Exam 3 Computer
All of the following are examples of desktop operating systems EXCEPT ______.
Android
Google Play is an example of a(n) ______.
App store
Why would a field that contains numbers have a text data type?
Because the values will not be used in calculations.
A Yes/No data type also is called ______.
Boolean
Which of the following is another term for transmission media?
Communications channel
Experian, Equifax, and Transunion are all types of ______ companies.
Credit reporting
Which of the following is NOT true about Wi-Fi networks?
Devices only support one Wi-Fi standard.
A data ______ contains data about each file in the database and each field in those files.
Dictionary
On computers running macOS, the ______ contains icons used to run apps, display minimized windows, and access documents.
Dock
You have been having issues with your printer, so you decide to learn more about how the printer works. You learn that if you replace your printer with a new one, you will have to install a(n) ______ to your computer.
Driver
Ticket machines, ATMs, digital cameras, and robotics all use ______ operating systems.
Embedded
______ is currently the most popular network standard for LANs.
Ethernet
QBE stands for query by ______.
Example
A(n) ______ is the smallest unit of data a user accesses.
Field
______ is the operating system used by Amazon Kindle tablets.
Fire os
Which of the following is NOT true about NFC?
For successful communications, the devices must not touch or come within 6 inches of each other.
Mapping, monitoring speed, and determining altitude all are uses of ______.
GPS
Which of the following is most likely to be used by a remote control?
IrDA
You have been chosen as a teaching assistant in your networking class. Your instructor asks you to prepare a presentation on network standards. You mention in your report that IrDA uses ______ to transfer data wirelessly.
Light waves
______ transmission often is called fixed wireless.
Microwave
Which of the following is most likely to be used for mobile phone payments?
NFC
Each computer or device on a network is called a(n) ______.
Node
On networks that use TCP/IP, ______ software can detect problems, such as why traffic is flowing slowly.
Packet sniffing
______ consists of one or more chips on the motherboard that hold items such as data and instructions while the processor interprets and executes them.
RAM
A(n) ______ database stores data in tables that consist of rows and columns.
Relational
The field ______ defines the maximum number of characters a field can contain.
Size
The area of the hard drive used for virtual memory is called a(n) ______ file.
Swap
In some database programs, a data file is referred to as a(n) ______.
Table
Which of the following best defines what occurs when you partition a hard drive?
The hard drive is divided into separate logical storage areas that appear as distinct drives.
What happens if your computer or mobile device uses up its available RAM?
The operating system may use virtual memory.
What is meant by the term Plug and Play?
The operating system that automatically configures new devices as you install or connect them
Which of the following best describes paging?
The technique of swapping items between memory and storage
When an operating system spends much of its time paging, it is said to be ______.
Thrashing
What is the purpose of ANSI and IEEE?
To propose, develop, and approve network standards
For which of the following purposes would a business use EDI?
To send bids and proposals
Which of the following best describes the function of a primary key?
To uniquely identify each record in a file
Data ______ is the process of presenting data graphically as charts, maps, or other pictorial formats.
Visualization
You have been chosen to be a teaching assistant in your database course. The instructor asks you to prepare a presentation on Big Data. Which of the following is NOT one of the three V's of Big Data.
Volatility
The Internet is the world's largest ______.
WAN
On devices running Windows (Mobile Edition), the ______ app provides a centralized location for coupons, credit cards, loyalty cards, and memberships.
Wallet
Which of the following best defines throttling?
When a network reduces upload and download speeds of high-data users at peak times
Which of the following best defines Bluebugging?
When cyberthieves exploit Bluetooth devices that are paired
802.11 is a series of standards to identify ______ networks.
Wi-Fi
What is the difference between sleep and hibernate mode?
With sleep mode the computer is placed in a low-power state.
Some web databases are ______ databases, where users store and share media with other registered users.
collaborative
You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor. Gregor tells you that when a DBMS flags a deleted record, ______.
it is deleted logically
File ______ refers to the procedures that keep data current
maintenance