Computer Concepts and Applications CLEP

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

_____ is the most widely used coding scheme used to represent data. a. American Standard Code for Information Interchange [ASCII] b. Unicode c. Extended Binary Coded Decimal Interchange Code [EBCDIC] d. Multicode e. Bytecode

a. American Standard Code for Information Interchange [ASCII] (Most personal computers and midrange servers use the ASCII coding scheme. Mainframe computers and high-end servers use EBCDIC.)

_____ allows users to share documents with others in real time. a. An online meeting b. Voice mail c. Internet telephony d. Internet printing e. Web services

a. An online meeting (In an online meeting, all participants see the document at the same time. As someone changes the document, everyone in the meeting sees the changes being made.)

_____ typically consists of self-directed, self-paced instruction on a topic. a. CBT b. DTP c. CAD d. FAQ e. CIM

a. CBT (Computer-based training (CBT) is a type of education in which students learn by using and completing exercises with instructional software.)

Some mailing lists are called _____, named after a popular mailing list software product. a. LISTSERVs b. ARPANETs c. MPEGs d. W3Cs e. BOTS

a. LISTSERVs (A mailing list distributes e-mails to members who have subscribed to the list. The list server uses special software, typically listserv or majordomo, to facilitate the exchange of e-mail among members. )

Some users input music and other sound effects using external _____ devices such as an electronic piano keyboard. a. MIDI b. MICR c. POS d. DSP e. MPEG

a. MIDI (Musical Instrument Digital Interface is the electronic music industry's standard that defines how devices represent sounds electronically. )

_____ is a process designed to ensure the data within the relations (tables) in a relational database contains the least amount of duplication. a. Normalization b. Validation c. Modeling d. Querying e. Consolidation

a. Normalization (Normalization usually involves dividing a database into two or more tables and then defining relationships among the tables. The goal is to isolate data so that modifications to a field can be made in just one table and then be propagated via the relationships.)

Because it enables employees to perform tasks using computers and other electronic devices instead of manually, some people describe a(n) _____ as office automation. a. OIS b. TPS c. DSS d. MIS e. EIS

a. OIS (An OIS (office information system) supports many administrative activities and is used in some form by just about every type of business or organization. All levels of users utilize and benefit from the features of an OIS.)

_____, which is a main area in an information technology (IT) department, evaluates and integrates new technologies, administers an organization's data resources, and supports the centralized computer operating system or servers. a. Operations b. End-user computing c. Technical services d. System development and programming e. Management

a. Operations (Job titles in the operations area include a computer operator, who performs equipment-related activities, and a data communications analyst, who installs and monitors communications equipment and maintains network connections.)

_____ is copyrighted software that is distributed free for a trial period, after which a payment should be sent to the person or company who developed the program. a. Shareware b. Custom software c. Packaged software d. Public-domain software e. Freeware

a. Shareware ( Developers of shareware rely on the honor system, trusting users to send payment if the software is used beyond the trial period. Sometimes, shareware is a scaled-down version of software, and payment entitles a user to a fully functional product.)

Which of the following is not required for video conferencing? a. Webcam b. Video camera attached to your computer c. Microphone d. Speakers e. Video conferencing software

a. Webcam (A Webcam is a video camera that displays its output on a Web page.)

Programmers typically use either a compiler or interpreter to translate a program into machine language instructions that a computer can execute. An advantage of an interpreter is that _____. a. when it finds errors, it displays feedback immediately b. interpreted programs run faster than compiled programs c. it translates an entire program before execution d. an interpreter produces an object program e. All of the above

a. When it finds errors, it displays feedback immediately (An interpreter reads a code statement, converts it into a machine language instruction, and then executes the instruction before moving on to the next code statement. Errors are identified immediately so they can be corrected.)

An enterprise ASP _____. a. customizes and delivers high-end business applications b. provides applications for a particular industry c. delivers applications to meet a specific business need d. supplies prepackaged, standard entertainment applications e. manages integrated applications within a business

a. customizes and delivers high-end business applications (An enterprise application-service provider is a third party that deploys, manages, and remotely hosts packaged software applications through a rental arrangement.)

In a computer processor, the control unit __________. a. directs and coordinates most of the operations in the computer b. performs arithmetic, comparison, and other operations c. controls the timing of all computer operations d. is the main circuit board of the system unit e. is the surface upon which integrated circuits are etched

a. directs and coordinates most of the operations in the computer (Choice B cannot be correct because this describes the function of the arithmetic logic unit (ALU). You can eliminate choice C because this describes the system clock. Choice D is wrong because this describes the motherboard. Finally, choice E is not correct because this describes a computer chip.)

An ERM system _____. a. facilitates communication between human resources personnel and employees b. includes information about the files and data, called metadata c. focuses on issues related to inventory of parts and forecasting future demand d. assists support personnel in providing the best solutions for customers e. delivers products to customers

a. facilitates communication between human resources personnel and employees (An ERM system automates and manages much of the communication between employees and the business. Most ERM systems include a Web interface for employees.)

A _____ is equal to exactly 1,024 bytes, but computer users often round it down to 1,000 bytes to simplify memory and storage definitions. a. kilobyte [KB or K] b. gigabyte [GB] c. megabyte [MB] d. terabyte [TB] e. nanobyte [NB]

a. kilobyte [KB or K] (A kilobyte is often rounded down to 1,000 bytes for simplification. For example, if a memory chip can store 100 KB, it can hold approximately 100,000 bytes.

A bar code scanner uses ____ to read the bar code on a product. a. laser beams b. OCR c. radio waves d. MICR e. OMR

a. laser beams (A bar code scanner reads a bar code by using light patterns that pass through the bar code lines.)

In a database, each row, called a _____, contains data about a given person, product, object, or event. a. record b. form c. cell d. field e. column

a. record (A record is a group of related fields in a database.)

Most _____ database products for midrange servers and mainframes include SQL. a. relational b. multidimensional c. object-oriented d. hierarchical e. All of the above

a. relational (Structured Query Language (SQL) is a query language that allows users to manage, update, and retrieve data in a relational database.)

A _____ identifies the product(s) a systems analyst wants from a vendor. a. request for quotation (RFQ) b. request for information (RFI) c. request for system services (RFSS) d. request for proposal (RFP) e. request for product price (RFPP)

a. request for quotation (System analysts use three basic types of documents to summarize requirements for potential vendors: RFQ, RFP, and RFI. After sending RFQs to potential vendors, the system analyst receives and evaluates completed quotations. )

A decision support system (DSS) helps users analyze data and make decisions. Internal sources of data might include _____. a. sales orders b. interest rates c. population trends d. raw material prices e. All of the above

a. sales orders (Internal sources of data are data sources within a company, often from accounting and financial analysis. Interest rates, population trends, and raw material prices are external sources of data from outside a company.)

Sharing resources on a network _____. a. saves time and money b. saves time and maintains equivalent costs c. wastes time but saves money d. saves time but wastes money e. wastes time and money

a. saves time and money (Computers sharing resources in a network store their own files and share any peripherals attached to any computer. This type of network is inexpensive and simple to install and maintain.)

Hyperstudio is a multimedia authoring software application that allows users to create presentations called ____. a. stacks b. links c. clips d. scores e. logs

a. stacks ( Multimedia-authoring software allows users to combine text, graphics, audio, video, and animation into an interactive presentation, called a stack. )

A voice mailbox is a(n) _____ in a voice mail system. a. storage location on a hard disk b. processor c. input device d. output device e. program

a. storage location on a hard disk (A voice mailbox stores voice mail messages on a hard disk once they have been digitized.)

_____ allows an engineer to modify a design more easily than before, as well as dynamically change the size of some or the entire product and view the design from different angles. a. SFA b. CAD c. MRP d. CIM e. MIS

b. CAD ((computer-aided design)special software to aid in engineering, drafting, and design.) uses a computer and

Although human speech uses continuous signals that vary in strength and quality, most computers are _____ and recognize only two discrete states, on and off. a. analog b. digital c. oscillatory d. variable e. wavering

b. Digital (Most computers are digital because they are powered by electricity which also has only two states: on and off.)

_____ is a common data type in a database that consists of lengthy text entries. a. Numeric b. Memo c. Object d. Date e. Hyperlink

b. Memo (A data type specifies the kind of data a field can contain and how the field is used. The Memo data type stores lengthy text entries in a database.)

The design of computers, devices, and media in a network, sometimes called the _____, can be categorized as either client/server or peer-to-peer. a. network topology b. network architecture c. network technology d. network protocol e. network channel

b. Network Architecture (The network architecture is the underlying structure of a computer network and is used to establish communication and guarantee reliable transmission of data.)

_____ is free software that has been donated for public use and has no copyright restrictions. a. Shareware b. Public-domain software c. Freeware d. Packaged software e. Custom software

b. Public-domain software ( Anyone can copy or distribute public-domain software to others.)

A _____ has pins on opposite sides of the circuit board that connect together to form one set of contacts. a. DIMM (dual inline memory module) b. SIMM (single inline memory module) c. RIMM (Rambus inline memory module) d. CIMM (Cantus inline memory module) e. PIMM (pin inline memory module)

b. SIMM (single inline memory module - A SIMM plugs into a computer memory expansion socket. It is easy to install and takes up minimal board surface.)

_____, which allows users to choose an encryption scheme that passes between a client and a server, requires that both the client and server have digital certificates. a. Secure Sockets Layer (SSL) b. Secure HTTP (S-HTTP) c. Secure Electronics Transactions (SET) Specifications d. Pretty Good Privacy (PGP) e. Certificate authority (CA)

b. Secure HTTP (S-HTTP Applications that must verify the authenticity of a client, such as online banking, use S-HTTP.)

Businesses are the primary users of _____ because this technology provides a means for departments to communicate with each other, suppliers, vendors, and clients. a. groupware b. Web services c. global positioning systems d. short message services e. PDAs

b. Web services (Web services are standardized tools used to create applications, products, and B2B interactions that can run on the Internet or an internal business network.)

The _____ processor(s) is/are ideal for workstations and low-end servers. a. Pentium b. Xeon and Itanium c. Celeron d. Acceleron and Celerium e. Pentium M

b. Xeon and Itanium (The Xeon processor is an Intel processor with clock speeds ranging from 1.4-2.4 GHz. The Itanium 2 processor is also an Intel processor with clock speeds ranging from 1.4-1.8 GHz.)

A program determines the _____ by applying a formula to the numbers in the primary key. a. data type b. check digit c. field size d. secondary key e. default value

b. check digit ( A check digit is a number(s) or character(s) that is appended to or inserted into a primary key value.)

A program has its own documentation, called _____. a. macros b. comments c. reports d. bugs e. scripts

b. comments (Comments are included within source code to make the code more intelligible and to document the purpose of the code. They are preceded with special characters to alert the compiler to ignore them.)

A(n) _____ verifies that a required field contains data. a. range check b. completeness check c. consistency check d. alphabetic/numeric check e. value check

b. completeness check (A completeness check is useful for verifying that a user has filled in all required fields in a data entry form.)

As technology continues to advance and computers become more a part of daily living, many people believe that _____ is/are vital to success. a. computer programming b. computer literacy c. computer repair d. computer theories e. All of the above

b. computer literacy (Computer literacy entails having knowledge and understanding of computers and their uses. On the most basic level, computer literacy involves knowing how to turn on a computer, use a simple application program, and save and print information.)

A(n) _____ usually lists just transactions. a. external report b. detailed report c. exception report d. summary report e. internal report

b. detailed report (Detailed reports provide information about transactions, such as sales orders taken during a given period.)

In object-oriented (OO) design, the concept of packaging data and procedures into a single object is called _____. a. validation b. encapsulation c. verification d. consolidation e. aggregation

b. encapsulation (With encapsulation, the user of an object can view the object as a black box that provides services.)

To assist with decision making, and information system should produce information that is accurate, verifiable, timely, organized, accessible, useful, and cost-effective. Timely information _____. a. can be proven as correct or incorrect b. has an age suited to its use c. gives more value than it costs to produce d. is error free e. is available when the decision maker needs it

b. has an age suited to its use (Most information loses value with time. Some information, however, such as information about trends, gains value as time passes and more information is obtained.)

A CMS _____. a. facilitates communication between human resources personnel and employees b. includes information about the files and data, called metadata c. focuses on issues related to inventory of parts and forecasting future demand d. assists support personnel in providing the best solutions for customers e. delivers products to customers

b. includes information about the files and data, called metadata ( A content management system (CMS) is a combination of databases, software, and procedures that organizes and allows access to various forms of documents and other forms.)

A program that stores and distributes newsgroup messages is called a _____. a. news client b. newsreader c. news server d. newsmonger e. news host

b. newsreader (To participate in a newsgroup, typically you use a program called a newsreader. Most browsers have newsreaders.)

When using spreadsheet software, a function is a _________. a. key that enters a number in a cell when the key is pressed b. predefined formula that performs a common calculation c. number or value used in a calculation d. symbol used to represent a calculation e. series of rows and columns that organize data

b. predefined formula that performs a common calculation ( None of the other choices make sense.)

A _____ is a window on the screen that displays notes and drawings simultaneously on the screens of all participants in a video conference. a. blackboard b. whiteboard c. chalkboard d. baseboard e. videoboard

b. whiteboard (Participants can modify or highlight text, copy/paste text and pictures, and draw on a whiteboard at the same time. The contents of a whiteboard may be saved.)

A company wishes to set up a collaborative Web site where the general public as well as employees can create, add, modify, or delete content via their Web browser. The company would be best advised to set up a(n) ___________. a. e-mail b. wiki c. blog d. Web search engine e. File Transfer Protocol

b. wiki (Choice A is wrong because e-mail is not collaborative. You can eliminate choice C because users cannot modify original posts made by a blogger. Choice D is wrong because a search engine is not a collaborate Web site. Finally, choice E is not correct because File Transfer Protocol is an Internet standard that permits the process of file uploading and downloading with other computers on the Internet.)

Groupware is a component of a broad concept called _____, which includes network hardware and software that enables group members to communicate, manage projects, schedule meetings, and make decisions. a. public Internet access b. workgroup computing c. Web services d. short message service e. peer-to-peer

b. workgroup computing (Groupware is a type of software that helps groups of people work together on projects and share information over a network.)

_____, which is a design tool that programmers use to help document a solution algorithm, graphically shows a program's logic. a. A hierarchy chart b. Pseudocode c. A flowchart d. Assembler e. A class diagram

c. A Flowchart ( A flowchart uses symbols, specified by the American National Standards Institute (ANSI) for various operations in a program's logic. These symbols are connected with solid lines to show the direction of the program.)

All of the following are SQL keywords except ____. a. SELECT b. WHERE c. OBJECT d. FROM e. ORDER BY

c. OBJECT ( SQL keywords are used in statements to retrieve or modify data from a database. SELECT, WHERE, and FROM specify which data fields to retrieve. ORDER BY specifies how the data should be returned. )

Management information systems, which generate accurate, organized, and timely information for managers, evolved from _____. a. office information systems b. decision support systems c. transaction processing systems d. executive information systems e. expert systems

c. Transaction processing systems (Managers realized that computers and software had more potential than just support transactions processing systems. The capability of quickly computing and comparing data could produce meaningful information for managers.)

A systems analyst is responsible for designing and developing an information system. During the system development cycle, the systems analyst is the liaison between the _____. a. project team and the project leader b. project leader and the users c. users and the IT professionals d. project team and the steering committee e. users and the steering committee

c. Users and the IT Professionals (The systems analyst converts user requests into technical specifications. Thus, a systems analyst must have superior technical skills and excellent communications and interpersonal skills.)

A ring network _____ to install. a. must span a smaller distance than a bus network, and it is more difficult b. must span a smaller distance than a bus network, and it is more expensive c. can span a larger distance than a bus network, but it is more difficult d. must span a smaller distance than a bus network, but it is less expensive e. can span a larger distance than a bus network, and it is easier

c. can span a larger distance than a bus network, and it is more expensive (A bus network consists of a single central cable, to which all computers and other devices connect. On a ring network, a cable forms a closed loop (ring) with all computers and devices arranged along the ring.)

Many large businesses have _____ software, which allows the company to provide a personalized touch and customized service to its customers. a. computer-aided manufacturing (CAM) b. desktop publishing (DTP) c. customer relationship management (CRM) d. Web-based training (WBT) e. content management system (CMS)

c. customer relationship management (CRM systems manage information about customers, interactions with customers, past purchases, and interests.)

A _____ is a special window that provides information, presents available options, or requests a response. a. command box b. shortcut menu c. dialog box d. submenu e. form

c. dialog box (Dialog boxes often contain option buttons, text boxes, check boxes, and command buttons.)

A ____ is the text version of an IP address. a. path name b. host name c. domain name d. hyperlink e. Web page address

c. domain name (All-numeric IP addresses are difficult to remember and use. Thus, the Internet supports the use of a text name that represents one or more IP addresses.)

Formal manufacturing methods help guide enterprises in their manufacturing process. MRP _____. a. facilitates communication between human resources personnel and employees b. includes information about the files and data, called metadata c. focuses on issues related to inventory of parts and forecasting future demand d. assists support personnel in providing the best solutions for customers e. uses computers to control production equipment

c. focuses on issues related to inventory of parts and forecasting future demand (MRP (Material Requirements Planning) is an approach to information management in a manufacturing environment that uses software to help monitor and control processes related to production.)

Fair use of material on the Internet, an aspect of intellectual property rights, allows people to use information from the Internet __________. a. as long as the author/creator is deceased b. as long as no one is making a profit from it c. for educational and critical purposes only d. as long as they are fair and equitable about it e. as long as the content is not popular music

c. for educational and critical purposes only (Choice A is wrong because copyright laws protect an author's copyright for a specific period of time after the author's death. Choice B is not correct because this issue has not yet been decided. Choice D is wrong because this definition is meaningless. Finally, choice E is not correct because the laws protect far more types of original creations than just popular music; protection extends to photographs, text, and more.)

A major shortcoming of a ring network is that __________. a. it can not span as large a distance as a bus network can b. if a computer on the network fails, all the devices before the failed device cannot function c. if a computer on the network fails, all the devices after the failed device cannot function d. if the hub/switch fails, the entire network is inoperable until the device is repaired e. it takes up a great deal of space and is very expensive to install

c. if a computer on the network fails, all the devices after the failed device cannot function (Choice A is wrong because it is backwards: A ring network spans a larger distance than a bus network can. Choice B cannot be correct because it is the opposite of the correct answer; all the devices after the failed device cannot function. You can eliminate choice D because this describes a problem with star networks. Finally, choice E is not correct because this describes a shortcoming of a mainframe.)

In a recent report, the United States government attributed _____ of the country's economic growth to digital technologies, resulting in tremendous increases in productivity. a. one eighth b. one fourth c. one third d. one half e. two thirds

c. one third (Both technical and non-technical jobs today require an understanding of how to use technology. By 2008, nearly half of all American employment will be in industries that either produce or use computer technology.)

A(n) _____ is an interpreted program that runs on the server. a. script b. applet c. servlet d. browser e. image map

c. servlet (A servlet is a server-side program that adds special multimedia effects and interactive capabilities to Web pages.)

A(n) _____, also called program logic, is a graphical or written description of the step-by-step procedures to solve the problem. a. object model b. style sheet c. solution algorithm d. source code e. prototype

c. source algorithm (During the implementation phase of the system development cycle, programmers use the solution algorithm to design and code the necessary programs.)

Commonly used methods to retrieve and maintain data in a database include all of the following except _____. a. report generators and forms b. query languages c. validation rules d. query by example e. report writer

c. validation rules ( Validation rules are used to test input data for correctness. )

An integration test _____. a. verifies that each individual program works by itself b. verifies that all programs in an application work together properly c. verifies that an application works with other applications d. verifies that an application is compatible with system hardware e. is performed by end-users and verifies the new system works with actual data

c. verifies that an application works with other applications (An integration test is performed during the implementation phase after unit and system testing.)

An 8-bit video card (also called 8-bit color) uses 8 bits to store information about each pixel and thus can display _____ different colors. a. 8 b. 64 c. 16 d. 256 e. 512

d. 256 ( An 8-bit video card has 28, or 256, possible color combinations.)

During a cold boot on a personal computer, the POST (power-on self-test) results are compared with data in a _____ chip. a. BIOS b. UNIX c. SCSI d. CMOS e. DROM

d. CMOS (CMOS (complementary metal-oxide semiconductor) technology uses battery power to retain information even when the power to the computer is off.)

Widely used procedural programming languages that the industry recognizes as standards include all of the following except _____. a. BASIC b. C c. COBOL d. HTML e. Java

d. HTML (HTML is not actually a programming language. It is a special formatting language that has specific rules for defining the placement and format of text, graphics, video, and audio on a Web page.)

Most companies use either a file processing system or a database management system. When compared with a file processing system, a database offers all of the following except _____. a. reduced data redundancy b. easier access and shared data c. reduced development time d. less data vulnerability e. improved data integrity

d. Less data vulnerability (A database stores most data in a single file. Many users and programs share the data. If the database is not operating properly, or if the file is damaged or destroyed, users may not be able to perform their jobs.)

The entire collection of Internet newsgroups is called _____, which contains thousands of newsgroups on a multitude of topics. a. ARPANET b. Dragnet c. NSFnet d. Usenet e. W3C

d. Usenet (Usenet is a world-wide distributed discussion system, with newsgroups classified hierarchically by name.)

CIM software _____. a. facilitates communication between human resources personnel and employees b. includes information about the files and data, called metadata c. focuses on issues related to inventory of parts and forecasting future demand d. assists support personnel in providing the best solutions for customers e. captures and processes data from day-to-day business activities.

d. assists support personnel in providing the best solutions for customers (CIM customer interaction management manages the day-to-day interactions with customers, such as telephone calls, e-mail interactions, Web interactions, and instant messaging systems.)

A DBMS uses the _____ to perform validation checks. a. data server b. data warehouse c. data mart d. data dictionary e. data model

d. data dictionary (A data dictionary is a DBMS element that contains data about each file in a database and each field within those files.)

Large-scale applications sometimes refer to a graphics tablet as a _____. a. scanner b. reader c. pointer d. digitizer e. recognizer

d. digitizer (Artists, designers, and engineers use a digital pen with graphics tablets.)

Using the _____ =SUM(B10:B14) totals the contents of cells B10 through B14 in a worksheet. a. label b. value c. template d. function e. macro

d. function (A function is a predefined formula that performs a common calculation. Spreadsheet software includes many functions.)

An acceptance test _____. a. verifies that each individual program works by itself b. verifies that all programs in an application work together properly c. verifies that an application works with other applications d. is performed by end-users and verifies that the new system works with actual data e. verifies that existing hardware is compatible with the new system

d. is performed by end-users and verifies that the new system works with actual data ( Users perform an acceptance test during the final stage of testing, after developers have thoroughly tested the application with unit, system, and integration tests.)

Client/server network architecture usually ___________. a. connects fewer than 10 computers as an inexpensive computing solution b. stores files on each computer in the network c. employs application software and a network operating system on each computer d. provides several computers with data and resources from a single computer e. handles resource requests from thousands of connected computers simultaneously

d. provides several computers with data and resources from a single computer (Choices A, B, and C are wrong because they describe a peer-to-peer architecture rather than a client/server architecture. Choice E is wrong because it describes a mainframe architecture.)

With a _______, the vendor selects the product(s) that meets specified requirements and then quotes the prices. a. request for proposal (RFP) b. request for system services (RFSS) c. request for product price (RFPP) d. request for information (RFI) e. request for quotation (RFQ)

d. request for information (RFI) [System analysts use three basic types of documents to summarize requirements for potential vendors: RFQ, RFP, and RFI. After sending RFPs to potential vendors, the system analyst receives and evaluates completed proposals. ]

One purpose of using test data is to try to cause a _____, which is an error that occurs while a program is executing. a. one-time error b. syntax error c. logic error d. run-time error e. semantic error

d. run-time error (System developers should test individual programs for run-time errors. They should also verify that all the programs work together in the system.)

A _____ works with the analyst, programmer, and user to create documentation and user materials. a. desktop publisher b. Web graphic designer c. graphic designer/illustrator d. technical writer e. system analyst

d. technical writer (Technical writers create documentation during all phases of system development for both internal and external use. )

On a bus network, a single central cable connects all computers and devices. The risk to a bus network is that _____. a. devices detached at any point on the bus disrupt the rest of the network b. it is expensive and difficult to install c. the failure of one device usually affects the rest of the network d. the bus itself might become inoperable e. All of the above

d. the bus itself might become inoperable (If the bus, or physical cable, that connects the computers and devices on the network fails, the network remains inoperative until the bus is back in working order.)

Some Web sites use ___ on their pages because graphics can be time-consuming to display. a. hyperlinks b. macros c. animation d. thumbnails e. streaming

d. thumbnails (A thumbnail is a small version of a larger graphic.)

A Web browser program allows _____. a. real-time exchange of messages or files with another online user b. geographically separated people to transfer audio and video c. transmission of messages and files via a network such as the Internet d. users to access and view Web pages on the Internet e. users to connect to the Internet

d. users to access and view Web pages on the Internet (To browse the Web, you need a computer that is connected to the Internet and that has a Web browser.)

On a peer-to-peer network, which is ideal for very small businesses and home users, each computer _____. a. has equal responsibilities and capabilities b. stores files on its own storage devices c. contains both the network operating system and application software d. can access hardware, data, or information on other computers e. All of the above

e. All of the above ( Each computer, called a peer, shares its hardware and software and acts as a server to the other computers on the network. Unlike a client/server network, a dedicated server is not required.)

An object-oriented database (OODB) stores data in objects, which contain data as well as the actions that read or process the data. Compared with relational databases, object-oriented databases _____. a. can store more types of data b. access data faster c. allow programmers to reuse objects d. store data more efficiently e. All of the above

e. All of the above (An object-oriented database can store documents, photographs, video clips, and audio clips. When the database is queried, data is displayed more quickly, and if an object already exists, programmers can reuse the object instead of recreating a new object)

The _____ standard defines how a Web server communicates with outside sources. a. RPG (report program generator) b. VPE (visual programming environment) c. SQL (structured query language) d. W3C (World Wide Web consortium) e. CGI (common gateway interface)

e. CGI (common gateway interface - CGI is an interface to a Web server from a particular program. A CGI program typically takes data from a Web server and processes it.)

____ processing implies that there is no interaction with the user while the program is being executed. a. Online b. Real-time c. Parallel d. Batch e. Concurrent

e. Concurrent (With batch processing, the computer collects data over time and processes all transactions later as a group.)

_____ a document can involve changing the font, font size, or font style to change the document's appearance. a. Editing b. Creating c. Saving d. Printing e. Formatting

e. Formatting (Formatting is used to emphasize certain words and improve readability. Formatting is important because the overall look of a document significantly can affect the ability to communicate clearly.)

____ are often integrated with transaction processing systems to generate accurate and timely reports for analysis. a. OIS b. CIM c. CAE d. CAD e. MIS

e. MIS (The TPS processes the transaction and updates customer and inventory information. The related MIS produces customer and inventory reports.)

With ____, the computer processes each transaction as it is entered. a. CIM b. DBMS c. OIS d. MIS e. OLTP

e. OLTP (Most transaction processing systems today use online transaction processing (OLTP) systems.)

____ devices read hand-drawn marks such as small circles or rectangles. a. Biometric b. Optical character recognition [OCR] c. Magnetic ink character recognition [MICR] d. Bar code reader e. Optical mark recognition [OMR]

e. Optical mark recognition [OMR] (OMR is used for processing marks on a form, such as a test, survey, or questionnaire answer sheet.)

A Web page has a unique address, called a ____. a. domain name b. bot c. UPS d. relation e. URL

e. URL (A Web browser retrieves a Web page using its URL Uniform Resource Locator.)

With ____ processing, the computer collects data over time and processes all transactions later, as a group. a. online transaction b. real-time c. parallel d. concurrent e. batch

e. batch (Batch processing is useful for applications where a computer or peripheral is needed for an extended time. Transactions can be saved and processed at a time when the needed resources are idle.)

A ____ is a window on a screen that provides areas for entering or changing data in a database. a. record b. cell c. field d. report e. form

e. form (Forms are used to enter, retrieve, and maintain the data in a database.)

Many FTP sites require a(n) ____ to access files. a. password b. subscription c. server authorization d. security access number e. login name and password

e. login name and password (Some FTP sites restrict file transfers to those who have authorized accounts on the FTP server. Many FTP sites have anonymous FTP, whereby anyone can transfer available files.)

Hypermedia is made up of a ____ combination of text, audio, video, and graphical components that are linked electronically. a. linear b. parallel c. sequential d. synchronous e. nonlinear

e. nonlinear (Hypermedia allows users to jump to related information through links, rather than accessing information sequentially.)

The machine language version that results from compiling a 3GL is called the _____. a. dead code or dead program b. live code or live program c. assembly code or assembly program d. source code or source program e. object code or object program

e. object code or object program (The compiler converts the source code into object code and stores the object code on disk for later execution.)

HTML (Hypertext Markup Language) uses ____ to specify how a document should be formatted. a. keys b. hyperlinks c. macros d. protocols e. tags

e. tags (Tags are codes that specify links to other documents and indicate how a Web page is displayed when viewed on the Web.)

A(n) ____ is a group of processing steps that are treated as a single activity to perform a desired result. a. sequence b. record c. event d. statement e. transaction

e. transaction (In business, a transaction is an individual activity such as a deposit, payment, order, or reservation.)

An important difference between a client/server network and mainframe architecture is that a client/server network __________. a. does not have a centralized storage area b. is portable and inexpensive c. is used in most major corporations d. is not as efficient as a mainframe e. typically connects a relatively limited number of computers

e. typically connects a relatively limited number of computers (Mainframes handle hundreds or thousands of users simultaneously. Choice A is wrong because both a client/server network and a mainframe have a centralized storage area. Choice B is wrong because although a client/server network typically provides an efficient means to connect a number of computers, it is neither portable nor inexpensive. Choice C is wrong because mainframes are used in most major corporations. Finally, choice D is wrong because both a client/server network and a mainframe are highly efficient.)


Ensembles d'études connexes

MEDSURG TEST #2: CH 43 - Liver Cancer/Transplant, Pancreas and Gallbladder Problems

View Set

CH 18 Cardiovascular System: Blood

View Set

Chapter 8 Vertebral Column Anatomy

View Set

Anatomical Position, Body Planes, Directional Terms

View Set

Ch. 12 A Firm's Sources of Financing

View Set