business computer science final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What combination of words and Boolean operators would display all audio files about chiropractic?

.mp3 AND chiropractic

Which is NOT a file extension used by Microsoft Office programs?

.pff

Which of the following extensions is associated with a video file?

.wmv

Eight bits equals ________ byte(s).

1

When you purchase software in a box, reading the ________ is important to know if the software will function properly.

system requirements

________ printers create an image by heating specially coated heat-sensitive paper that changes color where the heat is applied.

thermal

Which statement about vacuum tubes is NOT accurate?

they seldom need

C++ is an example of a ________-generation language.

third

Bold, Italic, and Underline are ________, which means that you can click the button one time to turn the formatting on and click it again to turn it off.

toggle buttons

A 12-point font is larger than a 10-point font.

true

The primary key field uniquely identifies a record in a table.

true

Which is NOT a mobile embedded operating system?

unix apache

Which of the following is NOT a Windows user account type?

visitor

When a company pays people to hack into its own system, it calls in ________ hackers.

whitehat

A(n) ________ is a high-end desktop computer or one that is connected to a network in a business setting.

workstation

________ communication allows you to send a message that the receiver can access later.

Asyncrouse

Adware does NOT affect your computer's performance.

F

If the website is well designed, then the information on the site is probably credible.

F

Pandora is the most popular web browser for people using Macs.

F

Podcasts can be either radio-like or TV-like programs that are aired live on the Internet.

F

Satellite broadband service speeds are comparable to those of cable.

F

Spam CANNOT be sent as a text message.

F

________ is the authoring language that defines the structure of a webpage.

HTML

What is the Internet backbone?

High speed connection between networks

The ________ was created to make it easier for victims to report cybercrimes.

Internet Crime Complaint center

Which statement about a logic bomb is FALSE?

It can spread to other machines

Which statement about email is FALSE?

It cannot be accessed by hackers

The 4G network standard includes ________ technologies.

LTE

________ allows the user to selectively extract data from different viewpoints.

Online analytical processing (OLAP)

Which is the correct order of the phases in the SDLC?

Planning, analysis, design, implementation and testing, maintenance

Once a computer is infected, a virus can use an email program to send out copies of itself.

T

What was the ARPANET?

The origins of the Internet

Which statement about cookies is FALSE?

They cannot collect information you do not want to share

Alan Turing is known for developing ________.

a test that tests a machine's ability to display intelligent behavior programming

Which of the following is NOT part of Microsoft Office Online web apps?

access

The desired output from the ________ phase of the SDLC is a list of requirements for a new system.

analysis

Which type of memory is very fast and is located close to the processor?

cache

The intersection of a row and a column in a spreadsheet is called a ________.

cell

Businesses should use a ________ network to share resources.

client server

Smartphones use ________ technology, allowing users to perform several functions with one device.

convergence

When you trust the collective opinion of a crowd of people rather than an expert, it is known as ________.

crowd sourcing

________ raises money from multiple small investors rather than a few large ones.

crowdfunding

When using Windows, to select all the folders in a window you simultaneously press the ________ and A keys.

ctrl

A GIS can be used by local municipalities to ________.

design emergency routes

________ computers offer the most speed, power, and upgradability for the lowest cost.

desktop

The ________ was the first working, digital, general-purpose computer.

eniac

Using a report to enter data into a database decreases the frequency of data entry errors.

false

When the CPU retrieves an instruction from the main memory, that is known as the ________ process.

fetch

A(n) ________ is a single piece of information in a record in a database.

field

________ software blocks unauthorized access to your computer.

firewall

________ is a small, portable, solid-state drive.

flash drive

Which of the following is NOT a type of programming error?

grammatical

Wireless access points that are available in public spaces are called ________.

hotspots

Which is a type of data that can be stored in an object-oriented database?

images,audio, and video

In what phase of the SDLC does testing occur?

implementation

Which of the following is NOT true about a keypad?

it contains special,

In which text alignment option are the left and right margins even?

justified

ZIP files use what type of compression?

lossless

The Windows ________ utility rearranges files on a hard drive in order to improve efficiency.

optimize drives

,Which would be the strongest password?

p@55W0?d

________ redirects you to a phony website by hijacking a domain name.

pharming

Which device uses one or more pens to draw an image on a roll of paper?

plotter

A third-party program, such as Adobe Flash Player, is considered to be a(n) ________.

plug in

A(n) ________ is a larger, planned update that addresses multiple problems or adds multiple features.

service pack

Podcasts allow time ________, so you can listen on your own schedule.

shifting

An intelligent personal assistant app for Apple devices that allows you to speak using natural language is known as ________.

siri

You should use a(n) ________ account for everyday computing on a computer running Windows.

standard

Formatting marks do not print.

true

When information is duplicated in multiple places, it is known as data redundancy.

true

Which symbol is allowed in file names?

underscore

The macOS operating system is based on ________.

unix

To secure your wireless network at home, you should ________.

use wireless encryption with a difficult passphrase

Which is NOT a CODIS index?

victims

Before November 2017, tweets were limited to ________ characters each.

140

A binary code using eight bits has ________ different possible combinations.

256

Which printer creates a model by building layers of a material such as resin or metal?

3D

Fifth-generation programming languages are primarily used in ________ applications.

AI

What technology allows computers to think and act more like people?

AI

The central processing unit consists of the control unit and the ________.

ALU

Which operator is used to return search results that include two specific words?

AND

The ________ allows a program to request a service such as printing from the operating system.

API

The ________ allows programs to run on computers with different hardware configurations.

API

Which of the following is a server-side programming technology?

ASP

________ is an example of a wearable computer.

An Apple Watch

________ e-commerce allows anyone to sell or trade items online.

C2C

What is the oldest optical disc still in use today?

CD

Which storage disc has a capacity of about 700 MB?

CD

The ________ is the brain of the computer.

CPU

Files saved to a hard disk are stored in ________.

Clusters

The ________ enables users to enter a friendly name like google.com instead of an address like 74.125.224.72.

DNS

________ technologies use telephone lines to carry digital signals.

DSL

The Internet was originally created as a communication system for the ________.

DoD

The ________ was first designed to calculate artillery firing tables.

ENIAC

A black-hat hacker attempts to find security holes in a system to prevent future hacking.

F

A viral video is one that can infect your computer with malware.

F

Today's processor speeds are measured in ________.

GHz

The ________ is a tracking system created by the U.S. Department of Defense that uses satellites for navigation.

GPS

Which organization coordinates the Internet naming system?

ICANN

________ allows you to communicate with one person at a time.

IM

74.125.224.72 is an example of a(n) ________.

IP

Which of the following is NOT a cloud service provider?

Intel

Which of the following is NOT a Boolean operator?

NOR

When the Internet backbone was privatized, five large ________ Access Points made up the new backbone.

Network

Microsoft Office is an example of a(n) ________.

OSS

When you connect a printer to your computer, ________ allows the operating system to detect the printer to make setup easier.

PnP

________ is used to make a website easier to find by both people and software and increases a webpage ranking in search engine results.

SEO

When you set up your wireless router, you should change the ________, which is also called the wireless network name.

SSID

Using social media sites to sell services is called ________.

Social media marketing (SMM)

A captcha is a series of distorted letters and numbers that are difficult for automated software to read but relatively easy for humans to read.

T

A company releasing a new product could use a Facebook Page to promote its release.

T

VoIP uses the Internet to transmit calls instead of phone lines or cellular towers.

T

In modern computers, FireWire ports have been largely replaced by ________ and Thunderbolt ports.

USB

________ is the largest online video-hosting site in the world.

YouTube

A ________ is the smallest unit of digital data.

a bit

A router is a form of security because it ________.

acts like a firewall

You would install a(n) ________ if you wanted to enable new capabilities in your web browser.

add on

When using Windows to make changes, install hardware, or configure settings, you need to use the ________ account on your computer.

admin

An end user license agreement represents which of the following?

agreement between the user and the software publisher

A(n) ________ is a procedure that you would use to solve a problem.

algorithm

A moderated chat room ensures that ________.

all content is screened

To protect your computer from adware, you would purchase ________ software.

antispyware

The programs that make up the Control Panel are sometimes referred to as control panel ________.

applets

A computer can be a flexible and powerful tool by using what type of software?

application

The Subscriber Identity Module (SIM card) stores all the following information on a mobile device, EXCEPT ________.

apps

The test that a transaction processing system uses to make sure that transactions are fully completed or aren't undertaken at all is known as ________.

atomicity

An .mp3 file extension indicates that the file is a(n) ________ file.

audio

In a virtual community, you can communicate with other people by using a(n) ________.

avatar

When sending one email to everyone in your address book, you should use the ________ field to keep their addresses private.

bcc

The pre-release version of a program that is provided to some users and developers to preview and test before the final version is released, is called a(n) ________ version.

beta

________ is the application of information technology to the field of biology.

bioinformatics

A ________ changes your home page and redirects you to other websites.

browser hijacker

Wikis are designed for ________, which is allowing people to contribute more than just posting a response.

callaboration

A(n) ________ is a computer that connects to or requests services from a server.

client

Which of the following is NOT a valid character in a file name?

colon

An email claiming that you have won a lottery might be an example of ________.

computer fraud

The ________ Act passed by the U.S. Congress in 1986 made it a crime to access classified information.

computer fraud n abuse

A(n) ________ improves over time by learning from its interactions.

congnitive cimputing system

A ________ computer has a screen that can swivel and fold to resemble a tablet.

convertible notebook

Word's mail merge feature joins a main document and a ________ to create customized letters or labels.

data source

The Windows ________ utility looks for files that can safely be deleted to free up disk space.

disk cleanup

________ computers are present in such diverse applications as gasoline pumps, home appliances, and traffic lights.

embedded

A header prints at the bottom of every page.

false

Making money through in-app purchases is common in ________ software.

freemium

________ can be used at no cost for an unlimited period of time.

freeware

________ computing refers to the efficient and eco-friendly use of computers.

green

Hacking to make a political statement is called ________.

hacktivism

The online free storage provided by Apple is called ________.

icloud

In what phase of the SDLC does user training take place?

implementation

Which is NOT an advantage of data normalization?

increases database development time

The iPhone, iPad, and iPod touch use the ________ operating system.

ios

Which of the following is a client-side programming technology?

javascript

The most common printer used in businesses is the ________ printer.

laser

A(n) ________ is a type of internal storage used in digital cameras.

memory card

________ software can be copied, modified, and redistributed without paying a fee.

open source

A Facebook ________ is used to promote an organization, a product, or a service.

page

File Explorer includes ________ access items on the Navigation pane to help you work more easily.

quick

Which of the following is NOT a SQL relational keyword?

quit

The ________ database is the most popular type used by businesses.

relational

To print data or display it in an easy-to-read format, a ________ can be used.

report

Using System ________ returns your operating system to a previous point in time.

restore

Highlighting an area of text with your mouse so it can be edited, formatted, copied, or moved is called:

selecting text

Sophia heard about some media software with a free trial download. She thought it would be a good idea to try it before buying. She is using which type of proprietary software?

shareware

Antivirus software uses ________ to search for known viruses.

signature checking

An email ________ is a block of text that is automatically put at the end of your messages.

signature line

________ sites let users evaluate hotels, movies, games, books, and other products and services.

social reviewing

All of the following are examples of malware, EXCEPT ________.

spam

In addition to performing calculations, ________ organize data that can be sorted and filtered, making the data functional for lists and schedules.

spreadsheets

When one business provides services for another, it is a type of e-commerce called ________.

B2B

When you buy a textbook online from Amazon.com, you are participating in ________ e-commerce.

B2C

Which of the following items below is NOT a cloud service offering?

BaaS

Asynchronous communication happens in real-time with two or more people online at the same time.

F

The United States government developed the naming system for the Internet.

F

The only authority responsible for investigating cybercrime in the United States is the FBI.

F

The only program you need to fully protect your computer is a good antivirus program.

F

The original use of the Internet was to conduct business between corporations and its customers.

F

The top-level domain used by the government is .net.

F

You can only edit content on a wiki if you are the original author.

F

________ provides a programming environment to develop, test, and deploy custom web applications.

PaaS

Which of the following types of memory is nonvolatile?

ROM

You can subscribe to ________ feeds to stay up-to-date on podcasts and news feeds.

RSS

________ involves the delivery of applications — web apps — over the Internet.

SaaS

A criminal might obtain personal information by capturing what is typed on a keyboard by installing a keylogger program

T

A search engine is essentially a large database of indexed webpages.

T

A social bookmarking site allows you to share your bookmarks with others online.

T

ARPANET is the name first given to the Internet.

T

All the computers connected to the Internet are given a unique IP address.

T

Another name for a bot is a zombie.

T

Antispyware software prevents adware software from installing itself on your computer.

T

Asynchronous online communication technology lets you send a message that the receiver can access later.

T

By using tabbed browsing, you can have multiple home pages.

T

Cyber criminals can be difficult to catch because many of the attacks originate outside the United States.

T

Cyber-stalking is serious because the person demonstrates a pattern of harassment and poses a credible threat of harm.

T

DSL is normally slower than cable Internet access.

T

Dial-up Internet access is the slowest type of Internet connection.

T

Encryption converts plain text into ciphertext.

T

FTTH uses fiber-optic cables.

T

Firewalls can be implemented by hardware and/or software.

T

Google has a search tool called Google Scholar that you can use for research.

T

Having quick access to features in a browser is often done through a browser toolbar.

T

In a virtual world, you can select an avatar as a virtual body.

T

Internet2 is much faster than the Internet because it has a fiber optic backbone.

T

It is recommended that you have more than one web browser installed on your computer.

T

Mobile browsers are optimized to be viewed on small screens.

T

On a Windows computer, the User Account Control notifies you before changes are made to your computer.

T

One way to access email is to read it online through a webmail interface.

T

Phishing and pharming attempts are successful because they appear to be from legitimate websites.

T

Ransomware is malware that prevents you from using your computer until you pay a fine or fee.

T

Search engine optimization (SEO) is used to make a website easier to find.

T

Social networks have changed TV watching from a passive experience to an active, social experience.

T

TLDs often represent the type of website that is being visited.

T

The 4G cellular network standard includes WiMAX Mobile Internet technology.

T

The OR operator is used to return results that include either of two specific words.

T

The Subject line of an email message helps the recipient know what the message is going to be about.

T

The biggest difference between cyberbullying and cyber-harassment is that one involves minors and the other occurs between adults.

T

Twitter is an example of a microblogging site.

T

User-generated content refers to the fact that anyone can put content on the web.

T

Using the Boolean operator NOT means the results must include the first word but cannot include the second word.

T

When you perform a search for the term aquarium from a computer in Kansas City, your results will most likely be different than if you perform the same search while you are in Seattle.

T

Worms spread over network connections without any help from users.

T

You should be wary about entering your credit card number into a website whose URL does not begin with https.

T

qA browser plug-in is a third-party program, such as Adobe Reader.

T

.com is an example of a(n) ________.

TLD

Which of the following types of data are NOT stored in RAM?

bios setting

________ hackers hack into systems to steal or vandalize.

blackhat

A ________ is similar to an online journal, in which you can write about anything you want to share.

blog

Which of the following is a short-range wireless technology?

bluetooth

You can use a social ________ site to save and share your favorites online.

bookmarking

A distorted series of letters and numbers, called a ________, is used to ensure that you are a human and not a computer.

captcha

________ is the process of converting an algorithm into a language the computer can understand.

coding

The cyberbullying of one adult by another adult, using a computer is known as ________.

cyber harass

________ is an unlawful attack on computers or networks done to intimidate a government or its people.

cyber terroism

Windows ________ helps to protect a computer from viruses and spyware.

defender

Without ________, the computer would not know how to use new hardware.

device drivers

The least expensive form of Internet connection is ________.

dial up

A data ________ defines the fields in a database and the type of data that each field contains.

dictionary

All the information someone can find out about you by searching the web is called your ________.

digital footprint

Clicking on the words New Slide and down-pointing arrow:

displays a gallery

Linux ________ include the OS, various utilities, software applications, and an office suite.

distros

In the URL http://www.irs.gov, irs is the ________.

domain name

________ is a form of freeware, where the developers accept contributions for themselves or for nonprofit organizations.

donationware

________ are found on the motherboard and are used to attach your hard disk.

drive controllers

________ is an example of asynchronous communication.

email

Which operating system is specialized, has limited function, and can run on simple hardware?

embedded

________ is the study of the relationship between workers and their workspaces.

ergonomics

A wired network interface card is sometimes call a(n) ________ card.

ethernet

Today, the backbone of the Internet is composed of numerous Internet ________ Points around the world.

exchange

A doctor may use a(n) ________ to help diagnose an illness.

expert system

Knowledge engineers develop ________, which are programmed to make decisions in real-life situations.

expert systems

A DBMS will define a data type for you by evaluating the data currently entered into the fields.

false

A background style must be applied to all slides in a presentation.

false

A client-side program requires that special software be installed on your computer.

false

A data flow diagram is not used to help highlight a system's deficiencies.

false

A data warehouse is used to discover relationships among data items.

false

A database controller (DBC) is a person who oversees database systems.

false

A decision support system is made up of a knowledge base and an inference engine.

false

An algorithm cannot be mapped using a flowchart.

false

Assembly language is a first-generation language.

false

Coding is the first step in the program development cycle.

false

Fuzzy logic simulates human thinking by emulating neurons in the brain.

false

Logic errors are easier to find than syntax errors because they prevent the program from running.

false

Making a series of smaller payments for the use of software is known as micropayments.

false

Microsoft Excel is an example of a DBMS.

false

Software development kits encourage programmers to develop software using a bundle of libraries and tools that are developed for any platform.

false

The test that a transaction processing system uses to make sure that each transaction is independent is known as durability.

false

In a database, title, author, publication date, and ISBN are examples of ________.

fields

Default programs are associated with which of the following?

file types

Which of the following applications is NOT part of an office application suite?

financial

The ________ in macOS is used to locate and arrange files, folders, and applications.

finder

To change the program that opens a file in macOS, which of the following would be used?

finder

An Excel spreadsheet is an example of a(n) ________ database.

flat

Which is NOT a modern source of installing software?

floppy drive

A graphic view of an algorithm is called a ________.

flowchart

The most common way to enter data into a database, is to use a(n) ________.

form

________ make data entry easier because they can be set up to match the layout of a paper document.

forms

Which generation of programming languages is closer to natural language but still requires some programming knowledge?

fourth generation

________ is similar to the way people think, acknowledging that not everything can be answered as a yes or no question.

fuzzy logic

________ contains the tasks and dates for a project and shows the schedule and progress of the project in a graphic.

gantt chart

Which of the following is an example of a personal Software-as-a-Service (SaaS)?

google drive

The # symbol used by Twitter is called a(n) ________.

hashtag

The type of folder structure created by Windows is known as a ________.

hiearchy

When you enter your credit card information in a website, you know the website is encrypted when you see ________ in the address bar.

https

What project was coordinated by the U.S. Department of Energy and the National Institutes of Health?

human genome project

Windows maintains a(n) ________ on your system that helps to speed up searches.

index

A(n) ________ is a set of rules that are used to apply a knowledge base to each situation.

inference engine

A database is a collection of ________ that has been organized in a meaningful way.

information

The most common personal printer is the ________ printer.

inkjet

Which of the following is a method of synchronous online communication?

instant messaging

The fetch-and-execute cycle is also called the ________ cycle.

instruction

Third-generation computers are characterized by the use of ________.

integrated circuits

Which of the following types of storage has a relatively low price per GB, fast transfer speed, and is secure inside a system unit?

internal hard drive

Which of the following would NOT be a recommended place to back up computer files?

internal hard drive

The term "cloud" in cloud computing refers to ________.

internet

Ubiquitous computing is also called ________.

invisible computing

Which of the following is NOT a characteristic of the DisplayPort interface?

it is an analog interface

Which is NOT an advantage of using a cloud storage service?

it is faster than other backup options

A GIS is made up of datasets, also called ________, of geographically referenced information about Earth's surface.

layers

In the Windows operating system, the Documents, Music, Pictures, and Videos folders are known as ________.

libraries

When using a Windows PC, you can use a ________ to organize similar files that are located in different locations.

library

What formatting character displays between words?

light dots

________ is a social network that is designed for business connections.

linkedin

The Android operating system is the embedded version of ________.

linux

In an office acceptable use policy (AUP), which of the following might be prohibited?

logging into ebay

A ________ error is an error in programming design that results in an unexpected outcome.

logic

To ensure that a person does not misspell Wednesday in a field, a(n) ________ list can be used.

lookup

In Excel, you can use ________ to automate tasks.

macros

Hard drives store data ________.

magnetically

The SDLC follows the development of a system from planning to the final stage, ________.

maintenance

An expert system is a computer programmed to ________.

make decisions in real life situation

Clickjacking results in ________.

malware posting unwanted links on your Facebook page

The collection of websites that enable users to create user-generated content, connect, network, and share is called social ________.

media

The ________ is a complex circuit that enables it to act as the brain of the computer.

microprocessor

Fourth-generation computers use ________.

microprocessors

Pixels are most closely associated with ________.

monitors

________ Law predicted that the number of transistors placed on an integrated circuit would double approximately every two years.

moores

Which of the following is NOT an example of an expansion card?

motherboard

Data in a ________ database are stored in data cubes.

multidimensional

Wi-Fi that is made available in some cities and towns is known as ________ Wi-Fi.

municipal

A system that simulates human thinking by emulating the biological connections of the brain is called ________.

neural network

Web apps which will run on any device with a supported browser and Internet access are called platform-________.

neutral

Which Boolean operator would you use to exclude a term in your search results?

not

Which of the following screen elements is displayed below the Slide pane and allows you to type additional slide information?

notes pane

Which of the following is a network operating system (NOS)?

novell

The science and telecommunications industries would most likely use the ________ database type.

object orientated

When you define objects and the actions that can be performed on them, you are using ________ programming.

object orientated

Which Word screen element displays a list of commands related to things you can do with a document such as opening, saving, printing, or sharing?

office button

The free online storage provided by Microsoft is called ________.

one drive

In a relational database for vehicles, a ________ relationship occurs when each vehicle record may link to several repair records, but each repair can link to only one vehicle.

one to many

The ________ is the most important software on a PC.

operating system

________ software provides the user with an interface to communicate with the computer's hardware.

operating system

Forcing a processor to run at speeds higher than it was designed to perform is known as ________.

overclocking

________ recommends music to you based on your listening preferences.

pandora

________ uses multiple processors, or multi-core processors, to share processing tasks.

parallel processing

A(n) ________, also known as a hotfix, addresses individual software problems as they are discovered.

patch

The sequence of folders to a file or a folder is known as the file's ________.

path

Another name for the actual attack caused by a virus is a ________.

payload

A ________ enables you to manage your email, calendar, contacts, and tasks—all in one application.

personal information manager

A method by which the CPU can be processing four instructions at the same time is called ________.

pipelining

A ________ sets aside a portion of a slide and serves as a holder for text or other content such as pictures, graphics, or charts.

placeholder

In the ________ phase of the SDLC, the project team is assembled and the feasibility studies are completed.

planning

An online environment for programming that allows development, testing, and deploying custom applications is called ________.

platfrom as a service

Adobe Acrobat and Adobe Reader are associated with which type of file?

portable document format

In a one-to-one relationship, both tables use the same ________ to link two records.

primary key

The ________ a set of five steps that a programmer follows to create a computer program.

program development cycle

A ________ helps you to complete projects, keep within your budget, stay on schedule, and work with others.

proj mgmt program

File information such as type, size, and date are called file ________.

properties

In the URL http://www.irs.gov, http is the ________.

protocol

________ conveys the steps of an algorithm using English-like statements that focus on logic, not syntax.

pseudocode

To share files with other users of the same computer using macOS, you would place them in the ________ folder.

public

A ________ could be used to retrieve all the phone numbers from a student database.

query

A ________ contains the information for a single entity in the database.

record

A(n) ________ contains information about a single entry in a database.

record

If your computer has a ________, someone else can gain access to it undetected.

rootkit

A ________ connects two or more networks together.

router

Which device on a network performs network address translation?

router

Which broadband service are you likely to use if you live in a very remote area?

satellite

Which is NOT an adaptive input device?

standard mouse

When you start the Word program, what do you need to do to create a new document?

start typing

Procedural programming involves ________.

step by step list

________ technology is used for sending email messages.

store and forward

Which of the following is NOT a function of the CPU?

store data

Which would make the best primary key in a table?

student ID

A(n) ________ allows someone to use software for a monthly or yearly fee.

subscription

________ are very expensive, complex computer systems used in weather forecasting and medical research.

supercomputers

If you misspell a command word in a computer program, you have created a ________ error.

syntax

The rules that ensure the correct construction of commands in a programming language is called the ________.

syntax

The ________ software makes the computer run.

system

The ________ is the logical model of a new system.

system specification report

The ________ houses the power supply, memory, and drive bays of the computer.

system unit

In a database, a ________ stores data in rows and columns.

table

In a database, related records are organized into one or more ________.

tables

Default file type associations determine ________.

the application that will open when you double-click the file name in File Explorer

________ consists of these four components: input, processing, storage, and output.

the info cycle

Distributed computing distributes ________.

the processing of tasks across

Which of the following is a form of solid-state storage?

thumb drive

Adding a browser ________ gives you quick access to the features of the application that installed it.

toolbar

A(n) ________ is most commonly found on a notebook computer.

touchpad

The concentric circles on a hard disk are called ________.

tracks

The FTP protocol is used to ________.

transfer files

Second-generation computers used ________.

transistors

What is NOT true about pop-up blockers?

triggered by cookies

A ________ appears to be a legitimate program, but is actually something malicious.

trojan horse

A datacenter is a facility designed to house a company's servers and other equipment in a secure and controlled environment.

true

A feasibility study is used to determine if a project should proceed.

true

A first-generation language executes very quickly but takes a lot of effort to write and debug.

true

A hotfix resolves individual software problems as they are discovered.

true

A many-to-many relationship exists when a book has multiple authors and the authors have written many different books.

true

A rootkit is a set of programs that enables someone to gain control over a computer system surreptitiously.

true

A service pack is a large, planned software update that addresses multiple problems or adds multiple features.

true

A template contains information such as presentation styles, bullet type and size, fonts, and backgrounds.

true

An expert system is used to simulate human judgment to solve problems.

true

Control structures are used to show the logic and the flow of data processing.

true

Cyber-harassment is defined as cyberbullying between adults.

true

Durability, as related to transaction processing, means that once a transaction has been completed, it cannot be undone.

true

Flowcharts are used to show the flow of logic through an algorithm.

true

Formatting means changing the look of the text, layout, or design of a slide.

true

In object-oriented programming, an object defined in one program can be reused in a different program.

true

Most of the modern programming languages are 3GL and require programmers to have a considerable amount of programming knowledge.

true

Neural networks are used for data mining and speech recognition.

true

One of the purposes of the project team is to identify the scope of the project and define the objectives.

true

One way to display the data in a table is by creating a report.

true

The Integrated Automated Fingerprint Identification System database contains fingerprints of those who have served in the armed forces or work in the federal government and law enforcement.

true

The Integrated Automated Fingerprint Identification System is considered to be a biometric database.

true

The National Missing Person DNA database is part of the CODIS system.

true

The System Development Life Cycle is a traditional model used to develop an information system.

true

The advantage to using a PaaS system is the elimination of local administration, hardware, and software.

true

The geographic information system combines layers of geographically referenced information about Earth's surface.

true

To open an existing presentation, you must first click on the Office button.

true

When designing a database, you should have separate fields for a person's first and last names.

true

When developing an algorithm, pseudocode statements focus on logic, not syntax.

true

________ is an example of a microblogging site that allows a limited number of characters in a post.

twitter

The ________ is an early computer created in 1951, which was used to predict election results.

univac

A data ________ rule would prevent a user from entering text in a date/time field.

validation

Which File Explorer tab will display commands that enable you to change the way objects in a file list are displayed?

view

The difference between a virus and a worm is a ________.

virus needs a host file, but a worm does not

The SDLC, the traditional model for system development, is also called the ________ model.

waterfall

The tools that allow users to create content and have changed the way people communicate and collaborate on the web are known as:

web 2.0

Programs that interpret HTML to display webpages are called ________.

web browsers


Ensembles d'études connexes

Ch 8 Commercial Property Insurance

View Set

Chapter 4- The Market Forces of Supply and Demand

View Set

Lab: Population Growth and Resource Consumption

View Set

Service and Production Operations Test 2

View Set

Residential Market Analysis and Highest & Best Use

View Set