Introduction to computer concepts IST 101
The ____ wildcard character allows a search engine to find pages with any derivation of a basic word.
*
A monochrome bitmap requires ______ bit(s) of storage space for each pixel.
1
The original Ethernet standard carried data over a coaxial cable bus topology at ____.
10 Mbps
ERD - Entity Relationship Diagram
A database plan that establishes the table layout, attributes, & primary keys of the database design
botnet
A large group of software applications (called robots or bots) that run without user intervention on a large number of computers.
network address translation (NAT)
A process that firewalls use to assign internal internet protocol addresses on a network.
inoculation
A process used by antivirus software
browser
A program that accesses and displays files and other data available on the Internet and other networks.
worm
A program that attempts to travel between systems through network connections to spread infections. Worms can run independently of host file execution and are active in spreading themselves.
plug-in
A program that extends the capability of a Web browser
IT Application Portfolio
A set of apps an organization would like to commit resources to, either new or modifications.
firewall
A software program or hardware device designed to prevent unauthorized access to computers or networks.
search engine
A software program you can use to find Web sites, Web pages, and Internet files.
boot-sector virus
A virus that replicates itself into the master boot record of a flash drive or hard drive.
time bomb
A virus that's triggered by the passage of time or on a certain date.
The standard communications protocol used on most client/server networks is ________. A) Ethernet B) NOS C) TCP/IP D) VPN
A) Ethernet
ASCII
American Standard Code for Information Interchange; requires only seven buts for each character
dos attack
An assault on a computer that is performed by hackers whose purpose is to disrupt access to the Web. DoS attack is short for denial of service attack
Cybercrime
Any criminal action perpetrated primarily through the use of computer
Which one of the following is the recommended way to handle pop-ups?
Block them.
Business Intelligence
Both a process and the output of the process, BI describes the global aspect of using information for decision making efforts.
The star topology uses a central ________ to connect all network nodes. A) terminator B) gateway C) switch D) router
C) switch
How can you tell if a field is indexed?
Click the column header and then use the Field Validation button.
Advantages of Using a Database
Collections of objects, events, people, places; increased flexibility, scalability and performance, reduced redundancy, increased data integrity, increased information security
web-based training
Computer-based training that uses Internet technology and consists of application software on the Web.
Popular codecs include all of the following EXCEPT ____.
Corel
_________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet. A. Adware B. Malware C. Shareware D. Spyware
D. Spyware
A ____ is a device that connects a computer to a telephone line and converts computer data signals into signals compatible with DSL.
DSL modem
cyberloafing/cyberslacking
Doing anything with a computer that's unrelated to a job (such as playing video games) while one's supposed to be working.
How do you open a folder to display the files it contains?
Double-click the folder
Instance
Each occurrence or row in each table is an instance of the entity defined
online help
Electronic equivalent of a user manual that usually is integrated in a program.
input devices
Enables the user to input data and commands into the computer.
____ transforms a message in such a way that its contents are hidden from unauthorized readers.
Encryption
The type of code that uses eight bits for each character is ____.
Extended ASCII
EBCDIC
Extended Binary-Coded Decimal Interchange Code; an 8-bit code used only by older, mainframe computers
In an SQL query, a ____ clause is used to specify the table you want to access.
FROM
A RISC processor has complex instruction sets, each requiring several clock cycles for execution.
False
A WAN provides connectivity within a limited geographical area, often within a single building.
False
A Web indexer is a computer program that is automated to methodically visit Web sites.
False
A batch system uses a commit or rollback strategy to ensure each transaction is processed correctly.
False
A button allows you to select one item from several options.
False
A cryptographic algorithm is a word, number, or phrase that must be known to encrypt or decrypt a message.
False
A(n) on-and-off connection can have a static or dynamic IP address.
False
A(n) operating-system disk is a removable storage medium containing the operating system files needed to boot your computer without accessing the hard disk.
False
All IP addresses are dynamic.
False
Each pixel in a bitmap graphic can hold more than one color.
False
Each upper bead in an abacus represents one unit, while each lower bead represents five units.
False
FTP is a protocol used by Internet phone companies for free long distance.
False
File management utilities usually retain the files within a folder when that folder is deleted.
False
Files that are zipped contain consolidated files that are compressed and ready to execute.
False
Folders cannot be created within other folders.
False
Free source projects promote copying, free distribution, peer review, and user modifications.
False
Google Apps provides a glimpse of what grid computing has to offer for productivity applications.
False
HTML format is included in the standard export options.
False
High-level languages were developed for first-generation computers.
False
Laws and ethics are really just different words for the same concept.
False
RAM capacity is often expressed in nanoseconds (ns).
False
Radio buttons are controls that allow users to select multiple options from a list.
False
Scripts were designed to replace normal HTML.
False
Sequential access is the ability of a device to "jump" directly to requested data.
False
Signed certificates assure users that the original software is free of viruses and bugs.
False
The current version of HTML, HTML 4.01, was introduced in 2010.
False
The cutover phase of the SDLC involves the day-to-day operation of the system, making modifications to improve performance and correcting problems.
False
The file name for a Web site's main page, like www.cnn.com, is usually short and to the point.
False
The first digital computer was developed for conducting the census.
False
With vector graphics software, the word "Bring" means to move objects behind others.
False
programs files
Files that are used in the running of software programs and that do not store data.
pop-up blocker
Filtering program that stops pop-up ads from displaying on Web pages.
In the accompanying figure, the item marked C is a ____.
FireWire port
One way to transfer photo data from a camera directly to a computer is via ____.
FireWire ports
packet filtering
Firewalls can be configured so that they filter out packets sent to specific logical ports
An e-mail message in ____ format can include graphics in addition to a wide variety of fonts and font colors.
HTML
When working with ____ mail, make sure your antivirus software is checking incoming messages.
HTML
A(n) ____ adds HTML tags to a document, spreadsheet, or other text-based file to create an HTML document that can be displayed by a browser.
HTML conversion utility
____ is a protocol that works in conjunction with TCP/IP to get Web resources to your desktop.
HTTP
What is the purpose of a recovery disk?
It can be used after a hard disk failure to return your computer to its factory default state.
A true statement about Bluetooth is ____.
It forms networks automatically when two or more devices in discovery mode are within range.
All of the following are tools to help you create server-side programs EXCEPT ____.
JavaScript
The ____ is a security mechanism that is factory-installed on many personal computers.
Kensington Security Slot
____ technology produces an image by filtering light through a layer of liquid crystal cells.
LCD
________ contain pointers to folders and files, somewhat like the index in a book.
Libraries
Strategic Planning
Long range planning done by organizations to deal with major decisions such as new facilities, size, locations and types of manufacturing processes.
A ____ is a public high-speed network capable of voice and data transmission within a range of about 50 miles.
MAN
In the "Big Bang Theory" video, what was the algorithm that had been written supposed to do?
Make friends
malware
Malicious software that enters a computer system without the owner's knowledge or consent.
Esteban has decided to install a computer network in his home. He knows he can choose wired or wireless and that there are differences in transmission speed and security. The signal on Esteban's wireless network is weak. What is the best solution to this problem?
Move the workstation closer to the router, if possible.
Popular presentation software products include all of the following EXCEPT ____.
Movie Maker
MIDI port
Musical Instrument Digital Interface port used to connect electronic musical instruments to a system
The accompanying figure represents the connection of your computer to the Internet; the router marked B should belong to a(n) ____.
NSP
____ queries are questions stated in a language such as English, rather than an esoteric query language.
Natural language
The ________ pane in Windows Explorer is the main area for selecting a storage device, library, or folder.
Navigation
When you expand a folder in the Navigation pane, what happened in the Files pane?
Nothing
When the keys on your numeric keypad are moving the insertion point but you would rather that these keys produce numbers, you should press the ________ key.
Num Lock
___ uses organic molecules that produce an even brighter, easier-to-read display than standard TFT displays.
OLED
____ systems use a commit or rollback strategy to ensure that each transaction is processed correctly.
OLTP
instant messaging
Online communication that allows two or more participants to communicate in real time
spooling
Operating system process that sends documents to be printed to a buffer instead of sending them immediately to the printer.
____ schemes redirect users to fake sites by poisoning a domain name server with a fake IP address.
Pharming
_____ scams are designed to trick you into connecting to a fraudulent Web site and revealing personal and financial information.
Phishing
pharming
Planting malicious code on a computer that alters the browser's ability to find web addresses and that directs users to bogus websites.
Feasibility
Potential level of success in several aspects including technical, economic, organizational, behavioral or time
The following is NOT a guideline for creating a template for reports: ____
Present as much information as possible
backdoor programs
Program that enables a hacker to take complete control of a computer without the legitimate user's knowledge or permission
antivirus program
Program that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.
system failure
Prolonged malfunction of a computer
A group of two or more integrated hard disks is called ___.
RAID
____ is a temporary holding area for data, application program instructions, and the operating system.
RAM
___ is a standard, specifically a protocol, that defines how a network
RFID
A(n) ____ is issued by a project team when it wants vendors to recommend hardware and software for the solution they have chosen.
RFP
A(n) ____ is a request for a formal price quotation on a list of hardware and software.
RFQ
IT Investment
ROI is not easily achieved on IT projects as some benefits are intangible and not easily quantified.
According to the video "TCP/IP- An animated video", which routing protocol has a maximum hop limit of 15 hops?
Routing Information Protocol
A collection of language-specific programming tools that enable a programmer to develop applications for a specific computer platform is a(n) ____.
SDK
In areas where there are overlapping wireless networks, such as in a city or on a college campus, ____ help you log in to the right network, rather than a network run by a hacker who will try to suck important information off your computer as soon as you connect.
SSIDs
Data Mining
Searching for valuable information in a database, data warehouse, or data mart.
_____________ can give you an idea of what your computer looks like to a hacker who is trying to gain unauthorized access to your computer over the Internet.
ShieldsUP!!
In the lab, you had an opportunity it explore a diagramming software package called ______.
SmartDraw
____ intercepts information sent over computer networks.
Sniffing
malware
Software that's intended to render a system temporarily or permanently useless or to penetrate a computer system completely for purposes of information gathering. Examples includes spyware, viruses, worm, and Trojan horses.
cracker
Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action.
____ is NOT true.
Speed increases as signal strength decreases.
KPIs - Key Performance Indicators
Strategically aligned metrics to monitor objectives or measures of success against specific targets; defined by management, implemented by operations; tracked by IT
SQL
Structured query language; a database programming language that allows complicated queries to be written to search or filter a database
plug and play
The capability of windows based pc operating systems to detect new,compatible devices
central processing unit (CPU)
The main processing unit in a computer, consisting of circuits that processes data. (Also called the "brain" of a computer)
quarantining
The placement (by antivirus in a secure area on the hard drive so that it won't spread infection to other files.
phishing
The process of sending e-mail messages to lure Internet users into revealing personal information such as credit card or Social Security numbers or other sensitive information that could lead to identity theft.
netiquette
The rules for good manners on the Internet
drive-by-download
The use of malicious software to attack a computer by downloading harmful programs onto a computer, without the user's knowledge, while they are surfing a website.
Perry is looking at his budget alongside his requirements for a new computer. He does not have a lot to spend, but he wants to get as much for his money as he possibly can; and he wants to be very confident that the choice he is making is well-informed. Which of the following would NOT be true of computers priced higher than $1,200?
These computers do not adequately support video editing tasks.
Which of the following is TRUE with regard to turnkey systems?
They require time and expertise to evaluate.
____ are the form factor of choice for computer owners who might want to upgrade components in the future because it is easy to get inside the case and swap out parts.
Tower units
____ software locates the edges of objects in a bitmap image and converts the resulting shapes into vector graphic objects.
Tracing
A computer system like that shown in the accompanying figure is designed to analyze data and produce a recommendation, diagnosis, or decision based on a set of facts and rules.
True
A conversion process called MIME provides a clever way of disguising digital photos, sounds, and other media as plain ASCII code that can travel over the Internet as e-mail attachments.
True
A laser within the printer paints the image on a photo-sensitive drum. Toner is then applied to the image on the drum.
True
According to the video "Identity Theft", you should never carry your Social Security Card in your wallet or purse.
True
Some of the first microcomputers required assembly by the user.
True
Storage capacity usually is measured in gigabytes (GB) or terabytes (TB).
True
Tablet computers include a touch screen for input instead of a keyboard.
True
The declarative paradigm attempts to describe problems without specifying exactly how to arrive at a solution.
True
The term "form factor" refers to the size and dimensions of a component, such as a system board.
True
The term player is sometimes used to refer to plug-ins, but it also can refer to standalone software that does not require a host program.
True
Drill-Down
Using a dashboard or other data analysis tool that allows the user to click on values and view more detail about a topic of interest.
screen saver
Utility program that causes a display device's screen to show a moving image or blank screen if no mouse activity occurs for a specified time.
software piracy
Violating a software license agreement by copying an application onto more computers than the license agreement permits.
In this lab, you explored using _________ to create computer programs.
Visual Basic
____ is supported by browsers without a plug-in.
WAV
________ offers the weakest wireless encryption.
WEP
The ____ is a collection of linked documents, graphics, and sounds.
Web
____ provides tools specifically designed to enter and format Web page text, graphics, and links.
Web authoring software
When you view a page infested with a(n) ____, an HTTP set-cookie request automatically goes to a third-party server, which may set a cookie on your computer for later retrieval or record your IP address.
Web bug
The following statement is NOT true: ____.
Web pages that provide a secure connection start with httpx: instead of http:.
A(n) ____ is a collection of related information organized and formatted so it can be accessed using software called a browser.
Web site
web app
Web site that allows users to access and interact with software from any computer or device that is connected to the Internet.
Internet Forum
Web-based online discussion site where participants post comments to discussion threads
data breach
When sensitive or confidential information is copied, transmitted, or viewed by individual who is not authorized to handle the data.
Scope Creep
When users ask for added functionality during a systems development project after the initial specs have been defined and approved.
To connect a phone or other device to a network, make sure that ____ is enabled, then wait for the device to sense the network, and when asked, enter the encryption key.
Wi-Fi
____ are the people who directly carry out an organization's mission by, for example, assembling products, selling merchandise, or answering phones.
Workers
internet
Worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals
The accompanying figure shows a(n) ____ document.
XML
Can you create a system image with Windows 7?
Yes, using Backup and Restore.
web filtering
____ software is a program that restricts access to certain material on the Web.
Bit
a 0 or 1 used in the digital representation of data
optical drive
a CD drive, a DVD drive, a Blu-ray Disc (BD) drive, or a combination drive that is usually mounted inside the system unit
multicore
a CPU that includes more than two microprocessors on a single integrated circuit
Web
a collection of linked documents, graphics, and sounds that can be accessed over the internet
user ID
a combination of letters and numbers that identifies a user on a computer (also called username)
Dial-Up Connection
a fixed internet connection that uses a voiceband modem and telephone lines to transport data between your computer and your ISP
star topology
a flexible and frequently used network configuration for businesses, in which nodes connect to a central communication device known as a switch
Byte
a group of eight bits, abbreviated as "B"
menu
a list of commands within a category
Cybercriminals
a loose-knit network of attackers, identity thieves, and financial fraudsters that are highly motivated, less risk-adverse, better funded, and more tenacious than hackers
Software as a Service (SaaS)
a model in which consumers access applications from a cloud provider over the Internet
digital media player
a peripheral device that can be attached to a personal computer system to transfer and play music and photo files
digital camera
a peripheral device that records photographic images in digital format
printer
a peripheral output device that creates hard copy output, including text, photographs, and graphic images
cathode-ray tube (CRT)
a picture tube device used in a monitor, similar to a television
DVD drive
a storage device used to read and, possibly, write data to DVD
non-impact
a type of printer that does not actually touch the paper
Symptoms of network problems include ____.
all of the above
The difference between the Save and the Save As commands is that ____.
all of the above
To implement security even when your computer is configured for file sharing, Windows lets you _______.
all of the above
To make sure that you don't lose data when shutting down your computer, it is important to ________.
all of the above
WiMAX
an Ethernet-compatible network standard designated as IEEE 802.16
Web (World Wide Web)
an Internet service that links documents and information from computers distributed all over the world using the HTTP protocol
pixel
an abbreviated name for picture element
licence agreement
an agreement issued by a software provider that gives the users the right to -use the software
A monochrome bitmap looks like ________.
an old-fashioned silhouette
Digital Revolution
an ongoing process of social, political, and economic change brought about by digital technology
A(n) ________ benchmark test runs a eal software application and times various tasks that are performed according to an automated script.
application-based
Gigabyte (GB)
approximately one billion bytes; a unit of measure for memory and storage space
Storage is typically expressed as ____.
bytes
ActiveX controls _________.
can make Web pages more interactive, but they can be a security risk
When you download software, you ________.
can store it anywhere
A ____ establishes which fields and records a particular user may access.
data view
A CRT monitor's viewable size is the ___ measurement of the actual viewing area provided by the screen in the monitor.
diagonal
A ____ displays the options associated with a command.
dialog box
During product activation, you must ____.
enter a product key
Synchronous Communications
instant messaging, chat, and VoIP; users must be online at the same time and the conversation happens in real time
command
instruction on a menu that causes a program to perform a specific action
A(n) ___ is a touch-sensitive device, resembling a dry-erase board, that displays the image on a connected computer screen.
interactive whiteboard
The default password for most routers ________.
is public knowledge so it should be changed to a strong password when the router is installed
When you create new folders, ________.
make sure you have opened the library into which you want to put it
Every Prolog command ends with a ________.
period
application software
program designed to make users productive and/or assist them with personal task
Executive Dashboard Software
provides tools for visually displaying query results
A service pack ____.
provides updates to the operating system
A(n) ____ attribute is available for use by any routine in the program.
public
All of the following techniques be used to improve web searches except ___.
put the most important terms last
Local Software
refers to any software that is installed on a computer's hard drive
Digital Divide
refers to the gap between people who have access to technology and those who do not
A processor contains small, high-speed storage locations, called ___, that temporarily hold data and instructions.
registers
According to the video "What is a relational database?", a(n) ________ is a structured collection of information that is related to a particular subject or purpose.
relational database
Output
result produced by a computer
The accompanying figure represents computer and software marketing channels. In that figure, box D represents ____.
retail stores
A ___ is a program that hides in a computer and allows someone from a remote location to take full control of the computer.
rootkit
A(n) _____________ can hide your computer's ports from Internet hackers.
router
Before using your network, you should adjust the configuration settings of the ____ to make sure your network is secure.
router
A(n) ___ allows a user to choose specific files to back up, regardless of whether or not the files have changed.
selective backup
The term rootkit refers to ____.
software tools used to conceal malware and backdoors
open-source
software whose code is made available for developers to modify and use as they wish, usually available at no cost
storage
the area in a computer that holds data on a permanent basis when it is not immediately needed for processing
digital convergence
the trend to blend several technologies that have distinct functionalities into a single product, such as smartphones that combine voice communication, text messaging, e-mail, Web browsing, cameras, and GPS
Database Model
the underlying structure of a database
To modify a report, _____.
use Design View
When you delete a folder, ________.
you should first open the folder to make sure it doesn't contain files that you want to retain
According to the video, which file format is most popular for file compression?
zip
spam
Unwanted or junk e-mail
According to the video, "How to Choose a Strong password", which of the following is NOT recommended for creating a password.
Use dictionary words
If an image stored in a 4 MB file has a resolution of 1600 x 1200 and you resize the image to 800 x 600, the resulting files should require _______ of storage space.
1 MB
Kilobit
1,024 bits (Kb or Kbit)
Kilobyte
1,024 bytes (KB or KByte)
Megabit
1,048,576 bits (Mb or Mbit)
The modern definition and use of the term computer emerged in the ____.
1940s
You should provide at least ______ level(s) of DFDs as information system documentation.
2
E-mail usually uses port _____.
25
____ technologies support digital transmission for both voice and data.
3G
Dashboard
A BI app that allows visual representation of summary data, analytics to easily track performance, direct access to reports, and can be customized to user needs
clip art/image gallery
A collection of clip art and photos included with application software.
packet analyzer (sniffer)
A computer hardware device or softwareprogram designed to detect and record digital information being transmitted over a network
Trojan horse
A computer program that appears to be something useful or desirable (such as a game or a screen saver), but at the same time does something malicious in the background without the user's knowledge.
backup
A copy of a computer file that can be used to replace the original if it's lost or damaged.
image backup (system backup)
A copy of an entire computer system, created for recreation purposes.
Prototyping
A design method which uses mock up screens with limited functionality and high user involvement to define a workable solution.
surge protector
A device that protects computers and other electronic devices from the power surge.
biometric authentication device
A device that reads a unique personal characteristic such as a fingerprint or the iris pattern in your eye and converts it pattern to a digital code.
personal firewall
A firewall specifically designed for home networks.
Database
A group of logically related tables that store data about entities, their attributes, and the relationships between them.
script
A list of commands (mini-programs or macros) that can be executed on a computer without user interaction.
computer virus
A malicious computer program capable of reproducing itself and causing harm to files or programs on a computer system.
Software-As-A-Service (SaaS)
A method of using/delivering software in which a vendor hosts an IT application & the customer pays per user for access via the Internet.
Decision Making
A set of stages during which a manager gathers intelligence, give consideration to alternative choices or designs, and implements the best option
master boot record
A small program that runs whenever a computer boots up.
spear phishing
A targeted phishing attack that sends e-mails to people known to be costumers of a company. Such attacks have much greater chance of successfully getting individuals to reveal sensitive data.
incremental backup (partial backup)
A type of back that only backs up files that have changed since the last time files were backed up.
In a database, the term ________ is synonymous with a category of information. A) field B) record C) row D) table
A) field
The Internet began with a project called ____.
ARPANET
The type of code that uses only seven bits for each character is ____.
ASCII
Drill-Down
Ability to choose type & level of detail in the data to identify trends & see comparisons
Databases are vulnerable to ____.
All of the above
denial-of-service (DoS) attack
An attack that occurs when legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system that tie up its resources and deny legitimate users access.
Primary Key
An attribute that uniquely identifies an entity from another (student ID).
distributed denial-of-service (DDoS) attack
An automated attack that's launched from more than one zombie computer at the same time.
virus hoax
An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.
________ is a protective layer made of glass or plastic, which is wrapped around the core of a fiber-optic cable for protection. A) Shielding B) Cladding C) Sheathing D) Coating
B) Cladding
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? A) Social networking B) Cybercrime C) Phishing D) Hacking
B) Cybercrime
Which of the following is NOT a likely primary key? A) Driver's license number B) Date of birth C) Student ID number D) Social Security number
B) Date of birth
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________. A) a packet sniffer B) a firewall C) a packet filter D) antivirus software
B) a firewall
Creating and distributing ________ is one of the most widespread types of cybercrimes. A) spam B) computer viruses C) cookies D) zombies
B) computer viruses
You would use a ________ to temporarily display records of residents of the city of Boston. A) sieve B) filter C) validation rule D) field constraint
B) filter
If a school keeps two lists, one for student registration and one for student financial information, both containing name and address information, this is an example of data ________. A) integrity B) redundancy C) completeness D) normalization
B) redundancy
Which type of virus was the famous Michelangelo virus? A. A worm B. A time bomb C. A script virus D. An e-mail virus
B. A time bomb
8. A(n) ________ is a device connected to a network such as a computer or a game console. A. architecture B. node C. server D. modem
B. node
Which of the following classification of viruses can change its own code to avoid detection? A. Stealth B. Multipartite C. Polymorphic D. Worm
C. Polymorphic
Wireless internet is available using _________. A. Fiber Optics B. Satellite C. Radio Waves D. DSL
C. Radio Waves
A ________ is named after a housing construction feature that slows the spread of fires from house to house. A. firehouse B. wallfire C. firewall D. fire protector
C. firewall
A _____ allows multiple users to connect to the Internet through one connection A. file server B. hub C. network D. packet screener
C. network
The ___ chip, which uses battery power, stores configuration information about the computer.
CMOS
The key combination ________ closes a program that has stopped responding.
Ctrl, Shift, and Escape
Which of the following is FALSE about servers? A) Servers are the workhorses of the client/server network. B) Servers interface with many different network users. C) A file server stores and manages files for a network. D) All networks require at least two servers
D) All networks require at least two servers
Which of the following is NOT an advantage of using networks as compared to a stand-alone computer? A) Enable software sharing B) Facilitate knowledge sharing C) Enhanced communication capabilities D) Ease of maintenance and administration
D) Ease of maintenance and administration
Data ________ helps to ensure data integrity by maintaining information in only one place. A) flexibility B) redundancy C) mapping D) centralization
D) centralization
All of the following are used to classify network architectures, EXCEPT _____________. A. the distance between nodes B. the protocol used to exchange data between nodes C. the communication medium used to transport data D. the number of nodes on the network
D. the number of nodes on the network
The current version of wireless Ethernet is ______. A. 802.11m B.802.11g C.802.11p D.802.11n
D.802.11n
A protocol known as ____ is designed to automatically distribute IP addresses.
DHCP
A(n) microcomputer specializes in compute-intensive problems.
False
All major companies in the IT industry are headquartered in Silicon Valley.
False
CDs and DVDs are examples of magnetic storage media.
False
COBOL and Fortran are considered second-generation languages.
False
Compression utilities can be used for single files only to reduce the size of the file.
False
Computer users are discouraged from applying all available software patches.
False
Data collected by a transaction processing system (TPS) can be used by a(n) DSS (Decision Support System) to create reports that managers can use to make routine business decisions in response to structured problems.
False
Data in a(n) wired network travels without the use of network cables.
False
Data is organized into closely spaced tracks on the rotating spindle.
False
Downstream speed is the rate of data transmitted from your computer to the Internet.
False
During the boot process, RAM is loaded into the operating system kernel.
False
Each bit of RAM is stored in a transmitter.
False
Icons for programs that you frequently use are listed on the right side of the Start menu.
False
If you use a laptop computer, you must also use the built-in trackpad to control the mouse pointer.
False
In the accompanying figure, the microprocessor is shown in picture B.
False
In the accompanying figure, the relationship shown in the bottom row is a many-to-many relationship.
False
In the design phase of the SDLC, the project team must figure out why the new system will fulfill the requirements specified in the System Requirements Report.
False
Not all objects on the form contain a set of properties.
False
Pharming is less surreptitious and easier to detect than most other hacker schemes.
False
Some systems streamline the backup process by restoring a computer's operating system, device drivers, settings, and data in a single step - a process called restore pointing.
False
The wave on the top in the accompanying figure depicts an analog signal.
False
To ensure you can remember your password, it is a good idea to base it on information you can easily remember such as your birthday.
False
User privileges delineate what activities a user can perform within a database.
False
Utilities are an example of application software.
False
Utility software refers to a type of application software that has the potential to help people get work done.
False
WMF files contain instructions for creating the pitch, volume, and duration of notes that sound like various musical instruments.
False
When devices record your location, there is no possibility of abuse.
False
When the Safe to Remove Hardware message appears, you must wait three seconds before you remove the USB flash drive.
False
When using portable software, the Portable Apps menu only lists the portable application files. Data files will be stored separately and cannot be accessed through the Portable Apps menu.
False
When you are finished with the Portable Apps, it is important to close the window before you remove the flash drive.
False
Devices with one or more antennas use ____ technology to boost signals and spread them more evenly over the signal range.
MIMO
A ___ analyzes the time required to complete a task and identifies the minimum time required for an entire project.
PERT chart
computer-aided design
Software that allows you to create engineering, architectural, and scientific designs
Adware
Spyware that tracks a user's internet browsing and installs malicious cookies
identity theft
The process by which someone uses personal information about someone else (such as the victim's name, address, and Social Security number) to assume the victim's identity for the purpose of defrauding another.
A DSS could provide tools for comparing and projecting costs based on external data from various reports.
True
A compiler like the one shown in the accompanying figure converts all statements in a program to machine language in a single batch.
True
A new version update usually installs in a similar way as you installed the original version.
True
A process called handshaking allows two communications devices on a network to negotiate their communications protocols.
True
A search agent allows you to configure your search according to job categories and cities, as well as salary and keywords.
True
A search agent sends a list of jobs that match your search criteria to your email.
True
A single high-level command does the work of multiple low-level commands.
True
A virus hoax usually arrives as a(n) e-mail.
True
A visual development environment typically allows a programmer to design forms that become the user interface when the program runs.
True
A zombie is a computer under the control of a bad bot.
True
According to the video "Windows 7 Gadgets" to access the available gadgets, you right-click on the desktop and select Gadgets.
True
Privacy advocates fear that digital technologies are fundamentally changing our expectation of what is private and what is not.
True
With a voiceband modem, actual data transfer speeds are affected by factors such as the quality of your phone line and connection.
True
The name of the device that prepares the data for the UNIVAC was ________.
UNITYPER
The operating system that was developed in 1969 by AT&T's Bell Labs and gained a good reputation for its dependability is ____.
UNIX
An easy way to back up your important data is simply by copying selected files to a ____.
USB flash drive
In the accompanying figure, the item marked A is a ____.
USB port
The ___ is an alternative to DVI that also supports HDMI.
display port
With ____, processing tasks are shared by servers and workstations.
distributed processing
The accompanying figure represents computer and software marketing channels. In that figure, box A represents ____.
distribution centers
Flowcharts and DFDs ___________.
do not depict the same aspects of information systems
Communications Port
doorway that allows a computer to exchange data with other devices
The accompanying figure represents a virtual private network. In this figure, A points to ____ data.
encrypted
In an object database, an attribute is ____.
equivalent to a field in a relational database
Variable-Length Field
expands to fit the entered data
Many projects fail because of constant, unmanaged demand for changes, even before the system is implemented. This failure to constrain change is often referred to as ____.
feature creep
Enterprises often use ___ technology to connect to storage systems at data rates up to 4 Gbps.
fibre channel
A ___ is a mini-program with minimal functionality that connects to another program or provides information.
gadget
A technology called _____ helps Web sites customize their presentations based on information about your physical location.
geolocation
script kiddie
has the same intent as a cracker but does not have the technical skills and knowledge
Product activation can create a ____ based on your validation code and your computer's internal serial number.
hash value
computer literacy
having a current knowledge and understanding of computers and their uses
accounting software
helps companies record and report their financial transactions
The Recycle Bin ________.
is a special folder that holds files you've deleted from the hard disk
A new folder that you create ________.
is added in alphabetical order below the currently selected object
During the planning phase, the projects that receive the highest priority are those ___.
mandated by management or some other governing body
Processing
manipulation of data in many ways by computers
When installing software from a distribution CD, if you insert the CD, but nothing happens you should ________.
manually run the Setup.exe program
A ___ is a web application that combines services from two or more sources, creating a new application.
mashup
Dial-up Internet access is an example of a(n) ____ communications system.
narrowband
A(n) ___ is an online area where users have written discussions.
newsgroup/message board
The average "survival time" for an unprotected computer to remain uncompromised is only ____.
nine minutes
A network ____ usually contains a computer, networked peripheral, or network device.
node
Private IP Address
non-routablee IP address that can be used within a LAN, but not for Internet data transport
Window Phone apps run on ____.
none of the above
A laptop computer (also referred to as a ____ computer) is a small, lightweight portable computer that opens like a clamshell to reveal a screen and keyboard.
notebook
gigahertz (GHz)
one billion hertz; hertz is the unit of measure for processor speed
megahertz
one million hertz; hertz is the unit of measure for processor speed
Supercomputer
one of the fastest computers in the world at the time it is made
Sort Key
one or more fields used to specify where new records are inserted in a table
Many-to-Many Relationship
one record in a particular record type can be related to many records in another record type, and vice versa
One-to-Many Relationship
one record is related to many records
hard disk drive (or hard drive)
permanent storage device, located within the system unit, that holds all permanently stored software and data
The tools that browsers use to detect fraudulent Web sites are called _____.
phishing filters
Factors affecting the success of the IT industry include: ____.
population growth & business globalization
A project team submits an RFQ to vendors when it knows all of the following EXCEPT ____.
price of the software needed
Web Page
product or output of one or more Web-based files displayed in a format similar to a page in a book
database software
programs, such as Microsoft Access, used to store and organize large amounts of data and preform complex tasks such as sorting and querying to generate specialized reports
Open Source
projects that promote copying, free distribution, peer review and user modification
Memo Data Type
provides a variable-length field in which users can enter comments
FTP (File Transfer Protocol)
provides a way to transfer files from one computer to another over any TCP/IP network, such as LAN or Internet
A(n) ____ is an association between data that is stored in different record types.
relationship
In the threat model STRIDE, the R stands for ____ or covering tracks to make attacks difficult to trace.
repudiation
IP (Internet Protocol)
responsible for addressing packets so that they can be routed to their destination
A logic error is a type of ____ error.
runtime
Careers in computer ____ focus on computer architecture and programming computers to make them work effectively and efficiently.
science
Computers characterized by their use of transistors are considered ____ -generation.
second
Software
sets up a computer to do a specific task
When software is installed, all of the following take place EXCEPT ________.
shared program files are eliminated
Tweet
short message of less than 140 characters on Twitter
A synthetic test uses ________ tasks that mimic specific application tasks.
simulated
software updates
small, downloadable software modules that repair errors identified in commercial program code
notebook computer
small, lightweight, portable computer that usually runs on batteries (also called laptop or laptop computer)
A command to print a document is relayed through various levels of ____.
software
Data Type
specifies the way data is represented on the disk and in RAM
A Web server's response to a browser's request includes an HTTP ____ that indicates whether the browser's request could be fulfilled.
status code
Hyperlink Daya Type
stores URLs used to link directly from a database to a Web page
Relational Database
stores data in a collection of related tables
Password Manager
stores user IDs with their corresponding passwords and automatically fills in login forms
A(n) ____ file uses a uniform format to store data for each person or thing in the file.
structured
In the accompanying figure, the files marked C is a(n) ____.
support program file
A(n) ____ installs new versions of operating system software and modifies operating system settings to ensure maximum performance.
systems programmer
hayperthreading
technology that allows a CPU to emulate multiple processors, improving processing power and speed
The last topic of the lab included information on how to use _________.
the Access Report Wizard
IEEE 802.3 is ________.
the Ethernet standard
The accompanying figure represents a virtual private network. In this figure, E points to ____.
the Internet
Restore points back up settings in ________.
the Windows Registry
Tethering
the ability to serve as a Wi-Fi hotspot
Arrow Keys
the arrow keys found at the bottom center section of the keyboard, used to move the insertion point within the program window
system unit
the case or box that contains the computer's power supply, storage devices, main circuit board, processor, and memory
storage device
the computer hardware that records and/or retrieves items to and from storage media
font size
the size of the text measured in points
computer fluent
the term used to describe a person who understands the capabilities and limitations of computers and knows how to use computer technology to accomplish tasks
process
the term used to describe the action of a computer when it converts data into information
email address
the unique address for each mailbox on the Internet, which typically consists of a user ID, an @ symbol, and the name of the computer that maintains the mailbox
Uniform Resource Locator (URL)
the unique address of a Web page
Port Probe
the use of automated software to locate computers that have open ports and are vulnerable to unauthorized access
Internet
the worldwide communication infrastructure that links computer networks using TCP/IP protocol
In the accompanying figure, the ____ item represents a filing cabinet, disk, or tape that holds data.
third
desktop publishing
through the use of a personal computer, combining text and graphics to produce high-quality documents, such as newsletters, flyers, brochures, etc.
The ____ quality of service (QoS) metric is defined as the amount of data processed in a particular time interval.
throughput
A(n) ___ is a small version of a larger graphic.
thumbnail
Network Access Points
tie together NSP equipment and links
___ information has an age suited to its use.
timely
digitization/digitize
to convert text, numbers, sound, photos, and video to a digital format that can be processed by a computer, through the use of a scanner, camera, or other input device
click
to press the left (or primary) mouse button once
storage
to retain data or information for further use
output
to retrieve data or information from a computer
Server
to server computers on a network by supplying them data
Copy of A(n) ________ is designed to handle large volumes of transactions simultaneously from multiple users.
transaction processing system
___ is the speed with which data, instructions, and information transfer to and from a device.
transfer rate
Carpal tunnel syndrome is a condition whose effects are made worse by keyboard use. The accompanying figure represents a hand. Box B indicates the ____.
transverse carpal ligament
One file storage metaphor that is based on a hierarchical diagram is sometimes referred to as a ____ structure.
tree
Web Site
typically contains a collection of related information organized and formatted so it can be accessed using software called a browser
app
typically used to describe a software program on a smartphone or tablet computer
Object-Relational Database
used to describe a variety of technologies that combine object-oriented and relational concepts
Date Data Type
used to store dates in a format that allows them to be manipulated: number of days between two dates, etc.
A ____ is a series of characters that becomes a person's unique identifier.
user ID
Unicode
uses 16 bits and provides codes for 65,000 characters
Network Database
uses a mesh-like structure to offer the additional capacity to define many-to-many relationships
Structured File
uses a uniform format to store data for each person or thing in the file
Brute Force Attack
uses password-cracking software, but its range is much more extensive than the dictionary attack
Binary Number System
using only 0 and 1
multimedia control key
usually found at the top of a key-board, this type of key can be used to control or mute speaker volume
internet control key
usually found at the top of a key-board. this type of key can be used for various Internet-related activities including opening a Web browser and sending e-mail
Lookup Routine
validates an entry by checking data in a file or database table
Symmetric Internet Connection
when upstream and downstream speeds are the same
Asymmetric Internet Connection
when upstream speeds differ from downstream speeds
Central Processing Unit (CPU)
where most processing takes place
By clicking on the network, you can see te other computers on the network. By opening these computers, you can see ________________________.
which files and folders can be shared by other workstations on the network
A powerful desktop computer used for high-performance tasks is a ____.
workstation
disk cleanup
a Windows utility that removes unnecessary files from the hard drive
access provider
a business that provides individuals and organizations access to the Internet free or for a fee
Computed Field
a calculation that a DBMS performs during processing, and then temporarily stores in a memory location
Web cam
a camera that captures digital images using a computer
desktop computer
a category of computer small enough to fit on a desk but is too big to carry around and has attached, rather than built-in, keyboard, display, and pointing device
application software
a category of software programs that helps you perform a specific task such as word processing. (Also called application programs, applications, or programs)
___ offers high speed internet connections to decides with built-in compatible technology of computers with wireless modems.
a cellular radio network
Desktop computer
a class of microcomputer, such as a PC or a Mac
Record
a collection of data fields
Database
a collection of information
internet service provider (ISP)
a company that maintains Internet computers and telecommunications equipment in order to provide Internet access to businesses, organizations, and individuals
Internet Service Provider (ISP)
a company that offers Internet access to individuals, businesses, and smaller versions of itself
peripheral device
a component or equipment, such as a printer or scanner, that expands a computer's input, output, or storage capabilities
Videogame Console
a computer dedicated as a game device
email message
a computer file containing a letter or memo that is transmitted electronically via a network
graphical user interface (GUI)
a computer interface with which you interact with the computer through the use of graphics and point-and-click technology; GUIs show documents as they will look in their final form
internet
a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange
utility program
a computer of system software, typically as small program used to perform routine maintenance and housekeeping tasks for the computer
server
a computer on a network that supplies the network with shared data and storage
computer platform
a computer system's underlying hardware and software, in particular, its processor and operating system; the two dominant computer platforms today for desktop and notebook computers are PC, which is sometimes called the Windows platform, and Mac, which is the Macintosh OS by Apple Computer, Inc.
personal computers
a computer that can perform all of its input, processing, output, and storage activities by itself
dedicated server
a computer that is assigned to handle one specific task on a network
Random Access Memory (RAM)
a computer's temporary storage space or short-term memory and stored on ships located on the motherboard; measured in megabytes (MB) and gigabytes (GB). known as volatile memory
DOCSIS (Data Over Cable Service Interface Specification)
a data transport technology that includes security filters
You are reviewing a cash-flow model of your business, which is designed to provide a numerical representation of a realistic situation. You are using ____ tool.
a decision model
Recovery disks are useful if your computer's hard disk crashes, but they are also useful when ________.
a device has stopped working because of a corrupted device driver
DSL Modem
a device that connects a computer to a telephone line and converts computer data signals into signals compatible with DSL
multifunction device (MFD)
a device that has more than one purpose, often combining input and output capabilities
hard disk drive
a disk drive used to read and write hard disks
Web page
a document on the World Wide Web that consists of a specially coded HTML file with associated text, audio, video, graphics, and links to other Web pages.
Primary Key
a field that contains data unique to a record
clock speed
a measurement of how quickly a CPU processes data, an indication of a CPU's processing power
digital certificate
a notice that guarantees a user or a web site is legitimate
A bitmap image stored in a 10 MB file is best used as _______.
a page in a magazine
hacker
a person who creates malicious computer programs sometimes to steal or damage your data or hardware or to assume your identity for financial gain (also called cracker, black hat, or cybercriminal)
Compute-Intensive
a problem that requires massive amounts of data to be processed using complex mathematical calculations
Convergence
a process by which several technologies with distinct functionalities evolve to form a single product
mobile app
a program (such as a game, calendar, stock market tracker, traffic or weather monitor, or news feed) designed to run on mobile devices (such as smartphones and tablet computers). (mobile apps are also called mobile applications)
communication or organizational software
a program such as Microsoft Outlook, used to send and retrieve e-mail and manage day-to-day tasks
trojan horse
a program that appears desirable but actually contains something harmful
trojan horse
a program that appears to be useful of desirable, but acts maliciously in the background after installation
browser
a program that communicates with a Web server and displays Web pages
email attachment
a separate file that is transmitted along with an e-mail message
Table
a sequence of records similar to a flat file
Jim has just purchased a new computer and it has made him think about how it works. He is particularly interested in how information is processed and stored in his computer. He has come to you for help. Jim wants to know what machine language instructions look like to the machine. You tell him they appear as ____.
a series of 0s and 1s
worm
a software program capable of reproducing itself that can spread from one computer to the next over a network
personal firewall
a software program or hardware device designed to prevent unauthorized access to a computer
phishing
a type of online fraud where someone tries to trick the victim into revealing sensitive details such as a username, password or credit card details, by masquerading as a trustworthy entity in an electronic communication.
laptop computer
a type of portable computer that is small and light enough to be carried from one location to another (also called a notebook computer; usually runs on batteries)
netbook
a type of portable computer that is smaller than a notebook or a laptop computer. classified as sub notebooks, these small computers are scaled-down versions of standard clamshell-style notebook computers
impact
a type of printer that resembles a typewriter; a key and ink ribbon are used to imprint a character on paper
slat screen
a type of screen used in CRT monitoys, and which differs from flat panel monitors
keyword
a word or term used as the basis for a database or Web page search (Also called search term)
The ________ is one of the first calculating devices that are still used in many parts of the world today. It used a series of beads.
abacus
Gigabit
about 1 billion bits (Gb or Gbit)
Gigabyte
about 1 billion bytes (GB or GByte)
Sally has been using spreadsheets in making purchasing decisions at her job. She is getting a promotion, and has been asked to train James as her replacement. James has never used a spreadsheet. Sally tells James that a worksheet will automatically update to reflect any rows or columns that are deleted or copied. Sally tells James that if he does not want the cell reference to change, he should use a(n) ____ reference.
absolute
A(n) ____ limits access to systems, such as computer databases.
access control
At the ACME Widget Company, the computers have started behaving weirdly. Chris noticed that his directory had some files that he didn't remember putting on his computer. Lesley noticed her computer was beginning to run very slowly, and Kim realized she was getting replies to emails she had not sent. The owner of the ACME Widget Company has contacted you to see if their company might have a computer security problem. You explain to the owner of ACME Widget Company that malware includes ____.
all of the above
Which of the following file formats can be used in Paint?
all of the above
____ is a disadvantage of using a wireless network when compared to a wired network.
all of the above
Buyer bargain power controls ________.
all of these
Wi-Fi Hotspot
an area in which the public can access a Wi-Fi network that offers Internet service
Memory
an area of a computer that temporarily holds data waiting to be processed, stored, or output
buffer
an ionic compound that resists changes in its pH
Object Database
an object-oriented database stores data as objects, which can be grouped into classes and defined by attributes and methods
social networking
an online networking activity through Web sites that offer registered members security in knowing that they are interacting with friends of friends rather than with strangers. Examples include LinkedIn and Facebook.
printer
an output device used to generate hard copy
Client
any software or digital device that requests data from a server is referred to as a client
adware
any software package which automatically plays, displays, or downloads advertisements to a computer.
mailbox
any storage location for e-mail, such as the Inbox or Outbox
A set of software tests conducted by a team of off-site testers is called ____.
beta testing
A ____ graphic is composed of a grid of dots.
bitmap
The Paint application is an example of ________________.
bitmap graphics
TCP (Transmission Control Protocol)
breaks a message or file into packets
High-bandwidth communications systems are sometimes referred to as ____.
broadband
A(n) ____ is client software that displays Web page elements and handles links between pages.
browser
Webmail allows you to use a(n) ____ to access and view your e-mail messages.
browser
A fixed-length field contains a predetermined number of ____.
bytes
In the accompanying figure, D represents ____.
calculation
A method is activated by a message which is included as a line of program code also referred to as a(n) ____.
call
An encrypted message is referred to as ____.
ciphertext
To begin the routine shut down process, ________.
click the Start button
Computer literacy, also known as digital literacy, involves having a current knowledge and understanding of ___?
computer and their uses
Some ________ can be used as benchmark tests because they display frame rates, which indicate graphics performance.
computer games
track
concentric circles on a hard disk drive
To check for and enable a wireless adapter on a Windows computer, ________.
connect to the Network and Sharing Center
When a computer is in sleep mode, it ________.
conserves power by not using the monitor or disk drive
Backups are basically ________.
copies of files zipped into a single volume
A Web ____, automated to methodically visit Web sites, can be programmed to perform various activities as it visits those sites.
crawler
In the accompanying figure, the item marked A represents ____.
data
___ is/are a collection of unprocessed items, which can include text, numbers, images, audio, and video.
data
Because the ___ contains details about data, some call it metadata.
data dictionary
soft copy
data or information displayed on a monitor
hard copy
data or information retrieved from a computer and printed
Advantages of telecommuting include all the following EXCEPT ____.
data security
A context DFD does not show _________.
data stores
information
data that has been organized in a useful manner
The ____ is the amount of data that a storage device can move from the storage medium to the computer per second.
data transfer rate
When you specify the fields for a table you have to select a(n) _____, such as Text or Number.
data type
The database analysts (DA) ___.
decides on proper placement of fields
In the accompanying figure, C represents ____.
decision
A ____ is a question or set of instructions describing data that must be gathered to make a decision.
decision query
A(n) ___ lists a variety of conditions and the actions that correspond to each condition.
decision table
Which of the following has the least versatility?
dedicated software
In the threat model STRIDE, the D stands for ____ or making a system unavailable to legitimate users.
denial of service
A ___ is an assault whose purpose is to disrupt computer access to an internet service such as the Web or e-mail.
denial of service attack
The validity of benchmark tests ________.
depends on how the tests were carried out
blog
derived from the phrase "WeB LOG," refers to a personal journal focusing on a single topic or covering a variety of issues posted on the Web for access by the general public.
Hypertext
describe a computer system that could store literary documents, link them according to logical relationships, and allow readers to comment and annotate what they read
Field Name
describes a field's contents
Fixed Wireless Internet Service
designed to offer Internet access to home and businesses by broadcasting data signals over areas large enough to cover most cities and outlying areas
Software engineers tend to focus on ____.
designing
Productivity software that has sophisticated features to help you produce typeset-quality output is considered ____ software.
desktop publishing
computer program
detailed, step-by-step instructions that tell a computer how to solve a problem or carry out a task (also called program)
Antivirus software is an example of a security measure in the ____ category.
detection activity
A range check ___.
determines whether a number is within a specified range
Multi-level authentication is an example of a security measure in the ____ category.
deterrent
A decision is represented by the ________ symbol.
diamond
A(n) ____ backup contains any files that were added or changed since the last full backup.
differential
Case Sensitive
differentiation between upper and lowercase letters
___ involves the examination of computer media, programs, data and log files on computers, servers, and networks.
digital forensics
In the accompanying figure, the type of signal represented by A is a(n) ____.
digital signal
In ____ mode two Bluetooth devices can find each other and exchange passkeys.
discovery
An example of ________ is customer demographic data purchased from third parties or statistics compiled by the federal government. A. internal data B. external data C. imported data D. metadata
B. external data
A _____ temporarily displays records that match the specified criteria. A. sieve B. filter C. validation rule D. field constraint
B. filter
Adware and spyware are referred to collectively as __________. A. viruses B. grayware C. altertware D. firmware
B. grayware
Data ______ means that the data contained in a database is accurate and reliable. A. efficiency B. integrity C. redundancy D. consistency
B. integrity
When you want to extract data from two or more tables, you use a(n) _____ query. A. select B. join C. relational D. object
B. join
Data staging consists of all of the following steps, EXCEPT ________. A. transformation of data B. mining of data C. storage of data in a warehouse D. extraction of data
B. mining of data
In a database, a chart is stored in a(n) ______ field. A. text B. object C. memo D. hyperlink
B. object
When malicious code is planted on your computer and alters your browser's ability to find Web addresses it is known as ________. A. phishing B. pharming C. pretexting D. phlying
B. pharming
With regard to computer protection, quarantining is defined as ________. A. updating your antivirus software B. placing a found virus in a secure area in the hardware C. repairing an infected file d. deleting an infected file
B. placing a found virus in a secure area in the hardware
A ______ check allows you to set credits allowed for students during one quarter from 0 to 21. A. completeness B. range C. consistency D. numeric
B. range
If a business keeps two lists, one for employee payroll and one for employee benefits information, both containing name and address information, this is an example of data ________. A. integrity B. redundancy C. completeness D. normalization
B. redundancy
SSID stands for ________. A. service set identity B. service set identifier C. service security identity D. service security identifier
B. service set identifier
The Siri speech-recognition feature on Apple's iPhone 4s is an examples of a ______. A. natural language processing (NLP) system B. decision support system C. management information system (MIS) D. database management system (DBMS)
A. natural language processing (NLP) system
FBI-related scams involve ________. A. people pretending to represent official organizations B. running auctions that do not exist C. convincing people to send money as a "good faith" gesture D. collecting funds and not delivering the goods
A. people pretending to represent official organizations
9. A computer network is defined as two or more computers connected via ________ so that they can communicate with each other. A. software and hardware B. the Internet C. at least one server D. Ethernet cable
A. software and hardware
A(n) ______ takes advantage of file transport methods to spread on their own. A. worm B. script C. encryption D. time bomb
A. worm
For 3D games, frame rates below ________ are considered unacceptable.
16 fps
Digital telephone systems open up the possibilities for digital data transport options such as ____.
DSL
Tom is currently using dial-up for his Internet connection but he believes it is too slow for his needs and ties up his phone line. He is looking for an alternative and has come to you for help. Tom wants to know what kind of service to opt for if cable Internet service is not available, or proves slower or less dependable than expected. You tell him the next choice would be ____.
DSL
Tom is currently using dial-up for his Internet connection but he believes it is too slow for his needs and ties up his phone line. He is looking for an alternative and has come to you for help. Tom wants to know which of the services uses his existing telephone lines. You tell him ____.
DSL
A(n) ____ helps people make decisions by directly manipulating data, analyzing data from external sources, generating statistical projections, and creating data models of various scenarios.
DSS
Data Warehouses vs DataMarts
DW - A logical collection of info gathered from different physical sources to aggregate it into a single repository. Both perform analytical processing or OLAP (online analytical processing); DataMarts are small subsets of data pulled out to work with to answer specific business questions
Data vs Information
Data are raw facts; information is data converted into a meaningful & useful context for decision making
geotag
Data attached to a photograph that indicates the latitude and longitude where you were standing when you took the photo.
________ assigns a drive letter to a folder or printer on a remote computer.
Drive mapping
A tool used for making calculations that was considered essential for engineering and science students through the 1960s is a(n) abacus.
False
A wireless ad hoc network uses a centralized broadcasting device, such as a wireless access point or router.
False
A(n) control is a program that extends the ability of the kind of applications shown in the accompanying figure to work with file formats.
False
According to the video "How to Avoid Malware Infections", if malware gets through your anti-virus software, then you need to change your anti-virus software.
False
According to the video "Identity Theft", it is safest to have bills sent via mail, instead of through e-mail.
False
Adobe Acrobat is a multimedia technology that can be used to create animation and interactive modules.
False
All IP addresses are static.
False
Control structures are instructions that specify the sequence in which a program is written.
False
Flash, once the dominant tool for interactive Web pages, is gradually being replaced by PerlScript and new features available in HTML5.
False
In Paint, the Fill with color tool changes only the pixel it points to.
False
In Prolog, the ?- prompt means that Prolog is processing data and is not ready to proceed.
False
In a problem statement, a(n) known is something you accept as true in order to proceed with program planning.
False
In a system like the one shown in the accompanying figure, a technique called Boolean logic can be used to deal with imprecise data by asking for a level of confidence.
False
In a transaction processing system, only one task needs to be completed successfully for the system to store the transaction.
False
In a(n) POP3 e-mail system, your messages remain on a Web server, rather than being downloaded to your computer.
False
In order to run portable software on your PC, you must have the software installed.
False
In the SDLC, the goal of the activities in the planning phase is to create a list of requirements for the new or revised information system.
False
In the accompanying figure, IWC-guest is a(n) secure network.
False
In the accompanying figure, the Student item represents a data store.
False
In the accompanying figure, the item on the left simply plugs into a serial port on the outside of the system unit.
False
In the accompanying figure, the lock icon indicates a network secured with wired encryption.
False
In the query illustrated in the accompanying figure, the JOIN command specifies that you want to see the album with item number LPM-2256.
False
It is not necessary to use the resources of an online job bank unless you are actively searching for a job.
False
Like bitmap graphics, vector graphics lose their quality when enlarged.
False
Mac software is easy to install. Downloads are ordinarily supplied as .dim files, commonly referred to as "disk images."
False
Many online job banks allow you to create a search agent that checks for jobs only while you are online.
False
Mobile Internet access allows you to easily move your access device, as in the case of vehicle-mounted satellite dishes that can be deployed when the vehicle is parked.
False
Monochrome bitmaps, like the one shown in the accompanying figure, require a lot of storage space.
False
Most processors in today's personal computers use RISC technology.
False
NATs are intended to work within LANs to monitor and direct packets being transported from one device to another.
False
Once a drive has been mapped, it can only be accessed from the computer in the Start menu.
False
Online auctions are examples of B2G e-commerce.
False
Paint's Eraser tool erases images one box at a time.
False
The Database Tools tab contains the option to Export.
False
The Four Forces Model illustrates the threats that face companies within industry.
False
The Internet is the world's largest example of a(n) LAN.
False
The Render print jobs option on the print sharing tab when selected requires that the computer connected to the printer will process the file and get it ready.
False
The Settings button allows to select the settings for a gadget.
False
The Start menu's All Applications option displays a complete list of the software installed on your computer.
False
The index key for a table specifies the order in which records are stored and where new records are inserted in a table.
False
The item marked D in the accompanying figure is an audio port.
False
The octets in an IP address correspond to the parts of a Web site address.
False
The op code in a machine language instruction specifies the data.
False
The product design stage of the lifecycle of a new hardware product often takes place under wraps.
False
The tables in an Access database consist of columns only.
False
You can adjust the way tables are displayed by changing the order of columns and hiding columns, but you cannot sort the data in the table.
False
You can allow only people logged into your computer to open, change and create files in the Public folders.
False
You can use a hotspot for true mobile Internet access.
False
You should always use a different password for every account.
False
________ means that people are allowed to share any printer that you have designated as shared.
Global print sharing
3G technologies have speeds ranging from 200 Kbps to ____.
5 Mbps
Jimmy recently graduated and is looking for his first full-time job. He has turned to you for help. Jimmy knows you recently graduated and got a new job. He thinks you can give him some advice to help with his search. Jimmy was told the Internet had become an important tool for job hunters. Jimmy is wondering about the amount of his job-hunting time he should spend online. You tell him it is best to spend approximately ____ of his total time online.
50%
When working with JPEG graphics, which one of the following compression ratios produces the smallest file?
50:1
A bank of capacitors holds how many bits?
8
Microsoft Windows is installed on more than ____ of the world's personal computers.
80%
bookmark
A URL that you save in your browser so all you have to do is click on the title to visit it again
A ________ is a virus that is attached to documents such as Word or Excel files. A) script virus B) macro virus C) polymorphic virus D) Trojan horse
A ________ is a virus that is attached to documents such as Word or Excel files. A) script virus B) macro virus C) polymorphic virus D) Trojan horse
ups (uninterruptible power supply)
A battery-operated power source directly attached to one or more devices and to a power supply that prevents undesired features of the power source from harming the device or interrupting its services.
Decision Support System
A complex type of BI system that combines models and data to address semi-structured and unstructured problems.
virus
A computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged.
zombie
A computer that's controlled by a hacker who uses it to launch attacks on other computer systems.
logic bomb
A computer virus that runs when a certain set of conditions is met, such as when a program is launched a specific number of times.
logical port blocking
A condition in which a firewall is configured to ignore all incoming packets that request access to a certain port so that no unwanted request access to a certain port so that no unwanted requests will get through to the computer.
grey-hat hackers
A cross between black and white- a hacker who will often illegally break into systems merely to flaunt his or her expertise to the administrator of the system he or she penetrated or to attempt to sell his or her services in repairing security breaches.
Relational Database Model
A database model that stores data in the form of logically related two-dimensional tables; includes concepts of entities, entity classes, attributes, unique primary keys & foreign keys to tie entities together
data files
A file that contains stored data.
Query
A filter or criteria-related search written to return results from a database.
Table
A group or collection of logically related records
white-hat hackers (ethnical hackers)
A hacker who breaks into systems just for the challenge of it (and who doesn't wish to steal or wreak havoc on the systems). Such hackers tout themselves as experts who are performing a needed service for society by helping companies realize the vulnerabilities that exist in their systems.
black-hat hackers
A hacker who uses his or her knowledge to destroy information or for illegal gain.
Windows 7 includes peer-to-peer networking called _____.
A homegroup
encryption viruses
A malicious program that searches for common data files and compresses them into a file using a complex encryption key, thereby rendering the files unusable.
________ is used to ensure that data is organized most efficiently. A) Consistency checking B) Validation C) Normalization D) Range checking
D) Range checking
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________. A) packet filtering B) packet switching C) static addressing D) logical port blocking
D) logical port blocking
Which of the following is NOT a virus category? A) worm B) logic bomb C) macro D) pharming
D) pharming
Entity/object
A person, place, thing, transaction, or event about which data is stored; rows in each table contain "instances" of entities: a customer entity may include instances of John Jones, Sara Peterson, etc.
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. A) denial of service (DoS) B) zombie C) logic bomb D) rootkit
D) rootkit
virus signature
A portion of the virus code that's unique to a particular computer virus and that makes it identifiable by antivirus software.
Information System Planning
A process of viewing org mission and strategic plan and then determining the necessary technology to help the org achieve them
Antivirus Software
A program that protects a computer from malicious codes such as viruses, worms, and Trojan Horse
Antispyware Software
A program that protects a computer from malicious software designed to threaten privacy and confidentiality
In a database, a group of related records is referred to as a(n) ________. A) memo B) field C) object D) table
D) table
All of the following were top cybercrimes reported to the IC3 in 2012 EXCEPT ________. A) identity theft B) non-auction scam C) advance fee fraud D) theft of services
D) theft of services
Which of the following is NOT a type of UTP cable you would use in a wired Ethernet home network? A. Cat 5E B. Cat 6 C. Cat 6A D. Cat 7B
D. Cat 7B
5. ________ is software that takes an existing Internet connection and turns it into a wireless hotspot. A. Netify B. Multiply C. Mobilefy D. Connectify
D. Connectify
Which of the following is NOT a typical disadvantage associated with databases? A. Databases can be expensive to set up. B. Databases are usually more complex to administer. C. Databases are more complex to construct. D. Database information cannot be changed once it is entered.
D. Database information cannot be changed once it is entered.
_______ interference is a type of signal interference in wired transmission media that can be caused by fluorescent lights or machinery with motors or transformers. A. Radio frequency interference B. Transitional C. Crosstalk D. Electromagnetic
D. Electromagnetic
Which is NOT a networking protocol? A. Apple File Protocol (AFP) B. NetBios Extended User Interface (NetBEUI) C. Internet Packet Exchange (IPX) D. HyperText Transfer Protocol (HTTP)
D. HyperText Transfer Protocol (HTTP)
cookies
A small text file that some websites automatically store a client computer's hard drive when a user visits the site.
Database Management System (DBMS)
A software environment (like Access) that lets us build a database file (AdventureWorks.accdb); it then controls our ability to sort, filter, query data & build forms for data entry and create reports for summary output from a database
whole-house surge protector
A surge protector that's installed on (or near) the breaker panel of a home and that protects all electronic devices in the home from power surges.
keystroke logger (key logger)
A type of spyware program that monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information.
digital signature
A unique digital code that can be attached to an e-mail message or document to verify the identity of the sender and guarantee the message or file has not been changed since it was signed.
logical port
A virtual communications gateway or path that enables a computer to organize requests for information (such as web page downloads and e-mail routing from other networks or computers
polymorphic virus
A virus that changes its virus signature (the binary pattern that makes the virus identifiable) every time it infects a new life. This makes it more difficult for antivirus programs to detect the virus .
stealth viruses
A virus that temporarily erases its code from the files where it resides and hides in the active memory of the computer.
macro virus
A virus that's distributed by hiding it inside a macro.
E-mail viruses
A virus transmitted by e-mail that often uses the address book in the victim's e-mail system to distribute itself.
A(n) _________ address is the address external entities use to communicate with your network. A. AL B. MAC C. WI D. IP
D. IP
What is another name for the physical address assigned to each network adapter? A. Network Access Control (NAC) B. Physical Address Control (PAC) C. Network Physical Address (NPA) D. Media Access Control (MAC)
D. Media Access Control (MAC)
A ______ is a network used by one person connected via wireless media. A. WAN B. LAN C. MAN D. PAN
D. PAN
________ are often equipped to act as hardware firewalls. A. Repeaters B. Switches C. Jammers D. Routers
D. Routers
Facial recognition is an example of ________ authentication. A. access B. photo C. verification D. biometric
D. biometric
A database schema is also called a(n)____. A. information system B. summary report C. relation D. data dictionary
D. data dictionary
In a network that uses the star topology, the signal that is sent to indicate a signal collision is called a ____. A. hit B. crash C. stop D. jam
D. jam
Which of the following causes interference when a cable is exposed to strong electromagnetic fields? A. EMI B. RFI C. STP D. IEEE
A. EMI
Which cable type is the most costly to install? A. Fiber-optic B. Twisted-pair C. ThinNet coaxial D. ThickNet coaxial
A. Fiber-optic
________ databases have the largest market share among the primary types of electronic databases. A. Relational B. Flat-file C. Multidimensional D. Object Oriented
A. Relational
Which of the following is the most commonly used client/server network topology? A. Star B. Cluster C. Ring D. Hierarchical
A. Star
Which of the following networks has high scalability? A. Star B. Ring C. Bus D. Hybrid
A. Star
35. Using your computer for non-work activities while you are being paid to do your job is known as ________. A. cyberloafing B. cybersleeping C. cyberlazing D. cyberbreaking
A. cyberloafing
In a database, a _______ is synonymous with a category of information A. field B. record C. row D. table
A. field
A Web address is stored as a(n) ________ field in a database. A. hyperlink B. text C. address D. memo
A. hyperlink
In a data warehouse, data gathered from sales, billing, and inventory departments are examples of ________ sources. A. internal data B. external data C. metadata D. exported data
A. internal data
A peer-to-peer network is an example of ______ administration. A. local B. wide area C. central D. corporate
A. local
A ________ is a set of rules for how information and communication are exchanged. A. protocol B. token C. switch D. packet
A. protocol
All of the following are categories of viruses, EXCEPT ________. A. snakes B. boot sector C. email D. encryption
A. snakes
The first electronic computer to use vacuum tubes instead of switches was the ____.
ABC
The ____ operator specifies that both of the search criteria must be true for the record to be selected.
AND
According to the video "How to avoid malware infections?", which of the following is an indication that you might be downloading malware?
All of the above
According to the video "What is a relational database?", which of the following is a reason to avoid redundancy?
All of the above
You can set up relationships between tables in a relational database to _____.
All of the above
You might be able to improve your computer's Experience Index score by ________.
All of the above
You might want to restore a single file from a backup if ________.
All of the above
____ are a segment of the IT industry.
All of the above
Foreign Key
An identifier attribute that is a unique primary key in another table and creates a relationship between two tables
spam filter
An option you can select in your e-mail account that places known or suspected spam messages into a folder other than your inbox.
adware
An program that downloads on your computer when a user installs a freeware program, game, or utility. Generally. adware enables sponsored advertisements to appear in a section of a browser window or as a pop-up ad.
spyware
An unwanted piggyback program that downloads with the software you want to install from the internet and then runs in the background of your system.
____ tools cloak a person's identity online.
Anonymizer
social engineering
Any technique that uses social skills to generate human interaction for the purpose of enticing individuals to reveal sensitive information.
hackers
Anyone who unlawfully breaks into a computer system (whether an individual computer or a network).
photo management software
Application software that allows users to view, organize, sort, catalog, print, and share digital photos.
business software
Application software that assists people in becoming more effective and efficient while performing their daily business activities.
travel and mapping software
Application software that enables users to view maps, determine route directions, and locate points of interest.
reference software
Application software that provides valuable and thorough information for all individuals.
____ refers to the ability of the system to be continuously accessible to all the people who use it.
Availability
Which type of virus was the famous Michelangelo virus? A) A worm B) A time bomb C) A script virus D) An e-mail virus
B) A time bomb
In a(n) ________ network, each node connected to the network communicates directly with every other node. A) Client/server B) Peer-to-peer C) Intranet D) Extranet
B) Peer-to-peer
Data ________ ensures that the data contained in a database is accurate and reliable. A) efficiency B) integrity C) redundancy D) consistency
B) integrity
In a Microsoft Access database, the Gettysburg Address would be stored in a(n) ________ field. A) text B) long text C) short text D) object
B) long text
With regard to computer protection, quarantining is defined as ________. A) updating your antivirus software B) placing a found virus in a secure area on the hard drive C) repairing an infected file D) deleting an infected file
B) placing a found virus in a secure area on the hard drive
P2P networks become difficult to manage when they are expanded beyond __________ users. A. 5 B. 10 C. 20 D. 50
B. 10
If a numeric field has a size of 5, which is the highest number it can hold? A. 5 B. 99999 C. 55555 D. 50000
B. 99999
________ is the maximum speed at which data can be transferred between two nodes. A. Throughput B. Bandwidth C. Band Speed D. Through Speed
B. Bandwidth
Which of the following devices sends data from one collision domain to another? A. Switch B. Bridge C. Link D. Band
B. Bridge
Which of the following networks is most known for data collisions? A. Star B. Bus C. Hierarchical D. Cluster
B. Bus
________ cable is NOT subject to electromagnetic interference or radio frequency interference. A. Twisted-pair B. Fiber-optic C. Polycarbonate D. Coaxial
B. Fiber-optic
A _________ keeps your computer safe by confirming who is trying to access it. A. Gateway B. Firewall C. Hub D. Switch
B. Firewall
A(n) _________ server tracks who is logging on to the network as well as which services on the network are available to each user. A. gateway B. authentication C. dedicated D. file
B. authentication
Which of the following is NOT a common network topology? A. star B. cluster C. bus D. ring
B. cluster
A _________ keeps your computer safe by confirming who is trying to access it. A. gateway B. firewall C. hub D. switch
B. firewall
A(n) _________ is used exclusively within a corporation or organization. A. VPN B. intranet C. extranet D. Internet
B. intranet
10. For the nodes on a network to communicate with each other and access the network, each node needs a __________. A. DSL modem B. network adapter C. network interface card D. router
B. network adapter
An _____ needs to be installed on each client computer and server connected to the network to provide the services necessary for them to communicate. A. application software B. network operating system C. protocol guideline D. switch
B. network operating system
Client/Server networks are controlled by a central server that runs a special piece of software called _______. A. Windows 7 B. network operating system (NOS) C. firewall D. firmware
B. network operating system (NOS)
In a database, ______ fields store numbers used to perform calculations. A. date B. numeric C. computational D. alphanumeric
B. numeric
A print server uses a print ____ as a software holding area for printing jobs. A. stack B. queue C. buffer D. heap
B. queue
If fair allocation of network access is a major requirement of the network, choose a _______ topology. A. cluster B. ring C. bus D. star
B. ring
The ends of the cable in a bus network use a(n)_____ to absorb a signal so that it is not reflected back onto parts of the network that have already received the signal. A. endcap B. terminator C. stopper D. block
B. terminator
Normal telephone cable is a type of ________. A. fiber-optic cable B. twisted-pair cable C. coaxial cable D. Ethernet cable
B. twisted-pair cable
When you purchase a textbook online from a site like www.amazon.com, you are participating in ____ e-commerce.
B2C
The ____ data type would be the right choice for a field designed to hold an MP3 file.
BLOB
A ________ relationship indicates that for each record in a table, there is only a single corresponding record in a related table. A) many-to-one B) one-to-many C) one-to-one D) many-to-many
C) one-to-one
Nontraditional data such as audio clips, video clips, pictures, and very large documents are called ________ data. A) enterprise B) structured C) unstructured D) multidimensional
C) unstructured
Rules for creating passwords include all of the following EXCEPT ________. A) keep your password a secret B) change your password frequently C) use a dictionary to find a lengthy word that is easy to remember D) use letters, numbers and symbols in your passwords
C) use a dictionary to find a lengthy word that is easy to remember
Data in a multidimensional database is organized in a _______ format. A. Linear B. Table C. Cube D. Cellular
C. Cube
For business networks, which of the following is NOT a main cable type? A. Twisted-pair B. Coaxial C. Duplex D. Fiber-optic
C. Duplex
. Which of the following is something a network adapter does NOT do? A. It uses high-powered signals so data can move easily over network transmission media. B. It allows or denies access to the computer in which it is installed. C. It verifies that all information transmitted from the computer is correctly received by the recipient. D. It breaks down data and puts it into packets.
C. It verifies that all information transmitted from the computer is correctly received by the recipient.
Rules for creating passwords include all of the following, EXCEPT ____. A. Keep your password a secret B. Change your password frequently C. Keep your password written down and stored in any easy-to-remember location D. Create a hard-to-guess password, with a combination of letter, numbers, and symbols
C. Keep your password written down and stored in any easy-to-remember location
3. A network used to communicate among devices close to one person is called a ________. A. MAN B. LAN C. PAN D. WAN
C. PAN
Which of the following is NOT a type of management information system (MIS) report? A. Detail B. Summary C. Redundancy D. Exception
C. Redundancy
All of the following operating systems support P2P networking, EXCEPT ________. A. Windows B. OS X C. Unix D. Linux
C. Unix
A ________ uses the public Internet communications infrastructure to build a secure, private network. A. LAN B. WAN C. VPN D. MAN
C. VPN
What is CSMA/CD? A. a type of network topology B. a special signal of a star network C. a method used to avoid data collisions D. the central communication device on a star or ring network
C. a method used to avoid data collisions
An individual trained in the design and building of databases is called a database ________. A. master B. technician C. administrator D. analyst
C. administrator
When a client computer connects to a network and requests the use of Microsoft Office 2010, the ______ server delivers the software to the client computer. A. communication B. database C. application D. file
C. application
Unstructured data such as video clips and pictures are known as _____ because of the way they are encoded. A. hyperlink fields B. multidimensional data C. binary large objects (BLOBs) D. metadata
C. binary large objects (BLOBs)
A _____ check compares the values of data in two or more fields to see whether those values are reasonable. A. correctness B. range C. consistency D. numeric
C. consistency
Management information systems (MIS) provide reports called __________, which show conditions that are unusual or need attention from users of the system. A. detail reports B. summary reports C. exception reports D. expert reports
C. exception reports
Using a network without the network owner's permission is known as ________. A. hijacking B. chillijacking C. piggybacking D. hybacking
C. piggybacking
A __________ virus changes its own code or periodically rewrites itself to avoid detection. A. multipartite B. stealth C. polymorphic D. polypertite
C. polymorphic
Ring networks use the ________ method avoid data collisions. A. packet screening B. active-check C. token D. passive-check
C. token
A(n) __________ is a way of retrieving information from one or more table that defines a particular subset of data. A. validation rule B. field constraint C. enquiry D. query
D. query
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network. A. viewing B. Browsing C. filtering D. screening
D. screening
The file system used by Mac OS is ____.
HFS+
Thomas is a network expert, having mastered the finer points of network structure, topology, and geographical scope. He has built many different types of networks at home, school, and work. He is now designing a home network for his friend. Thomas's friend has indicated that he will accept the system that Thomas is constructing for him. However, he is concerned about security risks and wants to know what limits he can place on the system. Which of the following is NOT a true statement that Thomas can make to his friend?
He can't remove sharing from files that he no longer wants to share.
Which of the following is not a deterrent for new entrants into an industry?
High Profit Margin
Integrated Circuit
IC; a super-thin slice of semiconducting material packed with microscopic circuit elements, such as wires, transistors, capacitors, logic gates, and resistors
To configure a file server, open a browser from any workstation, enter the file server's ____ address, and provide the administrator ID and password.
IP
Until domain names are added to the DNS database, new sites can only be accessed by entering their numeric ____.
IP addresses
____ degrees focus on the computer equipment and software used by businesses.
Information technology
When downloading a file, the Download Complete dialog box contains all of the following buttons EXCEPT _______.
Install
Internet Explorer allows you to specify security levels for four security zones. These four zones are ________.
Internet, local intranet, trusted sites, and restricted sites
Web Server
Internet-based computer that accepts requests from browsers
The life cycle of a new computer product is shown in the accompanying figure, in which box C represents ____.
Introduction
Tom and Nancy were discussing programming languages and which ones to expect of their IT person. You are a programmer and think you can offer them some help in this area. They have some questions, and you agree to answer them. Tom and Nancy say they will be doing some Web-based programming. You tell them their IT person should have skills in ____.
Java
____ consists of a series of instructions that is embedded directly into an HTML document that instruct the browser to carry out specific actions or to respond to specific user actions.
JavaScript
multipartite virus
Literally meaning "multipart" virus; a type of computer virus that attempts to infect computers using more than one method.
____ is a special type of retailing in which a vendor takes orders by phone or from an Internet site, and then ships the product to consumers.
Mail order
home page
Main page of a web site; usually the first page.
portable media player
Mobile device on which you can store, organize, and play digital media.
A ____ is a term sometimes used to refer to the interconnection of personal digital devices or consumer electronics within a range of about 30 feet and without the use of wires or cables.
PAN
The first IBM PCs used ____ as an operating system.
PC-DOS
____ is the most widely used language for communication between computers and printers.
PCL
Adobe Reader works with files stored in standard ____ format.
Arithmetic logic unit (ALU)
Part of the CPU that performs all the arithmetic and logic functions for the computer; handles addition, subtraction, multiplication and division, and also makes logical and comparison decisions.
rootkit
Programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge. These programs are designed to subvert normal login procedure to a computer and to hide their operations from normal detection methods.
___ are smaller in size than enterprises and typically do not have an international presence.
SMBs
pretexting
The act of creating an invented scenario (the pretext) to convince someone to divulge information.
computer forensics
The application of computer systems and techniques to gather potential legal evidence; a law enforcement specialty used to fight high tech crime.
BI & the Data Warehouse
The data warehouse enables BI; it pulls disparate information into a single location to be cleaned & scrubbed for analysis
Management
The process by which organizational goals are achieved through the use of organizational resources.
A(n) enterprise information system supports a variety of large business activities such as inventory management, point-of-sale cash registers, e-commerce, payroll, and managerial planning.
True
A(n) subroutine (or procedure or function) is a section of code that is part of a program but is not included in the main sequential execution path.
True
An information system must support the needs of people who engage in many different organizational activities.
True
Another name for threat modeling is risk analysis.
True
Apple's FairPlay and Microsoft's Windows Media DRM are designed to protect music, movies, ebooks, and even television shows.
True
At the decision point, the computer does one of two things, based on the answer to the question in the decision box.
True
Because most digital devices are electronic, bits take the form of electrical pulses.
True
BitTorrent protocols dissect files into small chunks that might reside on different computers.
True
Bitmap graphics typically store as very large files because it must save information about each and every pixel.
True
Confidentiality is the obligation not to disclose willingly any information that should be kept private.
True
Currently, there are three personal computer platforms: PC, Mac, and Linux.
True
For portable satellite Internet service, a satellite dish can be mounted on a vehicle.
True
HTML is called a markup language because authors markup their documents by inserting HTML tags.
True
Heads are made of a hard ceramic material.
True
If a name field contains an entire name, it is difficult to individually manipulate the first name, last name, and middle initial.
True
If you do not specify an HTML format, Access uses the standard format.
True
In a dual boot system, to change operating systems, you have to reboot.
True
In a fixed-length field, when the data entered is shorter than the allocated field length, blank spaces automatically fill the field.
True
In a(n) relational database, relationships are specified by joining common data stored in the fields of records in different tables.
True
In object-oriented programming, a method is activated by a(n) message, which is included as a line of code.
True
In the GUI shown in the accompanying figure there are two application windows: calculator and word processor.
True
In the accompanying figure, the arrow symbolizes a data flow.
True
In the accompanying figure, the item on the right can be installed in an expansion slot inside the system unit of a desktop computer.
True
In the accompanying figure, the relationship shown in the top row is a one-to-many relationship.
True
In the maintenance stage of the hardware product life cycle, as supply and demand for product reach an equilibrium, the manufacturer might reduce the price to keep the product attractive to buyers.
True
In vector graphics software, the Arrange command can be used to manipulate the way objects are layered.
True
MiFi is a brand name for a compact, mobile, wireless router offered by Novatel Wireless.
True
Microwaves are electromagnetic signals that can be aimed in a single direction and have more carrying capacity than radio waves.
True
Mobile devices typically pinpoint your location using built-in GPS or triangulating your distance from nearby cell towers.
True
Most firewall software is preconfigured to block only unnecessarily open ports targeted by hackers.
True
Most operating systems require you to make some global sharing settings, then specify the particular files and folders you want to share.
True
Most routers supply a WAN port designed for an Internet connection.
True
Much of the power and flexibility of the Prolog language stems from its ability to sift through facts.
True
On Ethernet, data travels on a first-come, first-served basis.
True
On PCs, executable files have an .exe extension.
True
Once a drive has been mapped, it will be assigned a drive letter.
True
Once data is indexed, the computer can use the index as a pointer to the original data.
True
One defensive programming technique is to rewrite code to decrease its complexity.
True
Online backup services are also referred to as remote or managed backup services.
True
P2P file sharing allows users to obtain files from other users on the Internet.
True
Paint's Eraser tool changes the color that is set as the background color.
True
Programmers can offer a(n) patch to fix a defect in a software package that is already in the hands of consumers.
True
Programs in the Start Menus list can be opened with a single click.
True
Pseudocode is a mixture of English and a programming language.
True
Public key encryption uses one key to encrypt a message and another key to decrypt it.
True
RFID chips embedded in ID badges can be used to keep track of employees' locations in an office or manufacturing facility.
True
Researchers estimate that the most extensive search engines cover less than 20% of the Web.
True
Security specialists install and configure antivirus software and firewalls.
True
Solid state storage cards hold data without consuming power, so they do not lose data when the camera, for example, is turned off.
True
Some job hunting experts advise IT job seekers to spend no more than 50% of their total job hunting efforts online.
True
The ALU uses registers to hold data that is being processed.
True
The SDLC provides a general outline of how an information system evolves.
True
The accompanying figure represents the basic flow of information in an expert system and summarizes its capabilities.
True
The applications shown in the accompanying figure are examples of Web browsers.
True
The big bonus of portable WiMAX is that you use the same Internet service provider whether you are at home or on the road.
True
The color of each dot in a bitmap graphic is stored as a(n) binary number.
True
The computer industry encompasses those companies that manufacture computers and computer components.
True
The end of the dot-com bubble meant a decline in IT sector job openings.
True
The excerpt from an application specification shown in the accompanying figure describes in detail how the information system's software should process a particular task involving inventory data.
True
The inference engine requests information by asking questions and then makes a decision based on the information provided.
True
The item marked E in the accompanying figure is an Ethernet network port.
True
The logical data type is used for true/false or yes/no data.
True
The most commonly used touchscreen technology is a transparent panel coated with a thin layer of electrically conductive material that senses a change in the electrical current when touched.
True
The number of horizontal and vertical pixels that a device displays on a screen is referred to as its screen resolution.
True
The recipient of the e-mail in the accompanying figure is Ann Hill.
True
The results of statements that have been compiled are called object code.
True
The term server can refer to a combination of hardware and software.
True
To create a video DVD, you usually begin by selecting one or more completed videos that include soundtracks, transitions, titles, special effects, and so on.
True
To initiate the mapping process, right-click on a shared file and select "Map network drive".
True
Tracks and sectors are numbered to provide addresses for each data storage bin.
True
Trojans are computer programs that seem to perform one function while actually doing something else.
True
Using a slide rule, you adjust decimal places to represent larger numbers.
True
Using the Paint's Eraser tool it will erase all pixels with the set foreground color to the set background color.
True
Vector graphics files can be saved as bitmap files, but you lose the ability to easily move objects.
True
Viruses can damage files to the point that your computer can't access any data on its hard disk.
True
When a capacitor is off, it represents a zero bit.
True
When coding a button, double-clicking the button will bring up the code.
True
XML documents are not optimized for many operations you would customarily associate with databases, such as fast sorts, searches, and updates.
True
You must pay for a domain name.
True
zipped files
Type of compressed files that usually have a .zip extension.
user name
Unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user.
Susan is concerned about some of the laws affecting the IT industry. She is particularly interested in issues related to copyright and copyright violations. She cannot afford to go to an attorney but knows you have done some research on this topic and might be able to help. Susan wants to know which act extends copyright protection to all original works. You suggest she investigate the ____.
United States Copyright Act
Melissa has decided to obtain an e-mail account. Although she plans to use the e-mail account to communicate with her many friends, her main purpose in establishing it is to aid in the search for a job. She has a list of e-mail addresses for a group of potential employers. Melissa intends to e-mail her resume, along with a general message, to each of them. She will use the same message for all recipients. Melissa is concerned about the security of her computer, and she wants to avoid malicious exploits, which can work their way into her computer through various security holes. Which type of e-mail service has been the target of many such exploits?
Webmail
Melissa has decided to obtain an e-mail account. Although she plans to use the e-mail account to communicate with her many friends, her main purpose in establishing it is to aid in the search for a job. She has a list of e-mail addresses for a group of potential employers. Melissa intends to e-mail her resume, along with a general message, to each of them. She will use the same message for all recipients. Melissa is planning to travel a great deal in the coming weeks. She will not be taking her computer with her, but knows that the hotels she will be staying at have business centers with Internet-enabled computers. She plans to access her e-mail account every day so that she can quickly respond should she be contacted by a prospective employer. Which one of the following account types should she use?
Webmail
The number and variety of programs that run on ____ are unmatched by any other operating system.
Windows
When shopping for a computer, checking your computer, or working with an unfamiliar computer, you can use the ________ to assess its basic components and performance.
Windows Experience index
The ______ graphics format has no built-in compression.
Windows bitmap
A ____ provides programmers with tools to build substantial sections of a program by pointing and clicking.
VDE
The secure connection created between a user's computer and a company's network is called a(n) ___.
VPN tunnel
At the ACME Widget Company, the computers have started behaving weirdly. Chris noticed that his directory had some files that he didn't remember putting on his computer. Lesley noticed her computer was beginning to run very slowly, and Kim realized she was getting replies to emails she had not sent. The owner of the ACME Widget Company has contacted you to see if their company might have a computer security problem. ACME Widget Company is concerned it may have a ____, which is a self-replicating program designed to carry out some unauthorized activity on a victim's computer.
worm
Malware is a term that can be used to describe ___.
worms, rootkits, payload
If you have disabled file and printer sharing, __________.
you can still access a network router and the Internet
The downside of a compact installation is ________.
you might need to insert the distribution CD to use some features
dual-core
a CPU that includes two microprocessors on a single integrated circuit
You have been hired to create an information system for the TeaTime Tea House. You have met with the owner of the company to get a general idea of what they need and have decided to use the modified waterfall SDLC model. The company owner has requested a document that describes what you envision to be the objectives for the new information system. Which type of report will you create?
a System Requirements Report
search site
a Web site that provides a variety of tools to help you find information on the Web based on keyword searches
internet forum
a Web site where people post comments to discussion threads (topics) which can be read at any time by others who visit the forum
When uninstalling software you ________.
a and c
numeric keypad
a bank of keys on a keyboard with which you can input numbers, it is located on the right side of a keyboard and is similar to an adding machine or calculator
Window
a box or screen that displays information or a program. Windows usually consist of title bars, toolbar, menu bar, and status bar. a window will always have a Minimize button
Predictive Analytics
a branch of data mining that analyzes current and historical data to predict future trends
MiFi
a brand name for a compact, mobile, wireless router offered a Novatel Wireless
Wiki
a collaborative document posted on the Web that can be viewed and changed by users
suite
a collection of application software programs developed by the same manufacturer, bundled together and sold at a price that is usually less than the cost of purchasing each program individually
BLOB (Binary Large Object)
a collection of binary data stored in a single field of a database
computer network
a collection of computers and related devices, connected in a way that allows them to share data, hardware, and software
database
a collection of organized data that allows access, retrieval, and use of data
Protocol Suite
a combination of protocols working together
monitor (or display screen)
a common output device that displays text, graphics, and video
WAP (Wireless Application Protocol)
a communications protocol that provides Internet access from handheld devices, such as cell phones
Hypertext Transfer Protocol (HTTP)
a communications standard that is used to transport Web pages over the Internet
hard drive
a computer storage device that contains a large-capacity hard disk sealed inside the drive case
zombie
a computer that is controlled remotely and can be used to help spread viruses, spyware, and spam
Satellite Modem
a device that modulates the data signals from a computer into a frequent band that can be carried to the satellite dish
modem
a device that sends and receives data to and from computers over cable, satellite, or telephone lines
router
a device used by LANs and found at each intersection on the Internet backbone that examines the IP address of incoming data and forwards the data toward its destination (also called network router)
digital video recorder
a device used to record video in digital format directly to a hard drive, without the need for videotape
input device
a device, such as a keyboard or mouse, that gathers input and transforms it into a series of electronic signals for the computer
output device
a device, such as a monitor or printer, that displays, prints, or transmits the results of processing from the computer memory
chat group
a discussion in which a group of people communicates online simultaneously
monitor
a display device that forms an image by converting electrical signals from the computer into points of colored light on the screen; usually a computer's primary output device
web page
a document connected to the World Wide Web and viewable by anyone connected to the internet who has a web browser
DNS Cache Poisoning
a domain name server that malfunctions or is hacked and then redirects users to the wrong Web site
backup
a duplicate data file which may be used to restore information in the event of a power failure or other data loss
scroll wheel
a feature on some mouse pointing devices; rolling the wheel enables you to quickly move a page up or down within a window
icon
a graphic representation of an object that you can click to open that object
Entity-Relationship Diagram
a graphic that shows the relationship between record types
Computer Network
a group of computers linked together to share data and resources
network
a group of two or more computers (or nobes) connected to chare information and resources
Phishing
a hacker poses as a legitimate representative of an official organization such as an ISP, a bank, or an online payment service in order to persuade you to disclose highly confidential information
peripheral
a hardware device connected to a computer, but not located within the system unit, such as a monitor, printer, or mouse
DSL (Digital Subscriber Line)
a high-speed, digital, always-on, Internet access technology that runs over standard phone lines
Domain Name System (DNS)
a huge database that has unique IP addresses entered into them
toogle key
a keyboard key that switches on or off each time it is pressed
Mainframe Computer
a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users
motherboard
a large printed circuit board located in the system unit to which all other boards are connected; the motherboard contains the central processing unit (CPU), the memory (RAM) chip, and expansion card slot
mainframe computer
a large, fast, and expensive computer used by businesses or government agencies to provide centralized storage, processing, and management for large amounts of data
supercomputer
a large, powerful computer typically devoted to specialized tasks. it is able to perform complex calculations quickly
Dimension
a later based on a data element, such as a product, place, or customer, that can be used to categorize data
zip drive
a magnetic storage device used to save and retrieve data on Zip drives
Cable Internet Service
a means of distributing always-on broadband Internet access over the same infrastructure that offers cable television service
Satellite Internet Service
a means of distributing always-on, high-speed asymmetric Internet access by broadcasting signals to and from a personal satellite dish
dot per inch (dpi)
a measurement of printer resolution
storage device
a mechanical apparatus that records data to and retrieves data from a storage medium
cloud computing
a method of offering Internet-accessible computing services ranging from office productivity applications to complex corporate data processing
Personal Computer
a micro-processor-based computing device designed to meet the computing needs of an individual
personal computer (PC)
a microcomputer designed for use by an individual user for applications such as Internet browsing, graphics, email, and word processing; the term PC is often used to refer to personal computers running the Windows platform
Computer
a multipurpose device that accepts input, processes data, stores data, and produces output, all according to a series of stored instruction
file
a named collection of data (such as a computer program, document, or graphic) that exists on a storage medium, such as a hard drive, flash drive, CD, or DVD (also called computer file or data file)
File
a named collection of data that exists one a storage medium
Wide area network (WAN)
a network composed of local area networks connected over long distances
ring (or token-ring) topology
a network configuration in which all devices are set up in a circular layout; data flows in a circular fashion, in one direction only
client/server network
a network consisting of client and server computers; often used in businesses
peer-to-peer (P2P) network
a network in which each node can communicate directly with every other node, and which is often used for home and small business network
local area network (LAN)
a network in which the nobes are located within a small geographic area
To connect to a LAN, a computer requires ____.
a network interface card
Internet Backbone
a network of high-capacity routers and fiber-optic communications links that provides the main routes for data traffic across the Internet
wireless network
a network that connects using radio waves instead of wires of cables
bus topology
a networking configuration in which all devices are connected to a central high-speed cable called the bus or backbone
___ is a system that attempts to imitate the behavior of the human brain.
a neural network
IrDA port
a port enabling data transmission through the use of infrared light wave; the devices sharing data require a clear line of site with no visual obstructions
audio port
a port that connects audio equipment to the sound card of a computer to facilitate the exchange of data
mobile devices
a port that connects to a standard telephone line, usually used to connect to the Internet or a local network, with a maximum speed of 56 kilobits per second (Kbps)
connectivity port
a port that enables a computer to be connected to other devices or systems, such as networks, modems, and the Internet
monitor port
a port used to connect a monitor to a computer's graphic processing unit, located on the motherboard or video card
digital video interface (DVI) port
a port used to connect an LCD monitor to a computer in order to use a pure digital signal
s-video port
a port used to connect ancillary video equipment, such as a television or projector to a computer
FireWire port
a port used to send data at rates up to 800 megabits per second (Mbps), frequently used for digital cameras or digital video recorders
Ethernet port
a port, slightly larger than a telephone jack, that can transmit data at speeds up to 1,000 megabits per second (Mbps) and is usually used to connect to a cable modem or a network
tablet computer
a portable computer that features a screen that swivels and can be written on using advanced handwriting recognition software
tablet computer
a portable computing device featuring a touch-sensitive screen that can be used as a writing or drawing pad
USB flash drive
a portable solid state storage device featuring a built-in connector that plugs directly into a computer's USB port (also called USB drive)
instant messaging (IM)
a private chat in which users can communicate with each other using the computer to type messages in real time
performance monitor
a program that assesses and reports information about various computer resources and devices
worm
a program that is able to replicate and spread from computer to computer without human interaction
word processing software
a program used to create and edit written documents such as papers, and resumes
presentation software
a program used to create dynamic slideshows and generate speaker notes and audience handouts
spreadsheet software
a program with which you preform calculations and numerical analyses
computer
a programmable electronic device that can input, process, output and store
restore point
a record created by Windows XP for all of a computer's system settings
One-to-One Relationship
a record in one record type is related to only one record in another record type
Record Occurrence
a record that contains data
Data Warehouse
a repository for data from more than one database
Virtual Private Network (VPN)
a secured connection often used for accessing corporate networks from home or a customer's office
User ID
a series of characters that becomes a person's unique identifier
Password
a series of characters that verifies a user ID and guarantees that you are the person you claim to be
Stored Program
a series of instructions for a computing task can be loaded into a computer's memory
Computer Program
a series of instructions that tells a computer how to carry out processing tasks
email account
a service that provides an e-mail address and mailbox
Application Software
a set of computer programs that helps a person carry out a task
internet telephony
a set of hardware and software that allows users to make phone calls over the Internet, usually without a long-distance charge (also called Voice over IP (VoIP) )
program
a set of instructions used by a computer to perform certain tasks
file extension
a set of letters and/or numbers added to the end of a filename following a period that helps to identify the file contents or file type
filename
a set of letters or numbers that identifies a file. Consists of a name followed by a period, followed by a file extension.
Read Only Memory (ROM)
a set of memory chips located ont he motherboard that stores data and instructions that cannot be changed or erased; it holds all the instructions the computer needs to start up. also known as nonvolatile memory
blog
a shared on-line journal where people can post diary entries about their personal experiences and hobbies
email (electronic mail)
a single electronic message or the entire system of computers and software that handles electronic messages transmitted between computers over a communications network
chat room
a site on the internet where a number of users can communicate in real time (typically one dedicated to a particular topic)
sound card
a small circuit board that gives the computer the ability to accept audio input from a microphone, play sound files stored on disks and CD-ROMs, and produce audio output through speakers or headphones. Required for high-quality music, narration, and sound effects
cookies
a small text file containing information that identifies a visitor to the Web site
handheld computer
a small, pocket-sized computer such as the Apple iPhone, the BlackBerry Smartphone, and the Hewlett-Packard iPAQ, designed to run on its own power supply and provide users with basic applications
flash drive
a small, portable, digital storage device that connects to a computer's USB port; also called a thumb drive, jump drive, or USB drive
key logger
a software program or hardware device that records every keystroke made on the computer
Web browser
a software program that runs on your computer and helps you access Web pages (also called browser)
___ is a collection of individual programs available together as a unit.
a software suite
Keylogger
a software that secretly records a user's keystrokes and sends the information to a hacker
password
a special set of characters used to restrict access to a computer or network
Microcontroller
a special-purpose microprocessor that is built into the machine it controls
Field Validation Rule
a specification that the database designer sets up to filter data entered into a particular field
backup tape drive
a storage device used to save data to tape resembling audiocassetts
Extended ASCII
a superset of ASCII that uses eight bits to represent each character
text messaging
a system used to send messages of 140 to 160 characters or less using your smartphone or mobile device ( also called (SMS) Short Message Service)
Field Format
a template that adds the correct formatting as data is entered
To transport data over a Wi-Fi network, each device must have ________.
a transceiver
wiki
a type of Web site that allows anyone visiting the site to change its content by adding, removing, or editing the content.
digital camera
a type of camera that saves photographs in a digital format rather than one film
scareware
a type of malware that downloads onto your computer and tries to convince you that your computer is infected with a virus or other type of malware
laser
a type of printer that uses a drum, static electricity, and a laser to distribute dry ink or toner on the surface of the paper
Optical
a type of storage process using a laser to read and write data; used by media such as CDs and DVDs
Magnetic
a type of storage process using magnetized film to store data; used by media such a floppy disk or Zip disk
Graphical User Interface (GUI)
a type of user interface that features on-screen objects, such as menus and icons, manipulated by a mouse. The GUI acronym is pronounced "gooey"
GUI
a user interface based on graphics (icons and pictures and menus) instead of text
file manager
a utility that performs functions related to file management
universal serial bus (USB) port
a versatile port used to connect a wide array of peripheral devices to a computer.
Hypertext
a way of linking information through the use of text and multimedia
When an online meeting takes place on the web, it is called ___.
a web conference
portal
a website that offers a broad array of resources and services, such as email, online discussion groups, search engines, and online shopping malls
A(n) ___ test is performed by end-users and checks the new system to ensure that it works with actual data.
acceptance
Web applications are ____.
accessed and run on the Web
A(n) ____ report is a customized report, generated to supply specific information not available in scheduled reports.
ad hoc
A(n) ________ report is a customized report, generated to supply specific information not available in scheduled reports.
ad hoc
In a wireless ____ network, devices broadcast directly to each other.
ad-hoc
___ is a program that displays an online advertisement in a banner or pop-up window on webpages, e-mail, or other Internet services.
adware
John and Andy are planning a software project. You tell John and Andy there are several software development methodologies that exist to help program designers. These can be classified into two groupings. You tell Andy and John that the ____ methodology is best for projects with a small core of developers working at a single location.
agile
A database audit can ____.
all of the above
A form can contain which of the following:
all of the above
A problem a hacker can cause after breaking into your computer might be ____.
all of the above
A recovery disk typically contains ________.
all of the above
A super-thin slice of semiconducting material packed with microscopic circuit elements is a(n) ____.
all of the above
A term which can refer to a person who manipulates computers with malicious intent is ____.
all of the above
A wireless router ________.
all of the above
Benchmark tests can be used ________.
all of the above
BitTorrent can be used to distribute ____.
all of the above
Examples of 3G technologies include ____.
all of the above
File management capabilities available from application software include ____ files.
all of the above
If networked, ____ can be accessed by an authorized LAN user.
all of the above
Now when you purchase a digital book from ____, you can read it on devices that include computers, tablets, and smartphones.
all of the above
When you install a software update ________.
all of the above
You have just secured a new job with a new firm that is very security conscious. You've been instructed to learn as much as possible about encryption to ensure the confidentiality of customer transactions as well as electronic communications about new research and development projects. After researching this topic, you find that encryption can be used in ____.
all of the above
____ may pose a threat to your computer's security and/or your privacy.
all of the above
Hierarchical Database
allows one-to-one and one-to-many relationships, linked on a hierarchical structure
Wiki
allows participants to modify posted material
Real-Time Messaging System
allows people to exchange shorts messages while they are online
presentation software
allows users to create visual aids for presentations to communicate ideas, messages, and other information to a group
P2P File Sharing
allows users to obtain files from other users located anywhere on the Internet
Portable Internet Access
allows you to easily move your access device, i.e. satellite dishes on moving van
Mobile Internet Access
allows you to use the Internet as you are on the go
The first phase of testing generally carried out by the software publisher's in-house test team is called ____.
alpha testing
Logical Data Type
also known as a Boolean or a yes/no data type is used for true/false data using minimal storage space
personal digital assistant (PDA)
also known as a handheld computer, a small device that enables a user to carry digital information
notebook computer
also known as a loptop, this microcomputer is smaller than a desktop and designed to be portable
keyboard
an arrangement of letter, number, and special function keys that acts as the primary input device to the computer
Relationship
an association between data that's stored in different record types
denial of service (DoS)
an attack caused when a large number of computers attempt to access a Web site at the same time, effectively overloading it and causing it to shut down
computer
an electronic device that accepts input, processes data, stores data, and produces output
dot matrix
an impact printer, useful for printing multi-page forms
mouse
an input device that allows the user to select and move objects on the screen by moving it on a surface (also called pointing device)
stylus
an input device used to write on a tablet computer of PDA
mouse
an input used to enter commands and user responses into a computer
processor/microprocessor
an integrated circuit that contains the circuitry for processing data. It is a single-chip version of the central processing unit (CPU) found in all computers (also called microprocessor)
local area network (LAN)
an interconnected group of computers and peripherals located within a relatively limited geographic area, such as a home office, building, or campus
port
an interface through which external devices are connected to the computer
digital revolution
an ongoing process of social, political, and economic change brought about by digital technology, such as computers and the Internet
linux
an open-source operating system based on the UNIX operating system developed for mainframe computers
CD burner
an optical storage device capable of reading data from and writing data to a CD
Workstation
an ordinary personal computer connected to a network; or a powerful desktop computers used for high-performance tasks
A common malware popup _____.
announces that it has scanned your computer and found viruses
Many ____ sites act as relay stations to forward your searches to search engines without leaving a trail back to a cookie or IP address.
anonymizer
Apps
another name for software applications
Intrusion
any access data or programs by hackers, criminals, or other unauthorized persons
Domain Name Server
any computer that hosts the database of IP addresses
Authentication Protocol
any method that confirms a person's identity using something the person knows, something the person possesses, or something there person is
Nobe
any object connected to a network - may be a computer or a peripheral device
malicious software/malware
any program or set of program instructions that is designed to surreptitiously enter a computer and disrupt its normal operations. malicious software, including viruses, worms, and Trojan horses, is created and unleashed by individuals referred to as "hackers" or "crackers." (also called malware or malicious code)
note taking software
application software that enables users to enter typed text, handwritten comments, drawings, or sketches anywhere on a page
PIM
application software that includes appointment calendar, address book, and notepad (personal information manager)
megabyte (MB)
approximately one million bytes; a unit of measure for memory and storage apace
Ports listed in a Netstat report as LISTENING _____________.
are open and ready to accept incoming traffic
Signed ActiveX controls ________.
are safer than unsigned ActiveX controls
Storage
area where data can be left on a permanent basis when it is not immediately needed for processing
A router uses DHCP to ________.
assign IP addresses to workstations
Your cable Internet service uses DHCP to ________.
assign an IP address to any router that requests one
DFDs are commonly used by development teams that follow the ____________ approach to systems analysis and design.
b and c
John is considering getting a college degree in the IT field. He is confused about which degree he needs. Connie said she would help him by offering some guidance. John is interested in advancement opportunities when he graduates. Connie should advise him that it would be best to get at least a(n) ____ degree.
bachelor's
A(n) ________ set of DFDs exists when the data flows coming into and going out of a process at one level correspond to the those at the next level.
balanced
Data Processing
based on an input processing-output cycle
Data transmission speeds are typically expressed as ____.
bits
On a DFD, a(n) __________ process has inputs, but no outputs.
black hole
In the Visual Basic program editor, the command words are ______.
blue
After Microsoft's share of the total personal computer operating system market, the remaining share is taken up by ____.
both a and b
When installing a PC application, most ____ for new software are placed in the folder you specify.
both a and b
A mini-application that displays information on your desktop is a ____________________.
both a widget and a gadget
A laptop can ____.
both a. and b.
Hot plugging is allowed with what kind of devices?
both b and c
A ____ attack uses password-cracking software.
brute force
The term ____ is a technical term for the region of memory that holds data waiting to be transferred from one device to another.
buffer
___ includes several types of applications and technologies for acquiring, storing, analyzing, and providing access to information to help users make more sound business decisions.
business intelligence
Anonymous FTP
can be accessed by logging in without a password by using the user ID "anonymous"
Carpal tunnel syndrome is a condition whose effects are made worse by keyboard use. The accompanying figure represents a hand. Box C indicates the ____.
carpal bones
smartphones
cell phones with additional computing capabilities or the ability to access the Internet
A formula can contain ____ and mathematical operators.
cell references
The processor is also called the ___.
central processing unit (CPU)
Personal Computing
characterized by small, standalone computers powered by local software
The telephone system uses a technology called ____, which establishes a dedicated, private link between telephones for the duration of a call.
circuit switching
If you want the Stop button in a Visual Basic program to act as the Exit control, you would place the command End in the __________ event subroutine for the Stop button.
click
To sort the records displayed in an Access table you can _________.
click the column header for the field you want as the sort key
Anonymizer Tools
cloak a person's identity even make it possible to exercise freedom of speech in situation where reprisals might repress it
Before installing software, it is a good idea to ________.
close all applications
Which of the following Web-based applications is NOT sometimes characterized as Web 2.0?
cloud computing
Web 3.0
cloud computing and other new technologies are likely to further change the way we use the Web
Social Media
cloud-based applications design for social interaction and consumer-generated content
___ consists of a single copper wire surrounded by at least 3 layers.
coaxial cable
The first digital computers were built during World War II for ____.
code breaking
software suite
collection of individual programs available together as a unit
data
collection of unprocessed items which can include text, pictures, numbers, audio, or video
Embedded computers
components of larger products, devices that perform per-defined tasks using specially programmed processors
In some tables, the primary key consists of multiple fields called a ___.
composite key
Before sending a large attachment in an e-mail, you can use a(n) ____ to shrink it.
compression program
Data Mining
computer algorithms that analyze information to discover previously unknown and potentially useful information, including relationships and patterns
input devices
computer hardware used to enter data and instructions into a computer; examples include the keyboard, mouse, stylus, scanner, microphone, and digital camera
output devices
computer hardware used to retrieve processed data and information from a computer; examples include the monitor, printer, and speakers
system software
computer programs that help the computer carry out essential operating tasks, such as an operating system
portable computer
computer that is small and light enough to be carried from one place to another, including notebook computers, laptop computers, netbooks, and tablet computers
___ tools are designed to support one or more activities of system development.
computer-aided software engineering (CASE)
System software is designed to accomplish ____ tasks.
computer-centric
Flat File
consists of a single, two-dimensional table of data elements
Numeric Data
consists of numbers that can be used in arithmetic operations
Database Index
contains a list of keys, and each key provides a pointer to the record that contains the rest of the fields related to that key
Fixed-Length Field
contains a predetermined number of characters or bytes
Modem
contains circuitry that converts the data-carrying signals from your computer to signals that can travel over various communications channels
electronic storefront
contains product descriptions, graphics, and shopping cart.
Report Template
contains the outline or general specifications for a report
Field
contains the smallest unit of meaningful information
Defragmenting reorganizes the files on a disk so that they are located in ___ access time.
contiguous sections, which speeds
Buttons, icons, and menus are examples of ____________ that you can add to Visual Basic programs.
control
When using a VDE, a ____ is a screen-based object whose behavior can be defined by the programmer.
control
The ___ is the component of the processor that directs and coordinates most of the operations in the computer.
control unit
user interface
controls how you enter data and instructions and how information is displayed on the screen
Voiceband Modem
converts the signals from your computer into audible analog signals that can travel over telephone lines
Cable Modem
converts your computer's signal into one that can travel over the CATV network
Jessica likes to participate in B2C e-commerce, but recently has had a number of friends who have had problems shopping online. She wonders if it is safe to shop online and just how much she is compromising her privacy by doing so. Jessica is justifiably worried about the security of the personal information and credit card information she regularly supplies while shopping on the Web. In addition, she knows that merchants who market goods and services over the Internet sometimes secretly gather information and provide it to advertisers or other interested parties. As Jessica begins her research of just how shopping carts work, she is surprised to find that many e-commerce sites store information about her Web visits on her hard drive. What do these sites use to store visit information?
cookies
Many images on Web sites are __________.
copyrighted
In the broadest definition, a(n) ____ is a collection of information.
database
Jane works for a successful business that publishes a popular monthly magazine. She is responsible for ensuring that the business has the correct information systems in place to allow the business to operate efficiently and effectively. Jane knows she must implement a step-by-step plan that describes the methods her business will use to secure data against disaster and the guidelines that will be used to recover lost data if a disaster occurs. She will have to create a(n) ____.
disaster recovery plan
When you try to connect to a site that might be fraudulent, browsers such as Internet Explorer and Firefox _____.
display a red address bar
A(n) ___, which is an external device that attaches to a mobile computer or device, contains a power connection and provides connections to peripherals; it usually also includes slots for memory cards, optical disc drives, and other devices.
docking station
___ software provides means for sharing, distributing, and searching through documents by converting them into a format that can be viewed by any user.
document management
Paul decided to upgrade his computer system. He purchased a new optical disc drive to replace his old CD-ROM drive. He has decided to replace his old CRT display device and already upgraded his graphics card to support a more modern display device. He also plans to purchase a new printer to replace his old dot-matrix printer. What should Paul look for in a display device as a measure of image clarity?
dot pitch
Ink-jet printer resolution is measured by the number of ___ a printer can print.
dots per inch (DPI)
One way to open an application is to ________.
double-click its icon on the Windows desktop
The rate of data arriving at your computer is ____.
downstream speed
A(n) ____ printer can print on both sides of the paper.
duplex
The ____ Web publishing process generates customized Web pages as needed.
dynamic
Asynchronous Communications
e-mail form of communication
surge protector
electrical device inserted in a power line to protect equipment from sudden fluctuations in current
Microprocessor
electronic component that can be programmed to perform tasks based on data it receives
memory
electronic components in a computer that store instructions waiting to be executed and data needed by those instructions
computer
electronic device operating under the control of instructions stored on its own memory, that can accept data process data according to specific rules produce results and store results for future use
mobile devices
electronic devices that fit into the palm of your hand, such as personal digital assistants (PDAs), calculators, smart phones and other cell phones, electronic organizers, and handheld games
phishing
email that masquerades as an authentic entity such as a bank or credit card company, requesting confidential information
The significance of ____ data is that it cannot be intercepted by corporate spies or government censors.
encrypted
Wireless ____ scrambles the data transmitted between wireless devices and then unscrambles the data only on devices that have a valid key.
encryption
A(n) ___ is a programmed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.
encryption key
A(n) ____ media player is a handheld device designed for playing music and videos, which offers a camera, access to the Internet, and a variety of apps.
enhanced
Many large companies use the word(s), ___, to refer to the huge network of computers that meets their diverse computing needs.
enterprise computing
A(n) ___ has a design that reduces the chance of wrist and hand injuries.
ergonomic keyboard
In the Visual Basic environment, clicking a button and pressing a key are examples of ________.
events
Unstructured File
every document has a unique structure and contains different kinds of data
As a manager, you are responsible for managing inventory. Every month you receive a low inventory report that lists stock items that have fallen below a minimum reorder point. This report is a type of ____.
exception report
You can compile your Visual Basic programs into _______ code so that people can run the program without the Visual Basic VDE.
executable code
In order to become more efficient, your company has restructured its management team. You are to convey these changes to the rest of the company. Amanda Roberts is now in charge of planning the organization's long-range goals for profitability, market share, and membership levels. She is now a(n) ____.
executive manager
Some information systems store or provide access to ____ generated by sources outside the organization.
external information
___ is a team-driven project management approach, in which a project leader is more of a participant and facilitator than a manager during the project.
extreme project management
In the accompanying figure, the items marked C represent ____.
fields
Real Data Type
fields that contain numbers with decimal places: prices, percentages, etc.
In the accompanying figure, mp3 is an example of a ____.
file extension
___ procedures include adding records to, modifying records in, and deleting records from a file.
file maintenance
In the accompanying figure, Marley One Love is an example of a ____.
file name
BitTorrent
file sharing protocol that distributes the role of a file server across a collection of dispersed computers
A computer file's location is defined by a ____.
file specification
Biometrics
fingerprint, facial features, or a retinal pattern
ROM chips, called ___, contain permanently written data, instructions, or information.
firmware
___ is a technology that sends resistance to a device in response to actions of the user.
force feedback
In the Mac OS, the data ____ contains data or the commands for a program.
fork
Files maintained by the Macintosh operating system can have two parts, called ____.
forks
In Access a(n) __________ displays one record at a time, similar to a Rolodex or card file.
form
In the world of Visual Basic a(n) _________ is a window in which a program runs.
form
When you start to create a program using Visual Basic, a fully-functional _______ is created for you.
form
A field ____ is a template that adds the correct formatting as data is entered.
format
Computers characterized by their use of microprocessors are ____-generation.
fourth
A(n) ___ is part of the motherboard and connects the processor to main memory.
front side bus
A(n) ____ system backup includes a copy of every file stored on your computer's hard drive. In addition to data files, it includes copies of all installed programs, settings, and the operating system.
full
The paragraph style that is used to assure paragraphs are aligned evenly on both the right and left is ____.
fully justified
With ___, the computer will detect human motions.
gesture recognition
Internet
global computer network originally developed as a military project and was then handed over to the National Science Foundation for research and academic use
If an application does not have its own uninstall routine, you can ________.
go to the Control Panel and look for the "Uninstall a program" link
Architects, mapmakers, designers, artists, and home users create drawings and sketches on a ___.
graphics tablet
Two devices on a network might have to negotiate their communications protocols through a process called ____.
handshaking
biometric device
hardware device used to support authentication; works by scanning and remembering a unique aspect of a user's various body parts (e.g., retina, iris, face or fingerprint) by using some form of sensing device such as a retinal scanner.
Physical access controls, such as locked doors and windows, usually are adequate to protect against ___.
hardware theft
firewalls
hardware, software, or both designed to prevent unauthorized persons from accessing electronic information
Normalization
helps database designers create a database structure that minimizes storage space and increases processing efficiency
Dictionary Attack
helps hackers guess a password by stepping through a dictionary containing thousands of the most commonly used passwords
System Software
helps the computer system monitor itself in order to function efficiently
C, BASIC, COBOL, and Java are examples of ____ programming languages.
high-level
All of the following are essential for secure business data transmitted over the Internet EXCEPT ____.
high-speed connections
To type the symbols marked on the tops of the number keys, you have to ________.
hold down the Shift key
System Board
houses all essential chips and provides connecting circuitry between them
___ are devices that provide a common central connection point for nodes on the network.
hubs and switches
Big Data
huge collections of data that are difficult to process, analyze, and manage using conventional database tools
___ combines text-based links with graphic, audio, and video links.
hypermedia
The primary disadvantage of multifunction peripherals is that ___.
if the multifunction peripherals break down, all functions are lost
home page
in a Web site, the page that is the first page you see when you go to the site. On an individual computer, the Web page that a browser opens each time it is started
server
in a client/server network, the computer that manages shared network resources and provides access to the client computer when requested
client
in a client/server network, this is the computer most people interact with to request information from the server and to perform many of the tasks that con be accomplished with a computer
screen (or window)
in a graphical user interface, the rectangular box that contains the program displayed on the monitor
Patches can be supplied as complete files or as ____ code segments.
in-line
If a single data management tool can be used to maintain many different files and databases, it must support data ____.
independence
When you enter search criteria, instead of looking through every file and folder on the storage medium, the search utility looks through the ___ first to find a match.
index
Search engine ____ software is designed to pull keywords from a Web page and store them in a database.
indexer
Data becomes ____ when it is presented in a format that people can understand and use.
information
John is considering getting a college degree in the IT field. He is confused about which degree he needs. Connie said she would help him by offering some guidance. John is also interested in the application of computers to business processes. If he wants to focus on computer equipment and software used by businesses and organizations, Connie should advise him to major in ____.
information technology
scanner
input device used to convert hard copy documents or images into digital files
joysticks
input devices used to control actions and movements within computer games
microphones
input devices used to digitally record sound
In the accompanying figure, B represents ____.
input or output
A(n) ___ message is a real-time Internet communication, where you exchange messages with other connected users.
instant
Sniffing
intercepts information sent out over computer networks
central processing unit
interprets and carries out instructions that operate a computer
processor
interprets and carries out the basic instructions that operate a computer
green computing
involves reducing the environmental waste generated when using a computer
back door
is a hidden method for bypassing normal computer authentication systems
Every wireless router ________.
is shipped with the same default settings, so you have to configure it for your network
Jimmy recently graduated and is looking for his first full-time job. He has turned to you for help. Jimmy knows you recently graduated and got a new job. He thinks you can give him some advice to help with his search. You tell Jimmy that the elements of an effective resume include ____.
it should be easy to read
The strengths of Mac OS do NOT include ____.
its use of resource forks
iPads, iPhones, and iPods are only allowed to download apps from the iTunes App Store, and while apps are available from other sources, using them requires an unauthorized change to the device's software called a(n) ____.
jailbreak
spam
junk or unsolicited e-mail
1,024 bytes is a ____.
kilobyte
In the accompanying figure, the item marked B is a(n) ____.
label
Initially sales were slow for the personal computer because of ____.
lack of software
Satellite data transport is subject to ____ delays of one second or more, which occur as your data is routed between your computer and a satellite that orbits 22,200 miles above the Earth.
latency
A(n) ___ is an information system that has existed within the organization for an extended length of time and is relied upon heavily.
legacy system
All of the following are strengths of the database approach except ___.
less complexity
The Custom Level button in Internet Explorer's dialog box ___________.
lets you adjust specific settings for each security level, such as overriding the setting that blocks unsigned ActiveX controls
Examples of output that primarily contain text-based documents are ___.
letters, reports, and e-mail messages
___ technology works with specially coated optical disks to etch labels directly on the disk.
lightscribe
The hand icon shown in the accompanying figure is pointing to a ____.
link
Always-On Connection
linked to your ISP and is online whenever your computer and modem are on, even if you are not actively accessing the Internet
Fixed Internet Access
links your computer to an USP from a stationary point, such as a wall socket or roof-mounted antenna
Web site
location on the World Wide Web that contains information relating to specific topics
A ____ error occurs when a program fails to perform as intended due to an error in the design of the program.
logic
Traditionally, hard disks stored data using ___, which aligned the magnetic particles horizontally around the surface of the disk.
longitudinal recording
Hard disk storage technology can be classified as ____ storage.
magnetic
A ___ card is a credit card, entertainment card, bank card, or other similar cards, with a stripe that contains information identifying you and the card.
magnetic stripe
The computer begins executing a Java program by locating a standard method called ____.
main()
Network Service Providers (NSPs)
maintain backbone links (for example: AT&T, Sprint, Hurricane Electric, etc.)
virus
malicious code or program, usually installed on a computer without the user's knowledge or permission
In order to become more efficient, your company has restructured its management team. You are to convey these changes to the rest of the company. Due to the reorganization, Joe Smith will now supervise other employees, approve new products, and authorize new construction. Joe Smith is now a(n) ____.
manager
packaged software
mass produced copyrighted retail software that meets the needs of a wide variety of users
cloud
mass storage for programs and data on remote computers connected to the Internet or other network
Supercomputers use ___ for applications such as artificial intelligence and weather forecasting.
massively parallel processing
permanent memory
memory used by storage devices to retain data and information
In an e-mail message, such as the one found in the accompanying figure, the recipient's e-mail address and the message subject are found in the ____.
message header
A ___ is a website that allows users to post short text updates, usually between 100 and 200 characters.
microblog
An electronic component that can be programmed to perform tasks is a ____.
microprocessor
Data ____ refers to computer algorithms that analyze information to discover previously unknown and potentially useful information.
mining
___ is a service that provides television programs over the cellular network.
mobile TV
digital camera
mobile device that allows users to take pictures and stores the photographed images digitally, instead of on traditional film
A ____ bitmap would be displayed by manipulating the pattern of "off" and "on" pixels displayed on the screen.
monochrome
The last topic in the lab covered ________.
moving and copying
A processor that includes circuitry for two or more processing units is called a ____ processor.
multi-core
Touch screens that recognize multiple points of contact at the same time are known as ___.
multi-touch
___ allows users to record, compose, mix, and edit music and sounds.
music production software
___ is the code of acceptable behaviors users should follow while on the Internet.
netiquette
Grid Computing System
network of computers harnessed together to perform processing tasks
Text Data Type
normally assigned to fixed-length fields that hold character data: names, titles, etc.
Harry is concerned about Internet security. He knows very little about the subject but does know it has been in the news a great deal lately. He needs your advice. You and Harry are discussing firewalls. You explain that he has a firewall built into Windows. He says he has one that came with his virus protection. He should ____.
not enable the Windows firewall if his antivirus software firewall is activated
When starting a ________ computer, a single power button usually activates everything including the screen display.
notebook
To get maximum exposure for your resume in an online job database, you should focus on ____.
nouns
A(n) ____ is a unit of data that represents an abstraction or a real-world entity such as person, place, or thing.
object
Agnes is talking with Bert and Ernesto, and they are discussing object-oriented programming. Agnes is asking some detailed questions that Bert and Ernesto can't answer. You agree to help answer the questions. Ernesto then wants to know what you call a single instance of an entity, and you tell him that it is a(n) ____.
object
A(n) ____ paradigm is based on the idea that the solution for a program can be visualized in terms of objects that interact with each other.
object-oriented
FTP Client
offers an easy-to-use interface for accessing FTP servers
Routable IP Address
on that can be accessed by packets on the Internet
You should organize your tables so that the fields you use most frequently are ________.
on the left side of the data table
Chat
one-on-one messaging and group communications
Instant Messaging
one-on-one messaging referred to as chat
Web sites that offer storage space for backups are called ____ backup services.
online
OLAP
online analytical processing; a data analysis techniques that allows decision makers to quickly get answers to complex queries that encompass multiple factors, such as locations, revenue, time periods, and employee status
___ is the electronic equivalent of a user manual.
online help
The ____ in machine language is a command word for an operation such as add, compare, or jump.
op code
A shrink-wrap license goes into effect as soon as you ____.
open it
A(n) ___ is a type of storage media that consists of a flat, round, portable disk made of metal, plastic, and lacquer that is written and read by a laser.
optical disk
A(n) ____ is a group of people working together to accomplish a goal.
organization
Dimensional Database
organizes relationships over three or more dimensions
speakers
output devices that allow the user to hear any auditory signals the computer sends
multimedia projectors
output devices used to display information on a screen for veiwing by an audience
___ is a mass-produced, copyrighted retail software that meets the needs of a wide variety of users, not just a single user or company.
packaged software
The accompanying figure represents a CRT; in this drawing Box A points to the ____.
panel glass
Voice-overs and narrations are often recorded with a sampling rate of 11 KHz, which means that 11,000 samples are taken ____.
per second
As with an IP address, the components of a domain name are seperated by ___.
periods
nonvolatile
permanent storage, as in read only memory (ROM); data remains even when power is shut down
Static IP Address
permanently assigned IP address
___ helps home and small business users create newsletters, brochures, advertisements, postcards, greeting cards, letterhead, business cards, banners, calendars, logos, and web pages.
personal DTP software
A(n) ____ is a microprocessor-based computing device designed to meet the computing needs of an individual.
personal computer
A(n) ___ is a program that warns or blocks you from potentially fraudulent or suspicious websites.
phishing filter
Joseph is working in a modern office with speech recognition equipment, including a computer that is capable of both understanding and producing sounds resembling spoken words. His first step is to train the computer to recognize his speaking style, taking into account his accent, pronunciation, and idiomatic expressions. "Reh" and "gay" are examples of ____ that speech synthesizers string together to form words.
phonemes
With ___, you can view, organize, sort, catalog, print, and share digital photos.
photo management software
A ___ is a specific type of social networking website that allows users to create an online photo album and store and share their digital photos.
photo sharing community
A technology called ____ allows the processor to begin executing another instruction before it completes the previous instruction.
pipelining
All of the following factors contribute to bitmap image size EXCEPT ______.
pixelation
The dots that make up a bitmap are referred to as ______.
pixels
You have been hired to create an information system for the TeaTime Tea House. You have met with the owner of the company to get a general idea of what they need and have decided to use the modified waterfall SDLC model. The first phase of the SDLC is ____.
planning
A ___ is recorded audio stored on a website that can be downloaded to a computer or portable media player.
podcast
linux
popular multitasking UNIX type operating system
A(n) ___ is an external device that provides connections to peripherals through ports built into the device.
port replicator
A(n) ______________ is an automated software utility that monitors a network looking for computers that are vulnerable to unauthorized intrusions.
port scanner
flash memory
portable, nonvolatile memory, that uses electronic, solid-state circuitry
Network services such as the Web, ftp, and e-mail operate from ____.
ports
A ____ is a sudden increase or spike in electrical energy, affecting the current that flows to electrical outlets.
power surge
Some organizations continually review their ___, which is a ratio that measures how much power enters the computer facility, or data center, against the amount of power required to run the computers.
power usage effectiveness (PUE)
Some phones use ___, where you press one key on the keypad for each letter in a word and software on the phone predicts the word you want.
predictive text input
DSL Filter
prevents voiceband signals from interfering with DSL signals
TCP/IP
primary protocol suite responsible for message transmission on the Internet
Many organizations adopt the ___ policy, where users access privileges are limited to the lowest level necessary to preform the tasks.
principle of least interest
The use of automated software to locate computers that are vulnerable to unauthorized access is a port ____.
probe
The traditional approach to programming uses a(n) ____ paradigm.
procedural
On a DFD, the label "Acquire new books" would appear on a(n) ________.
process
Digitization
process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices
On a DFD, explosions only take place within _________.
processes
A(n) ________ is similar to a word processor, but includes features that streamline many programming tasks.
program editor
system software
program that controls or maintains the operation of a computer or its software
search engine
program that uses keywords to find information on the Internet and return a list of relevant documents
Application software
programs with which you accomplish tasks such as word processing, photo editing, or sending e-mail, and use the computer in a productive manner
___ allows a user to plan, schedule, track, and analyze the events, resources, and costs of a project.
project management software
In larger organizations, users write a formal request for a new or modified information system, which is called a ___.
project request
___________ define the appearance of controls and the actions that controls are supposed to perform when a program runs.
properties
Cloud Computing
provides access to information, applications, communications, and storage over the internet
online service provider
provides connection and a lot of unique services like its own version of a web browser
Solid state storage, also called flash memory storage, ____.
provides fairly fast access to data
A document management system ___.
provides for storage and management of a company's documents
Using statistical analysis, ___ can identify and predict product defects and problems with the company's processes.
quality control software
A search engine's ____ looks for your search terms in the search engine's indexed database and returns a list of relevant Web sites.
query processor
software parches
quick software fixes provided to resolve an error found in program code until a sofeware update can be issued
RFID is a technology that uses ___ to communicate with a tag placed in or attached to an object, animal, or person.
radio signals
When using word processing software to analyze the reading level of your document, you should use a ____.
readability formula
Mobile Broadband
real Internet, cellular service providers offer data services
Application software is designed to accomplish ____ tasks.
real-world
ICANN (Internet Corporation for Assigned Names and Numbers)
recognized by the US and other governments as the global organization that coordinates technical management of the Internet's Domain Name System
In the accompanying figure, the index card represents a single database ____.
record
Traceroute
records a packet's path in addition to its round-trip speed
A centralized approach to information systems usually ___ manageability.
reduces costs of maintenance and increases
The goal of normalization is to minimize data ____.
redundancy
Sally has been using spreadsheets in making purchasing decisions at her job. She is getting a promotion, and has been asked to train James as her replacement. James has never used a spreadsheet. Sally tells James that if he wants the cell reference to automatically change when moved or copied, he should use a(n) ____ reference.
relative
Computer systems are ____ when they can be counted on to function correctly.
reliable
FTP Server
resides on a computer containing file that remote users might want to access
An image composed of a grid of 480 horizontal dots and 200 vertical dots has a(n) ______ of 480 x 200.
resolution
warmboot
restart your system without having to turn off the power.
The first topic in the lab focuses on ________.
restore points
The last topic in the lab is about ________.
restoring data from a backup
The accompanying figure represents a virtual private network. In this figure, B points to a(n) ____.
router
When viewing a database table, each record is represented by one ______.
row
Users subscribe to a cloud storage service to ___.
save time by storing large files instantaneously, allow others to access their files, and store offsite backups of data
Windows can be configured to display a(n) ________ after a specified period of inactivity.
screensaver
utility
segment of memory or storage i n which items are placed while waiting to be transferred from an input or output device
Semiconducting Materials
semiconductors, or silicon and germanium, are substances with properties between those of a conductor and an insulator
Ping (Packets Internet Groper)
sends a signal to a specific Internet address and waits for a reply
A ____ control structure changes the order in which instructions are carried out by directing the computer to execute an instruction elsewhere in the program.
sequence
During ____ execution, the first instruction in the program is executed first, followed by the second.
sequential
Database ____ software is designed to manage billions of records and several hundred transactions per second.
server
Systems exhibit ____ when they are easily upgraded or repaired.
serviceability
As related to the use of computers, ___ is defines as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
social engineering
spyware
software designed to capture personal and confidential information that resides on a computer and then sends it elsewhere
spam filter
software that automatically routes advertisements and other junk mail to the Deleted Items folder maintained by your email client; can be effective for blocking unwanted emails
Tom and Andy are discussing file storage. They are working on a major project and want to be sure they can store their files in a way so they can easily be found and shared with others. Tom asked Andy if he converts a file, will it be identical to the original? Andy should tell him ____.
sometimes
A table's ____ order is the order in which records are stored on disk.
sort
The human-readable version of a program is called ____.
source code
sound system
speakers and a circuit board (sound card) used to create high-quality music, narration, and sound effects using a computer
control keys
special keys, such as Ctrl, Alt, or Esc, used to increase keyboard functionality or provide shortcuts
If you have dialed Directory Assistance lately to obtain a telephone number, you have probably encountered ____.
speech recognition
Using an index _______________.
speeds up searching and sorting operations
In the threat model STRIDE, the S stands for ____ or pretending to be someone else.
spoofing
A(n) ____ strip monitors the electrical current that passes from the outlet to all the devices plugged into the strip.
surge
A ____ is a network device that intelligently facilitates communication among multiple devices on a network.
switch
Data
symbols that represent facts, objects, and ideas
In ____ key encryption, the key used to encrypt a message is also used to decrypt the message.
symmetric
A ____ error occurs when an instruction does not follow the grammar of the programming language.
syntax
The purpose of the ___ is to assess the feasibility of each alternative solution and then recommend the most feasible solution for the project.
system proposal
___ consists of the programs that control or maintain the operations of the computer and its devices.
system software
operating system (OS)
system software that controls the computer's use of its hardware resources, such as memory and disk storage space
operating system (OS)
system software that controls the way in which a computer system functions, including the management of hardware, peripherals, and software; Microsoft Windows XP is an operating system
The ____ is the case that holds the computer's main circuit boards, microprocessor, memory, power supply, and storage devices.
system unit
Using Access, you can create a report to display data from a(n) ________.
table or query
According to the video "What is a relational database?", within the database, we can organize the data into storage containers called ________.
tables
On larger computers, tape cartridges are mounted in a separate cabinet called a(n) ___.
tape library
A manufacturing ____ participates in the fabrication of computer chips, circuit boards, system units, or peripheral devices.
technician
digital technology
technologies that work using digital electronics such as computers, communications networks, the Web, and digitization
VoIP (Voice Over Internet Protocol)
technology in which a broadband Internet connection is used to place telephone calls instead of the regular phone system
liquid crystal display (LCD)
technology used in flat panel monitors, resulting in thinner and lighter monitors
Voice Over Internet Protocol (VoIP)
technology used to send and receive voice conversations over the Internet (also called Internet telephony)
Dynamic IP Address
temporarily assigned IP address
volatile
temporary storage, as in random access memory (RAM): data is erased when power is shut down or when you close a program
The ____ data type would be appropriate for a fixed-length field designed to hold a person's name.
text
domain name
text version of an IP address
Analog Data
text, numbers, graphics, sound, and video that are represented using an infinite scale of values
Digital Data
text, numbers, graphics, sound, and video that have been inverted into discrete digits such as 0s and 1s
Sally often travels for her business. She needs a way to access the Internet while away from home. She has come to you for help. Sally has heard that cellular data service has poor quality. You tell her ____.
that it depends on the generation of technology being used
input
the act of entering data into a computer
hardware theft
the act of stealing computer equipment
double-click
the action of clicking the left mouse button twice in rapid succession while keeping the mouse still
right-click
the action of clicking the right mouse button
drag
the action of moving something from one location on the screen to another; the action of dragging includes releasing the mouse button at the desired time or location
multi-task
the action of performing more than one task at the same time
Data Redundancy
the amount of data that is duplicated in a database
Database Structure
the arrangement of fields
memory
the computer circuitry that holds data waiting to be processed, stored, or output
Microcomputer
the computer most users are familiar with, ranging in size from large desktop systems to handheld devices
The top-level DFD is referred to as the __________.
the context DFD
information processing cycle
the cycle composed of the four basic computer functions: input, process, output, storage
dot pitch
the diagonal distance between adjacent pixels, measured in millimeter
Latency
the elapsed time for data to make a round trip from point A to point B and back to point A
hardware
the electronic and mechanical devices in a computer system
supercomputer
the fastest and most expensive type of computer. At the time it is built, one of the fastest computers in the world; can tackle tasks that would not be practical for other computers such as breaking codes and modeling worldwide weather systems
user interface
the feature of a computer operating system that enable you to interact
Data Representation
the form in which data is stored, processed, and transmitted
link
the fundamental tool for navigating Web pages; you click a text or graphic link to jump to a location in the same Web page, open a different Web page, or go to a different Web site (also called hyperlink)
keyboard
the hardware device used to input typed data and commands into a computer
computer system
the hardware, peripheral devices, and software working together to input data, process data, store data, and produce output
input
the information that is conveyed to a computer
program
the instructions that tell a computer how to perform a specific task such as word processing, graphics, or email (also called application software or software)
software
the instructions that tell a computer how to perform tasks, such as system software and application software
information processing cycle
the interactions of humans and computers that consist of input, processing, output, and storage.
function key
the keys numbers F1 through F12, located above the numeric key on a keyboard that have different functions depending upon the software program in use
network topology
the layout and structure of a computer network
display device
the main output device for a computer; presents visual information on a screen such as a computer monitor
processing
the manipulation of data (symbols that represent facts, objects, and ideas) using a systematic series of actions
Operating System
the master controller for all the activities that take place within a computer
resolution
the measurement used to assess the clarity of an image on a monitor; determined by pixel density
hardware
the mechanical, magnetic, electronic, and electrical components making up a computer system
Cardinality
the number of associations that can exist between two record types
Processor speed is typically measured by ________.
the number of mathematical operations that can be carried out per second
Mac OS
the operating system designed specifically for Apple's Mac computers
Microsoft Windows
the operating system found on most microcomputers
Sort Order
the order in which records are stored on a disk
floppy disk drives (or floppy drive
the original storage device for a microcomputer, which enables portable, permanent storage on floppy disk
control unit
the part of the CPU responsible for obtaining instructions from the compute's memory; the control unit interprets the instructions and executes them, thereby coordinating the activities of all the other computer components
Central processing unit (CPU)
the part of the computer responsible for controlling all the commands and tasks that computer performs, acting as the brain of the computer
hardware
the physical components of the computer and any equipment connected to it
storage medium
the physical material used to store computer data, such as a flash drive, a hard drive, USB flash drive, or an optical disc
Download
the process of copying a file from a server to your own client computer
Upload
the process of copying files from your client computer to a server
burn
the process of recording data to optical media such as a CD or DVD
boot
the process of starting up a computer
boot process
the process of starting up a computer
uploading
the process of transferring files from your computer to a server on the internet.
Network Address Translation (NAT)
the process your router uses to keep track of packets and their corresponding private or public IP addresses
Downstream Speed
the rate of data downloaded to your computer
Upstream Speed
the rate of data that is uploaded from your computer to the Internet
output
the results produced by a computer (for example, reports, graphs, documents, pictures, and music)
refresh rate
the speed at which the pixels are re-illuminated, measured in cycles per second and expressed as hertz (Hz)
system software
the st of programs that enable a computer's hardware devices and program software to work together; it includes the operating system and utility programs
Record Type
the template for a record
enterprise computing
the term large companies use to refer to the use of huge network computers that meets their diverse computing needs
system unit
the tower, box or console that contains the critical hardware and electrical components of a computer
A vacuum tube can have ____ state(s).
two
In the SQL query in the accompanying figure, ____ tables will be accessed.
two
ink-jet
type of printer that uses a special nozzle and ink cartridges to distribute liquid ink on the surface of the paper
spam
unwanted electronic junk mail that arrives in your Inbox
___ is the process of transferring documents, graphics, and other objects from your computer to a server on the internet.
uploading
Case Sensitive Database
uppercase letters are not equivalent to their lowercase counterparts
Nancy has several types of video media originating from a variety of devices, including an analog video camera, a DVR (digital video recorder), and a TV. She also has video-editing software installed on her computer. Nancy is using codec software to reduce the size of some of her video files by allowing her to specify a compression ratio or bitrate. If she is very concerned with minimizing the size of her video files, she could ____.
use a high compression ratio
Ethernet networks ____.
use a nonproprietary technology, making Ethernet equipment available from a variety of vendors
To select five files that are not listed in sequence, ________.
use the Ctrl key
Integer Data Type
used for fields that contain whole numbers: quantities, repetitious, ranking, etc.
The type of system software designed to help you monitor and configure settings for your computer system equipment is ____ software.
utility
image veiwer
utility program that allows users o display, copy, and print the contents of a graphics file
In the accompanying figure, the item marked C is a(n) ____.
value
The process of converting analog video signals into a digital format is referred to as ____.
video capture
VMWare and Parallels Desktop software are examples of ____.
virtual machine software
If a program exceeds its allocated space, the operating system uses an area of the hard disk called ____ to store parts of a program or data file until they are needed.
virtual memory
With ___, users can view message details such as the length of calls and in some cases, read message contents instead of listening to them.
visual voicemail
___ is the computers capability of distinguishing spoken words.
voice recognition
Blog
web log or an online diary that is maintained by a person, company, or organization, and contains a series of entries on one or more topics
sectors
wedge-shaped sections of a hard disk drive, each measured from the center point to the outer edge
ROM BIOS is a small set of instructions that tells the computer all of the following EXCEPT ____.
what the data transfer rate should be
Spreadsheets are particularly useful for ____.
what-if analysis
Input
whatever is typed, submitted, or transmitted to a computer system
Identity Theft
when someone gains unauthorized access to your personal data and uses it illegally
Web 2.0
wikis, blogs, social networking
___ is a utility that detects and protects a personal computer from unauthorized intrusions.
windows firewall
Windows users can increase the size of memory through ___, which can allocate available storage space on removable flash memory devices as additional memory cache.
windows ready boost
3-D graphics software provides a set of tools for creating ____ that represent three-dimensional objects.
wireframes
bluetooth
wireless technology that uses radio waves to transmit data over short distances, and often used with mobile devices
An example of software most commonly associated with productivity software is ____.
word processing software
Data
words, numbers, sounds, or pictures that represent facts about people, events, things, or ideas
A slide rule is constructed of two ruler like bars that contain numeric scales.
False
A storage device that directly connects to a network is called network peripheral storage.
False
A ____ combines commercially available products with specialty hardware or software.
VAR
A small graphic for a Web page might have a(n) color depth of 150 x 100 pixels—150 pixels across and 100 pixels high.
False
A file extension is always the same as a file format.
False
A keyboard is an example of a pointing device.
False
A light switch is like a(n) analog device.
False
A scanner, like the one featured in the accompanying figure, creates a vector graphic.
False
A security package integrates several security modules to protect against malware.
False
workstation
(1) A computer connected to a local area network. (2) A powerful desktop computer designed for specific tasks.
____ networks contain servers as well as computers that individual users access and use. A. Client/server B. Peer-to-peer C. Switch D. CSMA/CD
A. Client/server
Megabyte
1,048,576 bytes (MB or MByte)
Which cable type is the most costly to install? A) Fiber-optic B) Twisted-pair C) ThinNet coaxial D) ThickNet coaxial
A) Fiber-optic
________ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table. A) Referential integrity B) Normalization C) Database consistency D) Record integrity
A) Referential integrity
________ databases are the most frequently used electronic databases. A) Relational B) Flat-file C) Multidimensional D) Object-oriented
A) Relational
A(n) ________ check determines whether a required field such as LastName was filled in. A) completeness B) range C) consistency D) alphabetic
A) completeness
A ________ is a group of related data that can be stored, sorted, organized, and queried. A) database B) spreadsheet C) memo D) macro
A) database
You can set a ________, which is automatically displayed in a field unless the user enters something different. A) default value B) relation C) field type D) numeric check
A) default value
A(n) ________ server is a server that stores and manages files for network users. A) file B) e-mail C) print D) database
A) file
A ________ topology is created when more than one topology is used to build a network. A) hybrid B) multiple-use C) fusion D) crossover
A) hybrid
FBI-related scams involve ________. A) people pretending to represent official organizations B) running auctions that do not exist C) convincing people to send money as a "good faith" gesture D) collecting funds and not delivering the goods
A) people pretending to represent official organizations
A(n) ________ is the portion of virus code that is unique to a particular computer virus. A) virus signature B) encryption code C) compression code D) virus pattern
A) virus signature
A(n) ________ takes advantage of file transport methods to spread on its own. A) worm B) script virus C) encryption virus D) macro virus
A) worm
In a relational database, what is a relationship? A. A link between tables that defines how the data are related B. The primary key in the database C. The links among databases D. The array of tables in a database
A. A link between tables that defines how the data are related
Which of the following is NOT a factor to consider when selecting network cabling? A. Cable diameter B. Interference C. Maximum run length D. Bandwidth
A. Cable diameter
) CAPTCHA stands for ________. A) Completely Amazing Public Turing Test to Tell Computers and Humans Apart B) Completely Automated Private Turing Trial to Tell Computers and Humans Apart C) Completely Automated Public Turing Test to Tell Computers and Humans Apart D) Complete Automated Public Turing Trial to Tell Computers and Humans Apart
C) Completely Automated Public Turing Test to Tell Computers and Humans Apart
The Internet Crime Complaint Center (IC3) is a partnership between the ________. A) FBI and local police departments B) FBI and National Defense Department C) FBI and National White Collar Crime Center D) National White Collar Crime Center and U.S. Department of Defense
C) FBI and National White Collar Crime Center
Which of the following classifications of viruses can change its own code to avoid detection? A) Stealth B) Multipartite C) Polymorphic D) Worm
C) Polymorphic
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. A) Black-hat B) Gray-hat C) White-hat D) Green-hat
C) White-hat
A ________ check compares the values of data in two or more fields to see whether those values are reasonable. A) correctness B) range C) consistency D) numeric
C) consistency
Attributes
Characteristics or properties about the entity (name, address) that make them different from one another.
Make vs Buy
Choice of building an application in-house versus buying an off-the-shelf alternative.
____ computing depends on a grid of servers, storage devices, and protocols that offer Internet-accessible computing services ranging from consumer-level media sharing to office productivity applications and complex corporate data processing.
Cloud
How do restore points affect your data files?
Data files are not affected by restore points.
Which of the following job banks focus ont eh computer and IT industries?
Datamasters
Structured vs Unstructured Decisions
Decisions that can be made by following an agreed upon process are structured, while those that are rare, or have no well understood process are unstructured.
Charlie is worried about something happening to his data. He uses it all the time in his business, and if something were to happen to it, he might lose his business. He has come to you for some answers on how to secure his data files and protect this resource. Which of the following is NOT a true statement you can make to Charlie?
Even if you lose your encryption key, you can still access and use encrypted data.
A set of machine language instructions for a program is called source code.
False
The first commercial microcomputer was the ____.
MITS Altair
____ is used by most of today's personal computers because it is fast and relatively inexpensive.
SDRAM
personal finance software
Simplified accounting program that helps home users or small office/home office users manage finances.
Business Benefits of BI
Single point of access to current information for all users, across all departments for quantifiable & intangible benefits
antivirus software
Software specifically designed to detect viruses and protect a computer and files from harm.
At the ACME Widget Company, the computers have started behaving weirdly. Chris noticed that his directory had some files that he didn't remember putting on his computer. Lesley noticed her computer was beginning to run very slowly, and Kim realized she was getting replies to emails she had not sent. The owner of the ACME Widget Company has contacted you to see if their company might have a computer security problem. Another possibility is that ACME Widget Company has a ____ that seems to perform one function while actually doing something else.
Trojan horse
A class attribute defines the characteristics of a set of objects.
True
Jessica likes to participate in B2C e-commerce, but recently has had a number of friends who have had problems shopping online. She wonders if it is safe to shop online and just how much she is compromising her privacy by doing so. Jessica is justifiably worried about the security of the personal information and credit card information she regularly supplies while shopping on the Web. In addition, she knows that merchants who market goods and services over the Internet sometimes secretly gather information and provide it to advertisers or other interested parties. Jessica has an always-on connection to the Internet. She has read about IP addresses and knows that some Web sites can track them. She would like to surf the Internet anonymously to protect her privacy. How can she do this?
Use an anonymous proxy service
personal firewall
Utility program that detects and protects a personal computer from unauthorized intrusions.
uninstaller
Utility program that removes a program, as well as any associated entries in the system files.
disk defragmenter
Utility that reorganizes the files and unused space on a computer's hard disk so that the operating system accesses data more quickly and programs run faster.
__________ databases have the largest market share among the primary types of electronic databases. A. Relational B. Flat-file C. Multidimensional D. Object-oriented
A. Relational
Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network? A. Routers and switches B. USB ports C. Firewalls D. Network interface cards (NIC)
A. Routers and switches
A(n) ___________ check determines whether all required fields were entered with appropriate data. A. completeness B. range C. consistency D. alphabetic
A. completeness
A ____ is a collection of related data that can be stored, sorted, organized, and queried. A. database B. list C. filter D. data mine
A. database
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address. A. MAC B. IP C. SSID D. network
A. MAC
A large network designed to provide access to a specific geographic area, such as a large city is a __________. A. MAN B. PAN C. LAN D. WAN
A. MAN
A client/server network is an example of ________ administration A. Local B. Wide Area C. Central D. Corporate
C. Central
_____ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table. A. Referential integrity B. Normalization C. Database consistency D. Record integrity
A. Referential integrity
Which of the following statements about cookies is NOT true? A. Cookies obtain your personal information by searching your hard drive. B. Cookies are text files. C. Cookies help companies determine the traffic flow through their Web site. D. Some companies sell the personal information found in cookies to other companies
A. Cookies obtain your personal information by searching your hard drive.
Social ____________ is an unwanted piggyback program that usually downloads with software you are installing from the internet. A. Engineering B. Theft C. Pretexting D. Pharming
A. Engineering
__________ involves putting data into an electronic file in a format that another application can understand. A. Exporting B. Importing C. Batch processing D. Data mining
A. Exporting
Creating and disseminating ______ is one of the most widespread types of crimes. A. Spam B. Computer viruses C. fake credit cards D. FBI related scams
B. Computer viruses
What does the acronym DBMS stand for? A. Database modeling system B. Database management system C. Data building and modeling system D. Data browsing and management system
B. Database management system
Which of the following is NOT a main operation of a database management system (DBMS)? A. Creating databases and entering data B. Implementing data mining C. Viewing and sorting data D. Outputting data
B. Implementing data mining
A _____________ is a virus that is attached to documents such as a word or excel files. A. script virus B. Macro virus C. Polymorphic Virus D. Worm
B. Macro virus
Which of these statements about physically protecting your computer is FALSE? A. The computer should sit on a flat level surface. B. Power surges can be blocked by using a computer surround. C. It is best to unplug computers during an electrical storm. D. Old surge protectors can deliver power to your computer without protecting it.
B. Power surges can be blocked by using a computer surround.
One virus called _______ is used to trick users into downloading an infected file to their phone, which steals online banking information. A. Spyware Mobile Banking B. Spyeye Mobile Banking C. Spyware Online Banking D. Spyeye Online Banking
B. Spyeye Mobile Banking
You can block logical ports to invaders and make your computer invisible to others on the internet by installing _____. A. a packet sniffer B. a firewall C. a packet filter D. antivirus software
B. a firewall
In a transaction-processing system, if transaction data are accumulated until a certain point and then many transactions are processed all at once, this is called ______ processing. A. delayed B. batch C. real-time D. group
B. batch
In a transaction-processing system, if transaction data are accumulated until a certain point and then many transactions are processed all at once, this is called ________ processing. A. delayed B. batch C. real-time D. group
B. batch
________ viruses are often transmitted by a flash drive left in a USB port. A. logic bomb B. boot-sector C. macro D. encryption
B. boot-sector
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? A. social networking B. cybercrime c. phishing d. hacking
B. cybercrime
All of the following are extra precautions you can take to secure a wireless network, EXCEPT ________. A. change your network name (SSID) B. enable SSID broadcast C. turn on security protocols D. create a passphrase
B. enable SSID broadcast
Network adapters _________. A. are built into the motherboard on each node B. enable nodes in a network to communicate with each other C. are always Ethernet NICS D. are necessary only on servers in a client/server network
B. enable nodes in a network to communicate with each other
_________ floods a computer with requests until it shuts down and refuses to answer any requests for information. A. A Trojan horse B. A polymorphic virus C. A DDoS attack D. Port blocking
C. A DDoS attack
CAPTCHA stands for _______. A. Completely Amazing Public Turing Test to Tell Computers and Humans Apart B. Completely Automated Private Turing Trial to Tell Computers and Humans Apart C. Completely Automated Public Turing Test to Tell Computers and Humans Apart D. Complete Automated Public Turing Trial to Tell Computers and Humans Apart
C. Completely Automated Public Turing Test to Tell Computers and Humans Apart
The protocol using port 53 is ______. A. FTP control B. STMP C. DNS D. HTTP
C. DNS
Which of the following is NOT a data source for a data warehouse? A. Internal sources B. External sources C. Data mine D. Clickstream data
C. Data mine
IC3 is a partnership between the _________. A. FBI and local police departments B. FBI and National Defense Department C. FBI and National White Collar Crime Center D. National White Collar Crime Center and National Defense Department
C. FBI and National White Collar Crime Center
A ________ is a network located in your home that connects to all your digital devices. A. MAN B. WAN C. HAN D. LAN
C. HAN
A ________ network is located in your home that connects to all your digital devices. A. MAN B. WAN C. HAN D. LAN
C. HAN
A _____ relationship indicates that for each record in a table, there is only a single corresponding record in a related table. A. many-to-one B. one-to-many C. one-to-one D. many-to-many
C. one-to-one
Data are sent through a network on bundles called ______. A. packages B. pouches C. packets D. switches
C. packets
In a transaction-processing system (TPS), if the TPS database is queried and updated while the transaction is taking place, this is called ________ processing. A. direct B. batch C. real-time D. immediate
C. real-time
In a database, a ________ is a group of related fields. A. file B. list C. record D. table
C. record
1. A _________ displays a subset of data from a table (or tables) based on the criteria specified. A. database query B. join query C. select query D. criteria query
C. select query
Network architectures are classified according to _______. A. the distance between the hub and the router B. the bandwidth supplied by the connection C. the way in which they are managed and the distance between their nodes D. the speed at which they processor runs
C. the way in which they are managed and the distance between their nodes
All of the following are considered cybercrimes, EXCEPT ____. A. identity theft B. non-delivery of merchandise C. theft of a cell phone D. hacking
C. theft of a cell phone
6. The most popular transmission media option for wired Ethernet networks is __________. A. fiber-optic cable B. power-line cable C. unshielded twisted-pair (UTP) cable D. coaxial cable
C. unshielded twisted-pair (UTP) cable
A data ________ is a large-scale electronic repository of data that contains and organizes all of an organization's data in one place. A. mart B. chain C. warehouse D. storehouse
C. warehouse
Which transmission medium transmits data the fastest? A. Twisted-pair cable B. Coaxial cable C. Wireless D. Fiber-Optic cable
D. Fiber-Optic cable
All of the following are the main functions of antivirus software, EXCEPT _______. A. Looking for virus signatures B. quarantining viruses C. inoculating key files D. assassinating all viruses
D. assassinating all viruses
All of the following are top cybercrimes reported to IC3 in 2011, EXCEPT __________. A. Identity Theft B. non-auction/non-delivery of merchandise C. advance fee fraud D. child pornography
D. child pornography
Classification, affinity grouping, and estimation are _________ methods used by managers to make their data more meaningful. A. modeling B. staging C. artificial intelligence D. data mining
D. data mining
A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT _______. A. use your debit card information to purchase items illegally B. assume your identity C. steal your logon and passwords for various accounts D. launch a denial of service (DoS) attack on your computer
D. launch a denial of service (DoS) attack on your computer
All of the following are ways that can infect your computer with a virus, EXCEPT _________. A. sharing flash drives B. downloading video files from peer-to-peer sites C. downloading or running an e-mail attachment file D. logging into e-mail
D. logging into e-mail
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as __________. A. packet filtering B. packet switching C. static addressing D. logical port blocking
D. logical port blocking
7. All of the following involve tasks for network administration, EXCEPT ________. A. installing new computers and devices on the network B. updating and installing new software on the network C. setting up proper security for a network D. purchasing initial equipment for the network
D. purchasing initial equipment for the network
2. All of the following are benefits of networks EXCEPT, _________. A. sharing an Internet connection B. sharing printers and other peripherals C. sharing files D. sharing an operating system
D. sharing an operating system
In a database, a group of related records is called a(n) ________. A. memo B. field C. object D. table
D. table
A _____ is a virus that is triggered on a certain date. A. worm B. script C. logic bomb D. time bomb
D. time bomb