cosc\

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

________ is the amount of data that can be transmitted across a transmission medium measured in bits per second.

Bandwidth

Which language do programmers use if the problem requires a lot of number crunching?

C++

Which of the following is NOT a factor to consider when selecting network cabling?

Cable diameter

Which of the following is NOT a common network topology?

Cluster

Which of the following is the first stage of the program development life cycle (PDLC)?

Describing the problem

During which phase of the system development life cycle are flowcharts and data-flow diagrams developed?

Design

________ is the standard communications protocol used on most client/server networks.

Ethernet

________ cable is NOT subject to electromagnetic interference or radio frequency interference.

Fiber-optic

Which of the following provides a visual representation of patterns that an algorithm comprises?

Flowchart

Special symbols called tags are used in which of the following languages?

HTML/XHTML

A(n) ________ address is the address that external entities use when communicating with your network.

IP

Which of the following statements describes dynamic decision making?

It is the ability of a Web page to decide how to display itself based on choices the reader makes.

Which language is used for applications that need to collect information from networked computers?

Java

Small Java-based programs are called ________.

Java applets

Which of the following statements about Java is FALSE?

Java can run only on a Windows operating system.

________ is a scripting language that's often used to add interactivity to Web pages.

JavaScript

The computers in a lab on a floor of a building would be connected using a ________.

LAN

What is the final step of the system development life cycle?

Maintenance and evaluation

Information is most closely related to which of the following?

Output

For business networks, which of the following is NOT one of the main cable types?

Polyviny

What is the first step of the system development life cycle?

Problem and opportunity identification

________ is the process of translating a task into a series of commands that a computer will use to perform the task.

Programming

Which statement about selecting the right programming language for a project is FALSE?

Programming languages require the same amount of time to execute.

________ is a text-based approach to documenting an algorithm.

Pseudocode

________ is the instructions programmers have written in a higher-level language.

Source code

Which of the following is the most commonly used client/server network topology?

Star

Which of the following is the final stage of the program development life cycle (PDLC)?

Testing and documentation

Which of the following development environments enables Web sites to talk to each other easily by introducing a standard way for software to interact through Web services?

The .NET Framework

Which statement does NOT describe fifth-generation languages?

They use a set of short, English-based commands (such as SUB) that speak directly to the CPU.

A ________ uses the Internet communications infrastructure to build a secure and private network.

VPN

Which of the following would NOT be used to build Web sites with interactive capabilities?

Visual Basic

________ is a powerful programming language used to build a wide range of Windows applications.

Visual Basic

Cars often have ________ networks.

Wi-Fi and Bluetooth

The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n) ________.

algorithm

A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.

authentication

A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall.

bastion host

Before its final commercial release, software is often provided free or at a reduced cost in a(n) ________ version to certain test sites or to interested users.

beta

A ________ sends data from one collision domain to another

bridge

Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.

brute force attack

PROLOG is an example of a ________.

5GL

How many steps are there in the system development life cycle?

6

In object-oriented programming, ________ allows a new class to automatically pick up all the data and methods of an existing class.

inheritance

In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.

jam

A(n) ________ error is caught when the program executes.

logical

The first-generation language is ________.

machine language

A(n) ________ is custom-built miniprogram that allows you to execute a complicated sequence of steps with a single command.

macro

The physical address assigned to each network adapter is called its ________ address.

media access control (MAC)

A ________ is a group of two or more computers, or nodes, configured to share information and resources.

network

Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network.

screening

A print server uses a print ________ as a software holding area for jobs waiting to be printed.

spooler

The ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.

terminator

The loop decision point consists of three features: an initial value, a set of actions to be performed, and a(n) ________.

test condition

In a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable.

bus

With object-oriented analysis, programmers identify categories of input that are part of the problem into ________.

classes

A ________ network can contain servers as well as individual computers.

client/server

Translating an algorithm into a programming language is called ________.

coding

The process by which program code is converted into machine language is called ________.

compilation

Keywords in a programming language that redirect the flow of a program based on a decision are called ________.

control structures

The flowchart shape for a binary decision is a(n) ________.

diamond

The description of what a program should do if the input data are invalid is called ________.

error handling

The binary sequence that instructs the CPU to run the programming code is called a(n) ________.

executable program

A(n) ________ server is a server that stores and manages files for network users.

file

A ________ keeps your computer safe by determining who is trying to access it.

firewall

A ________ is a visual diagram of a process, including the decisions that need to be made along the way.

flowchart

SQL is an example of a ________-generation language.

fourth

A ________ topology uses more than one topology when building a network.

hybrid

A variable declaration tells the operating system to allocate storage space ________.

in RAM

In a ________ network, each node connected to the network communicates directly with every other node.

peer-to-peer

The capability of moving a completed programming solution easily from one type of computer to another is known as ________.

portability

An integrated development environment (IDE) is a ________

program that translates code into binary 1s and 0s, ignores comments, and helps programmers input correct, appropriate code

A network ________ is a set of rules for how information and communications are exchanged.

protocol

An alternative approach to systems development, called ________, makes use of a prototype at the beginning of the project.

rapid application development (RAD)

A ________ sends information between two networks.

router

Division by zero is a(n) ________ error that is caught when the program executes.

runtime

FORTRAN, C++, and Java are all ________-generation languages

third

Ring networks use the ________ method to avoid data collisions.

token

An editor is a ________.

tool that helps programmers as they enter program code, highlighting keywords and alerting them to typos

The method of algorithm creation used when a programmer breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks is called ________.

top-down design

Most wired home networks use ________ cable, which is most susceptible to interference.

unshielded twisted-pair

Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a process called ________ programming.

visual

In a ________ system, each step is dependent on the previous step being completed first.

waterfall


Set pelajaran terkait

Pathophysiology Chapter 16 Endocrine System Disorders

View Set

Ecology Mastering Biology Questions

View Set

205. Bowel Path 3: Small and Large Bowel

View Set

Revolutions of 1830 and 1848 - 90%

View Set

AMSCO: Chapter 15 Reconstruction 1863-1877

View Set

What is Science?/ Scientific Knowledge

View Set