Chapter 5: Operating Systems, 2223 MIS Intro to computers exam 2, Chapter 9, Introduction to Computers Final Exam, CIS Ch.7, MIS Chapter 1, MIS Test 4- know acronyms, Computers Module 12, module 11 quizzes, Module 9 and 10
You have been chosen to be a teaching assistant in your database course. The instructor asks you to prepare a presentation on Big Data. Data ______ is the process of presenting data graphically as charts, maps, or other pictorial formats.
visualization
skype and facetime are examples of "blank" services
voIP
Siri and Cortana are examples of ______ recognition apps.
voice
Four popular types of messages on smartphones
voice, text, picture, video
Which is not one of the three V's of the Big Data
volatility
Which of the following is NOT one of the three V's of Big Data.
volatility
A(n) ______ boot refers to the process of restarting a computer or mobile device while it remains powered on.
warm
if a program or app stops working, a ___ often is sufficient to restart the device because this process clears memory
warm boot
"blank" information can be proved as correct or incorrect
verifiable
_____ information can be proved as correct or incorrect.
verifiable
A "blank" machine enables you to install a second operating system on a computer
virtual
A(n) ______ machine enables you to install a second operating system on a computer.
virtual
In this kind of memory, the operating system allocates a portion of a storage medium, usually hard disk or a USB flash drive, to function as additional RAM. What kind of memory is this ?
virtual
Data _____ is the process of presenting data graphically as charts, maps, or other pictorial formats.
visualization
Data ______ is the process of presenting data graphically as charts, maps, or other pictorial formats.
visualization
Google Apps certified specialist
which tests a users's skills of administering, selling, and deploying Google Apps.
certified information systems security professional (CISSP)
which tests in-depth knowledge of access control methods, information systems development, operations security, and network and Internet security.
programmer/developer certifications
usually are supported with training programs that prepare applicants for the certification test.
detailed report
usually list just transactions.
disk cleanup utility
utility searches for and removes unnecessary files.
"blank" compares data with a set of rules or values to determine if the data meets certain criteria
validation
_____ compares data with a set of rules or values to determine if the data meets certain criteria.
validation
______ compares data with a set of rules or values to determine if the data meets certain criteria.
validation
Hardware certifications
vary in scope from a narrow focus with an emphasis on the repair of a specific device to an integrated hardware solution that addresses a company's current and future computing needs.
A+
which tests knowledge of computer setup, configuration, maintenance, troubleshooting, basic networking skills, and system software
Project Management Professional (PMP)
which tests knowledge of tasks required during system development.
Compressed files sometimes are called ______ files.
zipped
Network interface card (NIC)
An expansion card that enables a computer to connect other computers or to a cable modem to facilitate a high-speed Internet connection
OODB
An object-oriented database (OODB) stores data in objects.
Android
An open source, Linux-based mobile operating system designed by Google for smartphones and tablets.
What program is used to start and shut down a computer or mobile device, provide a user interface, manage programs and memory, and provide file management, among other functions?
An operating system
multitasking
An operating system that allows two or more programs or apps to reside in memory at the same time.
Web Developer
Analyzes, develops, and supports the functionality of a website, including applications that often interact with databases or other online resources
All are examples of desktop operating systems EXCEPT
Android
All of the following are examples of desktop operating systems EXCEPT ____
Android
You want an open source, Linux-based mobile operating system for a new smartphone your company is developing. Which of the following will you use?
Android
You want to purchase a server operating system for your small business. Which of the following is NOT an example of an operating system you can purchase?
Apple iOS
Boot Camp
Apple program that enables you to install Windows on an Apple computer.
Safari
Apple's browser.
iCloud
Apple's cloud server.
Macintosh operating system (MAC OS)
Apple's operating system.
You are learning java and C#. what type of job should you search for after graduating?
Application Programmer
Microsoft office specialist is a popular ___ ____ certification.
Application Software
Which of the following is unlikely to be tested during the startup process?
Application files
What is an application?
Applications are software programs, such as word processors, databases, spreadsheets, and games.
upward compatible
Applications that may not run on new versions of an operating system.
swap file
Area of the hard drive used for virtual memory.
Pictures of robots
Artificial intelligence (AI)
All of the following are top-level domains EXCEPT ________. a. .com b. .net c. .info d. .bus
.bus
Which of the following domains is restricted?
.edu
How many extended partition can you have on a hard drive?
1
T1 connections transmit data at this speed:
1.5 Mbps
Internet service providers (ISP)
A company that specializes in providing Internet access. ISPs may be specialized providers or companies that provide other services in addition to Internet access
desktop operating system
A complete operating system that works on desktops, laptops, and some tablets. Also called stand-alone operating system.
virus
A computer negatively by altering the way the computer works without the user's knowledge or permission.
UNIX
A multitasking operating system developed in the early 1970s by scientists at Bell Laboratories.
server operating system
A multiuser operating system that organizes and coordinates how multiple users access and share resources on a network.
What is the term for the area of the hard disk used for virtual memory?
A swap file
A(n) ______ system is a set of programs that coordinates all the activities among computer or mobile device hardware. a. Operating b. Management c. Application d. Network
A: Operating
CDs and DVDs are two types of ______ discs. a. Optical b. Solid-state c. Hard d. Flash
A: Optical
When a computer is running multiple programs concurrently, what is the program that is in the program that is in the foreground?
Active program
Which of the following best describes the term bloatware?
Additional hardware and apps installed by an OEM
bloatware
Additional programs and apps included with an operating system.
What is the default administrator account named?
Administrator
Who can establish standard user accounts that allow alterations to security settings?
Administrators
Web authoring software includes all of the following EXCEPT ________.
Adobe Acrobat
RSS-reading applications which periodically visit Web sites, examine the feeds, and display new content are known as ________.
Aggregators
What two things does an operating system provide to the user?
All computers rely on an OS to provide the interface for the interaction between users, applications, and hardware. The OS boots the computer and manages the file system.
certification exam sponsers, such as "blank" provide ways for you to prepare for exams, register, and pay for exams, and more
(ISC)^2
with this type of technology if you have your phone set as payment on the chip and you swipe your phone against the new type of terminals, it will process your payment. What is this technology called?
(NFC) Near Field Communication
Laptop
(Notebook Computer) thin, lightweight mobile computer that operate on batteries or power supply
If one attempts to send a message to an email address which does not exist, it will return to you, or ________.
Bounce
Which of the following is NOT true about CAPTCHAs?
CAPTCHAs were developed to verify input is coming from computers and not humans.
Live CD
CD that can be used to start the computer.
What is the most common installation method for an operating system?
CD's and DVDs
A customer asks about differences between CD formats. You tell her that a _________ is an erasable multisession disc users can write on multiple times
CD-RW
Differences in CD formats. You tell her that ____ is an erasable multisession disc users can write on multiple times.
CD-RW
The World Wide Web is a distributed browsing and searching system originally developed at ________.
CERN
Which type of system enables and manages the publishing, modification, and access of various forms of documents and other files on a network or on the web?
CMS
An ____ ____ integrates apps and data related to customer inquiries, purchases, support requests, and behaviors
CRM Specialist
Internet connections that work through the same network of coaxial cables that deliver television signals work through a ________ modem.
Cable
Twisted-pair cables
Cables made of copper wires that are twisted around each other and are surrounded by a plastic jacket (such as traditional home phone wire)
What must be done before beginning the OS system upgrade?
Check minimum hardware requirements Backup data
You are using a Linux-based operating system designed by Google to work primarily with web apps. What is it called?
Chrome OS
_____ is a Linux-based operating system designed to work primarily with web apps.
Chrome OS
Which of the following is NOT an example of a server operating system?
Chrome server
A specialized laptop that runs Chrome OS is called a Chromebook, and a specialized desktop that runs Chrome OS is called a __.
Chromebox
Which of the following statements is not true about operating systems designed to work with a server on a network?
Client computers cannot function unless they are connected to the network because they cannot access an operating system
Which of the following is NOT true about client/server networks?
Client/server networks do not typically require a network administration.
Which of the following is NOT true about client/server networks?
Client/server networks do not typically require a network administrator.
who is Larry Ellison
Co-founder and CEO of Oracle Corporation
You have a hardware problem and want to detect and check connected hardware devices. Which of the following are you most likely recommended to use?
Cold boot
Digital Forensics Examiner
Collects and analyzes evidence found on computers, networks, mobile devices, and databases
Web Analytics Expert
Collects and measures Internet data, such as website traffic patterns and advertising, and develops reports that recommend strategies to maximize an organization;s web presence.
Two types of operating system user interfaces are graphical and ____.
Command Line
What are the two types of user interface?
Command-line interface (CLI) Graphical user interface (GUI)
Which of the following is another term for transmission media?
Communications channel
The majority of computer crimes are committed by
Company Employees
mobile device management (MDM)
Company policy that outlines and educates employees about safe mobile device use.
zipped files
Compressed files, When you receive or download a compressed file, you must uncompress it.
________ is defined as any crime completed through the use of computer technology.
Computer Crime
sleep mode
Computer power option that saves any open documents and running programs or apps to RAM, turns off all unneeded functions, and then places the computer in a low-power state.
hibernate mode
Computer power option that saves any open documents and running programs or apps to an internal hard drive before removing power from the computer or device.
Which of the following creates logs, documentation, and recovery plans based on cybersecurity threats and incidents?
Computer security incident responder
Which of the following is responsible for installing hardware and servers and troubleshooting hardware problems?
Computer technician
Which of the following is responsible for installing hardware and servers and troubleshooting hardware problems?
Computer technincian
PC
Computer that can perform all of its input, processing, output, and storage activities by itself and is intended to be used by one person at a time.
Wi-Fi
Computers and devices that have the appropriate wireless capability can communicate via radio waves with other computers or devices using Wi-Fi, which identifies any network based on 802.11 standards. Developed by IEEE, 802.11 is a series of network standards that specifies how two wireless devices communicate over the air with each other.
One of the jobs available at your current company is for a network security administrator. What skill will you need to have to apply for the job?
Configure routers and firewalls
While working as an assistant in an IT department, you have been taking classes in information and systems security. You meet with a career counselor to discuss potential jobs. One of the jobs available at your current company is for a network security administrator. What skill will you need to have to apply for the job?
Configure routers and firewalls
Network Security Administrator
Configures routers and firewalls; specifies web protocols and enterprise technologies
Piggybackers are those who ________.
Connect to a wireless network without the owner's permission
Mobile broadband
Connection to the Internet through the same cellular network that cell phones use to get 3G or 4G Internet access.
The _____ is the component of the processor that directs and coordinates most of the operations in the computer.
Control Unit
VoIP
Conversations takes place over internet using telephone connected to a computer, mobile device, or other device
Desktop or Mobile Application Programmer
Converts the system design into the appropriate application development language
In the Web address www.bbc.co.uk, "uk" is a(n) ________.
Country Code
Which of the following is NOT one of the three general guidelines for system development?
Creat documentation
To share files between computers on a Windows home network, you must
Create a HomeGroup
Which of the following is NOT one of the three general guidelines for system development?
Create documentation
Computer Security Incident Responder
Creates, logs, documentation, and recovery plans based on cyber security threats and incidents
an _____ ____ ____ (___) helps users analyze information and make decisions
Decision Support System (DSS)
______ refers to the process of translating instructions into signals the computer can execute.
Decoding
During which phase of system development would you acquire any necessary hardware and software?
Design
Virtual Reality Engineer
Designs applications that incorporate technoliges with tools to create storytelling tolls and apps
Game Designer
Designs games and translates designs into a program or app using an appropriate development language
Web Designer
Designs the layout, navigation, and overall a of a website with a focus on user experience; specifies a website's appearance using HTML5, JavaScript, CSS, media, and other web design functions.
client operating systems
Desktop operating systems that work in conjunction with a server operating system.
Which of the following MIS reports usually lists just transactions?
Detailed
What is the difference between a directory and a sub directory?
Directories can be kept inside other directories. These nested directories are referred to as subdirectories.
Internet/Social Media Marketing Specialist
Directs and implements an organization's use of Internet and social media marketing.
You want to remove unnecessary files from your computer. What do you use?
Disk Cleanup
Information from the Internet to the subscriber, called ________ traffic, sometimes approaches speeds similar to a T1.
Downstream
Google Drive
Drive that provides access to email, contacts, calendar, photos, files, and more.
To prevent unauthorized users from reading data as it travels over a network, what process should the administrator specify?
Encryption
___ is the process of encoding data and information into an unreadable form.
Encryption
Social _____ is defined as gaining unauthorized access to or obtaining confidential info by taking advantage of another person.
Engineering
What type of user is most likely to use spreadsheets?
Enterprise User
VM (virtual machine)
Environment on a computer in which you can install and run an operating system and programs.
virtual machine (VM)
Environment on a computer in which you can install and run an operating system and programs.
A _____ keyboard has a design that reduces the chance of RSIs?
Ergonomic
bug
Error in a program.
In the 1970s, Xerox developed ________, which continues to be a popular networking architecture.
Ethernet
______ is currently the most popular network standard for LANs.
Ethernet
Robert Metcalfe
Ethernet Inventor
A Web server receives incoming mail, stores it, and provides it to the email client program when requested.
FALSE
A public key is only available to the user originating a message.
FALSE
An autonomous system can assume almost complete responsibility for a task and minimizes risk because of its absolute reliability.
FALSE
Bill Gates was the original developer of the World Wide Web.
FALSE
Computer forensics is a form of computer crime.
FALSE
Each unique Internet addresses had an applet.
FALSE
The Google Apps Certified Specialist certification tests a user's ability to use the Google Docs web applications.
FALSE
The Web was built with push technology.
FALSE
The latest version of the Internet Protocol is IPv9.
FALSE
When the term "hacker" came to be in the sixties, it was meant for evil programmers.
FALSE
What transfers items to and from other computers?
FTP
An SFA information system is used in product development.
False
An ink jet printer is a type of impact printer.
False
An object data type is used for a document or image that is attached to the field, which can be opened in the program that created the document or image, T/F?
False
Apps designed for a specific mobile platform or device generally will work on another without significant modification.
False
Because they are assigned randomly, you cannot use an IP address to determine a computer or devices location.
False
Coaxial cable is capable of carrying significantly more signals than fiber optic cables.
False
Continuous backup is inexpensive because the data is constantly being backed up, T/F?
False
Continuous backup is inexpensive because the data is constantly being backed up.
False
Contributors to wiki typically do not need to register before they can edit or comment.
False
Each processor core on a multi-core processor generally runs faster than a single core.
False
Educational requirements for help desk specialists are more stringent than they are for other careers in the technology field.
False
Eight bytes grouped together form a bit, T/F?
False
Eight bytes grouped together form a bit.
False
Experts recommend that you run multiple antivirus programs simultaneously.
False
FIP addresses concerns regarding security of information protocols, T/F?
False
File processing systems require more memory and processing power than databases.
False
Freeware has no copyright restrictions.
False
Freeware has no copyright restrictions?
False
HTML is a programming language
False
HTML is a programming language, T/F?
False
If using a webcam, keep is connected to the computer when not in use so that you can control access to it.
False
If your computer requires that you install memory in pairs, it doesn't matter if the two memory modules are the same type, size, or speed.
False
Intentionally erasing software is not an example of software theft.
False
Items stored in RAM remain intact even when you turn off a computer or mobile device.
False
Many people initially used the term, data processing, to refer to the functions of a DMS.
False
Most information gains value with time.
False
Operating systems on embedded computer use a multitasking operating system.
False
Programs that can perform maintenance type tasks are called operating systems?
False
Programs that enable you to perform maintenance-type tasks are called operating systems.
False
SSDs typically have high storage capacity than hard disks.
False
Software registration typically is required.
False
Streaming media uses a small amount of data?
False
Streaming media uses only small amounts of data.
False
T/F 4G is the latest WiFi standard.
False
T/F Actual data throughput is usually higher on wireless networks than on wired networks.
False
T/F Data is sent through the network in bundles called packages.
False
The Google Apps Certified Specialist certification tests a user's ability to use the Google Docs web applications.
False
The Internet is a service of the World Wide Web
False
The higher the number, the faster the response time.
False
The power supply coverts the wall outlet DC power into AC power.
False
The voice command "OK, Google" will activate your device's search engine.
False
To cut selected text on a Windows computer, press COMMAND+X
False
To cut selected text on a Windows computer, press COMMAND+X.
False
Users of website authoring software must have advanced HTML skills.
False
Viruses, worms, and Trojan horses replicate themselves to other computers or devices.
False
When you use a credit card to purchase an item, you are interacting with a CMS.
False
With P2P file sharing, when a user signs out of the network, other users can still access the user's hard drive.
False
With a direct conversion, only one location in the organization uses the new system, so that it can be tested, T/F?
False
With a direct conversion, only one location in the organization uses the new system, so that it can be tested.
False
You should run multiple antivirus programs on your computer or mobile device.
False
You should use a humorous name for your account profiles to ensure that you stand out to potential employers.
False
An IT ______, usually hired based on experience, provides technology services to his or her clients.
consultant
Large enterprises often hire teams of _____ to offer advice about technology-related concerns.
consultants
What is not a basic function of computer?
Producing Input
What best describes a root kit?
Program that is easily hidden and will allow someone to take full control of your computer
What best describes an app?
Program that makes users more productive
foreground
Program with which the user currently is interacting.
background
Programs that are running, but not in use.
To plan and schedule events you should use what type of software?
Project Managmemt
Productivity suites don't include?
Project Managmet
A piece of software you use is privately owned and limited to a specific vendor. What is the term for this kind of software?
Proprietary
iOS
Proprietary mobile operating system specifically made for Apple's mobile devices.
The first part of a URL refers to the ________ that must be used to access information, for example http.
Protocol
WEP and WPA are examples of ________.
Protocols that use encryption to protect wireless transmissions
What best describes open source software?
Provided for use, modification, and redistribution
COGNITIVE ASSESSMENT Q: Which of the following best describes open source software?
Provided for use, modification, and redistribution.
"blank" consists of one or more chips on the motherboard that hold items such as data and instructions while processor interprets and executes them
RAM
Which of the following consists of one or more chips on the motherboard that hold items such as data and instructions while the processor interprets and executes them?
RAM
The "blank" are adding palm prints to its fingerprint database
RCMP (Royal Canadian Mounted Police)
firmware
ROM chips that contain permanently written data, instructions, or information.
You have been developing an embedded operating system for a new product at your company, but a colleague of yours has been referring to it by another name. What is that name?
RTOS
When radio or TV broadcasts are streaming at the same time they are happening, it is called
Real-Time
From the ground, a GPS ________ interacts with signals from a satellite to determine its position.
Reciever
What can you use if the computer cannot start from its boot disk?
Recovery media
What are registry?
Registers are storage areas used by the CPU when performing calculations.
boot disk
Removable media, such as a CD or USB flash drive, that contains only the necessary operating system files required to start the computer.
What is not recommended to protect your computer?
Remove firewall hardware and software
Which of the following best describes disk defragmentation?
Reorganizing the hard disk so that files are stored in contiguous sectors.
What best describes disk defragmentation?
Reorganzing file
a _____ ____ replaces a laptop hard drive.
Repair technician
Computer Security Specialist
Responsible for the security of data and information stored on computers and mobile devices within an organization
Which browser is included with the Mac OS
Safari
What does the hibernate mode option do?
Saves any open documents and programs to a hard drive before removing power form the computer or device
Which file and disk management tool attempts to locate a file on your computer or mobile device based on specified criteria?
Search
Software programs that close potential security breaches in an operating system or application are known as
Security Patches
buffer
Segment of memory or storage in which items are placed while waiting to be transferred from an input device or to an output device.
What delivers requested webpages to your computer?
Server
Many software makers provide free downloadable updates, sometimes called a _____.
Service pack
Which of the following do software makers provide to users who have registered and/or activated their software
Service pack
permissions
Settings used to define who can access certain resources and when they can access those resources.
file compression
Shrink the size of a file(s).
Embedded computers and some mobile devices often use which of the following kinds of operating system?
Single user/single tasking
Which of the following kinds of operating systems allow only one user to run one program or app at a time?
Single user/single tasking
When a business can legally copy software to all of the computers they own, the company has a ________ license.
Site
The field _____ defines the max number of characters a field can contain.
Size
Thieves can use what to capture number on ATM?
Skimmer
What does Microsoft produce and sell with computers and mobile devices?
Software
What is a collection of related instructions?
Software
open source software
Software provided for use, modification, and redistribution and has no restrictions from the copyright holder regarding modification of the software's internal instructions and its redistribution.
Network operating system (NOS)
Software that handles requests for information, Internet access, and the use of peripherals for the rest of the network node, providing the services necessary for the computers on the network to communicate
proprietary software
Software that is privately owned and limited to a specific vendor or computer or device model.
Which of the following is NOT an activity in the implementation phase?
Solicit vendor proposals
What is recommended to avoid malware infections?
Some ads saying they offer protection will install more malware
Which of the following is NOT true about web application development?
Some computers and mobile devices do not support HTML5 but instead rely on Flash.
User
Someone who interacts with a computer or mobile device
Microsoft Office ______ is the certification that tests a user's skills of Microsoft Office programs.
Specialist
Database Designer
Specifies the structure, interface, and requirements of a large scale database; determines security and permissions for users
Program and App Developer
Specifies, designs, implements, tests, and documents programs and apps in a variety of fields, including robotics, operating systems, animation, and applications.
Placing a phone call pretending to be someone else, in order to trick someone into doing something is also known as
Spoofing
Which of the following is an example of social engineering?
Spoofing
The ____ process sends documents to be printed into a buffer instead of sending them immediately to the printer.
Spooling
Which of the following allows a computer or mobile device's processor to continue interpreting and executing instructions while a printer prints?
Spooling
What is the name of an application program that gathers user information and sends it to someone through the Internet?
Spybot
Windows Phone Store
Store that provides access to additional Windows apps and software updates.
iTunes Store
Store that provides access to music, books, podcasts, ringtones, and movies.
Which of the following MIS reports usually includes tables and graphs?
Summary
which MIS reports usually includes tables and graphs?
Summary
As it pertains to drives, which of the following best defines the purpose of a controller?
Support traffic on a small home network.
Which of the following is an alternative to a password you can use on your new mobile device?
Swiping areas of the screen in a specified order
When you match files in two or more locations you?
Sync
The notherboard is sometimes called a ____ board.
System
Firmware
System software that controls hardware devices
Which of the following is responsible for designing and developing information systems?
Systems analyst
Which of the following is responsible for installing and maintaining operating system software?
Systems programmer
"Cracker" is the correct term for the term "hacker" we use today.
TRUE
A DSL connection can share signals with a telephone line.
TRUE
A content-management system allows users to edit Web sites without having to deal with HTML and FTP.
TRUE
Adobe Reader and Adobe Acrobat display PDF documents. a. True b. False
TRUE
All e-mail addresses consist of a user name, followed by the @ sign, followed by a host address.
TRUE
Bandwidth is measured in bits.
TRUE
Bloggers use CMSs to post to their blogs and provide categories to posts.
TRUE
Bluetooth technology can reach a range of 10 meters.
TRUE
CISSP is an example of a security certification.
TRUE
Combining other people's works in to one Web page is known as a podcast.
TRUE
Diagnostic software included with a computer or device assists technicians in identifying problems.
TRUE
Experts debate whether Internet addiction is a true addiction or simply a compulsion.
TRUE
Information can be recovered from a hard drive even after file have been deleted.
TRUE
Net neutrality is the principle that Internet access should be free from restrictions related to the type of communication taking place on it.
TRUE
Smart cards and biometrics are two ways companies may add physical security to computer systems.
TRUE
The Digital Millennium Act of 1998 allows users copying music CD content for personal use, but not DVD content.
TRUE
The Telecommunications Act of 1996 prohibits employers from listening to their employees' phone conversations.
TRUE
The backbone of the Internet is made up of physical connections between specific locations?
TRUE
The digital divide separates people in the world with access to technology and digital information from those who do not.
TRUE
The most common form of computer crime is theft. a. True b. False
TRUE
The most widely used data recovery technique is making regular backups.
TRUE
You can use LinkedIn to follow companies to stay informed of their job opportunities.
TRUE
In some database programs, a data file is referred to as a _____.
Table
____ output provides the user with a physical response from the input device.
Tactile
What controls almost all functions on a computer?
The Operating System
The student asks you to explain speed of storage devices and memory. You tell her that all of the following are true, EXCEPT:
The access time of memory is slow compared with that of storage devices.
Backwards compatibility
The accommodation of current devices being able to use previously issued software standards in addition to the current standards
What is the benefit of 64 bit architecture?
The additional registers allow the CPU to process instructions much faster than x86. The x64 processer is backward compatible with the x86 processor.
page
The amount of data and program instructions that can swap at a given time.
bandwidth
The amount of data, instructions, and information that can travel over a communications channel
Which of the following is NOT true about system units?
The case on the smartphone often is in front of the display
Term, traffic refers to what talking about the internet?
The communications activity on the internet
Explain multi tasking.
The computer is capable of operating multiple applications at the same time.
Which of the following is least likely to happen if problems are identified during startup?
The computer or device may restore itself to its default settings
fiber-optic cable
The core of a "this" cable consists of dozens or hundreds of thin strands of glass or plastic that use light to transmit signals.
kernel
The core of an operating system that manages memory and devices, maintains the internal clock, runs programs, and assigns the resources, such as devices, programs, apps, data, and information.
Network architecture
The design of a computer network; includes both physical and logical design
boot drive
The drive from which your personal computer starts.
What does the file system provide?
The file system provides the directory structure that organizes the user's operating system, application, configuration, and data files.
Internet of Things (IoT)
The interconnection of uniquely identifiable embedded computing devices that transfer data over a network without requiring human-to-human or human-to-computer intersection
What is the core of an operating system that manages memory and devices, maintains the internal clock, starts programs, and assigns the computer's resources?
The kernel
4G
The latest mobile communication standard with faster data transfer rates than 3G
Data transfer rate (also called bandwidth)
The maximum speed at with data can be transmitted between two nodes on a network; usually measured in megabits per second (Mbps)
Gigabit Ethernet
The most commonly used wired Ethernet standard deployed for home networks; provides bandwidth of up to 1 Gbps
Unshielded twisted-pair (UTP) cable
The most popular transmission media option for Ethernet networks. UTP cable is composed of 4 pairs of wires that are twisted around each other to reduce electrical interference
What is multi processing?
The operating system can support two or more CPUs.
What happens if your computer or mobile device uses up its available RAM?
The operating system may use virtual memory.
Which of the following is NOT true about network security?
The operating system on a network does not record unsuccessful sign-in attempts.
mobile operating system
The operating system on mobile devices and many consumer electronics.
What happens when the computer is thrashing?
The operating system spends too much of its time paging, instead of executing application software.
What is meant by the term Plug and Play?
The operating system that automatically configures new devices as you install or connect them
network administrator
The person overseeing network operations.
What is the first step in the startup process of a computer?
The power supply or battery sends an electrical current to circuitry in the computer or mobile device
virtualization
The practice of sharing or pooling computing resources, such as servers and storage devices.
Piggybacking
The process of connecting to a wireless network without the permission of the owner of the network
encryption
The process of converting data that is readable by humans into encoded characters to prevent unauthorized access.
warm boot
The process of restarting a computer or mobile device while it remains powered on.
spooling
The process of sending documents to be printed to a buffer instead of sending them immediately to the printer.
cold boot
The process of starting a computer or mobile device from a state when it is powered off completely.
booting
The process of starting or restarting a computer or mobile device.
Which of the following is NOT true about motherboards?
The processor and memory are built into the motherboard.
Transmission media
The radio waves or the physical system (cable) that transports data on a network
What occurs during a hard crash?
The read/write touches the surface of a platter
What is an EULA?
The right to use a program or app.
Describe B2C e- commerce?
The sale of goods and services to the general public.
command language
The set of commands used to control actions in a command-line interface.
Which of the following best describes paging?
The technique of swapping items between memory and storage
How does the user account differ from the computer administrator?
The user account has fewer permission sets
What are the two distinct types of Operating Systems?
There are two distinct types of operating systems: desktop and network.
Which of the following is NOT true about command-line interfaces?
They give you less control to manage detailed settings than a GUI.
Which of the following is NOT true about command-line interfaces?
They give you less control to manage detailed...
Where is the primary partition?
This primary partition containing the operating system files is usually the first partition.
Why do you format a drive?
This process prepares a file system in a partition for files to be stored.
____ info is useful only within a specific time period.
Timely
______ information is useful only within a specific time period.
Timely
What is a device driver?
To access and communicate with each hardware component, the OS uses a program called a device driver.
sign in
To access resources on a network or computer.
For what purpose would a company use an extranet?
To allow customers or suppliers to access part of its intranet
For what purpose would a company use an extranet?
To allow customers or suppliers to access part of its intranet.
Purpose of a TLD?
To identify the type of organization associated with a domain name
What must you do before making an operating system recommendation?
To make an OS recommendation, a technician must review budget constraints, learn how the computer will be used, and determine which types of applications will be installed.
Why would you want to disable SSID broadband?
To make it more difficult for hackers to detect your network and nearly impossible for a neighbor to connect to your netowrk
What is the purpose of memory management?
To optimize the use of RAm
What is the first phase of the installation process?
To partition an format the hard drive
what is the purpose of ANSI and IEEE?
To propose, develop, and approve network standards
COGNITIVE ASSESSMENT Q: Which of the following is NOT true about PDFs?
To read a PDF, you need the software that created the original document.
For which of the following purposes would a business use EDI?
To send bids and proposal
Which of the following best describes the function of a primary key?
To uniquely identify each record in a file
Why should you register your copy of Windows?
To verify you are not getting an illegal copy
disk cleanup
Tool that searches for and removes unnecessary files.
recovery media
Tool that uses logs and/or backups, and either a rollforward or a rollback technique, to restore a database when it becomes damaged or destroyed.
What is the major light principle fiberoptic cables are based on?
Total Reflection
A ____ can act as an electronic switch that opens or closes the circuits for electrical charges.
Transistor
App you can use for a limited time for no charge?
Trial
Supercomputers capable of processing what in a single second?
Trillions
99. Unusually high drive activity or a slower than normal internet activity are signs that your computer or mobile device may be a zombie.
True
A BAN is a type of PAN that wirelessly connects sensors worn by, carried by, or attached to a human body.
True
A DBMS uses the data dictionary to perform validation checks, T/F?
True
A DBMS uses the data dictionary to perform validation checks.
True
A byte provides enough different combinations of 0s and 1s to represent 256 different characters.
True
A cloud app makes use of software and data that are not stored on your computer or mobile device.
True
A cloud app makes use of software and data that are not stored on your computer?
True
A composite key consists on multiple fields, T/F?
True
A composite key consists on multiple fields.
True
A consistency check tests the data in two or more associated fields to ensure that the relationship is logical and that the data is in the correct format, T/F?
True
A consistency check tests the data in two or more associated fields to ensure that the relationship is logical and that the data is in the correct format.
True
A performance monitor is a program that assesses and reports information about various computer resources and devices.
True
A power management tool monitors a laptop or mobile device's battery usage.
True
A text editor is used to type information when it does not need to be formatted with fonts or other styles.
True
Agile development guidelines emphasize adaptation of goals and continuous improvement of the software or app, T/F?
True
Agile development guidelines emphasize adaptation of goals and continuous improvement of the software or app.
True
Because the user accesses files on cloud storage through a browser using an app from the storage provider, the actual media on which the files are stored are transparent to the user.
True
Because they are compressed, you usually cannot use backup files in their backed up form.
True
CISSP is an example of a security certification.
True
Cambria and Calibri are examples of font styles.
True
Census records, stock values, and corporate sales data is structured, T/F?
True
Chassis is another term for system unit.
True
Cloud Computing uses server virtualization?
True
Common digital security risks include information theft and system failure.
True
Database software is another term for a DBMS, T/F?
True
Database software is another term for a DBMS.
True
Diagnostic software included with a computer or device assists technicians in identifying problems.
True
Dice and Monster are examples of career planning websites and apps.
True
Drivers using hands free technology are distracted.
True
Employers can use firewall to restrict employees access to sensitive data.
True
Engineers and game designers are power users
True
Expert systems are a component of artificial intelligence.
True
Human resources is an example of a functional unit.
True
IBM, Microsoft, Novell, Red Hat, and Sun offer certifications that test knowledge of their operating systems.
True
In a typical file processing system, each department or area within an organization has its own set of files, T/F?
True
In a typical file processing system, each department or area within an organization has its own set of files.
True
In some cases, the operating system for the network is a set of programs that are separate from the operating system on the client computers or mobile devices that access the network.
True
Inference rules are a set of logical judgments that are applied to the knowledge base each time a user describes a situation to the expert system.
True
Information systems support daily, short-term, and long range info requirements of users in company.
True
Information systems support daily, short-term, and long-range information requirements of users in a company.
True
Many email applications include calendar and contact management features.
True
Many handheld computers are industry specific?
True
Many routers also can function as a hardware firewall.
True
Media players often allow you to burn audio CDs.
True
Megan's Law refers to a group of U.S. laws that require law enforcement agencies to share information in a national database about criminals who commit unlawful acts on children, T/F?
True
Megan's Law refers to a group of U.S. laws that require law enforcement agencies to share information in a national database about criminals who commit unlawful acts on children.
True
Mobile payment providers state that the use of their payment apps are more secure than using a credit card?
True
Mobile payment providers state that the use of their payment apps is more secure than using a credit card.
True
Mobile web apps are actually websites that provide a user experience similar to native apps.
True
Monitoring system performance is a part of the support and security phase, T/F?
True
Monitoring system performance is a part of the support and security phase.
True
Most TPSs use OLTP because users need info immediately.
True
Most TPSs use OLTP because users need information immediately.
True
Most magstripe readers are separate devices that communicate with a POS terminal.
True
NFC is a technology that uses close-range radio signals to transmit data between devices or a device and a tag.
True
Once data is in memory, a computer or mobile device interprets and executes instructions to process the data into information.
True
One advantage of ERP is complete integration of information systems across departments.
True
Outsourcing is when an enterprise offloads storage management to an outside organization.
True
People suffering from technology overload feel distressed when deprived of mobile devices
True
Routers along the Internet backbone forward data packets to their destination using the fastest available path.
True
Smartphones can function as a portable media player?
True
Smart digital camera
contains apps and can communicate wirelessly, so you can share, modify, and print images... many have gps that store location information in with the photo
data dictionary
contains data about each file in the database and each field within those files.
____ ___ _____ enables and manages the publishing, modification, organization and access of various forms of documents and other files.
content management system
Adjusting the ______ adjusts the difference in appearance between light and dark areas of the photo.
contrast
Which two components work together to perform processing operations?
control unit and ALU
user interface
controls how you enter data and instructions and how information is displayed on the screen.
T/F 802.11ac is the current wireless Ethernet standard.
True
User interface
controls how you enter data/instructions and how information is displayed on the screen
Computer aided manufacturing (CAM)
controls production equipment, such as drills, lathes, and milling machines.
The computer may run slower while it uses virtual memory.
True
The purpose of ___ and ___ is to provide a central point for cables in a network.
Hubs and switches
An ___ ___ combines features of native and mobile web apps.
Hybrid App (might be T/F on test)
Which of the following is NOT a true statement about IPv6?
IPv6 is supported on all machines
the help desk position is an ideal entryway into the ___ field
IT (Information Technology)
____ are hired bases on expertise and provides technology services to his or her clients
IT consultants
cloud architect
Identifies business requirements, strategies, and solutions for cloud storage and services that meet a company's goals or needs.
Which of the following is TRUE about Bluetooth?
If a device has Bluetooth capability, using Bluetooth technology is free.
What is NOT true about QR codes?
If the QR code directs you to a website displaying a form, enter your personal information to ensure your safety
Which of the following is NOT true about QR codes?
If the QR code directs you to a website displaying a form, enter your personal information to ensure your safety.
During which phase of system development would you develop any necessary programs and apps?
Implementation
Security Analyst
Implements security procedures and methods, looks for flaws in security of a company's devices and networks, works with and trains employees at all levels, and assigns permissions and network settings
The goal of project management is to deliver an acceptable system to the user in an agreed-upon time frame, while maintaining costs, T/F?
True
The goal of project management is to deliver an acceptable system to the user in an agreed-upon time frame, while maintaining costs.
True
The laws against plagiarism are the same whether copying content from a respected news source, a personal blog, or social media
True
The laws against plagiarism are the same whether copying content from a respected news source, a personal blog, or social media.
True
The operating system serves as an interface?
True
The operating system serves as the interface between the user, applications, and hardware.
True
The process in which two or more computers or devices transfer data, instructions, and information is known as digital communications.
True
The program specification package identifies required programs and the relationship among each program, as well as the input, output, and database specifications, T/F?
True
The program specification package identifies required programs and the relationship among each program, as well as the input, output, and database specifications.
True
The start up process is similar for large and small computers and mobile devices.
True
To assist with sound decision making, information must have value.
True
Unlike a form, you use a report writer only to retrieve data, T/F?
True
Unlike a form, you use a report writer only to retrieve data.
True
Uses of RFID include tracking times of runners in a marathon and checking out library books.
True
Video editing software typically includes audio editing capabilities.
True
When a user runs an application, its instructions transfer from a storage device to memory.
True
When an organization uses the database approach, many programs and users share the data in the database, T/F?
True
When an organization uses the database approach, many programs and users share the data in the database.
True
When you install an app on one computer or device, it will install automatically on any other computers and devices on the same subscription plan.
True
With the database approach, the data is independent of the programs that access the data, T/F?
True
With the database approach, the data is independent of the programs that access the data.
True
You can use LinkedIn to follow companies to stay informed of their job opportunities.
True
You can use legal software to prepare a will.
True
You should use a database and not a spreadsheet if you want to create reports from data?
True
You should use a database rather than a spreadsheet if you want to collect, reorganize and filter data, and/or create reports from the data.
True
Network
Two or more computers that are connected via software and hardware so they can communicate with each other
What is meant by multi user?
Two or more users have individual accounts that allow them to work with programs and peripheral devices at the same time.
According to the FBI, how much identity theft begins with email? a. all b. one-half c. one-quarter d. two-thirds
Two-thirds 2/3
administrator account
Type of account typically held by computer owners or network administrators that enables them to access all files and programs, install programs, and specify settings that affect all users on a computer, mobile device, or network.
Power users often work with ______ because of its flexibility and capabilities.
UNIX
Which of the following is a multitasking operating system developed in early 1970s by scientists at Bell Laboratories?
UNIX
___ is a multitasking operating system developed in the early 1970s by scientists at Bell laboratories
UNIX
To prevent loss of data during power failures, use a(n)
UPS
The .gov domain might be used by ________.
US Senate
Thumb drive is another term for what?
USB flash drive
Live USB
USB flash drive that can be used to start the computer.
because of its high transfer rates, "blank" is best suited for transmission of large files
UWB
You want to remove a program from your computer. What do you use?
Uninstaller
Data traveling from a home computer to the Internet is called
Upstream Traffic
An application you own will run on a new version of your operating system. What is the term for this kind of application?
Upward compatible
because of ___ and the increased reliance on mobile devices for communications and productivity, the use and function of mobile and desktop operating systems are becoming more similar
convergence
Which of the following is NOT one of the three general guidelines for system development?
create documentation
which is NOT one of the 3 general guidelines for system development?
create documentation
Database Administrator
creates and maintains the data dictionary; monitors data performance
Experian, Equifax, and Transunion are all types of "blank" companies
credit reporting
Experian, Equifax, and Transunion are all types of _____ companies.
credit reporting
Experian, Equifax, and Transunion are all types of ______ companies.
credit reporting
A(n) ____ application is an application that runs the same on multiple operating systems.
cross-platform
The name for harassment on the Internet is
cyberstalking
"blank" is a collection of unprocessed items, including text, numbers, images, audio, and video
data
____ is a collection of unprocessed items, including text, numbers, images, audio, and video.
data
Because of the Sarbanes-Oxley (SOX) Act, companies have faced new requirements for what?
data storage
because of the Sarbanes-Oxley act, companies have faced new requirements for what?
data storage
A(n) ______ database is a huge database used to analyze transactions.
data warehouse
a "blank" database is a huge database used to analyze transactions
data warehouse
This is a collection of data organized in a manner that allows access, retrieval, and use of that data
database
An ___ ___ uses data modeling techniques and tools to analyze and specify data usage.
database analyst or data modeler
A hard-wired Internet connection through a LAN is called a(n) ________ connection.
dedicated
A(n) ______ line is a type of always-on physical connection between two communications devices.
dedicated
exception criteria
define the normal activity or status range.
field size
defines the maximum number of characters of field can contain.
The business wants to provide a common work environment of applications, and computing resources without requiring all of these to reside on users computers. You recommend a ____ desktop.
Virtual
You are running the latest version of Windows but you require an app that runs only in a previous version of Windows. Which of the following can you use to solve this problem?
Virtual machine
You want to run another operating system on your computer in addition to the one already installed. Which of the following will let you do that?
Virtual machine
____ is the practice of sharing or pooling computing resources, such as servers or storage devices
Virtualization
What type of voicemail lets people listen without listening to it?
Visual
What do you use to speak to other users over the internet?
VoIP
What kind of software do you need to use an Internet phone?
VoIP
What kind of software to use an Internet Phone?
VoIP
Which is NOT true about voice input?
Voice recognition is also called talk recognition
Which of the following is NOT true about voice input?
Voice recognition is also called talk recognition
Which of the following is NOT one of the three V's of Big Data.
Volatility
You have been chosen to be a teaching assistant in your database course. The instructor asks you to prepare a presentation on Big Data. Which of the following is NOT one of the three V's of Big Data.
Votality
the internet is the world's largest what?
WAN
On devices running Windows (Mobile Edition), the ______ app provides a centralized location for coupons, credit cards, loyalty cards, and memberships.
Wallet
You want to clear the memory on your mobile device. Which of the following is sufficient?
Warm Boot
Smartwatches are examples of?
Wearable Devices
After an HTML document is completed, it needs to be uploaded onto a ________ server before it's visible on the Web.
Web
A ________ is a code embedded as a one-pixel graphics file in an email message which notifies the sender that the message was opened.
Web Bug
An ___ ___ is well versed in HTML5, JavaScript, and CSS.
Web Designer
Which of the following best describes function creep?
When a company uses the technology intended for one purpose for a different purpose
You learn that all of the following are true about TCP/IP EXCEPT:
When a computer sends data over the Internet, the data is grouped into a single packet.
Which of the following is NOT true about two step verification?
When a system sends an authentication code, it typically does not expire
Which of the following best describes jailbreaking?
When a user makes unauthorized modifications to a device's operating system
Which of the following best defines Bluebugging?
When cyberthieves exploit Bluetooth devices that are paired
All of the following statements are true EXCEPT: a. Wireless networks are convenient for people on the move. b. Wireless networks are easier to install because they don't require drilling or digging. c. Wireless networks use radio transmitters. d. Wireless networks are faster than wired networks.
Wireless networks are faster than wired networks.
What device would you use to amplify your wireless signal?
Wireless range extender
menu command
With Windows, for example, you can perform a warm boot by clicking this.
picture/video messaging
With picture messaging, users can send pictures and sound files, as well as short text messages, to a phone or other mobile device, or computer. With video messaging, users can send short video clips, usually about 30 seconds in length, in addition to all picture messaging services.
What is the difference between sleep and hibernate mode?
With sleep mode the computer is placed in a low-power state.
What is the difference between sleep and hibernate mode?
With sleep mode, the computer is placed in a low-power state.
____ size is the number of bits the processor can interpret and execute at a given time
Word
System Analyst
Works closely with users to analyze their requirements, designs and develops new information systems, and incorporates new technologies
Columns and rows collectively make a?
Worksheet
High end desktops are sometimes called?
Workstation
Which type of virus uses computer hosts to reproduce itself?
Worm
You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. What type of malware might you have?
Worm
Which best describes the role of an SEO specialist?
Writes and develops web content and layouts so that they will appear at the beginning of search results
Which of the following best describes the role of an SEO specialist?
Writes and develops web content and layouts so that they will appear at the beginning of search results.
Search Engine Optimization (SEO) Expert
Writes and develops web content and website layouts so tat they will appear at the beginning of search results when users search for content
What markup language includes all of the features of HTML and includes customized tags that give information more meaning?
XML
One-way syncing
You can add/change/delete files in a destination location (target) without altering the same files in the original location (source)
Which of the following is NOT a part of a typical single-user license agreement?
You can rent or lease the software
Can a 32 bit OS be upgraded to a 64 bit system?
a 32-bit OS cannot be upgraded to a 64-bit OS. Another example is that Windows XP cannot be upgraded to Windows 7.
mashup
a Web application that combines services from two or more sources, creating a new application.
continuous backup
a backup plan in which all data is backed up whenever a change is made.
What is an error in a program called?
a bug
data
a collection of unprocessed items, which can include text, numbers, images, audio and video.
Local are network (LAN)
a network in which the nodes are located within a small geographic area
Wide area network (WAN)
a network made up of local area networks (LANs) connected over long distances
WAN
a network that covers a large geographic area (such as a city, country, or the world) using a communications channel that combines many types of media such as telephone lines, cables, and radio waves.
Personal area network (PAN)
a network used for communication among devices close to one person, such as smartphones and tablets using wireless technologies such as Bluetooth and WiFi
check digit
a number or character that is appended to or inserted in a primary key value.
Microsoft Office Specialist
a popular application software certification which tests a user's skills of Office programs
phishing filter
a program that warns or blocks you from potentially fraudulent or suspicious Web sites.
developer
a relational database refers to a file as a relation, a record as a tuple, and a field as an attribute.
user
a relational database, by contrast refers to a file as a table, a record as a row, and a field as a column.
query
a request for specific data from the database.
A cross-platform application is one that runs in what way?
a same on multiple operating systems
Information System
a set of hardware, software, data, people, and procedures that work together to produce information.
Home area network (HAN)
a specific type of LAN located in a home that's used to connect all of its digital devices
Functional Units
a typical enterprise that consists of a wide variety of departments, centers, and divisions. examples: Human Resources, Manufacturing, Sales, Marketing, Customer Service
___ controls how you enter data and instructions and how information is displayed on the screen.
a user interface
command line interface
a user types commands or presses special keys on the keyboard to enter data and instructions.
screen saver
a utility that causes a display device's screen to show a moving image or black screen if no keyboard or mouse activity occurs for a specified time.
file management
a utility that performs functions related to file management. Some of the file management functions that a file manager performs are displaying list of files on a storage medium; organizing files in folders; and copying, renaming, deleting, moving, and sorting files.
uninstaller utility
a utility that removes a program, as well as any associated entries in the system files.
hot spot
a wireless network that provides internet connections to mobile computers and devices.
Input
accept/process data (unprocessed items)
"blank" information is available when the decision maker needs it
accessible
______ information is available when the decision maker needs it.
accessible
Streaming
accessing media content while it downloads
"blank" information is error free
accurate
Critical Thinking Questions Case 4-1 Q: Your friends know that you understand a lot about computers, both the technical details of how they operate as well as information about software. Lately, with all of the concerns about copyright infringement, friends have started to ask you about categories of application software and what each kind permits. You tell your friends that product ______ is a technique that some manufacturers use to ensure you do not install software on more computers than legally licensed.
activation
What describes the term bloatware?
additional hardware and apps installed by an OEM
A byte's _____ is a unique number that identifies the location of a byte in memory.
address
When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as
denial-of-service attack
during which phase of system development would you acquire any necessary hardware and software?
design
When you run an app in windows, it appears in an on-screen work area app. What is this called?
desktop
which MIS reports usually lists just transactions?
detailed
Who is Henry L. Gantt??
developed the Gantt Chart. (like a project management type of chart)
what did Henry L. Gantt do?
developed the Gantt chart
Information security services
develops and enforces policies that are designed to safeguard an organization's data and information from unauthorized users.
Security System project manager
develops and maintains programs and tools designed to provide security to a network
the trend today is toward ___ operating systems that run on computers and mobile devices provided by a variety of manufacturers
device-independent
A data "blank" contains data about each file in the database and each field in those files
dictionary
A data ____ contains data about each file in the database and each field in those files.
dictionary
A data ______ contains data about each file in the database and each field in those files.
dictionary
a "blank" backup copies all of the files that have changed since that last full backup
differential
____ Inspects electronic data to recover documents and files form data storage devices that may have been damaged or deleted..
digital forensics analyst
A graphics tablet also is called a what?
digitizer
A graphics tablet is also called a _____
digitizer
Marketing/Strategy
directs and implements Internet and social media marketing, and manages customer relationships.
management
directs the planning, research, development, evaluation, and integration of technology.
In the acronym ADA, the D stands for _____.
disabilites
In the acronym ADA, the D stands for
disabilities
E-Waste
discarded computers/mobile devices; can cause environmental issues
The network ______ uses the operating system on the network to configure the network, install software, and control network security.
administrator
the network ___, the person overseeing the network operations, uses a server operating system to add and remove users, computers, and other devices to and from the network.
administrator
Computer-aided engineering (CAE)
aids in the development and testing of product designs, and often includes CAD
What are the roles of an operating system?
all operating systems perform the same four basic functions: Control hardware access Manage files and folders Provide a user interface Manage applications
Document management system (DMS)
allows for storage and management of a company's documents, such as word processing documents, presentations, and spreadsheets.
Wiki
allows users to create, add, modify, or delete content via their browsers
report generator
also called a report writer, allows users to design a report on the screen, retrieve data into the report design, and then display or print the report.
You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should make sure to do all of the following EXCEPT _____.
always stay connected to the internet
Drones
an aircraft that operates by an on-board computer and GPS, a remote control device, or mobile device. Also known as a unmanned aerial vehicle (UAV)
what best defines the term cross-platform application?
an application that runs the same way on multiple operating system
When a botnet is used to attack computers or networks, it called a ____ DOS attack.
distributed
What is the term for the variety of forms in which Linux is available?
distributions
On computers running macOS, the "blank" contains icons used to run apps, display minimized windows, and access documents
dock
an ___ ___ ___ allows for storage
document management system (DMS)
server os
an operating system that organizes and coordinates how multiple users access and share resources on a network.
Research and software development
analyzes, designs, develops, and implement new information technology and maintains and improves existing systems.
To register a business name and create a unique URL, a business pays a fee that goes to ________.
domain name registry company
"blank" pitch is the distance in millimeters between pixels on a display
dot
printer resolution is measured by the number of "blank" per inch a printer can print
dots
COGNITIVE ASSESSMENT Which of the following is NOT true about use of unlicensed software?
In most cases, the software owner can make as many copies as desired.
Two-way syncing
any change made in one location is also made in any other sync location
In the current software market what are the three most common operating systems?
In the current software market, the most commonly used desktop operating systems fall into three groups: Microsoft Windows, Apple Mac OS, and Linux.
Google play is an example of an "blank"
app store
first windows developed
In the mid-1980s, Microsoft developed its first version of Windows, which provided a graphical user interface(GUI).
While working as an assistant in an IT department, you have been taking classes in information and systems security. You meet with a career counselor to discuss potential jobs. One of the jobs available at your current company is for a digital forensics analyst. What skill will you need to have to apply for the job?
Inspect electronic data to recover documents and files
Digital Forensics Analyst
Inspects electronic data to recover documents and files from data storage devices that may have been damaged or deleted, for a crime investigation
Megan Kanka
Inspired Megan's Law
What are the three options you get when choosing install now in Windows?
Install now What to know before installing Repair your computer
Systems Programmer
Installs and maintains operating system software and provides technical support to the programming staff
Network Administrator
Installs, configures, and maintains LAN, WANs, wireless networks, intranets, Internet systems, and network software; identifies and resolves connectivity issues.
Computer Technician
Installs, maintains, and repairs hardware and servers; installs, upgrades, and configures software; troubleshoots hardware problems
memory resident
Instructions that remain in memory while the computer or mobile device is running.
What is the definition of nonresident in terms of parts of operating system?
Instructions that remain on a storage medium until they are needed
nonresident
Instructions that remain on a storage medium until they are needed, at which time they transfer into memory (RAM).
Mobile Strategist
Integrates and expands the company's initiatives for mobile users
Customer Relationship Management (CMR) Specialist
Integrates apps and data related to customer inquiries, purchases, support requests, and behaviors in order to provide a complete application that manages a company's relationships with its customers
What best describes the role of a CRM specialist?
Integrates apps and data to provide an application that manages a company's relationships with customers
Podcasts
downloadable or stream media to a computer/portable media player (Ex: Radio shows, political messages, lectures)
When you visit certain Web sites, spyware may be automatically downloaded. This is called a
drive-by download
A "blank" is a small program that tells the operating system how to communicate with a specific device
driver
A(n) _____ is a small program that tells the operating system how to communicate with a specific device.
driver
You have been having issues with your printer, so you decide to learn more about how the printer works. You learn that if you replace your printer with a new one, you will have to install a "blank" to your computer
driver
Which of the following best describes the role of a CRM specialist?
Integrates apps and data to provide an application that manages a company's relationships with customers.
You interact with program through?
Interface
Which cache level is on the motherboard and is separate from the processor chip?
L3
A ________ is a network of computers in a close physical area.
LAN
A home or school likely uses a(n) ______.
LAN
WiMax and UMB are competing standards for ______.
LTE
WiMax and UMB are competing standards for what?
LTE
a ___ is a small program that tells the operating system how to communicate with a specific device.
driver
If cost-effective, what computer components might be considered for upgrade?
It might be cost effective to upgrade one or more of the following components: RAM Hard disk drive CPU Video adapter card Motherboard
Unmanned aerial vehicle/system are other terms for a(n) ______.
drone
What is the definition of open source software?
Its code is provided for use, modification, and redistribution
What term generally refers to hacking into apples iPhone and iPads?
Jailbreaking
Which of the following is the core of an operating system that maintains the computer's clock, starts applications, and assigns the computer's resources, such as devices, programs, apps, data, and information?
Kernel
An encryption _____ is a set of characters that the originator of the data uses to encrypt, and the recipient of the data uses to decrypt.
Key
Which of the following best defines big data?
Large scale data sets that require advanced technologies.
Which of the following best defines big data?
Large-scale data sets that require advanced technologies
_____ is the time it takes a signal to travel from one location to another on a network.
Latency
OS X
Latest version of Apple's operating system.
When describing the macOS interface, you tell her that she can use the ______ to view, organize, and run apps.
Launchpad
Most data items are stored in only one file, which greatly reduces _____ ____.
duplicate data, data redundancy (know duplicate data for test)
Application
app; programs that make users more productive and help them with personal tasks... Three types: -Desktop app: stored on a computer -Web app: stored on web server and accessed through a browser -Mobile app: download from app store on mobile device
Application Software
applications
You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations. Which is not true about cloud data privacy?
Law enforcement officals cannot access email messages stored on the cloud without informing the user first.
Client/server and P2P are two types of network _____.
architecture
client/server and P2P are two types of network "blank"
architecture
Tablet
Lightweight, mobile computer that has a touch screen that operate on batteries (last longer than laptop) or power supply
Who developed Linux?
Linus Torvalds designed Linux in 1991 as an open-source OS.
Which of the following is an open source operating system?
Linux
Which of the three common operating systems is open source?
Linux
Inference rules
are a set of logical judgments that are applied to the knowledge base each time a user describes a situation to the expert system.
A(n) ______ test measures the performance of hardware or software.
benchmark
What is the term for using a set of conditions to measure the performance of hardware in your network?
benchmark
a "blank" test measures the performance of hardware or software
benchmark
a ___ is a set of conditions used to measure the performance of hardware or software.
benchmark
a gigabyte is approximately 1 ____bytes
billion
Fire OS
Linux-based operating system for Amazon Kindle tablets and Amazon Fire phones.
Firefox OS
Linux-based operating system for Amazon Kindle tablets and Amazon Fire phones.
automatic update
Feature can be configured to download and install updates automatically.(or) Feature that regularly provides new features or corrections to the program.
The fastest broadband Internet service is usually
Fiber-optic
What three installation options does the Windows 7 install wizard give you?
File Allocation Table, 32 bit (FAT32)
You want to shrink the size of the file. What do you use?
File Compression
A ________ stores data and software that can then be shared by several users.
File Server
Screen savers and backup programs are under what?
File disk and system managment
What word is used with a type of media and usually means the media can be used to start the computer?
Live
Many programs today use ___ on a webpage as their front end.
Forms
service pack
Free downloadable updates provided by software makers for users who have registered and/or activated their software.
With which of the following do users interact with menus and visual images such as icons, buttons, and other objects to issue commands?
Graphical User Interface (GUI)
How can you tell what wireless devices are connected to your router?
Log in to the routers's IP address and check the configuration page
Detailed analysis sometimes is called ____ design.
Logical
queue
Group of files waiting in the buffer to be printed.
Technical Project Manager
Guides design, development, and maintenance tasks; serves as interface between programmers and management
A ____ was originally a complimentary word for a computer enthusiast.
Hacker
Which of the following is responsible for answering technology-related questions?
Help desk technician
on a star network, what kind of computer controls access to the hardware, software, and other resources on the network and provides a centralized storage area for programs , data and imforation
Host
All in one desktop
Houses the display and tower
A(n) ________ address is a specific/unique number for each network adapter.
MAC
A city or town likely uses a(n)
MAN
a city or town likely uses a what?
MAN
The banking industry almost exclusively uses ____ for check processing.
MICR
A(n) ______ combines video instruction and interaction with an instructor and students in an online classroom.
MOOC
The latest version of the Macintosh operating system is a multitasking operating system available only for computers manufactured by Apple. What is the name for this version?
Mac OS X
In M2M communication, the M stands for?
Machine
Of the following, which one is NOT a way to protect yourself from identity theft?
Make all online purchases with a debit card
A File _____ performs functions related to displaying and organizing files.
Manager
Where might you find a HCL?
Manufacturers Website
what is the data transfer rate equivalent to one million bits per second?
Mbsp (mega bites per second)
_______ is another term for millions of bits.
Megabits
Which historical macro virus sent emails out to the first 50 names of a user's Outlook address book if they opened an email from an unknown sender?
Melissa
The kernel remains in memory while the computer is running. In this way, the kernel is said to be which of the following?
Memory Resident
Which of the following has as its purpose the optimization of the use of random access memory (RAM)?
Memory management
A(n) ________ network is often used to set up a temporary communications system that requires no centralized router.
Mesh
What is the purpose of windows Upgrade Advisor?
Microsoft provides a free utility called the Upgrade Advisor, which scans the system for hardware and software incompatibility issues in hardware before upgrading to newer editions of the Windows OS.
The Code Red worm attacked
Microsoft server software
Internet Explorer
Microsoft's browser.
OneDrive
Microsoft's cloud server.
What are the most common network operating systems?
Microsoft, Linux, Novel, Netware
_____ transmission often is called fixed wireless.
Microwave
The simplest RAID storage design writes data on two drives at the same time and is called ____.
Mirroring
an _____ _____ expert develops and directs an organizations mobile stray including marketing and app development
Mobile Technology
A(n) ________ converts a message from digital to analog or from analog to digital.
Modem
The device used to connect a network to the Internet is called a
Modem
What two devices are often combined into one device in a small network to connect the home network to the Internet and to share the connection between devices on the network?
Modem and router
"blank" transforms one video image into another image over the course of several frames of video
Morphing
Which of the following is NOT true about technology certifications?
Most certification programs require academic coursework
Which of the following is NOT true about technology certifications?
Most certification programs require academic coursework.
What job title is used for the person who uses the server operating system to add and remove users, install software, and administer network security?
Network administrator
If you want to connect multiple devices together?
Network your computers and devices.
All of the following are essential components of every computer system EXCEPT:
Networks
cisco, novell sun and others offer certifications that test knowledge of installing, configuring, operating, and administering ______.
Networks
Which will search pizza or sandwich in new Orleans?
New Orleans (pizza or sandwich)
What are the two file systems by windows?
New Technology File System (NTFS)
Two types of system software are which of the following?
Operating systems and tools that enable you to perform maintenance tasks
multipurpose operating systems
Operating systems that can function as both desktop and server operating systems.
device-independent
Operating systems that run on computers and mobile devices provided by a variety of manufacturers.
Technical Support System
evaluates and intergrates new technologies, administers the organization's data resources, and supports the centralized computer operating system and servers.
what is NOT a recommendation when deciding what to upload to the cloud
even if you have access to installation media, back up your programs and apps
What is the second largest software maker in terms of revenue?
Oracle, behind Microsoft
A ____ is the smallest unit of data a computer can process
bit
______ is a network protocol that defines how two devices use short-range radio waves to transmit data.
bluetooth
A yes/no data type is called
boolean
you can start a computer from a ___, which is removable media that contains only the necessary operating system files required to start the computer.
boot disk
Which virus type targets a computer's start-up files?
boot sector
What type of information is arranged to suit the needs and requirements of the decision maker??
Organized
these icons belong to hat type of software? (lime wire, napster)
P2P (peer 2 peer)
To connect devices within your workspace, use a ____.
PAN
The type of network for communication among a laptop and smartphone using Bluetooth is a
PAN (personal area network)
What term is sometimes used to describe a computer that runs a Window operating system?
PC
the term, ___, sometimes is used to describe a computer that runs a windows operating system.
PC
Which of the following is a popular scripting language for programming Web servers?
PHP
Graphic format for comic style drawings?
PNG
Most Web-based email systems use ________ to retrieve mail and store the messages in a folder on a remote mail server.
POP
On networks that use TCP/IP, _____ software can detect problems, such as why traffic is flowing slowly.
Packet sniffing
______ radio is a wireless transmission medium that distributes radio signals through the air over long distances.
broadcast
She asks you what types of program are Safari and Edge. You tell her that these are ______.
browsers
She asks you what types of programs are Safari and Edge. You tell her that these are what?
browsers
A(n) ______ is a segment of memory or storage in which items are placed while waiting to be transferred from an input device or to an output device.
buffer
while waiting for devices to become idle, the operating system places items in ___.
buffers
an error in a program sometimes is called a ___
bug
This is the greatest problem with regards to a bus network.
bus itself might become inoperable
Warm Boot
by contrast, is the process of using the operating system to restart a computer.
Asynchronous communication is when the sender and recipient a. directly connect to share files. b. do not use the same operating system. c. do not have to be online at the same time. d. use different software but are able to communicate through the Internet.
c. do not have to be online at the same time
Which of the following is not recommended to protect against hardware failure?
cables and locks
____ is the number of bytes (characters) a storage medium can hold
capacity
______ is a practice ISPs use that provides a certain amount of data usage at the optimal speed.
capping
what is tps?
captures and processes data from business activities
Critical Thinking Questions Case 4-2 Q: Your boss, Molly, asks you to create a spreadsheet for sales data for the store at which you both work. In a spreadsheet, B4 represents a(n) ______.
cell
Network certifications
certification that allows a user to be able to address the complex issues that arise when planning, installing, managing, and troubleshooting a network.
Gantt and PERT are types of ______ used to plan and schedule time relationships among project activities.
charts
Which of the following communication application types requires real-time interaction?
chat
A(n) ______ is a number(s) or character(s) appended to or inserted in a primary key value.
check digit
a "blank" is a number or character appended to or inserted in a primary key value
check digit
Process of initiating contact between Bluetooth devices?
Pairing
A(n) _____ is the destructive event or prank the virus delivers
Payload
"blank" is a Linux-based operating system designed to work primarily with web apps
chrome OS
______ is a Linux-based operating system designed to work primarily with web apps.
chrome OS
Desktop operating systems sometimes are called _____ operating systems because they also work in conjunction with a server operating system.
client
Desktop operating systems sometimes are called ______ operating systems because they also work in conjunction with a server operating system.
client
desktop operating systems sometimes are called "blank" operating systems because they also work in conjunction with a server operating system
client
desktop operating systems sometimes are called ____ operating systems because they also work in conjunction with a server operating system.
client
what is not true about client/server networks?
client/server networks do not typically require a network administrator
The system ____ generates regular electronic pulses that set the operating pace of the system unit.
clock
Mobile Computer
Personal Computer that can be carried from place to place (Laptops and Tablets)
cabling
Physical transmission media used in communications include twisted-pair cable, coaxial cable, and fiber-optic cable.
All of these are suggestions for safe computing EXCEPT:
Pirate Software
A(n) _____ is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed.
code of conduct
A "blank" engineer develops AI-based machines and programs
cognitive
A(n) ______ engineer develops AI-based machines and programs.
cognitive
some people use the term ___ to refer to the process of starting a computer or mobile device from a state when it is powered off completely.
cold boot
Some web databases are ______ databases, where users store and share media with other registered users.
collaborative
some web databases are "blank", where users store and share media with other registered users
collaborative
User Experience (UX) Designer
Plans and designs software and apps that consider a user's reaction to a program and its interface, including its efficiency, its effectiveness, and its ease of use.
Which of the following best describes the role of a UX specialist?
Plans and designs software and apps that consider a user's reaction to a program and its interface.
The operating system that a computer uses sometimes is called which of the following?
Platform
Which of the following means the operating system automatically configures new devices as users install them?
Plug and Play
A newer PC will likely have an Ethernet ________ on the main circuit board so it can directly connect to an Ethernet network.
Port
Yahoo!, MSN, and AOL/Netscape are examples of ________.
Portals
user interface (UI)
Portion of software that controls how you enter data and instructions and how information is displayed on the screen.
Badges, cards, smart cards, and keys are _____ objects.
Possessed
Network
collection of computers and devices connected together (often wirelessly) The server accesses resources on a network, the other computers (clients) request recourses from the server
Software/Program
collection of instructions organized for a common purpose (Ex: typing a paper) Two categories: operation systems/ applications
hybrid app
combines features of native and mobile web apps.
which creates logs, documentation, and recovery plans based on cybersecurity threats and incidents?
computer security incident responder
Which is responsible for installing hardware and servers and troubleshooting hardware problems?
computer technician
One of the jobs available at your current company is for a network security administrator. What skill will you need to have to apply for the job?
configure routers and firewalls
Mobile broadband
connects you to the Internet through the same cellular network that cell phones use to get 3G or 4G Internet access
bus network
consists of a single central cable, to which all computers and other devices connect.
software and apps field
consists of companies that develop, manufacture, and support a wide range of software and apps for computers, the web, and mobile devices.
technology equipment field
consists of manufacturers and distributors of computers, mobile devices, and other hardware, such as magnetic and optical drives, monitors, printers, and communications and networking devices.
System Software
consists of programs that control or maintain the operations of computer
data model
consists of rules and standards that define how the database organizes data.
summary report
consolidates data usually with totals, tables, or graphs, so that managers can review it quickly and easily.
Your friend Margo is considering what type of display to purchase with her new desktop computer and she asks you for advice. You tell Margo that most monitors today have a small footprint. What does this mean?
they do not take up much desk space
what is NOT true about command-line interface?
they give you less control to manage detailed settings than a GUI
QBE stands for query by "blank"
example
QBE stands for query by ______.
example
Which MIS reports identifies data outside of a normal condition?
exception
Which of the following MIS reports identifies data outside of a normal condition?
exception
You explain that when the ALU performs calculations on data, it is part of the ____ process in the machine cycle.
executing
A(n) _____ bus allows the processor to communicate with peripheral devices.
expansion
UX stands for user ______.
experience
An "blank" system captures and stores human knowledge and then imitates human reasoning and decision making
expert
An iris recognition system uses technology to read patterns in the users ____
eye
A back end is a program that generally has a more user-friendly interface than the DBMS.
false
A cold boot generally is faster than a warm boot.
false
A multiuser operating system processes all tasks on a first-come, first-served basis.
false
A query language consists of complex, abbreviated statements that allow users to specify data they want to display, print, store, update, or delete.
false
A relational database can store more than two dimensions of data.
false
An object data type is used for a document or image that is attached to the field, which can be opened in the program that created the document or image.
false
An operating system must be installed on a hard drive. It cannot run from a USB flash drive or other media.
false
Apps designed for a specific mobile platform or device generally will work on another without significant modification.
false
Because of convergence, as well as the increased reliance on mobile devices for communications and productivity, the use and function of mobile and desktop operating systems are becoming more similar.
false
Bluetooth devices need to be within the same line of sight.
false
Coaxial cable is capable of carrying significantly more signals than fiber-optic cables.
false
Educational requirements for help desk specialists are more stringent than they are for other careers in the technology field.
false
Ethernet is a network standard that specifies that computers and devices on the network share or pass a special signal in a unidirectional manner and in a present order.
false
Experts recommend that you run multiple antivirus programs simultaneously.
false
Linux is proprietary software.
false
Many people initially used the term, data processing, to refer to the functions of a DMS.
false
Most information gains value with time.
false
Not all computer and mobile devices have an operating system.
false
T1 lines have faster transfer rates than T3 lines.
false
The Google Apps Certified Specialist certification tests a user's ability to use the Google Docs web applications.
false
The kernel is an example of a nonresident instruction.
false
The main difference between network classifications is the number of computers and devices connected to it.
false
The term, PC, sometimes is used to describe a computer that runs on a Mac operating system.
false
When you use a credit card to purchase an item, you are interacting with a CMS.
false
When you use a network to share software, you sometimes have to install the software on your computer, and a server on the network manages the licenses.
false
With P2P file sharing, when a user signs out of the network, others can still access the user's hard drive.
false
a numeric check determines whether a number is within a specified range
false
an object data type is used for a document or image that is attached to the field, which can be opened in the program that created the document or image
false
t/f: FIP addresses concerns regarding security of information protocols
false
t/f: Linux is proprietary software
false
t/f: P2P networks share a common file server
false
t/f: SSDs typically have higher storage capacities than hard disks
false
t/f: a back end is a program that generally has more user-friendly interface than the DBMS
false
t/f: a hybrid app not only saves on development time and costs but also ensures a consistent user interface and fast performance on all devices
false
t/f: a live webcam has the illusion of moving images because it sends a continual stream of still images
false
t/f: a multiuser operating system processes all tasks on a first-come, first-served basis
false
t/f: a query language consists of complex, abbreviated statements that allow users to specify data they want to display, print, store, update, or delete
false
t/f: a storage medium is also called primary storage
false
t/f: although compact keyboards are smaller than standard keyboards, most still include the numeric keypad and navigation keys
false
t/f: an SFA information system is used in product development
false
t/f: an operating system must be installed on a hard drive. It cannot run from a USB flash drive or other media
false
t/f: because of convergence, as well as the increased reliance or mobile devices for communication and productivity, the use and function of mobile and desktop operating systems are becoming more similar
false
t/f: because they are assigned randomly, you cannot use an IP address to determine a computer or device's location
false
t/f: coaxial cable is capable of carrying significantly more signals than fiber-optic cables
false
t/f: continuous backup is inexpensive because the data is constantly being backed up
false
t/f: continuous data protection is widely used by home and small business users
false
t/f: data collection devices are used to read or scan data from a source document
false
t/f: file processing systems require more memory and processing power than data
false
t/f: files on an intranet generally are also accessible from the Internet
false
t/f: if using a webcam, keep it connected to the computer when not in use so that you can control access to it
false
t/f: if you are using a mac and accidentally delete a file from the hard drive and need to recover it, look in the Recycle bin
false
t/f: many people initially used the term, data processing, to refer to the function of a DMS
false
t/f: most information gains value with time
false
t/f: operating systems on embedded computers use a multitasking operating systems
false
t/f: perpendicular recordings aligns the magnetic particles horizontally around the surface of the hard disk
false
t/f: the Google Apps Certified Specialist certification tests a user's ability to use the Google Docs web applications
false
t/f: the higher the number, the faster the response time
false
t/f: the kernel is an example of a nonresident instruction
false
t/f: the term, PC, sometimes is used to describe a computer that runs on a Mac operating system
false
t/f: touchpads are found most often on desktop computers
false
t/f: when you use a credit card to purchase an item, you are interacting with a CMS
false
t/f: with Bluetooth printing, the computer and printer need to be aligned with each other
false
t/f: with a direct conversion, only one location in the organization uses the new system, so that it can be tested
false
t/f: with direct conversion, only one location in the organization uses the new system, so that it can be tested
false
t/f: you should use a humorous name for your account profiles to ensure that you stand out to potential employers
false
t/f: continuous data protection is widely used by home and small business users
false, it is used by enterprise
t/f: in an optical disc, the absence of light is read as a binary digit 1
false, zero
A(n) ________ cable uses light waves to transmit multimedia and voice data.
fiber-optic
A "blank" is the smallest unit of data a user accesses
field
A(n) _____ is the smallest unit of data a user can access.
field
A(n) ______ is a combination of one or more related characters or bytes.
field
A(n) ______ is the smallest unit of data a user accesses.
field
a "blank" is the smallest unit of data a user can access
field
in a database, what is the smallest unit of data a user can access?
field
primary key
field that uniquely identifies each record in a file.
___ ____ referes to the procedure that keep data current.
file maintenance
A ________ stores data and software that can then be shared by several users.
file server
Under what category of programs and apps do screen savers and backup programs fall?
file, disk, and system management
______ is the operating system used by Amazon Kindle tablets.
fire OS
Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)
firewall.
"blank" consists of ROM chips or flash memory chips that store permanent instructions
firmware
ROM chips called ____ contain permanently written instructions, or information, such as start-up instructions.
firmware
Which of the following is another term for a JAD session?
focus group
what is another term for JAD session?
focus group
which is another term for a JAD session?
focus group
Operating System Certifications
focus on particular skills of the user, the operator, the system administrator, and the software engineer.
Data analysis certifications
focus on the discovery, collection, and analysis of evidence on computer networks.
Which is NOT true about wireless access points?
for the best signal, manufacturers recommend positioning the WAP at the lowest possible point
"blank" feedback is a technology that sends resistance to the gaming device in response to actions of the user
force
when a computer is running multiple programs concurrently, the one in the ___ is the active program, that is, the one you currently are using.
foreground
Data analysis certifications often contain the word ______ in their title.
forensics
The collection of biometric and other data used in criminal investigation is called digital ______.
forensics
data analysis certifications often contain the word "blank" in their title
forensics
A(n) ______ is a window on the screen that provides areas for entering or modifying data in a database.
form
"blank" is the process of dividing a hard disk into tracks and sectors
formatting
____ is the process of dividing a hard disk into tracks and sectors
formatting
_____ is the process of dividing a hard disk into tracks and sectors.
formatting
Many programs today use ______ on a webpage as their front end.
forms
many programs today use "blank" on a webpage as their front end
forms
Home and small business users purchase ______ T1 lines, in which they share a connection with others.
fractional
home and small business users purchase "blank" T1 lines, in which they share a connection with others
fractional
A typical enterprise consists of a wide variety of departments, centers, and divisions -- collectively known as ______ units.
functional
Technology sales
generally determine buyers' needs and direct buyers toward devices, computers, and apps that meet their needs.
A "blank" is a virtual perimeter or boundary that disables certain apps or cameras in secure areas
geofence
The primary difference between a LAN and a WAN is the
geographical area
Web
global library on information to those on the internet, made up of electronic documents (webpage) that make up a website stored in a webserver
GUI stands for ______ user interface.
graphical
with a ___ , you interact with menus and visual images by touching, pointing, tapping, or clicking buttons and other objects to issue commands.
graphical user interface
Communications Device
hardware capable of transferring items from computers/devices to transmission media and vise versa (Ex: modems, wireless access points, routers)
Input device
hardware component that allows you to enter data into a computer (Ex: Keyboard, Pointing Devices [mouse], voice/video input, scanner)
Output device
hardware component that conveys info from a computer to one or more people (Ex: Printer, 3D printer, display [screen/monitor]
Digital Literacy
having a current knowledge/understanding of computers, mobile devices, the web, and related technologies
Which is responsible for answering technology-related questions?
help desk technician
Which of the following is responsible for answering technology-related questions?
help desk technician
Salesforce automation (SFA)
helps salesforce manage customer contacts, schedule customer meetings, log customer interactions, manage product information, and place customer orders.
decision support system (DSS)
helps users analyze information and make decisions.
______ mode saves any open documents and running programs or apps to an internal hard drive before removing power from the computer or device.
hibernate
Which is true about cleaning and fixing scratches on an optical disc?
hold the can of compressed air upright while blowing excess dust off of the surface
The protocol used to transfer Web pages is ________.
http
Which of the following is a propriety mobile operating system specifically made for Apple's mobile devices?
iOS
Siri
iOS voice recognition app that enables you to speak instructions or questions to which it takes actions or responds with speech output.
A(n) ______ is a small image that represents shortcuts to apps or other content.
icon
exception report
identifies data outside of a normal condition.
Which of the following best describes the term, redundancy, as it pertains to enterprise businesses?
if one hardware component fails or malfunctions, another can assume its tasks
during which phase of system development would you develop any necessary programs and apps?
implementation
which is NOT true about use of unlicensed software?
in most cases, the software owner can make as many copies as desired
task management
include receiving data from an input device, processing instructions, sending information to an output device, and transferring items from storage to memory and from memory to storage.
Search tools typically use a(n) ______, which stores a variety of information about a file.
index
A(n) ______ system is a set of hardware, software, data, people, and procedures that work together.
information
Gregor tells you that when a DBMS flags a deleted record, ______.
it is deleted logically
You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor. Gregor tells you that when a DBMS flags a deleted record, ______.
it is deleted logically
gregor tells you that when a DBMS flags a deleted record, what happens?
it is deleted logically
Gregor tells you that when a DBMS flags a deleted record, ______.
it is delted logically
the ___ is the core of an operating system that manages memory and devices, maintains the internal clock, runs programs, and assigns the resources.
kernal
The ______ is the core of an operating system.
kernel
Detailed analysis sometimes is called ______ design.
logical
detailed analysis sometimes is called "blank" design
logical
credit cards are a type of ______ stripe card
magnetic
File ______ refers to the procedures that keep data current.
maintenance
file "blank" refers to the procedures that keep data current
maintenance
File _____ refers to the procedures that keep data current.
maintenence
Malware
malicious software that typically acts without the user's knowledge and alters the computer's/mobile device's operations (Ex: Virus)
If you decide you want be involved in planning, research, development, evaluation, and integration of technology, you should look for jobs within the ______ area.
management
MIS stands for ______ information system.
management
You are about to finish your degree in technology and are beginning your career search. You want to narrow down the fields in which you will look for a job. If you decide you want be involved in planning, research, development, evaluation, and integration of technology, you should look for jobs within the ______ area.
management
A File ______ performs functions related to displaying and organizing files.
manager
A file "blank" performs functions related to displaying and organizing files
manager
Customer relationship management (CRM)
manages information about customers, past purchases, interests, and the day-to-day interactions, such as phone calls, emails, web communications, and Internet messaging sessions.
Human Resources Information System (HRIS)
manages one or more administrative human resources functions, such as maintaining and managing employee benefits, schedules, and payroll.
standard utility functions
managing files, searching for files, uninstalling programs, viewing images, cleaning up disks, defragmenting disks, backing up files and disks, setting up screen savers, securing a computer from unauthorized access, protecting against viruses, removing spyware and ad ware, filtering internet content, compressing files, playing media files, burning optical discs, and maintaining a personal computer.
If you decide you want to be involved in planning, research, development, evaluation, and integration of technology, you should look for jobs within the _____ area.
managment
CAM and MRP are examples of information systems used in "blank"
manufacturing
CAM and MRP are examples of information systems used in ______.
manufacturing
A(n) ____ is a light-sensing input device that reads printed text and raphics and then translates the results into a form the computer can process.
scanner
a "blank" is a light-sensing input device that reads printed text and graphics and then translates the results into a form the computer can process
scanner
A data ______ uses analytics and other Big Data techniques to interpret a company's data to better understand its performance.
scientist
A "blank" device initiates an instruction to transmit data, instructions, or information
sending
A "blank" device is a device that initiates an instruction to transmit data, instructions, or information
sending
A(n) ______ device initiates an instruction to transmit data, instructions, or information.
sending
spooling
sends documents to be printed to a buffer instead of sending them immediately to the printer.
DSL Modem
separate signals into voice and data signals so they can travel at the same time on the phone line
Tape storage requires "blank" access, which refers to reading or writing data consecutively.
sequential
Tape storage requires _____ access, which refers to reading or writing data consecutively.
sequential
SAS is a type of SCSI that uses ________ signals to transfer data, instructions, and information
serial
A(n) ______ controls access to hardware, software, and other resources on a network.
server
A SAN is a high-speed network with the sole purpose of providing storage to other attached ______.
servers
Many software makers provide free downloadable updates, sometimes called a(n) ______ to users who have registered and/or activated their software.
service pack
Operating system
set of programs that coordinates all the activities among computer hardware (Ex: Microsoft's Windows)
Adjusting the ______ increases or decreases the crispness of objects in the photo.
sharpness
A virus ______ is a known specific pattern of virus code that antivirus programs use to identify viruses.
signature
The field ______ defines the maximum number of characters a field can contain.
size
the field "blank" defines the maximum number of characters a field can contain
size
___ mode saves any open documents and running programs or apps to memory, turns off all unneeded functions, and then places the computer in a low-power state.
sleep
Mobile device
small computing device that fits in your hand
Wearable device
small, mobile computing device that is worn and communicates with a phone or computer (Ex: Smartwatch)
Using deception to get individuals to reveal sensitive information is also known as a(n) ________ attack.
social engineering
Search Engine
software that finds websites, webpages, images, etc (Ex: google)
Which of the following is NOT an activity in the implementation phase?
solicit vendor proposals
which is NOT an activity in the implementation phase?
solicit vendor proposals
which is NOT true about web application development?
some computers and mobile devices do not support HTML5 but instead rely on Flash
Software Developer
someone who develops programs/apps and writes instructions for computer to process data into information
Mobile User
someone who works with computers/mobile devices while away from main office, home, or school (Ex: real estate agents/students)
Original forms of data, such as time cards or order forms, are known as ____ documents.
source
original forms of data, such as time cards or order forms, are known as "blank" documents
source
The ______ process sends documents to be printed into a buffer instead of sending them immediately to the printer.
spooling
a process called ___, sends documents to be printed to a buffer instead of sending them immediately to the printer
spooling
Which does NOT typically use portrait orientation?
spreadsheet
What does the booting process do?
starts or restarts the computer
This IP address doesn't change every day:
static IP address
The business wants to use a file management service, so you recommend ____ as a service.
storage
Hard disk
storage devices that contains one or more inflexible circular platters that use magnetic particles to store data, instructions, and info
Solid State Drives
storage devices that uses flash memory to store data, contains no moving parts
Storage Media
store data (Ex. Flash drive/Hard disk [storage device that uses magnetic particles to store data, contains moving parts])
Memory
stored instructions/data; some are permanent while others may be erased when the computer is turned off
A mobile _____ integrates and expands the company's initiatives for mobile users.
strategist
A mobile ______ integrates and expands the company's initiatives for mobile users.
strategist
a "blank" has the illusion of moving images because it sends a continual stream of still images
streaming cam
Digital media player
streams digital media from a computer/network to a tv or other entertainment device (Ex: apple TV)
Some RAID levels use ______, which splits data, instructions, and information across multiple drives in the array
striping
If you use an * in a search you are?
substituting characters
A "blank" report usually includes tables and graphs, so that managers can review it quickly and easily
summary
The area of the hard drive used for virtual memory is called a(n) _____ file.
swap
The area of the hard drive used for virtual memory is called a(n) ______ file.
swap
the area of the hard disk used for virtual memory is called a ____.
swap file
the area of the hard disk used for virtual memory is called?
swap file
A(n) ______ is a set of components that interact to achieve a common goal.
system
Which of the following kinds of software consists of the programs that control or maintain the operations of a computer and its devices?
system
Which of the following is responsible for designing and developing information systems?
system anaylst
monitoring "blank" is a part of the support and security phase
system performance
Neural network
system that attempts to imitate the behavior of the human brain
which is responsible for designing and developing information systems?
systems analyst
Which is responsible for installing and maintaining operating system software?
systems programmer
Which of the following is responsible for installing and maintaining operating system software?
systems programmer
In some database programs, a data file is referred to as a(n) ______.
table
in some database programs, a data file Is referred to as an ??
table
"blank" output provides the user with a physical response from the input device
tactile
Digital camera
take/store photos digitally
A ______ drive is comparable to a cassette recorder
tape
Security Certifications
measures a candidate's ability to identify and control security risks associated with any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability.
SDHC and miniSD are examples of what?
memory cards
"blank" transmission often is called fixed wireless.
microwave
______ transmission often is called fixed wireless.
microwave
a megabyte is approximately 1 _____ bytes
million
The simplest storage design writes data on two drives at the same time and is called?
mirroring
___ operating systems typically include or support calendar and contact management, text messages, email, touch screens, digital cameras, media players, a browser, and wireless connectivity
mobile
Game console
mobile computing device for single/multi player games
Portable media player
mobile device that lets you store, organize, view, and play digital media (photos, music, videos)
e-book reader
mobile device where you read e-books (electronic book)
Material Requirements Planning (MRP)
monitors and controls inventory, material purchases, and other processes related to manufacturing operations.
Which is NOT true about technology certification?
most certification programs require academic coursework
Gesture
motion you make on a touch screen with your fingers
Operating systems, such as UNIX and Linux, that function as both desktop and server operating systems sometimes are called ____ operating systems
multipurpose
A(n) ______ app is written for mobile devices running a particular mobile phone operating system.
native
with an "blank" user interface, users interact with the software through ordinary, intuitive behavior such as touch, gesture, and voice
natural
with a ___, users interact with the software through ordinary, intuitive behavior.
natural user interface
With which of the following are users who shut down their computer or mobile device regularly least likely to be concerned?
natural user interfacing
A(n) ______ is a collection of computers and devices connected together via communications devices and transmission media.
network
Cisco certifications that test knowledge of installing, configuring, operating, and administering ______.
networks
cisco certifications that test knowledge of installing, configuring, operating, and administering "blank"
networks
Net "blank" is the concept of open Internet, accessible to all users, without interference from ISPs or other third-parties
neutrality
The Internet is controlled by ________.
no one in particular
Each computer or device on a network is called a "blank"
node
Each computer or device on a network is called a(n) ______.
node
______ is an electrical disturbance that can degrade network communications.
noise
"blank" instructions remain on a storage medium until they are needed, at which time they transfer into memory
nonresident
______ instructions remain on a storage medium until they are needed, at which time they transfer into memory.
nonresident
some parts of the operating system are ____; that is, nonresident instructions remain on a storage medium until they are needed, at which time they transfer into memory.
nonresident
What lets users to type or write comments on a page?
note taking
A(n) ______ is an item that contains data, as well as the actions that read or process the data.
object
Which data type sometimes is called BLOB?
object
an "blank" is an item that contains data, as well as the actions that read or process the data
object
which data type is sometimes called BLOB?
object
When a company sends jobs overseas, outsourcing becomes ______.
offshoring
MMORPGs are
online role-playing games involving hundreds of thousands of players
Linux is ____ software, which means its code is provided for use, modification, and redistribution.
open source
Linux is a kind of software whose code is provided for use, modification, and redistribution. What kind of software is this?
open source
Operations
operates the centralized computer equipment and administers the network, including both data and voice communications.
A(n) ______ system is set of programs that coordinate all the activities among computer or mobile device hardware.
operating
Linux is an example of a?
operating system
the ___ determines the order in which tasks are processed.
operating system
when you purchase a computer or mobile device, it usually has a(n) ____ installed
operating system
If you decide you want to administer a network, you should look for jobs within the "blank" area
operations
"blank" is when an enterprise offloads storage management to an outside organization or cloud storage provider
outsourcing
On networks that use TCP/IP, "blank" software can detect problems, such as why traffic is flowing slowly
packet sniffing
On networks that use TCP/IP, ______ software can detect problems, such as why traffic is flowing slowly.
packet sniffing
A(n) ______ is the amount of data and program instructions that can be swapped at a given time.
page
What is the term for the process of swapping items between memory storage?
paging
the technique of swapping items between memory and storage, called ___, is a time-consuming process for the computer.
paging
Devices that share a Bluetooth connection are said to be ______.
paired
features unique to recent version of the iOS operating system include
passbook
A(n) ______ is a private combination of characters associated with the user name that allows access to certain computer, mobile device, or network resources.
password
Which of the following is a private combination of characters associated with a user name that allows access to certain computer resources?
password
a ____ is a private combination of characters associated with the user name that allows access to certain computer, mobile device, or network resources.
password
Most computer systems rely solely on ________ for authentication.
passwords
A(n) ______ is the destructive event or prank the virus delivers.
payload
On a P2P network, "P" stands for ______.
peer
FTP
permits users to transfer files to and from servers on the internet
Desktop
personal computer that is stationary; separate tower and screen
A scheme called ________ is designed to capture sensitive financial information from the person visiting a Web site.
phishing
Optical discs store items by using microscopic "blank" (indentations) and "blank" (flat areas)
pits/lands
Optical discs store items by using microscopic _____ (indentations) and _____ (flat areas).
pits/lands
During which phase of system development would you develop any necessary programs and apps?
planning
What best describes the role of a UX specialist?
plans and designs software and apps that consider a user's reaction to a program and its interface
The operating system sometimes is called the ______.
platform
The operating system that a computer uses sometimes is called the ___.
platform
the operating system sometimes is called the what?
platform
current "blank" use a row of charged wires to draw an electrostatic pattern on a specially coated paper and then fuse toner to the paper
plotters
Downloadable software extensions that add new features to a browser are known as ________.
plug-ins
Font size is gauged by a measurement system called ______.
points
USB Flash Drive
portable flash memory storage device that you plug into a USB port
Networks that use electrical lines are sometimes called ________.
power-line networks
information literacy
prepares students, employees, and citizens to manage information so that they can be knowledgeable decision makers.
Output
produce information (convey meaning to others)
Under what category of programs and apps do databases and enterprise computing fall?
productivity
online analytical processing (OLAP)
programs that analyze data, such as those in the decision support system,
COGNITIVE ASSESSMENT Q: You are in charge of an event at work. You want to plan and schedule events and resources. What type of software should you use?
project management
Productivity suites typically include, at minimum, all of the following EXCEPT ______.
project management
All of the following are advantages of using a computer network EXCEPT that it
promotes independence so users have exclusive control over their own data and applications.
the blackberry operating system is a ___ mobile operating system that runs on Blackberry smartphones and blackberry tablets
proprietary
A standard that outlines characteristics of how two devices communicate on a network is called a(n) ______.
protocol
technology service and repair field
provides preventive maintenance, component installation, and repair services to customers.
Memory Card
removable flash memory that you remove and insert from a slot in a computer
Power User
requires a powerful computer (Ex: Engineers, scientists, graphic artists)
ERP stands for Enterprise ______ Planning.
resource
Reboot is another term for ______.
restart
In a(n) ______, the DBMS uses the log to reenter changes made since the last save or backup.
rollforward
in a "blank", the DBMS uses the log to reenter changes made since the last save or backup
rollforward
Technology Education
teach employees how to use software and apps, design and develop systems, write programs, integrate and sync data from apps used on multiple devices, and perform other technology-related activities.
Training/Support
teaches employees how to use components of the information system or answers specific user questions.
which serves as an interface between programmers/developers and management?
technical project manager
______ is the use of communications and information technology to provide and assist with medical care.
telemedicine
Broadband connections include all of the following EXCEPT:
telephone modems
Throughput
the actual speed of data transfer that is achieved
batch processing
the computer collects data over time and processes all transactions later, as a group.
online transaction processing (OLTP)
the computer processes each transaction as it is entered.
What best defines what occurs when you partition a hard drive?
the hard drive is divided into separate logical storage areas that appear as distinct drives
What does a GPU control?
the manipulation and display of graphics an a display device
Data transfer rate
the maximum speed at which data can be transmitted between two nodes on a network
plug and play
the operating system automatically configures new devices as you install them.
What happens if your computer or mobile device uses up its available RAM
the operating system may use virtual memory
What happens if your computer or mobile device uses up its available RAM?
the operating system may use virtual memory
What is NOT true about network security?
the operating system on a network does not record unsuccessful sign-in attempts
what is paging?
the technique of swapping items between memory and storage
If no Windows installations are found, which option is disabled?
the upgrade option
Worms execute until
there is a lack of free memory or disk space
You work in a medical lab that requires high-quality dye-sublimation printers. What type of printers do you use?
thermal
label printers typically use "blank" technology
thermal
communications channel
transmission media on which the data, instructions, or information travel.
Digital Device Convergence
trend of computers and devices with technologies that overlap (Ex. Smart phone can do what a camera, game console, e-reader, etc can do in one)
A(n) ______ version is an application you can use at no charge for a limited time to see if it meets your needs.
trial
A WAN can be one large network or can consist of multiple LANs.
true
A consistency check tests the data in two or more associated fields to ensure that the relationship is logical and that the data is in the correct format.
true
A home network can be as simple as using a cable to connect two devices.
true
A queue is the lineup of documents waiting to be printed.
true
Because of its high transfer rates, UWB is best suited for transmission of large files.
true
Database software is another term for a DBMS.
true
FTTP uses fiber-optic cable to provide extremely high-speed Internet access to a user's physical permanent location.
true
Geofencing enables your phone to send or receive notifications when you enter or exit a geographic location.
true
IBM, Microsoft, Novell, Red Hat, and Sun offer certifications that test knowledge of their operating systems.
true
In a typical file processing system, each department or area within an organization has its own set of files.
true
Interference rules are a set of logical judgements that are applied to the knowledge base each time a user describes a situation to the expert system.
true
Megan's Law refers to a group of U.S. laws that require law enforcement agencies to share information in a national database about criminals who commit unlawful acts on children.
true
Mobile web apps are actually websites that provide a user experience similar to native apps.
true
Monitoring system performance is a part of the support and security phase.
true
Most TPSs use OLTP because users need information immediately.
true
One advantage of ERP is complete integration of information systems across departments.
true
Some operating systems allow users to control a network and administer security.
true
Some smartphones can also function as a wireless modem.
true
The computer may run slower while it uses virtual memory.
true
The defragmentation process reduces the amount of time it takes the hard disk to locate and access the files necessary for programs to run.
true
The goal of project management is to deliver an acceptable system to the user in an agreed-upon time frame, while maintaining costs.
true
The start-up process is similar for large and small computers and mobile devices.
true
The trend is toward device-independent operating systems.
true
Unlike a form, you use a report writer only to retrieve data.
true
Virtualization is the practice of sharing or pooling computing resources, such as servers or storage devices.
true
When an organization uses the database approach, many programs and users share the data in the database.
true
With MMS, users can send and receive photos, videos, and audio files
true
With MMS, users can send and receive photos, videos, and audio files.
true
With the database approach, the data is independent of the programs that access the data.
true
Without a data plan, you must use Wi-Fi or a wired connection to access the Internet.
true
You can use LinkedIn to follow companies to stay informed of their job opportunities.
true
macOS is a UNIX-based operating system.
true
t/f: A DisplayPort is an alternative to DVI that also supports high-definition audio and video
true
t/f: Because LCD projectors tend to produce lower-quality images, users often prefer DLP projectors for sharper, brighter images
true
t/f: Blu-ray players are backwards compatible with DVD and CD formats
true
t/f: Bluetooth technology is standardized globally, so it can be used to connect devices that are not of the same make or model
true
t/f: Dice and Monster are examples of career planning websites and apps
true
t/f: EIDE is an interface that uses parallel signals to transfer data, instructions, and information
true
t/f: FTTP uses fiber-optic cable to provide extremely high-speed internet access to a user's physical permanent location
true
t/f: HDTV is the most advanced form of digital television
true
t/f: In RAID level 1, a backup disk exists for each drive
true
t/f: NFC is a technology that uses close-range radio signals to transmit data between devices or a tag
true
t/f: OEM stands for original equipment manufacturer
true
t/f: a 2.1 speaker system contains two speakers and one subwoofer
true
t/f: a BAN is a type of PAN that wirelessly connects sensors worn by, carried by, implanted in, or attached to a human body
true
t/f: a DBMS uses the data dictionary to perform validation checks
true
t/f: a WAN can be one large network or consist of multiple LANs
true
t/f: a composite key consists on multiple fields
true
t/f: a consistency check tests the data in two or more associated fields to ensure that the relationship is logical and that the data is in the correct format
true
t/f: a digital pen is an input device that captures and converts a user's handwriting or drawings into a digital format
true
t/f: a home network can be as simple as using a cable to connect two devices
true
t/f: a queue is the lineup of documents waiting to be printed
true
t/f: a storage appliance has its own IP address
true
t/f: agile development guidelines emphasize adaption of goals and continuous improvement of the software or app
true
t/f: because of its high transfer rates, UWB is best suited for transmission of large files
true
t/f: bloggers use CMSs to post their blogs and provide categories to posts
true
t/f: census records, stock values, and corporate sales data is structured
true
t/f: diagnostic software included with a computer or device assists technician in identifying problems
true
t/f: expert systems are a component of artificial intelligence
true
t/f: geofencing enables your phone to send or receive notifactions when you enter or exit a geographic location
true
t/f: geofencing enables your phone to send or receive notifications when you enter or exit a geographic location
true
t/f: hard disks are read/write storage media
true
t/f: hard drives and flash memory storage use direct access storage techniques
true
t/f: if thrashing occurs, try to exit the program. If that does not work, try a warm boot and then a cold boot
true
t/f: in a typical file processing system, each department or area within an organization has its own set of files
true
t/f: in addition to the ball, a trackball usually has one or more buttons that work like mouse button
true
t/f: in some cases, the operating system for the network is a set of programs that are separate from the operating system on the client computers or mobile devices that access the network
true
t/f: information systems support daily, short-term, and long-range information requirements of users in a company
true
t/f: laser printers typically print at faster speeds than ink-jet printers
true
t/f: macOS is a UNIX-based operating system
true
t/f: mobile web apps are actually websites that provide a user experience similar to native apps
true
t/f: most TPSs use OLTP because users need information immediately
true
t/f: most magstripe readers are separate devices that communicate with POS terminal
true
t/f: one advantage of ERP is complete integration of information systems across departments
true
t/f: open source software has no restrictions from the copyright holder regarding modification of the software's internal instructions
true
t/f: open source software has no restrictions from the copyright holder regarding modifications of the software's internal instructions
true
t/f: operating systems that function as both desktop and server operating systems are called multipurpose operating systems
true
t/f: output is a data that has been processed into a useful form
true
t/f: output is data that has been processed into a useful form
true
t/f: outsourcing is when an enterprise offloads storage management to an outside organization or cloud storage provider
true
t/f: routers along the internet backbone forward data packets to their destination using the fastest available path
true
t/f: some DSL, installations include a dial tone, providing users with both voice and data communications
true
t/f: sometimes communications devices are preprogrammed to accomplish communications tasks
true
t/f: the computer may run slower while it uses virtual memory
true
t/f: the defragmentation process reduces the amount of time it takes the hard disk to locate and access the files necessary for programs to run
true
t/f: the goal of project management is to deliver an acceptable system to the user in an agreed-upon time frame, while maintaining costs
true
t/f: the process in which two or more computers or devices transfer data, instructions, and information is known as digital communications
true
t/f: the program specification package identifies required programs and the relationship among each program, as the input, output, and database specifications
true
t/f: the transfer rate of external hard drives usually is slower than that of internal hard drives
true
t/f: the trend is toward device-independent operating systems
true
t/f: to assist with sound decision making, information must have value
true
t/f: unlike a form, you use a report writer only to retrieve data
true
t/f: uses of RFID include tracking times of runners in a marathon and checking out library books
true
t/f: when an organization uses the database approach, many programs and users share the data in the database
true
t/f: with the database approach, the data is independent of the programs that access the data
true
t/f: without a data plan, you must use Wi-Fi or a wired connection to access the internet
true
t/f: you can use LinkedIn to follow companies to stay informed of their job opportunities
true
t/f: you should not remove a portable flash memory storage while it is in use because the operating system may still be accessing the device
true
The typical computer criminal is a(n)
trusted employee with no criminal record
Optical discs
type of storage media that consists of flat, round, portable media made of metal, plastic, and lacquer that is written and read by a laser (Ex: CDs and DVS)
IT consultant
typically hired based on expertise, provides technology services to his or her clients.
a ___ tool removes a program or app as well as any associated entries in the system files.
uninstaller
TCP/IP protocols define how information can be transferred between machines and how machines on the network can be identified with ________ addresses. a. unique b. similar c. identical d. multiple
unique
Every host computer on the Internet has a(n) ________.
unique IP address
field name
uniquely identifies each field.
Transmission from an earth-based station to a satellite is a(n) ______.
uplink
transmission from an earth-based station to a satellite is an "blank"
uplink
Smart TV
use internet to watch videos, listen to music, play games, and communicate with others while watching TV
______ information has meaning to the person who receives it
useful
Remote access means that a(n)
user is connecting to a network through a phone line, television cable, or wireless link
which of the following best describes the principal of least privilege?
user's access privileges are limited to the lowest level necessary perform required tasks
each user account typically consists of a ___ and password.
username
Newsgroups
users have written discussions on a particular subject
DSL
uses a standard phone line to connect your computer to the Internet
Fiber-optic service
uses plastic or glass cables to transfer the data at the speed of light
Home user
uses technology at home
Cable
uses your television's cable service provider to connect to the Internet
Which of the following kinds of drives is the drive from which a personal computer starts?
Boot
Which of the following is the process of starting or restarting a computer or mobile device?
Booting
In what decade was ARPANET developed?
1960s
You want to use the UMB cellular transmission standard on your new mobile phone. Which standard will you use?
4G
operating system (OS)
A set of programs that coordinates all the activities among computer or mobile device hardware.
Coaxial cable
A single copper wire surrounded by layers of plastic insulation, metal sheathing, and a plastic jacket; used mainly cable TV and cable Internet service
device driver
A small program that tells the operating system how to communicate with a specific device. Also called driver.
Packets
A small segment of data that's bundled for sending over transmission media. Each packet contains the address of the computer or peripheral device to which it's being sent
COGNITIVE ASSESSMENT Q: Which of the following is NOT true about software suites?
A software suite typically costs more than purchasing each application individually.
Network-attached storage (NAS) device
A specialized computing device designed to store and manage network data
Chromebox
A specialized desktop that runs Chrome OS.
Chromebook
A specialized laptop that runs Chrome OS.
cross-platform application
An application that runs the same on multiple operating systems.
Which of the following best defines the term cross-platform application?
An application that runs the same way on multiple operating systems
Mac OS X is a multitasking operating system available for computers manufactured by
Apple
What part of body does CVS effect?
Eyes
Features unique to recent versions of the Android operating system include
Google play
Chrome OS
Google's Linux-based operating system designed to work primarily with web apps.
Google Play
Google's app store that provides access to apps, songs, books, and movies.
real-time operating system (RTOS)
Operating system used by an embedded computer.
IBM, Microsoft, Novell, RedHat, Sun and others offer certifications that test knowledge of what?
Operating systems
A group of two or more integrated hard drives is called a ____
RAID
A group of two or more integrated hard drives is called a(n) ______.
RAID
What is the name of the storage technology that enables multiple hard disks to operate as single logical units?
RAID
a ______ is a flash memory storage device that contains its own processor to manage its storage
SSD
The term hard drive refers collectively to hard disks and ____.
SSDs
the term hard drive refers collectively to hard disks and ______
SSDs
What is the active partition?
The OS uses the active partition to boot the computer.
The keyboard shortcut for pasting text is CTRL+______ or COMMAND+______.
V
analysts often refer to the three ___'s when describing characteristics of big data
V's volume velocity variety
A "blank" is a third-party business that provides network services
VAN
A(n) ______ is a third-party business that provides network services.
VAN
________ is a secure electronic "tunnel" through the Internet that prevents unauthorized access or eavesdropping.
VPN
Which of the following jobs might use Google Cardboard to create storytelling tools?
VR engineer
which jobs might use Google Cardboard to create storytelling tools?
VR engineer
______ compares data with a set of rules or values to determine if the data meets certain criteria.
Validation
___, developed by Microsoft, is a proprietary mobile operating system that runs on some smartphones.
Windows phone
why would a field that contains numbers have a text data type?
because the values will not be used as calculations
Why would a field that contains numbers have a text data type?
because the values will not be used in calculations
_____ is currently the most popular network standard for LANs.
ethernet
knowledge base
is the combined subject knowledge and experiences of the human experts.
Satellite
is used in mostly rural or mountain areas that can't get DSL, cable, or FiOS
native app
is written for mobile devices running a particular mobile phone operating system.
"blank" data is stored in separate files in different departments
isolated
what would you type in cell A13 to make it an absolute cell reference format.
$A$13 you put dollar signs in front of it
What makes information valuable?
-Accurate Information is error free. -Verifiable information can be proven as correct or incorrect. -Timely information is useful only within a specific time period. -Organized information is arranged to suit the needs and requirements of the decision maker. -Accessible information is available when the decision maker needs it. -Useful information has meaning to the person who views it. -Cost-effective information should provide more value than its costs to produce.
Organization that sells domain names?
registrar
manufacturers measure optical disc drives relative to the original speed, using an X to denote a transfer rate of ____ KBps
5
What is an important safety precaution for preventing unauthorized access to your router?
-Installing antivirus software -Installing spyware detection software -Changing the default router password
A single fiber-optic cable can replace ________ copper telephone cables.
10,000
Over ________ were spent by businesses and government to repair problems in regard to Y2K.
100 billion dollars
Another name for the original Ethernet standard is ________.
10BASE-T Ethernet
With Bluetooth printing, the computer and printer need to be within a ___ foot range.
30
With Bluetooth printing, the computer and printer need to be within an approximate "blank" foot range
30
Which generation was the first to introduce MMS?
3G
________ uses high-bandwidth connections to communicate multimedia over wireless networks, but lacks true broadband speed.
3G
How many partitions can you have on a hard drive?
4
T3 connections transmit data at this speed:
45 Mbps
With ______ processing, the computer collects data over time and processes all transactions later, as a group.
??
What are the memory capabilities of the 32 bit and 64 bit CPU architecture?
A 32-bit OS is capable of addressing only 4 GB of system memory, while a 64-bit OS can address more than 128 GB.
What bit architecture can x86 support?
A 32-bit architecture that processes multiple instructions using a 32-bit address space.
which is NOT true about DSSs?
A DDS uses data only from internal sources
Which of the following is NOT true about DSSs?
A DSS uses data only from internal sources
Which of the following is NOT true about DSSs?
A DSS uses data only from internal sources.
What are the characteristics of a network operating system?
A NOS has the following characteristics: Supports multiple users Runs multi-user applications Provides increased security compared to desktop operating systems
Which of the following best describes the function of TPS?
A TPS captures and processes data from buisness activites
Which of the following best describes the function of a TPS?
A TPS captures and processes data from business activities
Which of the following best describes the function of a TPS?
A TPS captures and processes data from business activities.
Cat 6 cable
A UTP cable type that provides more than 1 Gb/s of throughput
Cable internet
A broadband service that transmits data over coaxial data
While waiting for devices to become idle so that they can receive additional instructions, where does the operating system place items?
A buffer
Which of the following describes e-commerce?
A business transaction that occurs over an electronic network
Fiber-optic cable
A cable that transmits data at close to the speed of light along glass or plastic fibers
What is a cleaning installation?
A clean installation of an OS proceeds as if the disk were brand new.
What is a cluster ?
A cluster is also called a file allocation unit. It is the smallest unit of space used for storing data.
What is a cylinder?
A cylinder is a stack of tracks lined up one on top of another to form a cylinder shape.
What is contained in the registry?
A database that contains all the information about the computer.
What are the characteristics of a desktop OS?
A desktop OS has the following characteristics: Supports a single user Runs single-user applications Shares files and folders on a small network with limited security
Home network server
A device designed to store media, share media across the network, and back up files on computers connected to a home network
Switch
A device for transmitting data on a network. A switch makes decisions, based on the media access control address of the data, as to where the data is to be sent
Network navigation device
A device on a network such as a router or switch that moves data signals around the network
Wireless range extender
A device that amplifies your wireless signal to get it out to parts of your home that are experiencing poor connectivity
Modem
A device that connects a network to the Internet
Network adapter
A device that enables the computer (or peripheral) to communicate with the network using a common data communication language, or protocol
Router
A device that routes packets of data between two or more networks
Which of the following is NOT true about OOP languages?
A disadvantage of OOP is that you cannot reuse or modify existing objects.
backup and restore
A duplicate of content on a storage medium that you can use in case the original is lost, damaged, or destroyed.
What is a file?
A file is a block of related data that is given a single name and treated as a single unit.
What is an audit trail?
A file that records access attempts
What happens when you partition a hard drive?
A hard drive is divided into specific areas called partitions.
Smart home
A house in which devices and appliances are automated or controlled by apps
Enterprise
A large organization that requires special computing solutions because of its size and geographical distribution.
What is a logic drive?
A logical drive is a section of an extended partition.
Peer-to-peer (P2P) network
A network in which each node connected to the network can communicate directly with every other node on the network
Service set identifier (SSID)
A network name that wireless routers use to identify themselves
Ethernet network
A network that uses the Ethernet protocol as the means (or standard) by which the nodes on the network communicate
What can you use to identify a problem with resources so that you can try to resolve any problems?
A performance monitor
desktop
A personal computer designed to be in a stationary location, where all of its components fit on or under a desk or table. Also called a desktop computer.
Linux
A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.
virtual memory
A portion of a storage medium, such as a hard drive or USB flash drive, that the operating system allocates to function as additional RAM.
What is virtual memory?
A portion of the hard disk designated to function as additional RAM
password
A private combination of characters associated with the user name that allows access to certain computer, mobile device, or network resources.
What is multi threading?
A program can be broken into smaller parts that are loaded as needed by the operating system. Multi threading allows different parts of a program to be run at the same time.
device-dependent
A program is one that runs only on a specific type or make of computer or mobile device.
Which of the following best describes a back door?
A program that allows users to bypass secuirty controls
performance monitor
A program that assesses and reports information about various computer resources and devices.
Which of the following best describes a rootkit?
A program that easily can hide and allow someone to take full control of your computer from a remote location.
COGNITIVE ASSESSMENT Q: Which of the following best describes an app?
A program that makes users more productive.
Blackberry operating system
A proprietary mobile operating system that runs on Blackberry smartphones and Blackberry tablets.
Windows Phone
A proprietary mobile operating system that runs on some smartphones.
What is a sector?
A sector contains 512 bytes.
A(n) ______ database stores data in tables that consist of rows and columns.
relational
image viewer
A tool that allows users to display, copy, and print the contents of a graphics file, such as a photo.
screen saver
A tool that causes a display device's screen to show a moving image or blank screen if no keyboard or mouse activity occurs for a specified time.
file manager
A tool that performs functions related to displaying files in folders; and copying, renaming, deleting, moving, and sorting files. (or) A tool that performs functions related to file management.
uninstaller
A tool that removes a program, as well as any associated entries in the system files.
disk defragmenter
A tool that reorganizes the files and unused space on a computer's hard disk so that the operating system accesses data more quickly and programs and apps run faster.
search
A tool, usually included with an operating system, that attempts to locate a file on your computer or mobile device based on criteria you specify.
What is a track?
A track is one complete circle that can contain data on one side of a hard drive platter. A track is broken into groups of sectors.
DSL (digital subscriber line)
A type of connection that uses telephone lines to connect to the Internet and that allows both phone and data transmissions to share the same line
Client/server network
A type of network that uses servers to deliver services to computers that are requesting them (clients)
user name
A unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user. Also called log on name or sign on name.
Satellite internet
A way to connect to the Internet using a small satellite dish, which is placed outside the home and is connected to a computer with coaxial cable. The satellite company then sends the data to a satellite orbiting the Earth. The satellite, in turn, sends the data back to the satellite dish and to the computer
What best describes a hot spot?
A wireless network that provides internet to mobile devices
"blank" is popular hardware certification
A+
______ is a popular hardware certification.
A+
Which of the following should you NOT do to secure a wireless network? A. Keep the default network name and router password. B. Create a security encryption passphrase. C. Implement media access control. D. Disable SSID broadcasting.
A. Keep the default network name and router password
Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA Soccer on his Xbox, and her dad is checking stock quotes on his iPad. What kind of network does this family have? A. P2P network B. Client/server network C. both A and B D. neither A and B
A. P2P network
Which of the following is FALSE? A. You can connect to any wireless network your computer detects. B. Your neighbor may be able to access your wireless network. C. Encryption makes it difficult to connect to a wireless network. D. Using default passwords makes it easier to hack into a router.
A. You can connect to any wireless network your computer detects
A(n) ______ is an output device that visually conveys text, graphics, and video information. a. Display b. Webcam c. Scanner d. Printer
A: Display
Which of the following best describes how you can use Facebook? a. Share messages, interests, activities, events, photos, and other personal information with friends. b. Follow people, companies, and organizations in which you have an interest. c. Share personal interests, education, and employment history. d. Create an online journal of short messages broadcast to your followers.
A: Share messages, interests, activities, events, photos, and other personal information with friends.
When you ______ computers and mobile devices, you match the files in two or more locations with each other. a. Sync b. Network c. Pair d. Link
A: Sync
Which Internet communication service can you use to speak to other users over the Internet? a. VoIp b. IM c. Email d. FTP
A: VoIP
Activity trackers and smartwatches are two types of ______ devices. a. Wearable b. Plug and play c. Streaming media d. GPS
A: Wearable
What is not true about PC's?
ACER, Dell, and HP use Mac operating system
What network became functional in 1969?
ARPANET
______ information is available when the decision maker needs it.
Accessible
What type of information is error free?
Accurate
______ information is error free.
Accurate
What is the central database that is used to manage network resources in Windows?
Active Directory
A "blank" tag contains a battery that runs the chip's circuitry and broadcasts a signal to the RFID reader
Active RFID
Which is not true about public Wi-Fi hot spot safety?
Always keep your wireless connection on
What is API (Application Programming Interface)?
An API allows programs to access the resources managed by the operating system in a consistent and reliable manner.
which best describes the function of an MIS?
An MIS captures and processes data from business activities
Which of the following best describes the function of an MIS?
An MIS captures and processes data from business activities.
Which of the following best describes the function of MIS?
An MIS generates information for problem solving
Help Desk Specialist
Answers technology-related questions in person, on the phone, or via email or an online chat room.
What is the function of PnP?
Assigning system resources and installing drivers are performed with a plug-and-play (PnP) process.
VoIP is a type of ____ output.
Audio
Which of the following regularly provides new features or corrections to a program?
Automatic update
Which of the following is NOT used to protect a wireless network? A. Changing network name B. Activating packet switching C. Using security protocols D. Disabling SSID broadcast
B. Activating packet switching
Which of the following statements is TRUE? A. Not broadcasting a wireless network's HTML helps to protect it. B. Router firmware should be kept up to date. C. Wireless networks cannot be protected. D. A firewall encrypts data.
B. Router firmware should be kept up to date.
A(n) ______ consists of programs designed to make users more productive and/or assist them with personal tasks. a. System software b. Application c. Operating system d. Server
B: Application
In the educational practice of BYOD, what does D stand for? a. Drive b. Device c. Disc d. Data
B: Device
Gennie has just gotten her first smartphone with a touch screen. Mia is giving her a lesson on how to use the touch screen. Gennie wants to move an item around on the screen. Mia tells her she should ______. a. Swipe b. Drag or Slide c. Press and Hold d. Stretch
B: Drag or Slide
Twitter and LinkedIn are examples of what kind of website? a. Search Engine b. Online Social Network c. Homepage d. Blog
B: Online Social Network
Which of the following is NOT a basic function of a computer? a. Store Information b. Produce Input c. Process Data d. Accept Data
B: Produce Input
Which of the following is NOT recommended advice to protect your computer from malware? a. Disconnect your computer from the Internet before opening email attachments. b. Remove firewall software and hardware. c. Close spyware windows. d. Scan removable media before using.
B: Remove firewall software and hardware.
Gennie has just gotten her first smartphone with a touch screen. Mia is giving her a lesson on how to use the touch screen. Gennie wants to zoom in. Mia tells her she should ______. a. Drag or slide b. Stretch c. Press and hold d. Swipe
B: Stretch
Which of the following is TRUE about Bluetooth?
BLUETOOTH IS FREE
You work part-time at a computer equipment store in the optical section. A customer asks about DVD formats. You tell her that a "blank" is more expensive DVD format that has higher capacity and better quality
Blu-ray
A personal area network is possible because of the wireless technology known as
Bluetooth
A Yes/No data type also is called ______.
Boolean
Large organizations may operate a ________ network to connect its LANs and transmit data at more than 1 gigabit per second.
Backbone
The major carriers of network traffic are called?
Backbone
Fitness games usually have what type of board?
Balance
________ refers to the quantity of data that can be transmitted through a communication medium in a given amount of time.
Bandwidth
Why would a field that contains numbers have a text data type?
Because the values will not be used in calculations.
why would a field that contains numbers have a text data type?
Because the values will not be used in calculations.
What must be done before an operating system can upgraded?
Before upgrading the operating system, check the minimum hardware requirements of the new OS to ensure that it can be installed successfully on the computer.
________ is the measurement of things such as fingerprints and retinal scans used for security access.
Biometrics
Which of the following is NOT a name of an Android release?
Blackberry
DSL and FTTP are examples of wired?
Broadband
You learn that by spooling documents to a(n) _____, the computer or mobile device can continue interpreting and executing instructions while the printer prints.
Buffer
Just as vehicles travel on a highway, bits travel on a _____.
Bus
Digital device ______ is the trend of computers and devices with technologies that overlap. a. Transference b. Merging c. Convergence d. Compatibility
C: Convergence
What is described as having a current knowledge of computers, mobile devices, the web, and related technologies? a. Computer certification b. Tech knowledge c. Digital literacy d. Webmaster
C: Digital Literacy
A common way to move an object from one location to another using a mouse is to ______. a. Double click b. Right click c. Drag d. Point
C: Drag
Which Internet communication service can you use to transfer items to and from other computers on the Internet? a. VoIP b. Email c. FTP d. IM
C: FTP
Trojan horses and zombies are examples of ______. a. Cloud apps b. Hackers c. Malware d. Search engine
C: Malware
Digital ______ includes music, photos, and videos. a. Animation b. Multiplex c. Media d. Payables
C: Media
Which of the following is NOT true about memory and storage? a. Hard disks and solid-state disks generally have the largest storage capacities. b. A storage device records and/or retrieves items to and from storage media. c. Most memory keeps data and instructions permanently. d. Storage devices often function as a source of input and output.
C: Most memory keeps data and instructions permanently
A mouse is an example of a(n) ______ device. a. Processing b. Display c. Pointing d. Output
C: Pointing
What is a person called who can accomplish many types of daily tasks using technology? a. Internet wizard b. Computer savant c. Tech savvy d. App efficient
C: Tech savvy
Which of the following best describes the term, the Internet of Things? a. The capability to store and locate information and data on the web. b. Convergence of technological capabilities from multiple devices into fewer. c. The ability of everyday devices to transmit data to and from the internet using sensors. d. The network of devices and computers that connect to the cloud.
C: The ability of everyday devices to transmit data to and from the internet using sensors.
Which of the following is NOT true about digital cameras? a. Many digital cameras have built-in GPS. b. A smart digital camera can communicate wirelessly with other devices. c. To record video, you must purchase a separate digital video camera. d. Digital cameras typically allow you to review, and sometimes edit images while they are on the camera.
C: To record video, you must purchase a separate digital video camera.
Personal Computer (PC)
Can perform input, processing, output, and storage activities alone and is intended to be used by one person (Ex: laptops, tablets, and desktops)
____ is the number of bytes a storage medium can hold.
Capacity
Critical Thinking Questions Case 4-1 Q: Your friends know that you understand a lot about computers, both the technical details of how they operate as well as information about software. Lately, with all of the concerns about copyright infringement, friends have started to ask you about categories of application software and what each kind permits. You tell your friends that all of the following are true EXCEPT:
Customers using freeware can personalize the software to meet their needs.
A _____ demands payment to stop an attack.
Cyberextortionist
Which of the following allows you to connect to the Internet wirelessly? A. WiFi B. 4G LTE C. Mobile hotspot D. All of the above
D. All of the above
Which of the following helps to protect a wireless network from Piggybacking? A. Deactivating packet switching B. Purchasing antivirus software C. Placing the router out of sight D. Limiting wireless signal range
D. Limiting wireless signal range
Which of the following would NOT be a benefit of networking computers? A. sharing printers and other peripherals B. sharing files C. sharing an Internet connection D. sharing software licenses
D. Sharing software licenses
Which of the following is used to access the Internet when WiFi is not available? A. mobile hotspot B. 3G Internet access C. 4G LTE Internet access D. all of the above
D. all of the above
Which of the following might cause interference or poor connectivity between nodes on a wireless network? A. nodes that are too far apart B. concrete walls C. some appliances D. all of the above
D. all of the above
Which of the following is most likely to require use of a server, desktop, and industry-specific handheld computer, and is most likely to use spreadsheets, databases, and accounting software? a. Power user b. Mobile user c. Home user d. Enterprise user
D: Enterprise User
You interact with a program through its user ______. a. Development unit b. Input window c. Protocol d. Interface
D: Interface
If you want to connect multiple devices together in your home to share a single Internet connection and devices such as a printer, what should you do? a. Create a hot spot. b. Pair the devices using Bluetooth. c. Subscribe to cloud services. d. Network your computers and devices.
D: Network your computers and devices
A(n) ______ is software that finds websites, webpages, images, videos, and other information related to a specific topic. a. Browser b. Web server c. Cloud app d. Search engine
D: Search Engine
A web ______ is a computer that delivers requested webpages to your computer or mobile device. a. Terminal b. Host c. Storage device d. Server
D: Server
Which type of system's primary function is to store and manage a company's documents in a central library?
DMS
which type of system's primary function is to store and manage a company's documents in a central library?
DMS
A(n) ________ server maintains look-up tables that map domain names to IP addresses.
DNS
Many phone companies offer ________, a technology for bringing broadband connections to homes and small businesses by sharing the copper telephone lines that carry voice calls.
DSL
Which of the following is NOT a wireless Internet connection?
DSL
Mobile Technology Expert
Develops and directs an organizations mobile strategy, including market and app development
Cognitive Engineer
Develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes
What would you use to see what network adapters are installed in your Windows computer?
Device Manager utility
How is an operating system that runs on computers provided by a variety of manufacturers classified?
Device-independent
Which of the following statements is not true about device drivers?
Devices on a computer can share drivers
Which of the following is NOT true about Wi-Fi networks?
Devices only support one Wi-Fi standard.
Mobile hotspot
Devices that enable you to connect more than one device to the Internet; they require access to a data plan. Most smartphones have this capability built-in
Your friend Margo is considering what type of display to purchase w/ her new desktop computer & she asks you for advice. How do you tell Margo to measure the screens she is considering?
Diagonally, from one corner to another
Examples of broadband technologies include all of the following EXCEPT: a. DSL. b. dial-up. c. fiber-optic. d. All are broadband connections
Dial-Up
The following are all examples of broadband access EXCEPT ________. a. DSL b. cable c. satellite d. dial-up
Dial-Up
A ____ backup copies only files that have changes since the last full backup.
Differential
A voice message must be converted to a(n) ________ signal so it can be stored on a computer's hard drive.
Digital
Trend where they overlap?
Digital Convergence
Some security certifications relate specifically to the area of ____ _____.
Digital Forensics
What is having a current knowledge of computers?
Digital Literacy
What includes music, photos, videos?
Digital Media
T1 and T3 connections are considered ________ connections.
Direct
where your old system starts on one date and your new system starts the day after that. Riskiest of all the conversions
Direct Conversion
What are directories and sub directories called in Windows OS?
Directories are called folders in Windows operating systems, and subdirectories are called subfolders.
partitioning
Dividing a hard drive in separate logical storage areas (partitions) that appear as distinct drives.
_____ pitch is the distance in millimeters between pixels on a display.
Dot
Using a PC to copy software or data from a server, is known as
Downloading
a "blank" database stores data in tables that consist of rows and columns
relational
COGNITIVE ASSESSMENT Q: Which of the following is NOT true about databases?
Each column contains data about a given item in the database, such as a person or product.
Node
Each device connected to a network
Which of the following is NOT an advantage of the database approach?
Eliminates redundant data
In 1999, the Melissa virus was a widely publicized
Email Virus
An organization creates a recovery plan. Which part would include return procedures?
Emergency Plan
Which of the following best describes the users of a VPN?
Employees who work in other locations or who telecommute
What best describes, Internet of Things?
Everyday devices to transmit data to and from internet using sensors
QBE stands for query by _____.
Example
Which of the following MIS reports identifies data outside of a normal condition?
Exception
What identifies data outside of a normal condition?
Exception Report
A ____ system captures and stores human knowledge and then imitates human reasoning and decision making.
Expert
97. A session cookie stores user names and/or passwords so that users do not need to enter this info every time they sign in to the website.
False
A back end is a program that generally has a more user-friendly interface than the DBMS, T/F?
False
A back end is a program that generally has a more user-friendly interface than the DBMS.
False
A brownout is a complete power failure
False
A computer accepts data, called output.
False
A database analyst collects and analyzes evidence found on computers, networks, mobile devices, and databases.
False
A docking station has less functionality than a port replicator?
False
A format checker identifies passive voice and run-on sentences.
False
A hybrid app not only saves on development time and costs but also ensures a consistent user interface and fast performance on all devices.
False
A mail server stores and manages email list?
False
A mainframe network is a network of several servers in one location?
False
A numeric check determines whether a number is within a specified range, T/F?
False
A numeric check determines whether a number is within a specified range.
False
A password is unique combination of characters.
False
A query language consists of complex statements that allow users to specify data they want to display, print, store, update, or delete.
False
A query language consists of complex, abbreviated statements that allow users to specify data they want to display, print, store, update, or delete, T/F?
False
A query language consists of complex, abbreviated statements that allow users to specify data they want to display, print, store, update, or delete.
False
A relational database can store more than two dimensions of data, T/F?
False
A relational database can store more than two dimensions of data.
False
A segment of a video is called a slide.
False
A stick computer has a large amount of storage space?
False
"blank" is the operating system used by Amazon Kindle tablets?
Fire OS
A ________ is hardware or software that protects a wired network from intruders.
Firewall
Where may an operating system reside in a mobile device?
Firmware
___ consists of ROM chips or flash memory chips that store permanent instructions
Firmware
____ consists of ROM chips of flash memory chips that store permanent instructions.
Firmware
______ consists of ROM chips or flash memory chips that store permanent instructions.
Firmware
_____ feedback Is a technology that sends resistance to the gaming device in response to actions of the user.
Foce
What is NOT true about NFC?
For successful communications, the devices must not touch or come within 6 inches of each other
Which of the following is NOT true about NFC?
For successful communications, the devices must not touch within a certain distance....
Which of the following is NOT true about wireless access points?
For the best signal, ....
A ____ key is a special key programmed to issue commands to a computer.
Function
Critical Thinking Questions Case 4-2 Q: Your boss, Molly, asks you to create a spreadsheet for sales data for the store at which you both work. You want to add the numbers in a row or column. You use the SUM_____
Function
a typical enterprise consists of a wide variety of departments, centers, and divisions, collectively known as ___ ___.
Functional Units
human resources, manufacturing, and customer service are examples of what?
Functional Units
Mapping, monitoring speed, and determining altitude all are users of?
GPS
Mapping, monitoring speed, and determining altitude all are uses of
GPS
Mapping, monitoring speed, and determining altitude all are uses of ______.
GPS
The system of satellites used to determine any position on the Earth is known as
GPS
mapping, monitoring speed, and determining altitude all are uses of "blank"
GPS
Motion input sometimes is called _____ recognition.
Gesture
The fastest Ethernet devices today follow the ________ standard.
Gigabit Ethernet
Chrome OS, introduced by ____, is a Linux-based operating system designed to work primarily with web apps.
Which of the following is NOT a desktop operating system?
Google Android
Your certification tested you ion administering, selling and deploying google apps. What is this called?
Google Apps certified specialist
Type of blindness that occurs when a persons attention is diverted?
Inattentional
The more secure an authentication system gets, the more __________ it becomes.
Inconvenient
The Open Group
Industry standards organization that now owns UNIX as a trademark.
____ ____ are a set of logical judgements that are applied to the knowledge base each time a user describes a situation to the expert system
Inference rules
A ____ system is a set of hardware, software, data, people. and procedures that work together.
Information
A(n) ______ system is a set of hardware, software, data, people, and procedures that work together.
Information
What browser is included with Windows?
Internet Explorer
Network administration
Involves tasks such as 1) installing new computers and devices 2) monitoring the network to ensure it is performing efficiently 3) updating and installing new software on the network and 4) configuring, or setting up, proper security for a network
Which of the following is most likely to be used by a remote control?
IrDA
You have been chosen as a TA in your networking class. Your instructor asks you to prepare a presentation on network standards. You mention in your report that the "blank" standard requires line of sight transmission
IrDA
which is most likely to be used by a remote control?
IrDA
_____ data is stored in separate files in different departments.
Isolated
______ data is stored in separate files in different departments.
Isolated
Which of the following is NOT true about operating systems?
It is not possible to run more than one operating system on the same computer.
If the web address of a website begins with https instead of http, what do you know about the website?
It is secure.
Which of the following statements is not true about user interfaces?
Most computers today use a command-line interface
What is a coaxial cable made of?
Mostly copper and aluminum
What type of operating system allows two or more programs or apps to reside in memory at the same time?
Multitasking
Networks, servers, mainframes, and supercomputers allow hundreds to thousands of users to connect at the same time, and thus operating systems are referred to as which of the following?
Multiuser
You are using technology to enable two devices to share contacts when they touch. What is the name for this technology?
NFC
to enable a computer or device that does not have built-in networking capability, use a "blank"
NFC
To enable a computer or device that does not have built in networking capability, use a what?
NIC
You are designing software that will allow users to interact with it through ordinary, intuitive behavior. Which of the following are you using?
NUI
Each individual computer and networked peripheral attached to a LAN is a
Node
Which of the following is a vendor of antivirus software?
Norton
______ software is an application that enables users to enter typed text or handwritten comments on a page.
Note taking
Which of the following includes and profits from installing trial versions of antivirus software on their computers?
OEMs
Which data type sometimes is called BLOB?
Object
thrashing
Occurs when an operating system spends much of its time paging, instead of executing application software.
Which of the following is NOT an example of an operating system?
Office
Broadband
Often referred to as "high speed internet" refers to the type of connection that offers a faster means to connect to the internet A broadband connection is a high-speed Internet connection such as cable, satellite, or digital subscriber line (DSL) . Broadband usually has a data transmission rate of 256 Kbps (kilobits per second) or greater
p2p network
One type of this network is simple, inexpensive network that typically connects fewer than 10 computers. Another type of peer to peer called this, describes an Internet network on which usesrs access each other's hard disk and exchange files directly.
What is the name of Microsoft's cloud server?
OneDrive
What are four examples of an API?
Open Graphics Library (OpenGL) DirectX Windows API Java APIs
What is meant by open source?
Open-source programs allow the source code to be distributed and changed by anyone as a free download or by developers at a much lower cost than other operating systems.
Which of the following is a set of programs containing instructions that coordinate all the activities among computer hardware resources
Operating System
What is the installation and initial booting of the operating system called?
Operating System Setup
multiuser
Operating system that enables two or more users to run programs simultaneously.
When smartphones suggest words for you to use its called?
Predictive
COGNITIVE ASSESSMENT Q: Which of the following is NOT true about presentation software?
Presentations are viewed as clip shows.
Which term is used to describe the practice that user's access privileges are limited to the lowest level necessary to perform required tasks
Principle of least privilege (POLP)
Which term is used to describe the practice that users' access privileges are limited to the lowest level necessary to perform required tasks?
Principle of least privilege (POLP)
You have just written a new app to intercept documents from the operating system that are to be printed and place them in the queue. What is this app called?
Print Spooler
2 main components on the motherboard?
Processor and memory
A host in a network preforms which tasks?
Provides services and connections to other computers on the network
Which of the following is least likely to be the reason for an automatic update?
Providing decryption
Which of the following is least likely to be a capability of the new server operating system your firm has developed?
Providing touch screen technology
Which of the following is NOT a green computing recommendation?
Purchase low-efficency equipment
Your store uses a type of 2-D bar code. What is another term for this type of code?
QR code
You realize your computer has been affected with malware. It seems as if someone is controlling your computer from a remote location. What type of malware is this?
Rootkit
_______ are hardware devices or software programs that direct messages as they travel between networks.
Routers
The _____ are adding palm prints to its fingerprint database.
Royal Canadian Mounted Police (RCMP)
Most email messages are junk email, also known as
SPAM
A ____ is a flash memory storage device that contains its own processor to manage its storage.
SSD
The student asks you which type of storage device is best to store the operating system and applications. You tell her that a ____ is a good option
SSD
Which of the following serves as an interface between programmers/developers and management?
Technical project manager
paging
Technique of swapping items between memory and storage.
What was ray kurzweil known for?
Technology inventor and futurist
Plug and Play
Technology that gives a computer the capability to recognize peripheral devices as you install them.
backward compatible
Term used to refer to a program's or device's capability of supporting older programs or devices, as well as newer programs or devices.
platform
Term used to refer to the operating system that a computer uses, because applications are said to run "on top of" it, or because the it supports the applications.
Wireless fidelity (WiFi)
The 802.11 standard for wireless data transmissions established by the Institute of Electrical and Electronics Engineers (EEE)
What does the OS enable user to do?
The OS enables the user to interact with the software and hardware.
Data Scientist
Use analytics and other big data techniques to interpret a company's data from a variety of sources to better understand its performance, make recommendations for improvement, and predict future outcomes.
Database Analyst
Use data modeling techniques and tools to analyze and specify data usage
______ information can be proved as correct or incorrect.
Useful
______ information has meaning to the person who receives it.
Useful
What three Windows tools can be used to migrate data?
User State Migration Tool Windows Easy Transfer File and Settings Transfer Wizard for Windows XP
command-line interface
User interface in which users type commands represented by short keywords or abbreviations or press special keys on the keyboard to enter data and instructions.
natural user interface (NUI)
User interface with which users interact with the software through ordinary, intuitive behavior.
graphical user interface (GUI)
User interface with which you interact with menus and visual images by touching, pointing, tapping, or clicking buttons and other objects to issue commands.
Which of the following is a unique combination of characters, such as letters of the alphabet and/or numbers, that identifies one specific user?
Username
Which of the following is NOT true about memory?
Users typically are referring to ROM when discussing memory
Which of the following best describes the principle of least privilege?
Users' access privileges are limited to the lowest level necessary perform required tasks.
802.11 is a series of standards to identify "blank" networks
Wi-Fi
An emerging standard of wireless Ethernet, also known as 802.11ad, is
WiGig
________ is a radio-based wireless standard which provides Wi-Fi style access with approximately 70 Mbps speeds to a 25-square mile area.
WiMAX
if you live in a metropolitan area and have a tower that is located in the central of the city, you can get FREE internet within a 30 mile radius of the tower. What is this called?
WiMAX
802.11 is a series of standards to identify ____ networks
Wifi
What is a collaborative Website called?
Wiki
What operating systems will be discussed in this chapter?
Windows 7, Windows Vista, and Windows XP operating system
You are looking for a product developed by Microsoft to enable your organizations to manage applications and websites either onsite or on the cloud. Which product will you use?
Windows Server
Which Window's resource offers additional applications for purchase?
Windows Store
Wallet
Windows app that provides a centralized location for coupons, credit cards, loyalty cards, and memberships in a single, easily accessible location.
stand alone os
a complete operating system that works on a desktop computer, notebook computer, or mobile computing device.
relational database
a database that stores data in tables that consist of rows and columns.
what is NOT true about hard disks
a desktop hard disk is much smaller than that of a laptop
which is not true about OOP languages?
a disadvantage of OOP is that you cannot reuse or modify existing objects
"blank" backup sometimes is called an archival backup
a full
Metropolitan area network (MAN)
a large are network (WAN) that links users in a specific geographic area such as an entire city
relationship
a link within the data.
database log
a listing of activities that change the contents of the database.
In a client/server model, a client program ________.
asks for information
VoIP is a type of "blank" output
audio
3D graphic of human body uses?
augmented reality
COGNITIVE ASSESSMENT Q: You are viewing a 3D graphic of a human body that you can use to visualize various muscles and organs by zooming in and out. What type of app are you likely using?
augmented reality
many programs, including operating systems, include a(n) ___ feature the regularly provides new features or corrections to the program
automatic update
What is a complex system that takes on nearly complete responsibility for a task eliminating the need for human input, verification, or decision making?
autonomous system
Which is NOT recommended for safe credit card use?
avoid using cards with photos
Which of the following best describes the function of a TPS?
b. A TPS captures and processes data from business activities.
Which of the following best describes the users of a VPN?
b. Employees who work in other locations or who telecommute
Which of the following serves as an interface between programmers/developers and management?
b. Technical project manager
Which of the following cloud services does Carbonite provide?
back up files
In a multitasking operating system, ______ programs are running but not in use.
background
______ compatible operating systems recognize and work with applications written for an earlier version of the operating system.
backward
new versions of an operating system usually are ___, which means they recognize and work with applications written for an earlier version of the operating system or platform
backward compatible
the amount of data, instructions, and information that can travel over a communications channel sometimes is called ____.
bandwidth
the amount of data, instructions, and information that can travel over a communications channel sometimes is called?
bandwidth
Two types of operating system user interfaces are graphical and ______.
command-line
two types of operating system user interfaces are graphical and what?
command-line
in a ___, a user types commands represented by short keywords or abbreviations or presses special keys on the keyboard to enter data and instructions
command-line interface
Which of the following is another term for transmission media?
communications channel
Gregor tells you that a "blank" check verifies that a required field contains data
completeness
Gregor tells you that a(n) ______ check verifies that a required field contains data.
completeness
You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor. Gregor tells you that a(n) ______ check verifies that a required field contains data.
completeness
Server
computer dedicated to providing one or more services to computers/devices on a network (can be large or small depending on how many computers it's supporting)
COGNITIVE ASSESSMENT Q: You are developing a spreadsheet for your small business. You are in the process of removing and adding text. What phase are you in?
editing
COGNITIVE ASSESSMENT Q: You want to remove red-eye from photos you took with your digital camera. You should use photo ______ software.
editing
To remove red eye in pictures you should use?
editing
Hardware
electric, electronic, and mechanical components that computers have; they process data and perform tasks through steps
Computer
electronic device, operating under instructions stored in memory, that can accept data, process data, produce information, and store information
which is NOT an advantage of the database approach?
eliminates redundant data
Ticket machines, ATMs, digital cameras, and robotics all use "blank" operating system
embedded
Ticket machines, ATMs, digital cameras, and robotics all use ______ operating systems.
embedded
Enterprise User
employee/customer who uses technology within an enterprise (hundreds or thousands of employees)
Small/Home Office User
employees of companies with <50 employees/ self employed who work from home/ small practices
which best describes the users of a VPN?
employees who work in other locations or who telecommute
Content management system (CMS)
enables and manages the publishing, modification, organization, and access of various forms of documents and other files, including media and webpages, on a network or the web.
Browser
enables users with internet connections to access webpages (Ex: chrome, firefox, safari)
RSS
enables web content to be distributed to subscribers
Online Social Network
encourages members to share interests, photos, videos, etc with others (Ex: Facebook)
alphabetic check
ensures that users enter only alphabetic data into a field.
Which type of user is most likely to use a RAID
enterprise
A "blank" keyboard has a design that reduces the chance of RSIs
ergonomic
If you are going to print an iron-on t-shirt transfer, you likely will use a "blank" printer
ink-jet
While working as an assistant in an IT department, you have been taking classes in information and system security. One of the jobs available at your current company is for a digital forensics analyst. What skill will you need to have to apply for the job?
inspect electronic data to recover documents and files
One example of a synchronous method of communication is...
instant messaging.
Enterprise Resource Planning (ERP)
intergrates MRPII with the information flow across an organization to manage and coordinate the ongoing activities of the enterprise.
Smartphone
internet capable phone with apps (programs)
Cloud Storage
internet service that provides storage
TCP/IP was developed as an experiment in ________, connecting different types of networks and computer systems.
internetworking
A "blank" translates and executes one instruction at a time and converts it to machine language
interpreter
A(n) ______ translates and executes one instruction at a time and converts it to machine language.
interpreter
Crowdsourcing
involving a large group of people (crowd) to collectively contribute time, ideas, funds to a project or common cause
user name
is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user.
Manufacturing Resource Planning II (MRP II)
is an extension of MRP that also includes product packaging and shipping, machine scheduling, financial planning, demand forecasting, and monitoring product quality.
transaction processing system (TPS)
is an information system that captures and processes data from day-to-day business activities.
expert system
is an information system that captures and stores the knowledge of human experts and then imitates human reasoning and decision making. -contains two main components: a knowledge base and inference rules
Management information systems (MIS)
is an information system that generates accurate, timely, and organized information, so that managers and other users can make decisions, solve problems, supervise activities, and track progress.
Artificial Intelligence (AI)
is the application of human intelligence to computers.
When describing the macOS interface, you tell her that she can use the "blank" to view, organize, and run apps
launchpad
You have been chosen as a TA in your networking class. Your instructor asks you to prepare a presentation IrDA. You mention in your report that IrDA uses "blank" to transfer data wirelessly
light waves
______ is a popular, multitasking UNIX-based operating system.
linux
A(n) ______ is a request for specific data from a database.
query
A(n) ______ is a request for specific data from the database.
query
Where do multiple documents line up in a printer?
queue
a "blank" is the line up of documents waiting to be printed
queue
multiple documents line up in a ____ in the buffer.
queue
RFID stands for ______ frequency identification.
radio
_____ is the process of transferring items from a storage medium into memory.
reading
_______ is the process of transferring items from a storage medium into memory
reading
Typically, an embedded computer uses an embedded operating system, sometimes called a ____ operating system.
real-time
A(n) ______ is a group of related fields.
record
In situations when a boot disk is required to restart a computer or device, the book disk is referred to as "blank" media
recovery
In situations when a boot disk is required to restart a computer or device, the book disk is referred to as ______ media.
recovery
In situations when a boot disk is required to restart a computer or device, the boot disk is referred to as ____ media.
recovery
Green Computing
reducing electricity consumed and environmental waste generated when using a computer (Ex: recycling, energy efficient hardware/features, regulating manufacturing processes, extending life of computers, properly disposing of computers)
jailbreaking
refer to hacking into Apple's iphones and Ipads.
rooting
refers to products running android and other operating systems.
When an operating system spends much of its time paging, it is said to be ______.
thrashing
when an operating system spends much of its time paging, it is said to be "blank"
thrashing
when a network reduces upload and download speeds of high-data users at peak time
throttling
Which of the following are shortcuts to an app or other content in Windows?
tiles
in windows 8, ___ are shortcuts to apps or other content.
tiles
"blank" information is useful only within a specific time period
timely
The company for which you work has just released an updated device driver version. Which of the following is least likely to be the reason for the release?
to manage new Internet connectivity issues
memory performance
to optimize the use of random access memory (RAM).
For which purpose would a business use EDI?
to send bids and proposal
for what purpose is keylogging software used?
to store every keystroke in a file for later retrieval
which best describes the function of a primary key?
to uniquely identify each record in a file
A "blank" key is one that switches between two states each time a user presses the key
toggle
Which of the following is most likely to be used by a LAN?
token ring
Which is NOT true about touch screens?
touch screens require separate input devices
Apple uses the term, "blank", to refer to the touchpad on its laptops
trackpad
TPS stands for ______ processing system.
transaction
An RFID reader is also called a(n) ______.
transceiver
An RFID reader is also called what?
transceiver
As it pertains to drives, which of the following best defines the purpose of a controller?
transfer data, instructions, and information from a drive to and from the system bus and other components
which best describe function creep?
when a company uses the technology intended for one purpose for a different purpose
All are true about TCP/IP except?
when a computer sends data over the internet, the data is grouped into a single packet
what best describes jail breaking?
when a user makes unauthorized modifications to a device's operating system
What is bluebugging?
when cyberthieves exploit Bluetooth devices that are paired
Technology overload
when someone feels distressed when without computers/mobile devices
Technology addiction
when someone is obsessed with using technology
802.11 is a series of standards to identify ______ networks.
wi-fi
what is the difference between sleep and hibernate mode?
with sleep mode the computer is placed in a low-power state
Columns and rows in a spreadsheet collectively are called a(n) ______.
worksheet
Internet
worldwide collection of computer networks that connect businesses, agencies, and people (Includes web, email, instant messaging, etc)
which cloud service does Evernote provide?
write documents
Storage Device
writes and reads items to and from storage media DVD drive (Storage device) accepts a DVD (Storage Media/type of optical disc)
"blank" is the process of transferring data, instructions, and information from memory to a storage medium
writing
What is the host name in the url?
www.nps.gov
What are the two common architecture use in Windows OS?
x86 x64