Introduction to computer concepts IST 101

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The ____ wildcard character allows a search engine to find pages with any derivation of a basic word.

*

A monochrome bitmap requires ______ bit(s) of storage space for each pixel.

1

The original Ethernet standard carried data over a coaxial cable bus topology at ____.

10 Mbps

ERD - Entity Relationship Diagram

A database plan that establishes the table layout, attributes, & primary keys of the database design

botnet

A large group of software applications (called robots or bots) that run without user intervention on a large number of computers.

network address translation (NAT)

A process that firewalls use to assign internal internet protocol addresses on a network.

inoculation

A process used by antivirus software

browser

A program that accesses and displays files and other data available on the Internet and other networks.

worm

A program that attempts to travel between systems through network connections to spread infections. Worms can run independently of host file execution and are active in spreading themselves.

plug-in

A program that extends the capability of a Web browser

IT Application Portfolio

A set of apps an organization would like to commit resources to, either new or modifications.

firewall

A software program or hardware device designed to prevent unauthorized access to computers or networks.

search engine

A software program you can use to find Web sites, Web pages, and Internet files.

boot-sector virus

A virus that replicates itself into the master boot record of a flash drive or hard drive.

time bomb

A virus that's triggered by the passage of time or on a certain date.

The standard communications protocol used on most client/server networks is ________. A) Ethernet B) NOS C) TCP/IP D) VPN

A) Ethernet

ASCII

American Standard Code for Information Interchange; requires only seven buts for each character

dos attack

An assault on a computer that is performed by hackers whose purpose is to disrupt access to the Web. DoS attack is short for denial of service attack

Cybercrime

Any criminal action perpetrated primarily through the use of computer

Which one of the following is the recommended way to handle pop-ups?

Block them.

Business Intelligence

Both a process and the output of the process, BI describes the global aspect of using information for decision making efforts.

The star topology uses a central ________ to connect all network nodes. A) terminator B) gateway C) switch D) router

C) switch

How can you tell if a field is indexed?

Click the column header and then use the Field Validation button.

Advantages of Using a Database

Collections of objects, events, people, places; increased flexibility, scalability and performance, reduced redundancy, increased data integrity, increased information security

web-based training

Computer-based training that uses Internet technology and consists of application software on the Web.

Popular codecs include all of the following EXCEPT ____.

Corel

_________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet. A. Adware B. Malware C. Shareware D. Spyware

D. Spyware

A ____ is a device that connects a computer to a telephone line and converts computer data signals into signals compatible with DSL.

DSL modem

cyberloafing/cyberslacking

Doing anything with a computer that's unrelated to a job (such as playing video games) while one's supposed to be working.

How do you open a folder to display the files it contains?

Double-click the folder

Instance

Each occurrence or row in each table is an instance of the entity defined

online help

Electronic equivalent of a user manual that usually is integrated in a program.

input devices

Enables the user to input data and commands into the computer.

____ transforms a message in such a way that its contents are hidden from unauthorized readers.

Encryption

The type of code that uses eight bits for each character is ____.

Extended ASCII

EBCDIC

Extended Binary-Coded Decimal Interchange Code; an 8-bit code used only by older, mainframe computers

In an SQL query, a ____ clause is used to specify the table you want to access.

FROM

A RISC processor has complex instruction sets, each requiring several clock cycles for execution.

False

A WAN provides connectivity within a limited geographical area, often within a single building.

False

A Web indexer is a computer program that is automated to methodically visit Web sites.

False

A batch system uses a commit or rollback strategy to ensure each transaction is processed correctly.

False

A button allows you to select one item from several options.

False

A cryptographic algorithm is a word, number, or phrase that must be known to encrypt or decrypt a message.

False

A(n) on-and-off connection can have a static or dynamic IP address.

False

A(n) operating-system disk is a removable storage medium containing the operating system files needed to boot your computer without accessing the hard disk.

False

All IP addresses are dynamic.

False

Each pixel in a bitmap graphic can hold more than one color.

False

Each upper bead in an abacus represents one unit, while each lower bead represents five units.

False

FTP is a protocol used by Internet phone companies for free long distance.

False

File management utilities usually retain the files within a folder when that folder is deleted.

False

Files that are zipped contain consolidated files that are compressed and ready to execute.

False

Folders cannot be created within other folders.

False

Free source projects promote copying, free distribution, peer review, and user modifications.

False

Google Apps provides a glimpse of what grid computing has to offer for productivity applications.

False

HTML format is included in the standard export options.

False

High-level languages were developed for first-generation computers.

False

Laws and ethics are really just different words for the same concept.

False

RAM capacity is often expressed in nanoseconds (ns).

False

Radio buttons are controls that allow users to select multiple options from a list.

False

Scripts were designed to replace normal HTML.

False

Sequential access is the ability of a device to "jump" directly to requested data.

False

Signed certificates assure users that the original software is free of viruses and bugs.

False

The current version of HTML, HTML 4.01, was introduced in 2010.

False

The cutover phase of the SDLC involves the day-to-day operation of the system, making modifications to improve performance and correcting problems.

False

The file name for a Web site's main page, like www.cnn.com, is usually short and to the point.

False

The first digital computer was developed for conducting the census.

False

With vector graphics software, the word "Bring" means to move objects behind others.

False

programs files

Files that are used in the running of software programs and that do not store data.

pop-up blocker

Filtering program that stops pop-up ads from displaying on Web pages.

In the accompanying figure, the item marked C is a ____.

FireWire port

One way to transfer photo data from a camera directly to a computer is via ____.

FireWire ports

packet filtering

Firewalls can be configured so that they filter out packets sent to specific logical ports

An e-mail message in ____ format can include graphics in addition to a wide variety of fonts and font colors.

HTML

When working with ____ mail, make sure your antivirus software is checking incoming messages.

HTML

A(n) ____ adds HTML tags to a document, spreadsheet, or other text-based file to create an HTML document that can be displayed by a browser.

HTML conversion utility

____ is a protocol that works in conjunction with TCP/IP to get Web resources to your desktop.

HTTP

What is the purpose of a recovery disk?

It can be used after a hard disk failure to return your computer to its factory default state.

A true statement about Bluetooth is ____.

It forms networks automatically when two or more devices in discovery mode are within range.

All of the following are tools to help you create server-side programs EXCEPT ____.

JavaScript

The ____ is a security mechanism that is factory-installed on many personal computers.

Kensington Security Slot

____ technology produces an image by filtering light through a layer of liquid crystal cells.

LCD

________ contain pointers to folders and files, somewhat like the index in a book.

Libraries

Strategic Planning

Long range planning done by organizations to deal with major decisions such as new facilities, size, locations and types of manufacturing processes.

A ____ is a public high-speed network capable of voice and data transmission within a range of about 50 miles.

MAN

In the "Big Bang Theory" video, what was the algorithm that had been written supposed to do?

Make friends

malware

Malicious software that enters a computer system without the owner's knowledge or consent.

Esteban has decided to install a computer network in his home. He knows he can choose wired or wireless and that there are differences in transmission speed and security. The signal on Esteban's wireless network is weak. What is the best solution to this problem?

Move the workstation closer to the router, if possible.

Popular presentation software products include all of the following EXCEPT ____.

Movie Maker

MIDI port

Musical Instrument Digital Interface port used to connect electronic musical instruments to a system

The accompanying figure represents the connection of your computer to the Internet; the router marked B should belong to a(n) ____.

NSP

____ queries are questions stated in a language such as English, rather than an esoteric query language.

Natural language

The ________ pane in Windows Explorer is the main area for selecting a storage device, library, or folder.

Navigation

When you expand a folder in the Navigation pane, what happened in the Files pane?

Nothing

When the keys on your numeric keypad are moving the insertion point but you would rather that these keys produce numbers, you should press the ________ key.

Num Lock

___ uses organic molecules that produce an even brighter, easier-to-read display than standard TFT displays.

OLED

____ systems use a commit or rollback strategy to ensure that each transaction is processed correctly.

OLTP

instant messaging

Online communication that allows two or more participants to communicate in real time

spooling

Operating system process that sends documents to be printed to a buffer instead of sending them immediately to the printer.

____ schemes redirect users to fake sites by poisoning a domain name server with a fake IP address.

Pharming

_____ scams are designed to trick you into connecting to a fraudulent Web site and revealing personal and financial information.

Phishing

pharming

Planting malicious code on a computer that alters the browser's ability to find web addresses and that directs users to bogus websites.

Feasibility

Potential level of success in several aspects including technical, economic, organizational, behavioral or time

The following is NOT a guideline for creating a template for reports: ____

Present as much information as possible

backdoor programs

Program that enables a hacker to take complete control of a computer without the legitimate user's knowledge or permission

antivirus program

Program that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.

system failure

Prolonged malfunction of a computer

A group of two or more integrated hard disks is called ___.

RAID

____ is a temporary holding area for data, application program instructions, and the operating system.

RAM

___ is a standard, specifically a protocol, that defines how a network

RFID

A(n) ____ is issued by a project team when it wants vendors to recommend hardware and software for the solution they have chosen.

RFP

A(n) ____ is a request for a formal price quotation on a list of hardware and software.

RFQ

IT Investment

ROI is not easily achieved on IT projects as some benefits are intangible and not easily quantified.

According to the video "TCP/IP- An animated video", which routing protocol has a maximum hop limit of 15 hops?

Routing Information Protocol

A collection of language-specific programming tools that enable a programmer to develop applications for a specific computer platform is a(n) ____.

SDK

In areas where there are overlapping wireless networks, such as in a city or on a college campus, ____ help you log in to the right network, rather than a network run by a hacker who will try to suck important information off your computer as soon as you connect.

SSIDs

Data Mining

Searching for valuable information in a database, data warehouse, or data mart.

_____________ can give you an idea of what your computer looks like to a hacker who is trying to gain unauthorized access to your computer over the Internet.

ShieldsUP!!

In the lab, you had an opportunity it explore a diagramming software package called ______.

SmartDraw

____ intercepts information sent over computer networks.

Sniffing

malware

Software that's intended to render a system temporarily or permanently useless or to penetrate a computer system completely for purposes of information gathering. Examples includes spyware, viruses, worm, and Trojan horses.

cracker

Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action.

____ is NOT true.

Speed increases as signal strength decreases.

KPIs - Key Performance Indicators

Strategically aligned metrics to monitor objectives or measures of success against specific targets; defined by management, implemented by operations; tracked by IT

SQL

Structured query language; a database programming language that allows complicated queries to be written to search or filter a database

plug and play

The capability of windows based pc operating systems to detect new,compatible devices

central processing unit (CPU)

The main processing unit in a computer, consisting of circuits that processes data. (Also called the "brain" of a computer)

quarantining

The placement (by antivirus in a secure area on the hard drive so that it won't spread infection to other files.

phishing

The process of sending e-mail messages to lure Internet users into revealing personal information such as credit card or Social Security numbers or other sensitive information that could lead to identity theft.

netiquette

The rules for good manners on the Internet

drive-by-download

The use of malicious software to attack a computer by downloading harmful programs onto a computer, without the user's knowledge, while they are surfing a website.

Perry is looking at his budget alongside his requirements for a new computer. He does not have a lot to spend, but he wants to get as much for his money as he possibly can; and he wants to be very confident that the choice he is making is well-informed. Which of the following would NOT be true of computers priced higher than $1,200?

These computers do not adequately support video editing tasks.

Which of the following is TRUE with regard to turnkey systems?

They require time and expertise to evaluate.

____ are the form factor of choice for computer owners who might want to upgrade components in the future because it is easy to get inside the case and swap out parts.

Tower units

____ software locates the edges of objects in a bitmap image and converts the resulting shapes into vector graphic objects.

Tracing

A computer system like that shown in the accompanying figure is designed to analyze data and produce a recommendation, diagnosis, or decision based on a set of facts and rules.

True

A conversion process called MIME provides a clever way of disguising digital photos, sounds, and other media as plain ASCII code that can travel over the Internet as e-mail attachments.

True

A laser within the printer paints the image on a photo-sensitive drum. Toner is then applied to the image on the drum.

True

According to the video "Identity Theft", you should never carry your Social Security Card in your wallet or purse.

True

Some of the first microcomputers required assembly by the user.

True

Storage capacity usually is measured in gigabytes (GB) or terabytes (TB).

True

Tablet computers include a touch screen for input instead of a keyboard.

True

The declarative paradigm attempts to describe problems without specifying exactly how to arrive at a solution.

True

The term "form factor" refers to the size and dimensions of a component, such as a system board.

True

The term player is sometimes used to refer to plug-ins, but it also can refer to standalone software that does not require a host program.

True

Drill-Down

Using a dashboard or other data analysis tool that allows the user to click on values and view more detail about a topic of interest.

screen saver

Utility program that causes a display device's screen to show a moving image or blank screen if no mouse activity occurs for a specified time.

software piracy

Violating a software license agreement by copying an application onto more computers than the license agreement permits.

In this lab, you explored using _________ to create computer programs.

Visual Basic

____ is supported by browsers without a plug-in.

WAV

________ offers the weakest wireless encryption.

WEP

The ____ is a collection of linked documents, graphics, and sounds.

Web

____ provides tools specifically designed to enter and format Web page text, graphics, and links.

Web authoring software

When you view a page infested with a(n) ____, an HTTP set-cookie request automatically goes to a third-party server, which may set a cookie on your computer for later retrieval or record your IP address.

Web bug

The following statement is NOT true: ____.

Web pages that provide a secure connection start with httpx: instead of http:.

A(n) ____ is a collection of related information organized and formatted so it can be accessed using software called a browser.

Web site

web app

Web site that allows users to access and interact with software from any computer or device that is connected to the Internet.

Internet Forum

Web-based online discussion site where participants post comments to discussion threads

data breach

When sensitive or confidential information is copied, transmitted, or viewed by individual who is not authorized to handle the data.

Scope Creep

When users ask for added functionality during a systems development project after the initial specs have been defined and approved.

To connect a phone or other device to a network, make sure that ____ is enabled, then wait for the device to sense the network, and when asked, enter the encryption key.

Wi-Fi

____ are the people who directly carry out an organization's mission by, for example, assembling products, selling merchandise, or answering phones.

Workers

internet

Worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals

The accompanying figure shows a(n) ____ document.

XML

Can you create a system image with Windows 7?

Yes, using Backup and Restore.

web filtering

____ software is a program that restricts access to certain material on the Web.

Bit

a 0 or 1 used in the digital representation of data

optical drive

a CD drive, a DVD drive, a Blu-ray Disc (BD) drive, or a combination drive that is usually mounted inside the system unit

multicore

a CPU that includes more than two microprocessors on a single integrated circuit

Web

a collection of linked documents, graphics, and sounds that can be accessed over the internet

user ID

a combination of letters and numbers that identifies a user on a computer (also called username)

Dial-Up Connection

a fixed internet connection that uses a voiceband modem and telephone lines to transport data between your computer and your ISP

star topology

a flexible and frequently used network configuration for businesses, in which nodes connect to a central communication device known as a switch

Byte

a group of eight bits, abbreviated as "B"

menu

a list of commands within a category

Cybercriminals

a loose-knit network of attackers, identity thieves, and financial fraudsters that are highly motivated, less risk-adverse, better funded, and more tenacious than hackers

Software as a Service (SaaS)

a model in which consumers access applications from a cloud provider over the Internet

digital media player

a peripheral device that can be attached to a personal computer system to transfer and play music and photo files

digital camera

a peripheral device that records photographic images in digital format

printer

a peripheral output device that creates hard copy output, including text, photographs, and graphic images

cathode-ray tube (CRT)

a picture tube device used in a monitor, similar to a television

DVD drive

a storage device used to read and, possibly, write data to DVD

non-impact

a type of printer that does not actually touch the paper

Symptoms of network problems include ____.

all of the above

The difference between the Save and the Save As commands is that ____.

all of the above

To implement security even when your computer is configured for file sharing, Windows lets you _______.

all of the above

To make sure that you don't lose data when shutting down your computer, it is important to ________.

all of the above

WiMAX

an Ethernet-compatible network standard designated as IEEE 802.16

Web (World Wide Web)

an Internet service that links documents and information from computers distributed all over the world using the HTTP protocol

pixel

an abbreviated name for picture element

licence agreement

an agreement issued by a software provider that gives the users the right to -use the software

A monochrome bitmap looks like ________.

an old-fashioned silhouette

Digital Revolution

an ongoing process of social, political, and economic change brought about by digital technology

A(n) ________ benchmark test runs a eal software application and times various tasks that are performed according to an automated script.

application-based

Gigabyte (GB)

approximately one billion bytes; a unit of measure for memory and storage space

Storage is typically expressed as ____.

bytes

ActiveX controls _________.

can make Web pages more interactive, but they can be a security risk

When you download software, you ________.

can store it anywhere

A ____ establishes which fields and records a particular user may access.

data view

A CRT monitor's viewable size is the ___ measurement of the actual viewing area provided by the screen in the monitor.

diagonal

A ____ displays the options associated with a command.

dialog box

During product activation, you must ____.

enter a product key

Synchronous Communications

instant messaging, chat, and VoIP; users must be online at the same time and the conversation happens in real time

command

instruction on a menu that causes a program to perform a specific action

A(n) ___ is a touch-sensitive device, resembling a dry-erase board, that displays the image on a connected computer screen.

interactive whiteboard

The default password for most routers ________.

is public knowledge so it should be changed to a strong password when the router is installed

When you create new folders, ________.

make sure you have opened the library into which you want to put it

Every Prolog command ends with a ________.

period

application software

program designed to make users productive and/or assist them with personal task

Executive Dashboard Software

provides tools for visually displaying query results

A service pack ____.

provides updates to the operating system

A(n) ____ attribute is available for use by any routine in the program.

public

All of the following techniques be used to improve web searches except ___.

put the most important terms last

Local Software

refers to any software that is installed on a computer's hard drive

Digital Divide

refers to the gap between people who have access to technology and those who do not

A processor contains small, high-speed storage locations, called ___, that temporarily hold data and instructions.

registers

According to the video "What is a relational database?", a(n) ________ is a structured collection of information that is related to a particular subject or purpose.

relational database

Output

result produced by a computer

The accompanying figure represents computer and software marketing channels. In that figure, box D represents ____.

retail stores

A ___ is a program that hides in a computer and allows someone from a remote location to take full control of the computer.

rootkit

A(n) _____________ can hide your computer's ports from Internet hackers.

router

Before using your network, you should adjust the configuration settings of the ____ to make sure your network is secure.

router

A(n) ___ allows a user to choose specific files to back up, regardless of whether or not the files have changed.

selective backup

The term rootkit refers to ____.

software tools used to conceal malware and backdoors

open-source

software whose code is made available for developers to modify and use as they wish, usually available at no cost

storage

the area in a computer that holds data on a permanent basis when it is not immediately needed for processing

digital convergence

the trend to blend several technologies that have distinct functionalities into a single product, such as smartphones that combine voice communication, text messaging, e-mail, Web browsing, cameras, and GPS

Database Model

the underlying structure of a database

To modify a report, _____.

use Design View

When you delete a folder, ________.

you should first open the folder to make sure it doesn't contain files that you want to retain

According to the video, which file format is most popular for file compression?

zip

spam

Unwanted or junk e-mail

According to the video, "How to Choose a Strong password", which of the following is NOT recommended for creating a password.

Use dictionary words

If an image stored in a 4 MB file has a resolution of 1600 x 1200 and you resize the image to 800 x 600, the resulting files should require _______ of storage space.

1 MB

Kilobit

1,024 bits (Kb or Kbit)

Kilobyte

1,024 bytes (KB or KByte)

Megabit

1,048,576 bits (Mb or Mbit)

The modern definition and use of the term computer emerged in the ____.

1940s

You should provide at least ______ level(s) of DFDs as information system documentation.

2

E-mail usually uses port _____.

25

____ technologies support digital transmission for both voice and data.

3G

Dashboard

A BI app that allows visual representation of summary data, analytics to easily track performance, direct access to reports, and can be customized to user needs

clip art/image gallery

A collection of clip art and photos included with application software.

packet analyzer (sniffer)

A computer hardware device or softwareprogram designed to detect and record digital information being transmitted over a network

Trojan horse

A computer program that appears to be something useful or desirable (such as a game or a screen saver), but at the same time does something malicious in the background without the user's knowledge.

backup

A copy of a computer file that can be used to replace the original if it's lost or damaged.

image backup (system backup)

A copy of an entire computer system, created for recreation purposes.

Prototyping

A design method which uses mock up screens with limited functionality and high user involvement to define a workable solution.

surge protector

A device that protects computers and other electronic devices from the power surge.

biometric authentication device

A device that reads a unique personal characteristic such as a fingerprint or the iris pattern in your eye and converts it pattern to a digital code.

personal firewall

A firewall specifically designed for home networks.

Database

A group of logically related tables that store data about entities, their attributes, and the relationships between them.

script

A list of commands (mini-programs or macros) that can be executed on a computer without user interaction.

computer virus

A malicious computer program capable of reproducing itself and causing harm to files or programs on a computer system.

Software-As-A-Service (SaaS)

A method of using/delivering software in which a vendor hosts an IT application & the customer pays per user for access via the Internet.

Decision Making

A set of stages during which a manager gathers intelligence, give consideration to alternative choices or designs, and implements the best option

master boot record

A small program that runs whenever a computer boots up.

spear phishing

A targeted phishing attack that sends e-mails to people known to be costumers of a company. Such attacks have much greater chance of successfully getting individuals to reveal sensitive data.

incremental backup (partial backup)

A type of back that only backs up files that have changed since the last time files were backed up.

In a database, the term ________ is synonymous with a category of information. A) field B) record C) row D) table

A) field

The Internet began with a project called ____.

ARPANET

The type of code that uses only seven bits for each character is ____.

ASCII

Drill-Down

Ability to choose type & level of detail in the data to identify trends & see comparisons

Databases are vulnerable to ____.

All of the above

denial-of-service (DoS) attack

An attack that occurs when legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system that tie up its resources and deny legitimate users access.

Primary Key

An attribute that uniquely identifies an entity from another (student ID).

distributed denial-of-service (DDoS) attack

An automated attack that's launched from more than one zombie computer at the same time.

virus hoax

An e-mail message warning users of a nonexistent virus and encouraging them to pass on the message to other users.

________ is a protective layer made of glass or plastic, which is wrapped around the core of a fiber-optic cable for protection. A) Shielding B) Cladding C) Sheathing D) Coating

B) Cladding

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? A) Social networking B) Cybercrime C) Phishing D) Hacking

B) Cybercrime

Which of the following is NOT a likely primary key? A) Driver's license number B) Date of birth C) Student ID number D) Social Security number

B) Date of birth

You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________. A) a packet sniffer B) a firewall C) a packet filter D) antivirus software

B) a firewall

Creating and distributing ________ is one of the most widespread types of cybercrimes. A) spam B) computer viruses C) cookies D) zombies

B) computer viruses

You would use a ________ to temporarily display records of residents of the city of Boston. A) sieve B) filter C) validation rule D) field constraint

B) filter

If a school keeps two lists, one for student registration and one for student financial information, both containing name and address information, this is an example of data ________. A) integrity B) redundancy C) completeness D) normalization

B) redundancy

Which type of virus was the famous Michelangelo virus? A. A worm B. A time bomb C. A script virus D. An e-mail virus

B. A time bomb

8. A(n) ________ is a device connected to a network such as a computer or a game console. A. architecture B. node C. server D. modem

B. node

Which of the following classification of viruses can change its own code to avoid detection? A. Stealth B. Multipartite C. Polymorphic D. Worm

C. Polymorphic

Wireless internet is available using _________. A. Fiber Optics B. Satellite C. Radio Waves D. DSL

C. Radio Waves

A ________ is named after a housing construction feature that slows the spread of fires from house to house. A. firehouse B. wallfire C. firewall D. fire protector

C. firewall

A _____ allows multiple users to connect to the Internet through one connection A. file server B. hub C. network D. packet screener

C. network

The ___ chip, which uses battery power, stores configuration information about the computer.

CMOS

The key combination ________ closes a program that has stopped responding.

Ctrl, Shift, and Escape

Which of the following is FALSE about servers? A) Servers are the workhorses of the client/server network. B) Servers interface with many different network users. C) A file server stores and manages files for a network. D) All networks require at least two servers

D) All networks require at least two servers

Which of the following is NOT an advantage of using networks as compared to a stand-alone computer? A) Enable software sharing B) Facilitate knowledge sharing C) Enhanced communication capabilities D) Ease of maintenance and administration

D) Ease of maintenance and administration

Data ________ helps to ensure data integrity by maintaining information in only one place. A) flexibility B) redundancy C) mapping D) centralization

D) centralization

All of the following are used to classify network architectures, EXCEPT _____________. A. the distance between nodes B. the protocol used to exchange data between nodes C. the communication medium used to transport data D. the number of nodes on the network

D. the number of nodes on the network

The current version of wireless Ethernet is ______. A. 802.11m B.802.11g C.802.11p D.802.11n

D.802.11n

A protocol known as ____ is designed to automatically distribute IP addresses.

DHCP

A(n) microcomputer specializes in compute-intensive problems.

False

All major companies in the IT industry are headquartered in Silicon Valley.

False

CDs and DVDs are examples of magnetic storage media.

False

COBOL and Fortran are considered second-generation languages.

False

Compression utilities can be used for single files only to reduce the size of the file.

False

Computer users are discouraged from applying all available software patches.

False

Data collected by a transaction processing system (TPS) can be used by a(n) DSS (Decision Support System) to create reports that managers can use to make routine business decisions in response to structured problems.

False

Data in a(n) wired network travels without the use of network cables.

False

Data is organized into closely spaced tracks on the rotating spindle.

False

Downstream speed is the rate of data transmitted from your computer to the Internet.

False

During the boot process, RAM is loaded into the operating system kernel.

False

Each bit of RAM is stored in a transmitter.

False

Icons for programs that you frequently use are listed on the right side of the Start menu.

False

If you use a laptop computer, you must also use the built-in trackpad to control the mouse pointer.

False

In the accompanying figure, the microprocessor is shown in picture B.

False

In the accompanying figure, the relationship shown in the bottom row is a many-to-many relationship.

False

In the design phase of the SDLC, the project team must figure out why the new system will fulfill the requirements specified in the System Requirements Report.

False

Not all objects on the form contain a set of properties.

False

Pharming is less surreptitious and easier to detect than most other hacker schemes.

False

Some systems streamline the backup process by restoring a computer's operating system, device drivers, settings, and data in a single step - a process called restore pointing.

False

The wave on the top in the accompanying figure depicts an analog signal.

False

To ensure you can remember your password, it is a good idea to base it on information you can easily remember such as your birthday.

False

User privileges delineate what activities a user can perform within a database.

False

Utilities are an example of application software.

False

Utility software refers to a type of application software that has the potential to help people get work done.

False

WMF files contain instructions for creating the pitch, volume, and duration of notes that sound like various musical instruments.

False

When devices record your location, there is no possibility of abuse.

False

When the Safe to Remove Hardware message appears, you must wait three seconds before you remove the USB flash drive.

False

When using portable software, the Portable Apps menu only lists the portable application files. Data files will be stored separately and cannot be accessed through the Portable Apps menu.

False

When you are finished with the Portable Apps, it is important to close the window before you remove the flash drive.

False

Devices with one or more antennas use ____ technology to boost signals and spread them more evenly over the signal range.

MIMO

A ___ analyzes the time required to complete a task and identifies the minimum time required for an entire project.

PERT chart

computer-aided design

Software that allows you to create engineering, architectural, and scientific designs

Adware

Spyware that tracks a user's internet browsing and installs malicious cookies

identity theft

The process by which someone uses personal information about someone else (such as the victim's name, address, and Social Security number) to assume the victim's identity for the purpose of defrauding another.

A DSS could provide tools for comparing and projecting costs based on external data from various reports.

True

A compiler like the one shown in the accompanying figure converts all statements in a program to machine language in a single batch.

True

A new version update usually installs in a similar way as you installed the original version.

True

A process called handshaking allows two communications devices on a network to negotiate their communications protocols.

True

A search agent allows you to configure your search according to job categories and cities, as well as salary and keywords.

True

A search agent sends a list of jobs that match your search criteria to your email.

True

A single high-level command does the work of multiple low-level commands.

True

A virus hoax usually arrives as a(n) e-mail.

True

A visual development environment typically allows a programmer to design forms that become the user interface when the program runs.

True

A zombie is a computer under the control of a bad bot.

True

According to the video "Windows 7 Gadgets" to access the available gadgets, you right-click on the desktop and select Gadgets.

True

Privacy advocates fear that digital technologies are fundamentally changing our expectation of what is private and what is not.

True

With a voiceband modem, actual data transfer speeds are affected by factors such as the quality of your phone line and connection.

True

The name of the device that prepares the data for the UNIVAC was ________.

UNITYPER

The operating system that was developed in 1969 by AT&T's Bell Labs and gained a good reputation for its dependability is ____.

UNIX

An easy way to back up your important data is simply by copying selected files to a ____.

USB flash drive

In the accompanying figure, the item marked A is a ____.

USB port

The ___ is an alternative to DVI that also supports HDMI.

display port

With ____, processing tasks are shared by servers and workstations.

distributed processing

The accompanying figure represents computer and software marketing channels. In that figure, box A represents ____.

distribution centers

Flowcharts and DFDs ___________.

do not depict the same aspects of information systems

Communications Port

doorway that allows a computer to exchange data with other devices

The accompanying figure represents a virtual private network. In this figure, A points to ____ data.

encrypted

In an object database, an attribute is ____.

equivalent to a field in a relational database

Variable-Length Field

expands to fit the entered data

Many projects fail because of constant, unmanaged demand for changes, even before the system is implemented. This failure to constrain change is often referred to as ____.

feature creep

Enterprises often use ___ technology to connect to storage systems at data rates up to 4 Gbps.

fibre channel

A ___ is a mini-program with minimal functionality that connects to another program or provides information.

gadget

A technology called _____ helps Web sites customize their presentations based on information about your physical location.

geolocation

script kiddie

has the same intent as a cracker but does not have the technical skills and knowledge

Product activation can create a ____ based on your validation code and your computer's internal serial number.

hash value

computer literacy

having a current knowledge and understanding of computers and their uses

accounting software

helps companies record and report their financial transactions

The Recycle Bin ________.

is a special folder that holds files you've deleted from the hard disk

A new folder that you create ________.

is added in alphabetical order below the currently selected object

During the planning phase, the projects that receive the highest priority are those ___.

mandated by management or some other governing body

Processing

manipulation of data in many ways by computers

When installing software from a distribution CD, if you insert the CD, but nothing happens you should ________.

manually run the Setup.exe program

A ___ is a web application that combines services from two or more sources, creating a new application.

mashup

Dial-up Internet access is an example of a(n) ____ communications system.

narrowband

A(n) ___ is an online area where users have written discussions.

newsgroup/message board

The average "survival time" for an unprotected computer to remain uncompromised is only ____.

nine minutes

A network ____ usually contains a computer, networked peripheral, or network device.

node

Private IP Address

non-routablee IP address that can be used within a LAN, but not for Internet data transport

Window Phone apps run on ____.

none of the above

A laptop computer (also referred to as a ____ computer) is a small, lightweight portable computer that opens like a clamshell to reveal a screen and keyboard.

notebook

gigahertz (GHz)

one billion hertz; hertz is the unit of measure for processor speed

megahertz

one million hertz; hertz is the unit of measure for processor speed

Supercomputer

one of the fastest computers in the world at the time it is made

Sort Key

one or more fields used to specify where new records are inserted in a table

Many-to-Many Relationship

one record in a particular record type can be related to many records in another record type, and vice versa

One-to-Many Relationship

one record is related to many records

hard disk drive (or hard drive)

permanent storage device, located within the system unit, that holds all permanently stored software and data

The tools that browsers use to detect fraudulent Web sites are called _____.

phishing filters

Factors affecting the success of the IT industry include: ____.

population growth & business globalization

A project team submits an RFQ to vendors when it knows all of the following EXCEPT ____.

price of the software needed

Web Page

product or output of one or more Web-based files displayed in a format similar to a page in a book

database software

programs, such as Microsoft Access, used to store and organize large amounts of data and preform complex tasks such as sorting and querying to generate specialized reports

Open Source

projects that promote copying, free distribution, peer review and user modification

Memo Data Type

provides a variable-length field in which users can enter comments

FTP (File Transfer Protocol)

provides a way to transfer files from one computer to another over any TCP/IP network, such as LAN or Internet

A(n) ____ is an association between data that is stored in different record types.

relationship

In the threat model STRIDE, the R stands for ____ or covering tracks to make attacks difficult to trace.

repudiation

IP (Internet Protocol)

responsible for addressing packets so that they can be routed to their destination

A logic error is a type of ____ error.

runtime

Careers in computer ____ focus on computer architecture and programming computers to make them work effectively and efficiently.

science

Computers characterized by their use of transistors are considered ____ -generation.

second

Software

sets up a computer to do a specific task

When software is installed, all of the following take place EXCEPT ________.

shared program files are eliminated

Tweet

short message of less than 140 characters on Twitter

A synthetic test uses ________ tasks that mimic specific application tasks.

simulated

software updates

small, downloadable software modules that repair errors identified in commercial program code

notebook computer

small, lightweight, portable computer that usually runs on batteries (also called laptop or laptop computer)

A command to print a document is relayed through various levels of ____.

software

Data Type

specifies the way data is represented on the disk and in RAM

A Web server's response to a browser's request includes an HTTP ____ that indicates whether the browser's request could be fulfilled.

status code

Hyperlink Daya Type

stores URLs used to link directly from a database to a Web page

Relational Database

stores data in a collection of related tables

Password Manager

stores user IDs with their corresponding passwords and automatically fills in login forms

A(n) ____ file uses a uniform format to store data for each person or thing in the file.

structured

In the accompanying figure, the files marked C is a(n) ____.

support program file

A(n) ____ installs new versions of operating system software and modifies operating system settings to ensure maximum performance.

systems programmer

hayperthreading

technology that allows a CPU to emulate multiple processors, improving processing power and speed

The last topic of the lab included information on how to use _________.

the Access Report Wizard

IEEE 802.3 is ________.

the Ethernet standard

The accompanying figure represents a virtual private network. In this figure, E points to ____.

the Internet

Restore points back up settings in ________.

the Windows Registry

Tethering

the ability to serve as a Wi-Fi hotspot

Arrow Keys

the arrow keys found at the bottom center section of the keyboard, used to move the insertion point within the program window

system unit

the case or box that contains the computer's power supply, storage devices, main circuit board, processor, and memory

storage device

the computer hardware that records and/or retrieves items to and from storage media

font size

the size of the text measured in points

computer fluent

the term used to describe a person who understands the capabilities and limitations of computers and knows how to use computer technology to accomplish tasks

process

the term used to describe the action of a computer when it converts data into information

email address

the unique address for each mailbox on the Internet, which typically consists of a user ID, an @ symbol, and the name of the computer that maintains the mailbox

Uniform Resource Locator (URL)

the unique address of a Web page

Port Probe

the use of automated software to locate computers that have open ports and are vulnerable to unauthorized access

Internet

the worldwide communication infrastructure that links computer networks using TCP/IP protocol

In the accompanying figure, the ____ item represents a filing cabinet, disk, or tape that holds data.

third

desktop publishing

through the use of a personal computer, combining text and graphics to produce high-quality documents, such as newsletters, flyers, brochures, etc.

The ____ quality of service (QoS) metric is defined as the amount of data processed in a particular time interval.

throughput

A(n) ___ is a small version of a larger graphic.

thumbnail

Network Access Points

tie together NSP equipment and links

___ information has an age suited to its use.

timely

digitization/digitize

to convert text, numbers, sound, photos, and video to a digital format that can be processed by a computer, through the use of a scanner, camera, or other input device

click

to press the left (or primary) mouse button once

storage

to retain data or information for further use

output

to retrieve data or information from a computer

Server

to server computers on a network by supplying them data

Copy of A(n) ________ is designed to handle large volumes of transactions simultaneously from multiple users.

transaction processing system

___ is the speed with which data, instructions, and information transfer to and from a device.

transfer rate

Carpal tunnel syndrome is a condition whose effects are made worse by keyboard use. The accompanying figure represents a hand. Box B indicates the ____.

transverse carpal ligament

One file storage metaphor that is based on a hierarchical diagram is sometimes referred to as a ____ structure.

tree

Web Site

typically contains a collection of related information organized and formatted so it can be accessed using software called a browser

app

typically used to describe a software program on a smartphone or tablet computer

Object-Relational Database

used to describe a variety of technologies that combine object-oriented and relational concepts

Date Data Type

used to store dates in a format that allows them to be manipulated: number of days between two dates, etc.

A ____ is a series of characters that becomes a person's unique identifier.

user ID

Unicode

uses 16 bits and provides codes for 65,000 characters

Network Database

uses a mesh-like structure to offer the additional capacity to define many-to-many relationships

Structured File

uses a uniform format to store data for each person or thing in the file

Brute Force Attack

uses password-cracking software, but its range is much more extensive than the dictionary attack

Binary Number System

using only 0 and 1

multimedia control key

usually found at the top of a key-board, this type of key can be used to control or mute speaker volume

internet control key

usually found at the top of a key-board. this type of key can be used for various Internet-related activities including opening a Web browser and sending e-mail

Lookup Routine

validates an entry by checking data in a file or database table

Symmetric Internet Connection

when upstream and downstream speeds are the same

Asymmetric Internet Connection

when upstream speeds differ from downstream speeds

Central Processing Unit (CPU)

where most processing takes place

By clicking on the network, you can see te other computers on the network. By opening these computers, you can see ________________________.

which files and folders can be shared by other workstations on the network

A powerful desktop computer used for high-performance tasks is a ____.

workstation

disk cleanup

a Windows utility that removes unnecessary files from the hard drive

access provider

a business that provides individuals and organizations access to the Internet free or for a fee

Computed Field

a calculation that a DBMS performs during processing, and then temporarily stores in a memory location

Web cam

a camera that captures digital images using a computer

desktop computer

a category of computer small enough to fit on a desk but is too big to carry around and has attached, rather than built-in, keyboard, display, and pointing device

application software

a category of software programs that helps you perform a specific task such as word processing. (Also called application programs, applications, or programs)

___ offers high speed internet connections to decides with built-in compatible technology of computers with wireless modems.

a cellular radio network

Desktop computer

a class of microcomputer, such as a PC or a Mac

Record

a collection of data fields

Database

a collection of information

internet service provider (ISP)

a company that maintains Internet computers and telecommunications equipment in order to provide Internet access to businesses, organizations, and individuals

Internet Service Provider (ISP)

a company that offers Internet access to individuals, businesses, and smaller versions of itself

peripheral device

a component or equipment, such as a printer or scanner, that expands a computer's input, output, or storage capabilities

Videogame Console

a computer dedicated as a game device

email message

a computer file containing a letter or memo that is transmitted electronically via a network

graphical user interface (GUI)

a computer interface with which you interact with the computer through the use of graphics and point-and-click technology; GUIs show documents as they will look in their final form

internet

a computer network consisting of a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange

utility program

a computer of system software, typically as small program used to perform routine maintenance and housekeeping tasks for the computer

server

a computer on a network that supplies the network with shared data and storage

computer platform

a computer system's underlying hardware and software, in particular, its processor and operating system; the two dominant computer platforms today for desktop and notebook computers are PC, which is sometimes called the Windows platform, and Mac, which is the Macintosh OS by Apple Computer, Inc.

personal computers

a computer that can perform all of its input, processing, output, and storage activities by itself

dedicated server

a computer that is assigned to handle one specific task on a network

Random Access Memory (RAM)

a computer's temporary storage space or short-term memory and stored on ships located on the motherboard; measured in megabytes (MB) and gigabytes (GB). known as volatile memory

DOCSIS (Data Over Cable Service Interface Specification)

a data transport technology that includes security filters

You are reviewing a cash-flow model of your business, which is designed to provide a numerical representation of a realistic situation. You are using ____ tool.

a decision model

Recovery disks are useful if your computer's hard disk crashes, but they are also useful when ________.

a device has stopped working because of a corrupted device driver

DSL Modem

a device that connects a computer to a telephone line and converts computer data signals into signals compatible with DSL

multifunction device (MFD)

a device that has more than one purpose, often combining input and output capabilities

hard disk drive

a disk drive used to read and write hard disks

Web page

a document on the World Wide Web that consists of a specially coded HTML file with associated text, audio, video, graphics, and links to other Web pages.

Primary Key

a field that contains data unique to a record

clock speed

a measurement of how quickly a CPU processes data, an indication of a CPU's processing power

digital certificate

a notice that guarantees a user or a web site is legitimate

A bitmap image stored in a 10 MB file is best used as _______.

a page in a magazine

hacker

a person who creates malicious computer programs sometimes to steal or damage your data or hardware or to assume your identity for financial gain (also called cracker, black hat, or cybercriminal)

Compute-Intensive

a problem that requires massive amounts of data to be processed using complex mathematical calculations

Convergence

a process by which several technologies with distinct functionalities evolve to form a single product

mobile app

a program (such as a game, calendar, stock market tracker, traffic or weather monitor, or news feed) designed to run on mobile devices (such as smartphones and tablet computers). (mobile apps are also called mobile applications)

communication or organizational software

a program such as Microsoft Outlook, used to send and retrieve e-mail and manage day-to-day tasks

trojan horse

a program that appears desirable but actually contains something harmful

trojan horse

a program that appears to be useful of desirable, but acts maliciously in the background after installation

browser

a program that communicates with a Web server and displays Web pages

email attachment

a separate file that is transmitted along with an e-mail message

Table

a sequence of records similar to a flat file

Jim has just purchased a new computer and it has made him think about how it works. He is particularly interested in how information is processed and stored in his computer. He has come to you for help. Jim wants to know what machine language instructions look like to the machine. You tell him they appear as ____.

a series of 0s and 1s

worm

a software program capable of reproducing itself that can spread from one computer to the next over a network

personal firewall

a software program or hardware device designed to prevent unauthorized access to a computer

phishing

a type of online fraud where someone tries to trick the victim into revealing sensitive details such as a username, password or credit card details, by masquerading as a trustworthy entity in an electronic communication.

laptop computer

a type of portable computer that is small and light enough to be carried from one location to another (also called a notebook computer; usually runs on batteries)

netbook

a type of portable computer that is smaller than a notebook or a laptop computer. classified as sub notebooks, these small computers are scaled-down versions of standard clamshell-style notebook computers

impact

a type of printer that resembles a typewriter; a key and ink ribbon are used to imprint a character on paper

slat screen

a type of screen used in CRT monitoys, and which differs from flat panel monitors

keyword

a word or term used as the basis for a database or Web page search (Also called search term)

The ________ is one of the first calculating devices that are still used in many parts of the world today. It used a series of beads.

abacus

Gigabit

about 1 billion bits (Gb or Gbit)

Gigabyte

about 1 billion bytes (GB or GByte)

Sally has been using spreadsheets in making purchasing decisions at her job. She is getting a promotion, and has been asked to train James as her replacement. James has never used a spreadsheet. Sally tells James that a worksheet will automatically update to reflect any rows or columns that are deleted or copied. Sally tells James that if he does not want the cell reference to change, he should use a(n) ____ reference.

absolute

A(n) ____ limits access to systems, such as computer databases.

access control

At the ACME Widget Company, the computers have started behaving weirdly. Chris noticed that his directory had some files that he didn't remember putting on his computer. Lesley noticed her computer was beginning to run very slowly, and Kim realized she was getting replies to emails she had not sent. The owner of the ACME Widget Company has contacted you to see if their company might have a computer security problem. You explain to the owner of ACME Widget Company that malware includes ____.

all of the above

Which of the following file formats can be used in Paint?

all of the above

____ is a disadvantage of using a wireless network when compared to a wired network.

all of the above

Buyer bargain power controls ________.

all of these

Wi-Fi Hotspot

an area in which the public can access a Wi-Fi network that offers Internet service

Memory

an area of a computer that temporarily holds data waiting to be processed, stored, or output

buffer

an ionic compound that resists changes in its pH

Object Database

an object-oriented database stores data as objects, which can be grouped into classes and defined by attributes and methods

social networking

an online networking activity through Web sites that offer registered members security in knowing that they are interacting with friends of friends rather than with strangers. Examples include LinkedIn and Facebook.

printer

an output device used to generate hard copy

Client

any software or digital device that requests data from a server is referred to as a client

adware

any software package which automatically plays, displays, or downloads advertisements to a computer.

mailbox

any storage location for e-mail, such as the Inbox or Outbox

A set of software tests conducted by a team of off-site testers is called ____.

beta testing

A ____ graphic is composed of a grid of dots.

bitmap

The Paint application is an example of ________________.

bitmap graphics

TCP (Transmission Control Protocol)

breaks a message or file into packets

High-bandwidth communications systems are sometimes referred to as ____.

broadband

A(n) ____ is client software that displays Web page elements and handles links between pages.

browser

Webmail allows you to use a(n) ____ to access and view your e-mail messages.

browser

A fixed-length field contains a predetermined number of ____.

bytes

In the accompanying figure, D represents ____.

calculation

A method is activated by a message which is included as a line of program code also referred to as a(n) ____.

call

An encrypted message is referred to as ____.

ciphertext

To begin the routine shut down process, ________.

click the Start button

Computer literacy, also known as digital literacy, involves having a current knowledge and understanding of ___?

computer and their uses

Some ________ can be used as benchmark tests because they display frame rates, which indicate graphics performance.

computer games

track

concentric circles on a hard disk drive

To check for and enable a wireless adapter on a Windows computer, ________.

connect to the Network and Sharing Center

When a computer is in sleep mode, it ________.

conserves power by not using the monitor or disk drive

Backups are basically ________.

copies of files zipped into a single volume

A Web ____, automated to methodically visit Web sites, can be programmed to perform various activities as it visits those sites.

crawler

In the accompanying figure, the item marked A represents ____.

data

___ is/are a collection of unprocessed items, which can include text, numbers, images, audio, and video.

data

Because the ___ contains details about data, some call it metadata.

data dictionary

soft copy

data or information displayed on a monitor

hard copy

data or information retrieved from a computer and printed

Advantages of telecommuting include all the following EXCEPT ____.

data security

A context DFD does not show _________.

data stores

information

data that has been organized in a useful manner

The ____ is the amount of data that a storage device can move from the storage medium to the computer per second.

data transfer rate

When you specify the fields for a table you have to select a(n) _____, such as Text or Number.

data type

The database analysts (DA) ___.

decides on proper placement of fields

In the accompanying figure, C represents ____.

decision

A ____ is a question or set of instructions describing data that must be gathered to make a decision.

decision query

A(n) ___ lists a variety of conditions and the actions that correspond to each condition.

decision table

Which of the following has the least versatility?

dedicated software

In the threat model STRIDE, the D stands for ____ or making a system unavailable to legitimate users.

denial of service

A ___ is an assault whose purpose is to disrupt computer access to an internet service such as the Web or e-mail.

denial of service attack

The validity of benchmark tests ________.

depends on how the tests were carried out

blog

derived from the phrase "WeB LOG," refers to a personal journal focusing on a single topic or covering a variety of issues posted on the Web for access by the general public.

Hypertext

describe a computer system that could store literary documents, link them according to logical relationships, and allow readers to comment and annotate what they read

Field Name

describes a field's contents

Fixed Wireless Internet Service

designed to offer Internet access to home and businesses by broadcasting data signals over areas large enough to cover most cities and outlying areas

Software engineers tend to focus on ____.

designing

Productivity software that has sophisticated features to help you produce typeset-quality output is considered ____ software.

desktop publishing

computer program

detailed, step-by-step instructions that tell a computer how to solve a problem or carry out a task (also called program)

Antivirus software is an example of a security measure in the ____ category.

detection activity

A range check ___.

determines whether a number is within a specified range

Multi-level authentication is an example of a security measure in the ____ category.

deterrent

A decision is represented by the ________ symbol.

diamond

A(n) ____ backup contains any files that were added or changed since the last full backup.

differential

Case Sensitive

differentiation between upper and lowercase letters

___ involves the examination of computer media, programs, data and log files on computers, servers, and networks.

digital forensics

In the accompanying figure, the type of signal represented by A is a(n) ____.

digital signal

In ____ mode two Bluetooth devices can find each other and exchange passkeys.

discovery

An example of ________ is customer demographic data purchased from third parties or statistics compiled by the federal government. A. internal data B. external data C. imported data D. metadata

B. external data

A _____ temporarily displays records that match the specified criteria. A. sieve B. filter C. validation rule D. field constraint

B. filter

Adware and spyware are referred to collectively as __________. A. viruses B. grayware C. altertware D. firmware

B. grayware

Data ______ means that the data contained in a database is accurate and reliable. A. efficiency B. integrity C. redundancy D. consistency

B. integrity

When you want to extract data from two or more tables, you use a(n) _____ query. A. select B. join C. relational D. object

B. join

Data staging consists of all of the following steps, EXCEPT ________. A. transformation of data B. mining of data C. storage of data in a warehouse D. extraction of data

B. mining of data

In a database, a chart is stored in a(n) ______ field. A. text B. object C. memo D. hyperlink

B. object

When malicious code is planted on your computer and alters your browser's ability to find Web addresses it is known as ________. A. phishing B. pharming C. pretexting D. phlying

B. pharming

With regard to computer protection, quarantining is defined as ________. A. updating your antivirus software B. placing a found virus in a secure area in the hardware C. repairing an infected file d. deleting an infected file

B. placing a found virus in a secure area in the hardware

A ______ check allows you to set credits allowed for students during one quarter from 0 to 21. A. completeness B. range C. consistency D. numeric

B. range

If a business keeps two lists, one for employee payroll and one for employee benefits information, both containing name and address information, this is an example of data ________. A. integrity B. redundancy C. completeness D. normalization

B. redundancy

SSID stands for ________. A. service set identity B. service set identifier C. service security identity D. service security identifier

B. service set identifier

The Siri speech-recognition feature on Apple's iPhone 4s is an examples of a ______. A. natural language processing (NLP) system B. decision support system C. management information system (MIS) D. database management system (DBMS)

A. natural language processing (NLP) system

FBI-related scams involve ________. A. people pretending to represent official organizations B. running auctions that do not exist C. convincing people to send money as a "good faith" gesture D. collecting funds and not delivering the goods

A. people pretending to represent official organizations

9. A computer network is defined as two or more computers connected via ________ so that they can communicate with each other. A. software and hardware B. the Internet C. at least one server D. Ethernet cable

A. software and hardware

A(n) ______ takes advantage of file transport methods to spread on their own. A. worm B. script C. encryption D. time bomb

A. worm

For 3D games, frame rates below ________ are considered unacceptable.

16 fps

Digital telephone systems open up the possibilities for digital data transport options such as ____.

DSL

Tom is currently using dial-up for his Internet connection but he believes it is too slow for his needs and ties up his phone line. He is looking for an alternative and has come to you for help. Tom wants to know what kind of service to opt for if cable Internet service is not available, or proves slower or less dependable than expected. You tell him the next choice would be ____.

DSL

Tom is currently using dial-up for his Internet connection but he believes it is too slow for his needs and ties up his phone line. He is looking for an alternative and has come to you for help. Tom wants to know which of the services uses his existing telephone lines. You tell him ____.

DSL

A(n) ____ helps people make decisions by directly manipulating data, analyzing data from external sources, generating statistical projections, and creating data models of various scenarios.

DSS

Data Warehouses vs DataMarts

DW - A logical collection of info gathered from different physical sources to aggregate it into a single repository. Both perform analytical processing or OLAP (online analytical processing); DataMarts are small subsets of data pulled out to work with to answer specific business questions

Data vs Information

Data are raw facts; information is data converted into a meaningful & useful context for decision making

geotag

Data attached to a photograph that indicates the latitude and longitude where you were standing when you took the photo.

________ assigns a drive letter to a folder or printer on a remote computer.

Drive mapping

A tool used for making calculations that was considered essential for engineering and science students through the 1960s is a(n) abacus.

False

A wireless ad hoc network uses a centralized broadcasting device, such as a wireless access point or router.

False

A(n) control is a program that extends the ability of the kind of applications shown in the accompanying figure to work with file formats.

False

According to the video "How to Avoid Malware Infections", if malware gets through your anti-virus software, then you need to change your anti-virus software.

False

According to the video "Identity Theft", it is safest to have bills sent via mail, instead of through e-mail.

False

Adobe Acrobat is a multimedia technology that can be used to create animation and interactive modules.

False

All IP addresses are static.

False

Control structures are instructions that specify the sequence in which a program is written.

False

Flash, once the dominant tool for interactive Web pages, is gradually being replaced by PerlScript and new features available in HTML5.

False

In Paint, the Fill with color tool changes only the pixel it points to.

False

In Prolog, the ?- prompt means that Prolog is processing data and is not ready to proceed.

False

In a problem statement, a(n) known is something you accept as true in order to proceed with program planning.

False

In a system like the one shown in the accompanying figure, a technique called Boolean logic can be used to deal with imprecise data by asking for a level of confidence.

False

In a transaction processing system, only one task needs to be completed successfully for the system to store the transaction.

False

In a(n) POP3 e-mail system, your messages remain on a Web server, rather than being downloaded to your computer.

False

In order to run portable software on your PC, you must have the software installed.

False

In the SDLC, the goal of the activities in the planning phase is to create a list of requirements for the new or revised information system.

False

In the accompanying figure, IWC-guest is a(n) secure network.

False

In the accompanying figure, the Student item represents a data store.

False

In the accompanying figure, the item on the left simply plugs into a serial port on the outside of the system unit.

False

In the accompanying figure, the lock icon indicates a network secured with wired encryption.

False

In the query illustrated in the accompanying figure, the JOIN command specifies that you want to see the album with item number LPM-2256.

False

It is not necessary to use the resources of an online job bank unless you are actively searching for a job.

False

Like bitmap graphics, vector graphics lose their quality when enlarged.

False

Mac software is easy to install. Downloads are ordinarily supplied as .dim files, commonly referred to as "disk images."

False

Many online job banks allow you to create a search agent that checks for jobs only while you are online.

False

Mobile Internet access allows you to easily move your access device, as in the case of vehicle-mounted satellite dishes that can be deployed when the vehicle is parked.

False

Monochrome bitmaps, like the one shown in the accompanying figure, require a lot of storage space.

False

Most processors in today's personal computers use RISC technology.

False

NATs are intended to work within LANs to monitor and direct packets being transported from one device to another.

False

Once a drive has been mapped, it can only be accessed from the computer in the Start menu.

False

Online auctions are examples of B2G e-commerce.

False

Paint's Eraser tool erases images one box at a time.

False

The Database Tools tab contains the option to Export.

False

The Four Forces Model illustrates the threats that face companies within industry.

False

The Internet is the world's largest example of a(n) LAN.

False

The Render print jobs option on the print sharing tab when selected requires that the computer connected to the printer will process the file and get it ready.

False

The Settings button allows to select the settings for a gadget.

False

The Start menu's All Applications option displays a complete list of the software installed on your computer.

False

The index key for a table specifies the order in which records are stored and where new records are inserted in a table.

False

The item marked D in the accompanying figure is an audio port.

False

The octets in an IP address correspond to the parts of a Web site address.

False

The op code in a machine language instruction specifies the data.

False

The product design stage of the lifecycle of a new hardware product often takes place under wraps.

False

The tables in an Access database consist of columns only.

False

You can adjust the way tables are displayed by changing the order of columns and hiding columns, but you cannot sort the data in the table.

False

You can allow only people logged into your computer to open, change and create files in the Public folders.

False

You can use a hotspot for true mobile Internet access.

False

You should always use a different password for every account.

False

________ means that people are allowed to share any printer that you have designated as shared.

Global print sharing

3G technologies have speeds ranging from 200 Kbps to ____.

5 Mbps

Jimmy recently graduated and is looking for his first full-time job. He has turned to you for help. Jimmy knows you recently graduated and got a new job. He thinks you can give him some advice to help with his search. Jimmy was told the Internet had become an important tool for job hunters. Jimmy is wondering about the amount of his job-hunting time he should spend online. You tell him it is best to spend approximately ____ of his total time online.

50%

When working with JPEG graphics, which one of the following compression ratios produces the smallest file?

50:1

A bank of capacitors holds how many bits?

8

Microsoft Windows is installed on more than ____ of the world's personal computers.

80%

bookmark

A URL that you save in your browser so all you have to do is click on the title to visit it again

A ________ is a virus that is attached to documents such as Word or Excel files. A) script virus B) macro virus C) polymorphic virus D) Trojan horse

A ________ is a virus that is attached to documents such as Word or Excel files. A) script virus B) macro virus C) polymorphic virus D) Trojan horse

ups (uninterruptible power supply)

A battery-operated power source directly attached to one or more devices and to a power supply that prevents undesired features of the power source from harming the device or interrupting its services.

Decision Support System

A complex type of BI system that combines models and data to address semi-structured and unstructured problems.

virus

A computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged.

zombie

A computer that's controlled by a hacker who uses it to launch attacks on other computer systems.

logic bomb

A computer virus that runs when a certain set of conditions is met, such as when a program is launched a specific number of times.

logical port blocking

A condition in which a firewall is configured to ignore all incoming packets that request access to a certain port so that no unwanted request access to a certain port so that no unwanted requests will get through to the computer.

grey-hat hackers

A cross between black and white- a hacker who will often illegally break into systems merely to flaunt his or her expertise to the administrator of the system he or she penetrated or to attempt to sell his or her services in repairing security breaches.

Relational Database Model

A database model that stores data in the form of logically related two-dimensional tables; includes concepts of entities, entity classes, attributes, unique primary keys & foreign keys to tie entities together

data files

A file that contains stored data.

Query

A filter or criteria-related search written to return results from a database.

Table

A group or collection of logically related records

white-hat hackers (ethnical hackers)

A hacker who breaks into systems just for the challenge of it (and who doesn't wish to steal or wreak havoc on the systems). Such hackers tout themselves as experts who are performing a needed service for society by helping companies realize the vulnerabilities that exist in their systems.

black-hat hackers

A hacker who uses his or her knowledge to destroy information or for illegal gain.

Windows 7 includes peer-to-peer networking called _____.

A homegroup

encryption viruses

A malicious program that searches for common data files and compresses them into a file using a complex encryption key, thereby rendering the files unusable.

________ is used to ensure that data is organized most efficiently. A) Consistency checking B) Validation C) Normalization D) Range checking

D) Range checking

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________. A) packet filtering B) packet switching C) static addressing D) logical port blocking

D) logical port blocking

Which of the following is NOT a virus category? A) worm B) logic bomb C) macro D) pharming

D) pharming

Entity/object

A person, place, thing, transaction, or event about which data is stored; rows in each table contain "instances" of entities: a customer entity may include instances of John Jones, Sara Peterson, etc.

A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. A) denial of service (DoS) B) zombie C) logic bomb D) rootkit

D) rootkit

virus signature

A portion of the virus code that's unique to a particular computer virus and that makes it identifiable by antivirus software.

Information System Planning

A process of viewing org mission and strategic plan and then determining the necessary technology to help the org achieve them

Antivirus Software

A program that protects a computer from malicious codes such as viruses, worms, and Trojan Horse

Antispyware Software

A program that protects a computer from malicious software designed to threaten privacy and confidentiality

In a database, a group of related records is referred to as a(n) ________. A) memo B) field C) object D) table

D) table

All of the following were top cybercrimes reported to the IC3 in 2012 EXCEPT ________. A) identity theft B) non-auction scam C) advance fee fraud D) theft of services

D) theft of services

Which of the following is NOT a type of UTP cable you would use in a wired Ethernet home network? A. Cat 5E B. Cat 6 C. Cat 6A D. Cat 7B

D. Cat 7B

5. ________ is software that takes an existing Internet connection and turns it into a wireless hotspot. A. Netify B. Multiply C. Mobilefy D. Connectify

D. Connectify

Which of the following is NOT a typical disadvantage associated with databases? A. Databases can be expensive to set up. B. Databases are usually more complex to administer. C. Databases are more complex to construct. D. Database information cannot be changed once it is entered.

D. Database information cannot be changed once it is entered.

_______ interference is a type of signal interference in wired transmission media that can be caused by fluorescent lights or machinery with motors or transformers. A. Radio frequency interference B. Transitional C. Crosstalk D. Electromagnetic

D. Electromagnetic

Which is NOT a networking protocol? A. Apple File Protocol (AFP) B. NetBios Extended User Interface (NetBEUI) C. Internet Packet Exchange (IPX) D. HyperText Transfer Protocol (HTTP)

D. HyperText Transfer Protocol (HTTP)

cookies

A small text file that some websites automatically store a client computer's hard drive when a user visits the site.

Database Management System (DBMS)

A software environment (like Access) that lets us build a database file (AdventureWorks.accdb); it then controls our ability to sort, filter, query data & build forms for data entry and create reports for summary output from a database

whole-house surge protector

A surge protector that's installed on (or near) the breaker panel of a home and that protects all electronic devices in the home from power surges.

keystroke logger (key logger)

A type of spyware program that monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information.

digital signature

A unique digital code that can be attached to an e-mail message or document to verify the identity of the sender and guarantee the message or file has not been changed since it was signed.

logical port

A virtual communications gateway or path that enables a computer to organize requests for information (such as web page downloads and e-mail routing from other networks or computers

polymorphic virus

A virus that changes its virus signature (the binary pattern that makes the virus identifiable) every time it infects a new life. This makes it more difficult for antivirus programs to detect the virus .

stealth viruses

A virus that temporarily erases its code from the files where it resides and hides in the active memory of the computer.

macro virus

A virus that's distributed by hiding it inside a macro.

E-mail viruses

A virus transmitted by e-mail that often uses the address book in the victim's e-mail system to distribute itself.

A(n) _________ address is the address external entities use to communicate with your network. A. AL B. MAC C. WI D. IP

D. IP

What is another name for the physical address assigned to each network adapter? A. Network Access Control (NAC) B. Physical Address Control (PAC) C. Network Physical Address (NPA) D. Media Access Control (MAC)

D. Media Access Control (MAC)

A ______ is a network used by one person connected via wireless media. A. WAN B. LAN C. MAN D. PAN

D. PAN

________ are often equipped to act as hardware firewalls. A. Repeaters B. Switches C. Jammers D. Routers

D. Routers

Facial recognition is an example of ________ authentication. A. access B. photo C. verification D. biometric

D. biometric

A database schema is also called a(n)____. A. information system B. summary report C. relation D. data dictionary

D. data dictionary

In a network that uses the star topology, the signal that is sent to indicate a signal collision is called a ____. A. hit B. crash C. stop D. jam

D. jam

Which of the following causes interference when a cable is exposed to strong electromagnetic fields? A. EMI B. RFI C. STP D. IEEE

A. EMI

Which cable type is the most costly to install? A. Fiber-optic B. Twisted-pair C. ThinNet coaxial D. ThickNet coaxial

A. Fiber-optic

________ databases have the largest market share among the primary types of electronic databases. A. Relational B. Flat-file C. Multidimensional D. Object Oriented

A. Relational

Which of the following is the most commonly used client/server network topology? A. Star B. Cluster C. Ring D. Hierarchical

A. Star

Which of the following networks has high scalability? A. Star B. Ring C. Bus D. Hybrid

A. Star

35. Using your computer for non-work activities while you are being paid to do your job is known as ________. A. cyberloafing B. cybersleeping C. cyberlazing D. cyberbreaking

A. cyberloafing

In a database, a _______ is synonymous with a category of information A. field B. record C. row D. table

A. field

A Web address is stored as a(n) ________ field in a database. A. hyperlink B. text C. address D. memo

A. hyperlink

In a data warehouse, data gathered from sales, billing, and inventory departments are examples of ________ sources. A. internal data B. external data C. metadata D. exported data

A. internal data

A peer-to-peer network is an example of ______ administration. A. local B. wide area C. central D. corporate

A. local

A ________ is a set of rules for how information and communication are exchanged. A. protocol B. token C. switch D. packet

A. protocol

All of the following are categories of viruses, EXCEPT ________. A. snakes B. boot sector C. email D. encryption

A. snakes

The first electronic computer to use vacuum tubes instead of switches was the ____.

ABC

The ____ operator specifies that both of the search criteria must be true for the record to be selected.

AND

According to the video "How to avoid malware infections?", which of the following is an indication that you might be downloading malware?

All of the above

According to the video "What is a relational database?", which of the following is a reason to avoid redundancy?

All of the above

You can set up relationships between tables in a relational database to _____.

All of the above

You might be able to improve your computer's Experience Index score by ________.

All of the above

You might want to restore a single file from a backup if ________.

All of the above

____ are a segment of the IT industry.

All of the above

Foreign Key

An identifier attribute that is a unique primary key in another table and creates a relationship between two tables

spam filter

An option you can select in your e-mail account that places known or suspected spam messages into a folder other than your inbox.

adware

An program that downloads on your computer when a user installs a freeware program, game, or utility. Generally. adware enables sponsored advertisements to appear in a section of a browser window or as a pop-up ad.

spyware

An unwanted piggyback program that downloads with the software you want to install from the internet and then runs in the background of your system.

____ tools cloak a person's identity online.

Anonymizer

social engineering

Any technique that uses social skills to generate human interaction for the purpose of enticing individuals to reveal sensitive information.

hackers

Anyone who unlawfully breaks into a computer system (whether an individual computer or a network).

photo management software

Application software that allows users to view, organize, sort, catalog, print, and share digital photos.

business software

Application software that assists people in becoming more effective and efficient while performing their daily business activities.

travel and mapping software

Application software that enables users to view maps, determine route directions, and locate points of interest.

reference software

Application software that provides valuable and thorough information for all individuals.

____ refers to the ability of the system to be continuously accessible to all the people who use it.

Availability

Which type of virus was the famous Michelangelo virus? A) A worm B) A time bomb C) A script virus D) An e-mail virus

B) A time bomb

In a(n) ________ network, each node connected to the network communicates directly with every other node. A) Client/server B) Peer-to-peer C) Intranet D) Extranet

B) Peer-to-peer

Data ________ ensures that the data contained in a database is accurate and reliable. A) efficiency B) integrity C) redundancy D) consistency

B) integrity

In a Microsoft Access database, the Gettysburg Address would be stored in a(n) ________ field. A) text B) long text C) short text D) object

B) long text

With regard to computer protection, quarantining is defined as ________. A) updating your antivirus software B) placing a found virus in a secure area on the hard drive C) repairing an infected file D) deleting an infected file

B) placing a found virus in a secure area on the hard drive

P2P networks become difficult to manage when they are expanded beyond __________ users. A. 5 B. 10 C. 20 D. 50

B. 10

If a numeric field has a size of 5, which is the highest number it can hold? A. 5 B. 99999 C. 55555 D. 50000

B. 99999

________ is the maximum speed at which data can be transferred between two nodes. A. Throughput B. Bandwidth C. Band Speed D. Through Speed

B. Bandwidth

Which of the following devices sends data from one collision domain to another? A. Switch B. Bridge C. Link D. Band

B. Bridge

Which of the following networks is most known for data collisions? A. Star B. Bus C. Hierarchical D. Cluster

B. Bus

________ cable is NOT subject to electromagnetic interference or radio frequency interference. A. Twisted-pair B. Fiber-optic C. Polycarbonate D. Coaxial

B. Fiber-optic

A _________ keeps your computer safe by confirming who is trying to access it. A. Gateway B. Firewall C. Hub D. Switch

B. Firewall

A(n) _________ server tracks who is logging on to the network as well as which services on the network are available to each user. A. gateway B. authentication C. dedicated D. file

B. authentication

Which of the following is NOT a common network topology? A. star B. cluster C. bus D. ring

B. cluster

A _________ keeps your computer safe by confirming who is trying to access it. A. gateway B. firewall C. hub D. switch

B. firewall

A(n) _________ is used exclusively within a corporation or organization. A. VPN B. intranet C. extranet D. Internet

B. intranet

10. For the nodes on a network to communicate with each other and access the network, each node needs a __________. A. DSL modem B. network adapter C. network interface card D. router

B. network adapter

An _____ needs to be installed on each client computer and server connected to the network to provide the services necessary for them to communicate. A. application software B. network operating system C. protocol guideline D. switch

B. network operating system

Client/Server networks are controlled by a central server that runs a special piece of software called _______. A. Windows 7 B. network operating system (NOS) C. firewall D. firmware

B. network operating system (NOS)

In a database, ______ fields store numbers used to perform calculations. A. date B. numeric C. computational D. alphanumeric

B. numeric

A print server uses a print ____ as a software holding area for printing jobs. A. stack B. queue C. buffer D. heap

B. queue

If fair allocation of network access is a major requirement of the network, choose a _______ topology. A. cluster B. ring C. bus D. star

B. ring

The ends of the cable in a bus network use a(n)_____ to absorb a signal so that it is not reflected back onto parts of the network that have already received the signal. A. endcap B. terminator C. stopper D. block

B. terminator

Normal telephone cable is a type of ________. A. fiber-optic cable B. twisted-pair cable C. coaxial cable D. Ethernet cable

B. twisted-pair cable

When you purchase a textbook online from a site like www.amazon.com, you are participating in ____ e-commerce.

B2C

The ____ data type would be the right choice for a field designed to hold an MP3 file.

BLOB

A ________ relationship indicates that for each record in a table, there is only a single corresponding record in a related table. A) many-to-one B) one-to-many C) one-to-one D) many-to-many

C) one-to-one

Nontraditional data such as audio clips, video clips, pictures, and very large documents are called ________ data. A) enterprise B) structured C) unstructured D) multidimensional

C) unstructured

Rules for creating passwords include all of the following EXCEPT ________. A) keep your password a secret B) change your password frequently C) use a dictionary to find a lengthy word that is easy to remember D) use letters, numbers and symbols in your passwords

C) use a dictionary to find a lengthy word that is easy to remember

Data in a multidimensional database is organized in a _______ format. A. Linear B. Table C. Cube D. Cellular

C. Cube

For business networks, which of the following is NOT a main cable type? A. Twisted-pair B. Coaxial C. Duplex D. Fiber-optic

C. Duplex

. Which of the following is something a network adapter does NOT do? A. It uses high-powered signals so data can move easily over network transmission media. B. It allows or denies access to the computer in which it is installed. C. It verifies that all information transmitted from the computer is correctly received by the recipient. D. It breaks down data and puts it into packets.

C. It verifies that all information transmitted from the computer is correctly received by the recipient.

Rules for creating passwords include all of the following, EXCEPT ____. A. Keep your password a secret B. Change your password frequently C. Keep your password written down and stored in any easy-to-remember location D. Create a hard-to-guess password, with a combination of letter, numbers, and symbols

C. Keep your password written down and stored in any easy-to-remember location

3. A network used to communicate among devices close to one person is called a ________. A. MAN B. LAN C. PAN D. WAN

C. PAN

Which of the following is NOT a type of management information system (MIS) report? A. Detail B. Summary C. Redundancy D. Exception

C. Redundancy

All of the following operating systems support P2P networking, EXCEPT ________. A. Windows B. OS X C. Unix D. Linux

C. Unix

A ________ uses the public Internet communications infrastructure to build a secure, private network. A. LAN B. WAN C. VPN D. MAN

C. VPN

What is CSMA/CD? A. a type of network topology B. a special signal of a star network C. a method used to avoid data collisions D. the central communication device on a star or ring network

C. a method used to avoid data collisions

An individual trained in the design and building of databases is called a database ________. A. master B. technician C. administrator D. analyst

C. administrator

When a client computer connects to a network and requests the use of Microsoft Office 2010, the ______ server delivers the software to the client computer. A. communication B. database C. application D. file

C. application

Unstructured data such as video clips and pictures are known as _____ because of the way they are encoded. A. hyperlink fields B. multidimensional data C. binary large objects (BLOBs) D. metadata

C. binary large objects (BLOBs)

A _____ check compares the values of data in two or more fields to see whether those values are reasonable. A. correctness B. range C. consistency D. numeric

C. consistency

Management information systems (MIS) provide reports called __________, which show conditions that are unusual or need attention from users of the system. A. detail reports B. summary reports C. exception reports D. expert reports

C. exception reports

Using a network without the network owner's permission is known as ________. A. hijacking B. chillijacking C. piggybacking D. hybacking

C. piggybacking

A __________ virus changes its own code or periodically rewrites itself to avoid detection. A. multipartite B. stealth C. polymorphic D. polypertite

C. polymorphic

Ring networks use the ________ method avoid data collisions. A. packet screening B. active-check C. token D. passive-check

C. token

A(n) __________ is a way of retrieving information from one or more table that defines a particular subset of data. A. validation rule B. field constraint C. enquiry D. query

D. query

Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network. A. viewing B. Browsing C. filtering D. screening

D. screening

The file system used by Mac OS is ____.

HFS+

Thomas is a network expert, having mastered the finer points of network structure, topology, and geographical scope. He has built many different types of networks at home, school, and work. He is now designing a home network for his friend. Thomas's friend has indicated that he will accept the system that Thomas is constructing for him. However, he is concerned about security risks and wants to know what limits he can place on the system. Which of the following is NOT a true statement that Thomas can make to his friend?

He can't remove sharing from files that he no longer wants to share.

Which of the following is not a deterrent for new entrants into an industry?

High Profit Margin

Integrated Circuit

IC; a super-thin slice of semiconducting material packed with microscopic circuit elements, such as wires, transistors, capacitors, logic gates, and resistors

To configure a file server, open a browser from any workstation, enter the file server's ____ address, and provide the administrator ID and password.

IP

Until domain names are added to the DNS database, new sites can only be accessed by entering their numeric ____.

IP addresses

____ degrees focus on the computer equipment and software used by businesses.

Information technology

When downloading a file, the Download Complete dialog box contains all of the following buttons EXCEPT _______.

Install

Internet Explorer allows you to specify security levels for four security zones. These four zones are ________.

Internet, local intranet, trusted sites, and restricted sites

Web Server

Internet-based computer that accepts requests from browsers

The life cycle of a new computer product is shown in the accompanying figure, in which box C represents ____.

Introduction

Tom and Nancy were discussing programming languages and which ones to expect of their IT person. You are a programmer and think you can offer them some help in this area. They have some questions, and you agree to answer them. Tom and Nancy say they will be doing some Web-based programming. You tell them their IT person should have skills in ____.

Java

____ consists of a series of instructions that is embedded directly into an HTML document that instruct the browser to carry out specific actions or to respond to specific user actions.

JavaScript

multipartite virus

Literally meaning "multipart" virus; a type of computer virus that attempts to infect computers using more than one method.

____ is a special type of retailing in which a vendor takes orders by phone or from an Internet site, and then ships the product to consumers.

Mail order

home page

Main page of a web site; usually the first page.

portable media player

Mobile device on which you can store, organize, and play digital media.

A ____ is a term sometimes used to refer to the interconnection of personal digital devices or consumer electronics within a range of about 30 feet and without the use of wires or cables.

PAN

The first IBM PCs used ____ as an operating system.

PC-DOS

____ is the most widely used language for communication between computers and printers.

PCL

Adobe Reader works with files stored in standard ____ format.

PDF

Arithmetic logic unit (ALU)

Part of the CPU that performs all the arithmetic and logic functions for the computer; handles addition, subtraction, multiplication and division, and also makes logical and comparison decisions.

rootkit

Programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge. These programs are designed to subvert normal login procedure to a computer and to hide their operations from normal detection methods.

___ are smaller in size than enterprises and typically do not have an international presence.

SMBs

pretexting

The act of creating an invented scenario (the pretext) to convince someone to divulge information.

computer forensics

The application of computer systems and techniques to gather potential legal evidence; a law enforcement specialty used to fight high tech crime.

BI & the Data Warehouse

The data warehouse enables BI; it pulls disparate information into a single location to be cleaned & scrubbed for analysis

Management

The process by which organizational goals are achieved through the use of organizational resources.

A(n) enterprise information system supports a variety of large business activities such as inventory management, point-of-sale cash registers, e-commerce, payroll, and managerial planning.

True

A(n) subroutine (or procedure or function) is a section of code that is part of a program but is not included in the main sequential execution path.

True

An information system must support the needs of people who engage in many different organizational activities.

True

Another name for threat modeling is risk analysis.

True

Apple's FairPlay and Microsoft's Windows Media DRM are designed to protect music, movies, ebooks, and even television shows.

True

At the decision point, the computer does one of two things, based on the answer to the question in the decision box.

True

Because most digital devices are electronic, bits take the form of electrical pulses.

True

BitTorrent protocols dissect files into small chunks that might reside on different computers.

True

Bitmap graphics typically store as very large files because it must save information about each and every pixel.

True

Confidentiality is the obligation not to disclose willingly any information that should be kept private.

True

Currently, there are three personal computer platforms: PC, Mac, and Linux.

True

For portable satellite Internet service, a satellite dish can be mounted on a vehicle.

True

HTML is called a markup language because authors markup their documents by inserting HTML tags.

True

Heads are made of a hard ceramic material.

True

If a name field contains an entire name, it is difficult to individually manipulate the first name, last name, and middle initial.

True

If you do not specify an HTML format, Access uses the standard format.

True

In a dual boot system, to change operating systems, you have to reboot.

True

In a fixed-length field, when the data entered is shorter than the allocated field length, blank spaces automatically fill the field.

True

In a(n) relational database, relationships are specified by joining common data stored in the fields of records in different tables.

True

In object-oriented programming, a method is activated by a(n) message, which is included as a line of code.

True

In the GUI shown in the accompanying figure there are two application windows: calculator and word processor.

True

In the accompanying figure, the arrow symbolizes a data flow.

True

In the accompanying figure, the item on the right can be installed in an expansion slot inside the system unit of a desktop computer.

True

In the accompanying figure, the relationship shown in the top row is a one-to-many relationship.

True

In the maintenance stage of the hardware product life cycle, as supply and demand for product reach an equilibrium, the manufacturer might reduce the price to keep the product attractive to buyers.

True

In vector graphics software, the Arrange command can be used to manipulate the way objects are layered.

True

MiFi is a brand name for a compact, mobile, wireless router offered by Novatel Wireless.

True

Microwaves are electromagnetic signals that can be aimed in a single direction and have more carrying capacity than radio waves.

True

Mobile devices typically pinpoint your location using built-in GPS or triangulating your distance from nearby cell towers.

True

Most firewall software is preconfigured to block only unnecessarily open ports targeted by hackers.

True

Most operating systems require you to make some global sharing settings, then specify the particular files and folders you want to share.

True

Most routers supply a WAN port designed for an Internet connection.

True

Much of the power and flexibility of the Prolog language stems from its ability to sift through facts.

True

On Ethernet, data travels on a first-come, first-served basis.

True

On PCs, executable files have an .exe extension.

True

Once a drive has been mapped, it will be assigned a drive letter.

True

Once data is indexed, the computer can use the index as a pointer to the original data.

True

One defensive programming technique is to rewrite code to decrease its complexity.

True

Online backup services are also referred to as remote or managed backup services.

True

P2P file sharing allows users to obtain files from other users on the Internet.

True

Paint's Eraser tool changes the color that is set as the background color.

True

Programmers can offer a(n) patch to fix a defect in a software package that is already in the hands of consumers.

True

Programs in the Start Menus list can be opened with a single click.

True

Pseudocode is a mixture of English and a programming language.

True

Public key encryption uses one key to encrypt a message and another key to decrypt it.

True

RFID chips embedded in ID badges can be used to keep track of employees' locations in an office or manufacturing facility.

True

Researchers estimate that the most extensive search engines cover less than 20% of the Web.

True

Security specialists install and configure antivirus software and firewalls.

True

Solid state storage cards hold data without consuming power, so they do not lose data when the camera, for example, is turned off.

True

Some job hunting experts advise IT job seekers to spend no more than 50% of their total job hunting efforts online.

True

The ALU uses registers to hold data that is being processed.

True

The SDLC provides a general outline of how an information system evolves.

True

The accompanying figure represents the basic flow of information in an expert system and summarizes its capabilities.

True

The applications shown in the accompanying figure are examples of Web browsers.

True

The big bonus of portable WiMAX is that you use the same Internet service provider whether you are at home or on the road.

True

The color of each dot in a bitmap graphic is stored as a(n) binary number.

True

The computer industry encompasses those companies that manufacture computers and computer components.

True

The end of the dot-com bubble meant a decline in IT sector job openings.

True

The excerpt from an application specification shown in the accompanying figure describes in detail how the information system's software should process a particular task involving inventory data.

True

The inference engine requests information by asking questions and then makes a decision based on the information provided.

True

The item marked E in the accompanying figure is an Ethernet network port.

True

The logical data type is used for true/false or yes/no data.

True

The most commonly used touchscreen technology is a transparent panel coated with a thin layer of electrically conductive material that senses a change in the electrical current when touched.

True

The number of horizontal and vertical pixels that a device displays on a screen is referred to as its screen resolution.

True

The recipient of the e-mail in the accompanying figure is Ann Hill.

True

The results of statements that have been compiled are called object code.

True

The term server can refer to a combination of hardware and software.

True

To create a video DVD, you usually begin by selecting one or more completed videos that include soundtracks, transitions, titles, special effects, and so on.

True

To initiate the mapping process, right-click on a shared file and select "Map network drive".

True

Tracks and sectors are numbered to provide addresses for each data storage bin.

True

Trojans are computer programs that seem to perform one function while actually doing something else.

True

Using a slide rule, you adjust decimal places to represent larger numbers.

True

Using the Paint's Eraser tool it will erase all pixels with the set foreground color to the set background color.

True

Vector graphics files can be saved as bitmap files, but you lose the ability to easily move objects.

True

Viruses can damage files to the point that your computer can't access any data on its hard disk.

True

When a capacitor is off, it represents a zero bit.

True

When coding a button, double-clicking the button will bring up the code.

True

XML documents are not optimized for many operations you would customarily associate with databases, such as fast sorts, searches, and updates.

True

You must pay for a domain name.

True

zipped files

Type of compressed files that usually have a .zip extension.

user name

Unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user.

Susan is concerned about some of the laws affecting the IT industry. She is particularly interested in issues related to copyright and copyright violations. She cannot afford to go to an attorney but knows you have done some research on this topic and might be able to help. Susan wants to know which act extends copyright protection to all original works. You suggest she investigate the ____.

United States Copyright Act

Melissa has decided to obtain an e-mail account. Although she plans to use the e-mail account to communicate with her many friends, her main purpose in establishing it is to aid in the search for a job. She has a list of e-mail addresses for a group of potential employers. Melissa intends to e-mail her resume, along with a general message, to each of them. She will use the same message for all recipients. Melissa is concerned about the security of her computer, and she wants to avoid malicious exploits, which can work their way into her computer through various security holes. Which type of e-mail service has been the target of many such exploits?

Webmail

Melissa has decided to obtain an e-mail account. Although she plans to use the e-mail account to communicate with her many friends, her main purpose in establishing it is to aid in the search for a job. She has a list of e-mail addresses for a group of potential employers. Melissa intends to e-mail her resume, along with a general message, to each of them. She will use the same message for all recipients. Melissa is planning to travel a great deal in the coming weeks. She will not be taking her computer with her, but knows that the hotels she will be staying at have business centers with Internet-enabled computers. She plans to access her e-mail account every day so that she can quickly respond should she be contacted by a prospective employer. Which one of the following account types should she use?

Webmail

The number and variety of programs that run on ____ are unmatched by any other operating system.

Windows

When shopping for a computer, checking your computer, or working with an unfamiliar computer, you can use the ________ to assess its basic components and performance.

Windows Experience index

The ______ graphics format has no built-in compression.

Windows bitmap

A ____ provides programmers with tools to build substantial sections of a program by pointing and clicking.

VDE

The secure connection created between a user's computer and a company's network is called a(n) ___.

VPN tunnel

At the ACME Widget Company, the computers have started behaving weirdly. Chris noticed that his directory had some files that he didn't remember putting on his computer. Lesley noticed her computer was beginning to run very slowly, and Kim realized she was getting replies to emails she had not sent. The owner of the ACME Widget Company has contacted you to see if their company might have a computer security problem. ACME Widget Company is concerned it may have a ____, which is a self-replicating program designed to carry out some unauthorized activity on a victim's computer.

worm

Malware is a term that can be used to describe ___.

worms, rootkits, payload

If you have disabled file and printer sharing, __________.

you can still access a network router and the Internet

The downside of a compact installation is ________.

you might need to insert the distribution CD to use some features

dual-core

a CPU that includes two microprocessors on a single integrated circuit

You have been hired to create an information system for the TeaTime Tea House. You have met with the owner of the company to get a general idea of what they need and have decided to use the modified waterfall SDLC model. The company owner has requested a document that describes what you envision to be the objectives for the new information system. Which type of report will you create?

a System Requirements Report

search site

a Web site that provides a variety of tools to help you find information on the Web based on keyword searches

internet forum

a Web site where people post comments to discussion threads (topics) which can be read at any time by others who visit the forum

When uninstalling software you ________.

a and c

numeric keypad

a bank of keys on a keyboard with which you can input numbers, it is located on the right side of a keyboard and is similar to an adding machine or calculator

Window

a box or screen that displays information or a program. Windows usually consist of title bars, toolbar, menu bar, and status bar. a window will always have a Minimize button

Predictive Analytics

a branch of data mining that analyzes current and historical data to predict future trends

MiFi

a brand name for a compact, mobile, wireless router offered a Novatel Wireless

Wiki

a collaborative document posted on the Web that can be viewed and changed by users

suite

a collection of application software programs developed by the same manufacturer, bundled together and sold at a price that is usually less than the cost of purchasing each program individually

BLOB (Binary Large Object)

a collection of binary data stored in a single field of a database

computer network

a collection of computers and related devices, connected in a way that allows them to share data, hardware, and software

database

a collection of organized data that allows access, retrieval, and use of data

Protocol Suite

a combination of protocols working together

monitor (or display screen)

a common output device that displays text, graphics, and video

WAP (Wireless Application Protocol)

a communications protocol that provides Internet access from handheld devices, such as cell phones

Hypertext Transfer Protocol (HTTP)

a communications standard that is used to transport Web pages over the Internet

hard drive

a computer storage device that contains a large-capacity hard disk sealed inside the drive case

zombie

a computer that is controlled remotely and can be used to help spread viruses, spyware, and spam

Satellite Modem

a device that modulates the data signals from a computer into a frequent band that can be carried to the satellite dish

modem

a device that sends and receives data to and from computers over cable, satellite, or telephone lines

router

a device used by LANs and found at each intersection on the Internet backbone that examines the IP address of incoming data and forwards the data toward its destination (also called network router)

digital video recorder

a device used to record video in digital format directly to a hard drive, without the need for videotape

input device

a device, such as a keyboard or mouse, that gathers input and transforms it into a series of electronic signals for the computer

output device

a device, such as a monitor or printer, that displays, prints, or transmits the results of processing from the computer memory

chat group

a discussion in which a group of people communicates online simultaneously

monitor

a display device that forms an image by converting electrical signals from the computer into points of colored light on the screen; usually a computer's primary output device

web page

a document connected to the World Wide Web and viewable by anyone connected to the internet who has a web browser

DNS Cache Poisoning

a domain name server that malfunctions or is hacked and then redirects users to the wrong Web site

backup

a duplicate data file which may be used to restore information in the event of a power failure or other data loss

scroll wheel

a feature on some mouse pointing devices; rolling the wheel enables you to quickly move a page up or down within a window

icon

a graphic representation of an object that you can click to open that object

Entity-Relationship Diagram

a graphic that shows the relationship between record types

Computer Network

a group of computers linked together to share data and resources

network

a group of two or more computers (or nobes) connected to chare information and resources

Phishing

a hacker poses as a legitimate representative of an official organization such as an ISP, a bank, or an online payment service in order to persuade you to disclose highly confidential information

peripheral

a hardware device connected to a computer, but not located within the system unit, such as a monitor, printer, or mouse

DSL (Digital Subscriber Line)

a high-speed, digital, always-on, Internet access technology that runs over standard phone lines

Domain Name System (DNS)

a huge database that has unique IP addresses entered into them

toogle key

a keyboard key that switches on or off each time it is pressed

Mainframe Computer

a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users

motherboard

a large printed circuit board located in the system unit to which all other boards are connected; the motherboard contains the central processing unit (CPU), the memory (RAM) chip, and expansion card slot

mainframe computer

a large, fast, and expensive computer used by businesses or government agencies to provide centralized storage, processing, and management for large amounts of data

supercomputer

a large, powerful computer typically devoted to specialized tasks. it is able to perform complex calculations quickly

Dimension

a later based on a data element, such as a product, place, or customer, that can be used to categorize data

zip drive

a magnetic storage device used to save and retrieve data on Zip drives

Cable Internet Service

a means of distributing always-on broadband Internet access over the same infrastructure that offers cable television service

Satellite Internet Service

a means of distributing always-on, high-speed asymmetric Internet access by broadcasting signals to and from a personal satellite dish

dot per inch (dpi)

a measurement of printer resolution

storage device

a mechanical apparatus that records data to and retrieves data from a storage medium

cloud computing

a method of offering Internet-accessible computing services ranging from office productivity applications to complex corporate data processing

Personal Computer

a micro-processor-based computing device designed to meet the computing needs of an individual

personal computer (PC)

a microcomputer designed for use by an individual user for applications such as Internet browsing, graphics, email, and word processing; the term PC is often used to refer to personal computers running the Windows platform

Computer

a multipurpose device that accepts input, processes data, stores data, and produces output, all according to a series of stored instruction

file

a named collection of data (such as a computer program, document, or graphic) that exists on a storage medium, such as a hard drive, flash drive, CD, or DVD (also called computer file or data file)

File

a named collection of data that exists one a storage medium

Wide area network (WAN)

a network composed of local area networks connected over long distances

ring (or token-ring) topology

a network configuration in which all devices are set up in a circular layout; data flows in a circular fashion, in one direction only

client/server network

a network consisting of client and server computers; often used in businesses

peer-to-peer (P2P) network

a network in which each node can communicate directly with every other node, and which is often used for home and small business network

local area network (LAN)

a network in which the nobes are located within a small geographic area

To connect to a LAN, a computer requires ____.

a network interface card

Internet Backbone

a network of high-capacity routers and fiber-optic communications links that provides the main routes for data traffic across the Internet

wireless network

a network that connects using radio waves instead of wires of cables

bus topology

a networking configuration in which all devices are connected to a central high-speed cable called the bus or backbone

___ is a system that attempts to imitate the behavior of the human brain.

a neural network

IrDA port

a port enabling data transmission through the use of infrared light wave; the devices sharing data require a clear line of site with no visual obstructions

audio port

a port that connects audio equipment to the sound card of a computer to facilitate the exchange of data

mobile devices

a port that connects to a standard telephone line, usually used to connect to the Internet or a local network, with a maximum speed of 56 kilobits per second (Kbps)

connectivity port

a port that enables a computer to be connected to other devices or systems, such as networks, modems, and the Internet

monitor port

a port used to connect a monitor to a computer's graphic processing unit, located on the motherboard or video card

digital video interface (DVI) port

a port used to connect an LCD monitor to a computer in order to use a pure digital signal

s-video port

a port used to connect ancillary video equipment, such as a television or projector to a computer

FireWire port

a port used to send data at rates up to 800 megabits per second (Mbps), frequently used for digital cameras or digital video recorders

Ethernet port

a port, slightly larger than a telephone jack, that can transmit data at speeds up to 1,000 megabits per second (Mbps) and is usually used to connect to a cable modem or a network

tablet computer

a portable computer that features a screen that swivels and can be written on using advanced handwriting recognition software

tablet computer

a portable computing device featuring a touch-sensitive screen that can be used as a writing or drawing pad

USB flash drive

a portable solid state storage device featuring a built-in connector that plugs directly into a computer's USB port (also called USB drive)

instant messaging (IM)

a private chat in which users can communicate with each other using the computer to type messages in real time

performance monitor

a program that assesses and reports information about various computer resources and devices

worm

a program that is able to replicate and spread from computer to computer without human interaction

word processing software

a program used to create and edit written documents such as papers, and resumes

presentation software

a program used to create dynamic slideshows and generate speaker notes and audience handouts

spreadsheet software

a program with which you preform calculations and numerical analyses

computer

a programmable electronic device that can input, process, output and store

restore point

a record created by Windows XP for all of a computer's system settings

One-to-One Relationship

a record in one record type is related to only one record in another record type

Record Occurrence

a record that contains data

Data Warehouse

a repository for data from more than one database

Virtual Private Network (VPN)

a secured connection often used for accessing corporate networks from home or a customer's office

User ID

a series of characters that becomes a person's unique identifier

Password

a series of characters that verifies a user ID and guarantees that you are the person you claim to be

Stored Program

a series of instructions for a computing task can be loaded into a computer's memory

Computer Program

a series of instructions that tells a computer how to carry out processing tasks

email account

a service that provides an e-mail address and mailbox

Application Software

a set of computer programs that helps a person carry out a task

internet telephony

a set of hardware and software that allows users to make phone calls over the Internet, usually without a long-distance charge (also called Voice over IP (VoIP) )

program

a set of instructions used by a computer to perform certain tasks

file extension

a set of letters and/or numbers added to the end of a filename following a period that helps to identify the file contents or file type

filename

a set of letters or numbers that identifies a file. Consists of a name followed by a period, followed by a file extension.

Read Only Memory (ROM)

a set of memory chips located ont he motherboard that stores data and instructions that cannot be changed or erased; it holds all the instructions the computer needs to start up. also known as nonvolatile memory

blog

a shared on-line journal where people can post diary entries about their personal experiences and hobbies

email (electronic mail)

a single electronic message or the entire system of computers and software that handles electronic messages transmitted between computers over a communications network

chat room

a site on the internet where a number of users can communicate in real time (typically one dedicated to a particular topic)

sound card

a small circuit board that gives the computer the ability to accept audio input from a microphone, play sound files stored on disks and CD-ROMs, and produce audio output through speakers or headphones. Required for high-quality music, narration, and sound effects

cookies

a small text file containing information that identifies a visitor to the Web site

handheld computer

a small, pocket-sized computer such as the Apple iPhone, the BlackBerry Smartphone, and the Hewlett-Packard iPAQ, designed to run on its own power supply and provide users with basic applications

flash drive

a small, portable, digital storage device that connects to a computer's USB port; also called a thumb drive, jump drive, or USB drive

key logger

a software program or hardware device that records every keystroke made on the computer

Web browser

a software program that runs on your computer and helps you access Web pages (also called browser)

___ is a collection of individual programs available together as a unit.

a software suite

Keylogger

a software that secretly records a user's keystrokes and sends the information to a hacker

password

a special set of characters used to restrict access to a computer or network

Microcontroller

a special-purpose microprocessor that is built into the machine it controls

Field Validation Rule

a specification that the database designer sets up to filter data entered into a particular field

backup tape drive

a storage device used to save data to tape resembling audiocassetts

Extended ASCII

a superset of ASCII that uses eight bits to represent each character

text messaging

a system used to send messages of 140 to 160 characters or less using your smartphone or mobile device ( also called (SMS) Short Message Service)

Field Format

a template that adds the correct formatting as data is entered

To transport data over a Wi-Fi network, each device must have ________.

a transceiver

wiki

a type of Web site that allows anyone visiting the site to change its content by adding, removing, or editing the content.

digital camera

a type of camera that saves photographs in a digital format rather than one film

scareware

a type of malware that downloads onto your computer and tries to convince you that your computer is infected with a virus or other type of malware

laser

a type of printer that uses a drum, static electricity, and a laser to distribute dry ink or toner on the surface of the paper

Optical

a type of storage process using a laser to read and write data; used by media such as CDs and DVDs

Magnetic

a type of storage process using magnetized film to store data; used by media such a floppy disk or Zip disk

Graphical User Interface (GUI)

a type of user interface that features on-screen objects, such as menus and icons, manipulated by a mouse. The GUI acronym is pronounced "gooey"

GUI

a user interface based on graphics (icons and pictures and menus) instead of text

file manager

a utility that performs functions related to file management

universal serial bus (USB) port

a versatile port used to connect a wide array of peripheral devices to a computer.

Hypertext

a way of linking information through the use of text and multimedia

When an online meeting takes place on the web, it is called ___.

a web conference

portal

a website that offers a broad array of resources and services, such as email, online discussion groups, search engines, and online shopping malls

A(n) ___ test is performed by end-users and checks the new system to ensure that it works with actual data.

acceptance

Web applications are ____.

accessed and run on the Web

A(n) ____ report is a customized report, generated to supply specific information not available in scheduled reports.

ad hoc

A(n) ________ report is a customized report, generated to supply specific information not available in scheduled reports.

ad hoc

In a wireless ____ network, devices broadcast directly to each other.

ad-hoc

___ is a program that displays an online advertisement in a banner or pop-up window on webpages, e-mail, or other Internet services.

adware

John and Andy are planning a software project. You tell John and Andy there are several software development methodologies that exist to help program designers. These can be classified into two groupings. You tell Andy and John that the ____ methodology is best for projects with a small core of developers working at a single location.

agile

A database audit can ____.

all of the above

A form can contain which of the following:

all of the above

A problem a hacker can cause after breaking into your computer might be ____.

all of the above

A recovery disk typically contains ________.

all of the above

A super-thin slice of semiconducting material packed with microscopic circuit elements is a(n) ____.

all of the above

A term which can refer to a person who manipulates computers with malicious intent is ____.

all of the above

A wireless router ________.

all of the above

Benchmark tests can be used ________.

all of the above

BitTorrent can be used to distribute ____.

all of the above

Examples of 3G technologies include ____.

all of the above

File management capabilities available from application software include ____ files.

all of the above

If networked, ____ can be accessed by an authorized LAN user.

all of the above

Now when you purchase a digital book from ____, you can read it on devices that include computers, tablets, and smartphones.

all of the above

When you install a software update ________.

all of the above

You have just secured a new job with a new firm that is very security conscious. You've been instructed to learn as much as possible about encryption to ensure the confidentiality of customer transactions as well as electronic communications about new research and development projects. After researching this topic, you find that encryption can be used in ____.

all of the above

____ may pose a threat to your computer's security and/or your privacy.

all of the above

Hierarchical Database

allows one-to-one and one-to-many relationships, linked on a hierarchical structure

Wiki

allows participants to modify posted material

Real-Time Messaging System

allows people to exchange shorts messages while they are online

presentation software

allows users to create visual aids for presentations to communicate ideas, messages, and other information to a group

P2P File Sharing

allows users to obtain files from other users located anywhere on the Internet

Portable Internet Access

allows you to easily move your access device, i.e. satellite dishes on moving van

Mobile Internet Access

allows you to use the Internet as you are on the go

The first phase of testing generally carried out by the software publisher's in-house test team is called ____.

alpha testing

Logical Data Type

also known as a Boolean or a yes/no data type is used for true/false data using minimal storage space

personal digital assistant (PDA)

also known as a handheld computer, a small device that enables a user to carry digital information

notebook computer

also known as a loptop, this microcomputer is smaller than a desktop and designed to be portable

keyboard

an arrangement of letter, number, and special function keys that acts as the primary input device to the computer

Relationship

an association between data that's stored in different record types

denial of service (DoS)

an attack caused when a large number of computers attempt to access a Web site at the same time, effectively overloading it and causing it to shut down

computer

an electronic device that accepts input, processes data, stores data, and produces output

dot matrix

an impact printer, useful for printing multi-page forms

mouse

an input device that allows the user to select and move objects on the screen by moving it on a surface (also called pointing device)

stylus

an input device used to write on a tablet computer of PDA

mouse

an input used to enter commands and user responses into a computer

processor/microprocessor

an integrated circuit that contains the circuitry for processing data. It is a single-chip version of the central processing unit (CPU) found in all computers (also called microprocessor)

local area network (LAN)

an interconnected group of computers and peripherals located within a relatively limited geographic area, such as a home office, building, or campus

port

an interface through which external devices are connected to the computer

digital revolution

an ongoing process of social, political, and economic change brought about by digital technology, such as computers and the Internet

linux

an open-source operating system based on the UNIX operating system developed for mainframe computers

CD burner

an optical storage device capable of reading data from and writing data to a CD

Workstation

an ordinary personal computer connected to a network; or a powerful desktop computers used for high-performance tasks

A common malware popup _____.

announces that it has scanned your computer and found viruses

Many ____ sites act as relay stations to forward your searches to search engines without leaving a trail back to a cookie or IP address.

anonymizer

Apps

another name for software applications

Intrusion

any access data or programs by hackers, criminals, or other unauthorized persons

Domain Name Server

any computer that hosts the database of IP addresses

Authentication Protocol

any method that confirms a person's identity using something the person knows, something the person possesses, or something there person is

Nobe

any object connected to a network - may be a computer or a peripheral device

malicious software/malware

any program or set of program instructions that is designed to surreptitiously enter a computer and disrupt its normal operations. malicious software, including viruses, worms, and Trojan horses, is created and unleashed by individuals referred to as "hackers" or "crackers." (also called malware or malicious code)

note taking software

application software that enables users to enter typed text, handwritten comments, drawings, or sketches anywhere on a page

PIM

application software that includes appointment calendar, address book, and notepad (personal information manager)

megabyte (MB)

approximately one million bytes; a unit of measure for memory and storage apace

Ports listed in a Netstat report as LISTENING _____________.

are open and ready to accept incoming traffic

Signed ActiveX controls ________.

are safer than unsigned ActiveX controls

Storage

area where data can be left on a permanent basis when it is not immediately needed for processing

A router uses DHCP to ________.

assign IP addresses to workstations

Your cable Internet service uses DHCP to ________.

assign an IP address to any router that requests one

DFDs are commonly used by development teams that follow the ____________ approach to systems analysis and design.

b and c

John is considering getting a college degree in the IT field. He is confused about which degree he needs. Connie said she would help him by offering some guidance. John is interested in advancement opportunities when he graduates. Connie should advise him that it would be best to get at least a(n) ____ degree.

bachelor's

A(n) ________ set of DFDs exists when the data flows coming into and going out of a process at one level correspond to the those at the next level.

balanced

Data Processing

based on an input processing-output cycle

Data transmission speeds are typically expressed as ____.

bits

On a DFD, a(n) __________ process has inputs, but no outputs.

black hole

In the Visual Basic program editor, the command words are ______.

blue

After Microsoft's share of the total personal computer operating system market, the remaining share is taken up by ____.

both a and b

When installing a PC application, most ____ for new software are placed in the folder you specify.

both a and b

A mini-application that displays information on your desktop is a ____________________.

both a widget and a gadget

A laptop can ____.

both a. and b.

Hot plugging is allowed with what kind of devices?

both b and c

A ____ attack uses password-cracking software.

brute force

The term ____ is a technical term for the region of memory that holds data waiting to be transferred from one device to another.

buffer

___ includes several types of applications and technologies for acquiring, storing, analyzing, and providing access to information to help users make more sound business decisions.

business intelligence

Anonymous FTP

can be accessed by logging in without a password by using the user ID "anonymous"

Carpal tunnel syndrome is a condition whose effects are made worse by keyboard use. The accompanying figure represents a hand. Box C indicates the ____.

carpal bones

smartphones

cell phones with additional computing capabilities or the ability to access the Internet

A formula can contain ____ and mathematical operators.

cell references

The processor is also called the ___.

central processing unit (CPU)

Personal Computing

characterized by small, standalone computers powered by local software

The telephone system uses a technology called ____, which establishes a dedicated, private link between telephones for the duration of a call.

circuit switching

If you want the Stop button in a Visual Basic program to act as the Exit control, you would place the command End in the __________ event subroutine for the Stop button.

click

To sort the records displayed in an Access table you can _________.

click the column header for the field you want as the sort key

Anonymizer Tools

cloak a person's identity even make it possible to exercise freedom of speech in situation where reprisals might repress it

Before installing software, it is a good idea to ________.

close all applications

Which of the following Web-based applications is NOT sometimes characterized as Web 2.0?

cloud computing

Web 3.0

cloud computing and other new technologies are likely to further change the way we use the Web

Social Media

cloud-based applications design for social interaction and consumer-generated content

___ consists of a single copper wire surrounded by at least 3 layers.

coaxial cable

The first digital computers were built during World War II for ____.

code breaking

software suite

collection of individual programs available together as a unit

data

collection of unprocessed items which can include text, pictures, numbers, audio, or video

Embedded computers

components of larger products, devices that perform per-defined tasks using specially programmed processors

In some tables, the primary key consists of multiple fields called a ___.

composite key

Before sending a large attachment in an e-mail, you can use a(n) ____ to shrink it.

compression program

Data Mining

computer algorithms that analyze information to discover previously unknown and potentially useful information, including relationships and patterns

input devices

computer hardware used to enter data and instructions into a computer; examples include the keyboard, mouse, stylus, scanner, microphone, and digital camera

output devices

computer hardware used to retrieve processed data and information from a computer; examples include the monitor, printer, and speakers

system software

computer programs that help the computer carry out essential operating tasks, such as an operating system

portable computer

computer that is small and light enough to be carried from one place to another, including notebook computers, laptop computers, netbooks, and tablet computers

___ tools are designed to support one or more activities of system development.

computer-aided software engineering (CASE)

System software is designed to accomplish ____ tasks.

computer-centric

Flat File

consists of a single, two-dimensional table of data elements

Numeric Data

consists of numbers that can be used in arithmetic operations

Database Index

contains a list of keys, and each key provides a pointer to the record that contains the rest of the fields related to that key

Fixed-Length Field

contains a predetermined number of characters or bytes

Modem

contains circuitry that converts the data-carrying signals from your computer to signals that can travel over various communications channels

electronic storefront

contains product descriptions, graphics, and shopping cart.

Report Template

contains the outline or general specifications for a report

Field

contains the smallest unit of meaningful information

Defragmenting reorganizes the files on a disk so that they are located in ___ access time.

contiguous sections, which speeds

Buttons, icons, and menus are examples of ____________ that you can add to Visual Basic programs.

control

When using a VDE, a ____ is a screen-based object whose behavior can be defined by the programmer.

control

The ___ is the component of the processor that directs and coordinates most of the operations in the computer.

control unit

user interface

controls how you enter data and instructions and how information is displayed on the screen

Voiceband Modem

converts the signals from your computer into audible analog signals that can travel over telephone lines

Cable Modem

converts your computer's signal into one that can travel over the CATV network

Jessica likes to participate in B2C e-commerce, but recently has had a number of friends who have had problems shopping online. She wonders if it is safe to shop online and just how much she is compromising her privacy by doing so. Jessica is justifiably worried about the security of the personal information and credit card information she regularly supplies while shopping on the Web. In addition, she knows that merchants who market goods and services over the Internet sometimes secretly gather information and provide it to advertisers or other interested parties. As Jessica begins her research of just how shopping carts work, she is surprised to find that many e-commerce sites store information about her Web visits on her hard drive. What do these sites use to store visit information?

cookies

Many images on Web sites are __________.

copyrighted

In the broadest definition, a(n) ____ is a collection of information.

database

Jane works for a successful business that publishes a popular monthly magazine. She is responsible for ensuring that the business has the correct information systems in place to allow the business to operate efficiently and effectively. Jane knows she must implement a step-by-step plan that describes the methods her business will use to secure data against disaster and the guidelines that will be used to recover lost data if a disaster occurs. She will have to create a(n) ____.

disaster recovery plan

When you try to connect to a site that might be fraudulent, browsers such as Internet Explorer and Firefox _____.

display a red address bar

A(n) ___, which is an external device that attaches to a mobile computer or device, contains a power connection and provides connections to peripherals; it usually also includes slots for memory cards, optical disc drives, and other devices.

docking station

___ software provides means for sharing, distributing, and searching through documents by converting them into a format that can be viewed by any user.

document management

Paul decided to upgrade his computer system. He purchased a new optical disc drive to replace his old CD-ROM drive. He has decided to replace his old CRT display device and already upgraded his graphics card to support a more modern display device. He also plans to purchase a new printer to replace his old dot-matrix printer. What should Paul look for in a display device as a measure of image clarity?

dot pitch

Ink-jet printer resolution is measured by the number of ___ a printer can print.

dots per inch (DPI)

One way to open an application is to ________.

double-click its icon on the Windows desktop

The rate of data arriving at your computer is ____.

downstream speed

A(n) ____ printer can print on both sides of the paper.

duplex

The ____ Web publishing process generates customized Web pages as needed.

dynamic

Asynchronous Communications

e-mail form of communication

surge protector

electrical device inserted in a power line to protect equipment from sudden fluctuations in current

Microprocessor

electronic component that can be programmed to perform tasks based on data it receives

memory

electronic components in a computer that store instructions waiting to be executed and data needed by those instructions

computer

electronic device operating under the control of instructions stored on its own memory, that can accept data process data according to specific rules produce results and store results for future use

mobile devices

electronic devices that fit into the palm of your hand, such as personal digital assistants (PDAs), calculators, smart phones and other cell phones, electronic organizers, and handheld games

phishing

email that masquerades as an authentic entity such as a bank or credit card company, requesting confidential information

The significance of ____ data is that it cannot be intercepted by corporate spies or government censors.

encrypted

Wireless ____ scrambles the data transmitted between wireless devices and then unscrambles the data only on devices that have a valid key.

encryption

A(n) ___ is a programmed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.

encryption key

A(n) ____ media player is a handheld device designed for playing music and videos, which offers a camera, access to the Internet, and a variety of apps.

enhanced

Many large companies use the word(s), ___, to refer to the huge network of computers that meets their diverse computing needs.

enterprise computing

A(n) ___ has a design that reduces the chance of wrist and hand injuries.

ergonomic keyboard

In the Visual Basic environment, clicking a button and pressing a key are examples of ________.

events

Unstructured File

every document has a unique structure and contains different kinds of data

As a manager, you are responsible for managing inventory. Every month you receive a low inventory report that lists stock items that have fallen below a minimum reorder point. This report is a type of ____.

exception report

You can compile your Visual Basic programs into _______ code so that people can run the program without the Visual Basic VDE.

executable code

In order to become more efficient, your company has restructured its management team. You are to convey these changes to the rest of the company. Amanda Roberts is now in charge of planning the organization's long-range goals for profitability, market share, and membership levels. She is now a(n) ____.

executive manager

Some information systems store or provide access to ____ generated by sources outside the organization.

external information

___ is a team-driven project management approach, in which a project leader is more of a participant and facilitator than a manager during the project.

extreme project management

In the accompanying figure, the items marked C represent ____.

fields

Real Data Type

fields that contain numbers with decimal places: prices, percentages, etc.

In the accompanying figure, mp3 is an example of a ____.

file extension

___ procedures include adding records to, modifying records in, and deleting records from a file.

file maintenance

In the accompanying figure, Marley One Love is an example of a ____.

file name

BitTorrent

file sharing protocol that distributes the role of a file server across a collection of dispersed computers

A computer file's location is defined by a ____.

file specification

Biometrics

fingerprint, facial features, or a retinal pattern

ROM chips, called ___, contain permanently written data, instructions, or information.

firmware

___ is a technology that sends resistance to a device in response to actions of the user.

force feedback

In the Mac OS, the data ____ contains data or the commands for a program.

fork

Files maintained by the Macintosh operating system can have two parts, called ____.

forks

In Access a(n) __________ displays one record at a time, similar to a Rolodex or card file.

form

In the world of Visual Basic a(n) _________ is a window in which a program runs.

form

When you start to create a program using Visual Basic, a fully-functional _______ is created for you.

form

A field ____ is a template that adds the correct formatting as data is entered.

format

Computers characterized by their use of microprocessors are ____-generation.

fourth

A(n) ___ is part of the motherboard and connects the processor to main memory.

front side bus

A(n) ____ system backup includes a copy of every file stored on your computer's hard drive. In addition to data files, it includes copies of all installed programs, settings, and the operating system.

full

The paragraph style that is used to assure paragraphs are aligned evenly on both the right and left is ____.

fully justified

With ___, the computer will detect human motions.

gesture recognition

Internet

global computer network originally developed as a military project and was then handed over to the National Science Foundation for research and academic use

If an application does not have its own uninstall routine, you can ________.

go to the Control Panel and look for the "Uninstall a program" link

Architects, mapmakers, designers, artists, and home users create drawings and sketches on a ___.

graphics tablet

Two devices on a network might have to negotiate their communications protocols through a process called ____.

handshaking

biometric device

hardware device used to support authentication; works by scanning and remembering a unique aspect of a user's various body parts (e.g., retina, iris, face or fingerprint) by using some form of sensing device such as a retinal scanner.

Physical access controls, such as locked doors and windows, usually are adequate to protect against ___.

hardware theft

firewalls

hardware, software, or both designed to prevent unauthorized persons from accessing electronic information

Normalization

helps database designers create a database structure that minimizes storage space and increases processing efficiency

Dictionary Attack

helps hackers guess a password by stepping through a dictionary containing thousands of the most commonly used passwords

System Software

helps the computer system monitor itself in order to function efficiently

C, BASIC, COBOL, and Java are examples of ____ programming languages.

high-level

All of the following are essential for secure business data transmitted over the Internet EXCEPT ____.

high-speed connections

To type the symbols marked on the tops of the number keys, you have to ________.

hold down the Shift key

System Board

houses all essential chips and provides connecting circuitry between them

___ are devices that provide a common central connection point for nodes on the network.

hubs and switches

Big Data

huge collections of data that are difficult to process, analyze, and manage using conventional database tools

___ combines text-based links with graphic, audio, and video links.

hypermedia

The primary disadvantage of multifunction peripherals is that ___.

if the multifunction peripherals break down, all functions are lost

home page

in a Web site, the page that is the first page you see when you go to the site. On an individual computer, the Web page that a browser opens each time it is started

server

in a client/server network, the computer that manages shared network resources and provides access to the client computer when requested

client

in a client/server network, this is the computer most people interact with to request information from the server and to perform many of the tasks that con be accomplished with a computer

screen (or window)

in a graphical user interface, the rectangular box that contains the program displayed on the monitor

Patches can be supplied as complete files or as ____ code segments.

in-line

If a single data management tool can be used to maintain many different files and databases, it must support data ____.

independence

When you enter search criteria, instead of looking through every file and folder on the storage medium, the search utility looks through the ___ first to find a match.

index

Search engine ____ software is designed to pull keywords from a Web page and store them in a database.

indexer

Data becomes ____ when it is presented in a format that people can understand and use.

information

John is considering getting a college degree in the IT field. He is confused about which degree he needs. Connie said she would help him by offering some guidance. John is also interested in the application of computers to business processes. If he wants to focus on computer equipment and software used by businesses and organizations, Connie should advise him to major in ____.

information technology

scanner

input device used to convert hard copy documents or images into digital files

joysticks

input devices used to control actions and movements within computer games

microphones

input devices used to digitally record sound

In the accompanying figure, B represents ____.

input or output

A(n) ___ message is a real-time Internet communication, where you exchange messages with other connected users.

instant

Sniffing

intercepts information sent out over computer networks

central processing unit

interprets and carries out instructions that operate a computer

processor

interprets and carries out the basic instructions that operate a computer

green computing

involves reducing the environmental waste generated when using a computer

back door

is a hidden method for bypassing normal computer authentication systems

Every wireless router ________.

is shipped with the same default settings, so you have to configure it for your network

Jimmy recently graduated and is looking for his first full-time job. He has turned to you for help. Jimmy knows you recently graduated and got a new job. He thinks you can give him some advice to help with his search. You tell Jimmy that the elements of an effective resume include ____.

it should be easy to read

The strengths of Mac OS do NOT include ____.

its use of resource forks

iPads, iPhones, and iPods are only allowed to download apps from the iTunes App Store, and while apps are available from other sources, using them requires an unauthorized change to the device's software called a(n) ____.

jailbreak

spam

junk or unsolicited e-mail

1,024 bytes is a ____.

kilobyte

In the accompanying figure, the item marked B is a(n) ____.

label

Initially sales were slow for the personal computer because of ____.

lack of software

Satellite data transport is subject to ____ delays of one second or more, which occur as your data is routed between your computer and a satellite that orbits 22,200 miles above the Earth.

latency

A(n) ___ is an information system that has existed within the organization for an extended length of time and is relied upon heavily.

legacy system

All of the following are strengths of the database approach except ___.

less complexity

The Custom Level button in Internet Explorer's dialog box ___________.

lets you adjust specific settings for each security level, such as overriding the setting that blocks unsigned ActiveX controls

Examples of output that primarily contain text-based documents are ___.

letters, reports, and e-mail messages

___ technology works with specially coated optical disks to etch labels directly on the disk.

lightscribe

The hand icon shown in the accompanying figure is pointing to a ____.

link

Always-On Connection

linked to your ISP and is online whenever your computer and modem are on, even if you are not actively accessing the Internet

Fixed Internet Access

links your computer to an USP from a stationary point, such as a wall socket or roof-mounted antenna

Web site

location on the World Wide Web that contains information relating to specific topics

A ____ error occurs when a program fails to perform as intended due to an error in the design of the program.

logic

Traditionally, hard disks stored data using ___, which aligned the magnetic particles horizontally around the surface of the disk.

longitudinal recording

Hard disk storage technology can be classified as ____ storage.

magnetic

A ___ card is a credit card, entertainment card, bank card, or other similar cards, with a stripe that contains information identifying you and the card.

magnetic stripe

The computer begins executing a Java program by locating a standard method called ____.

main()

Network Service Providers (NSPs)

maintain backbone links (for example: AT&T, Sprint, Hurricane Electric, etc.)

virus

malicious code or program, usually installed on a computer without the user's knowledge or permission

In order to become more efficient, your company has restructured its management team. You are to convey these changes to the rest of the company. Due to the reorganization, Joe Smith will now supervise other employees, approve new products, and authorize new construction. Joe Smith is now a(n) ____.

manager

packaged software

mass produced copyrighted retail software that meets the needs of a wide variety of users

cloud

mass storage for programs and data on remote computers connected to the Internet or other network

Supercomputers use ___ for applications such as artificial intelligence and weather forecasting.

massively parallel processing

permanent memory

memory used by storage devices to retain data and information

In an e-mail message, such as the one found in the accompanying figure, the recipient's e-mail address and the message subject are found in the ____.

message header

A ___ is a website that allows users to post short text updates, usually between 100 and 200 characters.

microblog

An electronic component that can be programmed to perform tasks is a ____.

microprocessor

Data ____ refers to computer algorithms that analyze information to discover previously unknown and potentially useful information.

mining

___ is a service that provides television programs over the cellular network.

mobile TV

digital camera

mobile device that allows users to take pictures and stores the photographed images digitally, instead of on traditional film

A ____ bitmap would be displayed by manipulating the pattern of "off" and "on" pixels displayed on the screen.

monochrome

The last topic in the lab covered ________.

moving and copying

A processor that includes circuitry for two or more processing units is called a ____ processor.

multi-core

Touch screens that recognize multiple points of contact at the same time are known as ___.

multi-touch

___ allows users to record, compose, mix, and edit music and sounds.

music production software

___ is the code of acceptable behaviors users should follow while on the Internet.

netiquette

Grid Computing System

network of computers harnessed together to perform processing tasks

Text Data Type

normally assigned to fixed-length fields that hold character data: names, titles, etc.

Harry is concerned about Internet security. He knows very little about the subject but does know it has been in the news a great deal lately. He needs your advice. You and Harry are discussing firewalls. You explain that he has a firewall built into Windows. He says he has one that came with his virus protection. He should ____.

not enable the Windows firewall if his antivirus software firewall is activated

When starting a ________ computer, a single power button usually activates everything including the screen display.

notebook

To get maximum exposure for your resume in an online job database, you should focus on ____.

nouns

A(n) ____ is a unit of data that represents an abstraction or a real-world entity such as person, place, or thing.

object

Agnes is talking with Bert and Ernesto, and they are discussing object-oriented programming. Agnes is asking some detailed questions that Bert and Ernesto can't answer. You agree to help answer the questions. Ernesto then wants to know what you call a single instance of an entity, and you tell him that it is a(n) ____.

object

A(n) ____ paradigm is based on the idea that the solution for a program can be visualized in terms of objects that interact with each other.

object-oriented

FTP Client

offers an easy-to-use interface for accessing FTP servers

Routable IP Address

on that can be accessed by packets on the Internet

You should organize your tables so that the fields you use most frequently are ________.

on the left side of the data table

Chat

one-on-one messaging and group communications

Instant Messaging

one-on-one messaging referred to as chat

Web sites that offer storage space for backups are called ____ backup services.

online

OLAP

online analytical processing; a data analysis techniques that allows decision makers to quickly get answers to complex queries that encompass multiple factors, such as locations, revenue, time periods, and employee status

___ is the electronic equivalent of a user manual.

online help

The ____ in machine language is a command word for an operation such as add, compare, or jump.

op code

A shrink-wrap license goes into effect as soon as you ____.

open it

A(n) ___ is a type of storage media that consists of a flat, round, portable disk made of metal, plastic, and lacquer that is written and read by a laser.

optical disk

A(n) ____ is a group of people working together to accomplish a goal.

organization

Dimensional Database

organizes relationships over three or more dimensions

speakers

output devices that allow the user to hear any auditory signals the computer sends

multimedia projectors

output devices used to display information on a screen for veiwing by an audience

___ is a mass-produced, copyrighted retail software that meets the needs of a wide variety of users, not just a single user or company.

packaged software

The accompanying figure represents a CRT; in this drawing Box A points to the ____.

panel glass

Voice-overs and narrations are often recorded with a sampling rate of 11 KHz, which means that 11,000 samples are taken ____.

per second

As with an IP address, the components of a domain name are seperated by ___.

periods

nonvolatile

permanent storage, as in read only memory (ROM); data remains even when power is shut down

Static IP Address

permanently assigned IP address

___ helps home and small business users create newsletters, brochures, advertisements, postcards, greeting cards, letterhead, business cards, banners, calendars, logos, and web pages.

personal DTP software

A(n) ____ is a microprocessor-based computing device designed to meet the computing needs of an individual.

personal computer

A(n) ___ is a program that warns or blocks you from potentially fraudulent or suspicious websites.

phishing filter

Joseph is working in a modern office with speech recognition equipment, including a computer that is capable of both understanding and producing sounds resembling spoken words. His first step is to train the computer to recognize his speaking style, taking into account his accent, pronunciation, and idiomatic expressions. "Reh" and "gay" are examples of ____ that speech synthesizers string together to form words.

phonemes

With ___, you can view, organize, sort, catalog, print, and share digital photos.

photo management software

A ___ is a specific type of social networking website that allows users to create an online photo album and store and share their digital photos.

photo sharing community

A technology called ____ allows the processor to begin executing another instruction before it completes the previous instruction.

pipelining

All of the following factors contribute to bitmap image size EXCEPT ______.

pixelation

The dots that make up a bitmap are referred to as ______.

pixels

You have been hired to create an information system for the TeaTime Tea House. You have met with the owner of the company to get a general idea of what they need and have decided to use the modified waterfall SDLC model. The first phase of the SDLC is ____.

planning

A ___ is recorded audio stored on a website that can be downloaded to a computer or portable media player.

podcast

linux

popular multitasking UNIX type operating system

A(n) ___ is an external device that provides connections to peripherals through ports built into the device.

port replicator

A(n) ______________ is an automated software utility that monitors a network looking for computers that are vulnerable to unauthorized intrusions.

port scanner

flash memory

portable, nonvolatile memory, that uses electronic, solid-state circuitry

Network services such as the Web, ftp, and e-mail operate from ____.

ports

A ____ is a sudden increase or spike in electrical energy, affecting the current that flows to electrical outlets.

power surge

Some organizations continually review their ___, which is a ratio that measures how much power enters the computer facility, or data center, against the amount of power required to run the computers.

power usage effectiveness (PUE)

Some phones use ___, where you press one key on the keypad for each letter in a word and software on the phone predicts the word you want.

predictive text input

DSL Filter

prevents voiceband signals from interfering with DSL signals

TCP/IP

primary protocol suite responsible for message transmission on the Internet

Many organizations adopt the ___ policy, where users access privileges are limited to the lowest level necessary to preform the tasks.

principle of least interest

The use of automated software to locate computers that are vulnerable to unauthorized access is a port ____.

probe

The traditional approach to programming uses a(n) ____ paradigm.

procedural

On a DFD, the label "Acquire new books" would appear on a(n) ________.

process

Digitization

process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices

On a DFD, explosions only take place within _________.

processes

A(n) ________ is similar to a word processor, but includes features that streamline many programming tasks.

program editor

system software

program that controls or maintains the operation of a computer or its software

search engine

program that uses keywords to find information on the Internet and return a list of relevant documents

Application software

programs with which you accomplish tasks such as word processing, photo editing, or sending e-mail, and use the computer in a productive manner

___ allows a user to plan, schedule, track, and analyze the events, resources, and costs of a project.

project management software

In larger organizations, users write a formal request for a new or modified information system, which is called a ___.

project request

___________ define the appearance of controls and the actions that controls are supposed to perform when a program runs.

properties

Cloud Computing

provides access to information, applications, communications, and storage over the internet

online service provider

provides connection and a lot of unique services like its own version of a web browser

Solid state storage, also called flash memory storage, ____.

provides fairly fast access to data

A document management system ___.

provides for storage and management of a company's documents

Using statistical analysis, ___ can identify and predict product defects and problems with the company's processes.

quality control software

A search engine's ____ looks for your search terms in the search engine's indexed database and returns a list of relevant Web sites.

query processor

software parches

quick software fixes provided to resolve an error found in program code until a sofeware update can be issued

RFID is a technology that uses ___ to communicate with a tag placed in or attached to an object, animal, or person.

radio signals

When using word processing software to analyze the reading level of your document, you should use a ____.

readability formula

Mobile Broadband

real Internet, cellular service providers offer data services

Application software is designed to accomplish ____ tasks.

real-world

ICANN (Internet Corporation for Assigned Names and Numbers)

recognized by the US and other governments as the global organization that coordinates technical management of the Internet's Domain Name System

In the accompanying figure, the index card represents a single database ____.

record

Traceroute

records a packet's path in addition to its round-trip speed

A centralized approach to information systems usually ___ manageability.

reduces costs of maintenance and increases

The goal of normalization is to minimize data ____.

redundancy

Sally has been using spreadsheets in making purchasing decisions at her job. She is getting a promotion, and has been asked to train James as her replacement. James has never used a spreadsheet. Sally tells James that if he wants the cell reference to automatically change when moved or copied, he should use a(n) ____ reference.

relative

Computer systems are ____ when they can be counted on to function correctly.

reliable

FTP Server

resides on a computer containing file that remote users might want to access

An image composed of a grid of 480 horizontal dots and 200 vertical dots has a(n) ______ of 480 x 200.

resolution

warmboot

restart your system without having to turn off the power.

The first topic in the lab focuses on ________.

restore points

The last topic in the lab is about ________.

restoring data from a backup

The accompanying figure represents a virtual private network. In this figure, B points to a(n) ____.

router

When viewing a database table, each record is represented by one ______.

row

Users subscribe to a cloud storage service to ___.

save time by storing large files instantaneously, allow others to access their files, and store offsite backups of data

Windows can be configured to display a(n) ________ after a specified period of inactivity.

screensaver

utility

segment of memory or storage i n which items are placed while waiting to be transferred from an input or output device

Semiconducting Materials

semiconductors, or silicon and germanium, are substances with properties between those of a conductor and an insulator

Ping (Packets Internet Groper)

sends a signal to a specific Internet address and waits for a reply

A ____ control structure changes the order in which instructions are carried out by directing the computer to execute an instruction elsewhere in the program.

sequence

During ____ execution, the first instruction in the program is executed first, followed by the second.

sequential

Database ____ software is designed to manage billions of records and several hundred transactions per second.

server

Systems exhibit ____ when they are easily upgraded or repaired.

serviceability

As related to the use of computers, ___ is defines as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.

social engineering

spyware

software designed to capture personal and confidential information that resides on a computer and then sends it elsewhere

spam filter

software that automatically routes advertisements and other junk mail to the Deleted Items folder maintained by your email client; can be effective for blocking unwanted emails

Tom and Andy are discussing file storage. They are working on a major project and want to be sure they can store their files in a way so they can easily be found and shared with others. Tom asked Andy if he converts a file, will it be identical to the original? Andy should tell him ____.

sometimes

A table's ____ order is the order in which records are stored on disk.

sort

The human-readable version of a program is called ____.

source code

sound system

speakers and a circuit board (sound card) used to create high-quality music, narration, and sound effects using a computer

control keys

special keys, such as Ctrl, Alt, or Esc, used to increase keyboard functionality or provide shortcuts

If you have dialed Directory Assistance lately to obtain a telephone number, you have probably encountered ____.

speech recognition

Using an index _______________.

speeds up searching and sorting operations

In the threat model STRIDE, the S stands for ____ or pretending to be someone else.

spoofing

A(n) ____ strip monitors the electrical current that passes from the outlet to all the devices plugged into the strip.

surge

A ____ is a network device that intelligently facilitates communication among multiple devices on a network.

switch

Data

symbols that represent facts, objects, and ideas

In ____ key encryption, the key used to encrypt a message is also used to decrypt the message.

symmetric

A ____ error occurs when an instruction does not follow the grammar of the programming language.

syntax

The purpose of the ___ is to assess the feasibility of each alternative solution and then recommend the most feasible solution for the project.

system proposal

___ consists of the programs that control or maintain the operations of the computer and its devices.

system software

operating system (OS)

system software that controls the computer's use of its hardware resources, such as memory and disk storage space

operating system (OS)

system software that controls the way in which a computer system functions, including the management of hardware, peripherals, and software; Microsoft Windows XP is an operating system

The ____ is the case that holds the computer's main circuit boards, microprocessor, memory, power supply, and storage devices.

system unit

Using Access, you can create a report to display data from a(n) ________.

table or query

According to the video "What is a relational database?", within the database, we can organize the data into storage containers called ________.

tables

On larger computers, tape cartridges are mounted in a separate cabinet called a(n) ___.

tape library

A manufacturing ____ participates in the fabrication of computer chips, circuit boards, system units, or peripheral devices.

technician

digital technology

technologies that work using digital electronics such as computers, communications networks, the Web, and digitization

VoIP (Voice Over Internet Protocol)

technology in which a broadband Internet connection is used to place telephone calls instead of the regular phone system

liquid crystal display (LCD)

technology used in flat panel monitors, resulting in thinner and lighter monitors

Voice Over Internet Protocol (VoIP)

technology used to send and receive voice conversations over the Internet (also called Internet telephony)

Dynamic IP Address

temporarily assigned IP address

volatile

temporary storage, as in random access memory (RAM): data is erased when power is shut down or when you close a program

The ____ data type would be appropriate for a fixed-length field designed to hold a person's name.

text

domain name

text version of an IP address

Analog Data

text, numbers, graphics, sound, and video that are represented using an infinite scale of values

Digital Data

text, numbers, graphics, sound, and video that have been inverted into discrete digits such as 0s and 1s

Sally often travels for her business. She needs a way to access the Internet while away from home. She has come to you for help. Sally has heard that cellular data service has poor quality. You tell her ____.

that it depends on the generation of technology being used

input

the act of entering data into a computer

hardware theft

the act of stealing computer equipment

double-click

the action of clicking the left mouse button twice in rapid succession while keeping the mouse still

right-click

the action of clicking the right mouse button

drag

the action of moving something from one location on the screen to another; the action of dragging includes releasing the mouse button at the desired time or location

multi-task

the action of performing more than one task at the same time

Data Redundancy

the amount of data that is duplicated in a database

Database Structure

the arrangement of fields

memory

the computer circuitry that holds data waiting to be processed, stored, or output

Microcomputer

the computer most users are familiar with, ranging in size from large desktop systems to handheld devices

The top-level DFD is referred to as the __________.

the context DFD

information processing cycle

the cycle composed of the four basic computer functions: input, process, output, storage

dot pitch

the diagonal distance between adjacent pixels, measured in millimeter

Latency

the elapsed time for data to make a round trip from point A to point B and back to point A

hardware

the electronic and mechanical devices in a computer system

supercomputer

the fastest and most expensive type of computer. At the time it is built, one of the fastest computers in the world; can tackle tasks that would not be practical for other computers such as breaking codes and modeling worldwide weather systems

user interface

the feature of a computer operating system that enable you to interact

Data Representation

the form in which data is stored, processed, and transmitted

link

the fundamental tool for navigating Web pages; you click a text or graphic link to jump to a location in the same Web page, open a different Web page, or go to a different Web site (also called hyperlink)

keyboard

the hardware device used to input typed data and commands into a computer

computer system

the hardware, peripheral devices, and software working together to input data, process data, store data, and produce output

input

the information that is conveyed to a computer

program

the instructions that tell a computer how to perform a specific task such as word processing, graphics, or email (also called application software or software)

software

the instructions that tell a computer how to perform tasks, such as system software and application software

information processing cycle

the interactions of humans and computers that consist of input, processing, output, and storage.

function key

the keys numbers F1 through F12, located above the numeric key on a keyboard that have different functions depending upon the software program in use

network topology

the layout and structure of a computer network

display device

the main output device for a computer; presents visual information on a screen such as a computer monitor

processing

the manipulation of data (symbols that represent facts, objects, and ideas) using a systematic series of actions

Operating System

the master controller for all the activities that take place within a computer

resolution

the measurement used to assess the clarity of an image on a monitor; determined by pixel density

hardware

the mechanical, magnetic, electronic, and electrical components making up a computer system

Cardinality

the number of associations that can exist between two record types

Processor speed is typically measured by ________.

the number of mathematical operations that can be carried out per second

Mac OS

the operating system designed specifically for Apple's Mac computers

Microsoft Windows

the operating system found on most microcomputers

Sort Order

the order in which records are stored on a disk

floppy disk drives (or floppy drive

the original storage device for a microcomputer, which enables portable, permanent storage on floppy disk

control unit

the part of the CPU responsible for obtaining instructions from the compute's memory; the control unit interprets the instructions and executes them, thereby coordinating the activities of all the other computer components

Central processing unit (CPU)

the part of the computer responsible for controlling all the commands and tasks that computer performs, acting as the brain of the computer

hardware

the physical components of the computer and any equipment connected to it

storage medium

the physical material used to store computer data, such as a flash drive, a hard drive, USB flash drive, or an optical disc

Download

the process of copying a file from a server to your own client computer

Upload

the process of copying files from your client computer to a server

burn

the process of recording data to optical media such as a CD or DVD

boot

the process of starting up a computer

boot process

the process of starting up a computer

uploading

the process of transferring files from your computer to a server on the internet.

Network Address Translation (NAT)

the process your router uses to keep track of packets and their corresponding private or public IP addresses

Downstream Speed

the rate of data downloaded to your computer

Upstream Speed

the rate of data that is uploaded from your computer to the Internet

output

the results produced by a computer (for example, reports, graphs, documents, pictures, and music)

refresh rate

the speed at which the pixels are re-illuminated, measured in cycles per second and expressed as hertz (Hz)

system software

the st of programs that enable a computer's hardware devices and program software to work together; it includes the operating system and utility programs

Record Type

the template for a record

enterprise computing

the term large companies use to refer to the use of huge network computers that meets their diverse computing needs

system unit

the tower, box or console that contains the critical hardware and electrical components of a computer

A vacuum tube can have ____ state(s).

two

In the SQL query in the accompanying figure, ____ tables will be accessed.

two

ink-jet

type of printer that uses a special nozzle and ink cartridges to distribute liquid ink on the surface of the paper

spam

unwanted electronic junk mail that arrives in your Inbox

___ is the process of transferring documents, graphics, and other objects from your computer to a server on the internet.

uploading

Case Sensitive Database

uppercase letters are not equivalent to their lowercase counterparts

Nancy has several types of video media originating from a variety of devices, including an analog video camera, a DVR (digital video recorder), and a TV. She also has video-editing software installed on her computer. Nancy is using codec software to reduce the size of some of her video files by allowing her to specify a compression ratio or bitrate. If she is very concerned with minimizing the size of her video files, she could ____.

use a high compression ratio

Ethernet networks ____.

use a nonproprietary technology, making Ethernet equipment available from a variety of vendors

To select five files that are not listed in sequence, ________.

use the Ctrl key

Integer Data Type

used for fields that contain whole numbers: quantities, repetitious, ranking, etc.

The type of system software designed to help you monitor and configure settings for your computer system equipment is ____ software.

utility

image veiwer

utility program that allows users o display, copy, and print the contents of a graphics file

In the accompanying figure, the item marked C is a(n) ____.

value

The process of converting analog video signals into a digital format is referred to as ____.

video capture

VMWare and Parallels Desktop software are examples of ____.

virtual machine software

If a program exceeds its allocated space, the operating system uses an area of the hard disk called ____ to store parts of a program or data file until they are needed.

virtual memory

With ___, users can view message details such as the length of calls and in some cases, read message contents instead of listening to them.

visual voicemail

___ is the computers capability of distinguishing spoken words.

voice recognition

Blog

web log or an online diary that is maintained by a person, company, or organization, and contains a series of entries on one or more topics

sectors

wedge-shaped sections of a hard disk drive, each measured from the center point to the outer edge

ROM BIOS is a small set of instructions that tells the computer all of the following EXCEPT ____.

what the data transfer rate should be

Spreadsheets are particularly useful for ____.

what-if analysis

Input

whatever is typed, submitted, or transmitted to a computer system

Identity Theft

when someone gains unauthorized access to your personal data and uses it illegally

Web 2.0

wikis, blogs, social networking

___ is a utility that detects and protects a personal computer from unauthorized intrusions.

windows firewall

Windows users can increase the size of memory through ___, which can allocate available storage space on removable flash memory devices as additional memory cache.

windows ready boost

3-D graphics software provides a set of tools for creating ____ that represent three-dimensional objects.

wireframes

bluetooth

wireless technology that uses radio waves to transmit data over short distances, and often used with mobile devices

An example of software most commonly associated with productivity software is ____.

word processing software

Data

words, numbers, sounds, or pictures that represent facts about people, events, things, or ideas

A slide rule is constructed of two ruler like bars that contain numeric scales.

False

A storage device that directly connects to a network is called network peripheral storage.

False

A ____ combines commercially available products with specialty hardware or software.

VAR

A small graphic for a Web page might have a(n) color depth of 150 x 100 pixels—150 pixels across and 100 pixels high.

False

A file extension is always the same as a file format.

False

A keyboard is an example of a pointing device.

False

A light switch is like a(n) analog device.

False

A scanner, like the one featured in the accompanying figure, creates a vector graphic.

False

A security package integrates several security modules to protect against malware.

False

workstation

(1) A computer connected to a local area network. (2) A powerful desktop computer designed for specific tasks.

____ networks contain servers as well as computers that individual users access and use. A. Client/server B. Peer-to-peer C. Switch D. CSMA/CD

A. Client/server

Megabyte

1,048,576 bytes (MB or MByte)

Which cable type is the most costly to install? A) Fiber-optic B) Twisted-pair C) ThinNet coaxial D) ThickNet coaxial

A) Fiber-optic

________ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table. A) Referential integrity B) Normalization C) Database consistency D) Record integrity

A) Referential integrity

________ databases are the most frequently used electronic databases. A) Relational B) Flat-file C) Multidimensional D) Object-oriented

A) Relational

A(n) ________ check determines whether a required field such as LastName was filled in. A) completeness B) range C) consistency D) alphabetic

A) completeness

A ________ is a group of related data that can be stored, sorted, organized, and queried. A) database B) spreadsheet C) memo D) macro

A) database

You can set a ________, which is automatically displayed in a field unless the user enters something different. A) default value B) relation C) field type D) numeric check

A) default value

A(n) ________ server is a server that stores and manages files for network users. A) file B) e-mail C) print D) database

A) file

A ________ topology is created when more than one topology is used to build a network. A) hybrid B) multiple-use C) fusion D) crossover

A) hybrid

FBI-related scams involve ________. A) people pretending to represent official organizations B) running auctions that do not exist C) convincing people to send money as a "good faith" gesture D) collecting funds and not delivering the goods

A) people pretending to represent official organizations

A(n) ________ is the portion of virus code that is unique to a particular computer virus. A) virus signature B) encryption code C) compression code D) virus pattern

A) virus signature

A(n) ________ takes advantage of file transport methods to spread on its own. A) worm B) script virus C) encryption virus D) macro virus

A) worm

In a relational database, what is a relationship? A. A link between tables that defines how the data are related B. The primary key in the database C. The links among databases D. The array of tables in a database

A. A link between tables that defines how the data are related

Which of the following is NOT a factor to consider when selecting network cabling? A. Cable diameter B. Interference C. Maximum run length D. Bandwidth

A. Cable diameter

) CAPTCHA stands for ________. A) Completely Amazing Public Turing Test to Tell Computers and Humans Apart B) Completely Automated Private Turing Trial to Tell Computers and Humans Apart C) Completely Automated Public Turing Test to Tell Computers and Humans Apart D) Complete Automated Public Turing Trial to Tell Computers and Humans Apart

C) Completely Automated Public Turing Test to Tell Computers and Humans Apart

The Internet Crime Complaint Center (IC3) is a partnership between the ________. A) FBI and local police departments B) FBI and National Defense Department C) FBI and National White Collar Crime Center D) National White Collar Crime Center and U.S. Department of Defense

C) FBI and National White Collar Crime Center

Which of the following classifications of viruses can change its own code to avoid detection? A) Stealth B) Multipartite C) Polymorphic D) Worm

C) Polymorphic

________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. A) Black-hat B) Gray-hat C) White-hat D) Green-hat

C) White-hat

A ________ check compares the values of data in two or more fields to see whether those values are reasonable. A) correctness B) range C) consistency D) numeric

C) consistency

Attributes

Characteristics or properties about the entity (name, address) that make them different from one another.

Make vs Buy

Choice of building an application in-house versus buying an off-the-shelf alternative.

____ computing depends on a grid of servers, storage devices, and protocols that offer Internet-accessible computing services ranging from consumer-level media sharing to office productivity applications and complex corporate data processing.

Cloud

How do restore points affect your data files?

Data files are not affected by restore points.

Which of the following job banks focus ont eh computer and IT industries?

Datamasters

Structured vs Unstructured Decisions

Decisions that can be made by following an agreed upon process are structured, while those that are rare, or have no well understood process are unstructured.

Charlie is worried about something happening to his data. He uses it all the time in his business, and if something were to happen to it, he might lose his business. He has come to you for some answers on how to secure his data files and protect this resource. Which of the following is NOT a true statement you can make to Charlie?

Even if you lose your encryption key, you can still access and use encrypted data.

A set of machine language instructions for a program is called source code.

False

The first commercial microcomputer was the ____.

MITS Altair

____ is used by most of today's personal computers because it is fast and relatively inexpensive.

SDRAM

personal finance software

Simplified accounting program that helps home users or small office/home office users manage finances.

Business Benefits of BI

Single point of access to current information for all users, across all departments for quantifiable & intangible benefits

antivirus software

Software specifically designed to detect viruses and protect a computer and files from harm.

At the ACME Widget Company, the computers have started behaving weirdly. Chris noticed that his directory had some files that he didn't remember putting on his computer. Lesley noticed her computer was beginning to run very slowly, and Kim realized she was getting replies to emails she had not sent. The owner of the ACME Widget Company has contacted you to see if their company might have a computer security problem. Another possibility is that ACME Widget Company has a ____ that seems to perform one function while actually doing something else.

Trojan horse

A class attribute defines the characteristics of a set of objects.

True

Jessica likes to participate in B2C e-commerce, but recently has had a number of friends who have had problems shopping online. She wonders if it is safe to shop online and just how much she is compromising her privacy by doing so. Jessica is justifiably worried about the security of the personal information and credit card information she regularly supplies while shopping on the Web. In addition, she knows that merchants who market goods and services over the Internet sometimes secretly gather information and provide it to advertisers or other interested parties. Jessica has an always-on connection to the Internet. She has read about IP addresses and knows that some Web sites can track them. She would like to surf the Internet anonymously to protect her privacy. How can she do this?

Use an anonymous proxy service

personal firewall

Utility program that detects and protects a personal computer from unauthorized intrusions.

uninstaller

Utility program that removes a program, as well as any associated entries in the system files.

disk defragmenter

Utility that reorganizes the files and unused space on a computer's hard disk so that the operating system accesses data more quickly and programs run faster.

__________ databases have the largest market share among the primary types of electronic databases. A. Relational B. Flat-file C. Multidimensional D. Object-oriented

A. Relational

Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network? A. Routers and switches B. USB ports C. Firewalls D. Network interface cards (NIC)

A. Routers and switches

A(n) ___________ check determines whether all required fields were entered with appropriate data. A. completeness B. range C. consistency D. alphabetic

A. completeness

A ____ is a collection of related data that can be stored, sorted, organized, and queried. A. database B. list C. filter D. data mine

A. database

The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address. A. MAC B. IP C. SSID D. network

A. MAC

A large network designed to provide access to a specific geographic area, such as a large city is a __________. A. MAN B. PAN C. LAN D. WAN

A. MAN

A client/server network is an example of ________ administration A. Local B. Wide Area C. Central D. Corporate

C. Central

_____ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table. A. Referential integrity B. Normalization C. Database consistency D. Record integrity

A. Referential integrity

Which of the following statements about cookies is NOT true? A. Cookies obtain your personal information by searching your hard drive. B. Cookies are text files. C. Cookies help companies determine the traffic flow through their Web site. D. Some companies sell the personal information found in cookies to other companies

A. Cookies obtain your personal information by searching your hard drive.

Social ____________ is an unwanted piggyback program that usually downloads with software you are installing from the internet. A. Engineering B. Theft C. Pretexting D. Pharming

A. Engineering

__________ involves putting data into an electronic file in a format that another application can understand. A. Exporting B. Importing C. Batch processing D. Data mining

A. Exporting

Creating and disseminating ______ is one of the most widespread types of crimes. A. Spam B. Computer viruses C. fake credit cards D. FBI related scams

B. Computer viruses

What does the acronym DBMS stand for? A. Database modeling system B. Database management system C. Data building and modeling system D. Data browsing and management system

B. Database management system

Which of the following is NOT a main operation of a database management system (DBMS)? A. Creating databases and entering data B. Implementing data mining C. Viewing and sorting data D. Outputting data

B. Implementing data mining

A _____________ is a virus that is attached to documents such as a word or excel files. A. script virus B. Macro virus C. Polymorphic Virus D. Worm

B. Macro virus

Which of these statements about physically protecting your computer is FALSE? A. The computer should sit on a flat level surface. B. Power surges can be blocked by using a computer surround. C. It is best to unplug computers during an electrical storm. D. Old surge protectors can deliver power to your computer without protecting it.

B. Power surges can be blocked by using a computer surround.

One virus called _______ is used to trick users into downloading an infected file to their phone, which steals online banking information. A. Spyware Mobile Banking B. Spyeye Mobile Banking C. Spyware Online Banking D. Spyeye Online Banking

B. Spyeye Mobile Banking

You can block logical ports to invaders and make your computer invisible to others on the internet by installing _____. A. a packet sniffer B. a firewall C. a packet filter D. antivirus software

B. a firewall

In a transaction-processing system, if transaction data are accumulated until a certain point and then many transactions are processed all at once, this is called ______ processing. A. delayed B. batch C. real-time D. group

B. batch

In a transaction-processing system, if transaction data are accumulated until a certain point and then many transactions are processed all at once, this is called ________ processing. A. delayed B. batch C. real-time D. group

B. batch

________ viruses are often transmitted by a flash drive left in a USB port. A. logic bomb B. boot-sector C. macro D. encryption

B. boot-sector

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? A. social networking B. cybercrime c. phishing d. hacking

B. cybercrime

All of the following are extra precautions you can take to secure a wireless network, EXCEPT ________. A. change your network name (SSID) B. enable SSID broadcast C. turn on security protocols D. create a passphrase

B. enable SSID broadcast

Network adapters _________. A. are built into the motherboard on each node B. enable nodes in a network to communicate with each other C. are always Ethernet NICS D. are necessary only on servers in a client/server network

B. enable nodes in a network to communicate with each other

_________ floods a computer with requests until it shuts down and refuses to answer any requests for information. A. A Trojan horse B. A polymorphic virus C. A DDoS attack D. Port blocking

C. A DDoS attack

CAPTCHA stands for _______. A. Completely Amazing Public Turing Test to Tell Computers and Humans Apart B. Completely Automated Private Turing Trial to Tell Computers and Humans Apart C. Completely Automated Public Turing Test to Tell Computers and Humans Apart D. Complete Automated Public Turing Trial to Tell Computers and Humans Apart

C. Completely Automated Public Turing Test to Tell Computers and Humans Apart

The protocol using port 53 is ______. A. FTP control B. STMP C. DNS D. HTTP

C. DNS

Which of the following is NOT a data source for a data warehouse? A. Internal sources B. External sources C. Data mine D. Clickstream data

C. Data mine

IC3 is a partnership between the _________. A. FBI and local police departments B. FBI and National Defense Department C. FBI and National White Collar Crime Center D. National White Collar Crime Center and National Defense Department

C. FBI and National White Collar Crime Center

A ________ is a network located in your home that connects to all your digital devices. A. MAN B. WAN C. HAN D. LAN

C. HAN

A ________ network is located in your home that connects to all your digital devices. A. MAN B. WAN C. HAN D. LAN

C. HAN

A _____ relationship indicates that for each record in a table, there is only a single corresponding record in a related table. A. many-to-one B. one-to-many C. one-to-one D. many-to-many

C. one-to-one

Data are sent through a network on bundles called ______. A. packages B. pouches C. packets D. switches

C. packets

In a transaction-processing system (TPS), if the TPS database is queried and updated while the transaction is taking place, this is called ________ processing. A. direct B. batch C. real-time D. immediate

C. real-time

In a database, a ________ is a group of related fields. A. file B. list C. record D. table

C. record

1. A _________ displays a subset of data from a table (or tables) based on the criteria specified. A. database query B. join query C. select query D. criteria query

C. select query

Network architectures are classified according to _______. A. the distance between the hub and the router B. the bandwidth supplied by the connection C. the way in which they are managed and the distance between their nodes D. the speed at which they processor runs

C. the way in which they are managed and the distance between their nodes

All of the following are considered cybercrimes, EXCEPT ____. A. identity theft B. non-delivery of merchandise C. theft of a cell phone D. hacking

C. theft of a cell phone

6. The most popular transmission media option for wired Ethernet networks is __________. A. fiber-optic cable B. power-line cable C. unshielded twisted-pair (UTP) cable D. coaxial cable

C. unshielded twisted-pair (UTP) cable

A data ________ is a large-scale electronic repository of data that contains and organizes all of an organization's data in one place. A. mart B. chain C. warehouse D. storehouse

C. warehouse

Which transmission medium transmits data the fastest? A. Twisted-pair cable B. Coaxial cable C. Wireless D. Fiber-Optic cable

D. Fiber-Optic cable

All of the following are the main functions of antivirus software, EXCEPT _______. A. Looking for virus signatures B. quarantining viruses C. inoculating key files D. assassinating all viruses

D. assassinating all viruses

All of the following are top cybercrimes reported to IC3 in 2011, EXCEPT __________. A. Identity Theft B. non-auction/non-delivery of merchandise C. advance fee fraud D. child pornography

D. child pornography

Classification, affinity grouping, and estimation are _________ methods used by managers to make their data more meaningful. A. modeling B. staging C. artificial intelligence D. data mining

D. data mining

A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT _______. A. use your debit card information to purchase items illegally B. assume your identity C. steal your logon and passwords for various accounts D. launch a denial of service (DoS) attack on your computer

D. launch a denial of service (DoS) attack on your computer

All of the following are ways that can infect your computer with a virus, EXCEPT _________. A. sharing flash drives B. downloading video files from peer-to-peer sites C. downloading or running an e-mail attachment file D. logging into e-mail

D. logging into e-mail

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as __________. A. packet filtering B. packet switching C. static addressing D. logical port blocking

D. logical port blocking

7. All of the following involve tasks for network administration, EXCEPT ________. A. installing new computers and devices on the network B. updating and installing new software on the network C. setting up proper security for a network D. purchasing initial equipment for the network

D. purchasing initial equipment for the network

2. All of the following are benefits of networks EXCEPT, _________. A. sharing an Internet connection B. sharing printers and other peripherals C. sharing files D. sharing an operating system

D. sharing an operating system

In a database, a group of related records is called a(n) ________. A. memo B. field C. object D. table

D. table

A _____ is a virus that is triggered on a certain date. A. worm B. script C. logic bomb D. time bomb

D. time bomb


Ensembles d'études connexes

Parts, Function and purpose of a network switch

View Set

MUHS Personal Finance Lesson 7&8

View Set

International Business Final True/False

View Set

chapter 10:2 physical changes of aging

View Set

Ch 50 EAQ: Stomach Disorders & Disease

View Set

Annotated Bibliography Reading Notes

View Set