it 104 final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What is the standard for the connection among infrared -capable devices that form temporary networks? JEFE PC IrDA WiMAX

IrDA

_____ requires maintaining balance within an endlessly changing set of variables, such as walking up a hill or down a flight of stairs. Dexterity Perception Navigation Locomotion

Locomotion

Which of the following languages is not used to write the code on the server that tells it what to do? PHP (PHP: Hypertext Preprocessor) APS.NET cascading style sheets (CSS) JavaServer Pages (JSP)

cascading style sheets (CSS)

The ___ is the most common input device for computers.

keyboard

Files aren't sent over the internet as single files; rather, they are broken into units called ___ and reassembled when they reach their final internet destination. packets folders switches relays

packets

Which of the following is not a common type of data model? XML multimedia personal object-oriented

personal

An ISP provides internet connections to customers through a(n) point of presence (POP). internet exchange point (IXP). network service provider (NSP). learning management system (LMS).

point of presence (POP).

If a program is in the ___, other people can do what they like with it. source code public domain license agreement commercial market

public domain

To retrieve information from a database, the user generally creates a _____ and then runs it to display the results, or list of records that match the specified criteria. report primary key query record

query

Many warehouse systems use which of the following technologies to enhance inventory tracking and placement? office information system (OIS) radio frequency identification (RFID) vendor identification (VID) standard operating procedure (SOP)

radio frequency identification (RFID)

A string of characters that uniquely identifies a user's purchase of software is called a(n) password registration key passkey encrypted pass

registration key

A ___ functions like an amplifier in a home stereo system; it receives signals along a network, increases their strength, and then sends them along the network's communications path. bus hub router repeater

repeater

A ___ transmission sends one bit of data at a time; it's like a narrow path that only one person can walk on at a time. parallel simplex full-duplex serial

serial

What is the purpose of the BIOS Setup utility? to modify the BIOS settings to automatically detect random-access memory (RAM) to help pieces of hardware start up and communicate with each other to troubleshoot and perform maintenance tasks that keep the computer running well

to modify the BIOS settings

A(n) ___ converts programming code into instructions that a computer will understand. basic input/output system (BIOS) translator server uninstaller

translator

True or False: A field name is a unique name assigned to a field.

true

True or False: Penetration testing entails trying to hack into a system so its vulnerabilities can be identified and fixed.

true

One of the most widely used 3-D file formats for 3-D printers uses the ___ file name extension. pdf ipg .stl .docx

.stl

___ is a high-level language that's friendlier and more natural than COBOL and FORTRAN. C++ C# BASIC

BASIC

The internet utility that maps the URL to the host's underlying IP address is called the dot-com company. value-added network (VAN). Domain Name Service (DNS). internet service provider (ISP).

Domain Name Service (DNS).

True or False: The most commonly used wireless technology today is hi-fi (short for high fidelity).

false

Suppose an auto manufacturer wants to upgrade its existing computer-integrated manufacturing system. To determine the likely size and cost of the project, the company will conduct a _____ study. viability research practicality feasibility

feasibility

A switch physically connects the computers in a ___ and is able to read the data in each incoming data packet, determine its destination, and then forward it to the correct computer. wireless access point (WAP) wiring closet local area network (LAN) dissimilar network

local area network (LAN)

A multiuser operating system allows the use of a small number of apps many people to use one CPU from remote stations running computers of all kinds

many people to use one CPU from remote stations

A ___ area network is one step up from a ___ area network in geographical range. local; metropolitan metropolitan; local metropolitan; wide local; wide

metropolitan; local

Which of the following is an example of painting software, which enables users to create and edit bitmap images? Adobe Photoshop Microsoft PowerPoint iPhoto Adobe Illustrator

Adobe Photoshop

The generic term ___ refers to any of several types of digital high-speed, long-distance telephone lines that are capable of carrying multiple types of signals, including both voice and data. data service cable connector T line Internet connection

T line

Which of the following statements about the differences between the IPv4 and IPv6 formats is true? The IPv4 format is newer than the IPv6 format and is slowly replacing it. The IPv4 format can be abbreviated and stated in other ways, but the IPv6 format cannot. The IPv6 format uses eight groups of four hexadecimal digits separated by colons, whereas the IPv4 format uses a four-group series of numbers separated by periods. The IPv4 format is for PCs, and the IPv6 format is for Apple computers.

The IPv6 format uses eight groups of four hexadecimal digits separated by colons, whereas the IPv4 format uses a four-group series of numbers separated by periods.

Which of the following types of malware hides within a legitimate program or data file? a Trojan horse ransomware a boot sector virus a worm

a Trojan horse

Which of the following is not a typical feature of a learning management system (LMS)? access to multiple online search engines online posting and grading of tests communication tools such as online chat and email

access to multiple online search engines

With some new software purchases, you must ___ the software within a certain number of days; if you don't, it will stop working. download copy activate start

activate

Small applications that can run on all types of computer operating systems are called functions. scripts. applets. compilers.

applets.

Many divisions of the US government make ___ available for free online, including through the portal Data.gov. field names metadata datasets data filters

datasets

Software _____ involves creating the higher-level software design and focusing on the broader planning and implementation steps for the system. development creation engineering expansion

development

Many music, video, and software distributors have focused on developing and implementing copy protection technologies called digital rights management (DRM). program copying prevention (PCP. new-age copyright management (NACM). Sony BMG.

digital rights management (DRM).

The linux kernel is free, but vendors usually package it with various tools, utilities, and shells and then sell it to users as a(n) proprietary program platform open source program distribution (distro)

distribution (distro)

The Linux kernel is free, but vendors usually package it with various tools, utilities, and shells and then sell it to users as a(n) proprietary program. platform. open source program. distribution (distro).

distribution (distro).

A _____ system, which includes an underlying database, enables a company to deliver products more quickly, more cheaply, and with fewer errors. business distribution retailer database database management distribution management

distribution management

Which of the following types of systems supports strategic decision-making by facilitating the creation of high-level summary reports that executives can use to make important decisions? computer-aided system (CAS) important information system (IIS) business intelligence system (BIS) executive information system (EIS)

executive information system (EIS)

True or False: A compass works by orienting the current location of the device to a signal from an orbiting satellite.

false

True or False: A worm is a malicious code string that attaches itself to an executable file so that the file becomes "infected."

false

True or False: In deep learning, the computer learns using specific task algorithms rather than data representations.

false

True or False: Any programmer can experiment with proprietary software, make improvements to it, and then share the improvements with the entire user community.

fasle

A single value, such as an address, is an example of a ___ in a database transaction query primary key field

field

In _____, the file system saves multiple previous versions of a file. file versioning business-level public clouds conversations cloud storage

file versioning

Some people take advantage of the anonymity that's offered online and make rude and insulting comments to others. What is the term for this bad behavior? flaming trolling netiquette lurking

flaming

A well-designed ___, like the one shown in this screen shot, provides the user with questions or prompts. table form report database

form

Two people talking on the telephone is an example of ___ transmission. simplex half-duplex full-duplex multiplex

full-duplex

Which of the following technologies uses a computer to create thousands or even millions of slightly varied designs and then tests and selects the best of them? cognitive science inference engine genetic algorithm data mining

genetic algorithm

Many errors occur because the programmer was sloppy during the programming process. Programmers refer to this sloppy way of working as _____ code. hacking decoding compiling debugging

hacking

Some organizations have a ___ cloud, which consists of an internal ___ cloud plus ___ cloud capacity from one or more CSPs. hybrid; public; private hybrid; private: public public; private; hybrid private; hybrid; public

hybrid; private: public

Once a new information system has been designed and the plans approved, the project can move into the next stage, which is support. implementation. application. authorization.

implementation

Whereas microwave technology transmits data as radio waves, ___ technology transmits data as light waves. bluetooth wi-fi transponder infrared

infrared

which of the following describes a memory resident part of the operating system? it remains in memory while the computer is in operation it remains on the hard disk until it is needed it checks the essential hardware devices to make sure they are operational it manages computer components, peripheral devices, and memory

it remains in memory while the computer is in operation

A utility program is software that helps the computer start up. keep running well. communicate. manage files.

keep running well.

A database ____ can be used to identify a set of information and therefore provide a means of searching or sorting. key lock collection transaction

key

To be able to continue to access the information stored in a(n) _____, the programming code must be made compatible with the newer system. data dictionary database management system integration system legacy database

legacy database

Through partnerships with the Massachusetts Institute of Technology (MIT), Harvard University, and the University of California at Berkeley, providers such as Coursera, Udacity, and edX offer learning management systems (LMSs). massive open online courses (MOOCs). presentation graphics programs (PGPs). File Transfer Protocol (FTP) sites.

massive open online courses (MOOCs).

Suppose that the Entertainment Software Ratings Board (ESRB) has rated a game E for Everyone. Which of the following statements describes the type of content you can expect in this game may be suitable for persons ages 3 and older; contains no material that parents will find inappropriate may be suitable for persons ages 6 and older; may contain minimal violence, some comic mischief, and/or mild language may be suitable for persons ages 10 and older; may contain more cartoon, fantasy, or mild violence, as well as mild language and/or minimal suggestive themes may be suitable for persons ages 13 and older; may contain violent content and/or strong language

may be suitable for persons ages 6 and older; may contain minimal violence, some comic mischief, and/or mild language

Each network adapter has a unique hardware identifier called a(n) ___ address, which is a 12-digit number that consists of six two-digit pairs. internet protocol (IP) media access control (MAC) gateway access (GA) network translation (NT)

media access control (MAC)

Which of the following technologies uses sensors mounted around the skull to read the different types of waves or power spectrums the brain gives off? neural network natural interface speech recognition mental interface

mental interface

___ enables both professional and home users to work with graphics, videos, and audio files. basic hardware multimedia software multimedia hardware basic software

multimedia software

Because fiber-optic cable can transmit a large amount of data very quickly, it's often used for a(n) ___, which is the central pathway of a network. network backbone infrastructure mode geosynchronous orbit wireless access point

network backbone

A(n) _____ collects, stores, and transmits data in a shared environment. radio frequency identification (RFID) distribution logistics system (DLS) management information system (MIS) office information system (OIS)

office information system (OIS)

The developers of ___ software make the programming code freely available for others to modify. command-line GUI proprietary open source

open source

A driver is a small program that translates commands between the ___ and a device such as a keyboard or printer. user interface platform operating system (OS) window

operating system (OS)

Which of the following types of software is used to manage complex projects by keeping track of schedules, constraints, and budgets? accounting software personal information management software project management software enterprise database software

project management software

When you shop at an e-tailer's site, you collect the items you want to buy in a virtual container called a(n) mobile cart. checkout. outbox. shopping cart.

shopping cart.

An announcement made over a public address system at school is an example of ___ transmission simplex digital serial duplex

simplex

A(n) _____ operation is a loosely organized team allowed to pursue extreme innovation—often operating not only outside the corporate rulebook but also in a separate location away from the main corporate campus. skunkworks top-secret research & development (R&D) elite

skunkworks

A powerful form of power surge called a _____ can damage circuit boards in the computer, including the motherboard. spike shock volt current

spike

Chapter 10 states that a simple decision support system (DSS) can be created using a _____ program. spreadsheet word-processing database presentation

spreadsheet

In which type of physical topology are multiple computers and peripheral devices linked to a central gathering point, such as a switch or a router, in a point-to-point configuration? bus topology star topology token topology ring topology

star topology

Which of the following is the BIOS for the motherboard? random-access memory (RAM) traces system BIOS operating system (OS)

system BIOS

A(n) _____ is a technical expert who can help plan and develop the various parts of the information system that interact with other processes. systems engineer business systems analyst software engineer information technician

systems engineer

Many companies today incorporate _____ systems that combine GPS, wireless communications features, and other technologies to plan more efficient shipping routes and monitor shipment locations. communications connectivity wireless telematics

telematics

Which of the following has minimal processing capabilities of its own and is designed primarily to interface with other computers? UNIX MacBook notebook thin client

thin client

Mathematical formulas are used to form ___ in the same way that geometry is used to form lines and shapes. bitmaps rasters vector graphics waveware

vector graphics

A special type of internet- based wide area network (WAN) called a ___ has become increasingly popular among large businesses that need a cost-effective way to expand their networking options. virtual private network (VPN) personal area network (PAN) metropolitan area network (MAN) local area network (LAN)

virtual private network (VPN)

Online hotel and airline reservation sites use _____ databases to hold availability and pricing information. relational XML web hybrid

web

Some ___, such as Yahoo! Mail and Gmail, enable you to view each message and its responses as a compact conversation internet service providers private messengers webmail providers cloud service providers

webmail providers

Programmers that break a large problem into several small pieces and then work on them one at a time are using the ___ approach. looping if-then linear sequence divide-and-conquer

divide-and-conquer

The internet design feature that keeps packets moving when there is a heavy volume of traffic is called tethering surfing packet switching dynamic routing

dynamic routing

File versioning creates a version history, and depending on your cloud service, you might be able to access 25, 50, or more ___ a file corrections to earlier versions of types of edits to

earlier versions of

The ___ is a seven-layer model that explains how different kinds of networking software work together. Internet Assigned Numbers Authority (IANA) model network address translation (NAT) model Open Systems Interconnection (OSI) reference model Internet Protocol (IP) model

Open Systems Interconnection (OSI) reference model

Which of the following legacy programming languages is used chiefly for business applications by large institutions and companies? FORTRAN RPG BASIC COBOL

COBOL

___ involves moving through a database file, examining each record, and looking for information. Data browsing Transaction testing Online searching File processing

Data browsing

True or False: A per-seat site license grants use of software by a certain number of users, regardless of the number of computers.

False

Which of the following statements correctly describes a site license? a. It's a string of characters that uniquely identifies your purchase of the software. b. It grants the right to use the software in the ways stated in the license agreement. c. It's a unique code based on the hardware in your computer and the registration key you used when installing the software. d. It grants permission to make multiple copies of the software and install it on multiple computers.

It grants permission to make multiple copies of the software and install it on multiple computers.

Which of the following describes a memory resident part of the operating system? It remains in memory while the computer is in operation. It remains on the hard disk until it's needed. It checks the essential hardware devices to make sure they are operational. It manages computer components, peripheral devices, and memory.

It remains in memory while the computer is in operation.

Which of the following statements does not describe an extranet? a. It is an extension of an intranet. b. It allows an external user with a valid user ID and password to pass through the firewall and access certain resources in the organization's network. c. Different user accounts may be assigned different usage permissions. d. It serves the needs of an organization with computers in a single building or group of nearby buildings.

It serves the needs of an organization with computers in a single building or group of nearby buildings.

Which of the following statements describes a power conditioner? It stores extra voltage in a capacitor and then discharges that voltage onto the power line when it detects a low-voltage condition. It allows you to change the source or condition of your power supply depending on the location or quality of the power at your PC's location. It handles power surges in the same way a surge suppressor does but can also power devices for a few minutes when a complete power outage occurs. It offers an additional power source for your tablet or PC.

It stores extra voltage in a capacitor and then discharges that voltage onto the power line when it detects a low-voltage condition.

You may not have to worry about backing up your computer at work, because many businesses have a(n) ___ that automatically backs up data files. restore system update svstem external storage system backup svstem

backup svstem

Which of the following statements describes a blade-mounted server? it's typically mounted in a rack with other servers. because it has a single power supple and cooling system, it can be a point of failure. it's 19 inches wide and can vary in height. it physically connects computers with a local area network (LAN).

because it has a single power supple and cooling system, it can be a point of failure.

In ___ architecture, one or more ___ is responsible for managing network traffic and sharing network resources. network; servers client/server; servers peer-to-peer; networks intranet; clients

client/server; servers

Which type of cable consists of an insulated copper center wire grounded by a shield of braided wire? coaxial cable unshielded twisted-pair cable fiber-optic cable shielded twisted-pair cable

coaxial cable

A ___ is a connection that enables computers in different locations to send data to one another. network backbone wireless access point communications medium transponder

communications medium

A can of ___ comes with a detachable thin plastic tube that allows directing the airflow preciselv when cleaning inside the computer case. conditioned air compressed air system air air cleaner

compressed air

A distributed system uses a process called ___, where all the connected computers must confirm or agree on the answer or result to a computation before submitting it to a database. consensus distribution quantification transaction

consensus

Java has _____, which means it can run on nearly any operating system. nonprocedural language communication facilitation scripting language cross-platform compatibility

cross-platform compatibility


Ensembles d'études connexes

Stroke Pathophysiology and Pharmacology (Dr.Sadana)

View Set

Earth Science Test Review Worksheets

View Set

HW 7 Anatomy (Chs. 13, 14, 23) FA15

View Set

POLI 2051 Hogan LSU chap. 13, 14, 15, 16

View Set

Chapter 11 - Health Promotion of the Toddler and Family [Wong's Essentials Questions], EVOLVE chap 10, EVOLVE chap 9, Peds-Chapter 8 Practice Questions, 2 OB (Ped's book chapter 8), Peds Ch. 6, Peds Final Up to Chapter 5

View Set

Ch 7: Attempt, Conspiracy, and Solicitation

View Set