IT Concepts Final guide

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Another name for Phase 5, systems implementation, is ______.

conversion

Small data files that are deposited on a user's hard disk when they visit a website are called ____________. These files are harmless in and of themselves, what makes them a potential privacy risk is that they can store information about user, user's preferences, and user's browsing habits.

cookies

In Phase 2 of the systems life cycle, the primary concern is gathering and analyzing the _____ and new ______ are determined.

data ; requirements

To effectively and efficiently use computers, you need to know the parts of an information system, which include ____, ____, ____, ____, ____, and the Internet.

data, hardware, people, procedures, software

The rectangle icon of standard flowcharting symbols represents a process item, while a diamond shaped icon is used to represent a ______ item.

decision

A report on the numbers and types of jobs held by women and minorities, which is not needed periodically, but may be required when requested by the U.S. government, is an example of ____________ report produced by MIS.

demand

In the systems ________ phase of the systems life cycle, the report should be prepared to present the costs versus the benefits and it usually concludes by recommending one of the alternatives.

design

In the testing step of the systems _______ phase, processed information is evaluated to see whether the results are correct.

development

New hardware and software are acquired, developed, and tested in the systems ______ stage of the systems life cycle

development

_______ uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account

dictionary attack

The ______ conversion approach to systems implementation is considered the most risky.

direct

The first part of a URL is the protocol. What is the second part called?

domain name

Top managerial-level information flow is vertical, horizontal, and _______.

external

An _____ is a private network that employs Internet technologies to connect more than one organization

extranet

A _______ acts as a security buffer between a corporation's private network and all external networks, including the Internet. All electronic communications coming into and leaving the corporation must pass through it for evaluation.

firewall

In a Ribbon GUI, a ______ displays the alternative choices

gallery

The six-phase problem-solving procedure introduced in Ch. 12 for examining and improving an information system consists of Preliminary investigation, Systems analysis, Systems design, Systems development, System __________, and Systems maintenance. In organizations, this procedure is used by computer professionals known as __________.

implementation ; systems analysts

In a payroll program, it would instruct the computer to take the number of hours you worked in a week and multiply it by your pay rate to determine how much you are paid for the week. Here between data and information, the total amount you are paid for the week should be _____ and the number of hours you worked in a week and your pay rate are ____

information, data

Programming errors are of two types. If a payroll program that did not compute overtime hours would have one of the two types of errors, which is a ____ error

logic

Before a computer can process or run any program, the program must be converted or translated into _____ language

machine

The five generations of programming languages in the correct order are: (1) _______ languages, (2) assembly languages, (3) _______ languages, (4) task-oriented languages, and (5) problem and ______ languages

machine ; procedural ; constraint

Periodic evaluation is part of the systems __________ phase of the systems life cycle.

maintenance

There are two main components of every system unit. One that is a holding area for data, instructions, and information is called ______. Another component that controls and manipulates data to produce information is called ________

memory; microprocessor

_____ communication is a wireless connection which is sometimes referred to as line-of-sight communication

microwave

_____ is a new type of processor that can provide two or more separate and independent CPUs.

multicore

_______ devices (MFD) typically combine the capabilities of a scanner ,printer, fax, and copy machine.

multifunctional

Among the three basic OS categories, Windows Server is neither an RTOS or a standalone OS. It is a _____ OS

network

Network operating systems are typically located on one of the connected computers' hard disks. This computer, which is called ______, coordinates all communication between the other computers.

network server

System software works with end users, application software, and computer hardware to handle the majority of technical details. It consists of four types of programs, including ______ systems, _______, device drivers, and language translators.

operating ; utilities

For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distributed across each core. This operation or technology is called ___________ processing.

parallel

The organization can switch to the old system if the new system fails in the ______ conversion approach.

parallel

Computers with multicore processors knows how to divide tasks into parts and distribute parts across each core- this is an operation or technology called _________

parallel processing

in a _____ network, nodes have equal authority and can act as both clients and servers

peer-to-peer

In an image editor, photographs consist of thousands of dots or _______ that form images.

pixels

A _______ is a list of instructions for the computer to follow to accomplish the task of processing data into information. The instructions are made up of _______ used in a programming language, such as C++, Java, or Visual Basic

program ; statements

One of the SDLC phases that focuses on formalizing the written description and processes used in the program is called ________.

program documentation

The first part of every uniform resource locator (URL) presents the ______ used to connect to the resource.

protocol

A set of communication rules for exchanging data between computers

protocols

In 2017, a program called "WannaCry" infected over 250,000 computers in over 150 countries. The attack infected all types of businesses, halting production at car manufacturing plants and delaying patient treatment at hospitals. "WannaCry" is known to be one of various forms of cybercrimes. This type of malicious software is particularly called ______________.

ransomware

While ___ images use pixels to represent images, ____ images use geometric shapes or objects. Because geometric shapes or objects are defined by mathematical equations, they can be rapidly and easily resized, colored, textured, and manipulated.

raster ; vector

Embedded operating systems, also known as ______ operating systems and RTOS, are entirely stored within a device

real-time

A typical structured program usually is implemented by using a combination of three logic structures called sequential, selection, and ________

repetition

The expression: DO read in job information WHILE there are more jobs is a kind of ______ or loop structure.

repetition

Online search services maintain huge databases relating to information provided on the web and the internet. They provide special programs called _______ that you can use to locate specific information on the web. They also provide other special programs called ______ continually looking for new information and update the search services' databases.

search engines; spiders

the IF-THEN-ELSE structure is a logic structure for program design. It is also known as a _______ structure

selection

Midrange computers are computers with processing capabilities less powerful than a mainframe computer yet more powerful than a personal computer. They are normally referred to as ______

servers

Ch. 7 introduced five categories of secondary storage. They are introduced in the order of hard disks, _______ storage, optical storage, _____ storage, and mass storage

solid-state ; cloud

Programs used to secretly record and report an individual's activities on the Internet are called _______. An example of such programs is an adware software program that records a user's keystrokes on online advertisements and reports them to a research or ad firm.

spyware

Ch. 12 defines a ______ as a collection of activities and elements organized to accomplish a goal.

system

When you experience problems after installing a new program or changing system settings, the _____ utility can help by reversing the changes and bringing your computer to a previous point in time.

system restore

_____ - party cookies are used by advertising companies to keep track of your web activity as you move from one site to the next.

third

a ____ network, also known as a hierarchical network, is often used to share corporate-wide data

tree

Virtualization software is used to create one or more separate independent computers, each with its own operating system and we call each a _____

virtual machine

Amazon's Echo, Apple's HomePod, and Google's Home are examples of devices on the market that exclusively offer access to virtual assistants with ________

voice recognition

We know certain web authoring programs are WYSIWYG editors. Here WYSIWYG means ________

what you see is what you get

In Ch. 9, malware is categorized to three common types, including viruses, _____ and _______.

worms ; trojan horses

Which of the following statements is incorrect? A. Printer output is often called hard copy B. Printer speed is measured in words printed per minute C. memory within a printer is used to store printing instructions and documents waiting to be printed D. Printer resolution is measured in pixels

B, D

The category of operating system used for handheld devices. A. Network OS B. Embedded OS C. Stand-alone OS D. Open source OS

B. Embedded OS

Which of the following offers a combination of the features of RAM and ROM? A. DRAM B. Flash Memory C. Virtual Memory D. Cache Memory

B. Flash Memory

Every computer on the Internet has a unique numeric address called a(n) _______. A. DNS B. IP address C. broadcast D. packet

B. IP address

Which statement is incorrect? A. UNIX was originally designed to run on minicomputers in network environments. B. Linux can run on personal computers and minicomputers, but not mainframe computers. C. Linux is one of many different versions of UNIX. D. Due to different initial developers, UNIX operating systems contain two categories: System V and BSD.

B. Linux can run on personal computers and minicomputers, but not mainframe computers.

____ is a device that allows one LAN to be linked with other LANs or to a larger network A. IDS B. Network gateway C. PAN D. Switch

B. Network gateway

Which of the following is true about an internal hard disk? A. Volatile B. Often stores the OS C. Portable D. Slow

B. Often stores the OS

Regional managers can compare their regular sales reports with that of the other regional managers by using _______. A. Management reports B. periodic reports C. exception reports D. demand reports

B. Periodic reports

Which of the following is NOT a function of the operating system? A. Managing resources. B. Providing Internet access C. Providing a user interface D. Running applications

B. Providing internet access

These organize commonly used commands into a set of tabs. A. Buttons B. Ribbons C. Galleries D. Contextual tabs

B. Ribbons

_______ is a utility program included with Windows 10 that eliminates unused files and applications. A. Disk defragmenter B. Storage C. File history D. Disk cleanup

B. Storage

____ is the bandwidth typically used for DSL, cable, and satellite connections to the Internet A. baseband B. broadband C. medium band D. voiceband

B. broadband

Which of the following ports provide high-speed connections for external hard-disk drives, optical discs, and other large secondary storage devices? A. S/PDIF(Sony/Phillips Digital Interface) B. eSATA(External Serial Advanced Technology Attachment) C. mDP (Mini DisplayPort) D. HDMI (High Definition Multimedia Interface

B. eSATA

The two categories of laser printers discussed are _______ A. thermal and personal B. personal and shared C. ink-jet and high-definition D. active-matrix and passive matrix

B. personal and shared

Bus, ring, star, tree, and mesh are five types of network ______ A. protocols B. Topologies C. strategies D. devices

B. topologies

One way to improve the storage capacity of a hard disk is to_____ A. format often B. use file compression C. increase memory D. use disk caching

B. use file compression

_____ isa high-frequency transmission cable that delivers television signals as well as connects computers in a network. A. twisted-pair cable B. USB cable C. Coaxial cable D. Ethernet cable

C. Coaxial cable

This system is a flexible tool for data analysis, since its reports do not have a fixed format. A. Executive support system B. Transaction processing system C. Decision support system D. Management information system

C. Decision support system

This process improves system performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU. A. Data compression B. Data access C. Disk caching D. RAID

C. Disk caching

Ultra-high-definition television (UHDTV) A. are widely used in classroom and corporate boardrooms B. Project the images from a traditional monitor onto a screen or wall C. Is very useful to graphic artists, designers, and publishers because it can freeze video sequences to create high-quality still images, which can then be edited and stored for later use. D. Can be controlled by using a special pen, a finger, or some other device.

C. Is very useful to graphic artists, designers, and publishers because it can freeze video sequences to create high-quality still images, which can then be edited and stored for later use.

Most operating systems support the ability to switch between different applications. This is called _______. A. Translating B. Queuing C. Multitasking D. Booting

C. Multitasking

Sometimes ____ is referred to as a LAN adapter, these expansion cards connect a computer to a network A. VPN B. PCMCIA C. NIC D. server

C. NIC

General-purpose applications include all of the following except: A. Word processors B. Spreadsheets C. Web authoring D. database management systems

C. Web authoring

The speed at which a modem transmits data is called its _____ A. digital velocity B. modular rating C. transfer rate D. dynamic rate

C. transfer rate

BitDefender, Kaspersky, and Norton are examples of: A. Application Packages B. Operating systems C. utility suites D. device drivers

C. utility suites

Web auctions like eBay.com represents one of three basic types of electronic commerce, which is ____ commerce. On the other hand, Amazon.com is one of the most widely used ____ sites.

C2C (consumer to consumer); B2C (business to consumer)

______ is a type of memory that improves processing by acting as a temporary high-speed holding area between the memory and the CPU.

Cache

In a computer network, a node that requests and uses resources available from other nodes is generally called a

Client

There are two basic types of e-mail systems. Apple's Mail and Microsoft's Outlook are examples of _______ e-mail systems while Google's Gmail and Microsoft's Hotmail are examples of _______ e-mail systems

Client-based; Web-based

The basic components of cloud computing are ____, the Internet, and _____.

Clients; service providers

Users can use the Internet to connect anda ccess more powerful computers, software, and storage of other computers on the Internet rather than relying solely on their computers. This is what is called ______ computing.

Cloud

_______ Act is a law allowing prosecution of unauthorized access to computers and databases. Offenders can be sentenced up to 20 years in prison and fined up to $100,000.

Computer Fraud and Abuse

Which statement is correct? A. Mac OS X Mavericks is a newer release than Mac OS X Yosemite. B. Mac OS is designed to run on any computers. C. Cortana is a personal assistant software created by Apple for Mac OS. D. Mac OS X Mavericks is also known as Mac OS version 10.9

D. Mac OS X Mavericks is also known as Mac OS version 10.9

Which of the following statements is incorrect? A. Printer resolution is measured in dpi (dots per inch) B. Printer output is often called hard copy C. Memory within a printer is used to store printing instructions and documents waiting to be printed. D. Printer speed is measured in the number of words printed per minute

D. Printer speed is measured in the number of words printer per minute

What would be the most appropriate type of application to create, analyze, and forecast budgets? A. Word processor B. DBMS C. Presentation graphics D. Spreadsheet

D. Spreadsheet

Among various management in a typical business organization, who is responsible for operational matters and monitoring day-to-day events? A. Top management B. Middle management C. Stockholders D. Supervisors

D. Supervisors

This type of software works with end users, application software, and computer hardware to handle the majority of technical details. A. Communications B. Application C. Utility D. System

D. System

______ systems help supervisors by generating databases that act as the foundation for other information systems. A. Decision support B. Executive support C. Management information D. Transaction processing

D. Transaction processing

Which of the following is introduced in the book and widely used by retail stores to automate the processes to check out consumers, to change product prices, and maintain inventory records? A. MaxiCode B. EAN Code C. ITF barcode D. UPC

D. UPC

Solid state storage is like RAM because A. they are both an internal storage device B. they are volatile C. they are nonvolatile D. data can be updated

D. data can be updated

Storage that retains its data after the power is turned off is referred to as _______. A. volatile storage B. sequential storage C. direct storage D. nonvolatile storage

D. nonvolatile storage

Microsoft's Cortana and Apple's Siri are a good utilities example of A. Troubleshooting programs B. backup programs C. antivirus programs D. virtual assistants

D. virtual assistants

Typically, __________________________ is used to (1) control the number of devices that can access a given file and (2) limit the kinds of devices that can access a file. Corporations often use these technologies to prevent copyright violations.

DRM (digital rights management)

According to _________________________ Act, it is illegal to copy or download copyright-protected music and videos from the Internet without appropriate authorization. The act also establishes that copies of commercial programs may not be legally resold or given away. It further makes it a crime to sell or to use programs or devices that are used to illegally copy software.

Digital Millennium Copyright

A _______________ attack attempts to slow down or stop a computer system or network by flooding a computer or network with requests for information and data. These requests can come from a single computer issuing repeated requests.

DoS

_____ is defined as the study of human factors related to things people use. It is concerned with fitting the task to the user rather than forcing the user to contort to do the task.

Ergonomics

Which system presents information in a highly summarized form? A. Transaction processing systems (TPS) B. Management information systems (MIS) C. Decision support system (DSS) D. Executive support system (ESS)

Executive support system (ESS)

_____ systems, aka knowledge-based systems, are a type of artificial intelligence that uses a database to provide assistance to users. This database, known as a _____ base, contains facts and ____ to relate these facts distilled from a human expert.

Expert ; knowledge; rules

According to Ch. 7, both RAID and optical discs are not a mass storage device

False

Common names for computer-based information systems are transaction processing, management information, decision support, and security support systems.

False

DVDs use tracks, sectors, and cylinders to store and organize files

False

Dropbox.com is a popular web site which uses BitTorrent technology to distribute file transfers across many different computers for more efficient downloads.

False

Every app that is written for a particular type of mobile device can also run on other types of devices such as desktops or laptops but not the other way around.

False

Facebook is an example of cloud storage

False

Functions, formulas, charts, and what-if analysis are common features of database management systems (DBMS)

False

Group decision support systems (GDSS) is also a decision support system. So, there are three basic decision models used in GDSS: Operational, strategic, and financial

False

Illustration programs are specialized graphics programs for editing bitmap or raster images.

False

In a SAN system, the user's computer must provide the disk space for data and the SAN provides the file system for storing data

False

In case of an unanticipated union strike, the manager in charge of manufacturing might consult the management information system to determine how it will affect product schedules.

False

It is generally true, that the higher the dot pitch, the clearer the images produced.

False

Microsoft Word cannot be used to create personalized web pages.

False

Mobile operating systems, also known as mobile OS, are a special type of operating system for smartphones, tablets, and wearable computers. They are neither stand-alone operating systems nor embedded operating systems.

False

One reason that makes solid-state storage devices different from hard disks is solid-state storage devices normally have a higher capacity.

False

Optical scanners recognize individual letters or images

False

Printers that are widely used with ATMs and gasoline pumps to print receipts are examples of cloud printers

False

RFID (radio frequency identification) tags are tiny chips that can be embedded in consumer products, driver's licenses, passports, etc. Information stored in the chips can be read using a magnetic card reader.

False

Solid-state storage does not have any moving parts, is more reliable, and requires less power. It saves data and information electronically similar to RAM and it is also volatile like RAM.

False

The ALU tells the rest of the computer system how to carry out a program's instructions

False

The management information system records day-to-day transactions, such as customer orders, bills, inventory levels, and production output.

False

Virtualization allows a simple operating system to support multiple physical computers.

False

Apple's Mail and Microsoft's Outlook are Web-based email systems because they do not required and email program to be installed on your computer.

False (They are client-based)

External USB devices are connected from one to another or to a common point or hub and then onto the USB bus. Therefore, USB bus is also called system bus

False (USB bus is an expansion bus)

The number of bits that can travel simultaneously down a bus is known as word size.

False (bus width)

Some federal laws governing privacy matters have been created. For example, the _______________________ Act (FERPA) of 1974 is federal legislation in the United States that protects the privacy of students' personally identifiable information (PII). It restricts disclosure of educational records. The act applies to all educational institutions that receive federal funds.

Family Educational Rights and Privacy

Mass storage devices that support an enterprise storage system may include ____ servers, ____ attached storage, RAID systems, and organizational cloud storage

File ; network

Which type of memory offers a combination of the features of RAM and ROM?

Flash memory

Under the _______________________ Act, you are entitled to look at your personal records held by government agencies. The law also allows you to gain access to those records about you that are held by credit bureaus.

Freedom of Information

A ________ is a useful tool for system analysis. It shows the relationship between input and output documents.

Grid chart

A ___ occurs when a read-write head makes contact with the hard disk's surface or with particles on its surface.

Head crash

To touch up photographs to remove scratches and other imperfections of bitmap or rastor images, we should use ________

Image editors

A chip is also called a silicon chip, semiconductor, or _____

Integrated circuit

The basic components of cloud computing are clients, the _____, and service providers

Internet

It is easy to get the Internet and the web confused, but they are not the same thing. The _____ is the physical network while the ____ is a multimedia interface to the available online resources

Internet; Web

________ work with firewalls to protect and organization's network

Intrusion detection systems (IDS)

Systems analysis and design is a six-phase problem solving procedure for examining and improving an information systems. The six phases make up the systems _________.

Life cycle

Google's Chrome OS integrates with web servers to run applications and to perform other traditional operating system functions. However, this OS is developed based on another popular operating system, which is ________.

Linux

Banks use ____ as a reading device to automatically read the numbers on the bottom of checks and deposit slips. A. Optical-character recognition(OCR) B. Magnetic-ink character recognition (MICR) C. Optical-mark recognition (OMR) D. Radio frequency identification (RFID)

Magnetic ink character recognition (MICR)

Among various types of information systems defined in Ch. 10, Videoconferencing systems is a kind of ________ systems, while Oil Spill Advisor is a kind of ______ systems and an accounting system is a type of ______ systems.

Office automation ; expert ; transaction processing

________ feasibility is evaluated to determine if the proposed system can actually be made to operate in the organization.

Operational

Unlike most other expansion buses that share a single bus line or path with several devices, the ______ bus provides a single dedicated path for each connected device.

PCIe

___ is a socket for external devices to connect to the system unit.

Port

_____ is a type of memory that is volatile or loses its contents when power is turned off.

RAM

_________ Wi-Fi hotspot operates close to a legitimate free Wi-Fi hotspot and typically provide stronger signals that many users unsuspectingly connect to. Once a user is connected, it steals information such as username and password sent by the user to legitimate sites.

Rogue

_____ is a system board component that provides a connection point for specialized cards or circuit boards.

Slot

_____ programming techniques for program design consist of the following four: (1) top-down program design, (2) _________, (3) flowcharts, and (4) ______ structures.

Structured ; pseudocode ; logic

The programming language introduced in Ch. 13 that uses graphical user interface and special code for touchscreen interfaces to create apps for Apple iOS is called _______

Swift

A widely used Internet protocol that requires sending and receiving devices to be identified by an IP address

TCP/IP

E-ink produces images that reflect light like ordinary paper, making the display easy to read.

True

Google's Chrome OS is based on Linux.

True

Microsoft Office 365 is an example of cloud suite application software.

True

One characteristic of a computer monitor is, the lower the dot pitch and the higher a monitor's resolution, the clearer the images produced.

True

Web auctions is a typical example of Consumer-to-consumer (C2C) commerce

True

There are two types of UNIX operating systems. One is called BSD and the other is called System __.

V

Google Search and other search engines were created to provide links to websites containing specific words or phrases. They were created in the generation of

Web 1.0

Among the three web generations, Web 1.0, 2.0, and 3.0, Siri and Google Assistant are examples of _____ applications

Web 3.0

Assembly languages use _____ or mnemonics such as ADD that are automatically converted to the appropriate sequence of 1s and 0s

abbreviations

A popular development methodology called _____ development, starts by getting core functionality of a program working, then expands on it until the customer is satisfied with the result. All six steps are repeated over and over as quickly as possible to create incrementally more functional versions of the application.

agile

In addition to defining the problem and preparing a short report, another important aspect of the preliminary investigation phase is suggesting _______.

alternative solutions

Program specification is also called program definition or program ______. It requires that the programmer specify five items: (1) The program's objectives, (2) the desired _____, (3) the input data required, (4) the ________ requirements, and (5) the documentation

analysis ; output ; processing

Two special information systems introduced by Ch. 10 to support data and knowledge workers are office ______ systems and _____ work systems. Computer-aided design/computer aided manufacturing (CAD/CAM) systems belong to the _______ systems.

automation ; knowledge ; knowledge work

A ___________, or robot network is formed by a collection of many zombie computers distributed across the Internet, so they are hard to shut down even after they are detected. Unfortunately for individual computer owners, it also can be difficult to detect when a personal computer has been compromised.

botnet

Type of network topology in which each device is connected to a common cable called a backbone

bus

The four important characteristics of secondary storage are media, _____, storage devices and _______.

capacity ; access speed

Online office suites are a collection of separate application programs bundled together and stored at a server on the Internet and are available anywhere you can access the Internet. Popular applications include Google Docs, Zoho, Microsoft Office 365 and Office for iPad. These online office suites are also called ___________ suites.

cloud

Programming languages are called lower level when they are closer to the language the _______ itself uses. Programming languages are called higher level when they are closer to the language ______ use.

computer ; humans

Ch. 12 introduces CASE tools for system analysis and design. CASE stands for:

computer aided software engineering

The binary representation of (15)sub 10 is (__________)sub 2

1111

Hexadecimal system uses ______ digits

16

To download a complete full-length motion picture of 1.2GB using a 10mbps modem would take ____ minutes

16

A microprocessor whose processing speed or clock speed of is 2.5 GHz, then the length of each full clock cycle should be _________ picoseconds (i.e., 10-12 seconds).

400

If the processing speed or clock speed of a microprocessor is 2.5 GHz, then the length of each full clock cycle should be ______ picoseconds

400

The letter 'G' is encoded to be 010000111 in 8-bit ASCII, which is equivalent to the decimal representaiton of 71 base 10 or hexadeciman representation of ____ base 16 or octal representation of ____ base 8

47 base 16, 107 base 8

A. Illustration program B. Image editor Both Adobe Photoshop and CorelDRAW are specialized graphics application software, but CorelDRAW is an _____ while Adobe Photoshop is an ____

A ; B

Which of the following is a function of the operating system? A. Monitoring System performance B. Running applications C. Providing user interface D. Scheduling tasks

A,B,C,D

____ is a short-range radio communication standard that transmits data over short distances of up to approx. 33 feet A. Bluetooth B. Broadband C. DSL D. TCP/IP

A. Bluetooth

________ provide additional information and request user input A. Dialog Boxes B. Windows C. Toolbars D. Ribbons

A. Dialog boxes

This reading device is used in banks to read the numbers on the bottom of checks and deposit slips. A. MICR B. OCR C. OMR D. UPC

A. MICR

This type of flat-panel monitors use a thin layer of organic compound to produce light. A. OLED B. LED C. LCD D. PDP

A. OLED

Which is NOT the same type of software as Microsoft Excel? A. Corel Quattro Pro B. OpenOffice Impress C. Google Sheets D. Apple Numbers

A. OpenOffice Impress

This decision model helps middle-level managers control the work of the organization, such as financial planning and sales promotion planning. A. Tactical model B. Operational model C. Corporate model D. Strategic model

A. Tactical model

The concept related to using computer networks to link people and resources is called _____ A. connectivity B. GPS C. TCP/IP D. Wi-Fi

A. connectivity

Which of the following ports provide high-speed connections for external hard-disk drives, optical discs, and other large secondary storage devices? A. eSATA B. S/PDIF C. HDMI D. mDP

A. eSATA

Typically using Wi-Fi technology, these wireless access points are available from public places such as coffee shops, libraries, bookstores, colleges, and universities A. hotspots B. extranets C. PANs D. LANs

A. hotspots

There are two major kinds of software in Ch. 1: ______ software and ______ software

Application and System

_____ screens can be touched with more than one finger, which allows for interactions such as rotating graphical objects on the screen with your hand or zooming in and out by pinching and stretching your fingers.

Multitouch


संबंधित स्टडी सेट्स

Analysis - Basic Tax Rules: Economic Analysis

View Set

Pre - Algebra Elearning Assignment

View Set

Chapter 4 Fundamentals of Nursing

View Set

An Overview of Americans with Disabilities Act

View Set