Computer Concepts
A communication port is a physical circuit through which data flows.
false
A filing cabinet full of folders and papers would be classified as a structured file because every document has a unique structure.
false
A formula, such as =B6+(C6*.1), does not contain cell references.
false
A manual calculator implements algorithms autonomously.
false
A private IP address can be used to send data over the Internet.
false
A wiki and a tweet are similar because they are collaborative, enabling contributors to post, read, and modify content
false
Access to databases is usually open to anyone within an organization or business.
false
Acts of war affect only computer systems located on battlefronts.
false
Although there are online sources for software, most consumers obtain software offline.
false
An HTML document begins with the DOCTYPE and html declarations.
false
The part of the data bus that runs between the microprocessor and RAM is called the _______ bus
local
In a relational database, relationships are specified by joining common data stored in records from different tables.
true
Moore's law accurately described the rate of chip innovation for the last 50 years.
true
RATs can be used to create a backdoor to a victim's device that takes control of the device's camera.
true
Some database software provides tools to work with more than one collection of records, as long as the records are somehow related to each other.
true
Web apps are examples of cloud computing.
true
You can create HTML documents with simple text editors such as Notepad or TextEdit
true
You can set up WiFi to use wireless mesh topology OR star topology.
true
You can think of HTTP as the system that browsers use to communicate with a Web server and ask for HTML documents.
true
You may be able to bypass DNS outages by changing your DNS server.
true
You won't find a desktop with application windows on an iOS device.
true
YouTube is an example of social media.
true
prior to 1912, there were no laws or regulations restricting amateur radio transmission in the United States.
true
Any data entering a digital device could be malware
true
DP is faster than TCP but does not perform error checking.
true
In a database, the template for a record is referred to as a record ______.
type
A(n) _______________ uses available technology to work from home or an offsite location.
telecommuter
Digital data can be __________ that have been converted into discrete digits such as 0s and 1s
text numbers graphics, sound, and video
Chrome OS is an example of a _________ because it depends substantially on processing and storage provided by cloud-based servers.
thin client
The most popular battery type used in today's electronic devices is __________.
lithium ion
Which of the following tools would be found in 3D graphics software?
rendering tools ray tracing tools surface texture tools
The primary purpose of ________ software is to help the computer system monitor itself in order to function efficiently.
system
Twitter messages, called _________, carry a limit of 140 characters.
tweets
The ability to switch between programs makes computers multipurpose devices.
True
The core of a computer program is a sequence of instructions.
True
The facts in a Prolog program are useful even without any rules.
True
In a database, a(n) _________ holds data for a single entity.
record
MIDI files are less compact than digital audio files.
False
Memory cards are typically volatile.
False
Programmers insert documentation called facts into the program code.
False
Relational databases store unstructured data.
False
SQL is banned from the NoSQL technology collection.
False
SQL statements contain command words but do not contain data.
False
System software is a set of computer programs that helps a person carry out a task
False
TIFF, PNG, and GIF graphics formats offer lossy compression
False
Ted Nelson developed the specifications for URLs, HTML, and HTTP
False
The Head section of an HTML document contains text and links to images.
False
The binary number system has only two digits: 1 and 2
False
The entire Internet contains about a zettabyte of data.
False
The operating systems for smartphones are radically different to those used for tablet computers.
False
The order or sequence of rules in a Prolog program is usually critical.
False
The organization that supervises Internet addressing is ARPANET.
False
________ is utility software designed to measure responsiveness of an Internet connection
Ping
If a hacker intercepts encrypted data by way of a MITM attack, the contents of that data is not always secure.
true
In Wikipedia, it is possible to edit the text of an article in HTML
true
The goto command is rarely used by skilled programmers because it can lead to programs that are difficult to understand and maintain.
True
When a peripheral device is connected or disconnected while the host device is operating, it is called hotplugging
True
Which type of problem requires human intuition as the basis for finding a solution.
Unstructured
Once you have installed antivirus software, you don't typically need to keep it running full time in the background
false
Overall, the information provided by blogs tends to be more reliable than information from the mainstream media.
false
Pharming attacks carried out by DNS spoofing can be detected by antivirus software or spyware removal software.
false
Privacy is only important if you have something to hide.
false
Similar to a worm, a trojan is not designed to spread itself to other devices.
false
Spreadsheet software offers database capabilities for establishing relationships between different record types.
false
The Web is synonymous with the Internet.
false
The file name of a specific Web page always appears first in the URL.
false
The labels and values on a spreadsheet worksheet cannot be formatted in similar way as you would format text in a word processing document.
false
The main weakness of OS X is lack of security.
false
The number of teens using Facebook increased 30% in 2014
false
The objective of a MITM attack is for a third party to block communications between two entities
false
The terms outsourcing and offshoring are the same thing
false
The use of several databases is one of ERP's major advantages.
false
Transistors performed functions similar to vacuum tubes, but they were larger and more power hungry.
false
The AtanasoffBerry Computer was the first computing device to use transistors instead of vacuum tubes as processing circuitry.
false
Two-way radio technology went portable during World War I.
false
Using just HTML and CSS, Web designers can create dynamic Web pages.
false
Viruses spread themselves from one device to another.
false
Web crawlers gather material from the invisible Web.
false
During the ____________ phase, new hardware is purchased, installed, and tested to ensure that it operates correctly.
implementation
Finding a value for a variable is referred to as ___________.
instantiation
In SQL terminology, creating a relationship between tables is referred to as _______ tables.
joining
Once loaded into RAM, the __________ provides essential operating system services, such as memory management and file access.
kernel
The goal of the planning phase for an information system project is to create a(n) ____________.
project development plan
Guglielmo Marconi is credited as the person who invented the ___________, a device that sends and receives sound as electromagnetic waves.
radio
Video compression can be expressed as a compression ______.
ratio
Wireless connections use licensed frequencies that are available for public use.
false
Some projects fail because of constant, unmanaged demand for changes, often referred to as ________.
feature creep
Head-mounted digital devices designed to look like eyeglasses are called __________.
smartglasses
A(n) ____________ is special high-speed memory that allows a microprocessor to access data more rapidly than from memory located elsewhere on the system board.
CPU cache, cache
Software for Macs is usually stored in a single executable file with an __________ extension.
.app or app
The first telephone was invented and patented by Alexander Graham Bell in ________.
1876
What generation of cell phone technology was the first to offer true mobile broadband?
4G
Wireless connections use unlicensed frequencies that are available for public use, including 2.4 GHz and _____ GHz. which is subject to less interference from other devices, but it has a more limited range.
5, five
As with other popular mobile operating systems, Android is designed for _______ processors.
ARM
________ is the term for transmission capacity of a communication channel
Bandwidth
The term __________ refers to huge collections of data that are difficult to process, analyze, and manage using conventional database tools.
Big data
Which of the following would be considered essential software for both laptop computers and a tablet computer
Browser
__________ are the most commonly used database clients.
Browsers
Two of the most common open source and free software licenses are ___________.
BSD and GPL
________ is the number of bits that are processed during a specific unit of time, usually during one second.
Bit rate
Which of the following would NOT be considered an essential element of a browser?
Bookmark toolbar
__________ is the obligation not to disclose willingly any information that should be kept private.
Confidentiality
The ________ paradigm is most efficient for processing words and languages.
Declarative
___________ programming is an approach to software development in which programmers anticipate what might go wrong as their programs run, and take steps to smoothly handle those situations.
Defensive or secure
The acronym ____________ refers to software that manages data stored in a database.
DBMS
________ is a wired network technology that is defined by IEEE 802.3 standards.
Ethernet
Commonly held expectations of privacy include which of the following?
Freedom from intrusive surveillance. The expectation that individuals can control their own personally identifiable information
Which of the following is a VoIP service?
FaceTime Snapchat Google Talk
Which of the following is NOT used to create or edit HTML documents?
Filezilla FTP client
_____ is the current HTML specifications.
HTML5
Which of the following is NOT drawback of using cloud storage?
High price of storage.
________ is a 64bit number that uniquely identifies a cellular device.
IMSI
Data becomes _______ when it is presented in a format that people can understand and use.
Information
________ compression stores only the pixels that change color from one frame to the next.
Interframe
_______ compression can be applied to each frame of a video
Intraframe
Which of the following job descriptions best matches that of a systems analyst?
Investigates the requirements of a business or an organization, its employees, and its customers in order to plan and implement new or improved computer services.
_________-density data refers to large volumes of very detailed data in which many of the details are not important.
Low
Which of the following is not considered to be type of database client?
Local software Browsers Apps
DHCP assigns an IP address to a device and links it to the device's _______ address.
MAC
A ______ address is used to uniquely identify devices on LANs
MAC, media access control
______ specifies a standard way to store music data for synthesizers and computers.
MIDI
A(n) ______________ rating of 150,000 hours means that, on average, a device could function for 150,000 hours before failing.
MTBF
Which of the following sequence of events best describes an online intrusion?
Malware enters the device, then opens a backdoor, leading to an open communications link on the device that a hacker can exploit.
________ determine organizational goals and plan how to achieve those goals.
Managers
Which type of network topology allows for redundant paths between devices that can be used to bypass failed devices?
Mesh
_________ tags make it possible to search for photos or videos using keywords
Metadata
Transmitting data in a telegraph system used the _______ alphabet, a binary encoding system based on dots and dashes.
Morse code
__________ specify how shared files can be used.
Permissions
What provides a visual model for classifying and comparing various social media services
Social media honeycomb
Which of the following is NOT a type of location service?
Sociogram
Which of the following is not a filenaming convention?
Spaces are not allowed
In a(n) __________ database, data for a query is fetched from one or more shards of a distributed database, and then it is processed by the DBMS to produce the query result.
Relational
_________ is a temporary holding area for data and programs.
RAM
A(n) _________ is a false identity used for purposes of deception
Sockpuppet
______________ is copyrighted software marketed under a trybeforeyoubuy policy
Shareware
A(n) ___________ is a specialized facility designed to hold and protect computer systems and data.
data center
A hard disk drive is an example of magnetic storage
True
A multicore processor that executes more than one instruction at a time is referred to as a parallel processor.
True
A solid state drive can be used as a substitute for a hard disk drive.
True
3D graphics can be animated
True
A bitmap graphic is composed of a grid of tiny rectangular cells.
True
RAM is volatile
True
Along with a profile image, which of the following would also be included in a user profile?
Tagline
_____ was the first commercially successful computer.
UNIVAC
A ________ device transmits data as radio waves and is compatible with Ethernet, so you can use the two technologies in a single network
WiFi
A basic social media profile generally includes which of the following?
a user name
Digital devices such as NOOK and the Kindle, that are designed for displaying the content of digital publications, such as books, magazines, and newspapers are referred to as __________.
ebook readers
Crowdsourcing is based on contributions from groups of individuals, but it differs from collaborative work
true
In a spreadsheet worksheet, a(n) ___________ works behind the scenes to tell the microprocessor how to use the contents of cells in calculations.
formula
A file name extension indicates the _______.
file format
An operating system uses a(n) ___________ to keep track of the names and locations of files that reside on a storage medium, such as a hard disk.
file system
A spam __________ uses a set of rules to examine email messages and determine which are spam.
filter
A(n) __________ file consists of a single, twodimensional table of data elements.
flat
Most computer historians agree that computers have evolved through _______ distinct generations.
four
Operating systems provide file organization tools called ___________.
file management utilities
During the ____________ phase of the SDLC, the project team supervises the tasks necessary to construct the new information system.
implementation
Each fact in a Prolog program is similar to a record in a database, but you can query a Prolog program's database by asking a question, called a(n) _______ in Prolog jargon.
goal
A graphics card contains a(n)__________ and special video memory, which stores screen images as they are processed but before they are displayed.
graphics processing unit , GPU
A ________ networks allow visitors to access the Internet through a LAN, but doesn't allow them to access other resources and data on the network.
guest
Passwords used as encryption ________ help to make hijacked data unusable.
keys
The SQL query language provides a collection of special command words called SQL ______________.
keywords
The structure of files and folders displayed by File Explorer is called a ________ storage model because it helps you create a mental picture of the way files are organized in a hierarchy of folders.
logical
Any device in a network is called a(n) __________.
node
A(n) ____________ administrator plans, installs, and maintains one or more local area networks and may also manage cloud resources.
network
SQL ____________ are detailed specifications for a command.
parameters
In the context of digital devices, the term __________ refers to any component that is required to perform work.
resource
The ALU uses __________ to hold data that is being processed
registers
Although many content communities allow open access to media, most require _________ before files can be uploaded.
registration
In the context of database security, user ______ management allows access to data on an asneeded basis.
rights, permissions
Any code that is designed to hide the existence of processes and privileges is referred to as a(n) _______.
rootkit
In the context of a Prolog program, a(n) __________ is a general statement about the relationship between facts.
rule
Social media services such as Facebook emphasize _______ over the other six factors found in social media honeycombs.
relationships
Dropbox is an example of a file hosting service.
true
HTML tags are instructions for a browser.
true
Hackers can use ports to communicate with devices in botnets
true
A typical _________ window displays a work area, called a workspace, that represents a blank piece of paper.
word processor or word processing
A virus __________ usually arrives as an email message that contains warnings about a supposedly new virus.
hoax
_______ applications provide optimal information when they encompass customer support, marketing, and sales.
CRM
Digital audio is stored in a variety of file formats, including ___________.
WMA WAV MP3
Most graphics software uses a process called pixel _________ to create new pixels by averaging the colors of nearby pixels
interpolation
If you are traveling and expect to access files on a computer that you've left at home, make sure the remote access utilities is turned off.
false
If you want to change your default browser, you need to delete the browsers that you no longer want to use.
false
If you want to run thirdparty apps on your Android device, you need to jailbreak it.
false
In DFD terminology, a data store is a process that changes data by performing a calculation, updating information, or sorting a list.
false
In a casesensitive database, uppercase letters are equivalent to their lowercase counterparts.
false
In addition to replicating itself, a virus selfdistributing.
false
In today's Web, most Web pages have bidirectional links.
false
Information engineering methodology treats an information system as a collection of objects that interact to accomplish tasks.
false
Information systems can provide some or all of the data needed for strategic, tactical, but not operational planning.
false
It is not possible to delete the contents of your browser cache.
false
It is not possible to encrypt a Windows hard drive volume
false
It is not possible to extract analytical data from operational databases.
false
Microsoft Windows is used exclusively on desktop systems.
false
Microsoft uses a service called Safe Browsing to alert users about sites to avoid.
false
Most ISPs and email services do not use filtering techniques to block spam
false
Most Internet connections are symmetrical.
false
Most Web apps require installation on your local computer or handheld device.
false
Most handheld devices can use either Web apps or mobile apps but not both.
false
Most wireless LANs use licensed frequencies that require applying to the FCC for permission
false
Network discovery works in the exact same way on all devices
false
On mobile devices, VoIP uses the voice stream, not the data stream
false
Once you've released data to an information system, you still have have control of its distribution or its security.
false
Partitions are created, modified, and deleted using Filezilla on Macs and Disk Partitioner on PCs.
false
Purchasing software is the same as buying tangible goods, meaning software can be used, altered, loaned to friends, resold, or given away.
false
SQL keywords must be entered in all uppercase letters because they are casesensitive.
false
Search engines do not allow users to view or change their search history information.
false
Session cookies are stored on a disk or other permanent storage medium.
false
System documentation contains stepbystep instructions for performing specific tasks.
false
The acronym ERP stands for enterprise relationship payment
false
The dotcom bubble occurred between the years 2008 and 2010.
false
The term product life cycle is frequently used to describe patterns in the way consumers adopt technology products.
false
There is a universal standard for categorizing software and various categorization schemes have few similarities
false
Webmail is configured so that incoming messages are stored in an Inbox on your local storage device.
false
When connecting to the Internet, most Internet users connect to a Tier 1 network.
false
When you create a work, you must apply for protection of that work by copyright and only then do you have exclusive rights to its distribution, modification, and sale.
false
While users can view content, they cannot post any content on YouTube.
false
With wired connections, such as Ethernet, the rated speed and range are usually quite different to actual performance.
false
Within a single program, multiprocessing allows multiple commands, or threads, to run simultaneously
false
Your online reputation is how you see yourself, but your online identity is how others see you.
false
Your search history is the same as your browser history.
false
Most massmailing databases are legitimately compiled from customer lists.
false
The CANSPAM Act is considered an effective means of controlling the volume of spam on the Internet.
false
Database software stores data as a series of records, which are composed of _________ that hold data.
fields
A primary key is a ____________ that contains data unique to a record.
field
In a database, a(n) __________ contains the smallest unit of meaningful information
field
To monitor activity throughout the day, you can wear a __________. These devices, worn on the wrist or clipped to a pocket, monitor your steps and heart rate.
fitness tracker
A(n) ______ is a set of letters that share a unified design
font
In the computer industry, the term _________ refers to the size and dimensions of a device or components
form factor
In 1969, computer scientists began to develop high-level languages, called ________-generation languages, which more closely= resembled human languages.
fourth
The number of frames that are displayed per second is measured in _______.
fps
In digital video, each bitmap image is referred to as a(n) __________.
frame
A(n) _________ informs potential lenders that they must verify the identity of anyone attempting to open an account in your name.
fraud alert
In spreadsheet software, a(n) ___________ is a builtin preset formula.
function
Expert systems are designed to deal with data that is imprecise or with problems that have more than one solution using a technique called __________.
fuzzy logic
The concept of _________ allows for the limited use of copyrighted material without obtaining permission from the copyright holder.
fair use
Which type of cables are used for high-capacity trunk lines that provide main routes for telephone, cable, and Internet communications?
fiberoptic cables
A(n) ____________ is a template that adds the correct formatting as data is entered. If someone attempts to enter data in the wrong format, the database can be set up to reject that entry or correct it.
field format
A(n) _____________ is a specification that the database designer sets up to filter data entered into a particular field.
field validation rule
When saving a file, you must provide a valid file name that adheres to specific rules, referred to as _______________.
filenaming conventions
A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications.
firewall
A(n) _________ is a graphical representation of the way a computer should progress from one instruction to the next when it performs a task.
flowchart
A(n) __________ is a section of code that is part of a program, but is not included in the main sequential execution path.
function
Payment processing is based on an online payment __________ that authorizes credit and debit cards, PayPal, and Apple Pay transactions.
gateway
Social media are categorized into four groups: social networking, ___________ networking, content communities, and online communications.
geosocial
In economics, _________ are things that can be used or consumed, whereas _________ are intangible actions performed for a consumer.
goods, services
The success of an underwater telegraph cable depended on the discovery of __________, a rubber-like substance.
gutta-percha
Two devices on a network negotiate their communication protocols through a process called ___________.
handshaking
A(n) ______ value is a unique number derived from encoding one or more data sets, such as names, serial numbers, and validation codes.
hash
Many organizations establish a(n) ____________staffed by technical support specialists who are familiar with the information system's software.
help desk
Image editors provide an image __________ that can be used to adjust the brightness values for various ranges of dark, midrange, or light pixels
histogram
The browser ________ page is the first page displayed when the browser starts.
home
A WiFi ______ is a wireless local area network that provides Internet access to the public
hotspot
A USB _____ is an inexpensive device that turns one USB port into multiple ports
hub
Web pages are connected by __________ links
hypertext
Antivirus software can use techniques called__________ to detect malware by analyzing the characteristics and behavior of suspicious files.
heuristic analysis
What is the term that is used to describe a computer system that could store literary documents, link them according to logical relationships, and allow readers to comment and annotate what they read?
hypertext
The iOS operating system is found on which device?
iPhone
A database ____________ contains a list of keys, and each key provides a pointer to the record that contains the rest of the fields related to that key.
index
Which of the following is data that would NOT be found in a cookie?
information it reads from your hard drive
A(n) ____________ system collects, stores, and processes data to provide useful, accurate, and timely information, typically within the context of an organization.
information
Exploits that use malicious SQL statements to gain unauthorized access to a database are called SQL _____________.
injection
A(n) ____________ printer has a nozzle-like print head that sprays ink onto paper to form characters and graphics.
ink jet, inkjet, inkjet
When a program begins, the memory address of the first instruction is placed in a part of the microprocessor's control unit called a(n) __________.
instruction pointer
Microprocessors are hardwired to perform a limited, preprogrammed set of activities called a(n) ___________.
instruction set
There are four categories of _____________: patents, trademarks, copyrights, and trade secrets
intellectual property
1996 was the year that cable _______ service made its debut.
internet
As an alternative to a compiler, a(n) ________ converts and executes one statement at a time while the program is running.
interpreter
A(n) _________ SDLC can be used to create and implement a small subset of a system and then enhance it through a series of upgrades.
iterative
Which of the following is an example of an operating system that is used by smartphones?
iOS Android Windows RT
Social media services such as LinkedIn emphasize _______ over the other six factors found in social media honeycombs.
identity
On an iOS device, when you make unauthorized changes to the device's software, this is called a(n) ____________ .
jailbreak
A widely accepted technique called __________ application design is based on the idea that the best information systems are designed when end users and systems analysts work together on a project as equal partners.
joint
In a programming language, a(n) ______, or command, is a word with a predefined meaning
keyword
The process of designing, entering, and testing the rules in an expert system is referred to as __________.
knowledge engineering
The _____________ in a problem statement is the information that is supplied to the computer to help it solve a problem.
known information
On a network, _______ is the elapsed time for data to make a round-trip from point A to point B and back to point A.
latency
Sometimes an application requests memory but never releases it, a condition called a memory ______.
leak
When 4:3 videos are displayed in a widescreen player, they are bordered by the black bars of a(n) _______.
letterbox
A software ________ is a legal contract that defines the ways in which a computer program may be used
license
Which of the following options are well suited for using vector graphics?
line art logos diagrams
Programs such as Dreamweaver and KompoZer are examples of ______ HTML editors.
local
A password manager can store passwords in an encrypted file located at which of the following storage locations?
local storage cloud storage USB storage
Customer __________ programs such as Zappos VIP help attract and retain customers.
loyalty
Dark data centers are an extension of ___________, which allows system administrators to monitor and manage servers using remote control software.
lights-out management
What is the term used for when a link leads to a Web page that no longer exists
link rot
Like a ___________ language, an assembly language is classified as a low-level language because it is machine specific—each assembly language command corresponds on a onetoone basis to a machine language instruction
machine
A large, closet-sized computer capable of simultaneously processing data for hundreds or thousands of users is most likely a __________ computer.
mainframe
The ____________ phase of the SDLC involves the day-to-day operation of the system, making modifications to improve performance, and correcting problems.
maintenance
A method is activated by a(n) _________, which is included as a line of program code.
message
A set of commands called HTTP ________ help your browser communicate with Web servers
methods
Encapsulation refers to the process of hiding the internal details of objects and their ___________.
methods
A class is defined by attributes and ________.
methods
A(n) ___________ is a segment of code that defines an action.
method
A qualityofservice ____________ is a technique used for measuring a specific QoS characteristic.
metric
Modern refrigerators, washing machines, and other appliances are controlled by integrated circuits called ____________ that combine sensors with processing circuitry
microcontrollers
In a processor, the timing device that sets the pace for executing instructions is called the ___________.
microprocessor clock
A(n) ____________ is an integrated circuit designed to process instructions
microprocessor
Data _________ refers to computer algorithms that analyze information to discover previously unknown and useful information, including relationships and patterns.
mining
Every organization has a goal or plan that's referred to as its ___________.
mission
The underlying structure of a database is referred to as a database _________.
model
In the context of office suites, the term ___________ refers to a component, such as a word processing program.
module
Which of the following is an advantage of wired connection
more secure more dependable faster speeds
A microprocessor that contains circuitry for more than one processing unit is called a ________ processor.
multicore, multicore, multi core
A key element of __________ databases is their ability to support OLAP queries that make it possible to combine data, drill down to specifics, or slice and dice the data to view it from different perspectives.
multidimensional
A(n) ___________ operating system provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously.
multitasking
Regarding OO programming, which of the following terms best matches with the term "method"?
main()
Common classifications of _________ include viruses, worms, and trojans.
malware
Desktop and laptop computers require an operating system with a file __________ system that allows users to view and manipulate data files
management
A(n) _________ is a keyword that describes information, such as the content of a media element.
metadata tag
A ___________ app is designed for a handheld device, such as a smartphone, tablet computer, or enhanced media player.
mobile
An operating system's ____________ capability supports a division of labor among all the processing units.
multiprocessing
A network utility called ______________ produces a detailed list of open ports on a device.
netstat
The circles in a sociogram are referred to as sociogram ______.
nodes
A process called ____________ helps database designers create a database structure that minimizes storage space and increases processing efficiency.
normalization
The goal of ______________ is to minimize data redundancy.
normalization
Which of the following can be used to block unauthorized access while allowing authorized communications on a device or network?
network router personal firewall hardware that uses a NAT
Many employment contracts contain a(n) ______________ designed to prevent employees from divulging proprietary information to competitors or opening competing businesses.
non-compete clause
___________ is a term for a person who devises and carries out a scam in order to accomplish a goal.
none of the above
A record that contains data is referred to as a record ________.
occurrence
A(n) _____________ is a collection of programs that typically include word processing, spreadsheet, presentation, and database modules.
office suite
___________ reduces the cost of goods and services by using workers and manufacturing facilities in countries with inexpensive labor.
offshoring
Many touchscreens have an _________ coating designed to repel the oils deposited by fingertips
oleophobic
A person's presence on a social media service is referred to as a(n) _________.
online identity persona avatar
The _________ for an instruction specifies the data, or the address of the data, for the operation.
operand
A search __________ is a word or symbol used to narrow or broaden your search.
operator
A(n) ____ code, is a command word for an operation such as add, compare, or jump.
op
The ________________ paradigm is based on the idea that the solution for a problem can be visualized in terms of objects that interact with each other.
object-oriented
Most modern transaction processing systems use ________ processing—a realtime method in which each transaction is processed as it is entered.
online
A(n) ________________ takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software.
online intrusion
Which of the following is a common use of serverside scripting
online shopping
A(n) _________ database is used to collect, modify, and maintain data on a daily basis
operational
Parcels of data that are sent over a network are called ________.
packets
A Web __________ is based on an HTML source document that is stored as a file on a Web server.
page
The phrase programming _____________ refers to a way of conceptualizing and structuring the tasks a computer performs.
paradigm
Keywords can be combined with specific ____________, which provide more detailed instructions for the computer to carry out.
parameters
A disk __________ is a section of a hard disk drive that is treated as a separate storage unit.
partition
The core function of a password manager is to store user IDs with their corresponding ________.
passwords
A clipping ______ essentially cuts an object out of an image and knocks out the background to make it transparent.
path
A computer file's location is defined by a file ______.
path
The action carried out by malware code is referred to as a(n) _______.
payload
Keyboards and printers are two examples of _________ devices.
peripheral
The term __________ device is used for devices such as printers, display devices, storage devices, mice, and headsets that are connected to the system unit of a computer.
peripheral
On a network, file sharing allows users to open, view, edit, copy, and delete files from a remote device, providing that they have the proper ___________ .
permissions
Cookies that are stored on a device after a session ends are referred to as ________ cookies.
persistent
Originally called microcomputers, _________ are designed to meet the computing needs of individuals.
personal computers
Computer systems such as the Mark8 and the MITS Altair are examples of early ______ computers
personal
Speech recognition software analyzes the sounds of your voice and converts each word into groups of ________.
phonemes, phoneme
In a digital camera, a CCD's ________ correspond to pixels.
photosites, photosite
A(n) ____________ storage model describes what actually happens on the disks and in the circuits.
physical
Illegal copies of software are referred to as _______ software.
pirated
Bitmap graphics are coded as a series of bits. Each bit represents the color of one ________.
pixel
An undesirable jagged appearance of a graphics image is referred to as _______.
pixelation
Bitmap images are formed by a grid of _____.
pixels
A(n) ________ is a program that extends a browser's ability to work with file formats.
plugin
The ability to redefine a method in a subclass is referred to as ___________.
polymorphism
Link _________ is a measure of the quality and quantity of the links from one Web page to others.
popularity
A communication ______ is a virtual end point for data entering and leaving a digital device
port
Popular ___________ software products include Microsoft PowerPoint, iWork Keynote, LibreOffice Impress, and Google Docs Slides.
presentation
The downside of the _____________ paradigm is that it does not fit gracefully with certain types of problems— those that are unstructured or those with very complex algorithms.
procedural
Activities called ___________ involve the microprocessor receiving commands as software carries out tasks and while input arrives from the keyboard, mouse, and other devices
processes
A computer _________ is any person whose primary occupation involves the design, configuration, analysis, development, modification, testing, or security of computer hardware or software.
professional
A social media _________ is the set of information someone provides to friends, contacts, and the public.
profile
Most social media sites provide a generic ________ image for users who do not upload a personal photo.
profile
Instructions that tell a computer how to carry out processing tasks are referred to as a computer _______.
program, application
A computer ________ designs, codes, and tests computer programs. In addition, they may modify existing programs to meet new requirements or eliminate bugs.
programmer
A computer _____________ is a set of stepbystep instructions that tell a computer how to carry out a task.
program
In the context of networks, a communication __________ refers to a set of rules for efficiently transmitting data from one network node to another.
protocol
Which of the following is not one of the main activities associated with operational databases?
providing an executive dashboard for decision makers
When a router connects to and communicates over the Internet, it has a ________ IP address that is routable over the Internet.
public
A(n) __________ is available for use by any routine in the program while a(n) _______________ can be accessed only from the routine in which it is defined.
public attribute, private attribute
Which of the following is not an example of an authentication protocol?
password PINs fingerprint scanner
If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________ is an excellent option.
password manager
Which of the following is not a core CRM system?
payment gateway
If your device will not display a PDF in your browser, you may need to install a browser ________ .
plugin
A(n) __________ pings a packet of data to a port in order to see if that port is open or not
port scan
In Prolog, the __________ describes the relationship between the _________ .
predicate, arguments
In a problem statement, a(n) _____________ methodology requires extensive planning and documentation up front.
predictive
A(n) _______________ is a field that contains data unique to a record.
primary key
In the words of Justice Brandeis, what is the "right to be let alone?"
privacy
From the perspective of a business that creates and sells a technology product, the ____________maps the expected profitability of a product from its inception to its demise.
product life cycle
In addition to sales, CRM, and SCM, ERP modules support business activities such as _____________.
product planning manufacturing and purchasing inventory control and distribution
In the context of economics, ___________ is a measurement of the amount of output that is produced per unit of input.
productivity
A search engine's_________ processor looks for your search terms in the search engine's indexed database and returns a list of relevant Web sites.
query
Computer programming languages designed for databases are called _________ languages because one of their main capabilities is to request data from a database
query
A vector graphic can be converted into a bitmap graphic through a process called _________.
rasterizing, rasterization
Which of the following is the technique for adding light and shadows to a 3D image?
ray tracing
Database software stores data as a series of ____________, which are composed of fields that hold data
records
In a database, a(n) ____________ refers to a collection of data fields.
record
A(n) _____________ contains parts of the operating system necessary to boot your computer and diagnose system problems after a hard drive failure or software malfunction.
recovery drive, system repair disc
In a(n) _________ database, a table is a sequence of records, similar to a flat file.
relational
The process of covering a wireframe with surface color and texture is called _________.
rendering, render
A(n) ____________ control structure directs the computer to repeat one or more instructions until a certain condition is met.
repetition
Data __________ refers to the form in which data is stored, processed, and transmitted
representation
In the context of social media, an online _________ is the impression that is generated by an online persona.
reputation
Proposed changes to application specifications should be managed within a formal process that includes written change _______.
requests
System _________ are the criteria for successfully solving problems identified in an information system.
requirements
System ___________ specify the operating system and minimum hardware capacities necessary for a software product to work correctly.
requirements
The dimensions of the grid that forms a bitmap graphic are referred to as image __________.
resolution
The number of horizontal and vertical pixels that a device displays on the screen is referred to as screen ________.
resolution
Unauthorized modifications to any mobile device to overcome limitations imposed by mobile service providers is called _______.
rooting
With just facts and goals, Prolog would be nothing more than a database, but the addition of _________ gives programmers a set of tools to manipulate the facts.
rules
A(n) ________________ is a software tool for specifying the content and format for a database report.
report generator
Which of the following feature is unique to OS X?
resource fork
A ______________ exploit usually begins with a virus warning and an offer to disinfect the infected device.
rogue antivirus
The main directory on a storage device is referred to as the ________ directory
root
Which of the following is an example of a DCE?
router modem hub
To digitally record sound, __________ of a sound wave are collected at periodic intervals and stored as numeric data in an audio file
samples, sample, sampling
One method of heuristic analysis allows the suspicious file to run in a guarded environment called a(n) ___________ .
sandbox
Relational databases are organized according to a(n) _________, which is simply the blueprint for its structure.
schema
Search engines usually work with keyword queries where the user enters one or more words, called __________.
search terms
Highlevel programming languages were available for use on ________generation computers
second
With the proliferation of computer viruses and worms, computer __________ has become a hot niche for IT workers.
security
In an information system, problems can be classified into three types: structured, ________, and unstructured.
semi-structured
An integrated circuit is a set of microscopic electronic circuits etched onto a thin slice of ___________ material such as silicon
semiconducting, semiconductor
During ___________ execution, the first instruction in the program is executed first, then the second instruction, and so on, to the last instruction in the program.
sequential
Processors that execute one instruction at a time are considered to be ________ processors
serial
A computer that is primarily used to serve data to other computers on a network is called a(n) ______________.
server
________side scripts run on Web servers rather than on your local device.
server
An HTTP ________ is a sequence of transactions between a Web server and a broswer.
session
The process of dividing a database into distributed subsets is called ________.
sharding
An expert system __________ is a software tool containing an inference engine and a user interface that developers use to enter facts and rules for a knowledge base.
shell
To delete data from a disk in such a way that no one can ever read it, you can use special file ________ software that overwrites supposedly empty sectors with random 1s and 0s.
shredder
Unicode uses________ bits and provides codes for 65,000 characters.
sixteen
The __________ form factor features a touchscreen that covers most of the device's surface
slate, tablet
Which type of device is the top target for ransomware?
smartphones
Sociologists use social network diagrams called _________ to depict connections between people.
sociograms
Most economists regard goods and services as a continuum, with intangible goods, such as __________, in the middle of the continuum.
software
In a general sense, ____________ refers to all the nonhardware components of a digital device
software
The collection of programs on a computer is referred to as _______________.
software
A __________ document contains the text for a Web page interspersed with coding for how to display text and any additional visual or auditory elements
source
An HTML document is sometimes referred to as a _______ document
source
_________ is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems.
spam
_________ enables people to control software with spoken commands, as well as dictate text into a word processing document.
speech recognition
Unauthorized changes to the DNS are called DNS ________.
spoofing
Which of the following is not a characteristic of a computer worm?
spread through a process called sideloading
Within the agile development framework, the process of developing each iteration of a program is called a(n) _________.
sprint
Any software that secretly gathers personal information without the victim's knowledge is classified as __________.
spyware
Networks use more than one protocol, and the collection of protocols for a network is referred to as a protocol ________.
stack
HTTP is considered to be a(n) ___________ protocol.
stateless
Because HTTP is a _________ protocol, each time you connect to a different Web page at the site, the server regards it as a new visit.
stateless
In the context of programming, a problem ____________ defines certain elements that must be manipulated to achieve a result or goal.
statement
VDEs for mobile devices are based on a(n) ___________ that a programmer manipulates to design the user interface for an app.
storyboard
One type of decision support system, called an executive information system, is designed to provide senior managers with information relevant to ___________ management activities such as setting policies, planning, and preparing budgets.
strategic
The emphasis on longrange and future goals is referred to as _________ planning.
strategic
A(n) _______ password is difficult to hack.
strong
A(n) ___________ file uses a uniform format to store data for each person or thing in the file.
structured
The term database ___________ refers to the arrangement of fields, tables, and relationships in a database.
structure
A(n) __________ is any class from which attributes can be inherited.
superclass
At its time of construction, one of the fastest computers in the world is referred to as a(n) _________________.
supercomputer
When communication is ______________, interchanges happen in real time while all parties are online
synchronous
The set of rules that specify the sequence of keywords, parameters, and punctuation in a program instruction is referred to as _______.
syntax
Computers run three main types of software: application software, development tools, and _______ software.
system
The electronic components of most digital devices are mounted on a circuit board called a ______________.
system board motherboard main board
The ________ houses all essential chips and provides connecting circuitry between them
system board, motherboard, main board
A __________ solution for data storage adds resources to a single device, while a __________ solution adds more devices to a system.
scale up, scale out
A(n) ___________ is a program designed to help people locate information on the Web by formulating simple queries.
search engine
Which of the following is the technique for improving the ranking and visibility of a Web site?
search engine optimization
A(n) ________________ tells a computer what to do based on whether a condition is true or false.
selection control structure
A(n) _____________ changes the order in which instructions are carried out by directing the computer to execute an instruction elsewhere in the program.
sequence control structure
A DBMS feature known as __________ ensures that transactions are updated in an orderly manner by establishing update rules.
serializability
Software for PCs contains a _________ program that guides you through the installation process.
setup
ASCII requires __________ bits for each character
seven
A virus __________ is a section of program code that contains a unique series of instructions known to be part of a malware exploit.
signature
A(n) _________ sort uses one field, to arrange records. A(n) _________ sort arranges information by more than one field.
single-level, multi-level
A ____________ is generally priced at a flat rate and allows software to be used on all computers at a specific
site license
A(n) __________ is the column of data in a database that is used as the basis for rearranging the data.
sort key
Participants in open _________ community projects get experience and make connections with other professionals that can be valuable resources during a job hunt.
source
The human-readable version of a program created in a high-level language by a programmer is called __________.
source code
The telecommunications technique used by local email is sometimes referred to as __________.
store-and-forward
A(n) ___________ is the sequence of organizations, people, activities, information, and resources involved in moving a product or service from supplier to customer.
supply chain
Instant messaging is a ______________, real-time technology for two or more people to type messages back and forth while online.
synchronous private
After unit and integration testing are completed, _________ testing ensures that all hardware and software components work together.
system
The term ________ refers to the part of a digital device that holds the system board.
system unit
There are three core elements in a relational database: fields, ________, and relationships.
tables
Which of the following is based on computer technology?
tablets ebook readers game consoles
Browser________ allow your browser to queue up multiple Web pages so that you can easily switch between them.
tabs
Authors mark up HTML documents by inserting special instructions called HTML ______.
tags
An information _________ degree programs focus on computer equipment and software used by businesses.
technology
A(n) ___________ is a device that transmits human voices over a distance using cables or airborne signals.
telephone
The 1930s can be characterized as a phase of innovation for ________, a technology designed to send moving images over a distance.
television
A report ____________ contains the outline or general specifications for a report.
template
It was not until the ______generation of computers that portable operating systems, such as CP/M and UNIX, provided programmers with similar operating system commands across hardware platforms.
third
______generation computers became possible by the development of integrated circuits.
third
In the context of communication networks, the term __________ refers to the structure and layout of network components
topology
Magnetic and optical media are divided into circular ______ and then further divided into pieshaped ________.
tracks, sectors
A(n) ___________ provides a way to collect, process, store, display, modify, or cancel transactions.
transaction processing system or TPS
In a wireless network, RF signals are sent and received by a ______________.
transceiver
Second-generation computers used ________ instead of vacuum tubes.
transistors
A(n) __________ is a computer program that seems to perform one function while actually doing something else
trojan
A 404 status code indicates that the resource that your browser requested does not exist.
true
A URL never contains spaces.
true
A Web site cannot be accessed by its domain name until the name is added to the domain name server lists.
true
A botnet has a server that is controlled by hackers.
true
A computer that used an Intel 4004 microprocessor would be considered a fourthgeneration computer
true
A copyright holder has total control over how a work may be used.
true
A decision support system derives its name from the fact that it provides the tools a decision maker needs to analyze data.
true
A document called a system requirements report that describes the objectives for the information system.
true
A key characteristic of viruses is their ability to lurk in a device for days or months, quietly replicating themselves.
true
A local application is installed on a computer's hard disk.
true
A lookup routine validates an entry by checking data in an inhouse or thirdparty database.
true
A major source of data for CRM is produced by loyalty programs.
true
A mobile app called __________ allows consumers to send and receive photo and video messages referred to as "snaps."
true
Acceptance testing is designed to verify that the new information system works as required.
true
An application development tool is essentially a software construction kit containing building blocks that can be assembled into a software product.
true
An efficiently designed database uses computed fields whenever possible because they do not require manual data entry.
true
Antivirus software cannot be expected to block threats that do not arrive in the form of malware.
true
Application software for an information system is usually a series of preprogrammed software modules supplied by a software publisher.
true
Applications include menu options for opening and saving files calling on the operating system's file management routines to get the job done.
true
AtanasoffBerry Computer is often considered the first electronic digital computer.
true
Brute force attacks methodically try every possible password until the correct one is found.
true
By some estimates, nearly 40% of all online identities are fake.
true
Colossus used binary arithmetic.
true
Companies are classified into economic sectors according to the types of goods and services they provide.
true
Connection speed is technically a measure of capacity.
true
Copyright holders can assign any combination of CC rights to create a license.
true
Data centers are designed to proactively reduce the risk of data loss that might occur as a result of a disaster.
true
Dedicated enterprise database applications may allow cosmetic changes, but they do not encourage modifications of core data structures.
true
Domain name servers maintain lists of all domain names and their corresponding IP addresses.
true
Enterprise database applications tend to have some flexibility for customization,
true
Every peripheral device connected to a computer is regarded as an input or output resource.
true
Every storage device has a directory containing a list of its files
true
Files can remain in the Web cache for days or weeks
true
From a database user perspective, the data type determines the way data can be manipulated.
true
Heuristics may produce false positives that mistakenly identify a legitimate file as malware.
true
Historically, IT departments were part of an organization's finance department.
true
Human errors are mistakes made by computer operators.
true
ICT use in emerging nations lags behind its use in developed nations.
true
IM technology offers a degree of anonymity because typed messages have no associated voice or video
true
If you wanted to run multiple operating systems on one computer, you would use a virtual machine.
true
In a spreadsheet worksheet, each cell in a grid can contain a value, label, or formula.
true
In some academic settings, Wikipedia is not regarded as a reliable source of information
true
In the United States, copyrights do not expire until 70 years after the author's death
true
Information systems designed for a specific industry or enterprise may use vertical market software.
true
Information technology law is the legal framework that applies to the collection, storage, and distribution of digital information.
true
Instant messaging technologies were available on local area networks even before the Internet was open to the public.
true
Iterative SDLCs are often referred to as "agile methods" because they allow flexibility as development progresses.
true
JAD provides a structured methodology for planning and holding a series of meetings in which users and analysts jointly identify problems and look for solutions.
true
LANs use many of the same network technologies as the Internet.
true
Like books and movies, software is a type of intellectual property.
true
Macs do not use drive letters, and the main hard disk is called Macintosh HD.
true
Many RFID and NFC tags contain no power source of their own and depend on the receiving device to provide the power for data exchange.
true
Many Web apps allow several people to collaborate on projects because the project files are stored on the Web and can be easily shared.
true
Microwaves have more carrying capacity than radio waves.
true
Mobile broadband can be used to access the Internet from a laptop or desktop computer.
true
Mobile devices tend to be populated by entertainment apps, games, and social media services
true
Most blogs are open to the public, so blogging has become a form of personal journalism.
true
Most commercial software is distributed under a singleuser license that limits use to one person at a time.
true
Most spreadsheet software also includes basic data management features
true
Most states in the US have data breach notification statutes that require corporations to take specific steps if a data breacexposes personally identifiable information.
true
Most trojans are not designed to replicate themselves
true
Napster spurred the development of sophisticated, distributed protocols such as BitTorrent
true
OS X devices include a utility that automatically encrypts data stored locally.
true
One of the major functions of an information system is to help people make decisions in response to problems.
true
On an Android device, a thirdparty file manager utility is required to manipulate files.
true
Packet loss of less than 2% is required for acceptable streaming, gaming, Skype, and voice calls.
true
Paragraph style includes the alignment of text within the margins and the space between each line of text.
true
Password managers can generate unique passwords that have very good entropy.
true
Portable software does not require installation
true
Portable software is so simple to install that it is sometimes referred to as installfree software
true
Private messages can be forwarded by recipients, so they do not necessarily remain private
true
Public key encryption requires one key to encrypt data, but a different key to decrypt it.
true
Radio technology is the basis for cell phones and WiFi.
true
Samuel Morse developed and patented a telegraph system.
true
Search engines will keep a record of your search history.
true
Social engineering attacks prey on human vulnerabilities.
true
Social media sites, such as Wikipedia, YouTube, and Flickr, are examples of content communities
true
Social networking services tend to emphasize identity and relationships
true
Spam sent by scammers often uses spoofed email addresses.
true
Technically, a supply chain stretches from raw materials and parts all the way to customer delivery.
true
Technology workers encompass jobs such as telephone cable installers and radio broadcasters.
true
The Apple II computer included color graphics.
true
The Stuxnet virus that disabled Iranian nuclear centrifuges is an example of cyberwarfare
true
The first cellular phones to access the Internet and the Web were available in 1996.
true
The first telephones were connected by pointtopoint networks, similar to those used by the telegraph system
true
The goal of SCM is to supply customers with the right product at the right price.
true
The goal of normalization is to minimize data redundancy.
true
The growth of the ICT industry has a generally upward trend.
true
The kernel stays in RAM the entire time your computer is on.
true
The most common types of PUPs and PUAs are toolbars and alternative browsers
true
The most widespread wireless channels for communication networks are microwaves and RF signals.
true
The single most effective security measure for digital devices is to password protect access to them.
true
The term quality of service refers to the level of performance a computer system provides.
true
The term service pack usually applies to operating system updates
true
The 2002 SarbanesOxley Act is meant to offer protection to whistleblowers.
true
URLs contain a domain name
true
Web sites can be spread across multiple Web servers
true
Webmail is typically a free service.
true
When interference affects a wireless signal, data must be retransmitted
true
When setting up a WiFi network, the router you select should support the fastest device you'll want to use on the
true
Whistleblowing is risky under any circumstances.
true
WiFi signals may reach up to 300 feet from the router.
true
Wiki software provides a set of tools for creating and editing content.
true
Wikipedia articles can be edited by anyone at any time, and the accuracy and reliability of Wikipedia information are controversial.
true
You can access FTP servers with a browser.
true
In an HTML document, most tags are inserted as pairs.
true
Social networking can be traced back to online services, such as CompuServe, Prodigy, and America Online
true
A(n) ____________ system consists of hardware and application software designed to offer a complete information system solution.
turnkey
A hashtag specifies a keyword that can be used to find and group _______ by topic
tweets
From a technical perspective, a data __________ specifies the way data is represented on physical storage media and in RAM.
type
Formal __________ standards make it possible to create generalized media search engines that can locate media from multiple locations.
tagging
A __________ cookie is set by a site other than the one you connected to.
thirdparty
A(n) __________ is a word, name, symbol, or design used to identify one company and their goods from those of another company.
trademark
A(n) ____________ work repackages a copyrighted work to add new meaning or produce a work that is used for a purpose different from the original work.
transformative
The Windows operating system includes an _________ utility, which deletes software files from various folders on your computer's hard disk.
uninstall
A software ___________ is a small section of program code that replaces part of the software currently installed
update or patch
It is a good idea to ________ your browser when a new version becomes available, mainly to increase security.
upgrade
A new version or edition of a software product is referred to as a software ___________.
upgrade
Prolog allows you to ask openended questions by replacing constants with __________.
variables
A(n) _________ represents a value that can change.
variable
When you change the size of a(n) _______ graphic, the objects change proportionally and maintain their smooth edges.
vector
If a program exceeds its allocated space, the operating system uses an area of the hard disk or other storage device as _______ memory.
virtual
A(n) _______________ allows one computer to simulate the hardware and software of another.
virtual machine or VM
The AtanasoffBerry Computer was the first computing device to use ________ instead of mechanical switches as processing circuitry.
vacuum tubes
A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.
virus
Early computers that held both programs and data in memory became known as ________ architecture.
von Neumann
Before finalizing the algorithm for a computer program, you should perform a(n) __________ to verify that your algorithm works.
walkthrough
Smartwatches, smartglasses, and fitness trackers can be classified as _______ computers
wearable
Instead of running program files that are stored locally, the code for _______ applications is downloaded along with HTML pages and is executed clientside by the browser.
web
_________ is configured so that incoming messages are stored in an Inbox on the Web.
webmail
___________ is the disclosure by an employee of confidential information that relates to some danger, fraud, or other illegal or unethical conduct connected with the workplace, be it of the employer or of fellow employees.
whistleblowing
_________ is a collaborative Web application that provides tools that enable contributors to post, read, and modify content.
wiki
Spreadsheet software can be used to create an on-screen __________ that is based on a grid of columns and rows.
worksheet
Stuxnet is a notorious computer _______.
worm
A feature called ___________ determines how your text flows from line to line by automatically moving words down to the next line as you reach the right margin.
word wrap
The processors that are found in just about all desktop and laptop computers are _____ compatible
x86
A(n) ______________ attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code
zero-day
Which of the following would be considered spyware?
a keylogger
Which type of mobile broadband service has maximum download rates of 300 Mbps and upload rates of 75 Mbps?
4G
If you wanted to set the text in a section of your HTML document to italics, what tag would you use?
<i>
_________ changes an originating address or a destination address to redirect the flow of data between two parties.
Address spoofing
Thomas de Colmar's _________ became the first massproduced mechanical calculator.
Arithmometer
Which ecommerce classification encompasses online storefronts selling merchandise and services to consumers?
B2C
Which database data type is a collection of binary data stored in a single field of a database?
BLOB
Which file sharing protocol distributes the role of a file server across a collection of dispersed computers
BitTorrent
____________ encompasses a broad set of activities that include planning, coding, testing, and documenting while a related activity, __________, is a development process that uses mathematical, engineering, and management techniques to reduce the cost and complexity of a computer program while increasing its reliability and modifiability.
Computer programming, software engineering
When antivirus software detects malware, which of the following would not be a course of action you could take?
Conduct a heuristic analysis.
___________ is designed to make a work freely available for distribution and modification under the condition that all derivative works use the same license.
Copyleft
Which of the following is NOT a format that is used for digital audio?
DOC
_________ is the amount of data a storage device can move per second from the storage medium to RAM.
Data transfer rate
What type of computer should you consider purchasing if you want a system that is ideal for dedicated gamers, serious designers, desktop publishers, and video editors?
Desktop
Which type of security measure reduces the likelihood of a deliberate attack?
Deterrents
Which category of software would programming languages fall into?
Development Software
_______ was designed to calculate trajectory tables for the U.S. Army.
ENIAC
Which of the following is not a characteristic of a weak password?
Eight characters in length and include one or more uppercase letters, numbers, and symbols
_________________ refers to the process of hiding the internal details of objects and their methods.
Encapsulation
Which type of protocol provides a way to transfer files from one computer to another over any TCP/IP network, such as a LAN or the Internet.
FTP
A computed ___________ is a calculation that a DBMS performs, similar to the way a spreadsheet computes a formula.
Field
_______ computers, such as UNIVAC, can be characterized by their use of vacuum tubes to store individual bits of data.
First-generation
The World Wide Web is a collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called _____.
HTTP
If you are sending personal data such as credit card information to a Web site, which of the following should you see in the address bar of your browser?
HTTPS
Which DCE would you use if you wanted to extend a wired network by adding more ports?
Hub
A(n) _____________contains a collection of instructions for actions that the circuitry in a microprocessor can perform
Instruction set
Which from the following list are an example of productivity software?
Microsoft Office Google Docs iWork
Which OS is installed on more than 80% of the World's personal computers?
Microsoft Windows
________ data consists of numbers that can be used in arithmetic operations
Numeric
Which type of network connects smart devices or consumer electronics within a range of about 30 feet (10 meters) and without the use of wires or cables.
PAN
Which of the following is NOT a type of digital video container file?
PNG
Which HTTP method does a browser use when you upload files to a specific Web address
PUT
_________ technology divides a message into several packets that can be routed independently to their destination.
Packet switching
Which of the following is NOT an example of an expansion port?
RAM
Which of the following is not a SQL keyword?
REMOVE
Which of the following would not be considered a common carrier?
Radio
___________ locks a device and then requests payment for an unlocking code.
Ransomware
Which SQL keyword is used to search for records?
SELECT
Which of the following is NOT an HTTP method?
SEND
___________ is a service offered by Google that checks URLs against a list of suspicious Web site URLs
Safe Browsing
What are the main software categories?
System, Development, and Application
On a network, which protocol is responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order, and error checking?
TCP
What type of computer should you consider purchasing if you want a portable system that is great for consuming content such as ebooks, music, and videos but not so great for creating content or multitasking?
Tablet
_____________ is a network diagnostic tool that shows you each router and server that your data encounters as it travels over the Internet.
Traceroute
A link contains the ________ that links to another Web page.
URL
Every Web page has a unique address called a(n) ___________.
URL
Which type of network cover a large geographical area and usually consists of several smaller networks, which might use different computer platforms and network technologies.
WAN
A(n) ____________ is a company that provides space on a server to house Web pages
Web hosting service
The ____________ is a collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called HTTP
World Wide Web
Which of the following is NOT a type of bitmap format?
ZIP
3-D graphics are based on vectors stored as a set of instructions describing the coordinates for lines and shapes in a threedimensional space. What do these vectors form?
a wireframe
A cryptographic __________ is a procedure for encryption or decryption.
algorithm
Today's widescreen devices, such as laptops and smartphones, are designed for the 16:9 __________.
aspect ratio
The _______ number system allows digital devices to represent virtually any number simply by using 0s and 1s.
binary
Blogs and their interconnections are referred to as the ____________.
blogosphere
In the context of bitmap graphics editing, what technique employs algorithms that pull pixels from one area of an image and then apply them to another area?
cloning
A(n) _________ is a set of guidelines designed to help professionals thread their way through a sometimes tangled web of ethical on-the-job decisions.
code of ethics
A(n) _______ is the software that compresses a video stream when a video is stored, and decompresses the file when the video is played
codec
Which of the following would be found on a standard Wikipedia page?
community edit: Requests for improvements
Online __________ are two or more online personas with the same name or user name.
doppelgangers
What is another term for vector graphics software?
drawing software
A browser __________ adds features to a browser.
extension
A key feature of the Apple Lisa was its use of _______________.
graphical user interface
In a repetition control structure, the computer is directed to repeat one or more instructions until a certain condition is met. The section of code that repeats is usually referred to as a(n) ___________.
iteration
A cryptographic ________ is a word, number, or phrase that must be known to encrypt or decrypt data.
key
What type of computer should you consider purchasing if you want a portable system that is good for students and onthego professionals who want to create content and be productive, in addition to consuming content?
laptop
Which of the following is an example of a computer that is a small, lightweight personal computer that is designed like a clam shell?
laptop computer
When working with Windows, storage devices can also be identified by a device __________.
letter
Microprocessors can't directly understand programming languages, so programs have to be converted into _____________ that corresponds to the microprocessor's instruction set.
machine language
A(n) ____________ calculator is a device that assists in the process of numeric calculations but requires the human operator to keep track of the algorithm.
manual
An abacus is an example of a(n) _________ calculator.
manual
Most computers have temporary holding areas called __________.
memory
Which of the following is NOT a factor in the quality of digital video?
memory technology in your camera
What does the HTML tag <p> designate in an HTML document?
new paragraph
A(n) _____________ is a group of people working together to accomplish a goal.
organization
With respect to organizations, confidentiality means protecting __________ information about company finances, procedures, products, and research that competitors would find valuable.
proprietary
Sampling _______ refers to the number of times per second that a sound is measured during the recording process.
rate
A Web _________ is an Internet-based computer that stores Web site content and accepts requests from browsers.
server
A computer _______ is a selfreplicating, selfdistributing program designed to carry out unauthorized activity on a victim's device.
worm
The planning phase of a SDLC includes all of the following except _________.
writing a requirements report
On Windows systems, the main executable file has a(n) ________ extension.
.exe or exe
Which of the following file extensions indicates teh file is an HTML document
.html & .htm
Which of the following file extensions is NOT a vector graphic?
.tif
Compressed files usually have ______ at the end of the file name
.zip
Companies such as IBM and Sperry Rand launched the computer industry when they brought the first mainframes to market in the ________.
1960s
Apple released the first Apple Macintosh computer in what year? ___________
1984
The Motorola DynaTAC 8000X was brought to market in what year? ___________
1984
Telegraphy remained the major technology for intercontinental communication well into the ________.
1950s
When were the original HTML specifications developed by Tim Berners-Lee?
1990
Worldwide, the ICT industry directly employs about _____ of the total workforce in jobs such as computer manufacturing, programming, and data security.
4%
In 1971, Intel introduced the world's first microprocessor called the _________.
4004
The maximum speed of a dialup connection is _____ Kbps
56, fifty six
Spam accounts for approximately ______ of all email.
70%
Which wireless standard is faster: 802.11n or 802.11ac?
802.11ac
The __________ chip family set the standard for processors used in today's desktop and laptop computers, as well as servers.
8086, x86.
If you wanted to turn bold off for the remainder of the text in an HTML document, what tag would you use?
</b>
Which HTML tag designates links to other Web pages?
<a href>
The ____________ is the part of the microprocessor that performs arithmetic operations, such as addition and subtraction.
ALU, arithmetic logic unit
On a Mac, Once you download the software, open the DMG file from the Downloads folder and then drag the _______ file to your Applications folder.
APP or .APP
Processors based on ____ technology dominate tablet computers and smartphones
ARM
____ processors are found in Microsoft's Surface tablets, Apple's iPads and iPhones, and Samsung's lineup of Galaxy phones.
ARM
Which of the following is a function of the browser cache?
Any elements that it stores do not have to be downloaded again
____________ testing is the process of trying out various sequences of input values and checking the results to verify that the application works as it was designed.
Application
_____________ programmers create productivity applications such as Microsoft Office, as well as enterprise applications such as CRM and ERP.
Application
There are various encryption methods, but __________ is the encryption standard currently used worldwide
AES
MITM attacks include which of the following?
Address spoofing IMSI catchers Evil Twins
Babbage's __________ was an allpurpose computing device
Analytical Engine
_____________ software shields certain applications against behaviors commonly exhibited by intrusions.
Anti-exploit
Which type of communication protocol converts data into standard formats that can be used by applications?
Arrival
What type of Internet connection do you have when upload speed differs from download speed?
Asymmetric
A common wireless technology for connecting peripherals is ___________.
Bluetooth
Which term is used to describe an online, personal journal in the form of a web page that contains posts on one or more topics which are usually displayed in reverse chronological order?
Blog
A(n) _________ tool is a software application designed for documenting system requirements, diagramming current and proposed information systems, scheduling development tasks, and developing computer programs.
CASE
In business circles, the galaxy of services that revolve around customers is called ___________.
CRM or customer relationship management
_________ refers to the number of associations that can exist between two record types.
Cardinality
_____________ is a set of detailed style specifications, called style rules, for an HTML document.
Cascading Style Sheets, CSS
A communication _________ is the medium used to transport information from one network device to another
Channel
A ___________ is a special category of laptop, designed to be connected to the Internet for most routine computing activities
Chromebook
In 2009, Google launched an operating system called ______ OS.
Chrome
__________ devices have a keyboard as the base and a screen on the hinged cover
Clamshell, notebook, laptop
______-side scripts are embedded in an HTML document and run locally when a Web page is displayed by a browser.
Client
Which of the following is not a characteristic of a management information system?
Collect, display, and modify transactions
A transaction processing system is characterized by its ability to:
Collect, display, and modify transactions. Store transactions. List transactions.
_______ was an electronic device designed to decode messages that were sent between the German High Command and their field commanders in World War II.
Colossus
Which of the following would not be considered a disruptive technology?
Computers that run OS X replacing computers that run Windows 8.
The maintenance phase of a SDLC includes all of the following except _________.
Convert data
__________ is a form of legal protection that grants the author of an original work an exclusive rights that work
Copyright
____________ is the use of ICT technology to carry out politically motivated attacks designed to infiltrate, sabotage, or damage an opponent's information systems and defensive capabilities.
Cyberwarfare
Which ecommerce classification encompasses consumers selling merchandise and services to each other?
C2C
_________ are awarded based on successful completion of an exam that verifies your level of knowledge about a particular technology or subject.
Certificates
__________ is the process of modifying an executable file or data stream by adding additional commands
Code injection
The bulletin board systems of the 1970s are considered to be the forerunners of _____________.
Content Communities
Which popular social media service is good for sharing media and information?
Content Community
A nonprofit organization called ____________ provides a set of standardized licenses that copyright holders can use to extend the rights to use their works to others.
Creative Commons
The SQL command word _________ removes a record from a table.
DELETE
IP addresses can be assigned by a network administrator, but more commonly they are automatically assigned by _________.
DHCP
Downloads of Mac software are ordinarily supplied as a _______ package.
DMG
The mechanism for tracking domain names and their corresponding IP addresses is called the ________.
DNS, domain name system
Windows evolved from a Microsoft operating system called _____.
DOS
_______ is a highspeed, digital, alwayson, Internet access technology that runs over standard phone lines.
DSL, digital subscriber line
On a network, any device that stores or generates data is considered to be a(n) _________.
DTE
refers to the symbols that represent people, events, things, and ideas.
Data
____________ is distributed for free and often comes preinstalled on new devices, but it is limited in some way until you pay for it.
Demoware
Which of the following information technology laws makes it illegal to circumvent copyprotection technologies, such as those used to prevent unauthorized copying of software CDs, music CDs, and movie DVDs?
Digital Millennium Copyright Act
____________ scaling (or autoscaling) ensures acceptable database throughput by scaling out as necessary to handle peak loads.
Dynamic
______ can be used to flood a Web site with so much traffic that it can no longer provide its intended service.
DDoS Botnets Commands from a botmaster
Which of the following is not part of the analysis phase of a SDLC?
Develop a project schedule
________ technology displaces an existing business process, market, industry, or product.
Disruptive
The relationship between record types can be depicted graphically with a(n) _________.
ERD
A(n) _____ system can provide such benefits as improved overall performance by standardizing business processes based on best practices or improved access to information from a single database to an enterprise.
ERP
____________ refers to business transactions that are conducted electronically over a computer network.
Ecommerce
A(n) _____________ is a LAN server that is designed to look like a legitimate WiFi hotspot
Evil Twin
To establish a(n) ________, hackers set up an unsecured WiFi hotspot complete with an Internet connection.
Evil Twin
Which of the following is not a type of spam filter?
Entropy
__________ LANs are usually arranged in a star topology with computers wired to central switching circuitry that is incorporated in modern routers.
Ethernet
_______ involves the use of highcapacity fiberoptic cables to connect homes to broader municipal networks.
FTTH, fiber to the home
8bit color depth is also called True Color.
False
A desktop is a portable computing device featuring a touch-sensitive screen that can be used for input as well as for output.
False
A laser printer has a nozzlelike print head that sprays ink onto paper to form characters and graphics.
False
A lowlevel language uses command words and grammar based on human languages.
False
A programming language that supports the procedural paradigm is called a declarative language.
False
A simple example of a repetition control structure is the if...else command.
False
ARM-based processors are not especially energy efficient
False
ASCII text files contain formatting
False
Agile methodologies tend to be used for large software development projects involving more than ten developers, geographically dispersed development teams, and lifecritical applications.
False
Algorithms are usually written in a format that is specific to a particular programming language.
False
All bitmap graphics are photos
False
All remote storage is considered to be cloud storage.
False
All smartphones use the Android operating system.
False
An DIP is a square chip package, typically used for microprocessors, with pins arranged in concentric squares
False
Application programmers specialize in developing system software such as operating systems, device drivers, security modules, and communications software.
False
Athlon and Aseries processors manufactured by AMD are NOT x86 compatible.
False
Battery lifespan is the time your device operates before it must be recharged
False
Both scanners and digital cameras produce vector graphics
False
Character data is composed of letters, symbols, and numerals that are used in calculations.
False
Component systems are currently the most popular form factor for digital devices.
False
Data cannot flow over multiple networks that have different topologies
False
Declarative languages are commonly used for production applications.
False
Digital videos look sharpest when they are displayed at a resolution that is larger than the frame size.
False
During an instruction cycle, all parts of the instruction are performed by the microprocessor's control unit.
False
Generally speaking, in an objectoriented program, the objects don't interact.
False
In Prolog, facts can have no more than two arguments.
False
In the context of database security, intermediary servers allow users to directly access the database.
False
LGAs have two rows of pins that connect the chip to a circuit board
False
Lossy compression provides a way to compress data and reconstitute it into its original state.
False
Modern processors follow Intel's original numbering sequence.
False
ROM is temporary and volatile, RAM is more permanent and nonvolatile
False
The declarative paradigm is fundamentally quite similar to the procedural paradigm.
False
Third-generation languages added a level of abstraction to machine languages by substituting abbreviated command words for the strings of 1s and 0s used in machine languages.
False
To conserve space, applications that require highquality sound use low sampling rates
False
Transcoding digital videos does not cause a loss of quality
False
Vector graphics usually require more storage space than bitmaps.
False
When high-level languages were originally conceived in the 1950s, they were dubbed second-generation languages because they seemed a major improvement over machine and assembly languages.
False
programmers who work within the declarative paradigm envision a program as data objects that essentially network with each other to exchange data
False
you can specify the actual solution in the problem statement.
False
Which of the following descriptions best matches that of computer science degree?
Focuses on computer architecture and how to program computers to make them work effectively and efficiently
Which of the following descriptions best matches that of computer engineering degree?
Focuses on the design of computer hardware and peripheral devices, often at the chip level.
Which of the following is a file management utility?
Finder & File Explorer
DSL is an example of what type of Internet access?
Fixed
What is the term that refers to the sequence in which a computer executes program instructions?
Flow control
________ is the monetary value of all the goods and services produced by a nation's workforce on an annual basis.
GDP
In the list below, which one is NOT a search operator?
GET
Industry standard tools for scheduling and project management include PERT, WBS, and ________.
Gantt charts
A proprietary model called the __________ represents the position of a product during its life cycle of publicity.
Gartner Hype Cycle
_________ is the process of determining the coordinates of a specific place.
Geocoding
___________ networking provides a platform for users to carry out interactions based on their current locations
Geosocial
______ is called a markup language because authors mark up documents by inserting special instructions.
HTML
__________ is a file system developed in 2005 that handles millions of files distributed across multiple server nodes.
Hadoop
A(n) _________ specifies a keyword that can be used to find and group tweets by topic.
Hashtag or #
_______________, such as BASIC, Python, Java, Prolog, and C++, make the programming process easier by replacing unintelligible strings of 1s and 0s or cryptic assembly commands with understandable commands, such as PRINT and WRITE.
Highlevel languages
The ____________ was designed to tabulate the 1890 census and used cards with designated areas representing data fields.
Hollerith Tabulating Machine
______ certification, offered by Certiport, covers basic computing knowledge and skills.
IC3
The organization that supervises Internet addressing is ___________.
ICANN
What organization is the toplevel authority for supervising domain name requests?
ICANN
A(n) ________ is a type of SDK that packages a set of development tools into a sleek programming application.
IDE
The protocols POP3 and __________ can be used to manage your incoming mail.
IMAP
The ___________ connects active sensors and passive tags to communication networks.
IOT, Internet of Things
Internet addresses are controlled by which one of the following protocols?
IP
__________ uses 32-bit addresses to uniquely identify devices connected to the Internet.
IPv4
__________ uses 128bit addresses to uniquely identify devices connected to the Internet
IPv6
Networks that form the Internet are maintained by who?
ISPs
___________ is the fraudulent use of someone's personal information to carry out transactions.
Identity theft
______ is data that is entered into a computer. ______ is the result produced by a computer.
Input, Output
Which of the following is not a characteristic for a good problem statement?
It contains detailed descriptions of the processes and tools that need to be developed.
Which of the following would be considered a thirdgeneration computer?
IBM 360
The __________ is made up of businesses that focus on digital equipment, software, communications technologies, and related services.
ICT industry
Which of the following is the least important characteristic of content communities?
Identity
______________ are two of the world's largest exporters of ICT services
India and Ireland
Which database data type is used for fields that contain whole numbers—quantities, repetitions, rankings, and so on?
Integer
The SQL ________ command allows you to temporarily join and simultaneously access the data in more than one table.
JOIN
_________ was officially launched in 1995 and has many of the characteristics of C++, from which it derives much of its syntax.
Java
Which programming language is an interpreted language most commonly used for client-side Web scripting, such as animating page elements and validating input on HTML forms?
Javascript
_______ are designed to provide connectivity for devices within a limited area, typically within the premises of a home, office building, business, or school.
LANs
________ refers to any computer program designed to surreptitiously enter a digital device
Malware
Which type of broadband Internet access involves using cellular data networks?
Mobile
__________ states that every two years the number of transistors in an integrated circuit will double without raising its cost.
Moore's law
Which early browser was the first to run on multiple computer platforms including Windows?
Mosaic
The circuitry that enables a device to access a LAN is called a(n) ________.
NIC, network interface controller
The simplest structure for storing data in a(n) _________ database is the keyvalue data model.
NoSQL
The term __________ is used to refer to a group of technologies for managing databases that do not adhere to the relational model and standard SQL query language.
NoSQL
Which of the following options offer self-study training to career-minded individuals who might not have the time or means to complete a traditional degree program?
Nanodegree
In a __________ database, processing logic for the query is performed on the device that holds each database shard and if necessary, results are consolidated by the DBMS.
NoSQL
Which of the following is a process for installing software on a PC?
None of the above
__________ is a data analysis technique used by decision makers to quickly get answers to complex queries that encompass multiple factors, such as locations, revenue, time periods, and employee status.
OLAP
Which of the following operating systems is found on Macintosh desktop and laptop computers?
OS X
_______ storage represents data as microscopic light and dark spots on a disc surface
Optical
Four DBMS vendors are the first stop for professional developers: IBM, _________, SAS, and SAP.
Oracle
The implementation phase of a SDLC includes all of the following except _________.
Obtain approval
Which type of software must include the source code, which allows programmers to modify and improve the software?
Open source
What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed?
PUP
_______ is an email scam that masquerades as a message from a legitimate source.
Phishing
Which type of network topology connects a peripheral device to a host device?
Point-to-point
_____ software is designed to run from removable storage devices and requires no installation or configuration data to be stored locally.
Portable
In a browser, _________ services can automatically complete your search requests based on previous searches.
Predictive
_________ software supplies the tools for combining text, photos, clip art, graphs, animations, and sound into a series of electronic slides that can be shown on a screen or projector
Presentation
Which type of security measure reduces the effect of an attack by using data backups, disaster recovery plans, and the availability of redundant hardware devices?
Preventive countermeasures
____________ paradigms are used to conceptualize the solution to a problem as a sequence of steps.
Procedural
Much of the power and flexibility of the _________ language stems from its ability to query facts by matching predicates, comparing constants, and instantiating variables.
Prolog
The U.S. Department of Homeland Security identifies six national security functions supplied by the ICT sector. Which one of the following is not one of them?
Provide disruptive technologies
____________ is a notational system for algorithms that is less formal than a programming language, but more formal than simply jotting down notes.
Pseudocode
_________ refers to the status of works with expired copyrights or whose creators have forfeited their copyright
Public domain
Which of the following is not a step that a data breach victim should take?
Purchase a new computer or device
_________ redirects Web site traffic to fraudulent Web sites.
Pharming
___________ provides OO programs with easy extensibility and can help simplify program control structures.
Polymorphism
Which of the following is not a programming paradigm?
Predictive
__________ refers to a branch of data mining that analyzes current and historical data to predict future trends.
Predictive analytics
__________ is a term describing spam that uses a false pretext to trick victims into participating
Pretexting
Which of the following options is a useful format for your resume?
Print Email HTML
Which programming language is used for artificial intelligence applications and expert systems?
Prolog
Which of the following is NOT considered to be intellectual property
Public Domain
On a communication matrix, where would blogs be found?
Public asynchronous
__________ software may be freely copied, distributed, and even resold
Public domain
A ___________ is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker.
RAT
Which one of the following is NOT a Wikipedia content standard?
RSS
What would you use to set up a feed that monitors your favorite blogs, collects the latest posts, and displays them?
RSS reader & Blog aggregator
The years between 1920 and 1960 are considered the Golden Age of ________.
Radio
Which optical storage technology stores data permanently on a disc, which cannot be subsequently added to or changed.
Read-only
Which of the following is an example of why hard disk drives are so popular
Relatively low cost for lots of storage
Which of the following would not be considered an operating system resource?
RAM CPU Storage
Today's color display devices represent color using the ______ color model
RGB
Which of the following is a scripting language?
Ruby Perl PHP
_________ is the term that describes devices that automate many industrial tasks by receiving digital commands and converting them into real-world actions such as shutting down a power grid or opening a valve in a fuel pipeline.
SCADA
Businesses use ___________ to maximize efficiency and profitability of their supply chain.
SCM or supply chain management
A(n) ___________ is a collection of language-specific programming tools that enables a programmer to develop applications for a specific computer platform.
SDK
An information system progresses through several phases as it is developed, used, and finally retired. These phases are usually referred to as the _________.
SDLC
Systems analysis and design is a discipline that focuses on developing information systems according to the phases of an _________.
SDLC
Which of the following would not be considered a database data type
SELECT
One of the most common database operations is to query for a particular record or group of records by using the ________ command.
SELECT
__________ laid the foundation for the objectoriented paradigm.
SIMULA
The protocol used in a local email system that handles outgoing mail is__________.
SMTP
A(n) ________ is the broadcasted name of a wireless network
SSID
Word processing software is likely to include which the following features?
Search and Replace, readability formula
_____________ are mobile devices that have features similar to tablet computers, but also provide telecommunications capabilities over cell phone networks.
Smartphones, Smartphone
__________ is the process by which machines produce sound that resembles spoken words
Speech synthesis
Which database tool is best for simple flat files that involve calculations?
Spreadsheet software
Which type of network topology connects multiple devices to a central device?
Star
_______ is the term used for the components of a digital device designed to hold data permanently.
Storage, Permanent storage
__________ methodology focuses on the processes that take place within an information system.
Structured
____________ programmers specialize in developing system software such as operating systems, device drivers, security modules, and communications software.
Systems
__________ documentation describes a system's features, hardware architecture, and programming.
System
Computer historians believe that ____________ was the first programming language to work with objects, classes, inheritance, and methods.
SIMULA
Which of the following elements would NOT be found on a blog page?
SMTP services
Which of the following i would be considered a mechanical calculator?
Schickard's Calculator Pascaline de Colmar's Arithmometer
What is the process called when an app from a source other than an official app store is installed on a device?
Side-loading
Trojans depend on ________ to spread.
Social engineering
_____________ is a deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest.
Social engineering
__________ are online services that facilitate communication and interaction among people who want to share information.
Social media
Suppose you wanted to run a Web server or FTP server from your home. What type of IP address would you want?
Static
Which of the following is not included in Michael Porter's Five Forces model?
Supply chain efficiency
Which of the following terms is NOT part of an email system
Synchronous
The current method of encrypting communication between a client and a server depends on a security protocol called _______.
TLS
If a Creative Commons license contains ND, what does that indicate?
The work must not be changed when it is redistributed or shared.
A file name extension indicates the file format.
True
A slate tablet configuration is basically a screen in a narrow frame that lacks a physical keyboard.
True
A subclass is any class that inherits attributes from a superclass
True
A table's physical sort order is the order in which records are arranged on storage devices.
True
A vector graphic consists of a set of instructions for creating a picture
True
After a vector graphic is converted to a bitmap, the resulting graphic no longer has the qualities of a vector graphic.
True
All of the data stored and transmitted by digital devices is encoded as bits.
True
An API is a set of application or operating system functions that programmers can add to the programs they create.
True
An example of system software is a computer operating system.
True
An important characteristic of third-generation programming languages is that the source code can be written with simple tools, such as a word processor, and this code can be easily understood by programmers.
True
Another way to express an algorithm is with pseudocode.
True
As a general rule, declarative programming languages are most suitable for problems that pertain to words and concepts rather than to numbers.
True
At an ecommerce site, the merchant's ecommerce application carries out only the first and last stages of the payment process.
True
Bitmap graphics are resolution dependent because each element is a discrete pixel.
True
Computers with the same operating systems can typically use the same software and peripheral devices.
True
Data refers to the symbols that represent people, events, things, and ideas.
True
Digital photographs are stored as bitmap files.
True
Digital video uses bits to store color and brightness data for each video frame.
True
Dynamic scaling for database servers can be a challenge because the additional sharding has to be handled on the fly by the DBMS.
True
FileMaker Pro and Microsoft Access are DBMSs.
True
In a display device, response rate is the time it takes for one pixel to change from black to white then back to black.
True
In a keyvalue database, each data item has a key that is a unique identifier similar to a relational database key
True
In digital video, a lower resolution reduces the bit rate.
True
In digital video, as long as the proportion of horizontal and vertical pixels remains the same, the aspect ratio is consistent.
True
Instead of storing the color value for each pixel, a vector graphics file contains instructions that a computer uses to create the shape, size, position, and color for each object in an image.
True
Intel Corporation is the world's largest chipmaker and supplies a sizeable percentage of the microprocessors that power desktops and laptops.
True
JPEG files are compressed using lossy compression
True
Lossy compression techniques discard some data from an image to shrink its file size.
True
Lossy compression throws away some of the original data during the compression process
True
Microprocessors only understand machine language, so there has to be some way to convert assembly language instructions into 1s and 0s.
True
Most computer ads specify the speed of a microprocessor in gigahertz.
True
Networks can be classified according to their size and geographic scope
True
One of the main disadvantages of MIDI is that it cannot produce vocals.
True
One of the ways that databases are classified is by their structure.
True
Peripheral devices are generally attached to a computer with cables or a wireless connection
True
Plain, unformatted text is sometimes called ASCII text
True
Procedural languages encourage programmers to approach problems by breaking the solution down to a series of steps.
True
Processing is handled by the computer's central processing unit (CPU).
True
Prolog and other declarative languages were classified as fifthgeneration languages.
True
Prolog programming is all about facts and rules.
True
Regardless of sampling rate, digital audio file size can be reduced using audio compression techniques.
True
SQL works behind the scenes as an intermediary between the database client software provided to users and the database itself.
True
Semiconductors are substances with properties between those of a conductor and an insulator.
True
Smartphones evolved from basic cell phones and PDAs
True
Smartwatches are multifunction devices that can include a camera, thermometer, compass, calculator, cell phone, GPS, media player, and fitness tracker.
True
Solid state storage stores data in erasable, rewritable circuitry, rather than on spinning disks or streaming tape.
True
Some software engineering activities overlap with the systems analysis and design activities
True
Structured English is a subset of the English language with a limited selection of sentence structures that reflect processing activities.
True
Ten terabytes offer enough storage capacity to hold the printed collection of the Library of Congress.
True
Text-to-speech software analyzes the words in a section of text, finds corresponding phonemes, and combines them into sentences for output.
True
The CPU of most modern computers is a microprocessor
True
The Intel i7 microprocessor is x86 compatible
True
The Internet is the world's largest WAN.
True
The procedural approach is best used for problems that can be solved by following a stepbystep algorithm.
True
The process of planning a computer program begins with a problem statement that clearly define the program's purpose.
True
The technical term for ripping music tracks is digital audio extraction
True
The term 'stored program' means that a series of instructions for a computing task can be loaded into a computer's memory.
True
The term instruction cycle refers to the process in which a computer executes a single instruction.
True
Unlike a sort order, an index has no bearing on the physical sequence of records on a storage device.
True
Video resolutions can be expressed as width x height
True
When taking the object-oriented approach to a problem, one of the first steps is to identify the objects that pertain to a solution.
True
You can use multiple browsers on a device.
True
x86 processors use a different instruction set than ARM processors.
True
Battery life is the time your device operates before it must be recharged.
True
Which business practice is a technique initiated by top management that involves all employees and all departments, and focuses on quality assurance in every product and service offered to customers?
TQM
Based on existing laws governing international conflict, the ______________ sets out rules for conducting and responding to cyberwarfare.
Tallinn Manual
__________ refers to transmitting text or symbolic information over long distances without the use of a living carrier, such as a courier.
Telegraphy
An emerging computing platform that is likely to drive innovation and disruption through the next decade called __________ has massive scale, not only in cloud-based hardware technology, but also in the vast amount of data that will be generated, consumed, and analyzed.
The 3rd platform
Which of the following is not an example of an Information Technology Law?
The Espionage Act of 1917
If you use a password manager, what do you as the user need to remember?
The master password.
__________-generation languages, such as COBOL and Fortran, were used extensively for business and scientific applications.
Third
_________party apps are external programs that interact with social networking services.
Third
Which network tier forms the Internet backbone?
Tier 1
__________ are standalone programs that masquerade as useful utilities or applications
Trojans
Which one of the following is a microblogging service?
Twitter
Modifications to the contents of a database field are made by using the SQL _________ command.
UPDATE
_________ documentation describes how to interact with the system to accomplish specific tasks.
User
The current standard for object oriented documentation is referred to as ______.
UML
A(n) _________ provides programmers with tools to build substantial sections of a program by pointing and clicking rather than typing lines of code.
VDE
When the PC version of the spreadsheet program __________ became available, the IBM PC quickly became the topselling personal computer.
VisiCalc
_________ is a technology that uses a broadband Internet connection instead of PSTN land lines to place voice and video calls.
VoIP
Which is a component of a search engine?
Web crawler Indexer Query processor
Besides a URL, and a set of Web pages, what else do you need for getting a Web site up and running
Web hosting service
_________ are the people who directly carry out the organization's mission.
Workers
______ is an example of a content community.
Wikipedia
The design phase of a SDLC includes all of the following except _________.
Write requirements report
______ is a markup language designed to describe data
XML
Which of the following is a markup language?
XML XHTML SGML
1024 Zettabytes = 1 _______.
Yottabyte
A social engineering scam called ___________ is when a victim is promised a large sum of money in exchange for a bank account number from which a small advance fee is withdrawn.
advance fee fraud
Iterative SDLCs are often referred to as "______ methods" because they allow flexibility as development progresses.
agile
A(n) _________ methodology focuses on flexible development and specifications that evolve as a project progresses.
agile
A Web crawler uses a search _______ to traverse the Web.
algorithm
A(n) ____________ is a set of steps for carrying out a task that can be written down and implemented.
algorithm
What is the term used to describes altering the pixel colors where the edges of the object and the background meet, so that the object appears to merge with the background?
alpha blending
The goal of the ____________ phase of a SDLC is to produce a list of requirements for a new or revised information system.
analysis
An ecommerce ____________ is the software that handles ecommerce transactions.
application
During the design phase of a SDLC, if the project team selects a solution that requires custom programming, the team's systems analysts will create a set of ________ specifications.
application
Software applications are sometimes referred to as _______, especially in the context of handheld devices
apps, app
Rather than deleting old data, it can be moved to a data __________.
archive
In Prolog programming, a(n) __________ represents one of the main subjects that a fact describes.
argument
The difference between a web app and a mobile app is that the program code for Web apps _________, whereas mobile apps are stored on the handheld device, so they have to be ___________.
arrives only when you use the app, downloaded and installed
A(n) ___________ typically reads a program written in an assembly language, translates the program into machine language, and then submits the machine language program to the processor for execution.
assembler
In the context of database security, database ______ identifies sensitive data and database vulnerabilities in order to secure them.
assessment
If you are hired as an entrylevel programmer, your job title would be a(n) ___________ programmer.
associate
Programmers sometimes start with a set of _____________ that simplify a problem.
assumptions
In a problem statement, a(n) ____________ is something you accept as true in order to proceed with program planning.
assumption
When communication is __________, messages are held until the recipient is ready to view them
asynchronous
A(n) _______ is software that works in conjunction with your computer's browser to manage and play audio that you are accessing from a Web page.
audio plugin
A low-level language has a low level of ___________ because it includes commands specific to a particular CPU or microprocessor family.
abstraction
A calculation is based on a(n) ___________—the step-by-step process by which numbers are manipulated.
algorithm
A(n) ____________ for a computer program is a set of steps that explains how to begin with known information specified in a problem statement and how to manipulate that information to arrive at a solution.
algorithm
A(n) _________ database is used to collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions.
analytical
The best defense against malware is _____________.
antivirus software
In a problem statement, you can limit complexity by making ____________.
assumptions
In spreadsheet software, the________________ feature ensures that the results in every cell are accurate for the information currently entered in the worksheet
automatic recalculation
A(n) ___________ is a copy of one or more files that is made in case the originals become damaged.
backup, data backup
An example of _________ data is the 1 million transactions generated by Walmart sales registers every hour.
big
The 0s and 1s used to represent digital data are referred to as _________ digits.
binary
Password entropy is a measure in _____ of a password's unpredictability
bits
A data _________ is an incident in which personal data is viewed, accessed, or retrieved without authorization.
breach
Network channels that are capable of moving at least two megabits of data per second are classified as _________ channels.
broadband
A Web _________ is client software that displays Web page elements and handles links between those pages.
browser
Apple Safari, Google Chrome, Microsoft Internet Explorer, and Mozilla Firefox are examples of ________.
browsers
A stock market _________ refers to a sharp rise in stock values that is later followed by a sudden decline.
bubble
An operating system ensures that input and output proceed in an orderly manner, using ___________ to collect and hold data while the device is busy with other tasks.
buffers
A group of eight bits is called a _______.
byte
A(n) __________ is an undocumented method of accessing a digital device.
backdoor
The bandwidth of a channel that carries digital data is usually measured in ___________.
bits per second
Transmission speeds are expressed in _______, whereas storage space is expressed in _______.
bits, bytes
In a browser, __________ link to pages that you use frequently.
bookmarks & favorites
Hackers who gain control over several computers can organize them into a clientserver network known as a(n) _______.
botnet
Which of the following type of attack uses passwordcracking software to generate every possible combination of letters, numerals, and symbols.
brute force
Your browser _________ serves as temporary storage for Web documents
cache
Your bandwidth _________ is the top speed allowed by your ISP plan.
cap
_________ goods are raw materials, tools, and machinery used by businesses to make consumer goods.
capital
Analog footage can be digitized using video _____ equipment
capture
A key component of an ecommerce application is an online _________.
cart
A use case diagram documents the users of an information system and the functions they perform. Any task an actor performs is called a use _______
case
Digital ________ captures moving images as bits, rather than on film
cinematography
Information that identifies the source of a quotation or excerpted work is called a ________.
citation
A(n) ___________ is a template for a group of objects with similar characteristics.
class
Remote storage that is available as an Internet service is called ______ storage
cloud
A(n) __________ is where several corporations lease space and equipment to hold and protect their data.
colocation center
Computers that operate in essentially the same way and use the same software are said to be ______.
compatible
A program must __________ without any errors before it can be run.
compile
Most music for portable media players is stored in _______ audio file formats
compressed
Bit rate can be scaled down by reducing the resolution and applying ____________ techniques.
compression
Image __________ refers to any technique that recodes the data in an image file so that it contains fewer bits.
compression
Data ____________ refers to any technique that recodes the data in a file so that it contains fewer bits
compression
The scope of an information system includes which of the following?
computers, communications networks, and data people and products policies and procedures
A(n) __________ is a multipurpose device that accepts input, processes data, stores data, and produces output, all according to a series of stored instructions.
computer
Video files are stored in ________ formats that hold the compressed video stream and an audio stream.
container
________ workers are not official employees of a company.
contract
In the context of a VDE, a(n) ___________ is a screen-based object whose behavior can be defined by a programmer.
control
System ____________ refers to the process of deactivating an old information system and activating a new one.
conversion
Three key concepts ensure good quality of service include all of the following except _______ .
convertibility
An online shopping cart uses _________ to store information about a customer's activities on an ecommerce site.
cookies
On an ecommerce site, After finding a _________ with a cart ID number, the site can display the cart's contents to the customer.
cookie
A(n) _____________ grants the author of a software product an exclusive right to copy, distribute, sell, and modify that work.
copyright
Software ____________ is the process of modifying a commercial application to reflect an organization's needs.
customization
Using the Internet to deliberately harm or harass someone is called ____________.
cyberbullying
A(n) __________ is a device that uses a lowpower radio transmitter to carry out twoway voice communications.
cellular telephone
A(n) _____________ defines the characteristics of a set of objects.
class attribute
The instructions that make up a computer program are sometimes referred to as __________.
code
A(n) ___________ is any person or company that transports goods, passengers, or electronic signals over regular routes at set rates.
common carrier
A(n) ___________ converts all the statements in a program in a single batch, and the resulting collection of instructions, called ________, is placed in a new file.
compiler, object code
A(n) __________ is a factor that remains the same throughout a program.
constant
The information industry has three major facets: _________, computers, and telecommunications.
content
In a microprocessor, the __________ fetches instructions
control unit
When individuals contribute computer time, expertise, opinions, or money to a defined project, they are participating in ___________.
crowdsourcing
Decision makers can access analytical databases using an executive __________.
dashboard
Computers process __________ by performing calculations, modifying documents and pictures, drawing graphs, and sorting lists of words or numbers
data
A(n) ________ administrator analyzes a company's data to determine the most effective way to collect and store it.
database
Microsoft Access, FileMaker Pro, and LibreOffice Base are three examples of popular ___________ software
database
In its broadest definition, a ____________ is a collection of information
database
The process of finding and fixing errors in a computer program is called ____________.
debugging
The Harvard Mark I was digital but used _________ rather than binary representation.
decimal
Using a ________ support worksheet, the project team can assign scores to each criterion, weight them, and compare totals for all solutions
decision
A(n) ____________ helps people make decisions by directly manipulating data, accessing data from external sources, generating statistical projections, and creating data models of various scenarios.
decision support system or DSS
Prolog and other __________ languages were classified as fifth generation languages.
declarative
The _______________ paradigm describes aspects of a problem that lead to a solution.
declarative
The procedural paradigm focuses on an algorithm that describes a solution, the _____________ paradigm focuses on describing the problem.
declarative
Communicating false statements that damage the reputation of another individual is referred to as _________.
defamation
The software application associated with a specific file type is called a __________ application
default
Your ________ browser is automatically used when opening a web page or clicking on a web link.
default
In a formatted text file, ________ signals the beginning and end of a formatting command
delimiter, delimiters
In the ________ phase of the SDLC, the project team must figure out how the new system will fulfill the requirements specified in the system requirements report.
design
In the __________ phase of the SDLC, the project team chooses a solution, selects hardware and software, and designs detailed application specifications.
design
__________ is music, speech, and other sounds represented in binary format for use in digital devices.
digital audio
Digital video is a core technology for which of the following
digital television videoconferencing systems video messaging
The process of converting information, such as text, numbers, photos, or music, into digital data that can be manipulated by electronic devices is called ___________.
digitization
A ____________ is a step-by-step description of the methods used to secure data against disaster and a set of guidelines for how an organization will recover lost data and resume operations if and when a disaster occurs.
disaster recovery plan
Network _________ enables your computer to see other devices on a network, and whether your computer can be seen by others
discovery
A(n) ___________is a bitforbit copy of the data from all sectors of a hard disk.
disk image
System ___________ describes a system's features, hardware architecture, and programming.
documentation
In a display device, __________ is the distance in millimeters between likecolored LEDs
dot pitch, dp
When joining two tables using SQL, the convention is to use ______ notation for field names.
dot
A(n) _________ is designed to deliver malicious code into a device.
dropper
Which of the following is an important consideration when evaluating storage options for digital devices?
durability dependability capacity
Internet addresses that are temporarily assigned are called ________ addresses.
dynamic
A _________ Web page displays customized content in response to keyboard or mouse actions, or based on information supplied directly or indirectly by the person viewing the page.
dynamic
The main circuits on the system board that carry data are called the _________.
data bus
Modern database tools support ________________, which entails separating data from the programs that manipulate data.
data independence
In the context of Prolog programming, a(n) ________________ is a tabular method for visualizing and specifying rules based on multiple factors.
decision table
The number of colors available in a graphic is referred to as color _________.
depth
A(n) __________ work modifies a copyrighted work but does not substantially change its content or purpose
derivative
Which one of the following types of operating systems would most likely be found on a laptop computer?
desktop operating system
A(n) __________ is software that helps a peripheral device establish communication with its host device
device driver
A subset of geosocial networking called social __________ uses geolocation to meet with people who are nearby and have similar interests
discovery
The advantages of LCD screens include display clarity, low radiation emission, portability, and compactness
display clarity low radiation emission portability
An ______ message is an electronic document transmitted over a computer network
Password managers store passwords in a(n) _________ file
encrypted
Wireless _______ scrambles the data transmitted between wireless devices.
encryption
The term professional _______ refers to onthejob choices and actions that reflect a person's values
ethics
A(n) ___________ report contains information that is outside of normal or acceptable ranges.
exception
Ports that expand the options for input, output, and storage, they are commonly called ____________ ports
expansion
A domain name ends with a(n) ________ that indicates its toplevel domain.
extension
If you wanted to add a feature to your browser, such as an ad-blocker, you would need to install a browser __________.
extension
A file with a .css file extension indicates that it is a(n) ________ CSS.
external
In DFD terminology, a(n) ____________ entity is a person, an organization, or a device outside the information system that originates or receives data.
external
The lines that connect nodes in a sociogram are referred to as sociogram ________.
edges
Conventional wisdom tells us that strong passwords are at least _____ characters in length and include one or more uppercase letters, numbers, and symbols.
eight, 8
If you want to store passwords on your digital device, make sure to _________ the file in which they are stored.
encrypt
Which of the following terms would best match this definition: Transforms a message or data file in such a way that its contents are hidden from unauthorized readers.
encryption
Password _________ is a measure in bits of a password's unpredictability
entropy
Telephone networks are based on a hierarchy of interconnected stars. At the center of the star is a telephone ___________ that manages connections between callers.
exchange
A DSS manipulates the data needed to make a decision as well as making a decision.
false
A Web site developer manages an organization's online reputation by establishing and maintaining social media sites and evaluating analytics to support its mission.
false
A hierarchical database allows one-to-many relationships but not one-to-one relationships.
false
An HTML document consists of three sections: the head, the body, and the content.
false
An original message or file that has not yet been encrypted is referred to as ciphertext
false
Android devices automatically encrypt data stored on the device when a user activates the login password.
false
As the design phase of a SDLC begins, programming languages, development tools, and application software needed for the new information system are purchased, installed, and tested to ensure that they work correctly.
false
Because it is so easy to experiment with different numbers, word processing software is particularly useful for whatif analysis.
false
Between 2001 and 2014, significant gains were made in global ICT use, with the highest gains in desktop computer purchases.
false
Blacklist and header filtering is usually performed by email clients and Webmail services.
false
Browser cache is another term for browser History list
false
Certification alone is sufficient to qualify for a job in the IT industry
false
Common threats to corporate information systems are limited to software failures and security breaches.
false
Communications for which you specify one or more recipients would be classified as public
false
Cookies can be stored on desktop and laptop computers but not smartphones or tablet computers.
false
Correctly installed antivirus software will prevent all intrusions
false
Data for SCM does not necessarily take into account customer demand for products.
false
Data independence is a term that refers to data and program modules being so tightly interrelated that they become difficult to modify.
false
Detailed application specifications can be developed before or after selecting the hardware and software for an information system.
false
ENIAC's memory held programs but not data
false
Editing the source content of wikis is discouraged at media content communities.
false
Facebook does not provide ways to discover if you've been tagged.
false
File sharing poses no real security risks.
false
Fraud alerts interfere with your ability to receive instant credit.
false
Geocoding is the process of adding location data to photos, Web sites, HTML documents, audio files, blog posts, and text messages
false
HTML is the best format for an effective resume.
false
HTML is the only markup language used on the Web.
false
HTTP is the markup language used to specify the contents of a Web page.
false
HTTP uses port 20 for communications between a client device and a server
false
Hacking accounts for about 90% of data breaches.
false
Horizontal market software is designed to meet the needs of a single industry while vertical market software meets the needs of many different industries.
false
IMSI catchers are operated by cellular service companies.
false
If you allow your browser to store passwords, you non longer need to worry about security for those passwords.
false