Computer Concepts

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A communication port is a physical circuit through which data flows.​

false

A filing cabinet full of folders and papers would be classified as a structured file because every document has a unique structure.​

false

A formula, such as =B6+(C6*.1), does not contain cell references.​

false

A manual calculator implements algorithms autonomously.

false

A private IP address can be used to send data over the Internet.​

false

A wiki and a tweet are similar because they are collaborative, enabling contributors to post, read, and modify content

false

Access to databases is usually open to anyone within an organization or business.​

false

Acts of war affect only computer systems located on battlefronts.​

false

Although there are online sources for software, most consumers obtain software offline.​

false

An HTML document begins with the DOCTYPE and html declarations.​

false

The part of the data bus that runs between the microprocessor and RAM is called the _______ bus

l​ocal

In a relational database, relationships are specified by joining common data stored in records from different tables.

true

Moore's law accurately described the rate of chip innovation for the last 50 years.

true

RATs can be used to create a backdoor to a victim's device that takes control of the device's camera.

true

Some database software provides tools to work with more than one collection of records, as long as the records are somehow related to each other.​

true

Web apps are examples of cloud computing.​

true

You can create HTML documents with simple text editors such as Notepad or TextEdit

true

You can set up WiFi to use wireless mesh topology OR star topology.​

true

You can think of HTTP as the system that browsers use to communicate with a Web server and ask for HTML documents.​

true

You may be able to bypass DNS outages by changing your DNS server.​

true

You won't find a desktop with application windows on an iOS device.​

true

YouTube is an example of social media.​

true

prior to 1912, there were no laws or regulations restricting amateur radio transmission in the United States.

true

​Any data entering a digital device could be malware

true

​DP is faster than TCP but does not perform error checking.

true

In a database, the template for a record is referred to as a record ______.​

type​

A(n) _______________ uses available technology to work from home or an offsite location.​

t​elecommuter

Digital data can be __________ that have been converted into discrete digits such as 0s and 1s

t​ext ​numbers graphics, sound, and video

Chrome OS is an example of a _________ because it depends substantially on processing and storage provided by cloud-based servers.

t​hin client

The most popular battery type used in today's electronic devices is __________.

​lithium ion

Which of the following tools would be found in 3D graphics software?​

​rendering tools r​ay tracing tools surface texture tools

The primary purpose of ________ software is to help the computer system monitor itself in order to function efficiently.​

​system

Twitter messages, called _________, carry a limit of 140 characters.​

​tweets

The ability to switch between programs makes computers multipurpose devices.​

True

The core of a computer program is a sequence of instructions.

True

The facts in a Prolog program are useful even without any rules.​

True

In a database, a(n) _________ holds data for a single entity.

record​

MIDI files are less compact than digital audio files.

False

Memory cards are typically volatile.​

False

Programmers insert documentation called facts into the program code.​

False

Relational databases store unstructured data.​

False

SQL is banned from the NoSQL technology collection.​

False

SQL statements contain command words but do not contain data.​

False

System software is a set of computer programs that helps a person carry out a task

False

TIFF, PNG, and GIF graphics formats offer lossy compression

False

Ted Nelson developed the specifications for URLs, HTML, and HTTP

False

The Head section of an HTML document contains text and links to images.​

False

The binary number system has only two digits: 1 and 2

False

The entire Internet contains about a zettabyte of data.​

False

The operating systems for smartphones are radically different to those used for tablet computers.​

False

The order or sequence of rules in a Prolog program is usually critical.​

False

The organization that supervises Internet addressing is ARPANET.​

False

________ is utility software designed to measure responsiveness of an Internet connection

Ping​

If a hacker intercepts encrypted data by way of a MITM attack, the contents of that data is not always secure.​

true

In Wikipedia, it is possible to edit the text of an article in HTML

true

The goto command is rarely used by skilled programmers because it can lead to programs that are difficult to understand and maintain.​

True

When a peripheral device is connected or disconnected while the host device is operating, it is called hotplugging

True

Which type of problem requires human intuition as the basis for finding a solution.​

U​nstructured

Once you have installed antivirus software, you don't typically need to keep it running full time in the background

false

Overall, the information provided by blogs tends to be more reliable than information from the mainstream media.

false

Pharming attacks carried out by DNS spoofing can be detected by antivirus software or spyware removal software.

false

Privacy is only important if you have something to hide.​

false

Similar to a worm, a trojan is not designed to spread itself to other devices.

false

Spreadsheet software offers database capabilities for establishing relationships between different record types.​

false

The Web is synonymous with the Internet.

false

The file name of a specific Web page always appears first in the URL.

false

The labels and values on a spreadsheet worksheet cannot be formatted in similar way as you would format text in a word processing document.​

false

The main weakness of OS X is lack of security.​

false

The number of teens using Facebook increased 30% in 2014

false

The objective of a MITM attack is for a third party to block communications between two entities

false

The terms outsourcing and offshoring are the same thing

false

The use of several databases is one of ERP's major advantages.​

false

Transistors performed functions similar to vacuum tubes, but they were larger and more power hungry.

false

T​he AtanasoffBerry Computer was the first computing device to use transistors instead of vacuum tubes as processing circuitry.

false

T​wo-way radio technology went portable during World War I.

false

Using just HTML and CSS, Web designers can create dynamic Web pages.​

false

Viruses spread themselves from one device to another.

false

Web crawlers gather material from the invisible Web.​

false

During the ____________ phase, new hardware is purchased, installed, and tested to ensure that it operates correctly.​

implementation​

Finding a value for a variable is referred to as ___________.​

i​nstantiation

In SQL terminology, creating a relationship between tables is referred to as _______ tables.​

joining​

Once loaded into RAM, the __________ provides essential operating system services, such as memory management and file access.​

kernel​

The goal of the planning phase for an information system project is to create a(n) ____________.​

p​roject development plan

Guglielmo Marconi is credited as the person who invented the ___________, a device that sends and receives sound as electromagnetic waves.

radio

Video compression can be expressed as a compression ______.​

ratio

Wireless connections use licensed frequencies that are available for public use.​

false

Some projects fail because of constant, unmanaged demand for changes, often referred to as ________.​

feature creep​

Head-mounted digital devices designed to look like eyeglasses are called __________.

smartglasses

A(n) ____________ is special high-speed memory that allows a microprocessor to access data more rapidly than from memory located elsewhere on the system board.​

CPU cache, cache

Software for Macs is usually stored in a single executable file with an __________ extension.​

.app or app

The first telephone was invented and patented by Alexander Graham Bell in ________.

1876

What generation of cell phone technology was the first to offer true mobile broadband?

4G

Wireless connections use unlicensed frequencies that are available for public use, including 2.4 GHz and _____ GHz. which is subject to less interference from other devices, but it has a more limited range.​

5, five​

As with other popular mobile operating systems, Android is designed for _______ processors.​

ARM

________ is the term for transmission capacity of a communication channel

Bandwidth​

The term __________ refers to huge collections of data that are difficult to process, analyze, and manage using conventional database tools.​

Big data​

Which of the following would be considered essential software for both laptop computers and a tablet computer

Browser

__________ are the most commonly used database clients.

Browsers

Two of the most common open source and free software licenses are ___________.​

B​SD and GPL

________ is the number of bits that are processed during a specific unit of time, usually during one second.​

B​it rate

Which of the following would NOT be considered an essential element of a browser?​

B​ookmark toolbar

__________ is the obligation not to disclose willingly any information that should be kept private.

Confidentiality​

The ________ paradigm is most efficient for processing words and languages.​

Declarative​

___________ programming is an approach to software development in which programmers anticipate what might go wrong as their programs run, and take steps to smoothly handle those situations.​

Defensive or secure​

The acronym ____________ refers to software that manages data stored in a database.

D​BMS

________ is a wired network technology that is defined by IEEE 802.3 standards.​

Ethernet​

Commonly held expectations of privacy include which of the following?​

Freedom from intrusive surveillance. The expectation that individuals can control their own personally identifiable information

Which of the following is a VoIP service?​

F​aceTime S​​napchat G​oogle Talk

Which of the following is NOT used to create or edit HTML documents?​

F​ilezilla FTP client

_____ is the current HTML specifications.​

HTML5​

Which of the following is NOT drawback of using cloud storage?​

H​igh price of storage.

_​_______ is a 64bit number that uniquely identifies a cellular device.

IMSI

Data becomes _______ when it is presented in a format that people can understand and use.

Information

________ compression stores only the pixels that change color from one frame to the next.

Interframe

_______ compression can be applied to each frame of a video

Intraframe

Which of the following job descriptions best matches that of a systems analyst?

Investigates the requirements of a business or an organization, its employees, and its customers in order to plan and implement new or improved computer services.

_________-density data refers to large volumes of very detailed data in which many of the details are not important.​

Low​

Which of the following is not considered to be type of database client?​

L​ocal software Browsers A​pps

DHCP assigns an IP address to a device and links it to the device's _______ address.​

MAC

A ______ address is used to uniquely identify devices on LANs

MAC, media access control​

______ specifies a standard way to store music data for synthesizers and computers.​

MIDI​

A(n) ______________ rating of 150,000 hours means that, on average, a device could function for 150,000 hours before failing.​

MTBF​

Which of the following sequence of events best describes an online intrusion?

Malware enters the device, then opens a backdoor, leading to an open communications link on the device that a hacker can exploit.

________ determine organizational goals and plan how to achieve those goals.​

Managers​

Which type of network topology allows for redundant paths between devices that can be used to bypass failed devices?​

Mesh

_________ tags make it possible to search for photos or videos using keywords

Metadata

Transmitting data in a telegraph system used the _______ alphabet, a binary encoding system based on dots and dashes.

Morse code​

__________ specify how shared files can be used.​

Permissions

​What provides a visual model for classifying and comparing various social media services

S​ocial media honeycomb

Which of the following is NOT a type of location service?​

S​ociogram

Which of the following is not a filenaming convention?​

S​paces are not allowed

In a(n) __________ database, data for a query is fetched from one or more shards of a distributed database, and then it is processed by the DBMS to produce the query result.​

Relational​

_________ is a temporary holding area for data and programs.​

R​AM

A(n) _________ is a false identity used for purposes of deception

Sockpuppet​

______________ is copyrighted software marketed under a trybeforeyoubuy policy

Shareware

A(n) ___________ is a specialized facility designed to hold and protect computer systems and data.​

data center​

A hard disk drive is an example of magnetic storage

True

A multicore processor that executes more than one instruction at a time is referred to as a parallel processor.​

True

A solid state drive can be used as a substitute for a hard disk drive.​

True

3D graphics can be animated

True

A bitmap graphic is composed of a grid of tiny rectangular cells.​

True

RAM is volatile

True

Along with a profile image, which of the following would also be included in a user profile?​

T​agline

_____ was the first commercially successful computer.

UNIVAC

A ________ device transmits data as radio waves and is compatible with Ethernet, so you can use the two technologies in a single network

WiFi

A basic social media profile generally includes which of the following?​

a user name

Digital devices such as NOOK and the Kindle, that are designed for displaying the content of digital publications, such as books, magazines, and newspapers are referred to as __________.

ebook readers

Crowdsourcing is based on contributions from groups of individuals, but it differs from collaborative work

true

​In a spreadsheet worksheet, a(n) ___________ works behind the scenes to tell the microprocessor how to use the contents of cells in calculations.

f​ormula

A file name extension indicates the _______.

file format

An operating system uses a(n) ___________ to keep track of the names and locations of files that reside on a storage medium, such as a hard disk.​

file system​

A spam __________ uses a set of rules to examine email messages and determine which are spam.

filter

A(n) __________ file consists of a single, twodimensional table of data elements.​

flat​

Most computer historians agree that computers have evolved through _______ distinct generations.

f​our

Operating systems provide file organization tools called ___________.​

f​ile management utilities

During the ____________ phase of the SDLC, the project team supervises the tasks necessary to construct the new information system.​

implementation​

Each fact in a Prolog program is similar to a record in a database, but you can query a Prolog program's database by asking a question, called a(n) _______ in Prolog jargon.​

goal​

A graphics card contains a(n)__________ and special video memory, which stores screen images as they are processed but before they are displayed.​

graphics processing unit , GPU

A ________ networks allow visitors to access the Internet through a LAN, but doesn't allow them to access other resources and data on the network.​

guest​

Passwords used as encryption ________ help to make hijacked data unusable.

keys

The SQL query language provides a collection of special command words called SQL ______________.​

keywords​

The structure of files and folders displayed by File Explorer is called a ________ storage model because it helps you create a mental picture of the way files are organized in a hierarchy of folders.​

logical​

Any device in a network is called a(n) __________.

node

A(n) ____________ administrator plans, installs, and maintains one or more local area networks and may also manage cloud resources.

n​etwork

SQL ____________ are detailed specifications for a command.​

parameters​

In the context of digital devices, the term __________ refers to any component that is required to perform work.​

resource

The ALU uses __________ to hold data that is being processed

registers

Although many content communities allow open access to media, most require _________ before files can be uploaded.

registration​

In the context of database security, user ______ management allows access to data on an asneeded basis.​

rights, permissions​

Any code that is designed to hide the existence of processes and privileges is referred to as a(n) _______.

rootkit

In the context of a Prolog program, a(n) __________ is a general statement about the relationship between facts.​

rule​

Social media services such as Facebook emphasize _______ over the other six factors found in social media honeycombs.​

r​elationships

Dropbox is an example of a file hosting service.​

true

HTML tags are instructions for a browser.​

true

Hackers can use ports to communicate with devices in botnets

true

A typical _________ window displays a work area, called a workspace, that represents a blank piece of paper.​

word processor or word processing​

A virus __________ usually arrives as an email message that contains warnings about a supposedly new virus.

​hoax

_______ applications provide optimal information when they encompass customer support, marketing, and sales.​

​CRM

Digital audio is stored in a variety of file formats, including ___________.

​WMA WAV M​P3

Most graphics software uses a process called pixel _________ to create new pixels by averaging the colors of nearby pixels

​interpolation

If you are traveling and expect to access files on a computer that you've left at home, make sure the remote access utilities is turned off.

false

If you want to change your default browser, you need to delete the browsers that you no longer want to use.​

false

If you want to run thirdparty apps on your Android device, you need to jailbreak it.​

false

In DFD terminology, a data store is a process that changes data by performing a calculation, updating information, or sorting a list.​

false

In a casesensitive database, uppercase letters are equivalent to their lowercase counterparts.​

false

In addition to replicating itself, a virus selfdistributing.

false

In today's Web, most Web pages have bidirectional links.​

false

Information engineering methodology treats an information system as a collection of objects that interact to accomplish tasks.​

false

Information systems can provide some or all of the data needed for strategic, tactical, but not operational planning.​

false

It is not possible to delete the contents of your browser cache.​

false

It is not possible to encrypt a Windows hard drive volume

false

It is not possible to extract analytical data from operational databases.​

false

Microsoft Windows is used exclusively on desktop systems.​

false

Microsoft uses a service called Safe Browsing to alert users about sites to avoid.

false

Most ISPs and email services do not use filtering techniques to block spam

false

Most Internet connections are symmetrical.​

false

Most Web apps require installation on your local computer or handheld device.​

false

Most handheld devices can use either Web apps or mobile apps but not both.​

false

Most wireless LANs use licensed frequencies that require applying to the FCC for permission

false

Network discovery works in the exact same way on all devices

false

On mobile devices, VoIP uses the voice stream, not the data stream

false

Once you've released data to an information system, you still have have control of its distribution or its security.​

false

Partitions are created, modified, and deleted using Filezilla on Macs and Disk Partitioner on PCs.​

false

Purchasing software is the same as buying tangible goods, meaning software can be used, altered, loaned to friends, resold, or given away.​

false

SQL keywords must be entered in all uppercase letters because they are casesensitive.​

false

Search engines do not allow users to view or change their search history information.​

false

Session cookies are stored on a disk or other permanent storage medium.​

false

System documentation contains stepbystep instructions for performing specific tasks.​

false

The acronym ERP stands for enterprise relationship payment

false

The dotcom bubble occurred between the years 2008 and 2010.​

false

The term product life cycle is frequently used to describe patterns in the way consumers adopt technology products.

false

There is a universal standard for categorizing software and various categorization schemes have few similarities

false

Webmail is configured so that incoming messages are stored in an Inbox on your local storage device.

false

When connecting to the Internet, most Internet users connect to a Tier 1 network.​

false

When you create a work, you must apply for protection of that work by copyright and only then do you have exclusive rights to its distribution, modification, and sale.

false

While users can view content, they cannot post any content on YouTube.​

false

With wired connections, such as Ethernet, the rated speed and range are usually quite different to actual performance.​

false

Within a single program, multiprocessing allows multiple commands, or threads, to run simultaneously​

false

Your online reputation is how you see yourself, but your online identity is how others see you.​

false

Your search history is the same as your browser history.​

false

​Most massmailing databases are legitimately compiled from customer lists.

false

​The CANSPAM Act is considered an effective means of controlling the volume of spam on the Internet.

false

Database software stores data as a series of records, which are composed of _________ that hold data.​

fields​

A primary key is a ____________ that contains data unique to a record.​

field​

In a database, a(n) __________ contains the smallest unit of meaningful information

field​

To monitor activity throughout the day, you can wear a __________. These devices, worn on the wrist or clipped to a pocket, monitor your steps and heart rate.​

fitness tracker​

A(n) ______ is a set of letters that share a unified design

font​

In the computer industry, the term _________ refers to the size and dimensions of a device or components

form factor

In 1969, computer scientists began to develop high-level languages, called ________-generation languages, which more closely= resembled human languages.​

fourth​

The number of frames that are displayed per second is measured in _______.​

fps

In digital video, each bitmap image is referred to as a(n) __________.

frame

A(n) _________ informs potential lenders that they must verify the identity of anyone attempting to open an account in your name.​

fraud alert​

In spreadsheet software, a(n) ___________ is a builtin preset formula.​

function

Expert systems are designed to deal with data that is imprecise or with problems that have more than one solution using a technique called __________.​

fuzzy logic​

The concept of _________ allows for the limited use of copyrighted material without obtaining permission from the copyright holder.​

f​air use

Which type of cables are used for high-capacity trunk lines that provide main routes for telephone, cable, and Internet communications?​

f​iberoptic cables

A(n) ____________ is a template that adds the correct formatting as data is entered. If someone attempts to enter data in the wrong format, the database can be set up to reject that entry or correct it.​

f​ield format

A(n) _____________ is a specification that the database designer sets up to filter data entered into a particular field.​

f​ield validation rule

When saving a file, you must provide a valid file name that adheres to specific rules, referred to as _______________.​

f​ilenaming conventions

A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications.

f​irewall

A(n) _________ is a graphical representation of the way a computer should progress from one instruction to the next when it performs a task.​

f​lowchart

A(n) __________ is a section of code that is part of a program, but is not included in the main sequential execution path.​

f​unction

Payment processing is based on an online payment __________ that authorizes credit and debit cards, PayPal, and Apple Pay transactions.​

gateway​

Social media are categorized into four groups: social networking, ___________ networking, content communities, and online communications.​

g​eosocial

In economics, _________ are things that can be used or consumed, whereas _________ are intangible actions performed for a consumer.

g​oods, services

The success of an underwater telegraph cable depended on the discovery of __________, a rubber-like substance.

g​utta-percha

Two devices on a network negotiate their communication protocols through a process called ___________.​

handshaking

A(n) ______ value is a unique number derived from encoding one or more data sets, such as names, serial numbers, and validation codes.​

hash​

Many organizations establish a(n) ____________staffed by technical support specialists who are familiar with the information system's software.

help desk​

Image editors provide an image __________ that can be used to adjust the brightness values for various ranges of dark, midrange, or light pixels​

histogram​

The browser ________ page is the first page displayed when the browser starts.​

home

A WiFi ______ is a wireless local area network that provides Internet access to the public

hotspot

A USB _____ is an inexpensive device that turns one USB port into multiple ports

hub

Web pages are connected by __________ links

hypertext​

Antivirus software can use techniques called__________ to detect malware by analyzing the characteristics and behavior of suspicious files.

h​euristic analysis

What is the term that is used to describe a computer system that could store literary documents, link them according to logical relationships, and allow readers to comment and annotate what they read?​

h​ypertext

The iOS operating system is found on which device?​

iPhone

A database ____________ contains a list of keys, and each key provides a pointer to the record that contains the rest of the fields related to that key.​

index​

Which of the following is data that would NOT be found in a cookie?

information it reads from your hard drive

A(n) ____________ system collects, stores, and processes data to provide useful, accurate, and timely information, typically within the context of an organization.​

information​

Exploits that use malicious SQL statements to gain unauthorized access to a database are called SQL _____________.​

injection​

A(n) ____________ printer has a nozzle-like print head that sprays ink onto paper to form characters and graphics.​

ink jet, inkjet, inkjet

When a program begins, the memory address of the first instruction is placed in a part of the microprocessor's control unit called a(n) __________.​

instruction pointer​

Microprocessors are hardwired to perform a limited, preprogrammed set of activities called a(n) ___________.

instruction set

​There are four categories of _____________: patents, trademarks, copyrights, and trade secrets

intellectual property

1996 was the year that cable _______ service made its debut.

internet

As an alternative to a compiler, a(n) ________ converts and executes one statement at a time while the program is running.​

interpreter​

A(n) _________ SDLC can be used to create and implement a small subset of a system and then enhance it through a series of upgrades.​

iterative​

​Which of the following is an example of an operating system that is used by smartphones?

i​OS ​Android Windows RT

Social media services such as LinkedIn emphasize _______ over the other six factors found in social media honeycombs.​

i​dentity

On an iOS device, when you make unauthorized changes to the device's software, this is called a(n) ____________ .​

jailbreak​

A widely accepted technique called __________ application design is based on the idea that the best information systems are designed when end users and systems analysts work together on a project as equal partners.​

joint​

In a programming language, a(n) ______, or command, is a word with a predefined meaning​

keyword​

The process of designing, entering, and testing the rules in an expert system is referred to as __________.

k​nowledge engineering

The _____________ in a problem statement is the information that is supplied to the computer to help it solve a problem.​

k​nown information

On a network, _______ is the elapsed time for data to make a round-trip from point A to point B and back to point A.​

latency​

Sometimes an application requests memory but never releases it, a condition called a memory ______.​

leak​

When 4:3 videos are displayed in a widescreen player, they are bordered by the black bars of a(n) _______.​

letterbox

​A software ________ is a legal contract that defines the ways in which a computer program may be used

license​

Which of the following options are well suited for using vector graphics?​

line art logos diagrams

Programs such as Dreamweaver and KompoZer are examples of ______ HTML editors.​

local

A password manager can store passwords in an encrypted file located at which of the following storage locations?

local storage c​loud storage U​SB storage

Customer __________ programs such as Zappos VIP help attract and retain customers.​

loyalty​

Dark data centers are an extension of ___________, which allows system administrators to monitor and manage servers using remote control software.

l​ights-out management

What is the term used for when a link leads to a Web page that no longer exists

l​ink rot

Like a ___________ language, an assembly language is classified as a low-level language because it is machine specific—each assembly language command corresponds on a onetoone basis to a machine language instruction​

machine​

A large, closet-sized computer capable of simultaneously processing data for hundreds or thousands of users is most likely a __________ computer.​

mainframe​

The ____________ phase of the SDLC involves the day-to-day operation of the system, making modifications to improve performance, and correcting problems.​

maintenance​

A method is activated by a(n) _________, which is included as a line of program code.​

message

A set of commands called HTTP ________ help your browser communicate with Web servers

methods

Encapsulation refers to the process of hiding the internal details of objects and their ___________.​

methods

A class is defined by attributes and ________.​

methods​

A(n) ___________ is a segment of code that defines an action.​

method​

A qualityofservice ____________ is a technique used for measuring a specific QoS characteristic.​

metric​

Modern refrigerators, washing machines, and other appliances are controlled by integrated circuits called ____________ that combine sensors with processing circuitry

microcontrollers

In a processor, the timing device that sets the pace for executing instructions is called the ___________.​

microprocessor clock

A(n) ____________ is an integrated circuit designed to process instructions

microprocessor​

Data _________ refers to computer algorithms that analyze information to discover previously unknown and useful information, including relationships and patterns.​

mining

Every organization has a goal or plan that's referred to as its ___________.

mission​

The underlying structure of a database is referred to as a database _________.​

model​

In the context of office suites, the term ___________ refers to a component, such as a word processing program.

module

Which of the following is an advantage of wired connection

more secure m​ore dependable ​ faster speeds

A microprocessor that contains circuitry for more than one processing unit is called a ________ processor.​

multicore, multicore, multi core

A key element of __________ databases is their ability to support OLAP queries that make it possible to combine data, drill down to specifics, or slice and dice the data to view it from different perspectives.​

multidimensional​

A(n) ___________ operating system provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously.

multitasking​

Regarding OO programming, which of the following terms best matches with the term "method"?​

m​ain()

​Common classifications of _________ include viruses, worms, and trojans.

m​alware

Desktop and laptop computers require an operating system with a file __________ system that allows users to view and manipulate data files

m​anagement

A(n) _________ is a keyword that describes information, such as the content of a media element.​

m​etadata tag

A ___________ app is designed for a handheld device, such as a smartphone, tablet computer, or enhanced media player.​

m​obile

An operating system's ____________ capability supports a division of labor among all the processing units.​

m​ultiprocessing

A network utility called ______________ produces a detailed list of open ports on a device.

netstat

The circles in a sociogram are referred to as sociogram ______.

nodes

A process called ____________ helps database designers create a database structure that minimizes storage space and increases processing efficiency.

normalization​

The goal of ______________ is to minimize data redundancy.​

normalization​

Which of the following can be used to block unauthorized access while allowing authorized communications on a device or network?

n​etwork router p​ersonal firewall ​ hardware that uses a NAT

Many employment contracts contain a(n) ______________ designed to prevent employees from divulging proprietary information to competitors or opening competing businesses.

n​on-compete clause

​___________ is a term for a person who devises and carries out a scam in order to accomplish a goal.

n​one of the above

A record that contains data is referred to as a record ________.​

occurrence

A(n) _____________ is a collection of programs that typically include word processing, spreadsheet, presentation, and database modules.​

office suite​

___________ reduces the cost of goods and services by using workers and manufacturing facilities in countries with inexpensive labor.

offshoring

Many touchscreens have an _________ coating designed to repel the oils deposited by fingertips

oleophobic

A person's presence on a social media service is referred to as a(n) _________.​

online identity persona ​ avatar

The _________ for an instruction specifies the data, or the address of the data, for the operation.​

operand​

A search __________ is a word or symbol used to narrow or broaden your search.​

operator​

A(n) ____ code, is a command word for an operation such as add, compare, or jump.​

op​

The ________________ paradigm is based on the idea that the solution for a problem can be visualized in terms of objects that interact with each other.​

o​bject-oriented

Most modern transaction processing systems use ________ processing—a realtime method in which each transaction is processed as it is entered.​

o​nline

A(n) ________________ takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software.

o​nline intrusion

Which of the following is a common use of serverside scripting

o​nline shopping

A(n) _________ database is used to collect, modify, and maintain data on a daily basis

o​perational

Parcels of data that are sent over a network are called ________.

packets

A Web __________ is based on an HTML source document that is stored as a file on a Web server.​

page

The phrase programming _____________ refers to a way of conceptualizing and structuring the tasks a computer performs.​

paradigm​

Keywords can be combined with specific ____________, which provide more detailed instructions for the computer to carry out.​

parameters​

A disk __________ is a section of a hard disk drive that is treated as a separate storage unit.​

partition​

​The core function of a password manager is to store user IDs with their corresponding ________.

passwords​

A clipping ______ essentially cuts an object out of an image and knocks out the background to make it transparent.​

path​

A computer file's location is defined by a file ______.​

path​

The action carried out by malware code is referred to as a(n) _______.

payload​

Keyboards and printers are two examples of _________ devices.​

peripheral​

The term __________ device is used for devices such as printers, display devices, storage devices, mice, and headsets that are connected to the system unit of a computer.​

peripheral​

On a network, file sharing allows users to open, view, edit, copy, and delete files from a remote device, providing that they have the proper ___________ .​

permissions​

Cookies that are stored on a device after a session ends are referred to as ________ cookies.​

persistent​

Originally called microcomputers, _________ are designed to meet the computing needs of individuals. ​

personal computers

Computer systems such as the Mark8 and the MITS Altair are examples of early ______ computers

personal​

Speech recognition software analyzes the sounds of your voice and converts each word into groups of ________.

phonemes, phoneme

In a digital camera, a CCD's ________ correspond to pixels.​

photosites, photosite

A(n) ____________ storage model describes what actually happens on the disks and in the circuits.

physical​

Illegal copies of software are referred to as _______ software.​

pirated​

Bitmap graphics are coded as a series of bits. Each bit represents the color of one ________.​

pixel

An undesirable jagged appearance of a graphics image is referred to as _______.

pixelation

Bitmap images are formed by a grid of _____.​

pixels​

A(n) ________ is a program that extends a browser's ability to work with file formats.

plugin

The ability to redefine a method in a subclass is referred to as ___________.​

polymorphism

Link _________ is a measure of the quality and quantity of the links from one Web page to others.​

popularity​

A communication ______ is a virtual end point for data entering and leaving a digital device

port

Popular ___________ software products include Microsoft PowerPoint, iWork Keynote, LibreOffice Impress, and Google Docs Slides.​

presentation​

The downside of the _____________ paradigm is that it does not fit gracefully with certain types of problems— those that are unstructured or those with very complex algorithms.​

procedural​

Activities called ___________ involve the microprocessor receiving commands as software carries out tasks and while input arrives from the keyboard, mouse, and other devices

processes​

A computer _________ is any person whose primary occupation involves the design, configuration, analysis, development, modification, testing, or security of computer hardware or software.

professional​

A social media _________ is the set of information someone provides to friends, contacts, and the public.​

profile​

Most social media sites provide a generic ________ image for users who do not upload a personal photo.

profile​

Instructions that tell a computer how to carry out processing tasks are referred to as a computer _______.​

program, application

A computer ________ designs, codes, and tests computer programs. In addition, they may modify existing programs to meet new requirements or eliminate bugs.

programmer

A computer _____________ is a set of stepbystep instructions that tell a computer how to carry out a task.​

program​

In the context of networks, a communication __________ refers to a set of rules for efficiently transmitting data from one network node to another.​

protocol

Which of the following is not one of the main activities associated with operational databases?​

providing an executive dashboard for decision makers

When a router connects to and communicates over the Internet, it has a ________ IP address that is routable over the Internet.​

public

A(n) __________ is available for use by any routine in the program while a(n) _______________ can be accessed only from the routine in which it is defined.​

public attribute, private attribute

​Which of the following is not an example of an authentication protocol?

p​assword ​PINs f​ingerprint scanner

If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________ is an excellent option.

p​assword manager

Which of the following is not a core CRM system?

p​ayment gateway

If your device will not display a PDF in your browser, you may need to install a browser ________ .​

p​lugin

A(n) __________ pings a packet of data to a port in order to see if that port is open or not

p​ort scan

In Prolog, the __________ describes the relationship between the _________ .​

p​redicate, arguments

In a problem statement, a(n) _____________ methodology requires extensive planning and documentation up front.​

p​redictive

A(n) _______________ is a field that contains data unique to a record.​

p​rimary key

In the words of Justice Brandeis, what is the "right to be let alone?"​

p​rivacy

From the perspective of a business that creates and sells a technology product, the ____________maps the expected profitability of a product from its inception to its demise.

p​roduct life cycle

In addition to sales, CRM, and SCM, ERP modules support business activities such as _____________.

p​roduct planning m​anufacturing and purchasing inventory control and distribution

In the context of economics, ___________ is a measurement of the amount of output that is produced per unit of input.​

p​roductivity

A search engine's_________ processor looks for your search terms in the search engine's indexed database and returns a list of relevant Web sites.​

query​

Computer programming languages designed for databases are called _________ languages because one of their main capabilities is to request data from a database​

query​

A vector graphic can be converted into a bitmap graphic through a process called _________.

rasterizing, rasterization

Which of the following is the technique for adding light and shadows to a 3D image?​

ray tracing

Database software stores data as a series of ____________, which are composed of fields that hold data

records

In a database, a(n) ____________ refers to a collection of data fields.​

record​

A(n) _____________ contains parts of the operating system necessary to boot your computer and diagnose system problems after a hard drive failure or software malfunction.​

recovery drive, system repair disc​

In a(n) _________ database, a table is a sequence of records, similar to a flat file.​

relational

The process of covering a wireframe with surface color and texture is called _________.

rendering, render​

A(n) ____________ control structure directs the computer to repeat one or more instructions until a certain condition is met.​

repetition​

Data __________ refers to the form in which data is stored, processed, and transmitted

representation​

In the context of social media, an online _________ is the impression that is generated by an online persona.​

reputation

Proposed changes to application specifications should be managed within a formal process that includes written change _______.​

requests​

System _________ are the criteria for successfully solving problems identified in an information system.​

requirements​

System ___________ specify the operating system and minimum hardware capacities necessary for a software product to work correctly.​

requirements​

The dimensions of the grid that forms a bitmap graphic are referred to as image __________.

resolution

The number of horizontal and vertical pixels that a device displays on the screen is referred to as screen ________.​

resolution

Unauthorized modifications to any mobile device to overcome limitations imposed by mobile service providers is called _______.​

rooting​

With just facts and goals, Prolog would be nothing more than a database, but the addition of _________ gives programmers a set of tools to manipulate the facts.​

rules​

A(n) ________________ is a software tool for specifying the content and format for a database report. ​

r​eport generator

Which of the following feature is unique to OS X?​

r​esource fork

A ______________ exploit usually begins with a virus warning and an offer to disinfect the infected device.

r​ogue antivirus

The main directory on a storage device is referred to as the ________ directory

r​oot

Which of the following is an example of a DCE?​

r​outer m​odem h​ub

To digitally record sound, __________ of a sound wave are collected at periodic intervals and stored as numeric data in an audio file

samples, sample, sampling

One method of heuristic analysis allows the suspicious file to run in a guarded environment called a(n) ___________ .

sandbox​

Relational databases are organized according to a(n) _________, which is simply the blueprint for its structure.​

schema​

Search engines usually work with keyword queries where the user enters one or more words, called __________.

search terms​

H​ighlevel programming languages were available for use on ________generation computers

second

With the proliferation of computer viruses and worms, computer __________ has become a hot niche for IT workers.

security

In an information system, problems can be classified into three types: structured, ________, and unstructured.​

semi-structured​

An integrated circuit is a set of microscopic electronic circuits etched onto a thin slice of ___________ material such as silicon

semiconducting, semiconductor

During ___________ execution, the first instruction in the program is executed first, then the second instruction, and so on, to the last instruction in the program.​

sequential​

Processors that execute one instruction at a time are considered to be ________ processors​

serial

A computer that is primarily used to serve data to other computers on a network is called a(n) ______________.

server​

________side scripts run on Web servers rather than on your local device.​

server​

An HTTP ________ is a sequence of transactions between a Web server and a broswer.​

session​

The process of dividing a database into distributed subsets is called ________.​

sharding​

An expert system __________ is a software tool containing an inference engine and a user interface that developers use to enter facts and rules for a knowledge base.​

shell

To delete data from a disk in such a way that no one can ever read it, you can use special file ________ software that overwrites supposedly empty sectors with random 1s and 0s.​

shredder​

Unicode uses________ bits and provides codes for 65,000 characters.

sixteen

The __________ form factor features a touchscreen that covers most of the device's surface

slate, tablet

Which type of device is the top target for ransomware?

smartphones

Sociologists use social network diagrams called _________ to depict connections between people.​

sociograms

Most economists regard goods and services as a continuum, with intangible goods, such as __________, in the middle of the continuum.

software

In a general sense, ____________ refers to all the nonhardware components of a digital device

software​

The collection of programs on a computer is referred to as _______________.​

software​

A __________ document contains the text for a Web page interspersed with coding for how to display text and any additional visual or auditory elements

source

An HTML document is sometimes referred to as a _______ document

source

_________ is defined as unsolicited messages that are usually sent in massive numbers using electronic mail systems.

spam

_________ enables people to control software with spoken commands, as well as dictate text into a word processing document.​

speech recognition

Unauthorized changes to the DNS are called DNS ________.

spoofing

Which of the following is not a characteristic of a computer worm?

spread through a process called sideloading

Within the agile development framework, the process of developing each iteration of a program is called a(n) _________.​

sprint​

Any software that secretly gathers personal information without the victim's knowledge is classified as __________.

spyware

Networks use more than one protocol, and the collection of protocols for a network is referred to as a protocol ________.​

stack

HTTP is considered to be a(n) ___________ protocol.

stateless

Because HTTP is a _________ protocol, each time you connect to a different Web page at the site, the server regards it as a new visit.​

stateless​

In the context of programming, a problem ____________ defines certain elements that must be manipulated to achieve a result or goal.​

statement​

VDEs for mobile devices are based on a(n) ___________ that a programmer manipulates to design the user interface for an app.​

storyboard​

One type of decision support system, called an executive information system, is designed to provide senior managers with information relevant to ___________ management activities such as setting policies, planning, and preparing budgets.​

strategic​

The emphasis on longrange and future goals is referred to as _________ planning.​

strategic​

A(n) _______ password is difficult to hack.

strong

A(n) ___________ file uses a uniform format to store data for each person or thing in the file.​

structured​

The term database ___________ refers to the arrangement of fields, tables, and relationships in a database.​

structure​

A(n) __________ is any class from which attributes can be inherited.​

superclass​

At its time of construction, one of the fastest computers in the world is referred to as a(n) _________________.

supercomputer

When communication is ______________, interchanges happen in real time while all parties are online

synchronous​

The set of rules that specify the sequence of keywords, parameters, and punctuation in a program instruction is referred to as _______.​

syntax​

Computers run three main types of software: application software, development tools, and _______ software.​

system

The electronic components of most digital devices are mounted on a circuit board called a ______________.​

system board motherboard main board

The ________ houses all essential chips and provides connecting circuitry between them

system board, motherboard, main board

A __________ solution for data storage adds resources to a single device, while a __________ solution adds more devices to a system.​

s​cale up, scale out

A(n) ___________ is a program designed to help people locate information on the Web by formulating simple queries.​

s​earch engine

Which of the following is the technique for improving the ranking and visibility of a Web site?​

s​earch engine optimization

A(n) ________________ tells a computer what to do based on whether a condition is true or false.​

s​election control structure

A(n) _____________ changes the order in which instructions are carried out by directing the computer to execute an instruction elsewhere in the program.​

s​equence control structure

A DBMS feature known as __________ ensures that transactions are updated in an orderly manner by establishing update rules.

s​erializability

Software for PCs contains a _________ program that guides you through the installation process.

s​etup

ASCII requires __________ bits for each character

s​even

A virus __________ is a section of program code that contains a unique series of instructions known to be part of a malware exploit.

s​ignature

A(n) _________ sort uses one field, to arrange records. A(n) _________ sort arranges information by more than one field.​

s​ingle-level, multi-level

A ____________ is generally priced at a flat rate and allows software to be used on all computers at a specific

s​ite license

A(n) __________ is the column of data in a database that is used as the basis for rearranging the data.​

s​ort key

Participants in open _________ community projects get experience and make connections with other professionals that can be valuable resources during a job hunt.

s​ource

The human-readable version of a program created in a high-level language by a programmer is called __________.​

s​ource code

The telecommunications technique used by local email is sometimes referred to as __________.​

s​tore-and-forward

A(n) ___________ is the sequence of organizations, people, activities, information, and resources involved in moving a product or service from supplier to customer.​

s​upply chain

Instant messaging is a ______________, real-time technology for two or more people to type messages back and forth while online.​

s​ynchronous private

After unit and integration testing are completed, _________ testing ensures that all hardware and software components work together.​

s​ystem

The term ________ refers to the part of a digital device that holds the system board.​

s​ystem unit

There are three core elements in a relational database: fields, ________, and relationships.​

tables​

Which of the following is based on computer technology?​

tablets e​book readers game consoles

Browser________ allow your browser to queue up multiple Web pages so that you can easily switch between them.​

tabs​

Authors mark up HTML documents by inserting special instructions called HTML ______.​

tags​

An information _________ degree programs focus on computer equipment and software used by businesses.

technology

A(n) ___________ is a device that transmits human voices over a distance using cables or airborne signals.

telephone

The 1930s can be characterized as a phase of innovation for ________, a technology designed to send moving images over a distance.

television

A report ____________ contains the outline or general specifications for a report.​

template​

I​t was not until the ______generation of computers that portable operating systems, such as CP/M and UNIX, provided programmers with similar operating system commands across hardware platforms.

third

​______generation computers became possible by the development of integrated circuits.

third

In the context of communication networks, the term __________ refers to the structure and layout of network components​

topology​

Magnetic and optical media are divided into circular ______ and then further divided into pieshaped ________.

tracks, sectors

A(n) ___________ provides a way to collect, process, store, display, modify, or cancel transactions.​

transaction processing system or TPS​

In a wireless network, RF signals are sent and received by a ______________.

transceiver

Second-generation computers used ________ instead of vacuum tubes.

transistors​

A(n) __________ is a computer program that seems to perform one function while actually doing something else

trojan

A 404 status code indicates that the resource that your browser requested does not exist.​

true

A URL never contains spaces.​

true

A Web site cannot be accessed by its domain name until the name is added to the domain name server lists.​

true

A botnet has a server that is controlled by hackers.

true

A computer that used an Intel 4004 microprocessor would be considered a fourthgeneration computer

true

A copyright holder has total control over how a work may be used.

true

A decision support system derives its name from the fact that it provides the tools a decision maker needs to analyze data.​

true

A document called a system requirements report that describes the objectives for the information system.​

true

A key characteristic of viruses is their ability to lurk in a device for days or months, quietly replicating themselves.

true

A local application is installed on a computer's hard disk.​

true

A lookup routine validates an entry by checking data in an inhouse or thirdparty database.​

true

A major source of data for CRM is produced by loyalty programs.​

true

A mobile app called __________ allows consumers to send and receive photo and video messages referred to as "snaps."

true

Acceptance testing is designed to verify that the new information system works as required.​

true

An application development tool is essentially a software construction kit containing building blocks that can be assembled into a software product.​

true

An efficiently designed database uses computed fields whenever possible because they do not require manual data entry.

true

Antivirus software cannot be expected to block threats that do not arrive in the form of malware.

true

Application software for an information system is usually a series of preprogrammed software modules supplied by a software publisher.​

true

Applications include menu options for opening and saving files calling on the operating system's file management routines to get the job done.

true

A​tanasoffBerry Computer is often considered the first electronic digital computer.

true

Brute force attacks methodically try every possible password until the correct one is found.​

true

By some estimates, nearly 40% of all online identities are fake.​

true

Colossus used binary arithmetic.

true

Companies are classified into economic sectors according to the types of goods and services they provide.

true

Connection speed is technically a measure of capacity.​

true

Copyright holders can assign any combination of CC rights to create a license.​

true

Data centers are designed to proactively reduce the risk of data loss that might occur as a result of a disaster.​

true

Dedicated enterprise database applications may allow cosmetic changes, but they do not encourage modifications of core data structures.​

true

Domain name servers maintain lists of all domain names and their corresponding IP addresses.​

true

Enterprise database applications tend to have some flexibility for customization,​

true

Every peripheral device connected to a computer is regarded as an input or output resource.​

true

Every storage device has a directory containing a list of its files

true

Files can remain in the Web cache for days or weeks

true

From a database user perspective, the data type determines the way data can be manipulated.​

true

Heuristics may produce false positives that mistakenly identify a legitimate file as malware.

true

Historically, IT departments were part of an organization's finance department.

true

Human errors are mistakes made by computer operators.​

true

ICT use in emerging nations lags behind its use in developed nations.

true

IM technology offers a degree of anonymity because typed messages have no associated voice or video

true

If you wanted to run multiple operating systems on one computer, you would use a virtual machine.

true

In a spreadsheet worksheet, each cell in a grid can contain a value, label, or formula.​

true

In some academic settings, Wikipedia is not regarded as a reliable source of information

true

In the United States, copyrights do not expire until 70 years after the author's death

true

Information systems designed for a specific industry or enterprise may use vertical market software.​

true

Information technology law is the legal framework that applies to the collection, storage, and distribution of digital information.​

true

Instant messaging technologies were available on local area networks even before the Internet was open to the public.

true

Iterative SDLCs are often referred to as "agile methods" because they allow flexibility as development progresses.​

true

JAD provides a structured methodology for planning and holding a series of meetings in which users and analysts jointly identify problems and look for solutions.​

true

LANs use many of the same network technologies as the Internet.​

true

Like books and movies, software is a type of intellectual property.

true

Macs do not use drive letters, and the main hard disk is called Macintosh HD.

true

Many RFID and NFC tags contain no power source of their own and depend on the receiving device to provide the power for data exchange.​

true

Many Web apps allow several people to collaborate on projects because the project files are stored on the Web and can be easily shared.​

true

Microwaves have more carrying capacity than radio waves.​

true

Mobile broadband can be used to access the Internet from a laptop or desktop computer.​

true

Mobile devices tend to be populated by entertainment apps, games, and social media services

true

Most blogs are open to the public, so blogging has become a form of personal journalism.​

true

Most commercial software is distributed under a singleuser license that limits use to one person at a time.​

true

Most spreadsheet software also includes basic data management features

true

Most states in the US have data breach notification statutes that require corporations to take specific steps if a data breacexposes personally identifiable information.​

true

Most trojans are not designed to replicate themselves

true

Napster spurred the development of sophisticated, distributed protocols such as BitTorrent

true

OS X devices include a utility that automatically encrypts data stored locally.

true

One of the major functions of an information system is to help people make decisions in response to problems.​

true

O​n an Android device, a thirdparty file manager utility is required to manipulate files.

true

Packet loss of less than 2% is required for acceptable streaming, gaming, Skype, and voice calls.​

true

Paragraph style includes the alignment of text within the margins and the space between each line of text.​

true

Password managers can generate unique passwords that have very good entropy.

true

Portable software does not require installation

true

Portable software is so simple to install that it is sometimes referred to as installfree software

true

Private messages can be forwarded by recipients, so they do not necessarily remain private

true

Public key encryption requires one key to encrypt data, but a different key to decrypt it.​

true

Radio technology is the basis for cell phones and WiFi.

true

Samuel Morse developed and patented a telegraph system.

true

Search engines will keep a record of your search history.​

true

Social engineering attacks prey on human vulnerabilities.

true

Social media sites, such as Wikipedia, YouTube, and Flickr, are examples of content communities

true

Social networking services tend to emphasize identity and relationships

true

Spam sent by scammers often uses spoofed email addresses.

true

Technically, a supply chain stretches from raw materials and parts all the way to customer delivery.​

true

Technology workers encompass jobs such as telephone cable installers and radio broadcasters.

true

The Apple II computer included color graphics.​

true

The Stuxnet virus that disabled Iranian nuclear centrifuges is an example of cyberwarfare

true

The first cellular phones to access the Internet and the Web were available in 1996.

true

The first telephones were connected by pointtopoint networks, similar to those used by the telegraph system

true

The goal of SCM is to supply customers with the right product at the right price.​

true

The goal of normalization is to minimize data redundancy.

true

The growth of the ICT industry has a generally upward trend.​

true

The kernel stays in RAM the entire time your computer is on.​

true

The most common types of PUPs and PUAs are toolbars and alternative browsers

true

The most widespread wireless channels for communication networks are microwaves and RF signals.​

true

The single most effective security measure for digital devices is to password protect access to them.

true

The term quality of service refers to the level of performance a computer system provides.​

true

The term service pack usually applies to operating system updates

true

T​he 2002 SarbanesOxley Act is meant to offer protection to whistleblowers.

true

URLs contain a domain name

true

Web sites can be spread across multiple Web servers

true

Webmail is typically a free service.​

true

When interference affects a wireless signal, data must be retransmitted

true

When setting up a WiFi network, the router you select should support the fastest device you'll want to use on the

true

Whistleblowing is risky under any circumstances.​

true

WiFi signals may reach up to 300 feet from the router.​

true

Wiki software provides a set of tools for creating and editing content.

true

Wikipedia articles can be edited by anyone at any time, and the accuracy and reliability of Wikipedia information are controversial.​

true

You can access FTP servers with a browser.​

true

​In an HTML document, most tags are inserted as pairs.

true

​Social networking can be traced back to online services, such as CompuServe, Prodigy, and America Online

true

A(n) ____________ system consists of hardware and application software designed to offer a complete information system solution.​

turnkey​

A hashtag specifies a keyword that can be used to find and group _______ by topic

tweets

From a technical perspective, a data __________ specifies the way data is represented on physical storage media and in RAM.​

type​

Formal __________ standards make it possible to create generalized media search engines that can locate media from multiple locations.​

t​agging

A __________ cookie is set by a site other than the one you connected to.​

t​hirdparty

A(n) __________ is a word, name, symbol, or design used to identify one company and their goods from those of another company.​

t​rademark

A(n) ____________ work repackages a copyrighted work to add new meaning or produce a work that is used for a purpose different from the original work.​

t​ransformative

The Windows operating system includes an _________ utility, which deletes software files from various folders on your computer's hard disk.​

uninstall​

A software ___________ is a small section of program code that replaces part of the software currently installed

update or patch​

It is a good idea to ________ your browser when a new version becomes available, mainly to increase security.​

upgrade​

A new version or edition of a software product is referred to as a software ___________.​

u​pgrade

Prolog allows you to ask openended questions by replacing constants with __________.​

variables​

A(n) _________ represents a value that can change.​

variable​

When you change the size of a(n) _______ graphic, the objects change proportionally and maintain their smooth edges.

vector​

If a program exceeds its allocated space, the operating system uses an area of the hard disk or other storage device as _______ memory.​

virtual

A(n) _______________ allows one computer to simulate the hardware and software of another.​

virtual machine or VM

T​he AtanasoffBerry Computer was the first computing device to use ________ instead of mechanical switches as processing circuitry.

v​acuum tubes

​ A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.

v​irus

Early computers that held both programs and data in memory became known as ________ architecture.

v​on Neumann

Before finalizing the algorithm for a computer program, you should perform a(n) __________ to verify that your algorithm works.​

walkthrough​

Smartwatches, smartglasses, and fitness trackers can be classified as _______ computers

wearable

Instead of running program files that are stored locally, the code for _______ applications is downloaded along with HTML pages and is executed clientside by the browser.​

web

_________ is configured so that incoming messages are stored in an Inbox on the Web.​

webmail

___________ is the disclosure by an employee of confidential information that relates to some danger, fraud, or other illegal or unethical conduct connected with the workplace, be it of the employer or of fellow employees.

whistleblowing​

​ _________ is a collaborative Web application that provides tools that enable contributors to post, read, and modify content.

wiki

Spreadsheet software can be used to create an on-screen __________ that is based on a grid of columns and rows.​

worksheet

Stuxnet is a notorious computer _______.

worm

A feature called ___________ determines how your text flows from line to line by automatically moving words down to the next line as you reach the right margin.​

w​ord wrap

The processors that are found in just about all desktop and laptop computers are _____ compatible

x86​

A(n) ______________ attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code

zero-day

Which of the following would be considered spyware?

​ a keylogger

Which type of mobile broadband service has maximum download rates of 300 Mbps and upload rates of 75 Mbps?​

​4G

If you wanted to set the text in a section of your HTML document to italics, what tag would you use?​

​<i>

_________ changes an originating address or a destination address to redirect the flow of data between two parties.

​Address spoofing

Thomas de Colmar's _________ became the first massproduced mechanical calculator.

​Arithmometer

Which ecommerce classification encompasses online storefronts selling merchandise and services to consumers?​

​B2C

Which database data type is a collection of binary data stored in a single field of a database?

​BLOB

Which file sharing protocol distributes the role of a file server across a collection of dispersed computers

​BitTorrent

____________ encompasses a broad set of activities that include planning, coding, testing, and documenting while a related activity, __________, is a development process that uses mathematical, engineering, and management techniques to reduce the cost and complexity of a computer program while increasing its reliability and modifiability.​

​Computer programming, software engineering

When antivirus software detects malware, which of the following would not be a course of action you could take?

​Conduct a heuristic analysis.

___________ is designed to make a work freely available for distribution and modification under the condition that all derivative works use the same license.

​Copyleft

Which of the following is NOT a format that is used for digital audio?​

​DOC

_________ is the amount of data a storage device can move per second from the storage medium to RAM.​

​Data transfer rate

What type of computer should you consider purchasing if you want a system that is ideal for dedicated gamers, serious designers, desktop publishers, and video editors?​

​Desktop

Which type of security measure reduces the likelihood of a deliberate attack?​

​Deterrents

Which category of software would programming languages fall into?​

​Development Software

_______ was designed to calculate trajectory tables for the U.S. Army.

​ENIAC

​Which of the following is not a characteristic of a weak password?

​Eight characters in length and include one or more uppercase letters, numbers, and symbols

_________________ refers to the process of hiding the internal details of objects and their methods.​

​Encapsulation

Which type of protocol provides a way to transfer files from one computer to another over any TCP/IP network, such as a LAN or the Internet.​

​FTP

A computed ___________ is a calculation that a DBMS performs, similar to the way a spreadsheet computes a formula.

​Field

_______ computers, such as UNIVAC, can be characterized by their use of vacuum tubes to store individual bits of data.

​First-generation

The World Wide Web is a collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called _____.​

​HTTP

If you are sending personal data such as credit card information to a Web site, which of the following should you see in the address bar of your browser?​

​HTTPS

Which DCE would you use if you wanted to extend a wired network by adding more ports?​

​Hub

A(n) _____________contains a collection of instructions for actions that the circuitry in a microprocessor can perform

​Instruction set

Which from the following list are an example of productivity software?

​Microsoft Office G​oogle Docs i​Work

Which OS is installed on more than 80% of the World's personal computers?​

​Microsoft Windows

________ data consists of numbers that can be used in arithmetic operations

​Numeric

Which type of network connects smart devices or consumer electronics within a range of about 30 feet (10 meters) and without the use of wires or cables.​

​PAN

Which of the following is NOT a type of digital video container file?​

​PNG

Which HTTP method does a browser use when you upload files to a specific Web address

​PUT

_________ technology divides a message into several packets that can be routed independently to their destination.​

​Packet switching

Which of the following is NOT an example of an expansion port?​

​RAM

Which of the following is not a SQL keyword?​

​REMOVE

Which of the following would not be considered a common carrier?

​Radio

___________ locks a device and then requests payment for an unlocking code.

​Ransomware

Which SQL keyword is used to search for records?

​SELECT

Which of the following is NOT an HTTP method?​

​SEND

___________ is a service offered by Google that checks URLs against a list of suspicious Web site URLs

​Safe Browsing

What are the main software categories?​

​System, Development, and Application

On a network, which protocol is responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order, and error checking?​

​TCP

What type of computer should you consider purchasing if you want a portable system that is great for consuming content such as ebooks, music, and videos but not so great for creating content or multitasking?​

​Tablet

_____________ is a network diagnostic tool that shows you each router and server that your data encounters as it travels over the Internet.​

​Traceroute

A link contains the ________ that links to another Web page.​

​URL

Every Web page has a unique address called a(n) ___________.

​URL

Which type of network cover a large geographical area and usually consists of several smaller networks, which might use different computer platforms and network technologies.​

​WAN

A(n) ____________ is a company that provides space on a server to house Web pages

​Web hosting service

The ____________ is a collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called HTTP

​World Wide Web

Which of the following is NOT a type of bitmap format?​

​ZIP

3-D graphics are based on vectors stored as a set of instructions describing the coordinates for lines and shapes in a threedimensional space. What do these vectors form?​

​a wireframe

​A cryptographic __________ is a procedure for encryption or decryption.

​algorithm

Today's widescreen devices, such as laptops and smartphones, are designed for the 16:9 __________.​

​aspect ratio

The _______ number system allows digital devices to represent virtually any number simply by using 0s and 1s.​

​binary

Blogs and their interconnections are referred to as the ____________.

​blogosphere

In the context of bitmap graphics editing, what technique employs algorithms that pull pixels from one area of an image and then apply them to another area?​

​cloning

A(n) _________ is a set of guidelines designed to help professionals thread their way through a sometimes tangled web of ethical on-the-job decisions.

​code of ethics

A(n) _______ is the software that compresses a video stream when a video is stored, and decompresses the file when the video is played

​codec

Which of the following would be found on a standard Wikipedia page?​

​community edit: Requests for improvements

Online __________ are two or more online personas with the same name or user name.​

​doppelgangers

What is another term for vector graphics software?​

​drawing software

A browser __________ adds features to a browser.

​extension

A key feature of the Apple Lisa was its use of _______________.

​graphical user interface

In a repetition control structure, the computer is directed to repeat one or more instructions until a certain condition is met. The section of code that repeats is usually referred to as a(n) ___________.​

​iteration

A cryptographic ________ is a word, number, or phrase that must be known to encrypt or decrypt data.

​key

What type of computer should you consider purchasing if you want a portable system that is good for students and onthego professionals who want to create content and be productive, in addition to consuming content?​

​laptop

Which of the following is an example of a computer that is a small, lightweight personal computer that is designed like a clam shell?​

​laptop computer

When working with Windows, storage devices can also be identified by a device __________.

​letter

Microprocessors can't directly understand programming languages, so programs have to be converted into _____________ that corresponds to the microprocessor's instruction set.​

​machine language

A(n) ____________ calculator is a device that assists in the process of numeric calculations but requires the human operator to keep track of the algorithm.

​manual

An abacus is an example of a(n) _________ calculator.

​manual

Most computers have temporary holding areas called __________.

​memory

Which of the following is NOT a factor in the quality of digital video?​

​memory technology in your camera

What does the HTML tag <p> designate in an HTML document?​

​new paragraph

A(n) _____________ is a group of people working together to accomplish a goal.​

​organization

With respect to organizations, confidentiality means protecting __________ information about company finances, procedures, products, and research that competitors would find valuable.

​proprietary

Sampling _______ refers to the number of times per second that a sound is measured during the recording process.​

​rate

A Web _________ is an Internet-based computer that stores Web site content and accepts requests from browsers.​

​server

A​ computer _______ is a selfreplicating, selfdistributing program designed to carry out unauthorized activity on a victim's device.

​worm

The planning phase of a SDLC includes all of the following except _________.​

​writing a requirements report

On Windows systems, the main executable file has a(n) ________ extension.​

.exe or exe

Which of the following file extensions indicates teh file is an HTML document

.html & .​htm

Which of the following file extensions is NOT a vector graphic?​

.​tif

Compressed files usually have ______ at the end of the file name

.​zip

Companies such as IBM and Sperry Rand launched the computer industry when they brought the first mainframes to market in the ________.

1960s

Apple released the first Apple Macintosh computer in what year? ___________

1984

The Motorola DynaTAC 8000X was brought to market in what year? ___________

1984

Telegraphy remained the major technology for intercontinental communication well into the ________.

1​950s

When were the original HTML specifications developed by Tim Berners-Lee?​

1​990

Worldwide, the ICT industry directly employs about _____ of the total workforce in jobs such as computer manufacturing, programming, and data security.

4%

In 1971, Intel introduced the world's first microprocessor called the _________.

4004​

The maximum speed of a dialup connection is _____ Kbps

56, fifty six​

Spam accounts for approximately ______ of all email.

70%

Which wireless standard is faster: 802.11n or 802.11ac?​

802.11ac

The __________ chip family set the standard for processors used in today's desktop and laptop computers, as well as servers.​

8086, x86.​

If you wanted to turn bold off for the remainder of the text in an HTML document, what tag would you use?​

<​/b>

Which HTML tag designates links to other Web pages?​

<​a href>

The ____________ is the part of the microprocessor that performs arithmetic operations, such as addition and subtraction.​

ALU, arithmetic logic unit​

On a Mac, Once you download the software, open the DMG file from the Downloads folder and then drag the _______ file to your Applications folder.​

APP or .APP​

Processors based on ____ technology dominate tablet computers and smartphones

ARM

____ processors are found in Microsoft's Surface tablets, Apple's iPads and iPhones, and Samsung's lineup of Galaxy phones.​

ARM

Which of the following is a function of the browser cache?​

Any elements that it stores do not have to be downloaded again

____________ testing is the process of trying out various sequences of input values and checking the results to verify that the application works as it was designed.​

Application​

_____________ programmers create productivity applications such as Microsoft Office, as well as enterprise applications such as CRM and ERP.​

Application​

​There are various encryption methods, but __________ is the encryption standard currently used worldwide

A​ES

MITM attacks include which of the following?

A​ddress spoofing​ IMSI catchers E​vil Twins

​Babbage's __________ was an allpurpose computing device

A​nalytical Engine

_____________ software shields certain applications against behaviors commonly exhibited by intrusions.

A​nti-exploit

Which type of communication protocol converts data into standard formats that can be used by applications?​

A​rrival

What type of Internet connection do you have when upload speed differs from download speed?​

A​symmetric

A common wireless technology for connecting peripherals is ___________.​

Bluetooth​

Which term is used to describe an online, personal journal in the form of a web page that contains posts on one or more topics which are usually displayed in reverse chronological order?​

B​log

A(n) _________ tool is a software application designed for documenting system requirements, diagramming current and proposed information systems, scheduling development tasks, and developing computer programs.​

CASE​

In business circles, the galaxy of services that revolve around customers is called ___________.​

CRM or customer relationship management​

_________ refers to the number of associations that can exist between two record types.​

Cardinality​

_____________ is a set of detailed style specifications, called style rules, for an HTML document.​

Cascading Style Sheets, CSS​

A communication _________ is the medium used to transport information from one network device to another

Channel

A ___________ is a special category of laptop, designed to be connected to the Internet for most routine computing activities

Chromebook​

In 2009, Google launched an operating system called ______ OS.​

Chrome​

__________ devices have a keyboard as the base and a screen on the hinged cover

Clamshell, notebook, laptop

______-side scripts are embedded in an HTML document and run locally when a Web page is displayed by a browser.​

Client​

Which of the following is not a characteristic of a management information system?​

Collect, display, and modify transactions

A transaction processing system is characterized by its ability to:​

Collect, display, and modify transactions. S​tore transactions. L​ist transactions.

_______ was an electronic device designed to decode messages that were sent between the German High Command and their field commanders in World War II.

Colossus

Which of the following would not be considered a disruptive technology?

Computers that run OS X replacing computers that run Windows 8.

The maintenance phase of a SDLC includes all of the following except _________.​

Convert data​

__________ is a form of legal protection that grants the author of an original work an exclusive rights that work

Copyright​

____________ is the use of ICT technology to carry out politically motivated attacks designed to infiltrate, sabotage, or damage an opponent's information systems and defensive capabilities.

Cyberwarfare​

Which ecommerce classification encompasses consumers selling merchandise and services to each other?​

C​2C

_________ are awarded based on successful completion of an exam that verifies your level of knowledge about a particular technology or subject.

C​ertificates

__________ is the process of modifying an executable file or data stream by adding additional commands

C​ode injection

The bulletin board systems of the 1970s are considered to be the forerunners of _____________.

C​ontent Communities

Which popular social media service is good for sharing media and information?​

C​ontent Community

A nonprofit organization called ____________ provides a set of standardized licenses that copyright holders can use to extend the rights to use their works to others.​

C​reative Commons

The SQL command word _________ removes a record from a table.​

DELETE​

IP addresses can be assigned by a network administrator, but more commonly they are automatically assigned by _________.

DHCP​

Downloads of Mac software are ordinarily supplied as a _______ package.​

DMG​

The mechanism for tracking domain names and their corresponding IP addresses is called the ________.

DNS, domain name system

Windows evolved from a Microsoft operating system called _____.​

DOS

_______ is a highspeed, digital, alwayson, Internet access technology that runs over standard phone lines.​

DSL, digital subscriber line

On a network, any device that stores or generates data is considered to be a(n) _________.

DTE

refers to the symbols that represent people, events, things, and ideas.

Data​

____________ is distributed for free and often comes preinstalled on new devices, but it is limited in some way until you pay for it.​

Demoware​

Which of the following information technology laws makes it illegal to circumvent copyprotection technologies, such as those used to prevent unauthorized copying of software CDs, music CDs, and movie DVDs?

Digital Millennium Copyright Act

____________ scaling (or autoscaling) ensures acceptable database throughput by scaling out as necessary to handle peak loads.​

Dynamic​

______ can be used to flood a Web site with so much traffic that it can no longer provide its intended service.

D​DoS B​otnets C​ommands from a botmaster

Which of the following is not part of the analysis phase of a SDLC?

D​evelop a project schedule

________ technology displaces an existing business process, market, industry, or product.

D​isruptive

The relationship between record types can be depicted graphically with a(n) _________.​

ERD

A(n) _____ system can provide such benefits as improved overall performance by standardizing business processes based on best practices or improved access to information from a single database to an enterprise.​

ERP

____________ refers to business transactions that are conducted electronically over a computer network.​

Ecommerce​

A(n) _____________ is a LAN server that is designed to look like a legitimate WiFi hotspot

Evil Twin

To establish a(n) ________, hackers set up an unsecured WiFi hotspot complete with an Internet connection.

Evil Twin

Which of the following is not a type of spam filter?

E​ntropy

__________ LANs are usually arranged in a star topology with computers wired to central switching circuitry that is incorporated in modern routers.​

E​thernet

_______ involves the use of highcapacity fiberoptic cables to connect homes to broader municipal networks.​

FTTH, fiber to the home

8bit color depth is also called True Color.​

False

A desktop is a portable computing device featuring a touch-sensitive screen that can be used for input as well as for output.​

False

A laser printer has a nozzlelike print head that sprays ink onto paper to form characters and graphics.​

False

A lowlevel language uses command words and grammar based on human languages.​

False

A programming language that supports the procedural paradigm is called a declarative language.​

False

A simple example of a repetition control structure is the if...else command.​

False

ARM-based processors are not especially energy efficient

False

ASCII text files contain formatting

False

Agile methodologies tend to be used for large software development projects involving more than ten developers, geographically dispersed development teams, and lifecritical applications.​

False

Algorithms are usually written in a format that is specific to a particular programming language.​

False

All bitmap graphics are photos

False

All remote storage is considered to be cloud storage.​

False

All smartphones use the Android operating system.​

False

An DIP is a square chip package, typically used for microprocessors, with pins arranged in concentric squares

False

Application programmers specialize in developing system software such as operating systems, device drivers, security modules, and communications software.​

False

Athlon and Aseries processors manufactured by AMD are NOT x86 compatible.​

False

Battery lifespan is the time your device operates before it must be recharged

False

Both scanners and digital cameras produce vector graphics

False

Character data is composed of letters, symbols, and numerals that are used in calculations.​

False

Component systems are currently the most popular form factor for digital devices.​

False

Data cannot flow over multiple networks that have different topologies

False

Declarative languages are commonly used for production applications.​

False

Digital videos look sharpest when they are displayed at a resolution that is larger than the frame size.​

False

During an instruction cycle, all parts of the instruction are performed by the microprocessor's control unit.​

False

Generally speaking, in an objectoriented program, the objects don't interact.​

False

In Prolog, facts can have no more than two arguments.​

False

In the context of database security, intermediary servers allow users to directly access the database.​

False

LGAs have two rows of pins that connect the chip to a circuit board

False

Lossy compression provides a way to compress data and reconstitute it into its original state.​

False

Modern processors follow Intel's original numbering sequence.​

False

ROM is temporary and volatile, RAM is more permanent and nonvolatile

False

The declarative paradigm is fundamentally quite similar to the procedural paradigm.​

False

Third-generation languages added a level of abstraction to machine languages by substituting abbreviated command words for the strings of 1s and 0s used in machine languages.​

False

To conserve space, applications that require highquality sound use low sampling rates

False

Transcoding digital videos does not cause a loss of quality

False

Vector graphics usually require more storage space than bitmaps.​

False

When high-level languages were originally conceived in the 1950s, they were dubbed second-generation languages because they seemed a major improvement over machine and assembly languages.​

False

programmers who work within the declarative paradigm envision a program as data objects that essentially network with each other to exchange data​

False

you can specify the actual solution in the problem statement.​

False

Which of the following descriptions best matches that of computer science degree?

Focuses on computer architecture and how to program computers to make them work effectively and efficiently

Which of the following descriptions best matches that of computer engineering degree?

Focuses on the design of computer hardware and peripheral devices, often at the chip level.

Which of the following is a file management utility?

F​inder & File Explorer​

DSL is an example of what type of Internet access?​

F​ixed

What is the term that refers to the sequence in which a computer executes program instructions?​

F​low control

________ is the monetary value of all the goods and services produced by a nation's workforce on an annual basis.

GDP

In the list below, which one is NOT a search operator?​

G​ET

Industry standard tools for scheduling and project management include PERT, WBS, and ________.​

G​antt charts

A proprietary model called the __________ represents the position of a product during its life cycle of publicity.

G​artner Hype Cycle

_________ is the process of determining the coordinates of a specific place.

G​eocoding

___________ networking provides a platform for users to carry out interactions based on their current locations

G​eosocial

______ is called a markup language because authors mark up documents by inserting special instructions.​

HTML​

__________ is a file system developed in 2005 that handles millions of files distributed across multiple server nodes.​

Hadoop​

A(n) _________ specifies a keyword that can be used to find and group tweets by topic.

Hashtag or #

_______________, such as BASIC, Python, Java, Prolog, and C++, make the programming process easier by replacing unintelligible strings of 1s and 0s or cryptic assembly commands with understandable commands, such as PRINT and WRITE.​

H​ighlevel languages

The ____________ was designed to tabulate the 1890 census and used cards with designated areas representing data fields.

H​ollerith Tabulating Machine

______ certification, offered by Certiport, covers basic computing knowledge and skills.

IC3

The organization that supervises Internet addressing is ___________.​

ICANN

What organization is the toplevel authority for supervising domain name requests?​

ICANN

A(n) ________ is a type of SDK that packages a set of development tools into a sleek programming application.

IDE​

The protocols POP3 and __________ can be used to manage your incoming mail.​

IMAP

The ___________ connects active sensors and passive tags to communication networks.​

IOT, Internet of Things

Internet addresses are controlled by which one of the following protocols?​

IP

__________ uses 32-bit addresses to uniquely identify devices connected to the Internet.​

IPv4

__________ uses 128bit addresses to uniquely identify devices connected to the Internet

IPv6

Networks that form the Internet are maintained by who?​

ISPs

___________ is the fraudulent use of someone's personal information to carry out transactions.​

Identity theft​

______ is data that is entered into a computer. ______ is the result produced by a computer.​

Input, Output

Which of the following is not a characteristic for a good problem statement?

It contains detailed descriptions of the processes and tools that need to be developed.

Which of the following would be considered a thirdgeneration computer?

I​BM 360

The __________ is made up of businesses that focus on digital equipment, software, communications technologies, and related services.​

I​CT industry

Which of the following is the least important characteristic of content communities?​

I​dentity

______________ are two of the world's largest exporters of ICT services

I​ndia and Ireland

Which database data type is used for fields that contain whole numbers—quantities, repetitions, rankings, and so on?

I​nteger

The SQL ________ command allows you to temporarily join and simultaneously access the data in more than one table.​

JOIN

_________ was officially launched in 1995 and has many of the characteristics of C++, from which it derives much of its syntax.​

Java​

Which programming language is an interpreted language most commonly used for client-side Web scripting, such as animating page elements and validating input on HTML forms?​

J​avascript

_______ are designed to provide connectivity for devices within a limited area, typically within the premises of a home, office building, business, or school.​

LANs

​________ refers to any computer program designed to surreptitiously enter a digital device

M​alware

Which type of broadband Internet access involves using cellular data networks? ​

M​obile

__________ states that every two years the number of transistors in an integrated circuit will double without raising its cost.

M​oore's law

Which early browser was the first to run on multiple computer platforms including Windows?​

M​osaic

The circuitry that enables a device to access a LAN is called a(n) ________.

NIC, network interface controller​

The simplest structure for storing data in a(n) _________ database is the keyvalue data model.​

NoSQL​

The term __________ is used to refer to a group of technologies for managing databases that do not adhere to the relational model and standard SQL query language.​

NoSQL​

Which of the following options offer self-study training to career-minded individuals who might not have the time or means to complete a traditional degree program?

N​anodegree

In a __________ database, processing logic for the query is performed on the device that holds each database shard and if necessary, results are consolidated by the DBMS.​

N​oSQL

Which of the following is a process for installing software on a PC?​

N​one of the above

__________ is a data analysis technique used by decision makers to quickly get answers to complex queries that encompass multiple factors, such as locations, revenue, time periods, and employee status.​

OLAP

Which of the following operating systems is found on Macintosh desktop and laptop computers?​

OS X

_______ storage represents data as microscopic light and dark spots on a disc surface

Optical​

Four DBMS vendors are the first stop for professional developers: IBM, _________, SAS, and SAP.​

Oracle​

The implementation phase of a SDLC includes all of the following except _________.​

O​btain approval

Which type of software must include the source code, which allows programmers to modify and improve the software?

O​pen source

What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed?

PUP

_______ is an email scam that masquerades as a message from a legitimate source.

Phishing

Which type of network topology connects a peripheral device to a host device?​

Point-to-point

_____ software is designed to run from removable storage devices and requires no installation or configuration data to be stored locally.​

Portable​

In a browser, _________ services can automatically complete your search requests based on previous searches.

Predictive​

_________ software supplies the tools for combining text, photos, clip art, graphs, animations, and sound into a series of electronic slides that can be shown on a screen or projector​

Presentation​

Which type of security measure reduces the effect of an attack by using data backups, disaster recovery plans, and the availability of redundant hardware devices?​

Preventive countermeasures​

____________ paradigms are used to conceptualize the solution to a problem as a sequence of steps.​

Procedural​

Much of the power and flexibility of the _________ language stems from its ability to query facts by matching predicates, comparing constants, and instantiating variables.​

Prolog​

The U.S. Department of Homeland Security identifies six national security functions supplied by the ICT sector. Which one of the following is not one of them?

Provide disruptive technologies

____________ is a notational system for algorithms that is less formal than a programming language, but more formal than simply jotting down notes.​

Pseudocode​

_________ refers to the status of works with expired copyrights or whose creators have forfeited their copyright

Public domain

Which of the following is not a step that a data breach victim should take?​

Purchase a new computer or device

_________ redirects Web site traffic to fraudulent Web sites.

P​harming

___________ provides OO programs with easy extensibility and can help simplify program control structures.​

P​olymorphism

Which of the following is not a programming paradigm?​

P​redictive

__________ refers to a branch of data mining that analyzes current and historical data to predict future trends.​

P​redictive analytics

__________ is a term describing spam that uses a false pretext to trick victims into participating

P​retexting

Which of the following options is a useful format for your resume?

P​rint E​mail H​TML

Which programming language is used for artificial intelligence applications and expert systems?​

P​rolog

​Which of the following is NOT considered to be intellectual property

P​ublic Domain

On a communication matrix, where would blogs be found?

P​ublic asynchronous

__________ software may be freely copied, distributed, and even resold

P​ublic domain

A ___________ is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker.

RAT

Which one of the following is NOT a Wikipedia content standard?​

RSS

What would you use to set up a feed that monitors your favorite blogs, collects the latest posts, and displays them?

RSS reader & B​log aggregator

The years between 1920 and 1960 are considered the Golden Age of ________.

Radio

Which optical storage technology stores data permanently on a disc, which cannot be subsequently added to or changed.​

Read-only

Which of the following is an example of why hard disk drives are so popular

Relatively low cost for lots of storage

Which of the following would not be considered an operating system resource?​

R​AM CPU Storage

Today's color display devices represent color using the ______ color model

R​GB

Which of the following is a scripting language?​

R​uby P​erl PHP

_________ is the term that describes devices that automate many industrial tasks by receiving digital commands and converting them into real-world actions such as shutting down a power grid or opening a valve in a fuel pipeline.

SCADA

Businesses use ___________ to maximize efficiency and profitability of their supply chain.​

SCM or supply chain management​

A(n) ___________ is a collection of language-specific programming tools that enables a programmer to develop applications for a specific computer platform.​

SDK​

An information system progresses through several phases as it is developed, used, and finally retired. These phases are usually referred to as the _________.​

SDLC​

Systems analysis and design is a discipline that focuses on developing information systems according to the phases of an _________.​

SDLC​

Which of the following would not be considered a database data type

SELECT

One of the most common database operations is to query for a particular record or group of records by using the ________ command.​

SELECT​

__________ laid the foundation for the objectoriented paradigm.​

SIMULA​

The protocol used in a local email system that handles outgoing mail is__________.

SMTP​

A(n) ________ is the broadcasted name of a wireless network

SSID

Word processing software is likely to include which the following features?​

Search and Replace, readability formula

_____________ are mobile devices that have features similar to tablet computers, but also provide telecommunications capabilities over cell phone networks.​

Smartphones, Smartphone​

__________ is the process by which machines produce sound that resembles spoken words

Speech synthesis

Which database tool is best for simple flat files that involve calculations?​

Spreadsheet software​

Which type of network topology connects multiple devices to a central device?​

Star

_______ is the term used for the components of a digital device designed to hold data permanently.​

Storage, Permanent storage

__________ methodology focuses on the processes that take place within an information system.​

Structured​

____________ programmers specialize in developing system software such as operating systems, device drivers, security modules, and communications software.​

Systems​

__________ documentation describes a system's features, hardware architecture, and programming.​

System​

Computer historians believe that ____________ was the first programming language to work with objects, classes, inheritance, and methods.

S​IMULA

Which of the following elements would NOT be found on a blog page?​

S​MTP services

Which of the following i would be considered a mechanical calculator?

S​chickard's Calculator P​ascaline d​e Colmar's Arithmometer

​What is the process called when an app from a source other than an official app store is installed on a device?

S​ide-loading

Trojans depend on ________ to spread.

S​ocial engineering

_____________ is a deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest.

S​ocial engineering

__________ are online services that facilitate communication and interaction among people who want to share information.​

S​ocial media

Suppose you wanted to run a Web server or FTP server from your home. What type of IP address would you want?

S​tatic

Which of the following is not included in Michael Porter's Five Forces model?

S​upply chain efficiency

Which of the following terms is NOT part of an email system

S​ynchronous

The current method of encrypting communication between a client and a server depends on a security protocol called _______.

TLS

If a Creative Commons license contains ND, what does that indicate?​

The work must not be changed when it is redistributed or shared.

A file name extension indicates the file format.​

True

A slate tablet configuration is basically a screen in a narrow frame that lacks a physical keyboard.​

True

A subclass is any class that inherits attributes from a superclass

True

A table's physical sort order is the order in which records are arranged on storage devices.​

True

A vector graphic consists of a set of instructions for creating a picture

True

After a vector graphic is converted to a bitmap, the resulting graphic no longer has the qualities of a vector graphic.​

True

All of the data stored and transmitted by digital devices is encoded as bits.​

True

An API is a set of application or operating system functions that programmers can add to the programs they create.​

True

An example of system software is a computer operating system.​

True

An important characteristic of third-generation programming languages is that the source code can be written with simple tools, such as a word processor, and this code can be easily understood by programmers.​

True

Another way to express an algorithm is with pseudocode.​

True

As a general rule, declarative programming languages are most suitable for problems that pertain to words and concepts rather than to numbers.​

True

At an ecommerce site, the merchant's ecommerce application carries out only the first and last stages of the payment process.​

True

Bitmap graphics are resolution dependent because each element is a discrete pixel.​

True

Computers with the same operating systems can typically use the same software and peripheral devices.​

True

Data refers to the symbols that represent people, events, things, and ideas.​

True

Digital photographs are stored as bitmap files.​

True

Digital video uses bits to store color and brightness data for each video frame.​

True

Dynamic scaling for database servers can be a challenge because the additional sharding has to be handled on the fly by the DBMS.​

True

FileMaker Pro and Microsoft Access are DBMSs.​

True

In a display device, response rate is the time it takes for one pixel to change from black to white then back to black.​

True

In a keyvalue database, each data item has a key that is a unique identifier similar to a relational database key​

True

In digital video, a lower resolution reduces the bit rate.​

True

In digital video, as long as the proportion of horizontal and vertical pixels remains the same, the aspect ratio is consistent.​

True

Instead of storing the color value for each pixel, a vector graphics file contains instructions that a computer uses to create the shape, size, position, and color for each object in an image.​

True

Intel Corporation is the world's largest chipmaker and supplies a sizeable percentage of the microprocessors that power desktops and laptops.​

True

JPEG files are compressed using lossy compression

True

Lossy compression techniques discard some data from an image to shrink its file size.​

True

Lossy compression throws away some of the original data during the compression process

True

Microprocessors only understand machine language, so there has to be some way to convert assembly language instructions into 1s and 0s.​

True

Most computer ads specify the speed of a microprocessor in gigahertz.​

True

Networks can be classified according to their size and geographic scope

True

One of the main disadvantages of MIDI is that it cannot produce vocals.​

True

One of the ways that databases are classified is by their structure.​

True

Peripheral devices are generally attached to a computer with cables or a wireless connection

True

Plain, unformatted text is sometimes called ASCII text

True

Procedural languages encourage programmers to approach problems by breaking the solution down to a series of steps.​

True

Processing is handled by the computer's central processing unit (CPU).​

True

Prolog and other declarative languages were classified as fifthgeneration languages.​

True

Prolog programming is all about facts and rules.​

True

Regardless of sampling rate, digital audio file size can be reduced using audio compression techniques.​

True

SQL works behind the scenes as an intermediary between the database client software provided to users and the database itself.​

True

Semiconductors are substances with properties between those of a conductor and an insulator.​

True

Smartphones evolved from basic cell phones and PDAs

True

Smartwatches are multifunction devices that can include a camera, thermometer, compass, calculator, cell phone, GPS, media player, and fitness tracker.​

True

Solid state storage stores data in erasable, rewritable circuitry, rather than on spinning disks or streaming tape.​

True

Some software engineering activities overlap with the systems analysis and design activities​

True

Structured English is a subset of the English language with a limited selection of sentence structures that reflect processing activities.​

True

Ten terabytes offer enough storage capacity to hold the printed collection of the Library of Congress.​

True

Text-to-speech software analyzes the words in a section of text, finds corresponding phonemes, and combines them into sentences for output.​

True

The CPU of most modern computers is a microprocessor

True

The Intel i7 microprocessor is x86 compatible

True

The Internet is the world's largest WAN.​

True

The procedural approach is best used for problems that can be solved by following a stepbystep algorithm.​

True

The process of planning a computer program begins with a problem statement that clearly define the program's purpose.​

True

The technical term for ripping music tracks is digital audio extraction

True

The term 'stored program' means that a series of instructions for a computing task can be loaded into a computer's memory.​

True

The term instruction cycle refers to the process in which a computer executes a single instruction.​

True

Unlike a sort order, an index has no bearing on the physical sequence of records on a storage device.​

True

Video resolutions can be expressed as width x height

True

When taking the object-oriented approach to a problem, one of the first steps is to identify the objects that pertain to a solution.​

True

You can use multiple browsers on a device.​

True

x86 processors use a different instruction set than ARM processors.​

True

​Battery life is the time your device operates before it must be recharged.

True

Which business practice is a technique initiated by top management that involves all employees and all departments, and focuses on quality assurance in every product and service offered to customers?

T​QM

Based on existing laws governing international conflict, the ______________ sets out rules for conducting and responding to cyberwarfare.

T​allinn Manual

__________ refers to transmitting text or symbolic information over long distances without the use of a living carrier, such as a courier.

T​elegraphy

An emerging computing platform that is likely to drive innovation and disruption through the next decade called __________ has massive scale, not only in cloud-based hardware technology, but also in the vast amount of data that will be generated, consumed, and analyzed.​

T​he 3rd platform

Which of the following is not an example of an Information Technology Law?

T​he Espionage Act of 1917

If you use a password manager, what do you as the user need to remember?

T​he master password.

__________-generation languages, such as COBOL and Fortran, were used extensively for business and scientific applications.​

T​hird

_________party apps are external programs that interact with social networking services.​

T​hird

Which network tier forms the Internet backbone?​

T​ier 1

__________ are standalone programs that masquerade as useful utilities or applications

T​rojans

Which one of the following is a microblogging service?​

T​witter

Modifications to the contents of a database field are made by using the SQL _________ command.​

UPDATE​

_________ documentation describes how to interact with the system to accomplish specific tasks.​

User​

The current standard for object oriented documentation is referred to as ______.​

U​ML

A(n) _________ provides programmers with tools to build substantial sections of a program by pointing and clicking rather than typing lines of code.​

VDE

When the PC version of the spreadsheet program __________ became available, the IBM PC quickly became the topselling personal computer.​

VisiCalc​

_________ is a technology that uses a broadband Internet connection instead of PSTN land lines to place voice and video calls.​

VoIP

Which is a component of a search engine?​

Web crawler I​ndexer Q​uery processor

Besides a URL, and a set of Web pages, what else do you need for getting a Web site up and running

Web hosting service​

_________ are the people who directly carry out the organization's mission.​

Workers​

______ is an example of a content community.​

W​ikipedia

The design phase of a SDLC includes all of the following except _________.​

W​rite requirements report

______ is a markup language designed to describe data

XML​

Which of the following is a markup language?​

X​ML X​HTML S​GML

1024 Zettabytes = 1 _______.​

Yottabyte​

A social engineering scam called ___________ is when a victim is promised a large sum of money in exchange for a bank account number from which a small advance fee is withdrawn.

advance fee fraud

Iterative SDLCs are often referred to as "______ methods" because they allow flexibility as development progresses.​

agile

A(n) _________ methodology focuses on flexible development and specifications that evolve as a project progresses.​

agile​

A Web crawler uses a search _______ to traverse the Web.​

algorithm​

A(n) ____________ is a set of steps for carrying out a task that can be written down and implemented.​

algorithm​

What is the term used to describes altering the pixel colors where the edges of the object and the background meet, so that the object appears to merge with the background?​

alpha blending

The goal of the ____________ phase of a SDLC is to produce a list of requirements for a new or revised information system.​

analysis​

An ecommerce ____________ is the software that handles ecommerce transactions.​

application​

During the design phase of a SDLC, if the project team selects a solution that requires custom programming, the team's systems analysts will create a set of ________ specifications. ​

application​

Software applications are sometimes referred to as _______, especially in the context of handheld devices

apps, app

Rather than deleting old data, it can be moved to a data __________.​

archive​

In Prolog programming, a(n) __________ represents one of the main subjects that a fact describes.​

argument​

The difference between a web app and a mobile app is that the program code for Web apps _________, whereas mobile apps are stored on the handheld device, so they have to be ___________.​

arrives only when you use the app, downloaded and installed

A(n) ___________ typically reads a program written in an assembly language, translates the program into machine language, and then submits the machine language program to the processor for execution.​

assembler​

In the context of database security, database ______ identifies sensitive data and database vulnerabilities in order to secure them.​

assessment​

​If you are hired as an entrylevel programmer, your job title would be a(n) ___________ programmer.

associate

Programmers sometimes start with a set of _____________ that simplify a problem.

assumptions

In a problem statement, a(n) ____________ is something you accept as true in order to proceed with program planning.​

assumption​

When communication is __________, messages are held until the recipient is ready to view them

asynchronous​

A(n) _______ is software that works in conjunction with your computer's browser to manage and play audio that you are accessing from a Web page.​

audio plugin

A low-level language has a low level of ___________ because it includes commands specific to a particular CPU or microprocessor family.​

a​bstraction

A calculation is based on a(n) ___________—the step-by-step process by which numbers are manipulated.

a​lgorithm

A(n) ____________ for a computer program is a set of steps that explains how to begin with known information specified in a problem statement and how to manipulate that information to arrive at a solution.​

a​lgorithm

A(n) _________ database is used to collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions.​

a​nalytical

​The best defense against malware is _____________.

a​ntivirus software

In a problem statement, you can limit complexity by making ____________.​

a​ssumptions

​In spreadsheet software, the________________ feature ensures that the results in every cell are accurate for the information currently entered in the worksheet

a​utomatic recalculation

A(n) ___________ is a copy of one or more files that is made in case the originals become damaged.​

backup, data backup

An example of _________ data is the 1 million transactions generated by Walmart sales registers every hour.​

big​

The 0s and 1s used to represent digital data are referred to as _________ digits.​

binary​

​Password entropy is a measure in _____ of a password's unpredictability

bits

A data _________ is an incident in which personal data is viewed, accessed, or retrieved without authorization.​

breach​

Network channels that are capable of moving at least two megabits of data per second are classified as _________ channels.

broadband​

A Web _________ is client software that displays Web page elements and handles links between those pages.

browser

Apple Safari, Google Chrome, Microsoft Internet Explorer, and Mozilla Firefox are examples of ________.​

browsers

A stock market _________ refers to a sharp rise in stock values that is later followed by a sudden decline.

bubble

An operating system ensures that input and output proceed in an orderly manner, using ___________ to collect and hold data while the device is busy with other tasks.​

buffers​

A group of eight bits is called a _______.

byte

A(n) __________ is an undocumented method of accessing a digital device.

b​ackdoor

The bandwidth of a channel that carries digital data is usually measured in ___________.

b​its per second

Transmission speeds are expressed in _______, whereas storage space is expressed in _______.

b​its, bytes

In a browser, __________ link to pages that you use frequently.​

b​ookmarks & f​avorites

Hackers who gain control over several computers can organize them into a clientserver network known as a(n) _______.

b​otnet

Which of the following type of attack uses passwordcracking software to generate every possible combination of letters, numerals, and symbols.

b​rute force

Your browser _________ serves as temporary storage for Web documents

cache

Your bandwidth _________ is the top speed allowed by your ISP plan.​

cap

_________ goods are raw materials, tools, and machinery used by businesses to make consumer goods.

capital

Analog footage can be digitized using video _____ equipment

capture​

A key component of an ecommerce application is an online _________.​

cart

A use case diagram documents the users of an information system and the functions they perform. Any task an actor performs is called a use _______

case​

Digital ________ captures moving images as bits, rather than on film

cinematography​

Information that identifies the source of a quotation or excerpted work is called a ________.​

citation​

A(n) ___________ is a template for a group of objects with similar characteristics.​

class

Remote storage that is available as an Internet service is called ______ storage

cloud​

A(n) __________ is where several corporations lease space and equipment to hold and protect their data.​

colocation center​

Computers that operate in essentially the same way and use the same software are said to be ______.

compatible

A program must __________ without any errors before it can be run.​

compile​

Most music for portable media players is stored in _______ audio file formats

compressed

Bit rate can be scaled down by reducing the resolution and applying ____________ techniques.​

compression

Image __________ refers to any technique that recodes the data in an image file so that it contains fewer bits.​

compression

Data ____________ refers to any technique that recodes the data in a file so that it contains fewer bits

compression​

The scope of an information system includes which of the following?​

computers, communications networks, and data p​eople and products p​olicies and procedures

A(n) __________ is a multipurpose device that accepts input, processes data, stores data, and produces output, all according to a series of stored instructions.​

computer​

Video files are stored in ________ formats that hold the compressed video stream and an audio stream.​

container​

________ workers are not official employees of a company.

contract

In the context of a VDE, a(n) ___________ is a screen-based object whose behavior can be defined by a programmer.​

control​

System ____________ refers to the process of deactivating an old information system and activating a new one.​

conversion​

Three key concepts ensure good quality of service include all of the following except _______ .​

convertibility​

An online shopping cart uses _________ to store information about a customer's activities on an ecommerce site.​

cookies​

On an ecommerce site, After finding a _________ with a cart ID number, the site can display the cart's contents to the customer.​

cookie​

A(n) _____________ grants the author of a software product an exclusive right to copy, distribute, sell, and modify that work.​

copyright​

Software ____________ is the process of modifying a commercial application to reflect an organization's needs.​

customization​

Using the Internet to deliberately harm or harass someone is called ____________.​

cyberbullying​

A(n) __________ is a device that uses a lowpower radio transmitter to carry out twoway voice communications.

c​ellular telephone

A(n) _____________ defines the characteristics of a set of objects.​

c​lass attribute

The instructions that make up a computer program are sometimes referred to as __________.​

c​ode

A(n) ___________ is any person or company that transports goods, passengers, or electronic signals over regular routes at set rates.

c​ommon carrier

A(n) ___________ converts all the statements in a program in a single batch, and the resulting collection of instructions, called ________, is placed in a new file.​

c​ompiler, object code

A​(n) __________ is a factor that remains the same throughout a program.

c​onstant

The information industry has three major facets: _________, computers, and telecommunications.​

c​ontent

In a microprocessor, the __________ fetches instructions

c​ontrol unit

When individuals contribute computer time, expertise, opinions, or money to a defined project, they are participating in ___________.

c​rowdsourcing

Decision makers can access analytical databases using an executive __________.​

dashboard

Computers process __________ by performing calculations, modifying documents and pictures, drawing graphs, and sorting lists of words or numbers

data

A(n) ________ administrator analyzes a company's data to determine the most effective way to collect and store it.

database

Microsoft Access, FileMaker Pro, and LibreOffice Base are three examples of popular ___________ software

database

In its broadest definition, a ____________ is a collection of information

database​

The process of finding and fixing errors in a computer program is called ____________.​

debugging​

The Harvard Mark I was digital but used _________ rather than binary representation.

decimal

Using a ________ support worksheet, the project team can assign scores to each criterion, weight them, and compare totals for all solutions​

decision

A(n) ____________ helps people make decisions by directly manipulating data, accessing data from external sources, generating statistical projections, and creating data models of various scenarios.​

decision support system or DSS​

Prolog and other __________ languages were classified as fifth generation languages.​

declarative​

The _______________ paradigm describes aspects of a problem that lead to a solution.

declarative​

The procedural paradigm focuses on an algorithm that describes a solution, the _____________ paradigm focuses on describing the problem.​

declarative​

Communicating false statements that damage the reputation of another individual is referred to as _________.​

defamation

The software application associated with a specific file type is called a __________ application

default​

Your ________ browser is automatically used when opening a web page or clicking on a web link.​

default​

In a formatted text file, ________ signals the beginning and end of a formatting command

delimiter, delimiters

In the ________ phase of the SDLC, the project team must figure out how the new system will fulfill the requirements specified in the system requirements report.​

design​

In the __________ phase of the SDLC, the project team chooses a solution, selects hardware and software, and designs detailed application specifications.​

design​

__________ is music, speech, and other sounds represented in binary format for use in digital devices.​

digital audio

Digital video is a core technology for which of the following

digital television videoconferencing systems video messaging

The process of converting information, such as text, numbers, photos, or music, into digital data that can be manipulated by electronic devices is called ___________.

digitization

A ____________ is a step-by-step description of the methods used to secure data against disaster and a set of guidelines for how an organization will recover lost data and resume operations if and when a disaster occurs.​

disaster recovery plan​

Network _________ enables your computer to see other devices on a network, and whether your computer can be seen by others

discovery​

A(n) ___________is a bitforbit copy of the data from all sectors of a hard disk.​

disk image

System ___________ describes a system's features, hardware architecture, and programming.​

documentation​

In a display device, __________ is the distance in millimeters between likecolored LEDs

dot pitch, dp​

When joining two tables using SQL, the convention is to use ______ notation for field names.​

dot​

A(n) _________ is designed to deliver malicious code into a device.

dropper

Which of the following is an important consideration when evaluating storage options for digital devices?​

durability dependability capacity

Internet addresses that are temporarily assigned are called ________ addresses.​

dynamic

A _________ Web page displays customized content in response to keyboard or mouse actions, or based on information supplied directly or indirectly by the person viewing the page.​

dynamic​

The main circuits on the system board that carry data are called the _________.​

d​ata bus

Modern database tools support ________________, which entails separating data from the programs that manipulate data.​

d​ata independence

In the context of Prolog programming, a(n) ________________ is a tabular method for visualizing and specifying rules based on multiple factors.

d​ecision table

The number of colors available in a graphic is referred to as color _________.

d​epth

A(n) __________ work modifies a copyrighted work but does not substantially change its content or purpose

d​erivative

Which one of the following types of operating systems would most likely be found on a laptop computer?​

d​esktop operating system

A(n) __________ is software that helps a peripheral device establish communication with its host device

d​evice driver

​A subset of geosocial networking called social __________ uses geolocation to meet with people who are nearby and have similar interests

d​iscovery

The advantages of LCD screens include display clarity, low radiation emission, portability, and compactness

d​isplay clarity l​ow radiation emission portability​

An ______ message is an electronic document transmitted over a computer network

email

Password managers store passwords in a(n) _________ file​

encrypted

Wireless _______ scrambles the data transmitted between wireless devices.​

encryption

The term professional _______ refers to onthejob choices and actions that reflect a person's values

ethics​

A(n) ___________ report contains information that is outside of normal or acceptable ranges.​

exception​

Ports that expand the options for input, output, and storage, they are commonly called ____________ ports

expansion

A domain name ends with a(n) ________ that indicates its toplevel domain.​

extension

If you wanted to add a feature to your browser, such as an ad-blocker, you would need to install a browser __________.​

extension​

A file with a .css file extension indicates that it is a(n) ________ CSS.​

external​

In DFD terminology, a(n) ____________ entity is a person, an organization, or a device outside the information system that originates or receives data.​

external​

The lines that connect nodes in a sociogram are referred to as sociogram ________.

e​dges

Conventional wisdom tells us that strong passwords are at least _____ characters in length and include one or more uppercase letters, numbers, and symbols.

e​ight, 8

​If you want to store passwords on your digital device, make sure to _________ the file in which they are stored.

e​ncrypt

Which of the following terms would best match this definition: Transforms a message or data file in such a way that its contents are hidden from unauthorized readers.

e​ncryption

Password _________ is a measure in bits of a password's unpredictability

e​ntropy

Telephone networks are based on a hierarchy of interconnected stars. At the center of the star is a telephone ___________ that manages connections between callers.

e​xchange

A DSS manipulates the data needed to make a decision as well as making a decision.​

false

A Web site developer manages an organization's online reputation by establishing and maintaining social media sites and evaluating analytics to support its mission.

false

A hierarchical database allows one-to-many relationships but not one-to-one relationships.​

false

An HTML document consists of three sections: the head, the body, and the content.​

false

An original message or file that has not yet been encrypted is referred to as ciphertext

false

Android devices automatically encrypt data stored on the device when a user activates the login password.

false

As the design phase of a SDLC begins, programming languages, development tools, and application software needed for the new information system are purchased, installed, and tested to ensure that they work correctly.​

false

Because it is so easy to experiment with different numbers, word processing software is particularly useful for whatif analysis.​

false

Between 2001 and 2014, significant gains were made in global ICT use, with the highest gains in desktop computer purchases.

false

Blacklist and header filtering is usually performed by email clients and Webmail services.

false

Browser cache is another term for browser History list

false

Certification alone is sufficient to qualify for a job in the IT industry

false

Common threats to corporate information systems are limited to software failures and security breaches.​

false

Communications for which you specify one or more recipients would be classified as public

false

Cookies can be stored on desktop and laptop computers but not smartphones or tablet computers.​

false

Correctly installed antivirus software will prevent all intrusions

false

Data for SCM does not necessarily take into account customer demand for products.​

false

Data independence is a term that refers to data and program modules being so tightly interrelated that they become difficult to modify.​

false

Detailed application specifications can be developed before or after selecting the hardware and software for an information system.​

false

ENIAC's memory held programs but not data

false

Editing the source content of wikis is discouraged at media content communities.​

false

Facebook does not provide ways to discover if you've been tagged.​

false

File sharing poses no real security risks.​

false

Fraud alerts interfere with your ability to receive instant credit.​

false

Geocoding is the process of adding location data to photos, Web sites, HTML documents, audio files, blog posts, and text messages

false

HTML is the best format for an effective resume.

false

HTML is the only markup language used on the Web.​

false

HTTP is the markup language used to specify the contents of a Web page.

false

HTTP uses port 20 for communications between a client device and a server

false

Hacking accounts for about 90% of data breaches.​

false

Horizontal market software is designed to meet the needs of a single industry while vertical market software meets the needs of many different industries.​

false

IMSI catchers are operated by cellular service companies.

false

If you allow your browser to store passwords, you non longer need to worry about security for those passwords.

false


संबंधित स्टडी सेट्स

2.5 The Structure and Function of Arteries, Capillaries and Veins

View Set

Питання для підготовки до модульної контрольної роботи з ЦНС (теми 4-7)

View Set

Quiz 10 Unemployment- Macroeconomics

View Set

NRS416 Exam 2 Practice Questions

View Set

Chapter 1 Quiz: Legal Heritage and the Information Age

View Set

ASN Traditional 2015-2017 Adaptive Quizzing for the NCLEX-RN Exam: Psychobiological Disorders

View Set

OB 6301 Chapters 6,7,8,9 Study Guide

View Set

OB-3 Attitudes and job satisfaction

View Set