Chapter 5: Operating Systems, 2223 MIS Intro to computers exam 2, Chapter 9, Introduction to Computers Final Exam, CIS Ch.7, MIS Chapter 1, MIS Test 4- know acronyms, Computers Module 12, module 11 quizzes, Module 9 and 10

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

You have been chosen to be a teaching assistant in your database course. The instructor asks you to prepare a presentation on Big Data. Data ______ is the process of presenting data graphically as charts, maps, or other pictorial formats.

visualization

skype and facetime are examples of "blank" services

voIP

Siri and Cortana are examples of ______ recognition apps.

voice

Four popular types of messages on smartphones

voice, text, picture, video

Which is not one of the three V's of the Big Data

volatility

Which of the following is NOT one of the three V's of Big Data.

volatility

A(n) ______ boot refers to the process of restarting a computer or mobile device while it remains powered on.

warm

if a program or app stops working, a ___ often is sufficient to restart the device because this process clears memory

warm boot

"blank" information can be proved as correct or incorrect

verifiable

_____ information can be proved as correct or incorrect.

verifiable

A "blank" machine enables you to install a second operating system on a computer

virtual

A(n) ______ machine enables you to install a second operating system on a computer.

virtual

In this kind of memory, the operating system allocates a portion of a storage medium, usually hard disk or a USB flash drive, to function as additional RAM. What kind of memory is this ?

virtual

Data _____ is the process of presenting data graphically as charts, maps, or other pictorial formats.

visualization

Data ______ is the process of presenting data graphically as charts, maps, or other pictorial formats.

visualization

Google Apps certified specialist

which tests a users's skills of administering, selling, and deploying Google Apps.

certified information systems security professional (CISSP)

which tests in-depth knowledge of access control methods, information systems development, operations security, and network and Internet security.

programmer/developer certifications

usually are supported with training programs that prepare applicants for the certification test.

detailed report

usually list just transactions.

disk cleanup utility

utility searches for and removes unnecessary files.

"blank" compares data with a set of rules or values to determine if the data meets certain criteria

validation

_____ compares data with a set of rules or values to determine if the data meets certain criteria.

validation

______ compares data with a set of rules or values to determine if the data meets certain criteria.

validation

Hardware certifications

vary in scope from a narrow focus with an emphasis on the repair of a specific device to an integrated hardware solution that addresses a company's current and future computing needs.

A+

which tests knowledge of computer setup, configuration, maintenance, troubleshooting, basic networking skills, and system software

Project Management Professional (PMP)

which tests knowledge of tasks required during system development.

Compressed files sometimes are called ______ files.

zipped

Network interface card (NIC)

An expansion card that enables a computer to connect other computers or to a cable modem to facilitate a high-speed Internet connection

OODB

An object-oriented database (OODB) stores data in objects.

Android

An open source, Linux-based mobile operating system designed by Google for smartphones and tablets.

What program is used to start and shut down a computer or mobile device, provide a user interface, manage programs and memory, and provide file management, among other functions?

An operating system

multitasking

An operating system that allows two or more programs or apps to reside in memory at the same time.

Web Developer

Analyzes, develops, and supports the functionality of a website, including applications that often interact with databases or other online resources

All are examples of desktop operating systems EXCEPT

Android

All of the following are examples of desktop operating systems EXCEPT ____

Android

You want an open source, Linux-based mobile operating system for a new smartphone your company is developing. Which of the following will you use?

Android

You want to purchase a server operating system for your small business. Which of the following is NOT an example of an operating system you can purchase?

Apple iOS

Boot Camp

Apple program that enables you to install Windows on an Apple computer.

Safari

Apple's browser.

iCloud

Apple's cloud server.

Macintosh operating system (MAC OS)

Apple's operating system.

You are learning java and C#. what type of job should you search for after graduating?

Application Programmer

Microsoft office specialist is a popular ___ ____ certification.

Application Software

Which of the following is unlikely to be tested during the startup process?

Application files

What is an application?

Applications are software programs, such as word processors, databases, spreadsheets, and games.

upward compatible

Applications that may not run on new versions of an operating system.

swap file

Area of the hard drive used for virtual memory.

Pictures of robots

Artificial intelligence (AI)

All of the following are top-level domains EXCEPT ________. a. .com b. .net c. .info d. .bus

.bus

Which of the following domains is restricted?

.edu

How many extended partition can you have on a hard drive?

1

T1 connections transmit data at this speed:

1.5 Mbps

Internet service providers (ISP)

A company that specializes in providing Internet access. ISPs may be specialized providers or companies that provide other services in addition to Internet access

desktop operating system

A complete operating system that works on desktops, laptops, and some tablets. Also called stand-alone operating system.

virus

A computer negatively by altering the way the computer works without the user's knowledge or permission.

UNIX

A multitasking operating system developed in the early 1970s by scientists at Bell Laboratories.

server operating system

A multiuser operating system that organizes and coordinates how multiple users access and share resources on a network.

What is the term for the area of the hard disk used for virtual memory?

A swap file

A(n) ______ system is a set of programs that coordinates all the activities among computer or mobile device hardware. a. Operating b. Management c. Application d. Network

A: Operating

CDs and DVDs are two types of ______ discs. a. Optical b. Solid-state c. Hard d. Flash

A: Optical

When a computer is running multiple programs concurrently, what is the program that is in the program that is in the foreground?

Active program

Which of the following best describes the term bloatware?

Additional hardware and apps installed by an OEM

bloatware

Additional programs and apps included with an operating system.

What is the default administrator account named?

Administrator

Who can establish standard user accounts that allow alterations to security settings?

Administrators

Web authoring software includes all of the following EXCEPT ________.

Adobe Acrobat

RSS-reading applications which periodically visit Web sites, examine the feeds, and display new content are known as ________.

Aggregators

What two things does an operating system provide to the user?

All computers rely on an OS to provide the interface for the interaction between users, applications, and hardware. The OS boots the computer and manages the file system.

certification exam sponsers, such as "blank" provide ways for you to prepare for exams, register, and pay for exams, and more

(ISC)^2

with this type of technology if you have your phone set as payment on the chip and you swipe your phone against the new type of terminals, it will process your payment. What is this technology called?

(NFC) Near Field Communication

Laptop

(Notebook Computer) thin, lightweight mobile computer that operate on batteries or power supply

If one attempts to send a message to an email address which does not exist, it will return to you, or ________.

Bounce

Which of the following is NOT true about CAPTCHAs?

CAPTCHAs were developed to verify input is coming from computers and not humans.

Live CD

CD that can be used to start the computer.

What is the most common installation method for an operating system?

CD's and DVDs

A customer asks about differences between CD formats. You tell her that a _________ is an erasable multisession disc users can write on multiple times

CD-RW

Differences in CD formats. You tell her that ____ is an erasable multisession disc users can write on multiple times.

CD-RW

The World Wide Web is a distributed browsing and searching system originally developed at ________.

CERN

Which type of system enables and manages the publishing, modification, and access of various forms of documents and other files on a network or on the web?

CMS

An ____ ____ integrates apps and data related to customer inquiries, purchases, support requests, and behaviors

CRM Specialist

Internet connections that work through the same network of coaxial cables that deliver television signals work through a ________ modem.

Cable

Twisted-pair cables

Cables made of copper wires that are twisted around each other and are surrounded by a plastic jacket (such as traditional home phone wire)

What must be done before beginning the OS system upgrade?

Check minimum hardware requirements Backup data

You are using a Linux-based operating system designed by Google to work primarily with web apps. What is it called?

Chrome OS

_____ is a Linux-based operating system designed to work primarily with web apps.

Chrome OS

Which of the following is NOT an example of a server operating system?

Chrome server

A specialized laptop that runs Chrome OS is called a Chromebook, and a specialized desktop that runs Chrome OS is called a __.

Chromebox

Which of the following statements is not true about operating systems designed to work with a server on a network?

Client computers cannot function unless they are connected to the network because they cannot access an operating system

Which of the following is NOT true about client/server networks?

Client/server networks do not typically require a network administration.

Which of the following is NOT true about client/server networks?

Client/server networks do not typically require a network administrator.

who is Larry Ellison

Co-founder and CEO of Oracle Corporation

You have a hardware problem and want to detect and check connected hardware devices. Which of the following are you most likely recommended to use?

Cold boot

Digital Forensics Examiner

Collects and analyzes evidence found on computers, networks, mobile devices, and databases

Web Analytics Expert

Collects and measures Internet data, such as website traffic patterns and advertising, and develops reports that recommend strategies to maximize an organization;s web presence.

Two types of operating system user interfaces are graphical and ____.

Command Line

What are the two types of user interface?

Command-line interface (CLI) Graphical user interface (GUI)

Which of the following is another term for transmission media?

Communications channel

The majority of computer crimes are committed by

Company Employees

mobile device management (MDM)

Company policy that outlines and educates employees about safe mobile device use.

zipped files

Compressed files, When you receive or download a compressed file, you must uncompress it.

________ is defined as any crime completed through the use of computer technology.

Computer Crime

sleep mode

Computer power option that saves any open documents and running programs or apps to RAM, turns off all unneeded functions, and then places the computer in a low-power state.

hibernate mode

Computer power option that saves any open documents and running programs or apps to an internal hard drive before removing power from the computer or device.

Which of the following creates logs, documentation, and recovery plans based on cybersecurity threats and incidents?

Computer security incident responder

Which of the following is responsible for installing hardware and servers and troubleshooting hardware problems?

Computer technician

Which of the following is responsible for installing hardware and servers and troubleshooting hardware problems?

Computer technincian

PC

Computer that can perform all of its input, processing, output, and storage activities by itself and is intended to be used by one person at a time.

Wi-Fi

Computers and devices that have the appropriate wireless capability can communicate via radio waves with other computers or devices using Wi-Fi, which identifies any network based on 802.11 standards. Developed by IEEE, 802.11 is a series of network standards that specifies how two wireless devices communicate over the air with each other.

One of the jobs available at your current company is for a network security administrator. What skill will you need to have to apply for the job?

Configure routers and firewalls

While working as an assistant in an IT department, you have been taking classes in information and systems security. You meet with a career counselor to discuss potential jobs. One of the jobs available at your current company is for a network security administrator. What skill will you need to have to apply for the job?

Configure routers and firewalls

Network Security Administrator

Configures routers and firewalls; specifies web protocols and enterprise technologies

Piggybackers are those who ________.

Connect to a wireless network without the owner's permission

Mobile broadband

Connection to the Internet through the same cellular network that cell phones use to get 3G or 4G Internet access.

The _____ is the component of the processor that directs and coordinates most of the operations in the computer.

Control Unit

VoIP

Conversations takes place over internet using telephone connected to a computer, mobile device, or other device

Desktop or Mobile Application Programmer

Converts the system design into the appropriate application development language

In the Web address www.bbc.co.uk, "uk" is a(n) ________.

Country Code

Which of the following is NOT one of the three general guidelines for system development?

Creat documentation

To share files between computers on a Windows home network, you must

Create a HomeGroup

Which of the following is NOT one of the three general guidelines for system development?

Create documentation

Computer Security Incident Responder

Creates, logs, documentation, and recovery plans based on cyber security threats and incidents

an _____ ____ ____ (___) helps users analyze information and make decisions

Decision Support System (DSS)

______ refers to the process of translating instructions into signals the computer can execute.

Decoding

During which phase of system development would you acquire any necessary hardware and software?

Design

Virtual Reality Engineer

Designs applications that incorporate technoliges with tools to create storytelling tolls and apps

Game Designer

Designs games and translates designs into a program or app using an appropriate development language

Web Designer

Designs the layout, navigation, and overall a of a website with a focus on user experience; specifies a website's appearance using HTML5, JavaScript, CSS, media, and other web design functions.

client operating systems

Desktop operating systems that work in conjunction with a server operating system.

Which of the following MIS reports usually lists just transactions?

Detailed

What is the difference between a directory and a sub directory?

Directories can be kept inside other directories. These nested directories are referred to as subdirectories.

Internet/Social Media Marketing Specialist

Directs and implements an organization's use of Internet and social media marketing.

You want to remove unnecessary files from your computer. What do you use?

Disk Cleanup

Information from the Internet to the subscriber, called ________ traffic, sometimes approaches speeds similar to a T1.

Downstream

Google Drive

Drive that provides access to email, contacts, calendar, photos, files, and more.

To prevent unauthorized users from reading data as it travels over a network, what process should the administrator specify?

Encryption

___ is the process of encoding data and information into an unreadable form.

Encryption

Social _____ is defined as gaining unauthorized access to or obtaining confidential info by taking advantage of another person.

Engineering

What type of user is most likely to use spreadsheets?

Enterprise User

VM (virtual machine)

Environment on a computer in which you can install and run an operating system and programs.

virtual machine (VM)

Environment on a computer in which you can install and run an operating system and programs.

A _____ keyboard has a design that reduces the chance of RSIs?

Ergonomic

bug

Error in a program.

In the 1970s, Xerox developed ________, which continues to be a popular networking architecture.

Ethernet

______ is currently the most popular network standard for LANs.

Ethernet

Robert Metcalfe

Ethernet Inventor

A Web server receives incoming mail, stores it, and provides it to the email client program when requested.

FALSE

A public key is only available to the user originating a message.

FALSE

An autonomous system can assume almost complete responsibility for a task and minimizes risk because of its absolute reliability.

FALSE

Bill Gates was the original developer of the World Wide Web.

FALSE

Computer forensics is a form of computer crime.

FALSE

Each unique Internet addresses had an applet.

FALSE

The Google Apps Certified Specialist certification tests a user's ability to use the Google Docs web applications.

FALSE

The Web was built with push technology.

FALSE

The latest version of the Internet Protocol is IPv9.

FALSE

When the term "hacker" came to be in the sixties, it was meant for evil programmers.

FALSE

What transfers items to and from other computers?

FTP

An SFA information system is used in product development.

False

An ink jet printer is a type of impact printer.

False

An object data type is used for a document or image that is attached to the field, which can be opened in the program that created the document or image, T/F?

False

Apps designed for a specific mobile platform or device generally will work on another without significant modification.

False

Because they are assigned randomly, you cannot use an IP address to determine a computer or devices location.

False

Coaxial cable is capable of carrying significantly more signals than fiber optic cables.

False

Continuous backup is inexpensive because the data is constantly being backed up, T/F?

False

Continuous backup is inexpensive because the data is constantly being backed up.

False

Contributors to wiki typically do not need to register before they can edit or comment.

False

Each processor core on a multi-core processor generally runs faster than a single core.

False

Educational requirements for help desk specialists are more stringent than they are for other careers in the technology field.

False

Eight bytes grouped together form a bit, T/F?

False

Eight bytes grouped together form a bit.

False

Experts recommend that you run multiple antivirus programs simultaneously.

False

FIP addresses concerns regarding security of information protocols, T/F?

False

File processing systems require more memory and processing power than databases.

False

Freeware has no copyright restrictions.

False

Freeware has no copyright restrictions?

False

HTML is a programming language

False

HTML is a programming language, T/F?

False

If using a webcam, keep is connected to the computer when not in use so that you can control access to it.

False

If your computer requires that you install memory in pairs, it doesn't matter if the two memory modules are the same type, size, or speed.

False

Intentionally erasing software is not an example of software theft.

False

Items stored in RAM remain intact even when you turn off a computer or mobile device.

False

Many people initially used the term, data processing, to refer to the functions of a DMS.

False

Most information gains value with time.

False

Operating systems on embedded computer use a multitasking operating system.

False

Programs that can perform maintenance type tasks are called operating systems?

False

Programs that enable you to perform maintenance-type tasks are called operating systems.

False

SSDs typically have high storage capacity than hard disks.

False

Software registration typically is required.

False

Streaming media uses a small amount of data?

False

Streaming media uses only small amounts of data.

False

T/F 4G is the latest WiFi standard.

False

T/F Actual data throughput is usually higher on wireless networks than on wired networks.

False

T/F Data is sent through the network in bundles called packages.

False

The Google Apps Certified Specialist certification tests a user's ability to use the Google Docs web applications.

False

The Internet is a service of the World Wide Web

False

The higher the number, the faster the response time.

False

The power supply coverts the wall outlet DC power into AC power.

False

The voice command "OK, Google" will activate your device's search engine.

False

To cut selected text on a Windows computer, press COMMAND+X

False

To cut selected text on a Windows computer, press COMMAND+X.

False

Users of website authoring software must have advanced HTML skills.

False

Viruses, worms, and Trojan horses replicate themselves to other computers or devices.

False

When you use a credit card to purchase an item, you are interacting with a CMS.

False

With P2P file sharing, when a user signs out of the network, other users can still access the user's hard drive.

False

With a direct conversion, only one location in the organization uses the new system, so that it can be tested, T/F?

False

With a direct conversion, only one location in the organization uses the new system, so that it can be tested.

False

You should run multiple antivirus programs on your computer or mobile device.

False

You should use a humorous name for your account profiles to ensure that you stand out to potential employers.

False

An IT ______, usually hired based on experience, provides technology services to his or her clients.

consultant

Large enterprises often hire teams of _____ to offer advice about technology-related concerns.

consultants

What is not a basic function of computer?

Producing Input

What best describes a root kit?

Program that is easily hidden and will allow someone to take full control of your computer

What best describes an app?

Program that makes users more productive

foreground

Program with which the user currently is interacting.

background

Programs that are running, but not in use.

To plan and schedule events you should use what type of software?

Project Managmemt

Productivity suites don't include?

Project Managmet

A piece of software you use is privately owned and limited to a specific vendor. What is the term for this kind of software?

Proprietary

iOS

Proprietary mobile operating system specifically made for Apple's mobile devices.

The first part of a URL refers to the ________ that must be used to access information, for example http.

Protocol

WEP and WPA are examples of ________.

Protocols that use encryption to protect wireless transmissions

What best describes open source software?

Provided for use, modification, and redistribution

COGNITIVE ASSESSMENT Q: Which of the following best describes open source software?

Provided for use, modification, and redistribution.

"blank" consists of one or more chips on the motherboard that hold items such as data and instructions while processor interprets and executes them

RAM

Which of the following consists of one or more chips on the motherboard that hold items such as data and instructions while the processor interprets and executes them?

RAM

The "blank" are adding palm prints to its fingerprint database

RCMP (Royal Canadian Mounted Police)

firmware

ROM chips that contain permanently written data, instructions, or information.

You have been developing an embedded operating system for a new product at your company, but a colleague of yours has been referring to it by another name. What is that name?

RTOS

When radio or TV broadcasts are streaming at the same time they are happening, it is called

Real-Time

From the ground, a GPS ________ interacts with signals from a satellite to determine its position.

Reciever

What can you use if the computer cannot start from its boot disk?

Recovery media

What are registry?

Registers are storage areas used by the CPU when performing calculations.

boot disk

Removable media, such as a CD or USB flash drive, that contains only the necessary operating system files required to start the computer.

What is not recommended to protect your computer?

Remove firewall hardware and software

Which of the following best describes disk defragmentation?

Reorganizing the hard disk so that files are stored in contiguous sectors.

What best describes disk defragmentation?

Reorganzing file

a _____ ____ replaces a laptop hard drive.

Repair technician

Computer Security Specialist

Responsible for the security of data and information stored on computers and mobile devices within an organization

Which browser is included with the Mac OS

Safari

What does the hibernate mode option do?

Saves any open documents and programs to a hard drive before removing power form the computer or device

Which file and disk management tool attempts to locate a file on your computer or mobile device based on specified criteria?

Search

Software programs that close potential security breaches in an operating system or application are known as

Security Patches

buffer

Segment of memory or storage in which items are placed while waiting to be transferred from an input device or to an output device.

What delivers requested webpages to your computer?

Server

Many software makers provide free downloadable updates, sometimes called a _____.

Service pack

Which of the following do software makers provide to users who have registered and/or activated their software

Service pack

permissions

Settings used to define who can access certain resources and when they can access those resources.

file compression

Shrink the size of a file(s).

Embedded computers and some mobile devices often use which of the following kinds of operating system?

Single user/single tasking

Which of the following kinds of operating systems allow only one user to run one program or app at a time?

Single user/single tasking

When a business can legally copy software to all of the computers they own, the company has a ________ license.

Site

The field _____ defines the max number of characters a field can contain.

Size

Thieves can use what to capture number on ATM?

Skimmer

What does Microsoft produce and sell with computers and mobile devices?

Software

What is a collection of related instructions?

Software

open source software

Software provided for use, modification, and redistribution and has no restrictions from the copyright holder regarding modification of the software's internal instructions and its redistribution.

Network operating system (NOS)

Software that handles requests for information, Internet access, and the use of peripherals for the rest of the network node, providing the services necessary for the computers on the network to communicate

proprietary software

Software that is privately owned and limited to a specific vendor or computer or device model.

Which of the following is NOT an activity in the implementation phase?

Solicit vendor proposals

What is recommended to avoid malware infections?

Some ads saying they offer protection will install more malware

Which of the following is NOT true about web application development?

Some computers and mobile devices do not support HTML5 but instead rely on Flash.

User

Someone who interacts with a computer or mobile device

Microsoft Office ______ is the certification that tests a user's skills of Microsoft Office programs.

Specialist

Database Designer

Specifies the structure, interface, and requirements of a large scale database; determines security and permissions for users

Program and App Developer

Specifies, designs, implements, tests, and documents programs and apps in a variety of fields, including robotics, operating systems, animation, and applications.

Placing a phone call pretending to be someone else, in order to trick someone into doing something is also known as

Spoofing

Which of the following is an example of social engineering?

Spoofing

The ____ process sends documents to be printed into a buffer instead of sending them immediately to the printer.

Spooling

Which of the following allows a computer or mobile device's processor to continue interpreting and executing instructions while a printer prints?

Spooling

What is the name of an application program that gathers user information and sends it to someone through the Internet?

Spybot

Windows Phone Store

Store that provides access to additional Windows apps and software updates.

iTunes Store

Store that provides access to music, books, podcasts, ringtones, and movies.

Which of the following MIS reports usually includes tables and graphs?

Summary

which MIS reports usually includes tables and graphs?

Summary

As it pertains to drives, which of the following best defines the purpose of a controller?

Support traffic on a small home network.

Which of the following is an alternative to a password you can use on your new mobile device?

Swiping areas of the screen in a specified order

When you match files in two or more locations you?

Sync

The notherboard is sometimes called a ____ board.

System

Firmware

System software that controls hardware devices

Which of the following is responsible for designing and developing information systems?

Systems analyst

Which of the following is responsible for installing and maintaining operating system software?

Systems programmer

"Cracker" is the correct term for the term "hacker" we use today.

TRUE

A DSL connection can share signals with a telephone line.

TRUE

A content-management system allows users to edit Web sites without having to deal with HTML and FTP.

TRUE

Adobe Reader and Adobe Acrobat display PDF documents. a. True b. False

TRUE

All e-mail addresses consist of a user name, followed by the @ sign, followed by a host address.

TRUE

Bandwidth is measured in bits.

TRUE

Bloggers use CMSs to post to their blogs and provide categories to posts.

TRUE

Bluetooth technology can reach a range of 10 meters.

TRUE

CISSP is an example of a security certification.

TRUE

Combining other people's works in to one Web page is known as a podcast.

TRUE

Diagnostic software included with a computer or device assists technicians in identifying problems.

TRUE

Experts debate whether Internet addiction is a true addiction or simply a compulsion.

TRUE

Information can be recovered from a hard drive even after file have been deleted.

TRUE

Net neutrality is the principle that Internet access should be free from restrictions related to the type of communication taking place on it.

TRUE

Smart cards and biometrics are two ways companies may add physical security to computer systems.

TRUE

The Digital Millennium Act of 1998 allows users copying music CD content for personal use, but not DVD content.

TRUE

The Telecommunications Act of 1996 prohibits employers from listening to their employees' phone conversations.

TRUE

The backbone of the Internet is made up of physical connections between specific locations?

TRUE

The digital divide separates people in the world with access to technology and digital information from those who do not.

TRUE

The most common form of computer crime is theft. a. True b. False

TRUE

The most widely used data recovery technique is making regular backups.

TRUE

You can use LinkedIn to follow companies to stay informed of their job opportunities.

TRUE

In some database programs, a data file is referred to as a _____.

Table

____ output provides the user with a physical response from the input device.

Tactile

What controls almost all functions on a computer?

The Operating System

The student asks you to explain speed of storage devices and memory. You tell her that all of the following are true, EXCEPT:

The access time of memory is slow compared with that of storage devices.

Backwards compatibility

The accommodation of current devices being able to use previously issued software standards in addition to the current standards

What is the benefit of 64 bit architecture?

The additional registers allow the CPU to process instructions much faster than x86. The x64 processer is backward compatible with the x86 processor.

page

The amount of data and program instructions that can swap at a given time.

bandwidth

The amount of data, instructions, and information that can travel over a communications channel

Which of the following is NOT true about system units?

The case on the smartphone often is in front of the display

Term, traffic refers to what talking about the internet?

The communications activity on the internet

Explain multi tasking.

The computer is capable of operating multiple applications at the same time.

Which of the following is least likely to happen if problems are identified during startup?

The computer or device may restore itself to its default settings

fiber-optic cable

The core of a "this" cable consists of dozens or hundreds of thin strands of glass or plastic that use light to transmit signals.

kernel

The core of an operating system that manages memory and devices, maintains the internal clock, runs programs, and assigns the resources, such as devices, programs, apps, data, and information.

Network architecture

The design of a computer network; includes both physical and logical design

boot drive

The drive from which your personal computer starts.

What does the file system provide?

The file system provides the directory structure that organizes the user's operating system, application, configuration, and data files.

Internet of Things (IoT)

The interconnection of uniquely identifiable embedded computing devices that transfer data over a network without requiring human-to-human or human-to-computer intersection

What is the core of an operating system that manages memory and devices, maintains the internal clock, starts programs, and assigns the computer's resources?

The kernel

4G

The latest mobile communication standard with faster data transfer rates than 3G

Data transfer rate (also called bandwidth)

The maximum speed at with data can be transmitted between two nodes on a network; usually measured in megabits per second (Mbps)

Gigabit Ethernet

The most commonly used wired Ethernet standard deployed for home networks; provides bandwidth of up to 1 Gbps

Unshielded twisted-pair (UTP) cable

The most popular transmission media option for Ethernet networks. UTP cable is composed of 4 pairs of wires that are twisted around each other to reduce electrical interference

What is multi processing?

The operating system can support two or more CPUs.

What happens if your computer or mobile device uses up its available RAM?

The operating system may use virtual memory.

Which of the following is NOT true about network security?

The operating system on a network does not record unsuccessful sign-in attempts.

mobile operating system

The operating system on mobile devices and many consumer electronics.

What happens when the computer is thrashing?

The operating system spends too much of its time paging, instead of executing application software.

What is meant by the term Plug and Play?

The operating system that automatically configures new devices as you install or connect them

network administrator

The person overseeing network operations.

What is the first step in the startup process of a computer?

The power supply or battery sends an electrical current to circuitry in the computer or mobile device

virtualization

The practice of sharing or pooling computing resources, such as servers and storage devices.

Piggybacking

The process of connecting to a wireless network without the permission of the owner of the network

encryption

The process of converting data that is readable by humans into encoded characters to prevent unauthorized access.

warm boot

The process of restarting a computer or mobile device while it remains powered on.

spooling

The process of sending documents to be printed to a buffer instead of sending them immediately to the printer.

cold boot

The process of starting a computer or mobile device from a state when it is powered off completely.

booting

The process of starting or restarting a computer or mobile device.

Which of the following is NOT true about motherboards?

The processor and memory are built into the motherboard.

Transmission media

The radio waves or the physical system (cable) that transports data on a network

What occurs during a hard crash?

The read/write touches the surface of a platter

What is an EULA?

The right to use a program or app.

Describe B2C e- commerce?

The sale of goods and services to the general public.

command language

The set of commands used to control actions in a command-line interface.

Which of the following best describes paging?

The technique of swapping items between memory and storage

How does the user account differ from the computer administrator?

The user account has fewer permission sets

What are the two distinct types of Operating Systems?

There are two distinct types of operating systems: desktop and network.

Which of the following is NOT true about command-line interfaces?

They give you less control to manage detailed settings than a GUI.

Which of the following is NOT true about command-line interfaces?

They give you less control to manage detailed...

Where is the primary partition?

This primary partition containing the operating system files is usually the first partition.

Why do you format a drive?

This process prepares a file system in a partition for files to be stored.

____ info is useful only within a specific time period.

Timely

______ information is useful only within a specific time period.

Timely

What is a device driver?

To access and communicate with each hardware component, the OS uses a program called a device driver.

sign in

To access resources on a network or computer.

For what purpose would a company use an extranet?

To allow customers or suppliers to access part of its intranet

For what purpose would a company use an extranet?

To allow customers or suppliers to access part of its intranet.

Purpose of a TLD?

To identify the type of organization associated with a domain name

What must you do before making an operating system recommendation?

To make an OS recommendation, a technician must review budget constraints, learn how the computer will be used, and determine which types of applications will be installed.

Why would you want to disable SSID broadband?

To make it more difficult for hackers to detect your network and nearly impossible for a neighbor to connect to your netowrk

What is the purpose of memory management?

To optimize the use of RAm

What is the first phase of the installation process?

To partition an format the hard drive

what is the purpose of ANSI and IEEE?

To propose, develop, and approve network standards

COGNITIVE ASSESSMENT Q: Which of the following is NOT true about PDFs?

To read a PDF, you need the software that created the original document.

For which of the following purposes would a business use EDI?

To send bids and proposal

Which of the following best describes the function of a primary key?

To uniquely identify each record in a file

Why should you register your copy of Windows?

To verify you are not getting an illegal copy

disk cleanup

Tool that searches for and removes unnecessary files.

recovery media

Tool that uses logs and/or backups, and either a rollforward or a rollback technique, to restore a database when it becomes damaged or destroyed.

What is the major light principle fiberoptic cables are based on?

Total Reflection

A ____ can act as an electronic switch that opens or closes the circuits for electrical charges.

Transistor

App you can use for a limited time for no charge?

Trial

Supercomputers capable of processing what in a single second?

Trillions

99. Unusually high drive activity or a slower than normal internet activity are signs that your computer or mobile device may be a zombie.

True

A BAN is a type of PAN that wirelessly connects sensors worn by, carried by, or attached to a human body.

True

A DBMS uses the data dictionary to perform validation checks, T/F?

True

A DBMS uses the data dictionary to perform validation checks.

True

A byte provides enough different combinations of 0s and 1s to represent 256 different characters.

True

A cloud app makes use of software and data that are not stored on your computer or mobile device.

True

A cloud app makes use of software and data that are not stored on your computer?

True

A composite key consists on multiple fields, T/F?

True

A composite key consists on multiple fields.

True

A consistency check tests the data in two or more associated fields to ensure that the relationship is logical and that the data is in the correct format, T/F?

True

A consistency check tests the data in two or more associated fields to ensure that the relationship is logical and that the data is in the correct format.

True

A performance monitor is a program that assesses and reports information about various computer resources and devices.

True

A power management tool monitors a laptop or mobile device's battery usage.

True

A text editor is used to type information when it does not need to be formatted with fonts or other styles.

True

Agile development guidelines emphasize adaptation of goals and continuous improvement of the software or app, T/F?

True

Agile development guidelines emphasize adaptation of goals and continuous improvement of the software or app.

True

Because the user accesses files on cloud storage through a browser using an app from the storage provider, the actual media on which the files are stored are transparent to the user.

True

Because they are compressed, you usually cannot use backup files in their backed up form.

True

CISSP is an example of a security certification.

True

Cambria and Calibri are examples of font styles.

True

Census records, stock values, and corporate sales data is structured, T/F?

True

Chassis is another term for system unit.

True

Cloud Computing uses server virtualization?

True

Common digital security risks include information theft and system failure.

True

Database software is another term for a DBMS, T/F?

True

Database software is another term for a DBMS.

True

Diagnostic software included with a computer or device assists technicians in identifying problems.

True

Dice and Monster are examples of career planning websites and apps.

True

Drivers using hands free technology are distracted.

True

Employers can use firewall to restrict employees access to sensitive data.

True

Engineers and game designers are power users

True

Expert systems are a component of artificial intelligence.

True

Human resources is an example of a functional unit.

True

IBM, Microsoft, Novell, Red Hat, and Sun offer certifications that test knowledge of their operating systems.

True

In a typical file processing system, each department or area within an organization has its own set of files, T/F?

True

In a typical file processing system, each department or area within an organization has its own set of files.

True

In some cases, the operating system for the network is a set of programs that are separate from the operating system on the client computers or mobile devices that access the network.

True

Inference rules are a set of logical judgments that are applied to the knowledge base each time a user describes a situation to the expert system.

True

Information systems support daily, short-term, and long range info requirements of users in company.

True

Information systems support daily, short-term, and long-range information requirements of users in a company.

True

Many email applications include calendar and contact management features.

True

Many handheld computers are industry specific?

True

Many routers also can function as a hardware firewall.

True

Media players often allow you to burn audio CDs.

True

Megan's Law refers to a group of U.S. laws that require law enforcement agencies to share information in a national database about criminals who commit unlawful acts on children, T/F?

True

Megan's Law refers to a group of U.S. laws that require law enforcement agencies to share information in a national database about criminals who commit unlawful acts on children.

True

Mobile payment providers state that the use of their payment apps are more secure than using a credit card?

True

Mobile payment providers state that the use of their payment apps is more secure than using a credit card.

True

Mobile web apps are actually websites that provide a user experience similar to native apps.

True

Monitoring system performance is a part of the support and security phase, T/F?

True

Monitoring system performance is a part of the support and security phase.

True

Most TPSs use OLTP because users need info immediately.

True

Most TPSs use OLTP because users need information immediately.

True

Most magstripe readers are separate devices that communicate with a POS terminal.

True

NFC is a technology that uses close-range radio signals to transmit data between devices or a device and a tag.

True

Once data is in memory, a computer or mobile device interprets and executes instructions to process the data into information.

True

One advantage of ERP is complete integration of information systems across departments.

True

Outsourcing is when an enterprise offloads storage management to an outside organization.

True

People suffering from technology overload feel distressed when deprived of mobile devices

True

Routers along the Internet backbone forward data packets to their destination using the fastest available path.

True

Smartphones can function as a portable media player?

True

Smart digital camera

contains apps and can communicate wirelessly, so you can share, modify, and print images... many have gps that store location information in with the photo

data dictionary

contains data about each file in the database and each field within those files.

____ ___ _____ enables and manages the publishing, modification, organization and access of various forms of documents and other files.

content management system

Adjusting the ______ adjusts the difference in appearance between light and dark areas of the photo.

contrast

Which two components work together to perform processing operations?

control unit and ALU

user interface

controls how you enter data and instructions and how information is displayed on the screen.

T/F 802.11ac is the current wireless Ethernet standard.

True

User interface

controls how you enter data/instructions and how information is displayed on the screen

Computer aided manufacturing (CAM)

controls production equipment, such as drills, lathes, and milling machines.

The computer may run slower while it uses virtual memory.

True

The purpose of ___ and ___ is to provide a central point for cables in a network.

Hubs and switches

An ___ ___ combines features of native and mobile web apps.

Hybrid App (might be T/F on test)

Which of the following is NOT a true statement about IPv6?

IPv6 is supported on all machines

the help desk position is an ideal entryway into the ___ field

IT (Information Technology)

____ are hired bases on expertise and provides technology services to his or her clients

IT consultants

cloud architect

Identifies business requirements, strategies, and solutions for cloud storage and services that meet a company's goals or needs.

Which of the following is TRUE about Bluetooth?

If a device has Bluetooth capability, using Bluetooth technology is free.

What is NOT true about QR codes?

If the QR code directs you to a website displaying a form, enter your personal information to ensure your safety

Which of the following is NOT true about QR codes?

If the QR code directs you to a website displaying a form, enter your personal information to ensure your safety.

During which phase of system development would you develop any necessary programs and apps?

Implementation

Security Analyst

Implements security procedures and methods, looks for flaws in security of a company's devices and networks, works with and trains employees at all levels, and assigns permissions and network settings

The goal of project management is to deliver an acceptable system to the user in an agreed-upon time frame, while maintaining costs, T/F?

True

The goal of project management is to deliver an acceptable system to the user in an agreed-upon time frame, while maintaining costs.

True

The laws against plagiarism are the same whether copying content from a respected news source, a personal blog, or social media

True

The laws against plagiarism are the same whether copying content from a respected news source, a personal blog, or social media.

True

The operating system serves as an interface?

True

The operating system serves as the interface between the user, applications, and hardware.

True

The process in which two or more computers or devices transfer data, instructions, and information is known as digital communications.

True

The program specification package identifies required programs and the relationship among each program, as well as the input, output, and database specifications, T/F?

True

The program specification package identifies required programs and the relationship among each program, as well as the input, output, and database specifications.

True

The start up process is similar for large and small computers and mobile devices.

True

To assist with sound decision making, information must have value.

True

Unlike a form, you use a report writer only to retrieve data, T/F?

True

Unlike a form, you use a report writer only to retrieve data.

True

Uses of RFID include tracking times of runners in a marathon and checking out library books.

True

Video editing software typically includes audio editing capabilities.

True

When a user runs an application, its instructions transfer from a storage device to memory.

True

When an organization uses the database approach, many programs and users share the data in the database, T/F?

True

When an organization uses the database approach, many programs and users share the data in the database.

True

When you install an app on one computer or device, it will install automatically on any other computers and devices on the same subscription plan.

True

With the database approach, the data is independent of the programs that access the data, T/F?

True

With the database approach, the data is independent of the programs that access the data.

True

You can use LinkedIn to follow companies to stay informed of their job opportunities.

True

You can use legal software to prepare a will.

True

You should use a database and not a spreadsheet if you want to create reports from data?

True

You should use a database rather than a spreadsheet if you want to collect, reorganize and filter data, and/or create reports from the data.

True

Network

Two or more computers that are connected via software and hardware so they can communicate with each other

What is meant by multi user?

Two or more users have individual accounts that allow them to work with programs and peripheral devices at the same time.

According to the FBI, how much identity theft begins with email? a. all b. one-half c. one-quarter d. two-thirds

Two-thirds 2/3

administrator account

Type of account typically held by computer owners or network administrators that enables them to access all files and programs, install programs, and specify settings that affect all users on a computer, mobile device, or network.

Power users often work with ______ because of its flexibility and capabilities.

UNIX

Which of the following is a multitasking operating system developed in early 1970s by scientists at Bell Laboratories?

UNIX

___ is a multitasking operating system developed in the early 1970s by scientists at Bell laboratories

UNIX

To prevent loss of data during power failures, use a(n)

UPS

The .gov domain might be used by ________.

US Senate

Thumb drive is another term for what?

USB flash drive

Live USB

USB flash drive that can be used to start the computer.

because of its high transfer rates, "blank" is best suited for transmission of large files

UWB

You want to remove a program from your computer. What do you use?

Uninstaller

Data traveling from a home computer to the Internet is called

Upstream Traffic

An application you own will run on a new version of your operating system. What is the term for this kind of application?

Upward compatible

because of ___ and the increased reliance on mobile devices for communications and productivity, the use and function of mobile and desktop operating systems are becoming more similar

convergence

Which of the following is NOT one of the three general guidelines for system development?

create documentation

which is NOT one of the 3 general guidelines for system development?

create documentation

Database Administrator

creates and maintains the data dictionary; monitors data performance

Experian, Equifax, and Transunion are all types of "blank" companies

credit reporting

Experian, Equifax, and Transunion are all types of _____ companies.

credit reporting

Experian, Equifax, and Transunion are all types of ______ companies.

credit reporting

A(n) ____ application is an application that runs the same on multiple operating systems.

cross-platform

The name for harassment on the Internet is

cyberstalking

"blank" is a collection of unprocessed items, including text, numbers, images, audio, and video

data

____ is a collection of unprocessed items, including text, numbers, images, audio, and video.

data

Because of the Sarbanes-Oxley (SOX) Act, companies have faced new requirements for what?

data storage

because of the Sarbanes-Oxley act, companies have faced new requirements for what?

data storage

A(n) ______ database is a huge database used to analyze transactions.

data warehouse

a "blank" database is a huge database used to analyze transactions

data warehouse

This is a collection of data organized in a manner that allows access, retrieval, and use of that data

database

An ___ ___ uses data modeling techniques and tools to analyze and specify data usage.

database analyst or data modeler

A hard-wired Internet connection through a LAN is called a(n) ________ connection.

dedicated

A(n) ______ line is a type of always-on physical connection between two communications devices.

dedicated

exception criteria

define the normal activity or status range.

field size

defines the maximum number of characters of field can contain.

The business wants to provide a common work environment of applications, and computing resources without requiring all of these to reside on users computers. You recommend a ____ desktop.

Virtual

You are running the latest version of Windows but you require an app that runs only in a previous version of Windows. Which of the following can you use to solve this problem?

Virtual machine

You want to run another operating system on your computer in addition to the one already installed. Which of the following will let you do that?

Virtual machine

____ is the practice of sharing or pooling computing resources, such as servers or storage devices

Virtualization

What type of voicemail lets people listen without listening to it?

Visual

What do you use to speak to other users over the internet?

VoIP

What kind of software do you need to use an Internet phone?

VoIP

What kind of software to use an Internet Phone?

VoIP

Which is NOT true about voice input?

Voice recognition is also called talk recognition

Which of the following is NOT true about voice input?

Voice recognition is also called talk recognition

Which of the following is NOT one of the three V's of Big Data.

Volatility

You have been chosen to be a teaching assistant in your database course. The instructor asks you to prepare a presentation on Big Data. Which of the following is NOT one of the three V's of Big Data.

Votality

the internet is the world's largest what?

WAN

On devices running Windows (Mobile Edition), the ______ app provides a centralized location for coupons, credit cards, loyalty cards, and memberships.

Wallet

You want to clear the memory on your mobile device. Which of the following is sufficient?

Warm Boot

Smartwatches are examples of?

Wearable Devices

After an HTML document is completed, it needs to be uploaded onto a ________ server before it's visible on the Web.

Web

A ________ is a code embedded as a one-pixel graphics file in an email message which notifies the sender that the message was opened.

Web Bug

An ___ ___ is well versed in HTML5, JavaScript, and CSS.

Web Designer

Which of the following best describes function creep?

When a company uses the technology intended for one purpose for a different purpose

You learn that all of the following are true about TCP/IP EXCEPT:

When a computer sends data over the Internet, the data is grouped into a single packet.

Which of the following is NOT true about two step verification?

When a system sends an authentication code, it typically does not expire

Which of the following best describes jailbreaking?

When a user makes unauthorized modifications to a device's operating system

Which of the following best defines Bluebugging?

When cyberthieves exploit Bluetooth devices that are paired

All of the following statements are true EXCEPT: a. Wireless networks are convenient for people on the move. b. Wireless networks are easier to install because they don't require drilling or digging. c. Wireless networks use radio transmitters. d. Wireless networks are faster than wired networks.

Wireless networks are faster than wired networks.

What device would you use to amplify your wireless signal?

Wireless range extender

menu command

With Windows, for example, you can perform a warm boot by clicking this.

picture/video messaging

With picture messaging, users can send pictures and sound files, as well as short text messages, to a phone or other mobile device, or computer. With video messaging, users can send short video clips, usually about 30 seconds in length, in addition to all picture messaging services.

What is the difference between sleep and hibernate mode?

With sleep mode the computer is placed in a low-power state.

What is the difference between sleep and hibernate mode?

With sleep mode, the computer is placed in a low-power state.

____ size is the number of bits the processor can interpret and execute at a given time

Word

System Analyst

Works closely with users to analyze their requirements, designs and develops new information systems, and incorporates new technologies

Columns and rows collectively make a?

Worksheet

High end desktops are sometimes called?

Workstation

Which type of virus uses computer hosts to reproduce itself?

Worm

You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. What type of malware might you have?

Worm

Which best describes the role of an SEO specialist?

Writes and develops web content and layouts so that they will appear at the beginning of search results

Which of the following best describes the role of an SEO specialist?

Writes and develops web content and layouts so that they will appear at the beginning of search results.

Search Engine Optimization (SEO) Expert

Writes and develops web content and website layouts so tat they will appear at the beginning of search results when users search for content

What markup language includes all of the features of HTML and includes customized tags that give information more meaning?

XML

One-way syncing

You can add/change/delete files in a destination location (target) without altering the same files in the original location (source)

Which of the following is NOT a part of a typical single-user license agreement?

You can rent or lease the software

Can a 32 bit OS be upgraded to a 64 bit system?

a 32-bit OS cannot be upgraded to a 64-bit OS. Another example is that Windows XP cannot be upgraded to Windows 7.

mashup

a Web application that combines services from two or more sources, creating a new application.

continuous backup

a backup plan in which all data is backed up whenever a change is made.

What is an error in a program called?

a bug

data

a collection of unprocessed items, which can include text, numbers, images, audio and video.

Local are network (LAN)

a network in which the nodes are located within a small geographic area

Wide area network (WAN)

a network made up of local area networks (LANs) connected over long distances

WAN

a network that covers a large geographic area (such as a city, country, or the world) using a communications channel that combines many types of media such as telephone lines, cables, and radio waves.

Personal area network (PAN)

a network used for communication among devices close to one person, such as smartphones and tablets using wireless technologies such as Bluetooth and WiFi

check digit

a number or character that is appended to or inserted in a primary key value.

Microsoft Office Specialist

a popular application software certification which tests a user's skills of Office programs

phishing filter

a program that warns or blocks you from potentially fraudulent or suspicious Web sites.

developer

a relational database refers to a file as a relation, a record as a tuple, and a field as an attribute.

user

a relational database, by contrast refers to a file as a table, a record as a row, and a field as a column.

query

a request for specific data from the database.

A cross-platform application is one that runs in what way?

a same on multiple operating systems

Information System

a set of hardware, software, data, people, and procedures that work together to produce information.

Home area network (HAN)

a specific type of LAN located in a home that's used to connect all of its digital devices

Functional Units

a typical enterprise that consists of a wide variety of departments, centers, and divisions. examples: Human Resources, Manufacturing, Sales, Marketing, Customer Service

___ controls how you enter data and instructions and how information is displayed on the screen.

a user interface

command line interface

a user types commands or presses special keys on the keyboard to enter data and instructions.

screen saver

a utility that causes a display device's screen to show a moving image or black screen if no keyboard or mouse activity occurs for a specified time.

file management

a utility that performs functions related to file management. Some of the file management functions that a file manager performs are displaying list of files on a storage medium; organizing files in folders; and copying, renaming, deleting, moving, and sorting files.

uninstaller utility

a utility that removes a program, as well as any associated entries in the system files.

hot spot

a wireless network that provides internet connections to mobile computers and devices.

Input

accept/process data (unprocessed items)

"blank" information is available when the decision maker needs it

accessible

______ information is available when the decision maker needs it.

accessible

Streaming

accessing media content while it downloads

"blank" information is error free

accurate

Critical Thinking Questions Case 4-1 Q: Your friends know that you understand a lot about computers, both the technical details of how they operate as well as information about software. Lately, with all of the concerns about copyright infringement, friends have started to ask you about categories of application software and what each kind permits. You tell your friends that product ______ is a technique that some manufacturers use to ensure you do not install software on more computers than legally licensed.

activation

What describes the term bloatware?

additional hardware and apps installed by an OEM

A byte's _____ is a unique number that identifies the location of a byte in memory.

address

When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as

denial-of-service attack

during which phase of system development would you acquire any necessary hardware and software?

design

When you run an app in windows, it appears in an on-screen work area app. What is this called?

desktop

which MIS reports usually lists just transactions?

detailed

Who is Henry L. Gantt??

developed the Gantt Chart. (like a project management type of chart)

what did Henry L. Gantt do?

developed the Gantt chart

Information security services

develops and enforces policies that are designed to safeguard an organization's data and information from unauthorized users.

Security System project manager

develops and maintains programs and tools designed to provide security to a network

the trend today is toward ___ operating systems that run on computers and mobile devices provided by a variety of manufacturers

device-independent

A data "blank" contains data about each file in the database and each field in those files

dictionary

A data ____ contains data about each file in the database and each field in those files.

dictionary

A data ______ contains data about each file in the database and each field in those files.

dictionary

a "blank" backup copies all of the files that have changed since that last full backup

differential

____ Inspects electronic data to recover documents and files form data storage devices that may have been damaged or deleted..

digital forensics analyst

A graphics tablet also is called a what?

digitizer

A graphics tablet is also called a _____

digitizer

Marketing/Strategy

directs and implements Internet and social media marketing, and manages customer relationships.

management

directs the planning, research, development, evaluation, and integration of technology.

In the acronym ADA, the D stands for _____.

disabilites

In the acronym ADA, the D stands for

disabilities

E-Waste

discarded computers/mobile devices; can cause environmental issues

The network ______ uses the operating system on the network to configure the network, install software, and control network security.

administrator

the network ___, the person overseeing the network operations, uses a server operating system to add and remove users, computers, and other devices to and from the network.

administrator

Computer-aided engineering (CAE)

aids in the development and testing of product designs, and often includes CAD

What are the roles of an operating system?

all operating systems perform the same four basic functions: Control hardware access Manage files and folders Provide a user interface Manage applications

Document management system (DMS)

allows for storage and management of a company's documents, such as word processing documents, presentations, and spreadsheets.

Wiki

allows users to create, add, modify, or delete content via their browsers

report generator

also called a report writer, allows users to design a report on the screen, retrieve data into the report design, and then display or print the report.

You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should make sure to do all of the following EXCEPT _____.

always stay connected to the internet

Drones

an aircraft that operates by an on-board computer and GPS, a remote control device, or mobile device. Also known as a unmanned aerial vehicle (UAV)

what best defines the term cross-platform application?

an application that runs the same way on multiple operating system

When a botnet is used to attack computers or networks, it called a ____ DOS attack.

distributed

What is the term for the variety of forms in which Linux is available?

distributions

On computers running macOS, the "blank" contains icons used to run apps, display minimized windows, and access documents

dock

an ___ ___ ___ allows for storage

document management system (DMS)

server os

an operating system that organizes and coordinates how multiple users access and share resources on a network.

Research and software development

analyzes, designs, develops, and implement new information technology and maintains and improves existing systems.

To register a business name and create a unique URL, a business pays a fee that goes to ________.

domain name registry company

"blank" pitch is the distance in millimeters between pixels on a display

dot

printer resolution is measured by the number of "blank" per inch a printer can print

dots

COGNITIVE ASSESSMENT Which of the following is NOT true about use of unlicensed software?

In most cases, the software owner can make as many copies as desired.

Two-way syncing

any change made in one location is also made in any other sync location

In the current software market what are the three most common operating systems?

In the current software market, the most commonly used desktop operating systems fall into three groups: Microsoft Windows, Apple Mac OS, and Linux.

Google play is an example of an "blank"

app store

first windows developed

In the mid-1980s, Microsoft developed its first version of Windows, which provided a graphical user interface(GUI).

While working as an assistant in an IT department, you have been taking classes in information and systems security. You meet with a career counselor to discuss potential jobs. One of the jobs available at your current company is for a digital forensics analyst. What skill will you need to have to apply for the job?

Inspect electronic data to recover documents and files

Digital Forensics Analyst

Inspects electronic data to recover documents and files from data storage devices that may have been damaged or deleted, for a crime investigation

Megan Kanka

Inspired Megan's Law

What are the three options you get when choosing install now in Windows?

Install now What to know before installing Repair your computer

Systems Programmer

Installs and maintains operating system software and provides technical support to the programming staff

Network Administrator

Installs, configures, and maintains LAN, WANs, wireless networks, intranets, Internet systems, and network software; identifies and resolves connectivity issues.

Computer Technician

Installs, maintains, and repairs hardware and servers; installs, upgrades, and configures software; troubleshoots hardware problems

memory resident

Instructions that remain in memory while the computer or mobile device is running.

What is the definition of nonresident in terms of parts of operating system?

Instructions that remain on a storage medium until they are needed

nonresident

Instructions that remain on a storage medium until they are needed, at which time they transfer into memory (RAM).

Mobile Strategist

Integrates and expands the company's initiatives for mobile users

Customer Relationship Management (CMR) Specialist

Integrates apps and data related to customer inquiries, purchases, support requests, and behaviors in order to provide a complete application that manages a company's relationships with its customers

What best describes the role of a CRM specialist?

Integrates apps and data to provide an application that manages a company's relationships with customers

Podcasts

downloadable or stream media to a computer/portable media player (Ex: Radio shows, political messages, lectures)

When you visit certain Web sites, spyware may be automatically downloaded. This is called a

drive-by download

A "blank" is a small program that tells the operating system how to communicate with a specific device

driver

A(n) _____ is a small program that tells the operating system how to communicate with a specific device.

driver

You have been having issues with your printer, so you decide to learn more about how the printer works. You learn that if you replace your printer with a new one, you will have to install a "blank" to your computer

driver

Which of the following best describes the role of a CRM specialist?

Integrates apps and data to provide an application that manages a company's relationships with customers.

You interact with program through?

Interface

Which cache level is on the motherboard and is separate from the processor chip?

L3

A ________ is a network of computers in a close physical area.

LAN

A home or school likely uses a(n) ______.

LAN

WiMax and UMB are competing standards for ______.

LTE

WiMax and UMB are competing standards for what?

LTE

a ___ is a small program that tells the operating system how to communicate with a specific device.

driver

If cost-effective, what computer components might be considered for upgrade?

It might be cost effective to upgrade one or more of the following components: RAM Hard disk drive CPU Video adapter card Motherboard

Unmanned aerial vehicle/system are other terms for a(n) ______.

drone

What is the definition of open source software?

Its code is provided for use, modification, and redistribution

What term generally refers to hacking into apples iPhone and iPads?

Jailbreaking

Which of the following is the core of an operating system that maintains the computer's clock, starts applications, and assigns the computer's resources, such as devices, programs, apps, data, and information?

Kernel

An encryption _____ is a set of characters that the originator of the data uses to encrypt, and the recipient of the data uses to decrypt.

Key

Which of the following best defines big data?

Large scale data sets that require advanced technologies.

Which of the following best defines big data?

Large-scale data sets that require advanced technologies

_____ is the time it takes a signal to travel from one location to another on a network.

Latency

OS X

Latest version of Apple's operating system.

When describing the macOS interface, you tell her that she can use the ______ to view, organize, and run apps.

Launchpad

Most data items are stored in only one file, which greatly reduces _____ ____.

duplicate data, data redundancy (know duplicate data for test)

Application

app; programs that make users more productive and help them with personal tasks... Three types: -Desktop app: stored on a computer -Web app: stored on web server and accessed through a browser -Mobile app: download from app store on mobile device

Application Software

applications

You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations. Which is not true about cloud data privacy?

Law enforcement officals cannot access email messages stored on the cloud without informing the user first.

Client/server and P2P are two types of network _____.

architecture

client/server and P2P are two types of network "blank"

architecture

Tablet

Lightweight, mobile computer that has a touch screen that operate on batteries (last longer than laptop) or power supply

Who developed Linux?

Linus Torvalds designed Linux in 1991 as an open-source OS.

Which of the following is an open source operating system?

Linux

Which of the three common operating systems is open source?

Linux

Inference rules

are a set of logical judgments that are applied to the knowledge base each time a user describes a situation to the expert system.

A(n) ______ test measures the performance of hardware or software.

benchmark

What is the term for using a set of conditions to measure the performance of hardware in your network?

benchmark

a "blank" test measures the performance of hardware or software

benchmark

a ___ is a set of conditions used to measure the performance of hardware or software.

benchmark

a gigabyte is approximately 1 ____bytes

billion

Fire OS

Linux-based operating system for Amazon Kindle tablets and Amazon Fire phones.

Firefox OS

Linux-based operating system for Amazon Kindle tablets and Amazon Fire phones.

automatic update

Feature can be configured to download and install updates automatically.(or) Feature that regularly provides new features or corrections to the program.

The fastest broadband Internet service is usually

Fiber-optic

What three installation options does the Windows 7 install wizard give you?

File Allocation Table, 32 bit (FAT32)

You want to shrink the size of the file. What do you use?

File Compression

A ________ stores data and software that can then be shared by several users.

File Server

Screen savers and backup programs are under what?

File disk and system managment

What word is used with a type of media and usually means the media can be used to start the computer?

Live

Many programs today use ___ on a webpage as their front end.

Forms

service pack

Free downloadable updates provided by software makers for users who have registered and/or activated their software.

With which of the following do users interact with menus and visual images such as icons, buttons, and other objects to issue commands?

Graphical User Interface (GUI)

How can you tell what wireless devices are connected to your router?

Log in to the routers's IP address and check the configuration page

Detailed analysis sometimes is called ____ design.

Logical

queue

Group of files waiting in the buffer to be printed.

Technical Project Manager

Guides design, development, and maintenance tasks; serves as interface between programmers and management

A ____ was originally a complimentary word for a computer enthusiast.

Hacker

Which of the following is responsible for answering technology-related questions?

Help desk technician

on a star network, what kind of computer controls access to the hardware, software, and other resources on the network and provides a centralized storage area for programs , data and imforation

Host

All in one desktop

Houses the display and tower

A(n) ________ address is a specific/unique number for each network adapter.

MAC

A city or town likely uses a(n)

MAN

a city or town likely uses a what?

MAN

The banking industry almost exclusively uses ____ for check processing.

MICR

A(n) ______ combines video instruction and interaction with an instructor and students in an online classroom.

MOOC

The latest version of the Macintosh operating system is a multitasking operating system available only for computers manufactured by Apple. What is the name for this version?

Mac OS X

In M2M communication, the M stands for?

Machine

Of the following, which one is NOT a way to protect yourself from identity theft?

Make all online purchases with a debit card

A File _____ performs functions related to displaying and organizing files.

Manager

Where might you find a HCL?

Manufacturers Website

what is the data transfer rate equivalent to one million bits per second?

Mbsp (mega bites per second)

_______ is another term for millions of bits.

Megabits

Which historical macro virus sent emails out to the first 50 names of a user's Outlook address book if they opened an email from an unknown sender?

Melissa

The kernel remains in memory while the computer is running. In this way, the kernel is said to be which of the following?

Memory Resident

Which of the following has as its purpose the optimization of the use of random access memory (RAM)?

Memory management

A(n) ________ network is often used to set up a temporary communications system that requires no centralized router.

Mesh

What is the purpose of windows Upgrade Advisor?

Microsoft provides a free utility called the Upgrade Advisor, which scans the system for hardware and software incompatibility issues in hardware before upgrading to newer editions of the Windows OS.

The Code Red worm attacked

Microsoft server software

Internet Explorer

Microsoft's browser.

OneDrive

Microsoft's cloud server.

What are the most common network operating systems?

Microsoft, Linux, Novel, Netware

_____ transmission often is called fixed wireless.

Microwave

The simplest RAID storage design writes data on two drives at the same time and is called ____.

Mirroring

an _____ _____ expert develops and directs an organizations mobile stray including marketing and app development

Mobile Technology

A(n) ________ converts a message from digital to analog or from analog to digital.

Modem

The device used to connect a network to the Internet is called a

Modem

What two devices are often combined into one device in a small network to connect the home network to the Internet and to share the connection between devices on the network?

Modem and router

"blank" transforms one video image into another image over the course of several frames of video

Morphing

Which of the following is NOT true about technology certifications?

Most certification programs require academic coursework

Which of the following is NOT true about technology certifications?

Most certification programs require academic coursework.

What job title is used for the person who uses the server operating system to add and remove users, install software, and administer network security?

Network administrator

If you want to connect multiple devices together?

Network your computers and devices.

All of the following are essential components of every computer system EXCEPT:

Networks

cisco, novell sun and others offer certifications that test knowledge of installing, configuring, operating, and administering ______.

Networks

Which will search pizza or sandwich in new Orleans?

New Orleans (pizza or sandwich)

What are the two file systems by windows?

New Technology File System (NTFS)

Two types of system software are which of the following?

Operating systems and tools that enable you to perform maintenance tasks

multipurpose operating systems

Operating systems that can function as both desktop and server operating systems.

device-independent

Operating systems that run on computers and mobile devices provided by a variety of manufacturers.

Technical Support System

evaluates and intergrates new technologies, administers the organization's data resources, and supports the centralized computer operating system and servers.

what is NOT a recommendation when deciding what to upload to the cloud

even if you have access to installation media, back up your programs and apps

What is the second largest software maker in terms of revenue?

Oracle, behind Microsoft

A ____ is the smallest unit of data a computer can process

bit

______ is a network protocol that defines how two devices use short-range radio waves to transmit data.

bluetooth

A yes/no data type is called

boolean

you can start a computer from a ___, which is removable media that contains only the necessary operating system files required to start the computer.

boot disk

Which virus type targets a computer's start-up files?

boot sector

What type of information is arranged to suit the needs and requirements of the decision maker??

Organized

these icons belong to hat type of software? (lime wire, napster)

P2P (peer 2 peer)

To connect devices within your workspace, use a ____.

PAN

The type of network for communication among a laptop and smartphone using Bluetooth is a

PAN (personal area network)

What term is sometimes used to describe a computer that runs a Window operating system?

PC

the term, ___, sometimes is used to describe a computer that runs a windows operating system.

PC

Which of the following is a popular scripting language for programming Web servers?

PHP

Graphic format for comic style drawings?

PNG

Most Web-based email systems use ________ to retrieve mail and store the messages in a folder on a remote mail server.

POP

On networks that use TCP/IP, _____ software can detect problems, such as why traffic is flowing slowly.

Packet sniffing

______ radio is a wireless transmission medium that distributes radio signals through the air over long distances.

broadcast

She asks you what types of program are Safari and Edge. You tell her that these are ______.

browsers

She asks you what types of programs are Safari and Edge. You tell her that these are what?

browsers

A(n) ______ is a segment of memory or storage in which items are placed while waiting to be transferred from an input device or to an output device.

buffer

while waiting for devices to become idle, the operating system places items in ___.

buffers

an error in a program sometimes is called a ___

bug

This is the greatest problem with regards to a bus network.

bus itself might become inoperable

Warm Boot

by contrast, is the process of using the operating system to restart a computer.

Asynchronous communication is when the sender and recipient a. directly connect to share files. b. do not use the same operating system. c. do not have to be online at the same time. d. use different software but are able to communicate through the Internet.

c. do not have to be online at the same time

Which of the following is not recommended to protect against hardware failure?

cables and locks

____ is the number of bytes (characters) a storage medium can hold

capacity

______ is a practice ISPs use that provides a certain amount of data usage at the optimal speed.

capping

what is tps?

captures and processes data from business activities

Critical Thinking Questions Case 4-2 Q: Your boss, Molly, asks you to create a spreadsheet for sales data for the store at which you both work. In a spreadsheet, B4 represents a(n) ______.

cell

Network certifications

certification that allows a user to be able to address the complex issues that arise when planning, installing, managing, and troubleshooting a network.

Gantt and PERT are types of ______ used to plan and schedule time relationships among project activities.

charts

Which of the following communication application types requires real-time interaction?

chat

A(n) ______ is a number(s) or character(s) appended to or inserted in a primary key value.

check digit

a "blank" is a number or character appended to or inserted in a primary key value

check digit

Process of initiating contact between Bluetooth devices?

Pairing

A(n) _____ is the destructive event or prank the virus delivers

Payload

"blank" is a Linux-based operating system designed to work primarily with web apps

chrome OS

______ is a Linux-based operating system designed to work primarily with web apps.

chrome OS

Desktop operating systems sometimes are called _____ operating systems because they also work in conjunction with a server operating system.

client

Desktop operating systems sometimes are called ______ operating systems because they also work in conjunction with a server operating system.

client

desktop operating systems sometimes are called "blank" operating systems because they also work in conjunction with a server operating system

client

desktop operating systems sometimes are called ____ operating systems because they also work in conjunction with a server operating system.

client

what is not true about client/server networks?

client/server networks do not typically require a network administrator

The system ____ generates regular electronic pulses that set the operating pace of the system unit.

clock

Mobile Computer

Personal Computer that can be carried from place to place (Laptops and Tablets)

cabling

Physical transmission media used in communications include twisted-pair cable, coaxial cable, and fiber-optic cable.

All of these are suggestions for safe computing EXCEPT:

Pirate Software

A(n) _____ is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed.

code of conduct

A "blank" engineer develops AI-based machines and programs

cognitive

A(n) ______ engineer develops AI-based machines and programs.

cognitive

some people use the term ___ to refer to the process of starting a computer or mobile device from a state when it is powered off completely.

cold boot

Some web databases are ______ databases, where users store and share media with other registered users.

collaborative

some web databases are "blank", where users store and share media with other registered users

collaborative

User Experience (UX) Designer

Plans and designs software and apps that consider a user's reaction to a program and its interface, including its efficiency, its effectiveness, and its ease of use.

Which of the following best describes the role of a UX specialist?

Plans and designs software and apps that consider a user's reaction to a program and its interface.

The operating system that a computer uses sometimes is called which of the following?

Platform

Which of the following means the operating system automatically configures new devices as users install them?

Plug and Play

A newer PC will likely have an Ethernet ________ on the main circuit board so it can directly connect to an Ethernet network.

Port

Yahoo!, MSN, and AOL/Netscape are examples of ________.

Portals

user interface (UI)

Portion of software that controls how you enter data and instructions and how information is displayed on the screen.

Badges, cards, smart cards, and keys are _____ objects.

Possessed

Network

collection of computers and devices connected together (often wirelessly) The server accesses resources on a network, the other computers (clients) request recourses from the server

Software/Program

collection of instructions organized for a common purpose (Ex: typing a paper) Two categories: operation systems/ applications

hybrid app

combines features of native and mobile web apps.

which creates logs, documentation, and recovery plans based on cybersecurity threats and incidents?

computer security incident responder

Which is responsible for installing hardware and servers and troubleshooting hardware problems?

computer technician

One of the jobs available at your current company is for a network security administrator. What skill will you need to have to apply for the job?

configure routers and firewalls

Mobile broadband

connects you to the Internet through the same cellular network that cell phones use to get 3G or 4G Internet access

bus network

consists of a single central cable, to which all computers and other devices connect.

software and apps field

consists of companies that develop, manufacture, and support a wide range of software and apps for computers, the web, and mobile devices.

technology equipment field

consists of manufacturers and distributors of computers, mobile devices, and other hardware, such as magnetic and optical drives, monitors, printers, and communications and networking devices.

System Software

consists of programs that control or maintain the operations of computer

data model

consists of rules and standards that define how the database organizes data.

summary report

consolidates data usually with totals, tables, or graphs, so that managers can review it quickly and easily.

Your friend Margo is considering what type of display to purchase with her new desktop computer and she asks you for advice. You tell Margo that most monitors today have a small footprint. What does this mean?

they do not take up much desk space

what is NOT true about command-line interface?

they give you less control to manage detailed settings than a GUI

QBE stands for query by "blank"

example

QBE stands for query by ______.

example

Which MIS reports identifies data outside of a normal condition?

exception

Which of the following MIS reports identifies data outside of a normal condition?

exception

You explain that when the ALU performs calculations on data, it is part of the ____ process in the machine cycle.

executing

A(n) _____ bus allows the processor to communicate with peripheral devices.

expansion

UX stands for user ______.

experience

An "blank" system captures and stores human knowledge and then imitates human reasoning and decision making

expert

An iris recognition system uses technology to read patterns in the users ____

eye

A back end is a program that generally has a more user-friendly interface than the DBMS.

false

A cold boot generally is faster than a warm boot.

false

A multiuser operating system processes all tasks on a first-come, first-served basis.

false

A query language consists of complex, abbreviated statements that allow users to specify data they want to display, print, store, update, or delete.

false

A relational database can store more than two dimensions of data.

false

An object data type is used for a document or image that is attached to the field, which can be opened in the program that created the document or image.

false

An operating system must be installed on a hard drive. It cannot run from a USB flash drive or other media.

false

Apps designed for a specific mobile platform or device generally will work on another without significant modification.

false

Because of convergence, as well as the increased reliance on mobile devices for communications and productivity, the use and function of mobile and desktop operating systems are becoming more similar.

false

Bluetooth devices need to be within the same line of sight.

false

Coaxial cable is capable of carrying significantly more signals than fiber-optic cables.

false

Educational requirements for help desk specialists are more stringent than they are for other careers in the technology field.

false

Ethernet is a network standard that specifies that computers and devices on the network share or pass a special signal in a unidirectional manner and in a present order.

false

Experts recommend that you run multiple antivirus programs simultaneously.

false

Linux is proprietary software.

false

Many people initially used the term, data processing, to refer to the functions of a DMS.

false

Most information gains value with time.

false

Not all computer and mobile devices have an operating system.

false

T1 lines have faster transfer rates than T3 lines.

false

The Google Apps Certified Specialist certification tests a user's ability to use the Google Docs web applications.

false

The kernel is an example of a nonresident instruction.

false

The main difference between network classifications is the number of computers and devices connected to it.

false

The term, PC, sometimes is used to describe a computer that runs on a Mac operating system.

false

When you use a credit card to purchase an item, you are interacting with a CMS.

false

When you use a network to share software, you sometimes have to install the software on your computer, and a server on the network manages the licenses.

false

With P2P file sharing, when a user signs out of the network, others can still access the user's hard drive.

false

a numeric check determines whether a number is within a specified range

false

an object data type is used for a document or image that is attached to the field, which can be opened in the program that created the document or image

false

t/f: FIP addresses concerns regarding security of information protocols

false

t/f: Linux is proprietary software

false

t/f: P2P networks share a common file server

false

t/f: SSDs typically have higher storage capacities than hard disks

false

t/f: a back end is a program that generally has more user-friendly interface than the DBMS

false

t/f: a hybrid app not only saves on development time and costs but also ensures a consistent user interface and fast performance on all devices

false

t/f: a live webcam has the illusion of moving images because it sends a continual stream of still images

false

t/f: a multiuser operating system processes all tasks on a first-come, first-served basis

false

t/f: a query language consists of complex, abbreviated statements that allow users to specify data they want to display, print, store, update, or delete

false

t/f: a storage medium is also called primary storage

false

t/f: although compact keyboards are smaller than standard keyboards, most still include the numeric keypad and navigation keys

false

t/f: an SFA information system is used in product development

false

t/f: an operating system must be installed on a hard drive. It cannot run from a USB flash drive or other media

false

t/f: because of convergence, as well as the increased reliance or mobile devices for communication and productivity, the use and function of mobile and desktop operating systems are becoming more similar

false

t/f: because they are assigned randomly, you cannot use an IP address to determine a computer or device's location

false

t/f: coaxial cable is capable of carrying significantly more signals than fiber-optic cables

false

t/f: continuous backup is inexpensive because the data is constantly being backed up

false

t/f: continuous data protection is widely used by home and small business users

false

t/f: data collection devices are used to read or scan data from a source document

false

t/f: file processing systems require more memory and processing power than data

false

t/f: files on an intranet generally are also accessible from the Internet

false

t/f: if using a webcam, keep it connected to the computer when not in use so that you can control access to it

false

t/f: if you are using a mac and accidentally delete a file from the hard drive and need to recover it, look in the Recycle bin

false

t/f: many people initially used the term, data processing, to refer to the function of a DMS

false

t/f: most information gains value with time

false

t/f: operating systems on embedded computers use a multitasking operating systems

false

t/f: perpendicular recordings aligns the magnetic particles horizontally around the surface of the hard disk

false

t/f: the Google Apps Certified Specialist certification tests a user's ability to use the Google Docs web applications

false

t/f: the higher the number, the faster the response time

false

t/f: the kernel is an example of a nonresident instruction

false

t/f: the term, PC, sometimes is used to describe a computer that runs on a Mac operating system

false

t/f: touchpads are found most often on desktop computers

false

t/f: when you use a credit card to purchase an item, you are interacting with a CMS

false

t/f: with Bluetooth printing, the computer and printer need to be aligned with each other

false

t/f: with a direct conversion, only one location in the organization uses the new system, so that it can be tested

false

t/f: with direct conversion, only one location in the organization uses the new system, so that it can be tested

false

t/f: you should use a humorous name for your account profiles to ensure that you stand out to potential employers

false

t/f: continuous data protection is widely used by home and small business users

false, it is used by enterprise

t/f: in an optical disc, the absence of light is read as a binary digit 1

false, zero

A(n) ________ cable uses light waves to transmit multimedia and voice data.

fiber-optic

A "blank" is the smallest unit of data a user accesses

field

A(n) _____ is the smallest unit of data a user can access.

field

A(n) ______ is a combination of one or more related characters or bytes.

field

A(n) ______ is the smallest unit of data a user accesses.

field

a "blank" is the smallest unit of data a user can access

field

in a database, what is the smallest unit of data a user can access?

field

primary key

field that uniquely identifies each record in a file.

___ ____ referes to the procedure that keep data current.

file maintenance

A ________ stores data and software that can then be shared by several users.

file server

Under what category of programs and apps do screen savers and backup programs fall?

file, disk, and system management

______ is the operating system used by Amazon Kindle tablets.

fire OS

Hardware or software designed to guard against unauthorized access to a computer network is known as a(n)

firewall.

"blank" consists of ROM chips or flash memory chips that store permanent instructions

firmware

ROM chips called ____ contain permanently written instructions, or information, such as start-up instructions.

firmware

Which of the following is another term for a JAD session?

focus group

what is another term for JAD session?

focus group

which is another term for a JAD session?

focus group

Operating System Certifications

focus on particular skills of the user, the operator, the system administrator, and the software engineer.

Data analysis certifications

focus on the discovery, collection, and analysis of evidence on computer networks.

Which is NOT true about wireless access points?

for the best signal, manufacturers recommend positioning the WAP at the lowest possible point

"blank" feedback is a technology that sends resistance to the gaming device in response to actions of the user

force

when a computer is running multiple programs concurrently, the one in the ___ is the active program, that is, the one you currently are using.

foreground

Data analysis certifications often contain the word ______ in their title.

forensics

The collection of biometric and other data used in criminal investigation is called digital ______.

forensics

data analysis certifications often contain the word "blank" in their title

forensics

A(n) ______ is a window on the screen that provides areas for entering or modifying data in a database.

form

"blank" is the process of dividing a hard disk into tracks and sectors

formatting

____ is the process of dividing a hard disk into tracks and sectors

formatting

_____ is the process of dividing a hard disk into tracks and sectors.

formatting

Many programs today use ______ on a webpage as their front end.

forms

many programs today use "blank" on a webpage as their front end

forms

Home and small business users purchase ______ T1 lines, in which they share a connection with others.

fractional

home and small business users purchase "blank" T1 lines, in which they share a connection with others

fractional

A typical enterprise consists of a wide variety of departments, centers, and divisions -- collectively known as ______ units.

functional

Technology sales

generally determine buyers' needs and direct buyers toward devices, computers, and apps that meet their needs.

A "blank" is a virtual perimeter or boundary that disables certain apps or cameras in secure areas

geofence

The primary difference between a LAN and a WAN is the

geographical area

Web

global library on information to those on the internet, made up of electronic documents (webpage) that make up a website stored in a webserver

GUI stands for ______ user interface.

graphical

with a ___ , you interact with menus and visual images by touching, pointing, tapping, or clicking buttons and other objects to issue commands.

graphical user interface

Communications Device

hardware capable of transferring items from computers/devices to transmission media and vise versa (Ex: modems, wireless access points, routers)

Input device

hardware component that allows you to enter data into a computer (Ex: Keyboard, Pointing Devices [mouse], voice/video input, scanner)

Output device

hardware component that conveys info from a computer to one or more people (Ex: Printer, 3D printer, display [screen/monitor]

Digital Literacy

having a current knowledge/understanding of computers, mobile devices, the web, and related technologies

Which is responsible for answering technology-related questions?

help desk technician

Which of the following is responsible for answering technology-related questions?

help desk technician

Salesforce automation (SFA)

helps salesforce manage customer contacts, schedule customer meetings, log customer interactions, manage product information, and place customer orders.

decision support system (DSS)

helps users analyze information and make decisions.

______ mode saves any open documents and running programs or apps to an internal hard drive before removing power from the computer or device.

hibernate

Which is true about cleaning and fixing scratches on an optical disc?

hold the can of compressed air upright while blowing excess dust off of the surface

The protocol used to transfer Web pages is ________.

http

Which of the following is a propriety mobile operating system specifically made for Apple's mobile devices?

iOS

Siri

iOS voice recognition app that enables you to speak instructions or questions to which it takes actions or responds with speech output.

A(n) ______ is a small image that represents shortcuts to apps or other content.

icon

exception report

identifies data outside of a normal condition.

Which of the following best describes the term, redundancy, as it pertains to enterprise businesses?

if one hardware component fails or malfunctions, another can assume its tasks

during which phase of system development would you develop any necessary programs and apps?

implementation

which is NOT true about use of unlicensed software?

in most cases, the software owner can make as many copies as desired

task management

include receiving data from an input device, processing instructions, sending information to an output device, and transferring items from storage to memory and from memory to storage.

Search tools typically use a(n) ______, which stores a variety of information about a file.

index

A(n) ______ system is a set of hardware, software, data, people, and procedures that work together.

information

Gregor tells you that when a DBMS flags a deleted record, ______.

it is deleted logically

You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor. Gregor tells you that when a DBMS flags a deleted record, ______.

it is deleted logically

gregor tells you that when a DBMS flags a deleted record, what happens?

it is deleted logically

Gregor tells you that when a DBMS flags a deleted record, ______.

it is delted logically

the ___ is the core of an operating system that manages memory and devices, maintains the internal clock, runs programs, and assigns the resources.

kernal

The ______ is the core of an operating system.

kernel

Detailed analysis sometimes is called ______ design.

logical

detailed analysis sometimes is called "blank" design

logical

credit cards are a type of ______ stripe card

magnetic

File ______ refers to the procedures that keep data current.

maintenance

file "blank" refers to the procedures that keep data current

maintenance

File _____ refers to the procedures that keep data current.

maintenence

Malware

malicious software that typically acts without the user's knowledge and alters the computer's/mobile device's operations (Ex: Virus)

If you decide you want be involved in planning, research, development, evaluation, and integration of technology, you should look for jobs within the ______ area.

management

MIS stands for ______ information system.

management

You are about to finish your degree in technology and are beginning your career search. You want to narrow down the fields in which you will look for a job. If you decide you want be involved in planning, research, development, evaluation, and integration of technology, you should look for jobs within the ______ area.

management

A File ______ performs functions related to displaying and organizing files.

manager

A file "blank" performs functions related to displaying and organizing files

manager

Customer relationship management (CRM)

manages information about customers, past purchases, interests, and the day-to-day interactions, such as phone calls, emails, web communications, and Internet messaging sessions.

Human Resources Information System (HRIS)

manages one or more administrative human resources functions, such as maintaining and managing employee benefits, schedules, and payroll.

standard utility functions

managing files, searching for files, uninstalling programs, viewing images, cleaning up disks, defragmenting disks, backing up files and disks, setting up screen savers, securing a computer from unauthorized access, protecting against viruses, removing spyware and ad ware, filtering internet content, compressing files, playing media files, burning optical discs, and maintaining a personal computer.

If you decide you want to be involved in planning, research, development, evaluation, and integration of technology, you should look for jobs within the _____ area.

managment

CAM and MRP are examples of information systems used in "blank"

manufacturing

CAM and MRP are examples of information systems used in ______.

manufacturing

A(n) ____ is a light-sensing input device that reads printed text and raphics and then translates the results into a form the computer can process.

scanner

a "blank" is a light-sensing input device that reads printed text and graphics and then translates the results into a form the computer can process

scanner

A data ______ uses analytics and other Big Data techniques to interpret a company's data to better understand its performance.

scientist

A "blank" device initiates an instruction to transmit data, instructions, or information

sending

A "blank" device is a device that initiates an instruction to transmit data, instructions, or information

sending

A(n) ______ device initiates an instruction to transmit data, instructions, or information.

sending

spooling

sends documents to be printed to a buffer instead of sending them immediately to the printer.

DSL Modem

separate signals into voice and data signals so they can travel at the same time on the phone line

Tape storage requires "blank" access, which refers to reading or writing data consecutively.

sequential

Tape storage requires _____ access, which refers to reading or writing data consecutively.

sequential

SAS is a type of SCSI that uses ________ signals to transfer data, instructions, and information

serial

A(n) ______ controls access to hardware, software, and other resources on a network.

server

A SAN is a high-speed network with the sole purpose of providing storage to other attached ______.

servers

Many software makers provide free downloadable updates, sometimes called a(n) ______ to users who have registered and/or activated their software.

service pack

Operating system

set of programs that coordinates all the activities among computer hardware (Ex: Microsoft's Windows)

Adjusting the ______ increases or decreases the crispness of objects in the photo.

sharpness

A virus ______ is a known specific pattern of virus code that antivirus programs use to identify viruses.

signature

The field ______ defines the maximum number of characters a field can contain.

size

the field "blank" defines the maximum number of characters a field can contain

size

___ mode saves any open documents and running programs or apps to memory, turns off all unneeded functions, and then places the computer in a low-power state.

sleep

Mobile device

small computing device that fits in your hand

Wearable device

small, mobile computing device that is worn and communicates with a phone or computer (Ex: Smartwatch)

Using deception to get individuals to reveal sensitive information is also known as a(n) ________ attack.

social engineering

Search Engine

software that finds websites, webpages, images, etc (Ex: google)

Which of the following is NOT an activity in the implementation phase?

solicit vendor proposals

which is NOT an activity in the implementation phase?

solicit vendor proposals

which is NOT true about web application development?

some computers and mobile devices do not support HTML5 but instead rely on Flash

Software Developer

someone who develops programs/apps and writes instructions for computer to process data into information

Mobile User

someone who works with computers/mobile devices while away from main office, home, or school (Ex: real estate agents/students)

Original forms of data, such as time cards or order forms, are known as ____ documents.

source

original forms of data, such as time cards or order forms, are known as "blank" documents

source

The ______ process sends documents to be printed into a buffer instead of sending them immediately to the printer.

spooling

a process called ___, sends documents to be printed to a buffer instead of sending them immediately to the printer

spooling

Which does NOT typically use portrait orientation?

spreadsheet

What does the booting process do?

starts or restarts the computer

This IP address doesn't change every day:

static IP address

The business wants to use a file management service, so you recommend ____ as a service.

storage

Hard disk

storage devices that contains one or more inflexible circular platters that use magnetic particles to store data, instructions, and info

Solid State Drives

storage devices that uses flash memory to store data, contains no moving parts

Storage Media

store data (Ex. Flash drive/Hard disk [storage device that uses magnetic particles to store data, contains moving parts])

Memory

stored instructions/data; some are permanent while others may be erased when the computer is turned off

A mobile _____ integrates and expands the company's initiatives for mobile users.

strategist

A mobile ______ integrates and expands the company's initiatives for mobile users.

strategist

a "blank" has the illusion of moving images because it sends a continual stream of still images

streaming cam

Digital media player

streams digital media from a computer/network to a tv or other entertainment device (Ex: apple TV)

Some RAID levels use ______, which splits data, instructions, and information across multiple drives in the array

striping

If you use an * in a search you are?

substituting characters

A "blank" report usually includes tables and graphs, so that managers can review it quickly and easily

summary

The area of the hard drive used for virtual memory is called a(n) _____ file.

swap

The area of the hard drive used for virtual memory is called a(n) ______ file.

swap

the area of the hard disk used for virtual memory is called a ____.

swap file

the area of the hard disk used for virtual memory is called?

swap file

A(n) ______ is a set of components that interact to achieve a common goal.

system

Which of the following kinds of software consists of the programs that control or maintain the operations of a computer and its devices?

system

Which of the following is responsible for designing and developing information systems?

system anaylst

monitoring "blank" is a part of the support and security phase

system performance

Neural network

system that attempts to imitate the behavior of the human brain

which is responsible for designing and developing information systems?

systems analyst

Which is responsible for installing and maintaining operating system software?

systems programmer

Which of the following is responsible for installing and maintaining operating system software?

systems programmer

In some database programs, a data file is referred to as a(n) ______.

table

in some database programs, a data file Is referred to as an ??

table

"blank" output provides the user with a physical response from the input device

tactile

Digital camera

take/store photos digitally

A ______ drive is comparable to a cassette recorder

tape

Security Certifications

measures a candidate's ability to identify and control security risks associated with any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability.

SDHC and miniSD are examples of what?

memory cards

"blank" transmission often is called fixed wireless.

microwave

______ transmission often is called fixed wireless.

microwave

a megabyte is approximately 1 _____ bytes

million

The simplest storage design writes data on two drives at the same time and is called?

mirroring

___ operating systems typically include or support calendar and contact management, text messages, email, touch screens, digital cameras, media players, a browser, and wireless connectivity

mobile

Game console

mobile computing device for single/multi player games

Portable media player

mobile device that lets you store, organize, view, and play digital media (photos, music, videos)

e-book reader

mobile device where you read e-books (electronic book)

Material Requirements Planning (MRP)

monitors and controls inventory, material purchases, and other processes related to manufacturing operations.

Which is NOT true about technology certification?

most certification programs require academic coursework

Gesture

motion you make on a touch screen with your fingers

Operating systems, such as UNIX and Linux, that function as both desktop and server operating systems sometimes are called ____ operating systems

multipurpose

A(n) ______ app is written for mobile devices running a particular mobile phone operating system.

native

with an "blank" user interface, users interact with the software through ordinary, intuitive behavior such as touch, gesture, and voice

natural

with a ___, users interact with the software through ordinary, intuitive behavior.

natural user interface

With which of the following are users who shut down their computer or mobile device regularly least likely to be concerned?

natural user interfacing

A(n) ______ is a collection of computers and devices connected together via communications devices and transmission media.

network

Cisco certifications that test knowledge of installing, configuring, operating, and administering ______.

networks

cisco certifications that test knowledge of installing, configuring, operating, and administering "blank"

networks

Net "blank" is the concept of open Internet, accessible to all users, without interference from ISPs or other third-parties

neutrality

The Internet is controlled by ________.

no one in particular

Each computer or device on a network is called a "blank"

node

Each computer or device on a network is called a(n) ______.

node

______ is an electrical disturbance that can degrade network communications.

noise

"blank" instructions remain on a storage medium until they are needed, at which time they transfer into memory

nonresident

______ instructions remain on a storage medium until they are needed, at which time they transfer into memory.

nonresident

some parts of the operating system are ____; that is, nonresident instructions remain on a storage medium until they are needed, at which time they transfer into memory.

nonresident

What lets users to type or write comments on a page?

note taking

A(n) ______ is an item that contains data, as well as the actions that read or process the data.

object

Which data type sometimes is called BLOB?

object

an "blank" is an item that contains data, as well as the actions that read or process the data

object

which data type is sometimes called BLOB?

object

When a company sends jobs overseas, outsourcing becomes ______.

offshoring

MMORPGs are

online role-playing games involving hundreds of thousands of players

Linux is ____ software, which means its code is provided for use, modification, and redistribution.

open source

Linux is a kind of software whose code is provided for use, modification, and redistribution. What kind of software is this?

open source

Operations

operates the centralized computer equipment and administers the network, including both data and voice communications.

A(n) ______ system is set of programs that coordinate all the activities among computer or mobile device hardware.

operating

Linux is an example of a?

operating system

the ___ determines the order in which tasks are processed.

operating system

when you purchase a computer or mobile device, it usually has a(n) ____ installed

operating system

If you decide you want to administer a network, you should look for jobs within the "blank" area

operations

"blank" is when an enterprise offloads storage management to an outside organization or cloud storage provider

outsourcing

On networks that use TCP/IP, "blank" software can detect problems, such as why traffic is flowing slowly

packet sniffing

On networks that use TCP/IP, ______ software can detect problems, such as why traffic is flowing slowly.

packet sniffing

A(n) ______ is the amount of data and program instructions that can be swapped at a given time.

page

What is the term for the process of swapping items between memory storage?

paging

the technique of swapping items between memory and storage, called ___, is a time-consuming process for the computer.

paging

Devices that share a Bluetooth connection are said to be ______.

paired

features unique to recent version of the iOS operating system include

passbook

A(n) ______ is a private combination of characters associated with the user name that allows access to certain computer, mobile device, or network resources.

password

Which of the following is a private combination of characters associated with a user name that allows access to certain computer resources?

password

a ____ is a private combination of characters associated with the user name that allows access to certain computer, mobile device, or network resources.

password

Most computer systems rely solely on ________ for authentication.

passwords

A(n) ______ is the destructive event or prank the virus delivers.

payload

On a P2P network, "P" stands for ______.

peer

FTP

permits users to transfer files to and from servers on the internet

Desktop

personal computer that is stationary; separate tower and screen

A scheme called ________ is designed to capture sensitive financial information from the person visiting a Web site.

phishing

Optical discs store items by using microscopic "blank" (indentations) and "blank" (flat areas)

pits/lands

Optical discs store items by using microscopic _____ (indentations) and _____ (flat areas).

pits/lands

During which phase of system development would you develop any necessary programs and apps?

planning

What best describes the role of a UX specialist?

plans and designs software and apps that consider a user's reaction to a program and its interface

The operating system sometimes is called the ______.

platform

The operating system that a computer uses sometimes is called the ___.

platform

the operating system sometimes is called the what?

platform

current "blank" use a row of charged wires to draw an electrostatic pattern on a specially coated paper and then fuse toner to the paper

plotters

Downloadable software extensions that add new features to a browser are known as ________.

plug-ins

Font size is gauged by a measurement system called ______.

points

USB Flash Drive

portable flash memory storage device that you plug into a USB port

Networks that use electrical lines are sometimes called ________.

power-line networks

information literacy

prepares students, employees, and citizens to manage information so that they can be knowledgeable decision makers.

Output

produce information (convey meaning to others)

Under what category of programs and apps do databases and enterprise computing fall?

productivity

online analytical processing (OLAP)

programs that analyze data, such as those in the decision support system,

COGNITIVE ASSESSMENT Q: You are in charge of an event at work. You want to plan and schedule events and resources. What type of software should you use?

project management

Productivity suites typically include, at minimum, all of the following EXCEPT ______.

project management

All of the following are advantages of using a computer network EXCEPT that it

promotes independence so users have exclusive control over their own data and applications.

the blackberry operating system is a ___ mobile operating system that runs on Blackberry smartphones and blackberry tablets

proprietary

A standard that outlines characteristics of how two devices communicate on a network is called a(n) ______.

protocol

technology service and repair field

provides preventive maintenance, component installation, and repair services to customers.

Memory Card

removable flash memory that you remove and insert from a slot in a computer

Power User

requires a powerful computer (Ex: Engineers, scientists, graphic artists)

ERP stands for Enterprise ______ Planning.

resource

Reboot is another term for ______.

restart

In a(n) ______, the DBMS uses the log to reenter changes made since the last save or backup.

rollforward

in a "blank", the DBMS uses the log to reenter changes made since the last save or backup

rollforward

Technology Education

teach employees how to use software and apps, design and develop systems, write programs, integrate and sync data from apps used on multiple devices, and perform other technology-related activities.

Training/Support

teaches employees how to use components of the information system or answers specific user questions.

which serves as an interface between programmers/developers and management?

technical project manager

______ is the use of communications and information technology to provide and assist with medical care.

telemedicine

Broadband connections include all of the following EXCEPT:

telephone modems

Throughput

the actual speed of data transfer that is achieved

batch processing

the computer collects data over time and processes all transactions later, as a group.

online transaction processing (OLTP)

the computer processes each transaction as it is entered.

What best defines what occurs when you partition a hard drive?

the hard drive is divided into separate logical storage areas that appear as distinct drives

What does a GPU control?

the manipulation and display of graphics an a display device

Data transfer rate

the maximum speed at which data can be transmitted between two nodes on a network

plug and play

the operating system automatically configures new devices as you install them.

What happens if your computer or mobile device uses up its available RAM

the operating system may use virtual memory

What happens if your computer or mobile device uses up its available RAM?

the operating system may use virtual memory

What is NOT true about network security?

the operating system on a network does not record unsuccessful sign-in attempts

what is paging?

the technique of swapping items between memory and storage

If no Windows installations are found, which option is disabled?

the upgrade option

Worms execute until

there is a lack of free memory or disk space

You work in a medical lab that requires high-quality dye-sublimation printers. What type of printers do you use?

thermal

label printers typically use "blank" technology

thermal

communications channel

transmission media on which the data, instructions, or information travel.

Digital Device Convergence

trend of computers and devices with technologies that overlap (Ex. Smart phone can do what a camera, game console, e-reader, etc can do in one)

A(n) ______ version is an application you can use at no charge for a limited time to see if it meets your needs.

trial

A WAN can be one large network or can consist of multiple LANs.

true

A consistency check tests the data in two or more associated fields to ensure that the relationship is logical and that the data is in the correct format.

true

A home network can be as simple as using a cable to connect two devices.

true

A queue is the lineup of documents waiting to be printed.

true

Because of its high transfer rates, UWB is best suited for transmission of large files.

true

Database software is another term for a DBMS.

true

FTTP uses fiber-optic cable to provide extremely high-speed Internet access to a user's physical permanent location.

true

Geofencing enables your phone to send or receive notifications when you enter or exit a geographic location.

true

IBM, Microsoft, Novell, Red Hat, and Sun offer certifications that test knowledge of their operating systems.

true

In a typical file processing system, each department or area within an organization has its own set of files.

true

Interference rules are a set of logical judgements that are applied to the knowledge base each time a user describes a situation to the expert system.

true

Megan's Law refers to a group of U.S. laws that require law enforcement agencies to share information in a national database about criminals who commit unlawful acts on children.

true

Mobile web apps are actually websites that provide a user experience similar to native apps.

true

Monitoring system performance is a part of the support and security phase.

true

Most TPSs use OLTP because users need information immediately.

true

One advantage of ERP is complete integration of information systems across departments.

true

Some operating systems allow users to control a network and administer security.

true

Some smartphones can also function as a wireless modem.

true

The computer may run slower while it uses virtual memory.

true

The defragmentation process reduces the amount of time it takes the hard disk to locate and access the files necessary for programs to run.

true

The goal of project management is to deliver an acceptable system to the user in an agreed-upon time frame, while maintaining costs.

true

The start-up process is similar for large and small computers and mobile devices.

true

The trend is toward device-independent operating systems.

true

Unlike a form, you use a report writer only to retrieve data.

true

Virtualization is the practice of sharing or pooling computing resources, such as servers or storage devices.

true

When an organization uses the database approach, many programs and users share the data in the database.

true

With MMS, users can send and receive photos, videos, and audio files

true

With MMS, users can send and receive photos, videos, and audio files.

true

With the database approach, the data is independent of the programs that access the data.

true

Without a data plan, you must use Wi-Fi or a wired connection to access the Internet.

true

You can use LinkedIn to follow companies to stay informed of their job opportunities.

true

macOS is a UNIX-based operating system.

true

t/f: A DisplayPort is an alternative to DVI that also supports high-definition audio and video

true

t/f: Because LCD projectors tend to produce lower-quality images, users often prefer DLP projectors for sharper, brighter images

true

t/f: Blu-ray players are backwards compatible with DVD and CD formats

true

t/f: Bluetooth technology is standardized globally, so it can be used to connect devices that are not of the same make or model

true

t/f: Dice and Monster are examples of career planning websites and apps

true

t/f: EIDE is an interface that uses parallel signals to transfer data, instructions, and information

true

t/f: FTTP uses fiber-optic cable to provide extremely high-speed internet access to a user's physical permanent location

true

t/f: HDTV is the most advanced form of digital television

true

t/f: In RAID level 1, a backup disk exists for each drive

true

t/f: NFC is a technology that uses close-range radio signals to transmit data between devices or a tag

true

t/f: OEM stands for original equipment manufacturer

true

t/f: a 2.1 speaker system contains two speakers and one subwoofer

true

t/f: a BAN is a type of PAN that wirelessly connects sensors worn by, carried by, implanted in, or attached to a human body

true

t/f: a DBMS uses the data dictionary to perform validation checks

true

t/f: a WAN can be one large network or consist of multiple LANs

true

t/f: a composite key consists on multiple fields

true

t/f: a consistency check tests the data in two or more associated fields to ensure that the relationship is logical and that the data is in the correct format

true

t/f: a digital pen is an input device that captures and converts a user's handwriting or drawings into a digital format

true

t/f: a home network can be as simple as using a cable to connect two devices

true

t/f: a queue is the lineup of documents waiting to be printed

true

t/f: a storage appliance has its own IP address

true

t/f: agile development guidelines emphasize adaption of goals and continuous improvement of the software or app

true

t/f: because of its high transfer rates, UWB is best suited for transmission of large files

true

t/f: bloggers use CMSs to post their blogs and provide categories to posts

true

t/f: census records, stock values, and corporate sales data is structured

true

t/f: diagnostic software included with a computer or device assists technician in identifying problems

true

t/f: expert systems are a component of artificial intelligence

true

t/f: geofencing enables your phone to send or receive notifactions when you enter or exit a geographic location

true

t/f: geofencing enables your phone to send or receive notifications when you enter or exit a geographic location

true

t/f: hard disks are read/write storage media

true

t/f: hard drives and flash memory storage use direct access storage techniques

true

t/f: if thrashing occurs, try to exit the program. If that does not work, try a warm boot and then a cold boot

true

t/f: in a typical file processing system, each department or area within an organization has its own set of files

true

t/f: in addition to the ball, a trackball usually has one or more buttons that work like mouse button

true

t/f: in some cases, the operating system for the network is a set of programs that are separate from the operating system on the client computers or mobile devices that access the network

true

t/f: information systems support daily, short-term, and long-range information requirements of users in a company

true

t/f: laser printers typically print at faster speeds than ink-jet printers

true

t/f: macOS is a UNIX-based operating system

true

t/f: mobile web apps are actually websites that provide a user experience similar to native apps

true

t/f: most TPSs use OLTP because users need information immediately

true

t/f: most magstripe readers are separate devices that communicate with POS terminal

true

t/f: one advantage of ERP is complete integration of information systems across departments

true

t/f: open source software has no restrictions from the copyright holder regarding modification of the software's internal instructions

true

t/f: open source software has no restrictions from the copyright holder regarding modifications of the software's internal instructions

true

t/f: operating systems that function as both desktop and server operating systems are called multipurpose operating systems

true

t/f: output is a data that has been processed into a useful form

true

t/f: output is data that has been processed into a useful form

true

t/f: outsourcing is when an enterprise offloads storage management to an outside organization or cloud storage provider

true

t/f: routers along the internet backbone forward data packets to their destination using the fastest available path

true

t/f: some DSL, installations include a dial tone, providing users with both voice and data communications

true

t/f: sometimes communications devices are preprogrammed to accomplish communications tasks

true

t/f: the computer may run slower while it uses virtual memory

true

t/f: the defragmentation process reduces the amount of time it takes the hard disk to locate and access the files necessary for programs to run

true

t/f: the goal of project management is to deliver an acceptable system to the user in an agreed-upon time frame, while maintaining costs

true

t/f: the process in which two or more computers or devices transfer data, instructions, and information is known as digital communications

true

t/f: the program specification package identifies required programs and the relationship among each program, as the input, output, and database specifications

true

t/f: the transfer rate of external hard drives usually is slower than that of internal hard drives

true

t/f: the trend is toward device-independent operating systems

true

t/f: to assist with sound decision making, information must have value

true

t/f: unlike a form, you use a report writer only to retrieve data

true

t/f: uses of RFID include tracking times of runners in a marathon and checking out library books

true

t/f: when an organization uses the database approach, many programs and users share the data in the database

true

t/f: with the database approach, the data is independent of the programs that access the data

true

t/f: without a data plan, you must use Wi-Fi or a wired connection to access the internet

true

t/f: you can use LinkedIn to follow companies to stay informed of their job opportunities

true

t/f: you should not remove a portable flash memory storage while it is in use because the operating system may still be accessing the device

true

The typical computer criminal is a(n)

trusted employee with no criminal record

Optical discs

type of storage media that consists of flat, round, portable media made of metal, plastic, and lacquer that is written and read by a laser (Ex: CDs and DVS)

IT consultant

typically hired based on expertise, provides technology services to his or her clients.

a ___ tool removes a program or app as well as any associated entries in the system files.

uninstaller

TCP/IP protocols define how information can be transferred between machines and how machines on the network can be identified with ________ addresses. a. unique b. similar c. identical d. multiple

unique

Every host computer on the Internet has a(n) ________.

unique IP address

field name

uniquely identifies each field.

Transmission from an earth-based station to a satellite is a(n) ______.

uplink

transmission from an earth-based station to a satellite is an "blank"

uplink

Smart TV

use internet to watch videos, listen to music, play games, and communicate with others while watching TV

______ information has meaning to the person who receives it

useful

Remote access means that a(n)

user is connecting to a network through a phone line, television cable, or wireless link

which of the following best describes the principal of least privilege?

user's access privileges are limited to the lowest level necessary perform required tasks

each user account typically consists of a ___ and password.

username

Newsgroups

users have written discussions on a particular subject

DSL

uses a standard phone line to connect your computer to the Internet

Fiber-optic service

uses plastic or glass cables to transfer the data at the speed of light

Home user

uses technology at home

Cable

uses your television's cable service provider to connect to the Internet

Which of the following kinds of drives is the drive from which a personal computer starts?

Boot

Which of the following is the process of starting or restarting a computer or mobile device?

Booting

In what decade was ARPANET developed?

1960s

You want to use the UMB cellular transmission standard on your new mobile phone. Which standard will you use?

4G

operating system (OS)

A set of programs that coordinates all the activities among computer or mobile device hardware.

Coaxial cable

A single copper wire surrounded by layers of plastic insulation, metal sheathing, and a plastic jacket; used mainly cable TV and cable Internet service

device driver

A small program that tells the operating system how to communicate with a specific device. Also called driver.

Packets

A small segment of data that's bundled for sending over transmission media. Each packet contains the address of the computer or peripheral device to which it's being sent

COGNITIVE ASSESSMENT Q: Which of the following is NOT true about software suites?

A software suite typically costs more than purchasing each application individually.

Network-attached storage (NAS) device

A specialized computing device designed to store and manage network data

Chromebox

A specialized desktop that runs Chrome OS.

Chromebook

A specialized laptop that runs Chrome OS.

cross-platform application

An application that runs the same on multiple operating systems.

Which of the following best defines the term cross-platform application?

An application that runs the same way on multiple operating systems

Mac OS X is a multitasking operating system available for computers manufactured by

Apple

What part of body does CVS effect?

Eyes

Features unique to recent versions of the Android operating system include

Google play

Chrome OS

Google's Linux-based operating system designed to work primarily with web apps.

Google Play

Google's app store that provides access to apps, songs, books, and movies.

real-time operating system (RTOS)

Operating system used by an embedded computer.

IBM, Microsoft, Novell, RedHat, Sun and others offer certifications that test knowledge of what?

Operating systems

A group of two or more integrated hard drives is called a ____

RAID

A group of two or more integrated hard drives is called a(n) ______.

RAID

What is the name of the storage technology that enables multiple hard disks to operate as single logical units?

RAID

a ______ is a flash memory storage device that contains its own processor to manage its storage

SSD

The term hard drive refers collectively to hard disks and ____.

SSDs

the term hard drive refers collectively to hard disks and ______

SSDs

What is the active partition?

The OS uses the active partition to boot the computer.

The keyboard shortcut for pasting text is CTRL+______ or COMMAND+______.

V

analysts often refer to the three ___'s when describing characteristics of big data

V's volume velocity variety

A "blank" is a third-party business that provides network services

VAN

A(n) ______ is a third-party business that provides network services.

VAN

________ is a secure electronic "tunnel" through the Internet that prevents unauthorized access or eavesdropping.

VPN

Which of the following jobs might use Google Cardboard to create storytelling tools?

VR engineer

which jobs might use Google Cardboard to create storytelling tools?

VR engineer

______ compares data with a set of rules or values to determine if the data meets certain criteria.

Validation

___, developed by Microsoft, is a proprietary mobile operating system that runs on some smartphones.

Windows phone

why would a field that contains numbers have a text data type?

because the values will not be used as calculations

Why would a field that contains numbers have a text data type?

because the values will not be used in calculations

_____ is currently the most popular network standard for LANs.

ethernet

knowledge base

is the combined subject knowledge and experiences of the human experts.

Satellite

is used in mostly rural or mountain areas that can't get DSL, cable, or FiOS

native app

is written for mobile devices running a particular mobile phone operating system.

"blank" data is stored in separate files in different departments

isolated

what would you type in cell A13 to make it an absolute cell reference format.

$A$13 you put dollar signs in front of it

What makes information valuable?

-Accurate Information is error free. -Verifiable information can be proven as correct or incorrect. -Timely information is useful only within a specific time period. -Organized information is arranged to suit the needs and requirements of the decision maker. -Accessible information is available when the decision maker needs it. -Useful information has meaning to the person who views it. -Cost-effective information should provide more value than its costs to produce.

Organization that sells domain names?

registrar

manufacturers measure optical disc drives relative to the original speed, using an X to denote a transfer rate of ____ KBps

5

What is an important safety precaution for preventing unauthorized access to your router?

-Installing antivirus software -Installing spyware detection software -Changing the default router password

A single fiber-optic cable can replace ________ copper telephone cables.

10,000

Over ________ were spent by businesses and government to repair problems in regard to Y2K.

100 billion dollars

Another name for the original Ethernet standard is ________.

10BASE-T Ethernet

With Bluetooth printing, the computer and printer need to be within a ___ foot range.

30

With Bluetooth printing, the computer and printer need to be within an approximate "blank" foot range

30

Which generation was the first to introduce MMS?

3G

________ uses high-bandwidth connections to communicate multimedia over wireless networks, but lacks true broadband speed.

3G

How many partitions can you have on a hard drive?

4

T3 connections transmit data at this speed:

45 Mbps

With ______ processing, the computer collects data over time and processes all transactions later, as a group.

??

What are the memory capabilities of the 32 bit and 64 bit CPU architecture?

A 32-bit OS is capable of addressing only 4 GB of system memory, while a 64-bit OS can address more than 128 GB.

What bit architecture can x86 support?

A 32-bit architecture that processes multiple instructions using a 32-bit address space.

which is NOT true about DSSs?

A DDS uses data only from internal sources

Which of the following is NOT true about DSSs?

A DSS uses data only from internal sources

Which of the following is NOT true about DSSs?

A DSS uses data only from internal sources.

What are the characteristics of a network operating system?

A NOS has the following characteristics: Supports multiple users Runs multi-user applications Provides increased security compared to desktop operating systems

Which of the following best describes the function of TPS?

A TPS captures and processes data from buisness activites

Which of the following best describes the function of a TPS?

A TPS captures and processes data from business activities

Which of the following best describes the function of a TPS?

A TPS captures and processes data from business activities.

Cat 6 cable

A UTP cable type that provides more than 1 Gb/s of throughput

Cable internet

A broadband service that transmits data over coaxial data

While waiting for devices to become idle so that they can receive additional instructions, where does the operating system place items?

A buffer

Which of the following describes e-commerce?

A business transaction that occurs over an electronic network

Fiber-optic cable

A cable that transmits data at close to the speed of light along glass or plastic fibers

What is a cleaning installation?

A clean installation of an OS proceeds as if the disk were brand new.

What is a cluster ?

A cluster is also called a file allocation unit. It is the smallest unit of space used for storing data.

What is a cylinder?

A cylinder is a stack of tracks lined up one on top of another to form a cylinder shape.

What is contained in the registry?

A database that contains all the information about the computer.

What are the characteristics of a desktop OS?

A desktop OS has the following characteristics: Supports a single user Runs single-user applications Shares files and folders on a small network with limited security

Home network server

A device designed to store media, share media across the network, and back up files on computers connected to a home network

Switch

A device for transmitting data on a network. A switch makes decisions, based on the media access control address of the data, as to where the data is to be sent

Network navigation device

A device on a network such as a router or switch that moves data signals around the network

Wireless range extender

A device that amplifies your wireless signal to get it out to parts of your home that are experiencing poor connectivity

Modem

A device that connects a network to the Internet

Network adapter

A device that enables the computer (or peripheral) to communicate with the network using a common data communication language, or protocol

Router

A device that routes packets of data between two or more networks

Which of the following is NOT true about OOP languages?

A disadvantage of OOP is that you cannot reuse or modify existing objects.

backup and restore

A duplicate of content on a storage medium that you can use in case the original is lost, damaged, or destroyed.

What is a file?

A file is a block of related data that is given a single name and treated as a single unit.

What is an audit trail?

A file that records access attempts

What happens when you partition a hard drive?

A hard drive is divided into specific areas called partitions.

Smart home

A house in which devices and appliances are automated or controlled by apps

Enterprise

A large organization that requires special computing solutions because of its size and geographical distribution.

What is a logic drive?

A logical drive is a section of an extended partition.

Peer-to-peer (P2P) network

A network in which each node connected to the network can communicate directly with every other node on the network

Service set identifier (SSID)

A network name that wireless routers use to identify themselves

Ethernet network

A network that uses the Ethernet protocol as the means (or standard) by which the nodes on the network communicate

What can you use to identify a problem with resources so that you can try to resolve any problems?

A performance monitor

desktop

A personal computer designed to be in a stationary location, where all of its components fit on or under a desk or table. Also called a desktop computer.

Linux

A popular, multitasking UNIX-based operating system that runs on a variety of personal computers, servers, and devices.

virtual memory

A portion of a storage medium, such as a hard drive or USB flash drive, that the operating system allocates to function as additional RAM.

What is virtual memory?

A portion of the hard disk designated to function as additional RAM

password

A private combination of characters associated with the user name that allows access to certain computer, mobile device, or network resources.

What is multi threading?

A program can be broken into smaller parts that are loaded as needed by the operating system. Multi threading allows different parts of a program to be run at the same time.

device-dependent

A program is one that runs only on a specific type or make of computer or mobile device.

Which of the following best describes a back door?

A program that allows users to bypass secuirty controls

performance monitor

A program that assesses and reports information about various computer resources and devices.

Which of the following best describes a rootkit?

A program that easily can hide and allow someone to take full control of your computer from a remote location.

COGNITIVE ASSESSMENT Q: Which of the following best describes an app?

A program that makes users more productive.

Blackberry operating system

A proprietary mobile operating system that runs on Blackberry smartphones and Blackberry tablets.

Windows Phone

A proprietary mobile operating system that runs on some smartphones.

What is a sector?

A sector contains 512 bytes.

A(n) ______ database stores data in tables that consist of rows and columns.

relational

image viewer

A tool that allows users to display, copy, and print the contents of a graphics file, such as a photo.

screen saver

A tool that causes a display device's screen to show a moving image or blank screen if no keyboard or mouse activity occurs for a specified time.

file manager

A tool that performs functions related to displaying files in folders; and copying, renaming, deleting, moving, and sorting files. (or) A tool that performs functions related to file management.

uninstaller

A tool that removes a program, as well as any associated entries in the system files.

disk defragmenter

A tool that reorganizes the files and unused space on a computer's hard disk so that the operating system accesses data more quickly and programs and apps run faster.

search

A tool, usually included with an operating system, that attempts to locate a file on your computer or mobile device based on criteria you specify.

What is a track?

A track is one complete circle that can contain data on one side of a hard drive platter. A track is broken into groups of sectors.

DSL (digital subscriber line)

A type of connection that uses telephone lines to connect to the Internet and that allows both phone and data transmissions to share the same line

Client/server network

A type of network that uses servers to deliver services to computers that are requesting them (clients)

user name

A unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user. Also called log on name or sign on name.

Satellite internet

A way to connect to the Internet using a small satellite dish, which is placed outside the home and is connected to a computer with coaxial cable. The satellite company then sends the data to a satellite orbiting the Earth. The satellite, in turn, sends the data back to the satellite dish and to the computer

What best describes a hot spot?

A wireless network that provides internet to mobile devices

"blank" is popular hardware certification

A+

______ is a popular hardware certification.

A+

Which of the following should you NOT do to secure a wireless network? A. Keep the default network name and router password. B. Create a security encryption passphrase. C. Implement media access control. D. Disable SSID broadcasting.

A. Keep the default network name and router password

Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA Soccer on his Xbox, and her dad is checking stock quotes on his iPad. What kind of network does this family have? A. P2P network B. Client/server network C. both A and B D. neither A and B

A. P2P network

Which of the following is FALSE? A. You can connect to any wireless network your computer detects. B. Your neighbor may be able to access your wireless network. C. Encryption makes it difficult to connect to a wireless network. D. Using default passwords makes it easier to hack into a router.

A. You can connect to any wireless network your computer detects

A(n) ______ is an output device that visually conveys text, graphics, and video information. a. Display b. Webcam c. Scanner d. Printer

A: Display

Which of the following best describes how you can use Facebook? a. Share messages, interests, activities, events, photos, and other personal information with friends. b. Follow people, companies, and organizations in which you have an interest. c. Share personal interests, education, and employment history. d. Create an online journal of short messages broadcast to your followers.

A: Share messages, interests, activities, events, photos, and other personal information with friends.

When you ______ computers and mobile devices, you match the files in two or more locations with each other. a. Sync b. Network c. Pair d. Link

A: Sync

Which Internet communication service can you use to speak to other users over the Internet? a. VoIp b. IM c. Email d. FTP

A: VoIP

Activity trackers and smartwatches are two types of ______ devices. a. Wearable b. Plug and play c. Streaming media d. GPS

A: Wearable

What is not true about PC's?

ACER, Dell, and HP use Mac operating system

What network became functional in 1969?

ARPANET

______ information is available when the decision maker needs it.

Accessible

What type of information is error free?

Accurate

______ information is error free.

Accurate

What is the central database that is used to manage network resources in Windows?

Active Directory

A "blank" tag contains a battery that runs the chip's circuitry and broadcasts a signal to the RFID reader

Active RFID

Which is not true about public Wi-Fi hot spot safety?

Always keep your wireless connection on

What is API (Application Programming Interface)?

An API allows programs to access the resources managed by the operating system in a consistent and reliable manner.

which best describes the function of an MIS?

An MIS captures and processes data from business activities

Which of the following best describes the function of an MIS?

An MIS captures and processes data from business activities.

Which of the following best describes the function of MIS?

An MIS generates information for problem solving

Help Desk Specialist

Answers technology-related questions in person, on the phone, or via email or an online chat room.

What is the function of PnP?

Assigning system resources and installing drivers are performed with a plug-and-play (PnP) process.

VoIP is a type of ____ output.

Audio

Which of the following regularly provides new features or corrections to a program?

Automatic update

Which of the following is NOT used to protect a wireless network? A. Changing network name B. Activating packet switching C. Using security protocols D. Disabling SSID broadcast

B. Activating packet switching

Which of the following statements is TRUE? A. Not broadcasting a wireless network's HTML helps to protect it. B. Router firmware should be kept up to date. C. Wireless networks cannot be protected. D. A firewall encrypts data.

B. Router firmware should be kept up to date.

A(n) ______ consists of programs designed to make users more productive and/or assist them with personal tasks. a. System software b. Application c. Operating system d. Server

B: Application

In the educational practice of BYOD, what does D stand for? a. Drive b. Device c. Disc d. Data

B: Device

Gennie has just gotten her first smartphone with a touch screen. Mia is giving her a lesson on how to use the touch screen. Gennie wants to move an item around on the screen. Mia tells her she should ______. a. Swipe b. Drag or Slide c. Press and Hold d. Stretch

B: Drag or Slide

Twitter and LinkedIn are examples of what kind of website? a. Search Engine b. Online Social Network c. Homepage d. Blog

B: Online Social Network

Which of the following is NOT a basic function of a computer? a. Store Information b. Produce Input c. Process Data d. Accept Data

B: Produce Input

Which of the following is NOT recommended advice to protect your computer from malware? a. Disconnect your computer from the Internet before opening email attachments. b. Remove firewall software and hardware. c. Close spyware windows. d. Scan removable media before using.

B: Remove firewall software and hardware.

Gennie has just gotten her first smartphone with a touch screen. Mia is giving her a lesson on how to use the touch screen. Gennie wants to zoom in. Mia tells her she should ______. a. Drag or slide b. Stretch c. Press and hold d. Swipe

B: Stretch

Which of the following is TRUE about Bluetooth?

BLUETOOTH IS FREE

You work part-time at a computer equipment store in the optical section. A customer asks about DVD formats. You tell her that a "blank" is more expensive DVD format that has higher capacity and better quality

Blu-ray

A personal area network is possible because of the wireless technology known as

Bluetooth

A Yes/No data type also is called ______.

Boolean

Large organizations may operate a ________ network to connect its LANs and transmit data at more than 1 gigabit per second.

Backbone

The major carriers of network traffic are called?

Backbone

Fitness games usually have what type of board?

Balance

________ refers to the quantity of data that can be transmitted through a communication medium in a given amount of time.

Bandwidth

Why would a field that contains numbers have a text data type?

Because the values will not be used in calculations.

why would a field that contains numbers have a text data type?

Because the values will not be used in calculations.

What must be done before an operating system can upgraded?

Before upgrading the operating system, check the minimum hardware requirements of the new OS to ensure that it can be installed successfully on the computer.

________ is the measurement of things such as fingerprints and retinal scans used for security access.

Biometrics

Which of the following is NOT a name of an Android release?

Blackberry

DSL and FTTP are examples of wired?

Broadband

You learn that by spooling documents to a(n) _____, the computer or mobile device can continue interpreting and executing instructions while the printer prints.

Buffer

Just as vehicles travel on a highway, bits travel on a _____.

Bus

Digital device ______ is the trend of computers and devices with technologies that overlap. a. Transference b. Merging c. Convergence d. Compatibility

C: Convergence

What is described as having a current knowledge of computers, mobile devices, the web, and related technologies? a. Computer certification b. Tech knowledge c. Digital literacy d. Webmaster

C: Digital Literacy

A common way to move an object from one location to another using a mouse is to ______. a. Double click b. Right click c. Drag d. Point

C: Drag

Which Internet communication service can you use to transfer items to and from other computers on the Internet? a. VoIP b. Email c. FTP d. IM

C: FTP

Trojan horses and zombies are examples of ______. a. Cloud apps b. Hackers c. Malware d. Search engine

C: Malware

Digital ______ includes music, photos, and videos. a. Animation b. Multiplex c. Media d. Payables

C: Media

Which of the following is NOT true about memory and storage? a. Hard disks and solid-state disks generally have the largest storage capacities. b. A storage device records and/or retrieves items to and from storage media. c. Most memory keeps data and instructions permanently. d. Storage devices often function as a source of input and output.

C: Most memory keeps data and instructions permanently

A mouse is an example of a(n) ______ device. a. Processing b. Display c. Pointing d. Output

C: Pointing

What is a person called who can accomplish many types of daily tasks using technology? a. Internet wizard b. Computer savant c. Tech savvy d. App efficient

C: Tech savvy

Which of the following best describes the term, the Internet of Things? a. The capability to store and locate information and data on the web. b. Convergence of technological capabilities from multiple devices into fewer. c. The ability of everyday devices to transmit data to and from the internet using sensors. d. The network of devices and computers that connect to the cloud.

C: The ability of everyday devices to transmit data to and from the internet using sensors.

Which of the following is NOT true about digital cameras? a. Many digital cameras have built-in GPS. b. A smart digital camera can communicate wirelessly with other devices. c. To record video, you must purchase a separate digital video camera. d. Digital cameras typically allow you to review, and sometimes edit images while they are on the camera.

C: To record video, you must purchase a separate digital video camera.

Personal Computer (PC)

Can perform input, processing, output, and storage activities alone and is intended to be used by one person (Ex: laptops, tablets, and desktops)

____ is the number of bytes a storage medium can hold.

Capacity

Critical Thinking Questions Case 4-1 Q: Your friends know that you understand a lot about computers, both the technical details of how they operate as well as information about software. Lately, with all of the concerns about copyright infringement, friends have started to ask you about categories of application software and what each kind permits. You tell your friends that all of the following are true EXCEPT:

Customers using freeware can personalize the software to meet their needs.

A _____ demands payment to stop an attack.

Cyberextortionist

Which of the following allows you to connect to the Internet wirelessly? A. WiFi B. 4G LTE C. Mobile hotspot D. All of the above

D. All of the above

Which of the following helps to protect a wireless network from Piggybacking? A. Deactivating packet switching B. Purchasing antivirus software C. Placing the router out of sight D. Limiting wireless signal range

D. Limiting wireless signal range

Which of the following would NOT be a benefit of networking computers? A. sharing printers and other peripherals B. sharing files C. sharing an Internet connection D. sharing software licenses

D. Sharing software licenses

Which of the following is used to access the Internet when WiFi is not available? A. mobile hotspot B. 3G Internet access C. 4G LTE Internet access D. all of the above

D. all of the above

Which of the following might cause interference or poor connectivity between nodes on a wireless network? A. nodes that are too far apart B. concrete walls C. some appliances D. all of the above

D. all of the above

Which of the following is most likely to require use of a server, desktop, and industry-specific handheld computer, and is most likely to use spreadsheets, databases, and accounting software? a. Power user b. Mobile user c. Home user d. Enterprise user

D: Enterprise User

You interact with a program through its user ______. a. Development unit b. Input window c. Protocol d. Interface

D: Interface

If you want to connect multiple devices together in your home to share a single Internet connection and devices such as a printer, what should you do? a. Create a hot spot. b. Pair the devices using Bluetooth. c. Subscribe to cloud services. d. Network your computers and devices.

D: Network your computers and devices

A(n) ______ is software that finds websites, webpages, images, videos, and other information related to a specific topic. a. Browser b. Web server c. Cloud app d. Search engine

D: Search Engine

A web ______ is a computer that delivers requested webpages to your computer or mobile device. a. Terminal b. Host c. Storage device d. Server

D: Server

Which type of system's primary function is to store and manage a company's documents in a central library?

DMS

which type of system's primary function is to store and manage a company's documents in a central library?

DMS

A(n) ________ server maintains look-up tables that map domain names to IP addresses.

DNS

Many phone companies offer ________, a technology for bringing broadband connections to homes and small businesses by sharing the copper telephone lines that carry voice calls.

DSL

Which of the following is NOT a wireless Internet connection?

DSL

Mobile Technology Expert

Develops and directs an organizations mobile strategy, including market and app development

Cognitive Engineer

Develops artificial-intelligence-based machines and programs based on data analysis to mimic human thought processes

What would you use to see what network adapters are installed in your Windows computer?

Device Manager utility

How is an operating system that runs on computers provided by a variety of manufacturers classified?

Device-independent

Which of the following statements is not true about device drivers?

Devices on a computer can share drivers

Which of the following is NOT true about Wi-Fi networks?

Devices only support one Wi-Fi standard.

Mobile hotspot

Devices that enable you to connect more than one device to the Internet; they require access to a data plan. Most smartphones have this capability built-in

Your friend Margo is considering what type of display to purchase w/ her new desktop computer & she asks you for advice. How do you tell Margo to measure the screens she is considering?

Diagonally, from one corner to another

Examples of broadband technologies include all of the following EXCEPT: a. DSL. b. dial-up. c. fiber-optic. d. All are broadband connections

Dial-Up

The following are all examples of broadband access EXCEPT ________. a. DSL b. cable c. satellite d. dial-up

Dial-Up

A ____ backup copies only files that have changes since the last full backup.

Differential

A voice message must be converted to a(n) ________ signal so it can be stored on a computer's hard drive.

Digital

Trend where they overlap?

Digital Convergence

Some security certifications relate specifically to the area of ____ _____.

Digital Forensics

What is having a current knowledge of computers?

Digital Literacy

What includes music, photos, videos?

Digital Media

T1 and T3 connections are considered ________ connections.

Direct

where your old system starts on one date and your new system starts the day after that. Riskiest of all the conversions

Direct Conversion

What are directories and sub directories called in Windows OS?

Directories are called folders in Windows operating systems, and subdirectories are called subfolders.

partitioning

Dividing a hard drive in separate logical storage areas (partitions) that appear as distinct drives.

_____ pitch is the distance in millimeters between pixels on a display.

Dot

Using a PC to copy software or data from a server, is known as

Downloading

a "blank" database stores data in tables that consist of rows and columns

relational

COGNITIVE ASSESSMENT Q: Which of the following is NOT true about databases?

Each column contains data about a given item in the database, such as a person or product.

Node

Each device connected to a network

Which of the following is NOT an advantage of the database approach?

Eliminates redundant data

In 1999, the Melissa virus was a widely publicized

Email Virus

An organization creates a recovery plan. Which part would include return procedures?

Emergency Plan

Which of the following best describes the users of a VPN?

Employees who work in other locations or who telecommute

What best describes, Internet of Things?

Everyday devices to transmit data to and from internet using sensors

QBE stands for query by _____.

Example

Which of the following MIS reports identifies data outside of a normal condition?

Exception

What identifies data outside of a normal condition?

Exception Report

A ____ system captures and stores human knowledge and then imitates human reasoning and decision making.

Expert

97. A session cookie stores user names and/or passwords so that users do not need to enter this info every time they sign in to the website.

False

A back end is a program that generally has a more user-friendly interface than the DBMS, T/F?

False

A back end is a program that generally has a more user-friendly interface than the DBMS.

False

A brownout is a complete power failure

False

A computer accepts data, called output.

False

A database analyst collects and analyzes evidence found on computers, networks, mobile devices, and databases.

False

A docking station has less functionality than a port replicator?

False

A format checker identifies passive voice and run-on sentences.

False

A hybrid app not only saves on development time and costs but also ensures a consistent user interface and fast performance on all devices.

False

A mail server stores and manages email list?

False

A mainframe network is a network of several servers in one location?

False

A numeric check determines whether a number is within a specified range, T/F?

False

A numeric check determines whether a number is within a specified range.

False

A password is unique combination of characters.

False

A query language consists of complex statements that allow users to specify data they want to display, print, store, update, or delete.

False

A query language consists of complex, abbreviated statements that allow users to specify data they want to display, print, store, update, or delete, T/F?

False

A query language consists of complex, abbreviated statements that allow users to specify data they want to display, print, store, update, or delete.

False

A relational database can store more than two dimensions of data, T/F?

False

A relational database can store more than two dimensions of data.

False

A segment of a video is called a slide.

False

A stick computer has a large amount of storage space?

False

"blank" is the operating system used by Amazon Kindle tablets?

Fire OS

A ________ is hardware or software that protects a wired network from intruders.

Firewall

Where may an operating system reside in a mobile device?

Firmware

___ consists of ROM chips or flash memory chips that store permanent instructions

Firmware

____ consists of ROM chips of flash memory chips that store permanent instructions.

Firmware

______ consists of ROM chips or flash memory chips that store permanent instructions.

Firmware

_____ feedback Is a technology that sends resistance to the gaming device in response to actions of the user.

Foce

What is NOT true about NFC?

For successful communications, the devices must not touch or come within 6 inches of each other

Which of the following is NOT true about NFC?

For successful communications, the devices must not touch within a certain distance....

Which of the following is NOT true about wireless access points?

For the best signal, ....

A ____ key is a special key programmed to issue commands to a computer.

Function

Critical Thinking Questions Case 4-2 Q: Your boss, Molly, asks you to create a spreadsheet for sales data for the store at which you both work. You want to add the numbers in a row or column. You use the SUM_____

Function

a typical enterprise consists of a wide variety of departments, centers, and divisions, collectively known as ___ ___.

Functional Units

human resources, manufacturing, and customer service are examples of what?

Functional Units

Mapping, monitoring speed, and determining altitude all are users of?

GPS

Mapping, monitoring speed, and determining altitude all are uses of

GPS

Mapping, monitoring speed, and determining altitude all are uses of ______.

GPS

The system of satellites used to determine any position on the Earth is known as

GPS

mapping, monitoring speed, and determining altitude all are uses of "blank"

GPS

Motion input sometimes is called _____ recognition.

Gesture

The fastest Ethernet devices today follow the ________ standard.

Gigabit Ethernet

Chrome OS, introduced by ____, is a Linux-based operating system designed to work primarily with web apps.

Google

Which of the following is NOT a desktop operating system?

Google Android

Your certification tested you ion administering, selling and deploying google apps. What is this called?

Google Apps certified specialist

Type of blindness that occurs when a persons attention is diverted?

Inattentional

The more secure an authentication system gets, the more __________ it becomes.

Inconvenient

The Open Group

Industry standards organization that now owns UNIX as a trademark.

____ ____ are a set of logical judgements that are applied to the knowledge base each time a user describes a situation to the expert system

Inference rules

A ____ system is a set of hardware, software, data, people. and procedures that work together.

Information

A(n) ______ system is a set of hardware, software, data, people, and procedures that work together.

Information

What browser is included with Windows?

Internet Explorer

Network administration

Involves tasks such as 1) installing new computers and devices 2) monitoring the network to ensure it is performing efficiently 3) updating and installing new software on the network and 4) configuring, or setting up, proper security for a network

Which of the following is most likely to be used by a remote control?

IrDA

You have been chosen as a TA in your networking class. Your instructor asks you to prepare a presentation on network standards. You mention in your report that the "blank" standard requires line of sight transmission

IrDA

which is most likely to be used by a remote control?

IrDA

_____ data is stored in separate files in different departments.

Isolated

______ data is stored in separate files in different departments.

Isolated

Which of the following is NOT true about operating systems?

It is not possible to run more than one operating system on the same computer.

If the web address of a website begins with https instead of http, what do you know about the website?

It is secure.

Which of the following statements is not true about user interfaces?

Most computers today use a command-line interface

What is a coaxial cable made of?

Mostly copper and aluminum

What type of operating system allows two or more programs or apps to reside in memory at the same time?

Multitasking

Networks, servers, mainframes, and supercomputers allow hundreds to thousands of users to connect at the same time, and thus operating systems are referred to as which of the following?

Multiuser

You are using technology to enable two devices to share contacts when they touch. What is the name for this technology?

NFC

to enable a computer or device that does not have built-in networking capability, use a "blank"

NFC

To enable a computer or device that does not have built in networking capability, use a what?

NIC

You are designing software that will allow users to interact with it through ordinary, intuitive behavior. Which of the following are you using?

NUI

Each individual computer and networked peripheral attached to a LAN is a

Node

Which of the following is a vendor of antivirus software?

Norton

______ software is an application that enables users to enter typed text or handwritten comments on a page.

Note taking

Which of the following includes and profits from installing trial versions of antivirus software on their computers?

OEMs

Which data type sometimes is called BLOB?

Object

thrashing

Occurs when an operating system spends much of its time paging, instead of executing application software.

Which of the following is NOT an example of an operating system?

Office

Broadband

Often referred to as "high speed internet" refers to the type of connection that offers a faster means to connect to the internet A broadband connection is a high-speed Internet connection such as cable, satellite, or digital subscriber line (DSL) . Broadband usually has a data transmission rate of 256 Kbps (kilobits per second) or greater

p2p network

One type of this network is simple, inexpensive network that typically connects fewer than 10 computers. Another type of peer to peer called this, describes an Internet network on which usesrs access each other's hard disk and exchange files directly.

What is the name of Microsoft's cloud server?

OneDrive

What are four examples of an API?

Open Graphics Library (OpenGL) DirectX Windows API Java APIs

What is meant by open source?

Open-source programs allow the source code to be distributed and changed by anyone as a free download or by developers at a much lower cost than other operating systems.

Which of the following is a set of programs containing instructions that coordinate all the activities among computer hardware resources

Operating System

What is the installation and initial booting of the operating system called?

Operating System Setup

multiuser

Operating system that enables two or more users to run programs simultaneously.

When smartphones suggest words for you to use its called?

Predictive

COGNITIVE ASSESSMENT Q: Which of the following is NOT true about presentation software?

Presentations are viewed as clip shows.

Which term is used to describe the practice that user's access privileges are limited to the lowest level necessary to perform required tasks

Principle of least privilege (POLP)

Which term is used to describe the practice that users' access privileges are limited to the lowest level necessary to perform required tasks?

Principle of least privilege (POLP)

You have just written a new app to intercept documents from the operating system that are to be printed and place them in the queue. What is this app called?

Print Spooler

2 main components on the motherboard?

Processor and memory

A host in a network preforms which tasks?

Provides services and connections to other computers on the network

Which of the following is least likely to be the reason for an automatic update?

Providing decryption

Which of the following is least likely to be a capability of the new server operating system your firm has developed?

Providing touch screen technology

Which of the following is NOT a green computing recommendation?

Purchase low-efficency equipment

Your store uses a type of 2-D bar code. What is another term for this type of code?

QR code

You realize your computer has been affected with malware. It seems as if someone is controlling your computer from a remote location. What type of malware is this?

Rootkit

_______ are hardware devices or software programs that direct messages as they travel between networks.

Routers

The _____ are adding palm prints to its fingerprint database.

Royal Canadian Mounted Police (RCMP)

Most email messages are junk email, also known as

SPAM

A ____ is a flash memory storage device that contains its own processor to manage its storage.

SSD

The student asks you which type of storage device is best to store the operating system and applications. You tell her that a ____ is a good option

SSD

Which of the following serves as an interface between programmers/developers and management?

Technical project manager

paging

Technique of swapping items between memory and storage.

What was ray kurzweil known for?

Technology inventor and futurist

Plug and Play

Technology that gives a computer the capability to recognize peripheral devices as you install them.

backward compatible

Term used to refer to a program's or device's capability of supporting older programs or devices, as well as newer programs or devices.

platform

Term used to refer to the operating system that a computer uses, because applications are said to run "on top of" it, or because the it supports the applications.

Wireless fidelity (WiFi)

The 802.11 standard for wireless data transmissions established by the Institute of Electrical and Electronics Engineers (EEE)

What does the OS enable user to do?

The OS enables the user to interact with the software and hardware.

Data Scientist

Use analytics and other big data techniques to interpret a company's data from a variety of sources to better understand its performance, make recommendations for improvement, and predict future outcomes.

Database Analyst

Use data modeling techniques and tools to analyze and specify data usage

______ information can be proved as correct or incorrect.

Useful

______ information has meaning to the person who receives it.

Useful

What three Windows tools can be used to migrate data?

User State Migration Tool Windows Easy Transfer File and Settings Transfer Wizard for Windows XP

command-line interface

User interface in which users type commands represented by short keywords or abbreviations or press special keys on the keyboard to enter data and instructions.

natural user interface (NUI)

User interface with which users interact with the software through ordinary, intuitive behavior.

graphical user interface (GUI)

User interface with which you interact with menus and visual images by touching, pointing, tapping, or clicking buttons and other objects to issue commands.

Which of the following is a unique combination of characters, such as letters of the alphabet and/or numbers, that identifies one specific user?

Username

Which of the following is NOT true about memory?

Users typically are referring to ROM when discussing memory

Which of the following best describes the principle of least privilege?

Users' access privileges are limited to the lowest level necessary perform required tasks.

802.11 is a series of standards to identify "blank" networks

Wi-Fi

An emerging standard of wireless Ethernet, also known as 802.11ad, is

WiGig

________ is a radio-based wireless standard which provides Wi-Fi style access with approximately 70 Mbps speeds to a 25-square mile area.

WiMAX

if you live in a metropolitan area and have a tower that is located in the central of the city, you can get FREE internet within a 30 mile radius of the tower. What is this called?

WiMAX

802.11 is a series of standards to identify ____ networks

Wifi

What is a collaborative Website called?

Wiki

What operating systems will be discussed in this chapter?

Windows 7, Windows Vista, and Windows XP operating system

You are looking for a product developed by Microsoft to enable your organizations to manage applications and websites either onsite or on the cloud. Which product will you use?

Windows Server

Which Window's resource offers additional applications for purchase?

Windows Store

Wallet

Windows app that provides a centralized location for coupons, credit cards, loyalty cards, and memberships in a single, easily accessible location.

stand alone os

a complete operating system that works on a desktop computer, notebook computer, or mobile computing device.

relational database

a database that stores data in tables that consist of rows and columns.

what is NOT true about hard disks

a desktop hard disk is much smaller than that of a laptop

which is not true about OOP languages?

a disadvantage of OOP is that you cannot reuse or modify existing objects

"blank" backup sometimes is called an archival backup

a full

Metropolitan area network (MAN)

a large are network (WAN) that links users in a specific geographic area such as an entire city

relationship

a link within the data.

database log

a listing of activities that change the contents of the database.

In a client/server model, a client program ________.

asks for information

VoIP is a type of "blank" output

audio

3D graphic of human body uses?

augmented reality

COGNITIVE ASSESSMENT Q: You are viewing a 3D graphic of a human body that you can use to visualize various muscles and organs by zooming in and out. What type of app are you likely using?

augmented reality

many programs, including operating systems, include a(n) ___ feature the regularly provides new features or corrections to the program

automatic update

What is a complex system that takes on nearly complete responsibility for a task eliminating the need for human input, verification, or decision making?

autonomous system

Which is NOT recommended for safe credit card use?

avoid using cards with photos

Which of the following best describes the function of a TPS?

b. A TPS captures and processes data from business activities.

Which of the following best describes the users of a VPN?

b. Employees who work in other locations or who telecommute

Which of the following serves as an interface between programmers/developers and management?

b. Technical project manager

Which of the following cloud services does Carbonite provide?

back up files

In a multitasking operating system, ______ programs are running but not in use.

background

______ compatible operating systems recognize and work with applications written for an earlier version of the operating system.

backward

new versions of an operating system usually are ___, which means they recognize and work with applications written for an earlier version of the operating system or platform

backward compatible

the amount of data, instructions, and information that can travel over a communications channel sometimes is called ____.

bandwidth

the amount of data, instructions, and information that can travel over a communications channel sometimes is called?

bandwidth

Two types of operating system user interfaces are graphical and ______.

command-line

two types of operating system user interfaces are graphical and what?

command-line

in a ___, a user types commands represented by short keywords or abbreviations or presses special keys on the keyboard to enter data and instructions

command-line interface

Which of the following is another term for transmission media?

communications channel

Gregor tells you that a "blank" check verifies that a required field contains data

completeness

Gregor tells you that a(n) ______ check verifies that a required field contains data.

completeness

You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor. Gregor tells you that a(n) ______ check verifies that a required field contains data.

completeness

Server

computer dedicated to providing one or more services to computers/devices on a network (can be large or small depending on how many computers it's supporting)

COGNITIVE ASSESSMENT Q: You are developing a spreadsheet for your small business. You are in the process of removing and adding text. What phase are you in?

editing

COGNITIVE ASSESSMENT Q: You want to remove red-eye from photos you took with your digital camera. You should use photo ______ software.

editing

To remove red eye in pictures you should use?

editing

Hardware

electric, electronic, and mechanical components that computers have; they process data and perform tasks through steps

Computer

electronic device, operating under instructions stored in memory, that can accept data, process data, produce information, and store information

which is NOT an advantage of the database approach?

eliminates redundant data

Ticket machines, ATMs, digital cameras, and robotics all use "blank" operating system

embedded

Ticket machines, ATMs, digital cameras, and robotics all use ______ operating systems.

embedded

Enterprise User

employee/customer who uses technology within an enterprise (hundreds or thousands of employees)

Small/Home Office User

employees of companies with <50 employees/ self employed who work from home/ small practices

which best describes the users of a VPN?

employees who work in other locations or who telecommute

Content management system (CMS)

enables and manages the publishing, modification, organization, and access of various forms of documents and other files, including media and webpages, on a network or the web.

Browser

enables users with internet connections to access webpages (Ex: chrome, firefox, safari)

RSS

enables web content to be distributed to subscribers

Online Social Network

encourages members to share interests, photos, videos, etc with others (Ex: Facebook)

alphabetic check

ensures that users enter only alphabetic data into a field.

Which type of user is most likely to use a RAID

enterprise

A "blank" keyboard has a design that reduces the chance of RSIs

ergonomic

If you are going to print an iron-on t-shirt transfer, you likely will use a "blank" printer

ink-jet

While working as an assistant in an IT department, you have been taking classes in information and system security. One of the jobs available at your current company is for a digital forensics analyst. What skill will you need to have to apply for the job?

inspect electronic data to recover documents and files

One example of a synchronous method of communication is...

instant messaging.

Enterprise Resource Planning (ERP)

intergrates MRPII with the information flow across an organization to manage and coordinate the ongoing activities of the enterprise.

Smartphone

internet capable phone with apps (programs)

Cloud Storage

internet service that provides storage

TCP/IP was developed as an experiment in ________, connecting different types of networks and computer systems.

internetworking

A "blank" translates and executes one instruction at a time and converts it to machine language

interpreter

A(n) ______ translates and executes one instruction at a time and converts it to machine language.

interpreter

Crowdsourcing

involving a large group of people (crowd) to collectively contribute time, ideas, funds to a project or common cause

user name

is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user.

Manufacturing Resource Planning II (MRP II)

is an extension of MRP that also includes product packaging and shipping, machine scheduling, financial planning, demand forecasting, and monitoring product quality.

transaction processing system (TPS)

is an information system that captures and processes data from day-to-day business activities.

expert system

is an information system that captures and stores the knowledge of human experts and then imitates human reasoning and decision making. -contains two main components: a knowledge base and inference rules

Management information systems (MIS)

is an information system that generates accurate, timely, and organized information, so that managers and other users can make decisions, solve problems, supervise activities, and track progress.

Artificial Intelligence (AI)

is the application of human intelligence to computers.

When describing the macOS interface, you tell her that she can use the "blank" to view, organize, and run apps

launchpad

You have been chosen as a TA in your networking class. Your instructor asks you to prepare a presentation IrDA. You mention in your report that IrDA uses "blank" to transfer data wirelessly

light waves

______ is a popular, multitasking UNIX-based operating system.

linux

A(n) ______ is a request for specific data from a database.

query

A(n) ______ is a request for specific data from the database.

query

Where do multiple documents line up in a printer?

queue

a "blank" is the line up of documents waiting to be printed

queue

multiple documents line up in a ____ in the buffer.

queue

RFID stands for ______ frequency identification.

radio

_____ is the process of transferring items from a storage medium into memory.

reading

_______ is the process of transferring items from a storage medium into memory

reading

Typically, an embedded computer uses an embedded operating system, sometimes called a ____ operating system.

real-time

A(n) ______ is a group of related fields.

record

In situations when a boot disk is required to restart a computer or device, the book disk is referred to as "blank" media

recovery

In situations when a boot disk is required to restart a computer or device, the book disk is referred to as ______ media.

recovery

In situations when a boot disk is required to restart a computer or device, the boot disk is referred to as ____ media.

recovery

Green Computing

reducing electricity consumed and environmental waste generated when using a computer (Ex: recycling, energy efficient hardware/features, regulating manufacturing processes, extending life of computers, properly disposing of computers)

jailbreaking

refer to hacking into Apple's iphones and Ipads.

rooting

refers to products running android and other operating systems.

When an operating system spends much of its time paging, it is said to be ______.

thrashing

when an operating system spends much of its time paging, it is said to be "blank"

thrashing

when a network reduces upload and download speeds of high-data users at peak time

throttling

Which of the following are shortcuts to an app or other content in Windows?

tiles

in windows 8, ___ are shortcuts to apps or other content.

tiles

"blank" information is useful only within a specific time period

timely

The company for which you work has just released an updated device driver version. Which of the following is least likely to be the reason for the release?

to manage new Internet connectivity issues

memory performance

to optimize the use of random access memory (RAM).

For which purpose would a business use EDI?

to send bids and proposal

for what purpose is keylogging software used?

to store every keystroke in a file for later retrieval

which best describes the function of a primary key?

to uniquely identify each record in a file

A "blank" key is one that switches between two states each time a user presses the key

toggle

Which of the following is most likely to be used by a LAN?

token ring

Which is NOT true about touch screens?

touch screens require separate input devices

Apple uses the term, "blank", to refer to the touchpad on its laptops

trackpad

TPS stands for ______ processing system.

transaction

An RFID reader is also called a(n) ______.

transceiver

An RFID reader is also called what?

transceiver

As it pertains to drives, which of the following best defines the purpose of a controller?

transfer data, instructions, and information from a drive to and from the system bus and other components

which best describe function creep?

when a company uses the technology intended for one purpose for a different purpose

All are true about TCP/IP except?

when a computer sends data over the internet, the data is grouped into a single packet

what best describes jail breaking?

when a user makes unauthorized modifications to a device's operating system

What is bluebugging?

when cyberthieves exploit Bluetooth devices that are paired

Technology overload

when someone feels distressed when without computers/mobile devices

Technology addiction

when someone is obsessed with using technology

802.11 is a series of standards to identify ______ networks.

wi-fi

what is the difference between sleep and hibernate mode?

with sleep mode the computer is placed in a low-power state

Columns and rows in a spreadsheet collectively are called a(n) ______.

worksheet

Internet

worldwide collection of computer networks that connect businesses, agencies, and people (Includes web, email, instant messaging, etc)

which cloud service does Evernote provide?

write documents

Storage Device

writes and reads items to and from storage media DVD drive (Storage device) accepts a DVD (Storage Media/type of optical disc)

"blank" is the process of transferring data, instructions, and information from memory to a storage medium

writing

What is the host name in the url?

www.nps.gov

What are the two common architecture use in Windows OS?

x86 x64


Set pelajaran terkait

Business Math Ch 14: Cost of Installment Buying

View Set

Chapter 7: Suitability and Investment Risks UNIT EXAM

View Set

Preterite, Imperfect, and Demonstrative Adjectives

View Set

Pharma Module 4: PrepU Quiz & Chapter 8 Terms (Quiz Completed on Sept.22, Chapter 8: Anti-Infective Agents)

View Set

PROPERTY INSURANCE- (ICAP-Property-IV)

View Set