

all clients connect to a server that preforms a task for them.

bus topology

all computers are connected in sequence on a single cable

electronic data interchange (EDI)

allows the exchange of large amounts of business data in a standardized electronic format

What is Android?

an operating system for cell/smartphones

Images are a representation of light waves called ________ or continuous waves.

analog

possessed object

any object that a user carries to identify themselves and that grants them access to a computer system or computer facility

A(n) ________ is a small program that resides on a server designed to be downloaded and run on a client computer.

applet

The general software you use to do tasks at home, school, or work is known as ________ software.

application

When a client computer connects to a network and requests the use of Microsoft Office 2010, for example, the ________ server delivers the software to the client computer.

application

ring topology

are laid out in a configuration resembling a circle. data flows around the circle form device to device in one direction only

extranet

area of an intranet that only certain corporations or individuals can access is called

brute force attack

attempting to access an account by repeatedly trying different passwords

A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.

authentication

In a transaction-processing system, if transaction data are accumulated until a certain point and then many transactions are processed all at once, this is called ________ processing.

b. batch

Unstructured data such as video clips and pictures are known as ________ because of the way they are

b. binary large objects (BLOBs)

In a database, a ________ is synonymous with a category of information.

b. field

The location of a file is specified by its ______. a. drive letter b. file path c. file type d. file extension

b. file path

A Web address is stored as a(n) ________ field in a database.A Web

b. hyperlink

Data ________ means that the data contained in a database is accurate and reliable.

b. integrity

An expert system and a natural language processing system are both ________.

b. knowledge-based systems

The main path, analogous to an interstate highway system, of the Internet along which data travel the fastest is known as the Internet ________.

backbone

Using a ________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.

backdoor program

In Windows, which character is used as a path separator?

backslash (\)

CSMA/CD

because most star networks are Ethernet networks they use a method used on all Ethernet networks to avoid data collisions

access method

because two signals transmitted at the same times on a bus network may cause a data collision this is established to control which computer is allied to use the transmission media at a certain time

Before its final commercial release, software is often provided free or at a reduced cost in a(n) ________ version to certain test sites or to interested users.

beta

executable program

binary code understood by a CPU

BLOB stands for ______ _____ _____

binary large object

Unstructured data such as video clips and pictures are known as ________ because of the way they are encoded.

binary large objects (BLOBs)

The number of bits the video card uses to represent each pixel on the monitor is called ________.

bit depth

A ________ is a personal journal posted on the Web.

blog

________ viruses are often transmitted by a flash drive left in a USB port.

boot-sector

Which of the following network adapters is most likely to be preinstalled in a typical notebook computer today?

both a wireless and wired network adapter

A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as a(n) ________.

breadcrumb trail

Podcasts enable you to ________.

broadcast over the Internet using compressed audio and video files such as MP3s and MP4s

If a numeric field has a size of 5, which is the highest number it can hold?

c. 99999

Which of the following is NOT a data source for a data warehouse?

c. Data mine

What does the acronym DBMS stand for?

c. Database management system

_______ size defines the maximum number of characters or digits that a particular field can hold.

c. Field

________ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table.

c. Referential integrity

A ________ is automatically displayed in a field unless the user enters something different.

c. default value

Prior to entering data into a database, you must create a data ________ entry for each field in the database.

c. dictionary

In a database, a chart is stored in a(n) ________ field.

c. object

A(n) ________ is designed to improve communications and assist employees in accomplishing their daily tasks.

c. office support system (OSS)

A(n) ________is a way of retrieving information from one or more tables that defines a particular subset of data.

c. query

In a transaction-processing system (TPS), if the TPS database is queried and updated while the transaction is taking place, this is called ________ processing.

c. real-time

If a business keeps two lists, one for employee payroll and one for employee benefits information, both containing name and address information, this is an example of data ________.

c. redundancy

All of the following are top cybercrimes reported to the IC3 in 2011, EXCEPT ________. A. identity theft B. non-auction/non-delivery of merchandise C. advance fee fraud D. child pornography

child pornography

________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission

circuit switching

With object-oriented analysis, programmers identify categories of input that are part of the problem into ________.

classes

Running the Disk Cleanup utility is a quick way to ________.

clear out unnecessary files

The majority of Internet communications follow the ________ model of network communications.

client/server

A network that has 10 or more nodes is usually configured as a ________.

client/server network

New technologies pushing the boundaries of printing include ________.

cloud printing, 3-D printing and ink-less printing

Which of the following is NOT a common network topology?

cluster

Cable television, as well as some networks, uses ________ cable.

coaxial

MPEG-4, H.264, and DivX are all examples of ________.

codecs

hybrid topology

combining multiple topologies into one network

Computers that typically use special security protocols to protect personal, sensitive buyer information are known as ________ servers.

commerce

The process by which program code is converted into machine language is called ________.

compilation

A ________ check determines if all required fields were entered with appropriate data.

completeness

A(N) ________ check determines whether all required fields were entered with appropriate data.

completeness

Which of the following activities is carried out by the ALU?

completion of all arithmetic calculations

fiber optic cable

composed of a glass fiber though which the data is transmitted

wide area networks (WAN)

comprise large number of users over a wider physical area or separate LANs that are miles apart

All of the following can be used in a Windows file name EXCEPT:

*

All of the following can be used in a Windows file name, EXCEPT ________. A. * B. # C. % D. $

*

5) testing and installation; 4) analysis; 3) design; 2)analysis 1)problem/opportunity identification

...

A portable media player can play files with all of the following file extensions EXCEPT:

.doc

If Microsoft Word 2010 is used to create a file, which file extension is added automatically?

.docx

if Microsoft Word 2010 is used to create a file, which file extension is added automatically?

.docx

1) class 2) data 3)reusability 4) method

1)defined by information and actions 2) another term for information 3) ability to apply classes from other projects to a new project 4) another term for behavior

1. 1GL; 2. 3GL; 3. 1GL; 4. 5GL; 5. 4GL

1. assembly language; 2. c++; 3. machine language; 4. PROLOG; 5. SQL

1) interpreter 2) IDE 3) executable program 4) compiler 5)source code

1.translates source code line by line into intermediate form 2)developmental tool to help programmers write, compile, and test programs 3)binary code understood by a CPU 4)program that understands both the syntax and the machine language 5)programmers' instructions written in a higher-level language

The maximum memory you can install using the 64-bit version of Windows 8 Pro is ________ GB.

192

Windows 8 is offered in ________ versions.

2

There are ________ levels of cache memory.

3

If a numeric field has a size of 5, which is the highest number it can hold?

99999

function

=AVERAGE(A10:A25) is an example of a spreadsheet ________.

Which of the following statements is true about optical media?

A Blu-ray burner will most likely burn both CDs and DVDs

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

A DDoS attack

Which of the following statements about a graphical user interface is FALSE?

A GUI is a command-driven interface

flow chart

A ________ is a visual diagram of a process, including the decisions that need to be made along the way.

false

A data-flow diagram provides a visual representation of an algorithm.

binary

A decision that can be answered in only one of two ways, yes (true) or no (false), is called a(n) ________ decision.

Which of the following is NOT a main characteristic associated with desktop computers as compared to notebooks?

A desktop computer is more expensive

algorithm

A flowchart is a graphical representation of the steps and decision points in a(n) ________.

testing plan

A problem statement also includes a(n) ________, which lists specific input numbers a program would typically expect the user to enter as well as the precise output that a perfect program would return for those values.

software as a service

A relatively new trend of on-demand software deployment in which the application is hosted by the vendor and made available to the customer over the Internet is called ________.

integrated software

A(n) ________ application is a single software program that incorporates the most commonly used tools of productivity software into one stand-alone program.

runtime

A(n) ________ error is caught when the program executes.

syntax

A(n) ________ error is caused by not following the strict, precise set of rules for a specific programming language.

logical

A(n) ________ error occurs when a program executes but provides incorrect output.

information system

A(n) ________ includes data, people, procedures, hardware, and software.

editor

A(n) ________ is a special tool that helps programmers as they enter the code, highlighting keywords and alerting them to any typographical errors.

interpreted

A(n) ________ language is executed one line at a time, as each line is translated.

To develop Web-based multimedia, Adobe Flash includes a programming language named ________, which is similar to JavaScript in its keywords, operators, and classes.

A) ActionScript

Which language do programmers use if the problem requires a lot of number crunching? A) C++ B) HTML C) FORTRAN D) Java

A) C++

The standard communications protocol used on most client/server networks is ________. A) Ethernet B) NOS C) TCP/IP D) VPN

A) Ethernet

Which cable type is the most costly to install? A) Fiber-optic B) Twisted-pair C) ThinNet coaxial D) ThickNet coaxial

A) Fiber-optic

________ is the instructions programmers have written in a higher-level language.

A) Source code

A(n) ________ server is a server that stores and manages files for network users. A) file B) e-mail C) print D) database

A) file

A ________ is a visual diagram of a process, including the decisions that need to be made along the way.

A) flowchart

A ________ topology is created when more than one topology is used to build a network. A) hybrid B) multiple-use C) fusion D) crossover

A) hybrid

Which of the following is the final stage of the program development life cycle (PDLC)?

A) implementing the project

If Microsoft Word 2010 is used to create a file, which file extension is added automatically? A. .docx B. .doc C. .docs D. .docf

A. .docx

In a relational database, what is a relationship? A. A link between tables that defines how the data are related B. The primary key in the database C. The links among databases D. The array of tables in a database

A. A link between tables that defines how the data are related

______ is a personal journal posted on the web. A. blog B. podcast C. wiki D. webcast

A. Blog

The control unit is one component of the ______. A. CPU B. RAM C. front side bus D. clock

A. CPU

Which of the following is NOT a factor to consider when selecting network cabling? A. Cable diameter B. Interference C. Maximum run length D. Bandwidth

A. Cable diameter

____ networks contain servers as well as computers that individual users access and use. A. Client/server B. Peer-to-peer C. Switch D. CSMA/CD

A. Client/server

Which of the following statements about cookies is NOT true? A. Cookies obtain your personal information by searching your hard drive. B. Cookies are text files. C. Cookies help companies determine the traffic flow through their Web site. D. Some companies sell the personal information found in cookies to other companies

A. Cookies obtain your personal information by searching your hard drive.

When checking to see whether a particular name is registered on the internet, your computer consults a database that is maintained on a(n) __________ server. A. DNS B. URL C. Internet D. Web

A. DNS

During which phase of the system development life cycle are flowcharts and data-flow diagrams developed? A. Design B. Analysis C. Development and documentation D. Testing and installation

A. Design

A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses. A. Dynamic B. Static C. Assigned D. Mobile

A. Dynamic

Which of the following causes interference when a cable is exposed to strong electromagnetic fields? A. EMI B. RFI C. STP D. IEEE

A. EMI

Text such as <b> this should be bolded. </b> is an example of an HTML ______. A. Element B. Script C. Instruction D. Marker

A. Element

Social ____________ is an unwanted piggyback program that usually downloads with software you are installing from the internet. A. Engineering B. Theft C. Pretexting D. Pharming

A. Engineering

_______ is applied science concerned with designing and arranging machines and furniture so that people use so that the people using them aren't subjected to an uncomfortable or unsafe experience. A. Ergonomics B. Positioning C. Occupational safety D. Repetitive strain prevention

A. Ergonomics

__________ involves putting data into an electronic file in a format that another application can understand. A. Exporting B. Importing C. Batch processing D. Data mining

A. Exporting

Which cable type is the most costly to install? A. Fiber-optic B. Twisted-pair C. ThinNet coaxial D. ThickNet coaxial

A. Fiber-optic

Which of the following provides a visual representation of patterns that an algorithm comprises? A. Flowchart B. Pseudocode C. Source code D. Structure chart

A. Flowchart

Two types of video memory are _______. A. GDDR3 and GDDR5 B. SRAM and DRAM C. IrDA and IDE D. 4-bit and 8-bit

A. GDDR3 and GDDR5

More than 50% of smartphones use an operating system developed by ____. A. Google B. Apple C. Microsoft D. Symbian

A. Google

Any part of the computer that you can touch is called _____. A. Hardware B. Software C. Operating system D. Input

A. Hardware

A typical ________ is made up of one or more network switches to which ISPs connect. A. Internet Exchange Point B. Router Point C. Gateway Inference D. Point of Preference

A. Internet Exchange Point

The most common type of monitor is a ________. A. liquid crystal display (LCD) B. light-emitting diode (LED) C. organic light-emitting diode (OLED) D. cathode ray tube (CRT)

A. Liquid crystal display (LCD)

The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address. A. MAC B. IP C. SSID D. network

A. MAC

A large network designed to provide access to a specific geographic area, such as a large city is a __________. A. MAN B. PAN C. LAN D. WAN

A. MAN

Which of the following has the greatest bandwidth? A. OC-768 B. T1-lines C. OC-48 D. T-3 lines

A. OC-768

A(n) _____ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system A. Port B. Drive C. Slot D. Expansion bus

A. Port

The basic input/output system is stored on a _____ chip. A. ROM B. CPU C. RAM D. CMOS

A. ROM

Sending a movie trailer over the Internet is most appropriate using the ______ protocol. A. Real time transport B. Connection- oriented C. User datagram D. TCP/IP

A. Real time transport

_____ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table. A. Referential integrity B. Normalization C. Database consistency D. Record integrity

A. Referential integrity

________ databases have the largest market share among the primary types of electronic databases. A. Relational B. Flat-file C. Multidimensional D. Object Oriented

A. Relational

__________ databases have the largest market share among the primary types of electronic databases. A. Relational B. Flat-file C. Multidimensional D. Object-oriented

A. Relational

Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network? A. Routers and switches B. USB ports C. Firewalls D. Network interface cards (NIC)

A. Routers and switches

Transport Layer Security (TLS) and ______ are two protocols that provide data integrity and security for internet transmission A. Secure sockets layer SSL B. Pretty good Privacy (PGP) C. Hypertext Transfer Protocol (HTTP) D. Public-key encryption

A. Secure sockets layer SSL

Web 2.0 is classified as the _____. A. social Web B. social network C. social page D. social computer

A. Social Web

Which of the following is the most commonly used client/server network topology? A. Star B. Cluster C. Ring D. Hierarchical

A. Star

Which of the following networks has high scalability? A. Star B. Ring C. Bus D. Hybrid

A. Star

A _____ was the first device with touch-screen capabilities. A. tablet PC B. notebook C. pocket PC D. desktop

A. Tablet PC

Which of the following is the first step in the boot process? A. The BIOS is activated by turning on the computer. B. The BIOS checks that all devices are in place. C. The OS is loaded into the RAM. D. Configuration and customization settings are check

A. The BIOS is activated by turning on the computer

Which of the following statements concerning IPv4 addresses is FALSE? A. The addresses are 16-bit numbers. B. IPv4 is the original IP addressing scheme. C. The addresses contain four octets. D. In binary, each octet of an IP address contains eight positions filled by either a 1 or 0.

A. The addresses are 16-bit numbers.

Which of the following information is NOT contained in a packet? A. The size (in bytes) of the packet B. The address to which the packet is sent C. The address from where the packet originates D. The data that are transmitted

A. The size (in bytes) of the packet

Which protocol prepares data for transmission but has no resending capabilities? A. UDP B. Telnet C. HTTP D. TCP

A. UDP

Flash drive plug into a(n)______. A. USB Port B. Serial port C. Expansion slot D. Drive bay

A. USB Port

The most common way to connect devices to a computer is to use the ______ port. A. Universal serial bus (USB) B. FireWire 400 C. FireWire 800 D. Ethernet

A. Universal serial bus (USB)

_____ is a powerful programming language used to build a wide range of Windows applications. A. Visual Basic B. PHP C. BASIC D. HTML

A. Visual Basic

5. Podcasts enable you to ____. A. broadcast over the Internet using compressed audio and video files such as MP3s and MP4s B. post journal entries on the Web C. communicate with friends in real time D. edit video files over the Web

A. broadcast over the Internet using compressed audio and video files such as MP3s and MP4s

You can keep track of IM contacts by using a ______. A. buddy list B. people finder C. search engine D. breadcrumb trail

A. buddy list

The majority of Internet communications follow the ______ model of network communications. A. client/server B. peer-to-peer C. circuit switching D. IXP

A. client/server

A(n) ___________ check determines whether all required fields were entered with appropriate data. A. completeness B. range C. consistency D. alphabetic

A. completeness

35. Using your computer for non-work activities while you are being paid to do your job is known as ________. A. cyberloafing B. cybersleeping C. cyberlazing D. cyberbreaking

A. cyberloafing

A ____ is a collection of related data that can be stored, sorted, organized, and queried. A. database B. list C. filter D. data mine

A. database

Each device attached to your computer comes with a special program called a _____ that facilitates communication between the device and the OS. A. device driver B. translator C. communication utility D. device configuraton

A. device driver

Computer-aided design software is used primarily by _______. A. engineers to create models B. airline pilots to navigate C. project managers to track tasks D. game makers to create games

A. engineers to create models

In a database, a _______ is synonymous with a category of information A. field B. record C. row D. table

A. field

A Web address is stored as a(n) ________ field in a database. A. hyperlink B. text C. address D. memo

A. hyperlink

Adobe Photoshop and Corel PaintShop Photo Pro are examples of ______ software. A. image-editing B. painting C. Web page authoring D. computer-aided desig

A. image-editing

In a data warehouse, data gathered from sales, billing, and inventory departments are examples of ________ sources. A. internal data B. external data C. metadata D. exported data

A. internal data

A peer-to-peer network is an example of ______ administration. A. local B. wide area C. central D. corporate

A. local

The ________ contains the central electronic components of the computer. A. motherboard B. system unit C. peripheral unit D. input unit

A. motherboard

The Siri speech-recognition feature on Apple's iPhone 4s is an examples of a ______. A. natural language processing (NLP) system B. decision support system C. management information system (MIS) D. database management system (DBMS)

A. natural language processing (NLP) system

Inkjet printers and laser printer are examples of ________ printers. A. nonimpact B. impact C. dot-matrix D. thermal

A. nonimpact

FBI-related scams involve ________. A. people pretending to represent official organizations B. running auctions that do not exist C. convincing people to send money as a "good faith" gesture D. collecting funds and not delivering the goods

A. people pretending to represent official organizations

All of the following are ways to avoid injuries when working on computers, EXCEPT ______. A. place monitor at least 10" from eyes B. purchase an adjustable chair C. ensure proper lighting D. take breaks

A. place monitor at least 10" from eyes

The capability of moving a completed programming solution easily from one type of computer to another is known as _________. A. portability B. scalability C. transferability D. inheritance

A. portability

A ________ is a set of rules for how information and communication are exchanged. A. protocol B. token C. switch D. packet

A. protocol

In the URL http://www.pearsonhighered.com/techinaction, the portion labeled "http" is the ______. A. protocol B. domain name C. path D. top-level domain

A. protocol

All of the following are categories of viruses, EXCEPT ________. A. snakes B. boot sector C. email D. encryption

A. snakes

9. A computer network is defined as two or more computers connected via ________ so that they can communicate with each other. A. software and hardware B. the Internet C. at least one server D. Ethernet cable

A. software and hardware

All of the following are examples of optical drives, EXCEPT ______. A. solid-state disc B. compact disc C. digital video disc D. Blu-ray disc

A. solid-state disc

The type of software that is best used to create a simple budget is ____. A. spreadsheet worksheet B. word processing software C. presentation software D. database software

A. spreadsheet worksheet

The four functions of the computer include input, process, output, and ______. A. storage B. calculating C. retrieval D. saving

A. storage

Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a process called ______ programming. A. visual B. drag and drop C. layout D. applications

A. visual

RAM is an example of _______. A. volatile B. nonvolatile C. permanent D. mobile

A. volatile

A(n) ______ takes advantage of file transport methods to spread on their own. A. worm B. script C. encryption D. time bomb

A. worm

false

ASP, JSP, and PHP are examples of programming languages that are used to develop number crunching. applications.

Microsoft ________ is a database management system.

Access

true

Actual programming takes place in the development and documentation step of the SDLC.

An individual trained in the design and building of databases is called a database _____

Administrator

true

Adobe Flash is a software product for developing Web-based multimedia.

A. can be answered in only two ways (i.e., yes/no) B. translate an algorithm into a programming language C. text-based approach to documenting an algorithm D. set of specific, sequential steps to complete a task E. keywords that direct the flow of a program

Algorithm D Binary Decisions A Control Structures E Coding B Pseudocode C

Which of the following is NOT an example of a common data type? "Object" "Hyperlink" "Numeric" "Alphanumeric"

Alphanumeric

Which statement pertaining to system reliability is FALSE? A. Having the latest version of software products can make your system more reliable. B. An accumulation of temporary Internet files has no effect on your computer's overall performance. C. You can clean out unnecessary programs from your Startup folder. D. When you defrag your hard drive, it works more efficiently.

An accumulation of temporary Internet files has no effect on your computer's overall performance.

Which statement pertaining to system reliability is FALSE?

An accumulation of temporary internet files has no effect on your computer's overall performance

rapid application development (RAD)

An alternative approach to systems development, called ________, makes use of a prototype at the beginning of the project.

A. ensure that the system works properly B. monitor the system to be sure it meets the needs of the users C. generate a detailed plan for the programmers to follow D. programming occurs E. create a statement of the goals and objectives

Analysis E Design C Maintenance and Evaluation B Testing and installation A Development and Documentation D

The most popular tablet operating system was developed by ________

Apple

tags

(HTML) uses special symbols called ________ to present information on the Web.

________ is the branch of computer science that deals with the attempt to create computers that think like humans.

Artificial intelligence

To develop Web-based multimedia, Adobe Flash includes a programming language named ________, which is similar to JavaScript in its keywords, operators, and classes. A) SilverLight B) ActionScript C) Active Server Pages D) LimeLight

B) ActionScript

________ is a protective layer made of glass or plastic, which is wrapped around the core of a fiber-optic cable for protection. A) Shielding B) Cladding C) Sheathing D) Coating

B) Cladding

What is the final step of the system development life cycle? A) Testing and installation B) Maintenance and evaluation C) Analysis D) Design

B) Maintenance and evaluation

In a(n) ________ network, each node connected to the network communicates directly with every other node. A) Client/server B) Peer-to-peer C) Intranet D) Extranet

B) Peer-to-peer

________, building a small program model, is a form of rapid application development (RAD).

B) Prototyping

________ is a Web-based universal chat service that lets you communicate with users on a variety of IM services from any computer without having to install a special program.

Meebo

Windows 8 is the operating system developed by ________.

Microsoft

Which of the following is a database management system? "SQL" "Microsoft Excel" "Microsoft Access" "Microsoft Project"

Microsoft Access

video editing

Microsoft Movie Maker is an example of ________ software.

Which of the following applications is considered an office support system? "A company's expert system" "An ATM system" "Windows XP" "Microsoft Office"

Microsoft Office

true

Microsoft's new SilverLight product supports the development of multimedia Web applications.

Which of the following is not a data-mining technique? "Clustering" "Model Management" "Classification" "Affinity Grouping"

Model Management

helps programmers find logical errors

Most integrated development environments (IDEs) include a debugger that

The latest version of the Mac OS X is the ________

Mountain Lion

Large databases accessed by many users, such as those used by ebay, are usually designed as _____ databases.

Multidimensional

A technique for understanding spoken or written language

Natural Language Processing


Kaugnay na mga set ng pag-aaral

Music in the Rock Era Chapter test questions

View Set

Health Online- GROWTH, DEVELOPMENT, AND SEXUAL HEALTH- Abstinence, Safe Sex, and Making Informed Decisions

View Set

Building Construction Definitions

View Set