cosc\
________ is the amount of data that can be transmitted across a transmission medium measured in bits per second.
Bandwidth
Which language do programmers use if the problem requires a lot of number crunching?
C++
Which of the following is NOT a factor to consider when selecting network cabling?
Cable diameter
Which of the following is NOT a common network topology?
Cluster
Which of the following is the first stage of the program development life cycle (PDLC)?
Describing the problem
During which phase of the system development life cycle are flowcharts and data-flow diagrams developed?
Design
________ is the standard communications protocol used on most client/server networks.
Ethernet
________ cable is NOT subject to electromagnetic interference or radio frequency interference.
Fiber-optic
Which of the following provides a visual representation of patterns that an algorithm comprises?
Flowchart
Special symbols called tags are used in which of the following languages?
HTML/XHTML
A(n) ________ address is the address that external entities use when communicating with your network.
IP
Which of the following statements describes dynamic decision making?
It is the ability of a Web page to decide how to display itself based on choices the reader makes.
Which language is used for applications that need to collect information from networked computers?
Java
Small Java-based programs are called ________.
Java applets
Which of the following statements about Java is FALSE?
Java can run only on a Windows operating system.
________ is a scripting language that's often used to add interactivity to Web pages.
JavaScript
The computers in a lab on a floor of a building would be connected using a ________.
LAN
What is the final step of the system development life cycle?
Maintenance and evaluation
Information is most closely related to which of the following?
Output
For business networks, which of the following is NOT one of the main cable types?
Polyviny
What is the first step of the system development life cycle?
Problem and opportunity identification
________ is the process of translating a task into a series of commands that a computer will use to perform the task.
Programming
Which statement about selecting the right programming language for a project is FALSE?
Programming languages require the same amount of time to execute.
________ is a text-based approach to documenting an algorithm.
Pseudocode
________ is the instructions programmers have written in a higher-level language.
Source code
Which of the following is the most commonly used client/server network topology?
Star
Which of the following is the final stage of the program development life cycle (PDLC)?
Testing and documentation
Which of the following development environments enables Web sites to talk to each other easily by introducing a standard way for software to interact through Web services?
The .NET Framework
Which statement does NOT describe fifth-generation languages?
They use a set of short, English-based commands (such as SUB) that speak directly to the CPU.
A ________ uses the Internet communications infrastructure to build a secure and private network.
VPN
Which of the following would NOT be used to build Web sites with interactive capabilities?
Visual Basic
________ is a powerful programming language used to build a wide range of Windows applications.
Visual Basic
Cars often have ________ networks.
Wi-Fi and Bluetooth
The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n) ________.
algorithm
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.
authentication
A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall.
bastion host
Before its final commercial release, software is often provided free or at a reduced cost in a(n) ________ version to certain test sites or to interested users.
beta
A ________ sends data from one collision domain to another
bridge
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.
brute force attack
PROLOG is an example of a ________.
5GL
How many steps are there in the system development life cycle?
6
In object-oriented programming, ________ allows a new class to automatically pick up all the data and methods of an existing class.
inheritance
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
jam
A(n) ________ error is caught when the program executes.
logical
The first-generation language is ________.
machine language
A(n) ________ is custom-built miniprogram that allows you to execute a complicated sequence of steps with a single command.
macro
The physical address assigned to each network adapter is called its ________ address.
media access control (MAC)
A ________ is a group of two or more computers, or nodes, configured to share information and resources.
network
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.
screening
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
spooler
The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.
terminator
The loop decision point consists of three features: an initial value, a set of actions to be performed, and a(n) ________.
test condition
In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.
bus
With object-oriented analysis, programmers identify categories of input that are part of the problem into ________.
classes
A ________ network can contain servers as well as individual computers.
client/server
Translating an algorithm into a programming language is called ________.
coding
The process by which program code is converted into machine language is called ________.
compilation
Keywords in a programming language that redirect the flow of a program based on a decision are called ________.
control structures
The flowchart shape for a binary decision is a(n) ________.
diamond
The description of what a program should do if the input data are invalid is called ________.
error handling
The binary sequence that instructs the CPU to run the programming code is called a(n) ________.
executable program
A(n) ________ server is a server that stores and manages files for network users.
file
A ________ keeps your computer safe by determining who is trying to access it.
firewall
A ________ is a visual diagram of a process, including the decisions that need to be made along the way.
flowchart
SQL is an example of a ________-generation language.
fourth
A ________ topology uses more than one topology when building a network.
hybrid
A variable declaration tells the operating system to allocate storage space ________.
in RAM
In a ________ network, each node connected to the network communicates directly with every other node.
peer-to-peer
The capability of moving a completed programming solution easily from one type of computer to another is known as ________.
portability
An integrated development environment (IDE) is a ________
program that translates code into binary 1s and 0s, ignores comments, and helps programmers input correct, appropriate code
A network ________ is a set of rules for how information and communications are exchanged.
protocol
An alternative approach to systems development, called ________, makes use of a prototype at the beginning of the project.
rapid application development (RAD)
A ________ sends information between two networks.
router
Division by zero is a(n) ________ error that is caught when the program executes.
runtime
FORTRAN, C++, and Java are all ________-generation languages
third
Ring networks use the ________ method to avoid data collisions.
token
An editor is a ________.
tool that helps programmers as they enter program code, highlighting keywords and alerting them to typos
The method of algorithm creation used when a programmer breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks is called ________.
top-down design
Most wired home networks use ________ cable, which is most susceptible to interference.
unshielded twisted-pair
Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a process called ________ programming.
visual
In a ________ system, each step is dependent on the previous step being completed first.
waterfall