CSI101 chapter 1, CSI101 chapter 12, CSI101 chapter 9, CSI101 chapter 5, CSI101 chapter 7, CSI101 chapter 2, CSI101 chapter 6, CSI101 chapter 14, CSI101 chapter 8, CSI101 chapter 11, CSI101 chapter 3, CSI101 chapter 13, CSI101 chapter 10, CSI101 chap...
F
As the resolution numbers get larger for a monitor, the size of each pixel gets larger.
F
A CD can store approximately 700 KB of data.
F
A DBMS delegates the task of ensuring data integrity to the operating system
Query
A DBMS must provide or interface with a(n) _____ language to extract information from the database. a. assembly c. machine b. Query d. natural
T
A URL consists of the domain name followed by specific folder and/or filenames.
T
A Web service is a server-based Web program that contains data to be used by other programs or Web pages
bit
A ____ is a basic unit of storage that can have a value of either 1 or 0 (on or off). a. nibble c. byte b. word d. bit
database
A ____ is a collection of information usually organized into tables. a. browser c. database b. multiplex d. publisher
text editor
A ____ is a generic tool that allows you to do basic editing, although the finished document won't have a professional look. a. word processor c. GUI b. text editor d. spreadsheet
byte
A ____ is a group of eight bits. a. byte c. nibble b. word d. blip
discriminant
A ____ is identified by the number of digits a numbering system has, including zero. a. root c. determinant b. discriminant d. base
pixel
A ____ is the smallest unit that can be displayed on a computer monitor. a. micron c. twip b. picon d. pixel
presentation
A ____ tool is the most logical choice for the development of a slide show. a. spreadsheet c. word processing b. presentation d. scheduling
Firewall
A _____ is a device designed to protect an internal network or node from intentional or unintentional damage from an external network. a. gate c. firewall b. barricade d. fence
LAN
A _____ is a relatively small number of computers connected together in close proximity, usually within a building or complex. a. LAN c. DAN b. WAN d. MAN
table
A _____ or entity is divided into rows or columns much like a spreadsheet. a. box c. chart b. grid d. table
tree
A _____ represents a hierarchical structure similar to that of organizational or genealogy charts. a. grid c. digraph b. network d. tree
three
A binary search tree contains _____ components. a. two c. four b. three d. eight
F
A bit can represent four values.
F
A capacitor consists of three parts, an emitter, a collector, and a base
F
A class diagram shows an object's particular state at any given time.
T
A collection of columns referring to one item is called a row or tuple
F
A component diagram depicts the physical architecture of a computer-based system.
T
A demilitarized zone is a location outside the firewall that is more vulnerable to attack from outside.
F
A digital certificate is a string of bits used in an encryption algorithm to encrypt or decrypt data.
T
A firewall is software or hardware that acts as a protective filter between an internal computer system and an external network such as the Internet.
F
A function is a received value assigned to a variable that is used by a block of code.
truth
A gate's output for any set of inputs follows the specifications given in the ____ table. a. variable c. log b. data d. truth
spreadsheet
A grid-like document that facilitates arithmetic manipulation and presentation is called a ____. a. resume c. memo b. fax d. spreadsheet
F
A hard disk is a sequential access device
T
A hard disk is the most common place to store files
composite
A key that is made up of more than one column is called which of the following? a. joined c. aggregate b. union d. composite
F
A linked list stores data contiguously.
Structured Query Language
A special language known as _____ is used to query or extract information from databases. a. Selection Quotation Language c. Structured Query Language b. Sorting Questions Language d. Software Questioning Language
F
A modification attack denies legitimate users from using the system or from gaining access to information.
F
A modification attack is a trap laid by a system administrator to catch and track intruders.
T
A multi-dimensional array consists of two or more single-dimensional arrays
digital video recorder
A specialized computer designed to record and play back video content from cable and satellite sources is called a(n) ____. a. expert system c. quantum computer b. digital video recorder d. robot
pointer
A stack _____ keeps track of the top of a stack. a. sentinel c. marker b. flag d. pointer
T
A stack is a last in, first out (LIFO) data structure
T
A stack is a special form of a list that allows operations such as "push" and "pop".
T
A parent class is a generic class from which other classes can be created through the process of inheritance.
process
A program that is currently executing is called a ____. a. code segment c. JCL b. process d. regular routine
F
A qubit can only represent two values.
F
A queue is another type of linked list that implements a LIFO storage system
T
A reserved word has a special instructional meaning.
T
A scalable system allows a company to add components as business and computing needs increase.
deadlock
A situation known as ____ occurs when all active processes are tied up in a circular wait for resources. a. synchronization c. safe mode b. context switch d. deadlock
frequency
A sound consists of a waveform that has amplitude (volume) and a ____ (pitch). a. frequency c. phase angle b. phase shift d. period
F
A text editor is just another term for a multifunction word processor
F
A trade secret is a government grant that gives the sole right to make, use, and sell an invention for a specified period of time.
F
A truth table with two inputs would have two rows.
T
A user-friendly programmer's workspace is a high-level analogy for an Integrated Development Environment (IDE).
T
A variety of graphical formats supports the variety of images available on the Internet.
F
A word processor is not the tool of choice for memo design and creation
directed hacker
A(n) ____ is generally a cracker motivated by greed and/or politics. a. undirected hacker c. Trojan horse b. script kiddies d. directed hacker
cluster
A(n) ____ contains a group of the smallest units that can be accessed on a disk. a. cluster c. NTFS b. file system d. FAT
activity
A(n) ____ diagram shows the events that occur within a use case or within an object's behavior. a. class c. collaboration b. activity d. use case
proxy
A(n) ____ firewall establishes a new link between each packet of information and its destination. a. proxy c. biometric b. digital d. packet-filtering
program
A(n) ____ is a collection of statements or steps that solve a problem and need to be converted into a language that the computer understands in order to perform one or more tasks. a. Algorithm c. program b. Identifier d. parameter
flowchart
A(n) ____ is a combination of symbols and text that provide a visual description of a process. a. class c. object b. flowchart d. component
expert system
A(n) ____ is a computer program that simulates the judgement and behavior of a human or an organization that has expert knowledge and experience in a particular field. a. flash memory c. expert system b. neural network d. USB drive
undirected hacker
A(n) ____ is a cracker motivated by the challenge of breaking into a system. a. script kiddie c. undirected hacker b. Trojan horse d. directed hacker
volume
A(n) ____ is a drive or partition on a drive that is formatted with a file system. a. hash algorithm c. hash key b. CPU d. volume
Algorithm
A(n) ____ is a logically ordered set of statements used to solve a problem. a. Identifier c. variable b. Algorithm d. parameter
Interpreter
A(n) ____ is a program included with an executable application that acts as the translator between the program and the computer by converting program statements one by one into a language the computer understands. a. IDE c. constructor b. interpreter d. endless loop
compiler
A(n) ____ is a program that reads all statements from a program and converts them into a computer language. a. event c. compiler b. object d. control structure
high-level language
A(n) ____ is a programming language that is more human-friendly or more natural for humans to read. a. assembly language c. high-level language b. machine language d. interpreter
low-level language
A(n) ____ is a programming language that resembles more what a computer can understand rather than a human a. low-level language c. event handler b. high-level language d. postcondition loop
object
A(n) ____ is a self-contained entity that consists of both data and procedures. a. constructor c. object b. method d. parameter
sniffer
A(n) ____ is a software program that allows the user to listen in on network traffic. a. Trojan horse c. worm b. sniffer d. honey pot
bot
A(n) ____ is a software program that can roam the Internet autonomously. a. cookie c. honey pot b. digital certificate d. bot
constructor
A(n) ____ is a special class function/method used for creating or instantiating an object. a. event handler c. expression b. constructor d. function
prototype
A(n) ____ is a standard or typical example that gives the end user a good idea of what they will see when their application is completed. a. flowchart c. data dictionary b. prototype d. design document
declaration
A(n) ____ is a statement that associates an identifier with a variable. a. attribute c. variable b. endless loop d. declaration
file
A(n) ____ is a storage location that contains data that is treated as either binary or text. a. cluster c. file b. overflow area d. hash key
Class
A(n) ____ is a template or mold used for defining new object types along with their properties and behavior. a. compiler c. method b. event d. class
paradigm
A(n) ____ is a theoretical framework, or a way of doing things. a. expert system c. polymer b. paradigm d. MRAM
hash key
A(n) ____ is a unique value used in hashing algorithms. a. hash key c. directory b. cluster d. overflow area
event
A(n) ____ is an action or occurrence that is recognized by a class. a. identifier c. variable b. event d. scope
script kiddie
A(n) ____ is an amateur hacker that simply uses the hacking tools that have been developed by others. a. cracker c. script kiddie b. reverse engineer d. Trojan horse
virus
A(n) ____ is an uninvited guest program on your computer with the potential to damage files and the operating system. a. proxy firewall c. virus b. sniffer d. DMZ
cracker
A(n) ____ is an unwelcome system intruder with malicious intent. a. honey pot c. cracker b. software engineer d. spammer
threat
A(n) ____ is characterized by three things: targets that might be attacked, agents or attackers, and events. a. risk c. copyright b. callback d. threat
T
An advantage of relative file access is that records can be updated in place
file system
A(n) ____ is the part of the operating system responsible for creating, manipulating, renaming, copying, and removing files to and from storage devices. a. cluster c. overflow area b. file system d. hash key
Distributed
A(n) ____ network consists of computers that independently decide how to channel to the next computer. a. concentrated c. monolithic b. distributed d. centralized
buffer overflow
A(n) ____ occurs when a program tries to place more information into a memory location than it can handle. a. access attack c. virus attack b. buffer overflow d. modification attack
assembler
A(n) ____ reads assembly language code and converts it into machine language. a. control structure c. event handler b. assembler d. identifier
assembly language
A(n) ____ resides between the lowest-level language and a higher-level language; it assigns letter codes to each machine language instruction. a. machine language c. class b. constructor d. assembly language
relationship
A(n) _____ defines how one entity works with or relates to another. a. connection c. relationship b. arrangement d. union
transitive
A(n) _____ dependency exists when one column is dependent upon another column that is not the primary key. a. transitive c. relational b. dysfunctional d. associative
timing
A(n) _____ diagram shows the protocol interactions between two entities. a. flow c. timing b. assignment d. hierarchy
pointer
A(n) _____ is a memory cell that contains the address of another memory cell as its data. a. index c. pointer b. token d. element
Protocol
A(n) _____ is a set of rules designed to facilitate communication. a. procedure c. code b. accord d. Protocol
index
A(n) _____ is a special type of file that occupies its own space and specifies one or more columns that determine how the information stored in a table is organized. a. field c. tab b. identifier d. index
foreign
A(n) _____ key is defined as a column in one table that is part of the primary key in another. a. composite c. auxiliary b. secondary d. foreign
T
ARPA was created by Eisenhower as a direct response to the possible threat posed by the Russian launch of Sputnik.
the Hacker's Manifesto
An anonymous document that justifies cracking into a systems as an ethical exercise is called ____. a. spyware c. the cracker bible b. the Hacker's Manifesto d. Phreaker's Way
T
As expected, the term freeware implies software available free of charge
IBM
According to general consensus, which of the following companies won the mainframe battle of the first electronic computer generation? a. IBM c. Honeywell b. Remington Rand d. RCA
21
According to positional value, the binary number 101012 represents ____ things. a. 3 c. 12 b. 5 d. 21
F
Accountability involves making systems on which information sits accessible and useful to those who should use them.
F
Applications cannot be designed to run on multiple platforms.
F
All files are stored as text files
4
An 8-nibble word is more likely to be referred to as the equivalent ____-byte word. a. 2 c. 8 b. 4 d. 16
T
An Acceptable Use Policy defines who can use the company computers and networks, when, and how.
T
An OS can reside on a ROM chip.
F
An advantage of FAT is that overall performance increases as more files are stored on the partition
Overflow area
An area in a file that is used in case a collision occurs during the hashing algorithm is called a(n) ____. a. cluster c. reserved area b. overflow area d. random area
F
An attribute is also called a relation.
T
An element is another name for a memory cell in an array
F
An example of a good password is: iopwmc.
T
An example of a sequential file might be an audio file or video file
T
An expression is a programming statement that returns a value when executed.
T
An important reason for using a design document is that it can serve as a blueprint.
T
Animation and interactivity tend to increase user interest in a Web site
T
Application programs are geared toward an end user rather than the programmer.
one-to-one
Assembly language, while easier to use than machine code, has what type of correspondence with machine code? a. many-to-one c. one-to-one b. many-to-many d. one-to-many
T
Assembly statements are read from right to left
variable initialization
Assigning a value to a variable at declaration is called ____. a. startup c. concatenation b. variable initialization d. shortcut notation
Fetch-execute
At a basic level, most computers operate on what is called a(n) "____" cycle. a. encrypt-encapsulate c. store-revise b. edit-add d. fetch-execute
2 GB
At present, flash memories come in sizes up to ____. a. 1 MB c. 2 GB b. 100 MB d. 4 TB
stack
Backtracking is most efficiently accomplished by using a(n) _____. a. stack c. tree b. queue d. array
Linux
Based on low cost, available source code, and reputed reliability, which of the following operating systems presents the greatest competitive threat to Windows? a. Crescent c. Linux b. Star d. OS/2
F
Based on the following code fragment, the value of iResult is 4. int iFirstNum = 15; int iSecondNum = 10; int iResult = 0; int iResult = IFirstNum % iSecondNum;
F
Because computer scientists focus on program design, there is really no need for them to acquire proficiency in performing Office tasks.
T
Bits of code that uniquely identify a particular virus is called a virus signature.
stored program
Both the Jacquard loom and the player piano had a "____". a. stored program c. disk drive b. monitor d. keyboard
F
Bus wires in the system category are responsible for timing signals and other protocols.
F
By default, the SELECT statement returns data in no particular order.
transistor
By switching on and off, the ____ can be used to represent the 1s and 0s that are the foundation of all that goes on in the computer. a. capacitor c. resistor b. transistor d. inductor
F
CRT displays are much thinner and run much cooler than LCD monitors.
42 Mbps
Cable is theoretically capable of speeds up to _____. a. 4.2 Mbps c. 420 Mbps b. 42 Mbps d. 42 Gbps
address
Central to the operation of the IP protocol is the IP _____ of both the source and destination. a. name c. signifier b. location d. address
T
Charles Babbage managed to design a machine that captured the key working elements of the modern electronic computer
T
Cookies are related to and sometimes used in conjunction with spyware, but considered different because the user is assumed to be aware of their use.
allocation units
Clusters are also called ____. a. directories c. algorithms b. allocation units d. overflow areas
F
Code cannot be automatically generated by object-oriented programs
malicious code
Code designed to breach your system security and threaten your digital information is known as ____. a. malicious code c. honey pots b. digital certificates d. patents
F
Compression algorithms can be easily converted into computer programs
F
Computer scientists rarely use e-mail to share files
F
Computer scientists will never find occasion to use spreadsheet technologies
T
Computers and the Internet are changing the face of nearly every industry.
command
Console operating systems prompt users to interact through a(n) ____ line. a. operational c. programming b. flow d. command
F
Control wires contain the binary data that is being read from or written to memory and I/0.
T
Copyright protects the expression of the idea and not the idea itself.
hacktivism
Cracking into a system as a political act is known as ____. a. hacktivism c. social engineering b. repudiation d. phreaking
spider
Crawling makes use of a special program called a bot or _____. a. bug c. spider b. butterfly d. centipede
office
Creating documents, presentations, and spreadsheets are best classified as ____ tasks. a. programming c. scientific b. Internet d. office
T
Current hard disk technology allows for hard drives with over 500 GB of capacity.
F
DISPLAY is a DOS command that lists the files in a specified directory or subdirectory.
F
DOS and UNIX allow for recovery of folders and files after they have been deleted
F
DOS has a limitation of 255 characters for the name of a folder.
F
DVDs can store from 4.7 MB to 17 MB of data.
T
DVDs have high densities and can store information in multiple layers and on multiple sides of the platter
compression
Data ____can be used to reduce the sizeof a file and speed thetransmission ofthe file through e-mail. a. collaboration c. inlining b. design d. compression
T
Data structures organize the data in a computer
database
Data that has been organized and logically related to allow access, retrieval, and use of that data is called a _____. a. store c. field b. database d. record
F
Deadlock issues are resolved without the intervention of the operating system.
T
Decoder circuits perform functions such as addressing memory and selecting input or output devices.
hexadecimal
Displays containing the contents of a computer's memory or the hard disk are often referred to as ____ memory dumps. a. error c. decimal b. hexadecimal d. octal
WLAN
Fiberoptics and wireless technologies have given rise to which of the following terms? a. WAN c. WLAN b. Internet d. LAN
logical
ENIAC was a functioning and useful computer that could perform both arithmetic and ____ operations. a. standard c. linguistic b. surgical d. logical
F
Each gate in a circuit reacts in a completely unpredictable way
4
Each hexadecimal digit relates directly to a ____-bit binary pattern. a. 2 c. 8 b. 4 d. 16
T
Each physical device connected to a network must have a network interface card (NIC).
T
Each position in the tree is called a node or vertex.
streaming video
Effort is ongoing to make ____ available on cell phones. a. HDTV c. VCRs b. streaming audio d. streaming video
T
Encapsulation is the process of hiding an object's operations from other objects.
Transfer
File ____ Protocol (or FTP) is a transmission method used to send files across the Internet. a. Task c. Transfer b. Test d. Table
F
Every computer game, program, picture, or sound is stored in the computer as a series of decimal digits.
T
Every multipurpose device with a CPU must also have an operating system.
F
FAT has a larger overhead than NTFS
T
Files may be viewed as leaves or nodes on a tree-like structure.
F
FTP is the protocol that allows Web browsers and Web servers to talk to each other
T
FTP transmission methods are appropriate for placing files in a common location so that many users can download and have access to them.
F
Fast Ethernet speeds do not exceed 10 Mbps.
F
Fiber-optic cables are much more susceptible to attenuation than copper cables
glass
Fiber-optic cables use _____ fibers to guide light pulses along a cable. a. ceramic c. plastic b. glass d. tungsten
T
Flash memory is nonvolatile.
F
Flowcharting is best described as an Internet related task related to surfing.
F
Folders may not contain folders.
T
For any quantity, there is a number in any base to represent it.
T
Formatting can be used to create boot disks.
F
From a database point of view, first normal form is better than second normal form
T
Given the appropriate tool, nearly any user can generate graphical content
word processor
Grammar check and font selection are common features of which of the following tools? a. browser c. binder b. text editor d. word processor
shareware
Graphics software available in the form of ____ is generally free of charge during a trial period. a. adware c. shareware b. middleware d. malware
hyperlinks
HTML and the Web connect one page to another through _____. a. overlinks c. hyperlinks b. higherjoins d. cyberbridges
F
HTML deals with both the form and content of a Web page.
T
HTML is not case sensitive
T
Half of a byte is sometimes referred to as a nibble.
dequeue
In order to remove an item from a queue, you would use a _____ operation. a. enqueue c. requeue b. dequeue d. delete
magnetic
Hard disks are made up of one or more metal platters with a coating consisting of ____ particles. a. magnetic c. photonic b. atomic d. silicon
F
Having a signature in the design document does not mean that it can be used as a contract.
F
Head pointers are data types associated with static arrays.
punch cards
Herman Hollerith introduced electromechanical counting equipment using ____ as input. a. voice patterns c. magnetic tape b. punch cards d. keyboard entry
T
Hexadecimal numbers are used as a shorthand method to represent binary values.
F
High-level protocols such as HTTP and FTP can only be used in the Internet environment.
Internet Explorer
In its antitrust suit with the government, Microsoft claimed which of the following programs was an integral part of the operating system? a. Mosaic c. Navigator b. Internet Explorer d. MS-Word
learn
In order for a computer to emulate human behavior and reasoning, it needs to have the ability to ____. a. walk c. learn b. talk d. hear
F
IBM built the first electronic computer
T
IBM chose Microsoft to develop its PC operating system.
F
IBM preferred selling its PC through an established commercial sales force rather than retail outlets.
Mark I
IBM's first multipurpose machine was called which of the following? a. UNIVAC c. Mark I b. EDVAC d. ENIAC
T
If a user seeks a document tool with the most extensive formatting and graphics capabilities, he/she is best advised to consider a word processor over a generic text editor.
F
If your hard disk is 10GB or less then you may want to use NTFS because it is more efficient in handling smaller volumes of data
lossless
Images reduced by ____ compression techniques retain their original quality. a. lackless c. sassy b. lossless d. glossy
T
Impedance makes the electrical signals weaken as they travel along the wire.
F
In order to get a head start, you should always begin writing source code while seeking project specification approval
Charles Babbage
In 1823 ____ invented a mechanical device that did addition, subtraction, multiplication, and division of 6-digit numbers. a. Gottfried Leibniz c. Charles Babbage b. Blaise Pascal d. Thomas Jefferson
Apple II
In 1977, Apple released the ____ based upon the Motorola 6502 processor. a. Apple I c. Macintosh b. Apple II d. iPod
F
In 1998, Netscape repudiated the open source movement, and suppressed the source code for its browser
HELP
In DOS, you can enter ____ <command> to get more details concerning a particular command. a. HELP c. ASSIST b. AID d. SUPPORT
F
In Java, you cannot associate a number with a boolean value.
man
In Unix or Linux, entering ____<command> gives you the manual on the command that you specify. a. MAN c. HELP b. man d. help
slide rule
In Western society, you can probably credit the 1622 invention of the ____as the beginning of the solution of complex mathematical problems by mechanical devices with moving parts. a. abacus c. logarithm b. slide rule d. transit
Recycle
In Windows, deleted files and folders reside in the ____ Bin folder until it is emptied. a. Remainder c. Recycle b. Refuse d. Recovery
star
In a _____ topology, one of the computers or a network device serves as a hub for all messages. a. grid c. bus b. star d. ring
F
In a binary tree, the left node always has a value greater than the right node
lossy
In addition to redundant areas, ____ compression techniques eliminate information not perceptible to the human eye. a. lossless c. lossy b. primary d. secondary
algorithm
In order to sort data you first need to create a(n) _____ that defines the process for sorting. a. list c. stack b. queue d. algorithm
T
In relation to refining searches, the keyword AND indicates that all criteria must be met.
mantissa
In scientific notation, the method of displaying numbers uses a(n) ____ and an exponent. a. mantissa c. abscissa b. asymptote d. ordinate
F
In the 1980s Microsoft refused to write application software for Apple.
build and fix
In the ____ model of software development, the developer writes a program and continues to modify it until the system is functional. a. rapid prototype c. waterfall b. incremental d. build and fix
waterfall
In the ____ model of software development, the fundamental processes involved in creating the program are represented as phases. The output from each phase is used as the input to the next phase. a. build and fix c. rapid prototyping b. waterfall d. spiral
F
In the adder, the bits are added according to the rules of the hexadecimal numbering system.
F
In the common monitor resolution specified as 1024 X 768, the number 1024 represents rows and 768 represents dots (or pixels).
F
In the context of databases, a column represents a record of information
new
In the context of the Java programming language, the "_____" keyword tells the computer that a new array is being created. a. invoke c. new b. allocate d. make
object-oriented programming
In the fifth generation of electronic computing, modular approaches to coding, such as ____ , facilitate larger, more complex, and more quickly and reliably delivered software products. a. assembly programming b. machine programming c. object-oriented programming d. binary programming
F
Increasing the CPU clock speed by a given amount always results in a proportional overall speed increase in the computer.
F
Indexes do not require additional storage space in the database.
F
Input and output devices increase the speed of the typical computer.
F
Insertions are made at the front of the queue
T
Interaction with an FTP Web site is similar to interaction with a network drive
drivers
Interface programs that allow a computer to interact with peripheral devices are called ____. a. shell scripts c. drivers b. applets d. monitors
T
Interrupt handling is a much more efficient method for processing I/0 than polling.
F
It is always a good idea to use the switch statement when comparing string data types.
F
It is not possible to learn to program or to manage a database without understanding binary and hexadecimal number systems.
F
It is not theoretically possible for each of the programs or processes running on a computer to directly access I/O devices.
T
It is possible, but generally not desirable, to define a database using unnormalized tables.
10,000
It is thought that each neuron in the brain may have as many as connections to adjacent neurons. a. 10 c. 10,000 b. 100 d. 1,000,000
T
Java implements the selection control structure through the use of the if, if-else, if-else-if, and switch statements.
port
Keyboards, and most other I/O devices, connect to the motherboard through a(n) ____. a. socket c. channel b. adapter d. port
T
Layers in the OSI model are designed independently of the others
F
Lotus 1-2-3 was based on entirely different spreadsheet principles than VisiCalc
F
Microsoft Project software makes the job of project manager obsolete
F
Modern computers are capable of storing hexadecimal information.
software evolution
Modifying or changing the software to meet changing customer needs is called ____. a. software evolution c. rapid prototyping b. software modification d. incremental development
Von Neumann
Most computers today are still based on what has come to be called ____ architecture, and are sometimes still called ____ machines. a. Hilbert c. Von Neumann b. Turing d. Non Von
F
Most consumers asserted that the user-interface to DOS was intuitive
copying
Moving files is similar to ____ files. a. deleting c. copying b. closing d. opening
T
Moving parts are prone to mechanical failure.
F
Once a table is in the second normal form, it has for the most part been accurately defined
T
Once you have determined that a database is needed, you should create a data dictionary.
T
NTFS is geared toward a networked environment
F
Negative fractional numbers cannot be internally represented in a computer.
T
Negative powers are used to represent the fractional portion of numbers.
T
One common technique to avoid scope creep is to use a phased approach to software development.
frequency
Normal telephone voice-grade lines use what is called _____-division multiplexing to divide up the bandwidth among the subscribers. a. phase c. wave b. frequency d. amplitude
F
Normally, HTML pages are dynamic; they change from one request to another.
F
One of the main disadvantages of NTFS is the lack of security
ALU
One of the main functions of the ____ component of the computer's CPU is to add numbers. a. controller c. memory b. ALU d. register
T
One of the main rules of software engineering is that you should document the information that clients give you. T
F
One of the problems with MRAM is its high power requirement to read and write data.
T
One of the rules of software engineering is that you should let the user help you design the screens.
T
One rule of software engineering is that you should be realistic when defining project completion dates.
F
One-to-one relationships are never appropriate.
T
Only 10 percent of the software running on all the computing devices of the world comes from Microsoft
T
Operating systems are responsible for the protection of memory and other resources
T
Optical storage is more stable than magnetic storage and is unaffected by outside magnetic influences.
T
Plug and Play technologies automatically detect and configure I/O devices.
F
Polymer memory can hold at most 100 CDs worth of music.
T
Prototype biological computers can perform operations at the rate of approximately one billion per second, which is comparable to the speed of the Pentium 2.4 GHz CPU
resolution
Printers are rated by both printing speed.and ____ of output. a. definition c. size b. variety d. resolution
random
RAM is called "____" because it does not have to be read sequentially. a. relative c. remedial b. random d. rapid
T
ROM (read-only memory) is not erased when the computer power goes off.
T
Raw audio samples are stored in files such as WAV files.
semicolon
SQL statements are closed with a(n) _____. a. Colon c. period b. semicolon d. exclamation mark
F
Repeaters alter the content of the data in the signals that they boost.
F
Repudiation is the science that studies the relationship between people and machines.
F
Researching the benefits and features of the various software tools involves a one-time investment of time and energy
F
SQL syntax requires the WHERE clause to precede the keyword FROM
T
Reverse engineering occurs when someone tries to figure out the design of a program or device by "taking it apart" and analyzing individual components.
T
Risk is the relationship between vulnerability and threat.
F
Routers check that the data received in the packet is identical to the data that was sent.
F
SQL commands may not be lowercase.
T
SQL sends only the data you want to view.
T
SMTP and FTP are two protocols involved with the Internet
F
Search engines use one main method to build a database of Web sites.
F
Shifting the starting point of an audio waveform is known as frequency modulation.
F
Signed and unsigned numbers in the computer are designed to always take up a different number of bits.
Time to live
So that packets do not keep bouncing from router to router forever, one of the fields in the IP header is the _____ field. a. time to live c. lifetime b. time to expire d. expiration
T
Software can be modified to meet the changing needs of the end user.
NOT
The ____ operator works with a single input and its purpose is to reverse the input. a. XOR c. AND b. NOT d. OR
data dictionary
Software engineers and end users can both use the ____ to achieve a clearer understanding of the data available for use in reports, screens, file transfers, and other data operations. a. data dictionary c. sequence diagram b. class diagram d. use case
T
Some types of polymer memory can only be written once, while others can be rewritten many thousands of times.
T
Sounds are stored in the computer in a manner very similar to images.
T
Spam is the name for an unsolicited e-mail.
T
Spiral prototyping starts with an initial pass using the waterfall model.
F
Stacks are typically used to organize requests to print documents.
T
Stacks, like linked lists and arrays, are just memory locations organized into process friendly structures
SMTP
The _____ protocol establishes a link from an e-mail client to a mail server. a. SMTP c. IMAP b. POP3 d. HTTP
mask
Subnets are defined through the use of a subnet _____. a. filter c. sentinel b. screen d. mask
Session
TCP and IP protocols map to Transport, Network, and _____ layers of the OSI model. a. Presentation c. Data Link b. Application d. Session
T
Table look-ups can be used to convert a number from one base to another.
T
The order of the fields does not have to match that of the defined table structure.
expert systems
Telephone support and hot lines, such as a poison control center, can make use of ____. a. expert systems c. SDRAM b. MRAM d. ROM
software validation
Testing software to ensure that it meets the software specifications is called ____. a. scope creep c. rapid prototype b. software validation d. incremental development
Integrated Development Environment
Text editors, compilers, and debuggers are directly featured on the menu of which of the following software tools? a. Integrated Development Environment b. word processor c. spreadsheet d. desktop publisher
T
Text files consist of ASCII or Unicode characters
24
The 16.7 million color palette of the BMP format requires ____ bits. a. 16 c. 24 b. 20 d. 32
T
The 192.168 subnet is never presented to the outside Internet
one
The AND circuit generates ____ output for each set of inputs. a. one c. three b. two d. four
F
The AND operator has an output of 1 (true) only if both inputs are 0
F
The Altair bus evolved into a specialized device that only a few hardware/software companies could use
T
The Apple II gained broad acceptance due to the ease with which programmers could write applications for it
T
The Boolean OR operator returns a 1 only when either or both of the inputs are 1.
T
The CPU has the ability to accept input from and provide output to external devices
F
The Data Link layer of the OSI model uses routing protocols to select optimal paths between two end systems
T
The Hungarian notation is a variable naming method that gives each variable an identifier at the beginning of the variable name describing the data type contents.
T
The Intel 4004 was named after the number of transistors aboard
T
The Internet is a network of networks
Session
The _____ layer of the OSI model is responsible for translation, formatting, and syntax selection. a. Presentation c. Application b. Session d. Data Link
F
The Jacquard loom addressed a problem that was directly related to issues in navigation.
F
The MCP is the software control center of the modern computer.
GUI
The Macintosh had the first mass-produced ____ , an interface that uses graphical instead of text commands. a. ARPA c. GUI b. SMP d. MP
T
The NTFS file management system is used to locate files on a storage medium.
seven
The OSI conceptual model for the communication process has _____ discrete layers. a. four c. seven b. five d. nine
98
The PCI system bus consists of _____ wires. a. 10 c. 98 b. 20 d. 198
F
The TCP protocol has provisions for addressing the packets to ensure that they get to the correct place.
T
The TCP/IP protocol lies at the heart of the Internet
T
The Telnet protocol runs above the TCP/IP layer.
Datagrams
The Transport layer of the OSI model uses data units called _____. a. Words c. bitgrams b. Datagrams d. bytegrams
sequence
The UML ____ diagram shows how one class communicates with another by sending messages back and forth. a. class c. collaboration b. sequence d. sequence
F
The UNIVAC incorrectly predicted the outcome of the 1952 election
T
The UNIX rlogin command can be exploited by crackers.
T
The Unicode character standard is compatible with the extended ASCII standard.
F
The Unicode method of character representation is fast becoming obsolete.
F
The Von Neumann architecture supports the parallel execution of instructions.
T
The Von Neumann machine's operation is governed by a program loaded into memory.
F
The Windows operating system no longer provides a command-line interface.
T
The Xerox Alto featured graphics, menus, icons, windows, and a mouse
SDLC
The ____ describes the life of the application, including all of the stages involved in the development, testing, installation, and maintenance of a program. a. SDLC c. SLC b. UML d. DBA
collaboration
The ____ diagram shows how system elements work together to accomplish the system's objectives. a. activity c. collaboration b. component d. deployment
.zip
The ____ extension is one of the more popular compression formats in the world of Windows. a. .bat c. .zip b. .car d. .exe
disk defragmenter
The ____ improves performance by minimizing movement of the read/write heads. a. file system c. hash key b. disk defragmenter d. directory
data dictionary
The ____ is created by reviewing the screens and reports the end user would like included in the application and determining which fields are essential to the application. a. use case c. class diagram b. data dictionary d. sequence diagram
kernel
The ____ is the core of the OS. a. file manager c. GUI b. scheduler d. kernel
customer relations representative
The ____ is the interface between the testers, developers, and end users during the creation and early release cycles of the product. a. project manager c. database administrator b. programmer d. customer relations representative
project manager
The ____ is the leader of the team and is responsible for choosing the right players for the right positions. a. database administrator c. client b. project manager d. programmer
machine language
The ____ is the lowest-level language that is directly understood by a computer. a. object oriented language c. assembly language b. constructor d. machine language
master file table
The ____ is used in NTFS to store data about every file and directory on the volume. a. directory c. cluster b. master file table d. overflow area
file allocation table
The ____ keeps track of which files are using which clusters. a. file allocation table c. hash key b. directory d. random area
TCP
The _____ protocol establishes a virtual circuit with the destination computer to transmit packets. a. TCP c. HTTP b. IP d. FTP
FTP
The _____ protocol is used to provide the reliable and efficient transmission of data files. a. UDP c. FTP b. TCP d. IP
Web
The _____ server is just a computer that is programmed to respond to HTTP requests. a. Network c. Internet b. Protocol d. Web
selection
The _____ sort starts at the first value in the list and then processes each element looking for the smallest value. a. merge c. selection b. counting d. radix
bubble
The _____ sort starts with the last element in the list and compares its value to that of the item just above it in the list order. a. bubble c. heap b. insertion d. quick
Hypertext Transfer Protocol
The acronym HTTP stands for _____. a. Heuristic Transport Type Protocol b. Hexadecimal Task Test Protocol c. Hypertext Transfer Protocol d. Hypertext Transition Protocol
F
The assembly language instruction inc is used to compare values.
T
The assembly language instruction jnz tests the value of the zero flag maintained by the system
F
The bit error rate usually increases as the transfer rate decreases
T
The bubble sort is highly inefficient in terms of processing speed.
T
The client is the driving force behind a software development project.
T
The combination of gates enables the computer to do all the things that it does.
F
The computer has a crystal clock called a(n) control clock that times, or synchronizes, each of the steps in the fetch-execute cycle
amplitude
The computer samples sound at fixed intervals and each sample is assigned a binary value according to its ____. a. frequency c. amplitude b. period d. pitch
T
The computer scientist's flowchart can be used as a roadmap to describe how a system should be developed
T
The computers attached to a network are often referred to as nodes.
positional
The concept of ____ value is common to all modern numbering systems. a. positional c. deterministic b. radical d. random
Open architecture
The concept of computer design that allows for future modifications and additions by members of the public is known as which of the following? a. closed architecture c. open architecture b. proprietary architecture d. licensed architecture
ubiquitous computing
The concept of each person interacting with many, sometimes invisible computers has been named "____" by computer scientist Mark Weiser. a. 1984 c. massive parallelism b. ubiquitous computing d. nanotechnology
T
The concept of functional dependency includes the determinant and related columns.
T
The conversion algorithm from base 10 to another base utilizes a sequence of remainders to construct the new number.
F
The cost of manufacturing storage devices with no moving parts is considerably more than a conventional hard drive.
F
The database administrator is responsible for writing source code to meet the functional needs of the end user.
256
The decimal equivalent of 10016 is ____. a. 116 c. 256 b. 160 d. 1600
F
The decimal equivalent of 111112 is 31000.
T
The difference between adding numbers in base 10 and any other base lies in the carry process.
T
The disadvantage of relative file access is that disk space can be wasted if data does not fill the entire record if some of the relative records do not have data
F
The distinction between LANs and WANs is clear and well defined
F
The do-while loop is considered a precondition loop.
256
The eight bit extended ASCII (American Standard Code for Information Interchange) character set can be used to represent ____ characters. a. 128 c. 512 b. 256 d. 34,168
F
The fastest way to access data is via sequential access.
T
The first Microsoft file system was called the file allocation table
F
The first address or position in an array starts with the number one (1)
T
The flip-flop circuit latches onto a bit and maintains the output until it is changed.
T
The following code fragment is an example of an endless loop: int iCount = 1; while (iCount <= 5) { System.out.println("I am on number " + iCount); }
F
The original Eniac computer occupied approximately 50 square feet of space.
T
The parent-child structure has nearly unlimited logical depth.
T
The parts of a computer system, such as the CPU, memory, keyboard, monitor, and network adapter, all function at different speeds.
apartment number
The port number can be analogized to which of the following address components? a. street address c. zip code b. city d. apartment number
F
The for and while loops are considered postcondition loops
T
The hexadecimal number system uses letters to represent digits beyond nine.
F
The hexadecimal numbering system has seventeen unique digits.
F
The hexadecimal numbering system runs out of digits after ____. a. E c. G b. F d. H
subscript
The index or _____ tells the computer which memory cell to access in the array. a. superscript c. pointer b. subscript d. arrow
T
The information kept in a database is kept in natural or sequential order.
T
The insertion sort is modeled after the manual process of sorting cards.
browser wars
The integration of Internet Explorer with the dominant Windows operating system was the turning point in what came to be known as the "____". a. Internet affair c. code conflict b. browser wars d. network nightmare
internetwork
The loose collection of networks called "the Internet" is the short form of which of the following words? a. internetwork c. interarpanet b. internexus d. interconnect
root
The main directory level is also called the ____ level. a. root c. leaf b. child d. primary
T
The main purpose of MRAM is to replace DRAM.
F
The memory cells of an array may store different types of data
T
The middle part of the IP address identifies the host on the network
F
The most commonly used form of mass storage is the floppy disk drive.
F
The most popular transmission medium has been silicon
T
The mouse is considered to be a primary input device.
T
The need to be aware of the complex mix of technological requirements and historical forces is part of a computer scientist's job
root
The node that begins the tree is called the _____. a. branch c. root b. child d. leaf
24
The normal copper wire is capable of carrying _____ voice channels. a. 4 c. 24 b. 16 d. 48
T
The normal copper wire that comes into your home is capable of speeds up to 1.5 Mbps.
0.0001
The number 10^-4 evaluates to which of the following? a. 0.000001 c. 0.0001 b. 0.00001 d. 10000
T
The number of pixels in each row and column defines the resolution of a display.
F
The number of words used for each sound sample determines how many unique amplitude levels can be represented.
T
The one-to-many entity relationship is the most common.
interrupt
The operating system reallocates the CPU through a program known as a(n) ____ handler. a. interrupt c. control b. job d. disruption
platform
The operating system running on a computer is often called its ____ and is typically tied to a particular CPU. a. support c. intermediary b. platform d. driver
domain
The problem of having to remember IP addresses was solved by allowing Web servers to have _____ names. a. range c. resource b. locator d. domain
formatting
The process of ____ arranges the disk surface into addressable areas and sets up the basic directory tree structure on the disk. a. organizing c. templating b. formatting d. shaping
recursion
The process of a routine calling itself is called _____. a. counting c. iteration b. recursion d. modularization
Conversion
The process of changing image format from one type to another is called ____. a. Conversion c. blurring b. Rotating d. cropping
Concatenation
The process of combining or joining strings into one value is known as ____. a. concatenation c. nesting b. instantiation d. inheritance
raster
The process of painting an image on the screen of a monitor is called ____ scanning. a. raster c. cathode b. roster d. dpi
T
The processes that are running under Windows may be viewed by pressing the Ctrl+Alt+Del key combination
F
The project manager is assigned the role of creating and maintaining the database structure.
robotics
The science of ____ is primarily concerned with the mechanics and electronics that are used to carry out the results of the other areas of artificial intelligence. a. fuzzy logic c. pattern recognition b. robotics d. natural language processing
F
The selection sort is highly efficient for large lists
domain
The set of possible values for each column is called the _____ of that column. a. domain c. image b. range d. codomain
normalization
The set of rules that dictates how databases are designed is called _____. a. normalization c. customization b. standardization d. invocation
F
The shell sort incorporates a bubble sort to organize data.
T
The signal to noise ratio measures the quality of a communications channel
F
The social interaction that preys on human gullibility, sympathy, or fear to take advantage of the target is known as hacktivism.
F
The software engineer is responsible for making sure programs function correctly and meet the specified functional requirements set forth in the design document.
F
The software engineer is responsible for pulling together all the pieces of the project and incorporating them into the design document.
F
The standard port number for HTTP is 21, and for FTP it is 80.
T
The statement "anArray [2] = 5;" assigns the number five (5) to the third component of anArray
4 bytes
The storage requirement for the int data type in Java is ____. a. 2 bytes c. 6 bytes b. 4 bytes d. 8 bytes
attenuation
The tendency of a signal to become weaker over distance is known as _____. a. amplification c. attenuation b. alienation d. amelioration
parallel
The term ____ computing or ____ architectures refers to linking a number of CPUs to work on a task simultaneously. a. parallel c. serial b. sequential d. monolithi
sequential access
The term ____ implies reading and writing data in order, from the beginning. a. random access c. Collision b. hashing d. sequential access
biometrics
The term ____ is used to describe biological identification, such as fingerprints, voice dynamics, or retinal scans. a. biometrics c. ergonomics b. cookie d. hacktivism
phreaking
The term ____ is used to describe the process of subverting the phone system in order to get free service. a. phreaking c. biometrics b. honey pot d. callback
syntax
The term ____ refers to the spelling and grammar used within a programming language. a. interpreter c. declaration b. syntax d. event
F
The term attribute is used to describe the symbols used to manipulate the data contained in variables.
F
The term dumpster diving refers to an attack on a system that can include snooping, eavesdropping, and interception.
F
The term identifier is used to describe the characteristics of an object.
T
The term polymorphism is used to describe an object's ability to use the same expression to denote different operations
T
The term precedence describes the order in which something is executed
F
The term radix is synonymous with positional value.
T
The term vulnerability refers to the sensitivity of information and the skill level needed by the attacker to threaten that information.
F
The third normal form creates columns that are independent of the primary key.
classes
The total pool of IPv4 addresses is separated into groups, called _____. a. classes c. aggregations b. entities d. clusters
opposite
The truth table for the NOT gate shows that the output is the ____ of the input. a. square c. opposite b. first derivative d. same
XOR
The truth table for the ____ gate indicates that the output is 1 only when the inputs are different. a. OR c. AND b. XOR d. NAND
T
The upper bound of an array initialized to a size of five (5) is position number four (4)
T
There are many SQL dialects.
F
There are only four ways to modify or transform a graphic
T
There is a top-level DNS server for each of the top-level domains.
T
There is no universal software tool that can be applied to the entire spectrum of tasks.
slicing
Time-____ is a method that allows multiple processes to share the CPU. a. switching c. solving b. sourcing d. slicing
sign
To find the ____ of a given bit, flip it to the opposite state. a. root c. position b. complement d. sign
rotate
To flip an image upside down, the user would ____ it 180 degrees. a. resize c. crop b. rotate d. scale
first
To put the table into the _____ normal form, a separate row needs to be created for each row-column intersection with more than one value. a. first c. third b. second d. fourth
F
Tracks are contained within sectors
encryption
Transforming original data into coded data so that only authorized parties can interpret it is known as ____. a. authentication c. piracy b. packet filtering d. encryption
T
Transistors are simply small electronic switches that can be in either an on or an off state.
T
True Routers work in a manner similar to the way mail is delivered.
Inductance
Twisting copper wires nearly eliminates the electromagnetic effect known as _____. a. inductance c. Resonance b. resistance d. Impedance
F
Typing the following statement at the command prompt will compile the MyProg1.Java file. java MyProg1.java
Modeling
UML or Universal ____ Language diagrams are used to develop object-oriented systems and programs. a. Modeling c. Master b. Markup d. Middling
F
UNIX and DOS natively use a graphical user interface.
F
UNIX commands can be used to manipulate data structures within a database.
F
Under FAT, an administrator can specify which individual users or groups or users can perform certain operations on files and directories
F
Unguided media cannot transmit or carry electromagnetic signals.
16
Unicode character representation uses a(n) ____ bit standard. a. 4 c. 8 b. 7 d. 16
T
Unlike repeaters and hubs, bridges have intelligence.
T
Updating a sequential file requires the entire file to be copied to a new file, modifying the record as it is written to the new file.
110012
What is the result of converting the decimal number 25to a base 2 equivalent? a. 100012 c. 110012 b. 100112 d. 111012
T
User-phobia is the fear that if you include the end user in the design process, the application will be a failure
routers
Using _____, a packet can just be sent on an alternate line if the desired line is damaged or busy. a. hubs c. switches b. routers d. linkers
Mosaic
Using the Berners-Lee protocols, Marc Andreesen created the browser that had the most impact beyond the walls of academia: ____. a. Internet Explorer c. Mosaic b. Next d. Impact
doubles
What type of data can be stored in an array generated by the statement, "int[ ] aGrades = new int [5]"? a. strings c. floats b. doubles d. integers
F
Variable names in Java can begin with letters, underscores, and numbers
compression
Various ____ techniques have been designed to allow the same image information to be stored in a smaller file. a. consolidation c. scanning b. compression d. resolution
millions
Very Large-Scale Integration (VLSI) chips hold ____ of circuits. a. hundreds c. millions b. thousands d. trillions
T
Wearable computers have been designed to be used as language translators.
F
Web page design tools such as Microsoft Front Page or Macromedia Dreamweaver have made HTML obsolete.
11102
What binary number results from adding 1112 and 1112? a. 10002 c. 11102 b. 10112 d. 11112
19
What is the result of converting the decimal number 25to a base 16 equivalent? a. F c. 1A b. 19 d. 31
interrupt
When an I/O device places a voltage signal on a(n) ____ line, the associated chip checks its priority before passing it on to the CPU. a. poll c. interrupt b. job d. JCL
F
When power is turned on, the CPU begins executing the instructions located in the CMOS chip.
T
When testing, you should keep a log of the errors encountered during testing and after the release of the application.
keys
When the columns are used to determine the sort order of information they are called _____. a. markers c. flags b. keys d. tokens
programming
When you are diagramming and creating flowcharts, you are principally engaged in ____ tasks. a. programming c. Web b. office d. network repair
DNS
When you type in a URL in the address bar of your browser, you send a _____ lookup request to the _____ server at your ISP. a. POP c. SND b. DNS d. NET
Create Table
Which of following is a valid SQL command for constructing a table? a. BUILD TABLE c. MAKE TABLE b. SETUP TABLE d. CREATE TABLE
Null
Which of the following SQL key words indicates that data is not required for a specified column? a. NULL c. NOT b. NOTHING d. VOID
Select
Which of the following SQL statements is most commonly used? a. INSERT c. DELETE b. CREATE d. SELECT
Satellite
Which of the following WAN technologies use the same unguided media as television? a. DSL c. cable b. dial-up d. satellite
Array
Which of the following can be classified as a data structure? a. Integer c. Character b. Array d. Float
Insert
Which of the following commands can be used to add new rows of data to a table? a. INCREASE c. INSERT b. ADD d. INCLUDE
fdisk
Which of the following commands enables UNIX to partition a disk drive? a. FDISK c. pdisk b. PDISK d. fdisk
Tim Berners-Lee
Which of the following computer scientists invented the World Wide Web? a. E.F. Codd c. Marc Andreesen b. Tim Berners-Lee d. Donald Knuth
E.F. Codd
Which of the following computer scientists made significant contributions to relational database management? a. Grace Hopper c. Alan Turing b. E.F. Codd d. John Von Neumann
arrays
Which of the following data structures adapts least efficiently to dynamic memory allocation. a. linked lists c. stacks b. queues d. arrays
queue
Which of the following data structures uses a tail pointer? a. stack c. array b. queue d. binary tre
GIF
Which of the following graphical formats should be favored for animation and small file size? a. BMP c. JPG b. GIF d. TIF
managing resources
Which of the following is a primary function of an operating system? a. managing resources c. generating flowcharts b. generating documents d. solving differential equations
Desc
Which of the following is a valid SQL word used to return data in descending order? a. BOTTOM c. DESC b. OPP d. REV
MPEG
Which of the following is an example of a video compression format? a. BMP c. MPEG b. GIF d. TIF
two's complement
Which of the following methods represents the most common way of storing signed numbers? a. one's complement c. integer complement b. binary complement d. two's complement
Windows XP
Which of the following operating systems supports multitasking? a. Windows XP c. MS-DOS b. CP/M d. Apple II
UNIX
Which of the following operating systems was designed to accommodate multiple users and multiple tasks? a. DOS c. UNIX b. CP/M d. Windows 3.0
OS/2
Which of the following operating systems was developed jointly by IBM and Microsoft? a. NOS c. Linux b. OS/2 d. Unix
pop
Which of the following operations removes an item from a stack? a. pop c. delete b. remove d. eject
Microsoft.NET
Which of the following programming environments is actually a platform hosting a number of distinct languages? a. Borland JBuilder c. CodeConqueror b. Microsoft.NET d. Rhodes
merge sort
Which of the following routines implements two list structures to perform sorting operations? a. merge sort c. bubble b. selection sort d. quicksort
quicksort
Which of the following sorting routines incorporates a problem solving technique known as divide and conquer? a. counting c. bucket b. radix d. quicksort
CD-ROM
Which of the following storage forms is non-volatile? a. DRAM c. DDRAM b. SRAM d. CD-ROM
Vacuum tubes
Which of the following technologies made electronic computing possible? a. reusable pins c. vacuum tubes b. punch cards d. keyboards
Integrated development environment
Which of the following terms describes a software development interface that incorporates all of the necessary tools needed to write, compile, and distribute programs? a. Integrated development environment b. Object oriented programming c. Variable initialization d. Hungarian notation
Directory
Which of the following terms describes an organizational unit within a storage medium that stores files, folders, and subdirectories? a. Directory c. File compression b. Fragmentation d. Volume
USB drive
Which of the following terms describes flash memory in a small, durable portable case that can be plugged into a USB port of a computer and used in the same manner as a disk drive? a. USB cache c. USB disk b. USB port d. USB drive
MRAM
Which of the following terms describes memory that uses the polarization of microscopic magnetic layers to store ones and zeros that remain after the power source is removed? a. DRAM c. ROM b. MRAM d. SRAM
multiprocessing
Which of the following terms refers to computing with more than one CPU? a. multitasking c. multileveraging b. multilayering d. multiprocessing
desktop publisher
Which of the following tools specializes in sophisticated page layout? a. project scheduler c. text editor b. desktop publisher d. spreadsheet
Weapons development
Which of the following war-time activities caused the U.S. Navy Board of Ordinance to sponsor the development of the first modern electronic computer? a. ship building c. weapons development b. aerial reconnaissance d. map-making
UNIVAC
Which of the following was the first commercially viable computer? a. UNIVAC c. Mark I b. ENIAC d. EDVAC
transistor
Which piece of technology replaced the vacuum tube? a. transistor c. capacitor b. diode d. resistor
F
Whole numbers or integers are internally represented by the computer as hexadecimal numbers.
UNIX
Wildcard specifications are case sensitive in ____. a. UNIX c. Windows XP b. DOS d. MAC OS
T
Windows and DOS use the FDISK command to partition the drives.
T
Wireless networking uses the same technology as the radio in your car and the cell phone in your pocket
rapid prototyping
With ____ tools are available that allow end users to work with prototypes of the screens and other interfaces. a. incremental development c. build and fix b. rapid prototyping d. waterfall
NAT
With _____, multiple computers can share one Internet connection. a. NAT c. TCP/IP b. DHCP d. UDP
offset
With arrays, the _____ is used to specify the distance between memory locations. a. offset c. length b. width d. address
T
With respect to FAT, data is stored in 512-byte sectors on the hard drive and depending on the size of the file, the data might occupy one or more sectors
T
With respect to ease of use, the BASIC programming language is superior to machine code language.
T
With the FAT file management system, deleting a file does not actually remove it from the hard drive. Instead, a hex value of E5h is placed in the first position of the file name.
T
With the Von Neumann machine, instruction execution is carried out by a central processing unit that contains a control unit, an arithmetic logic unit, and registers.
T
With the introduction of the semiconductor, both the cost and size of computers were reduced while speed and reliability were improved.
T
Without a database most applications would be useless.
T
Without protocols, computers would not function.
T
Word-processed documents may be input into desktop publishers
UML
____ is a software modeling process that enables system developers to create a blueprint showing the overall functionality of the program being engineered and provides a way for the client and the developer to communicate. a. SDLC c. UML b. Scope creep d. Prototyping
IPCONFIG
You can check the network configuration of your computer in Windows by using the _____ command. a. IPSETUP c. NETWORK b. IPCONFIG d. NETDESIGN
T
You can compress information by replacing repeating patterns with a code.
F
You can directly connect to a National Backbone Provider from your home computer.
F
You should have at least three people in charge of creating and maintaining the databases.
point-of-presence
Your Internet provider maintains a switching center called a _____. a. nexus c. cusp b. point-of-presence d. receive-and-send
Inheritance
___ is the process of providing more class functionality by creating more specific classes based on generic classes. a. Variable initialization c. Inheritance b. Encapsulation d. Polymorphism
Brandwidth
___ measures the speed a transmission medium is able to handle in bits per second. a. Brandwidth c. Bit capacity b. Byte capacity d. Broadwidth
Boolean
____ algebra is concerned with the logic of the operators AND, OR, and NOT. a. Linear c. Boolean b. Modern d. Fibonacci
Wildcards
____ are characters that are used to match any character at the end of a file name to a particular file extension. a. Deuces c. Aces b. Jokers d. Wildcards
Binary files
____ are more compact and faster to access because the system does not have to convert the data. a. Binary files c. Hash files b. Sequential files d. Random files
Backdoors
____ are shortcuts into programs created by system designers to facilitate system maintenance but used and abused by crackers. a. Checksums c. Backdoors b. Heuristics d. Bots
Partitions
____ are simply broad divisions of the total capacity of the disk into specific OS areas. a. Segments c. Categories b. Portions d. Partitions
Ethics
____ are the moral principles for judging right or wrong behavior held by an individual or group. a. Digital certificates c. Ethics b. Laws d. Ergonomics
Neural networks
____ are well suited for applications such as visual speech recognition applications. a. DVRs c. Turing tests b. Quantum computers d. Neural networks
Use cases
____ describe a system's behavior from a user's standpoint. a. Classes c. Use cases b. Objects d. States
Project feasibility
____ determines whether the project is worth doing, and specifying the advantages and disadvantages of this application. a. Software specification c. Scope creep b. Project collaboration d. Project feasibility
Routers
____ direct network traffic based on the logical (IP) addresses assigned at the third layer of the OSI stack. a. Bridges c. Hubs b. Routers d. Gateways
Sequential
____ file access allows you to mimic the look of a database table by storing information in the file row by row, similar to a database record. a. Hash c. Sequential b. Binary d. Random
Flash memory
____ functions as erasable, rewritable ROM memory. a. Flash memory c. Speech recognition b. Natural language processing d. Machine learning
Random access
____ implies that data is directly read or written anywhere on the disk. a. Sequential access c. Random access b. Hashing d. Collision
Graphics
____ in the form of logos, cartoons, and maps play a large part in the world of information sharing. a. Texts c. Databases b. Graphics d. Protocols
Binary
____ instructions are processed sequentially by fetching an instruction from memory, and then executing that instruction. a. Binary c. DRAM b. MRAM d. USB
Packet switching
____ involves dividing messages into blocks that can be reassembled at their destination, with each block possibly following a different path. a. Multiplexing c. Packet switching b. Linking d. Decoding
Spyware
____ is a catchall phrase for programs that sit on your computer, with or without your knowledge, observing your computer activities. a. Cookie c. Spyware b. Encryption d. Social engineering
Hashing
____ is a common method used for accessing data either in a file or a database table through the use of a unique value. a. Clustering c. Hashing b. Disk fragmenting d. File compressioN
Macromedia Fireworks
____ is a graphics tool popular with Web designers. a. Tron c. Redux b. Macromedia Fireworks d. Starry Messenger
Holographic storage
____ is a method of splitting a laser beam and using a device called a spatial light modulator to store full pages of information in layers on a crystal material. a. Fuzzy logic c. Holographic storage b. Pattern recognition d. Speech recognition
Object-oriented programming
____ is a style of programming that involves representing items, things, and people as objects rather than basing the logic around actions. a. Object-oriented programming c. Variable initialization b. Assembly programming d. Polymorphism
Fuzzy logic
____ is a superset of conventional logic that has been extended to handle the concept of partial truth. a. Neural networks c. Fuzzy logic b. Robotics d. Speech recognition
NTFS
____ is often referred to as a "journaling" file system because it keeps track of transactions performed when working with files and directories. a. FAT c. MFT b. NTFS d. EFS
Software piracy
____ is the illegal copying of software . a. Software piracy c. Social engineering b. Biometrics d. Dumpster diving
Instantiation
____ is the process of creating an object based upon a class. a. Inheritance c. Instantiation b. Concatenation d. Variable initialization
Software engineering
____ is the process of producing software applications. a. Database administration c. UML b. Software engineering d. SDLC
Artificial intelligence
____ is the science and engineering of making intelligent machines. a. Nanotechnology c. Quantum mechanics b. Magnetic storage d. Artificial intelligence
Quantum mechanics
____ is the study of matter and radiation at the atomic level. a. Fuzzy logic c. Robotics b. Pattern recognition d. Quantum mechanics
Collisions
____ occur when the hashing algorithm generates the same relative key for more than one original key value. a. Clusters c. Compressions b. Directories d. Collisions
Disk fragmentation
____ occurs when files have clusters scattered in different locations on the storage medium rather than in contiguous locations. a. Clusterization c. Hashing b. Disk fragmentation d. Disk striping
Scope creep
____ occurs when new changes are continually added to a project thus changing the proposed completion date so that the project is never completed, but is instead in constant improvement mode. a. SDLC c. Scope creep b. Prototyping d. Testing
Binary
____ patterns contain information about the color and brightness of a pixel. a. Binary c. Decimal b. Octal d. Hexadecimal
Natural language
____ processing involves computer applications that can recognize and interact with natural language text. a. Assembly language c. High-level language b. Machine language d. Natural language
NTFS
____ provides the ability to assign access rights to files and directories. a. FAT12 c. NTFS b. FAT24 d. FAT32
Infrared
____ pulses allow transmission rates up to 4 Mbps. a. Microwave c. X-ray b. Infrared d. Ultraviolet
Cardinality
____ shows the numeric occurrences between entities in an ER model. a. Functionality c. Transitivity b. Cardinality d. Dependency
XML
_____ formats content for display in a browser and transfers information via the Web. a. SGML c. HTML b. XML d. PHP
Scripting
_____ languages allow a Web page developer to include dynamic properties. a. Scripting c. Presentation b. Hosting d. Staging
Guided
_____ media are physical media such as copper wire or fiber-optic cable. a. Directed c. Undirected b. Guided d. Oriented
F
pcAnywhere affords remote access to all PCs, whether or not a version of this software is installed in the remote device