Technology in action Final study set
A ________ check compares the values of data in two or more fields to see whether those values are reasonable.
consistency
Twisted-pair cable
consists of pairs of copper wires twisted around each other and covered by a protective sheath
frame
container that can hold multiple data packets
client/server network
contains servers as well as client computers
Keywords in a programming language that redirect the flow of a program based on a decision are called ________.
control structures
An analog-to-digital converter chip ________.
converts the sound waves from voice into digital signals
Processing performance is affected by the number of processing paths called ________.
cores
Moodle and Blackboard are examples of ________.
course management software
Data in a multidimensional database is organized in a ________ format.
cube
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
cybercrime
Using your computer for non-work activities while you are being paid to do your job is known as ________.
cyberloafing
In a relational database, what is a relationship?
d. A link between tables that defines how the data are related
Which of the following is NOT a typical disadvantage associated with databases?
d. Database information cannot be changed once it is entered.
________ is the process of reducing data redundancy by recording data only once.
d. Normalization
All of the following are examples of network operating systems, EXCEPT ________. a. Windows Server b. Linux c. UNIX d. OS X Mountain Cougar
d. OS X Mountain Cougar
Which of the following is NOT a likely primary key?
d. Street address
Data in a multidimensional database is organized in a ________ format.
d. cube
A database schema is also called a(n) ________.
d. data dictionary
Classification, affinity grouping, and estimation are ________ methods used by managers to make their data more meaningful.
d. data mining
An example of ________ is customer demographic data purchased from third parties or statistics compiled by the federal government.
d. external data
The Siri speech-recognition feature on Apple's iPhone 4s is an example of a ________.
d. natural language processing (NLP) system
A ________ relationship indicates that for each record in a table, there is only a single corresponding record in a related table.
d. one-to-one
The _______ is(are) the group of programs that controls how your computer functions. a. utility programs b. application software c. user interface d. operating system
d. operating system
SQL uses ________ to extract records from a database by using English-like expressions that have variables and operations.
d. relational algebra
A ________ displays a subset of data from a table (or tables) based on the criteria specified.
d. select query
Nontraditional data such as audio clips, video clips, pictures, and very large documents are called ________ data.
d. unstructured
A database schema is also called a(n) ________.
data dictionary
packet
data is broken into small segments
Which of the following is NOT a data source for a data warehouse? A. Internal sources B. External sources C. Data mine D. Clickstream data
data mine
Classification, affinity grouping, and estimation are ________ methods used by managers to make their data more meaningful.
data mining
An Internet connectivity plan is also known as a ________.
data plan
Each of the following is a computer subsystem EXCEPT the:
data subsystem
The ________ is the maximum speed at which data can be transmitted between two nodes on a network.
data transfer rate
The ___ ____ indicates what type of data can be stored in a field.
data type
A ________ is a collection of related data that can be stored, sorted, organized, and queried.
database
A data dictionary is also called a(n) ________.
database schema
An Internet connectivity plan is also known as a ________.
dataplan
A value that automatically appears in a field unless the user enters a different value is called a(n) ______ value
default
route
designed to send information between two networks,
IDE
developmental tool to help programmers write, compile, and test programs
Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS
device driver
Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS.
device driver
Network adapters
devices that perform specific tasks to enable nodes to communicate on a network
A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.
digital signal processor
The OS allows you to organize the contents of your computer in a hierarchical structure of ________.
directories
The unique identification number assigned to your computer when you connect to the Internet is known by all of the following, EXCEPT ________ A. dotted quad B. dotted period C. dotted decimal D. IP address
dotted period
In Windows, a file path starts with a ________.
drive letter
For business networks, which of the following is NOT a main cable type? A. Twisted-pair B. Coaxial C. Duplex D. Fiber-optic
duplex
A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses.
dynamic
media access control
each network adapter has a physical address similar to a serial number on an appliance
Which of the following is NOT an advantage of using networks as compared to a stand-alone computer?
ease of maintenance and administration
With Windows Explorer, you can perform all of the following file management actions EXCEPT:
editing files
All of the following are extra precautions you can take to secure a wireless network, EXCEPT ________. A. change your network name (SSID) B. enable SSID broadcast C. turn on security protocols D. create a passphrase
enable SSID broadcast
Network adapters ________.
enable nodes in a network to communicate with each other
All of the following are part of the machine cycle, EXCEPT ________. A. fetch B. encode C. execute D. store
encode
CD ripping refers to ________.
encoding CDs to MP3 format
A(n) ________ virus runs a program that searches for common data files, compresses them, and makes them unusable.
encryption
Computer-aided design software is used primarily by ________.
engineers to create models
The most likely method a hacker would use to access a computer is ________.
entering through its Internet connection
The description of what a program should do if the input data are invalid is called ________.
error handling
An example of ________ is customer demographic data purchased from third parties or statistics compiled by the federal government.
external data
Which transmission medium transmits data the fastest?
fiber optic cable
Which transmission medium is able to transmit data the fastest?
fiber-optic cable
C:\Documents\Spring 2012\CIS 101\Term Paper\Computer Technology is an example of a ________.
file path
The location of a file is specified by its ________.
file path
A ________ keeps your computer safe by confirming who is trying to access it.
firewall
One way to increase security on a network is by installing a ________.
firewall
When setting up a network, you should set up any computers running the Microsoft Windows 7 operating system ________.
first
Which of the following is NOT a type of electronic database?
flat-file
Which of the following provides a representation of patterns that an algorithm comprises?
flowchart
Referential integrity means that for each value in the ____ _____ field of a table, there is a corresponding value in the primary key of the related table.
foreign key
SQL is an example of a ________-generation language.
fourth
The CPU is connected to the system memory by the ________.
front side bus
local area network (LAN)
generally small group of computers and peripherals linked together over a relatively small geographic area
CPU speed, also called clock speed, is currently measured in ________.
gigahertz
Microsoft Windows and Mac OS use a ________ interface.
graphical user
communications server
handles all communications between the network and other networks, including managing internet connectivity
data collisions
happen when two computers send data at the same time and the sets of data collide somewhere in the media
The purpose of network address translation (NAT) is to ________.
hide user IP address from the Internet
A cyberspace ________ is an attempt to make someone believe something that is untrue.
hoax
Due to the expansion of media files on home computers, ________ options are now being marketed; however, they are not as full featured as their business-world counterparts.
home network server
A ________ topology is created when more than one topology is used to build a network.
hybrid
________ provides high-speed information processing by enabling a new set of instructions to start before the previous set is finished.
hyperthreading
true
if else and For Next are examples of keywords.
unshielded twisted-pair (UTP)
if it does not contain a layer of foil shielding on a twisted-pair cable it is called
When data is changed or modified, failure to update the data in all appropriate places results in data __________.
inconsistency
To make sure your computer performs reliably, you can do all of the following EXCEPT:
increase the front side bus speed
Cascading style sheets have a hierarchy of styles that include all of the following EXCEPT:
independent
A(n) ____ ______ is a software-based solution used to gather and analyze business information.
information system
Network, database, and Web server administrators are generally considered part of the ________ department.
information systems
In object-oriented programming, ________ allows a new class to automatically pick up all the data and methods of an existing class.
inheritance
A typical ________ is made up of one or more network switches to which ISPs connect.
internet exchange point
A special numerical code that prioritizes device requests from the operating systems is called ________.
interrupt handler
A(n) ________ is used exclusively within a corporation or organization.
intranet
A(n) ________ is used exclusively within a corporation.
intranet
Which of the following would be a name of a Microsoft Access file?
inventory.accdb
packet screening
involves having external screening router examining incoming data packets to ensure that originated from or are authorized by valid users on internal network
virtualization
involves using specialized software to make individual physical servers behave as though they are more that one physical device
star topology
is most widely developed client/server network layout today because it offers the most flexibility for a low price
Web-based application software is software that ________.
is stored completely on a Web server instead of your hard drive
When you want to extract data from two or more tables, you use a(n) ________ query
join
When you want to extract data from two or more tables, you use a(n) ________ query.
join
The ________ is responsible for managing the processor and all other components of the computer system, and is an essential part of the operating system.
kernel
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.
keystroke loggers
An expert system and a natural language processing system are both ________.
knowledge-based systems
ASP
language that builds Web sites with interactive capabilities
XML
language that enables users to define their own tags
VBScript
language that introduces dynamic decision making into Web pages
java
language used to create applets that are delivered over the Web
A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT ________. A. use your debit card information to purchase items illegally B. assume your identity C. steal your logon and passwords for various accounts D. launch a denial of service (DoS) attack on your computer
launch a denial of service (DoS) attack on your computer
Throughput, the actual speed of data transfer that is achieved in a network, is usually ________.
less than or equal to the data transfer rate
Windows 7 introduces the concept of ________, which are folders that gather files from different locations and display the files as if they were all saved in a single folder.
libraries
A peer-to-peer network is an example of ________ administration.
local
A(n) ________ error is caught when the program executes.
logical
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
logical port blocking
A(n) ________ is custom-built miniprogram that allows you to execute a complicated sequence of steps with a single command.
macro
What is the final step of the system development life cycle?
maintenance and evaluation
Running the Disk Defragmenter utility will ________.
make the hard drive work more efficiently
switch
makes decisions, based on the MAC address of the data, as to where the data is to be sent and infracts it to the appropriate network node
print servers
manage all client-requested printing jobs for all printers on a network, which helps clients computer to compete more productive work by releasing them of printing duties
In a multidimensional database, each data cube has a _______ attribute, which is the main type of data that the cube is tracking.
measure
network operating system
meets to be installed on each client computer and server connected to the network to provide the services necessary the them to communicate
A ________ is approximately 1 million bytes.
megabyte
Front side bus speed is measured in ________.
megahertz
The small circuit boards that hold a series of RAM chips are called ________.
memory modules
Data describing other data in a database are called ________
metadata
Which of the following is specialized software made to display Web pages on a cell phone?
microbrowser
When referring to hard drives, access time is measured in ________.
milliseconds
Data staging consists of all of the following steps EXCEPT:
mining of data
Data staging consists of all of the following steps, EXCEPT ________. A. transformation of data B. mining of data C. storage of data in a warehouse D. extraction of data
mining of data
Data staging consists of all of the following steps, EXCEPT ________. extraction of data storage of data in a warehouse transformation of data mining of data
mining of data
A base transceiver station receives a request for cellular service and passes that request to a central location called a ________.
mobile switching center
Which of the following is NOT a benefit of having computers networked?
monitoring for efficiency
The speech-recognition feature of Microsoft Windows is an example of a ________.
natural language processing (NLP) system
A ________ runs a full-featured operating system and weighs less than two pounds.
netbook
A ________ allows multiple users to connect to the Internet through one connection.
network
A(n) ________ is a device connected to a network such as a computer or a game console.
node
Each device connected to a network is called a(n) ________.
node
Flash memory, used by most MP3 players, is a type of ________.
nonvolatile memory
In a database, ________ fields store numbers used to perform calculations.
numeric
In a database, a chart is stored in a(n) ________ field.
object
The type of software that is free and available with few licensing and copyright restrictions is known as ________ software.
open source
The _______ manages the flow of data and information through the computer system by coordinating the hardware, software, user interface processor, and system memory.
operating system
The most essential software in your computer system is the ________.
operating system software
When a business hires a third-party firm to provide services they once offered themselves, it is called ________.
outsourcing
Running the CPU at a faster speed than the manufacturer recommends is called ________.
overclocking
Data are sent through a network on bundles called ________
packets
In the URL http://www.pearsonhighered.com/techinaction, the portion labeled "techinaction" is the ________.
path
Which of the following is the process of sharing files between two or more computers?
peer-to-peer (P2P) sharing
FBI-related scams involve ________.
people pretending to represent official organizations
When malicious code is planted on your computer and alters your browser's ability to find Web addresses it is known as ________.
pharming
Microsoft's ________ enables you to create a 3-D walkthrough of your favorite vacation places.
photosynth
The amount of RAM that is actually on the memory modules in your computer is the ________ memory.
physical
Using a network without the network owner's permission is known as ________.
piggybacking
With regard to computer protection, quarantining is defined as ________.
placing a found virus in a secure area on the hard drive
The combination of operating system and processor in a computer is referred to as a computer's ________.
platform
Individual Internet users enter an ISP through a(n) ________.
point of presence
Which of the following classifications of viruses can change its own code to avoid detection? A. Stealth B. Multipartite C. Polymorphic D. Worm
polymorphic
An iPod is an example of a ________.
portable media player (PMP)
What is the first step of the system development life cycle?
problem and opportunity identification
email server
process and deliver incoming and outgoing email
All of the following are types of multimedia and entertainment software, EXCEPT ________. A. digital audio software B. gaming software C. drawing software D. productivity software
productivity software
compiler
program that understands both the syntax and the machine language
source-code
programmers' instructions written in a higher-level language
Software refers to a set of instructions that tells the computer what to do. These instruction sets are called ________.
programs
Open system Internet protocols replaced ________ system Internet protocols.
proprietary
In the URL http://www.pearsonhighered.com/techinaction, the portion labeled "http" is the ________.
protocol
database server
provides client computers with access to information stored in databases
A(n) ________ server acts as a liaison between an intranet and the Internet.
proxy
Which of the following is/are NOT part of a program's problem statement?
pseudocode, or the text-based approach to documenting the algorithm
All of the following involve tasks for network administration, EXCEPT ________. A. installing new computers and devices on the network B. updating and installing new software on the network C. setting up proper security for a network D. purchasing initial equipment for the network
purchasing initial equipment for the network
A print server uses a print ________ as a software holding area for printing jobs.
queue
A wireless network uses which of the following as its transmission medium?
radio waves
A ________ check allows you to set credits allowed for students during one quarter from 0 to 21.
range
Robotic cameras used by television stations for sports events require a ________ operating system
real-time
Some video games require a ________ operating system.
real-time
At a minimum, what content must all data packets contain?
recipient's address, sender's address, reassembling instructions, and data
In a database, a ________ is a group of related fields.
record
If a business keeps two lists, one for employee payroll and one for employee benefits information, both containing name and address information, this is an example of data ________.
redundancy
Which of the following is NOT a cascading style sheet layer? A. External B. Referenced C. Embedded D. Inline
referenced
________ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table.
referential integrity
network topology
refers to the physical or logical arrangement of computers, transmission media, and other network components
The ________ contains all of the different configurations used by the OS and by other applications.
registry
Which type of database excels in the storage of structured, analytical data?
relational
access card reader
relatively cheap device that ready information from a magnetic strip on the back of a credit card like access card
LogMeIn is an example of a ________.
remote access service for mobile devices
Decision points consist of binary decisions and ________.
repeating loops
In Windows, you can create ________ to reset your system in the case of a malfunction.
restore points
If fair allocation of network access is a major requirement of the network, choose a(n) ________ topology.
ring
A(n) ________ allows sharing of a broadband Internet connection.
router
Which of the following devices are used to send data between two networks?
routers
Sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network?
routers and switches
Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?
sampling rate
authentication server
server that keeps track of who is logging on to the network and which services on the network are available to each user
cloud servers
servers that are maintained by hosting companies and that are connected to networks via the internet
All of the following are benefits of networks EXCEPT, ________. A. sharing an Internet connection B. sharing printers and other peripherals C. sharing files D. sharing an operating system
sharing an operating system
Where will you find Xcode?
shipped with OS X
Text messaging is also called ________.
short message service (SMS)
The most full-featured and powerful cell phones are put in the category of ________.
smartphones
A computer network is defined as two or more computers connected with ________ so that they can communicate with each other.
software and hardware
Another way to obtain software is through ________, where a vendor hosts the software online over the Internet and you do not have to install it on your computer.
software as a service
course management
software used by instructors
tax preparation
software used in personal finance
desktop publishing software
software used to create newsletter
computer-aided
software used to design buildings
video editing
software used to make movies
A ________ uses electronic memory and has no motors or moving parts.
solid state drive
All of the following are examples of optical drives, EXCEPT ________. A. solid-state disc B. compact disc C. digital video disc D. Blu-ray disc
solid-state disc
All of the following are examples of optical drives, EXCEPT ________. A. solid-state disc B. compact disc C. digital video disc D. Blu-ray disc
solid-state drive
metropolitan area network (MAN)
sometimes governments organizations or civic groups establish WANS to link users in a specific geographic area
A(n) ________ enables the computer to drive the speaker system.
sound card
device driver
special communication software installed on all cline computers in a client/server network
token
special data packed used to pass data around
The type of software that is best used to create a simple budget is ________.
spreadsheet software
The four functions of the computer include input, process, output, and ________.
storage
SMS delivers messages to the appropriate mobile device using ________ technology.
store-and-forward
A(n) ________ is a specially designed computer that can perform complex calculations extremely fast
supercomputer
During the virtual memory process, the operating system moves data to a temporary storage area on the hard drive called the ________ file.
swap
A(n) ________ keeps track of data packets and, in conjunction with network interface cards, helps the data packets find their destination without running into each other on an Ethernet network.
switch
The star topology uses a central ________ to connect all network nodes.
switch
Ensuring that two devices, for example, a PC and a cell phone or smartphone, have the same files is the process of ________.
synchronizing
Every software program has a set of ________ that specify the minimum recommended standards for the operating system, processor, RAM, and hard drive capacity.
system requirements
A video card is an expansion card installed inside your ________
system unit
A video card is an expansion card installed inside your ________.
system unit
In a database, a group of related records is called a(n) ________.
table
In databases, information is organized in ________
tables, records and fields
A ________ was the first device with touch-screen capabilities.
tablet PC
<b> and <i> are examples of HTML ________.
tags
The ends of the cable in a bus network use a(n) ________ to absorb a signal so that it is not reflected back onto parts of the network that have already received the signal.
terminator
Which of the following allows you to download and play music with restrictions enforced about its use?
tethered downloads
All of the following are examples of multimedia, EXCEPT ________. A. streaming video B. text C. MP3 music files D. graphics
text
scalability
that more users can be added easily without affecting the performance of the other network nodes
Cache memory levels are determined by ________.
the chip's proximity to the CPU
The CPU consists of which two parts?
the control unit and the arithmetic logic unit
passive topology
the devices attached to a bus network do nothing to move data along the network
open systems interconnections
the institute of Electrical and electronics Engineers has taken the lead in establishing recognized worldwide networking protocols, including a standard of communications called
tunneling
the main technology for achieving VPN.
All of the following are used to classify network architectures, EXCEPT ________. A. the distance between nodes B. the protocol used to exchange data between nodes C. the communication medium used to transport data D. the number of nodes on the network
the number of nodes on the network
Moore's Law is a rule that predicts ________.
the pace at which CPUs improve
authentication
the process whereby users prove they have authorization to use a computer network
token method
the sending node then generates a new token and this starts the going around ring again
information assurance
the set of measures intended to protect and defend inflation and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation
Network architectures are classified according to ________.
the way in which they are managed and the distance between their nodes
Network architectures are classified according to ________.
the way they are controlled and the distance between their nodes
All of the following are considered cybercrimes, EXCEPT ________. A. identity theft B. non-delivery of merchandise C. theft of a cell phone D. hacking
theft of a cell phone
All of the following are true about real-time operating systems (RTOS), EXCEPT ________. A. they are also called embedded systems B. they are programs with specific purposes C. they require significant user interaction D. they are written specifically for the needs of the device
they require significant user interaction
FORTRAN, C++, and Java are all ________-generation languages.
third
decentralized
this me ants that users are responsible for creating their own data backups and for providing security for their computers
A ________ is a virus that is triggered on a certain date.
time bomb
A ________ is passed from computer to computer around the ring of a ring topology network.
token
Ring networks use the ________ method to avoid data collisions.
token
The method of algorithm creation used when a programmer breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks is called ________.
top-down design
In the URL http://www.pearsonhighered.com/techinaction, the portion labeled ".com" is the ________.
top-level domain
The root DNS servers know the location of all DNS servers that contain the master listings for an entire ________.
top-level domain
network administrators
training in computer and peripheral maintenance and repair, networking design, and the installation of networking software
interpreter
translates source code line by line into intermediate form
Normal telephone wire is ________.
twisted-pair cable
The most popular transmission media option for wired Ethernet networks is ________.
unshielded twisted-pair (UTP) cable
Nontraditional data such as audio clips, video clips, pictures, and very large documents are called ________ data.
unstructured
The percentage of time your CPU is working is referred to as CPU ________.
usage
Coaxial cable
used for televisions. has 4 components
Microsoft SilverLight
used to develop rich multimedia and interactive Web applications
web server
used to host a web site so it will be available thought the internet
The _______ of the operating system allows the user to communicate with the computer system.
user interface
biometric authentication devices
uses some unique characteristic of human biology to identify authorized users
virtual private network
uses the public internet communications infrastructure to build a secure private network among various locations
wireless media
usually add-ons that extend or improve access to a wired network
Which of the following types of programs help manage system resources such as the hard drive?
utility programs
Multimedia software includes all of the following, EXCEPT ________. A. image-editing software B. animation software C. utility software D. audio-editing software
utility software
_______ is the process of ensuring that the data entered into a field meets specified guidelines.
validation
A(n) _____ _____ is generally defined as part of the data dictionary and is specified in the field properties for each field.
validation rule
Software designed for a specific industry is known as ________ software.
vertical market
An expansion card that translates binary data into images is a(n) ________.
video card
guest servers
virtual servers sunning on a host machine
Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a process called ________ programming.
visual
Broadcasting your video to a live audience over the Web is referred to as ________.
webcasting
transmission media
whether for wired or wireless communications technology, comprise the physical system that data takes to flow between devices on the network
Most ________ allow you to connect wireless and wired computers to the same network.
wireless routers
The appropriate software to use for creating research papers is ________
word processing software
A(n) ________ takes advantage of file transport methods to spread on their own.
worm
All of the following are advantages of notebook computers EXCEPT:
you get more speed for a lower price
________ is a text-based approach to documenting an algorithm. A) Flowcharting B) Pseudocode C) Diagramming D) Flow analysis
B) Pseudocode
Which of the following development environments enables Web sites to talk to each other easily by introducing a standard way for software to interact through Web services? A) RAD B) The .NET Framework C) JavaScript D) PHP (hypertext preprocessor)
B) The .NET Framework
A(n) ________ is a set of specific, sequential steps that describe in natural language exactly what the computer must do to complete its task.
B) algorithm
Corona and Magmito can be used to develop ________. A) complex Web applications B) apps for smartphones C) Mac software D) Web pages
B) apps for smartphones
Keywords in a programming language that redirect the flow of a program based on a decision are called ________. A) pseudocode B) control structures C) directions D) operators
B) control structures
The description of what a program should do if the input data are invalid is called ________. A) exception handling B) error handling C) exception trapping D) error trapping
B) error handling
A variable declaration tells the operating system to allocate storage space ________.
B) in RAM
The first-generation language is ________. A) BASIC B) machine language C) COBOL D) assembly language
B) machine language
An alternative approach to systems development, called ________, makes use of a prototype at the beginning of the project. A) the waterfall method B) rapid application development (RAD) C) the iterative method D) integrated development (ID)
B) rapid application development (RAD)
Who is responsible for writing internal documentation for software programs?
B) technical writers
P2P networks become difficult to manage when they are expanded beyond __________ users. A. 5 B. 10 C. 20 D. 50
B. 10
Windows 8 is offered in ______ versions. A. 1 B. 2 C. 3 D. 4
B. 2
If a numeric field has a size of 5, which is the highest number it can hold? A. 5 B. 99999 C. 55555 D. 50000
B. 99999
A set of rules for exchanging electronic information is called ______. A. handshaking B. a computer protocol C. DHCP D. an open system protocol
B. A Computer Protocol
Which type of virus was the famous Michelangelo virus? A. A worm B. A time bomb C. A script virus D. An e-mail virus
B. A time bomb
Which statement pertaining to system reliability is FALSE? A. Having the latest version of software products can make your system more reliable B. An accumulation of temporary Internet files has no effect on your computer's overall performance. C. You can clean out unnecessary programs from your Startup folder. D. When you defrag your hard drive, it works more efficiently
B. An accumulation of temporary Internet files has no effect on your computer's overall performance.
The most popular tablet operating system was developed by _______. A. Microsoft B. Apple C. Google D. Symbian
B. Apple
________ is the maximum speed at which data can be transferred between two nodes. A. Throughput B. Bandwidth C. Band Speed D. Through Speed
B. Bandwidth
Which of the following devices sends data from one collision domain to another? A. Switch B. Bridge C. Link D. Band
B. Bridge
Which of the following networks is most known for data collisions? A. Star B. Bus C. Hierarchical D. Cluster
B. Bus
Which of the following activities is carried out by the arithmetic logic unit (ALU)? A. Movement of read/write heads B. Completion of all arithmetic calculations C. Creation of virtual memory D. Coordination of all other computer components
B. Completion of all arithmetic calculations
Creating and disseminating ______ is one of the most widespread types of crimes. A. Spam B. Computer viruses C. fake credit cards D. FBI related scams
B. Computer viruses
In most current systems ______ is the type of RAM used. A. DDR2 B. DDR3 C. DDR4 D. DDR5
B. DDR3
A _____ server takes a pool of IP addresses and shares them with hosts on the network on an as-needed basis. A. DOM B. DHCP C. CDIR D. CGI
B. DHCP
the computer port that is used to connect televisions and DVD players is the _____. A. VGA B. DVI C. HDMI D. LCD
B. DVI
What does the acronym DBMS stand for? A. Database modeling system B. Database management system C. Data building and modeling system D. Data browsing and management system
B. Database management system
Which of the following Windows utility programs arranges pieces of files on your hard drive in sequential order? A. Disk cleanup B. Disk Defragmenter C. Error Checking D. Task manager
B. Disk Defragmenter
All of the following are part of the machine cycle, EXCEPT _____. A. Fetch B. Encode C. Execute D. Store
B. Encode
Laptops are often equipped with a(n) ________ slot that allows you to read flash memory cards such as CompactFlash, memory sticks, and secure digital cards. A. eSATA B. ExpressCard C. USB D. FireWire
B. ExpressCard
________ cable is NOT subject to electromagnetic interference or radio frequency interference. A. Twisted-pair B. Fiber-optic C. Polycarbonate D. Coaxial
B. Fiber-optic
What utility takes out redundancies in a file to reduce the file size? A. Disk cleanup B. File Compression C. Error-checking D. System restore
B. File Compression
Live bookmarks is a feature in ___________ that adds the technology old RSS feeds to bookmarks. A. Safari B. Firefox C. Internet Explorer D. Chrome
B. Firefox
A _________ keeps your computer safe by confirming who is trying to access it. A. Gateway B. Firewall C. Hub D. Switch
B. Firewall
______ keyboards can be rolled up and put in your backpack. A. Virtual laser B. Flexible C. Elastic D. Dvorak
B. Flexible
______ keyboards can be rolled up and put in your backpack. A. Virtual laser B. Flexible C. Elastic D. Dvorak
B. Flexible
_______ are shortcut keys that you press to perform special tasks; each software application has its own set of tasks assigned to these keys. A. Alt keys B. Function keys C. Control (Ctrl) keys D. Windows keys
B. Function Keys
A visual search engine that uses pictures from our smartphone to search the Web for more information is known as ______. A. Google Glasses B. Google Goggles C. Explorer Eyes D. Explorer Shades
B. Google Goggles
Which of the following was created especially for the transfer of hypertext documents across the Internet? A. SSL B. HTTP C. TLS D. HTML
B. HTTP
A(n) ______ address is a unique number that identifies a computer, server, or device connected to the Internet. A. TCP B. IP C. CGI D. NetBIOS
B. IP
Which of the following is NOT a main operation of a database management system (DBMS)? A. Creating databases and entering data B. Implementing data mining C. Viewing and sorting data D. Outputting data
B. Implementing data mining
Computers gather data, which means that they allow users to ________ data. A. present B. Input C. output D. Store
B. Input
The _____ provides leadership for the orderly growth and development of the Internet. A. W3C B. Internet Society C. ICANN D. IEEE
B. Internet Society
Which of the following statements describes dynamic decision making? A. It occurs during the second phase of the SDLC. B. It is the ability of a Web page to decide how to display itself based on choices the reader makes. C. It is an alternative method used in system designs. D. It is part of the flowcharting phase of algorithm creation.
B. It is the ability of a Web page to decide how to display itself based on choices the reader makes.
Which language is used for applications that need to collect information from networked computers? A. HTML B. Java C. COBOL D. FORTRAN
B. Java
Which of the following statements about Java is False? A. Its object- oriented model enables programmers to benefit from it large set of existing classes. B. Java can run only on a Windows operating system C. The Java program can run on an CPU or operating system D. Java needs to be compiled only once
B. Java can run only on a Windows operating system
____ is a scripting language that's often used to add interactivity to Web pages. A. Visual Basic B. JavaScript C. C-Script D. C#
B. JavaScript
Most supercomputers use the ________ operating system. A. UNIX B. Linux C. Windows D. iOS 5
B. Linux
A _____________ is a virus that is attached to documents such as a word or excel files. A. script virus B. Macro virus C. Polymorphic Virus D. Worm
B. Macro virus
The rule of thumb that predicts that CPU capacity will double every two years is called ______. A. CPU Rule B. Moore's Law C. Intel's Law D. Express Rule
B. Moore's Law
The latest version of the Mac OS X is the ______. A. Snow leopard B. Mountain Lion C. Mountain Cougar D. Snow Tiger
B. Mountain Lion
A _______ enables your computer to connect to other computers or to the Internet A. Video card B. Network interface card (NIC) C. Sound card D. Controller card
B. Network interface card (NIC)
_____ lines are high-speed, fiber-optic communications lines. A.T B. OC C. DSL D. Cable
B. OC
All of the following are examples of database software, EXCEPT _____. A. Oracle B. OneNote C. My SQL D. Access
B. OneNote
4. _____ software helps you manage e-mail, contacts, calendars, and tasks in one place. A. database B. Personal information manager C. spreadsheet D. word processing
B. Personal information manager
________ software helps you manage e-mail, contacts, calendars, and takes in one place. A. Database B. Personal information manager C. Spreadsheet D. Word processing
B. Personal information manager
Microsoft's _______ enables you to create a 3-D walkthrough of your favorite vacation places. A. Photostitch B. Photosynth C. Photosync D. Photosee
B. Photosynth
Which of these statements about physically protecting your computer is FALSE? A. The computer should sit on a flat level surface. B. Power surges can be blocked by using a computer surround. C. It is best to unplug computers during an electrical storm. D. Old surge protectors can deliver power to your computer without protecting it.
B. Power surges can be blocked by using a computer surround.
_________ is the process of translating a task into a series of commands that a computer will use to perform the task. A. SDLC B. Programming C. Flowcharting D. Diagramming
B. Programming
Software refers to a set of instructions that tells the computer what to do. These instructions set are called ______. A. database B. programs C. peripherals D. Devices
B. Programs
The area that holds all the instructions the computer needs to start up when it is powered on is ______. A. RAM B. ROM C. USB D. CPU
B. ROM
Which of the following is NOT a cascading style sheet layer? A. External B. Referenced C. Embedded D. Inline
B. Referenced
Which protocol is used to transmit e-mail over the Internet? A. FTP B. SMTP C. HTTP D. VolP
B. SMTP
Where will you find Xcode? A. Shipped with Windows 7 B. Shipped with OS X C. As an add-on as a downloadable complier D. As code behind Web pages
B. Shipped with OS X
Which program provides a seven layer overwrite for the Mac operating system? A. File shredder B. Shredlt X C. Eraser D. Wipe
B. Shredlt X
A _____ uses electronic memory and has no motors or moving parts. A. Mechanical hard drive B. Solid state drive C. Blu-ray disc D. Digital video disc
B. Solid state drive
All of the following are media management software used to organize music, video, and pictures, EXCEPT _____. A. Windows Media Player B. Sony Sound Forge C. Apple Itunes D. Winamp
B. Sony Sound Forge
One virus called _______ is used to trick users into downloading an infected file to their phone, which steals online banking information. A. Spyware Mobile Banking B. Spyeye Mobile Banking C. Spyware Online Banking D. Spyeye Online Banking
B. Spyeye Mobile Banking
. ______ is the main suite of protocols used on the Internet. A. FTP B. TCP/IP C. SMTP D. UDP
B. TCP/IP
The browser feature where tabs are independent of each other is known as ______. A. Pinned tabs B. Tab isolation C. Tear off tabs D. Session tabs
B. Tab Isolation
Which of the following does NOT occur during the power-on self-test? A. The video card and video memory are tested. B. The OS is moved into RAM. C. The BIOS is identified. D. Memory is tested
B. The OS is moved into RAM.
The CPU consists of which two parts? A. The arithmetic logic unit and the front side bus B. The control unit and the arithmetic logic unit C. The control unit and the front side bus D. The control unit and cache memory
B. The control unit and the arithmetic logic unit
_______ is a social networking service that enables you to exchange short text messages with your friends or "followers." A. Facebook B. Twitter C. MySpace D. Yahoo! Text
B. Twitter
Which of the following types of programs help manage system resources such as the hard drive? A. Application software B. Utility programs C. Productivity software D. Application programming interfaces
B. Utility programs
RAM is a ______ storage location A. Permanent B. Volatile C. Nonvolatile D. Network
B. Volatile
You can block logical ports to invaders and make your computer invisible to others on the internet by installing _____. A. a packet sniffer B. a firewall C. a packet filter D. antivirus software
B. a firewall
QuickBooks and Peachtree are examples of _______ software. A. educational B. accounting C. course management D. gaming
B. accounting
A(n) _________ server tracks who is logging on to the network as well as which services on the network are available to each user. A. gateway B. authentication C. dedicated D. file
B. authentication
In a transaction-processing system, if transaction data are accumulated until a certain point and then many transactions are processed all at once, this is called ______ processing. A. delayed B. batch C. real-time D. group
B. batch
In a transaction-processing system, if transaction data are accumulated until a certain point and then many transactions are processed all at once, this is called ________ processing. A. delayed B. batch C. real-time D. group
B. batch
Computer use the _____ language consisting of 0's and 1's. A. symbol B. binary C. byte D. system
B. binary
________ viruses are often transmitted by a flash drive left in a USB port. A. logic bomb B. boot-sector C. macro D. encryption
B. boot-sector
With object-oriented analysis, programmers identify categories of input that are part of the problem into ______. A. blocks B. classes C. units D. tables
B. classes
Which of the following is NOT a common network topology? A. star B. cluster C. bus D. ring
B. cluster
Computers that typically use special security protocols to protect personal, sensitive buyer information are known as ______ servers. A. point of sale B. commerce C. business D. Web
B. commerce
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? A. social networking B. cybercrime c. phishing d. hacking
B. cybercrime
The unique identification number assigned to your computer when you connect to the Internet is known by all of the following, EXCEPT A. dotted quad B. dotted period C. dotted decimal D. IP address
B. dotted period
All of the following are extra precautions you can take to secure a wireless network, EXCEPT ________. A. change your network name (SSID) B. enable SSID broadcast C. turn on security protocols D. create a passphrase
B. enable SSID broadcast
Network adapters _________. A. are built into the motherboard on each node B. enable nodes in a network to communicate with each other C. are always Ethernet NICS D. are necessary only on servers in a client/server network
B. enable nodes in a network to communicate with each other
All of the following are parts of the machine cycle, EXCEPT ______. A. fetch B. encode C. execute D. store
B. encode
CD ripping refers to _______. A. stealing songs off the Internet B. encoding CDs to MP3 format C. creating your own CDs from your MP3 collection D. erasing content on a CD
B. encoding CDs to MP3 format
The binary sequence that instructs the CPU to run the programming code is called a(n) ________. A. source file B. executable program C. base code D. interpreted program
B. executable program
An example of ________ is customer demographic data purchased from third parties or statistics compiled by the federal government. A. internal data B. external data C. imported data D. metadata
B. external data
A _____ temporarily displays records that match the specified criteria. A. sieve B. filter C. validation rule D. field constraint
B. filter
A _________ keeps your computer safe by confirming who is trying to access it. A. gateway B. firewall C. hub D. switch
B. firewall
Presentation software includes all of the following features, EXPECT______. A. animation effects B. formulas C. transitions D. themes
B. formulas
Adware and spyware are referred to collectively as __________. A. viruses B. grayware C. altertware D. firmware
B. grayware
A variable declaration tells the operating system to allocate storage space _____. A. on the bus B. in RAM C. in the CPU D. on the hard drive
B. in RAM
Data ______ means that the data contained in a database is accurate and reliable. A. efficiency B. integrity C. redundancy D. consistency
B. integrity
A special numerical code that prioritizes device requests from the operating systems is called _______. A. event B. interrupt handler C. interrupt D. spooler
B. interrupt handler
A(n) _________ is used exclusively within a corporation or organization. A. VPN B. intranet C. extranet D. Internet
B. intranet
When you want to extract data from two or more tables, you use a(n) _____ query. A. select B. join C. relational D. object
B. join
A(n) _____ is custom built miniprogram that allows you to execute a complicated sequence of steps with a single command. A. micro B. macro C. application D. applet
B. macro
Data staging consists of all of the following steps, EXCEPT ________. A. transformation of data B. mining of data C. storage of data in a warehouse D. extraction of data
B. mining of data
10. For the nodes on a network to communicate with each other and access the network, each node needs a __________. A. DSL modem B. network adapter C. network interface card D. router
B. network adapter
An _____ needs to be installed on each client computer and server connected to the network to provide the services necessary for them to communicate. A. application software B. network operating system C. protocol guideline D. switch
B. network operating system
Client/Server networks are controlled by a central server that runs a special piece of software called _______. A. Windows 7 B. network operating system (NOS) C. firewall D. firmware
B. network operating system (NOS)
8. A(n) ________ is a device connected to a network such as a computer or a game console. A. architecture B. node C. server D. modem
B. node
In a database, ______ fields store numbers used to perform calculations. A. date B. numeric C. computational D. alphanumeric
B. numeric
In a database, a chart is stored in a(n) ______ field. A. text B. object C. memo D. hyperlink
B. object
After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered ________. A. data B. output C. input D. a process
B. output
When malicious code is planted on your computer and alters your browser's ability to find Web addresses it is known as ________. A. phishing B. pharming C. pretexting D. phlying
B. pharming
With regard to computer protection, quarantining is defined as ________. A. updating your antivirus software B. placing a found virus in a secure area in the hardware C. repairing an infected file d. deleting an infected file
B. placing a found virus in a secure area in the hardware
Adobe Reader, Flash Player, and Quick time Player are all examples of special software programs called _____. A. aggregators B. plug-ins C. podders D. browsers
B. plug-ins
Which statement about selecting the right programming language for a project is FALSE? A. some programming languages might take up too much space for a particular project B. programming languages require the same amount of time to execute C. select a language that is easy for programmers to use and maintain D. Certain languages are customized to support a UNIX or Windows environment
B. programming languages require the same amount of time to execute
A print server uses a print ____ as a software holding area for printing jobs. A. stack B. queue C. buffer D. heap
B. queue
A ______ check allows you to set credits allowed for students during one quarter from 0 to 21. A. completeness B. range C. consistency D. numeric
B. range
If a business keeps two lists, one for employee payroll and one for employee benefits information, both containing name and address information, this is an example of data ________. A. integrity B. redundancy C. completeness D. normalization
B. redundancy
If fair allocation of network access is a major requirement of the network, choose a _______ topology. A. cluster B. ring C. bus D. star
B. ring
Division by zero is a(n) ________ error that is caught when the program executes. A. compiler B. runtime C. syntax D. execution
B. runtime
The "s" in "https" stands for _____. A. secure socket lock B. secure socket layer C. secure socket link D. secure socket line
B. secure socket layer
SSID stands for ________. A. service set identity B. service set identifier C. service security identity D. service security identifier
B. service set identifier
An IP address that does not change and is usually assigned manually by a network administrator is called a _________. A. dynamic address B. static address C. fixed address D. stationary address
B. static address
An _________ is a specially designed computer that can perform complex calculations extremely fast. A. desktop computer B. supercomputer C. mainframe computer D. embedded computer
B. supercomputer
The ends of the cable in a bus network use a(n)_____ to absorb a signal so that it is not reflected back onto parts of the network that have already received the signal. A. endcap B. terminator C. stopper D. block
B. terminator
13. All of the following are examples of multimedia EXCEPT _______. A. streaming video B. text C. MP3 music files D. graphics
B. text
The method of algorithm creation used when a programmer breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks is called ________. A. object-oriented analysis B. top-down design C. bottom-up design D. coding design
B. top-down design
The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a ________. A. stylus B. touch pad C. game control D. trackball
B. touch pad
Normal telephone cable is a type of ________. A. fiber-optic cable B. twisted-pair cable C. coaxial cable D. Ethernet cable
B. twisted-pair cable
All of the following are types of computer users, EXCEPT ______. A. mobile user B. typical user C. power user D. casual user
B. typical user
The ________ is a program that manages the data between the operating system and all input and output devices attached to the system.
BIOS
In object-oriented terms, another name for a method is a(n) ________.
Behavior
Large object data in binary form
Binary Large Object
Which is the fastest type of optical drive on the market?
Blu-ray drives
Which of the following uses radio waves to transmit data signals over short distances and does not need a direct line of sight?
Bluetooth
true
Boolean data types are used to represent true-false values.
In the Windows operating system, the hard drive is represented as the ________.
C drive
How many steps are there in the system development life cycle?
C) 6
Which of the following is taught as the beginning computer language at many colleges and universities?
C) Java
Which of the following statements about Java is FALSE?
C) Java can run only on a Windows operating system.
The star topology uses a central ________ to connect all network nodes. A) terminator B) gateway C) switch D) router
C) switch
The loop decision point consists of three features: an initial value, a set of actions to be performed, and a(n) ________. A) class B) operator C) test condition D) testing plan
C) test condition
Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a process called ________ programming.
C) visual
Java and ________ are introductory programming languages taught at many colleges and universities.
C++
Which language do programmers use if the problem requires a lot of number crunching?
C++
There are ____ levels of cache memory. A. 5 B. 2 C. 3 D. 4
C. 3
IPv4 allows for approximately________ different IP addresses. A. 4 million B. 400 million C. 4 billion D. 40 billion
C. 4 billion
How many steps are there in the system development life cycle? A. 4 B. 5 C. 6 D. 10
C. 6
_________ floods a computer with requests until it shuts down and refuses to answer any requests for information. A. A Trojan horse B. A polymorphic virus C. A DDoS attack D. Port blocking
C. A DDoS attack
Which of the following is NOT a main characteristic associated with desktop computers as compared to notebooks? A. A desktop computer requires more space. B. A desktop computer is harder to move around. C. A desktop computer is more expensive. D. A desktop computer is easier to expand.
C. A desktop computer is more expensive.
Which of the following is NOT one of the four major data processing functions of a computer? A. Gathering data B. Processing data into information C. Analyzing the data or information D. Storing the data or information
C. Analyzing the data or information
A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as an _____. A. index B. navigation bar C. breadcrumb trail D. cookie trail
C. Breadcrumb Trail
A client/server network is an example of ________ administration A. Local B. Wide Area C. Central D. Corporate
C. Central
What is Google's first attempt at a netbook where all applications and files are stored on the Web? A. Google docs B. Gmail C. Chromebooks D. Cloud Computing
C. Chromebooks
The concept of the Internet was developed in response to the ______ War. A. Korean B. Vietnam C. Cold D. Big
C. Cold
CAPTCHA stands for _______. A. Completely Amazing Public Turing Test to Tell Computers and Humans Apart B. Completely Automated Private Turing Trial to Tell Computers and Humans Apart C. Completely Automated Public Turing Test to Tell Computers and Humans Apart D. Complete Automated Public Turing Trial to Tell Computers and Humans Apart
C. Completely Automated Public Turing Test to Tell Computers and Humans Apart
The ______ is used in combination with other keys to perform shortcuts and special tasks. A. Toggle key B. Function key C. Control (Ctrl) key D. Windows key
C. Control (Ctrl) key
Data in a multidimensional database is organized in a _______ format. A. Linear B. Table C. Cube D. Cellular
C. Cube
The protocol using port 53 is ______. A. FTP control B. STMP C. DNS D. HTTP
C. DNS
Which of the following is NOT a data source for a data warehouse? A. Internal sources B. External sources C. Data mine D. Clickstream data
C. Data mine
For business networks, which of the following is NOT a main cable type? A. Twisted-pair B. Coaxial C. Duplex D. Fiber-optic
C. Duplex
______ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home. A. Mainframe B. Desktop C. Embedded D. Internal
C. Embedded
IC3 is a partnership between the _________. A. FBI and local police departments B. FBI and National Defense Department C. FBI and National White Collar Crime Center D. National White Collar Crime Center and National Defense Department
C. FBI and National White Collar Crime Center
The amount of RAM recommended for most systems today is measured in _______. A. KB B. gigahertz C. GB D. megahertz
C. GB
A ________ is a network located in your home that connects to all your digital devices. A. MAN B. WAN C. HAN D. LAN
C. HAN
A ________ network is located in your home that connects to all your digital devices. A. MAN B. WAN C. HAN D. LAN
C. HAN
Special symbols called tags are used in which of the following languages? A. BASIC B. Java C. HTML/XHTML D. C++
C. HTML/XHTML
Which protocol transfers HTML data from servers to browsers? A. UDP B. FTP C. HTTP D. TCP
C. HTTP
. Which of the following is something a network adapter does NOT do? A. It uses high-powered signals so data can move easily over network transmission media. B. It allows or denies access to the computer in which it is installed. C. It verifies that all information transmitted from the computer is correctly received by the recipient. D. It breaks down data and puts it into packets.
C. It verifies that all information transmitted from the computer is correctly received by the recipient.
Rules for creating passwords include all of the following, EXCEPT ____. A. Keep your password a secret B. Change your password frequently C. Keep your password written down and stored in any easy-to-remember location D. Create a hard-to-guess password, with a combination of letter, numbers, and symbols
C. Keep your password written down and stored in any easy-to-remember location
Which of the following was the first widely used operating system installed in personal computers? A. Symbian OS B. Microsoft Windows C. MS-DOS D. Linux
C. MS-DOS
Running the Disk Defragmenter utility will ______. A. Detect and remove spyware B. Clear out temporary Internet files C. Make the hard drive work more efficiently D. Clean out your Startup folder
C. Make the hard drive work more efficiently
3. A network used to communicate among devices close to one person is called a ________. A. MAN B. LAN C. PAN D. WAN
C. PAN
In the URL http://www.pearsonhighered.com/techinaction, the portion labeled "techinaction" is the A. protocol B. domain name C. path D. top-level domain
C. Path
Which of the following is the largest unit of measure for the size of a computer file? A. Megabyte B. Gigabyte C. Petabyte D. Terabyte
C. Petabyte
Google ______ is a popular application that lets you edit images and helps to organize and share your digital images. A. Snapfish B. Shutterfly C. Picaso D. Rembrand
C. Picaso
Which of the following classification of viruses can change its own code to avoid detection? A. Stealth B. Multipartite C. Polymorphic D. Worm
C. Polymorphic
What is the first step of system development life cycle? A. Design B. Analysis C. Problem and opportunity identification D. Development and documentation
C. Problem and opportunity identification
Open system internet protocols replaced _____ system Internet protocols. A. Restricted B. Closed C. Proprietary D. Private
C. Proprietary
All of the following are examples of permanent storage, EXCEPT ________. A. hard drive disk B. DVD C. RAM D. USB Drive
C. RAM
________ is the abbreviation for the place in the computer where the programs and data the computer is currently using are stored. A. ROM B. CPU C. RAM D. USB
C. RAM
Wireless internet is available using _________. A. Fiber Optics B. Satellite C. Radio Waves D. DSL
C. Radio Waves
Podcasts deliver their content using ______. A. Aggregator B. Google Reader C. Really Simple Syndication D. iTunes
C. Really Simple Syndication
Which of the following is NOT a type of management information system (MIS) report? A. Detail B. Summary C. Redundancy D. Exception
C. Redundancy
Another way to obtain software is through ______, where a vendor hosts the software online over the Internet and you do not have to install it on your computer. A. Open Source as a service B. Proprietary as a service C. Software as a service D. Webware as a Service
C. Software as a service
On a Windows 7 system, you can determine the amount of RAM by looking in the ______ window. A. Performance B. Memory C. System Properties D. Utilities
C. System Properties
Which of the following is the final stage of the program development life cycle (PDLC)? A. Making the plan B. COding C. Testing and documentation D. Debugging the code
C. Testing and documentation
Which statement does not describe fifth-generation languages? A. They are the most "natural" of the languages B. Problems are presented as a series of facts or constraints rather than a specific algorithm C. They use a set of short, English-based commands (such as SUB) that speak directly to the CPU D. The system of facts can be queried
C. They use a set of short, English-based commands (such as SUB) that speak directly to the CPU
In the URL http://www.pearsonhighered.com/techinaction, the protion labeled ".com" is the _______. A. domain name B. host C. top-level domain D. protocol
C. Top-level domain
All of the following operating systems support P2P networking, EXCEPT ________. A. Windows B. OS X C. Unix D. Linux
C. Unix
A ________ uses the public Internet communications infrastructure to build a secure, private network. A. LAN B. WAN C. VPN D. MAN
C. VPN
Which of the following would NOT be used to build Web sites with interactive capabilities? A. Active Server Pages B. PHP (hypertext preprocessor C. Visual Basic D. Java Server Pages
C. Visual Basic
Which of the following are personal video journal entries posted on the web? A. Podcasts B. Newsgroups C. Vlogs D. Blogs
C. Vlogs
A _______ is a Website where anyone can add, remove, or edit its content. A. blog B. podcast C. wiki D. webcast
C. Wiki
______ enables users to define their own data-based tags and facilitates exchange of information between Web sites. A. HTML B. XHTML C. XML D. PHP
C. XML
What is CSMA/CD? A. a type of network topology B. a special signal of a star network C. a method used to avoid data collisions D. the central communication device on a star or ring network
C. a method used to avoid data collisions
System software does all of the following, EXCEPT ______. A. help run the computer B. coordinate instructions between application software and the company's hardware devices C. add graphics and pictures to files D. help manage system resource
C. add graphics and pictures to files
An individual trained in the design and building of databases is called a database ________. A. master B. technician C. administrator D. analyst
C. administrator
The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n) _______. A. flowchart B. structure chart C. algorithm D. pseudocode
C. algorithm
An ______ is a small program that resides on a server designed to be downloaded and run on a client computer. A. CGI Script B. style sheet C. applet D. hypertext document
C. applet
When a client computer connects to a network and requests the use of Microsoft Office 2010, the ______ server delivers the software to the client computer. A. communication B. database C. application D. file
C. application
The main path, analogous to the interstate highway system, of the Internet along which data travel the fastest is known as the Internet _______. A. open system B. highway C. backbone D. cache
C. backbone
Before its final commercial release, software is often provided free or at a reduced cost in a(n) ________ version to certain test sites or to interested users. A. alpha B. release to manufacturers (RTM) C. beta D. general availability (GA
C. beta
The term "bit" is short for ______. A. megabyte B. binary language C. binary digit D. binary number
C. binary digit
Unstructured data such as video clips and pictures are known as _____ because of the way they are encoded. A. hyperlink fields B. multidimensional data C. binary large objects (BLOBs) D. metadata
C. binary large objects (BLOBs)
Errors in computer software are called _______. A. ants B. insects C. bugs D. spiders
C. bugs
For performing common tasks, Windows 8 has special shortcuts called ______. A. bracelets B. pins C. charms D. apps
C. charms
____ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission. A. packet switching B. An open circuit C. Circuit switching D. A closed circuit
C. circuit switching
Running the Disk Cleanup utility is a quick way to ______. A. defrag your hard drive B. remove spyware programs C. clear out unnecessary files D. clean out your Startup folder
C. clear out unnecessary files
Translating an algorithm into a programming language is called _________. A. interpreting B. compiling C. coding D. executing
C. coding
The process by which program code is converted into machine language is called _______. A. documentation B. variable declaration C. complication D. execution
C. complication
A _____ check compares the values of data in two or more fields to see whether those values are reasonable. A. correctness B. range C. consistency D. numeric
C. consistency
Processing performance is affected by the number of processing paths called ______. A. speed B. chips C. cores D. stars
C. cores
Moodle and Blackboard are examples of ________. A. utility software B. educational software C. course management software D. gaming software
C. course management software
A(n) ________ software installation enables you to decide which features you want to install on the hard drive. A. full B. upgrade C. custom D. new
C. custom
QuarkXPress and Adobe InDesign are examples of ______ software. A. image-editing B. word processing C. desktop publishing D. video-editing
C. desktop publishing
The flowchart shape for a binary decision is a(n)_______. A. parallelogram B. rectangle C. diamond D. oval
C. diamond
The OS enables you to organize the contents of your computer in a hierarchical structure of ________. A. files B. libraries C. directories D. drives
C. directories
Management information systems (MIS) provide reports called __________, which show conditions that are unusual or need attention from users of the system. A. detail reports B. summary reports C. exception reports D. expert reports
C. exception reports
C:\Documents\Spring 2012\CIS 101\Term Paper\Computer Technology is an example of a _______. A. file extension B. file type C. file path D. file list
C. file path
A ________ is named after a housing construction feature that slows the spread of fires from house to house. A. firehouse B. wallfire C. firewall D. fire protector
C. firewall
In a spreadsheet, equations you build yourself using values and cell references are called _____. A. functions B. calculations C. formulas D. values
C. formulas
In a spreadsheet, equations you build yourself using values and cell references are called ______. A. functions B. calculations C. formulas D. values
C. formulas
SQL is an example of a _______-generation language. A. second B. third C. fourth D. fifth
C. fourth
Which of the following is the name of Microsoft Access File? A. inventory.xlsx B. inventory.wpd C. inventory.accdb D. inventory.bm
C. inventory.accdb
Which of the following is the name of a Microsoft Access file? A. inventory.xlsx B. inventory.wpd C. inventory.accdb D. inventory.bmp
C. inventory.accdb
Web-based application software is software that ______. A. enables you to create Web pages B. is installed by the computer manufacturer C. is stored completely on a web server instead of your hard drive D. does not need an Internet connection
C. is stored completely on a web server instead of your hard drive
A(n) __________ error is caught when the program executes. A. internal B. syntax C. logical D. execution
C. logical
Large, expensive computers that support hundreds of users simultaneously are called ______. A. supercomputers B. maxicomputers C. mainframes D. powercomputers
C. mainframes
A ________ is approximately 1 million bytes. A. gigabyte B. kilobyte C. megabyte D. terabyte
C. megabyte
When referring to hard drives, access time is measuring in _______. A. hertz B. bps C. milliseconds D. kilobytes
C. milliseconds
A _____ allows multiple users to connect to the Internet through one connection A. file server B. hub C. network D. packet screener
C. network
A _____ relationship indicates that for each record in a table, there is only a single corresponding record in a related table. A. many-to-one B. one-to-many C. one-to-one D. many-to-many
C. one-to-one
. The most essential software in your computer system is the ________. A. security B. antivirus C. operating system D. productivity
C. operating system
Information is most closely related to which of the following? A. input B. methods C. output D. processes
C. output
Running the CPU at a faster speed than the manufacturer recommends is called _____. A. fetching B. clock speed C. overclocking D. hyperthreading
C. overclocking
Data are sent through a network on bundles called ______. A. packages B. pouches C. packets D. switches
C. packets
Using a network without the network owner's permission is known as ________. A. hijacking B. chillijacking C. piggybacking D. hybacking
C. piggybacking
A __________ virus changes its own code or periodically rewrites itself to avoid detection. A. multipartite B. stealth C. polymorphic D. polypertite
C. polymorphic
In a transaction-processing system (TPS), if the TPS database is queried and updated while the transaction is taking place, this is called ________ processing. A. direct B. batch C. real-time D. immediate
C. real-time
In a database, a ________ is a group of related fields. A. file B. list C. record D. table
C. record
1. A _________ displays a subset of data from a table (or tables) based on the criteria specified. A. database query B. join query C. select query D. criteria query
C. select query
A(n) ________ enables the computer to drive the speaker system. A. video card B. surround card C. sound card D. speaker card
C. sound card
Every software program has a set of ______ that specify the minimum recommended standards for the operating system, processor, RAM, and the hard drive capacity. A. specifications B. programming instructions C. system requirements D. help files
C. system requirements
A video card is an expansion card installed inside your ______. A. Monitor B. VGA hookup C. system unit D. video memory
C. system unit
All of the following are features of the most popular Web browsers, EXCEPT ______. A. tabbed browsing B. pinned browsing C. tacked browsing D. tear-off tabs
C. tacked browsing
Network architectures are classified according to _______. A. the distance between the hub and the router B. the bandwidth supplied by the connection C. the way in which they are managed and the distance between their nodes D. the speed at which they processor runs
C. the way in which they are managed and the distance between their nodes
All of the following are considered cybercrimes, EXCEPT ____. A. identity theft B. non-delivery of merchandise C. theft of a cell phone D. hacking
C. theft of a cell phone
All of the following are true about real-time operating systems (RTOS), EXCEPT _______. A. they are also called embedded systems B. they are programs with specific purposes C. they require significant user interaction D. they are written specifically for the needs of the de
C. they require significant user interaction
FORTRAN, C++, and Java are all ________-generation languages. A. first B. second C. third D. fourth
C. third
Ring networks use the ________ method avoid data collisions. A. packet screening B. active-check C. token D. passive-check
C. token
An integrated development environment (IDE) is a ________. A. program that helps interpret code B. tool that helps programmers as they enter program code, highlighting keywords and alerting them to typos C. tool that helps programmers write and test their programs D. program that translates code into binary 1s and 0s, ignores comments, and helps programmers input correct, appropriate code
C. tool that helps programmers write and test their programs
Display screens that respond to commands initiated with your finger or a stylus are called ______. A. touch pads B. track points C. touch screens D. track screens
C. touch screens
6. The most popular transmission media option for wired Ethernet networks is __________. A. fiber-optic cable B. power-line cable C. unshielded twisted-pair (UTP) cable D. coaxial cable
C. unshielded twisted-pair (UTP) cable
All of the following are tips for a great presentation, EXCEPT ______. A. limit bullet points per slide to four to six B. use images to convey a thought or illustrate a point C. use a variety of animations on most slides D. keep the font size large enough to be read from the back of the r
C. use a variety of animations on most slides
All the following are tips for professional e-mail etiquette EXCEPT: A. be concise to the point B. use spell-checker and proofread before sending C. use abbreviations such as "u", "r", and "BRB" to make the email shorter. D. include a meaningful subject line
C. use abbreviations such as "u", "r", and "BRB" to make the email shorter
Multimedia software includes all of the following, EXCEPT _______. A. image-editing software B. animation software C. utility software D. audio-editing software
C. utility software
A ________ is an expansion card that's installed inside the system unit to translate data into images. A. graphic processing unit B. audio card C. video card D. memory card
C. video card
The process of optimizing RAM storage by borrowing hard drive space is called _____. A. Thrashing B. swap file C. virtual memory D. page file
C. virtual memory
A data ________ is a large-scale electronic repository of data that contains and organizes all of an organization's data in one place. A. mart B. chain C. warehouse D. storehouse
C. warehouse
A ________ is a Microsoft office feature that walks you through steps to complete a complicated task. A. template B. macro C. wizard D. function
C. wizard
The appropriate software to use for creating research paper is _____. A. spreadsheet software B. presentation software C. word processing software D. database software
C. word processing software
All of the following are a type of e-commerce business, EXCEPT ________. A. B2C B. B2B C. C2C D. C2B
C2B
________ provides a methodology by which a browser can request that a program file be run rather than just being delivered to the browser.
CGI
CHAPTER 7
CHAPTER 7
The control unit is one component of the ________.
CPU
________ allow developers to create formatting templates that organize and combine the attributes of objects on a Web page.
Cascading style sheets
Which of the following UTP cable types is the cheapest and often used in home networks?
Cat 5E
Which of the following is NOT a type of UTP cable you would use in a wired Ethernet home network? A. Cat 5E B. Cat 6 C. Cat 6A D. Cat 7B
Cat 7B
A. a new class can automatically pick up all of the data and methods of an existing class B. defined by information and actions C. the ability to apply classes from other projects to a new project D. another term for a behavior E. another term for information
Class B Data E Inheritance A Method D Reusability C
Companies use a software program on their Web sites to capture information about each click that users make as they navigate through the site. This data is referred to as _____.
Clickstream data
Which of the following is NOT a common network topology? A. Star B. Cluster C. Bus D. Ring
Cluster
The concept of the Internet was developed in response to the ________ War.
Cold
Ensures that all fields defined as required have data entered in them
Completeness Check
engineers to create models
Computer-aided design software is used primarily by:
A ________ check compares the values of data in two or more fields to see whether those values are reasonable
Consistency
Compares the values of data in two or more fields to see if these values are reasonable
Consistency Check
Which of the following statements about cookies is NOT true? A. Cookies obtain your personal information by searching your hard drive. B. Cookies are text files. C. Cookies help companies determine the traffic flow through their Web site. D. Some companies sell the personal information found in cookies to other companies.
Cookies obtain your personal information by searching your hard drive.
Which of the following is NOT one of the four main operations of a DBMS? "Creating databases and entering data" "Extracting (or querying) data" "Viewing (or browsing) and sorting (or indexing) data" "Creating a data dictionary"
Creating a data dictionary
proprietary
Custom software, developed to address the needs of a specific company, is known as ________ software.
PROLOG is an example of a ________. A) 2GL B) 3GL C) 4GL D) 5GL
D) 5GL
Which of the following is FALSE about servers? A) Servers are the workhorses of the client/server network. B) Servers interface with many different network users. C) A file server stores and manages files for a network. D) All networks require at least two servers
D) All networks require at least two servers
Which of the following is NOT an advantage of using networks as compared to a stand-alone computer? A) Enable software sharing B) Facilitate knowledge sharing C) Enhanced communication capabilities D) Ease of maintenance and administration
D) Ease of maintenance and administration
Small Java-based programs are called ________.
D) Java applets
________ is a powerful programming language used to build a wide range of Windows applications.
D) Microsoft Visual Basic
________ is the process of translating a task into a series of commands that a computer will use to perform that task.
D) Programming
________ is the instructions programmers have written in a higher-level language. A) Executable code B) Base code C) Compiled code D) Source code
D) Source code
During which phase of the system development life cycle are flowcharts and data-flow diagrams developed?
D) design
A ________ is a visual diagram of a process, including the decisions that need to be made along the way. A) structure chart B) Gantt chart C) data-flow diagram D) flowchart
D) flowchart
In object-oriented programming, ________ allows a new class to automatically pick up all the data and methods of an existing class.
D) inheritance
The two main types of decision points are the binary decision and the ________.
D) loop
The maximum memory you can install using the 64-bit version of Windows 8 Pro is ____ GB. A. 4 B. 16 C. 176 D. 192
D. 192
4. The internet is ______. A. an internal communication system for a business B. a communication system for the U.S. government C. the same as the Web D. A large network of networks
D. A large network of networks
UNIX was developed by Ken Thompson and Dennis Richie who worked at _____. A. IBM B. Microsoft C. Xerox D. AT&T's Bell Labs
D. AT&T's Bell Labs
All of the following are a type of e-commerce business, EXPECT _____. A. B2C B. B2B C. C2C D. C2B
D. C2B
_____ provides a methodology by which a browser can request that a program file be run rather than just being delivered to the browser. A. PGP B. ACK C. POP D. CGI
D. CGI
_______ allow developers to create formatting templates that organize and combine the attributes of objects on a Web page. A. HTML tags B. Applets C. Key pairs D. Cascading style sheets
D. Cascading style sheets
Which of the following is NOT a type of UTP cable you would use in a wired Ethernet home network? A. Cat 5E B. Cat 6 C. Cat 6A D. Cat 7B
D. Cat 7B
5. ________ is software that takes an existing Internet connection and turns it into a wireless hotspot. A. Netify B. Multiply C. Mobilefy D. Connectify
D. Connectify
Which of the following is NOT a typical disadvantage associated with databases? A. Databases can be expensive to set up. B. Databases are usually more complex to administer. C. Databases are more complex to construct. D. Database information cannot be changed once it is entered.
D. Database information cannot be changed once it is entered.
Which of the following is the first stage of the program development life cycle (PDLC)? A. Making the plan B. Coding C. Writing the plan D. Describing the problem
D. Describing the problem
Which of the following statements concerning IP addresses is TRUE? A. Static IP addresses change often B. Dynamic IP addresses are assigned manually by a network administrator C. ISPs must maintain a pool of IP addresses for all their subscribers D. Dynamic addressing is normally handled by DHCP.
D. Dynamic addressing is normally handled by DHCP.
In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of _______. A. Eight bytes B. Eight kilobytes C. Eight characters D. Eight bits
D. Eight Bits
_______ interference is a type of signal interference in wired transmission media that can be caused by fluorescent lights or machinery with motors or transformers. A. Radio frequency interference B. Transitional C. Crosstalk D. Electromagnetic
D. Electromagnetic
All of the following are examples of educational and reference software EXCEPT _____. A. Test Preparation B. Trip planning C. Genealogy D. EverQuest
D. EverQuest
Which transmission medium transmits data the fastest? A. Twisted-pair cable B. Coaxial cable C. Wireless D. Fiber-Optic cable
D. Fiber-Optic cable
All of the following are names for a flash drive, EXCEPT ______. A. Jump drive B. USB drive C. Thumb drive D. Hard drive
D. Hard drive
Which is NOT a networking protocol? A. Apple File Protocol (AFP) B. NetBios Extended User Interface (NetBEUI) C. Internet Packet Exchange (IPX) D. HyperText Transfer Protocol (HTTP)
D. HyperText Transfer Protocol (HTTP)
The Web is based on the _________ Protocol. A. Hypertext Transfer B. Hypertext Trade C. Hypertext Transmit D. Hypertext Translate
D. Hypertext Transfer
A(n) _________ address is the address external entities use to communicate with your network. A. AL B. MAC C. WI D. IP
D. IP
_______ is an IP addressing scheme that uses 128-bit addressing. A. IPS B. IP128 C. IPv4 D. IPv6
D. IPv6
_____ is the ability of two or more people to chat over the Internet in real time. A. VoIP B. Texting C. Remote handshaking D. Instant messaging
D. Instant messaging
Which of the following is NOT true about data? A. It represents a fact, a figure, or an idea. B. It can be a number, a word, or a picture. C. It can be a recording of sound. D. It has been organized or presented in a meaningful way.
D. It has been organized or presented in a meaningful way.
Small Java-based programs are called __________. A. Java classes B. JSPs C. JavaScripts D. Java applets
D. Java applets
In public-key encryption, two keys, known as a ______ are created--one for coding--one for decoding. A. Code keys B. Public/private keys C. Keytags D. Key pair
D. Key Pair
What is another name for the physical address assigned to each network adapter? A. Network Access Control (NAC) B. Physical Address Control (PAC) C. Network Physical Address (NPA) D. Media Access Control (MAC)
D. Media Access Control (MAC)
______ is a Web-based universal chat service that lets you communicate with users on a variety of IM services from an computer without having to install a special program, A. Trillian B. Digsby C. AIM D. Meebo
D. Meebo
The top three operating systems for personal computers are_____. A. Microsoft Windows, Mac OS X, and Android 3.0 B. Mac OS X, Android 3.0, and UNIX C. Microsoft Windows, Android 3.0, and Linux D. Microsoft Windows, Mac OS X. and Linux
D. Microsoft Windows, Mac OS X. and Linux
XO is the name of the computer provided by the ______ initative. A. IT Beta B. Computers for All C. Digikid D. One Laptop per Child
D. One Laptop per Child
A ______ is a network used by one person connected via wireless media. A. WAN B. LAN C. MAN D. PAN
D. PAN
Individual Internet users enter an ISP through a(n) _________. A. NAP B. T line C. Optical Carrier (oc line) D. Point of Presence (POP)
D. Point of Presence (POP)
The "fathers" of the internet are Vinton Cerf and _______. A. Robert Cailliau B. Tim Berners-Lee C. Bill Gates D. Robert Kahn
D. Robert Kahn
________ are often equipped to act as hardware firewalls. A. Repeaters B. Switches C. Jammers D. Routers
D. Routers
All of the following are procedures you can follow ensure your system performs reliably, EXCEPT ____. A. Run the Disk Defragmenter B. Run spyware and adware removal programs C. Install a reliable antivirus package D. Run key utilities only when you can observe the process
D. Run key utilities only when you can observe the process
The number of pixels displayed on the screen is known as _____. A. contrast ratio B. aspect ratio C. brightness resolution D. screen resolution
D. Screen Resolution
Using the Web to communicate and share information with our friends and others is known as _____. A. emailing B. friend networking C. instant messaging D. social networking
D. Social Networking
_________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet. A. Adware B. Malware C. Shareware D. Spyware
D. Spyware
______ software is the software that helps run the computer and coordinate instructions between the computer and the hardware devices. A. Application B. Recovery C. Backup D. System
D. System
What type of computer is the Apple iPad? A. Notebook B. Netbook C. Tablet PC D. Tablet computer
D. Tablet Computer
You can use the Windows _______ to check on a nonresponsive program. A. System restore B. Backup utility C. Explorer D. Task Manager
D. Task Manager
The unique address for a particular Web site is the ______. A. protocol B. domain name C. path D. URL
D. URL
All of the following are terms related to part of the boot process, EXCEPT A. ROM B. BIOS C. RAM D. USB
D. USB
The _____ of the operating system enable the user to communicate with the computer system. A. Window B. Modem C. Network adapter card D. User interface
D. User interface
______ is a consortium of organizations that develops Web protocols and sets standards. A. IETF B. ISOC C. Internet Society D. W3C
D. W3C
Software that enables you to display and interact with text and other media on the Web is a _______. A. client B. server C. client/server network D. Web browser
D. Web browser
______ uses continuous audio and video feeds. A. Podcasts B. Wikis C. Instant messaging D. Webcasts
D. Webcasts
In databases, information is organized in _______. A. tables B. records C. fields D. all of the above
D. all of the above
All of the following are the main functions of antivirus software, EXCEPT _______. A. Looking for virus signatures B. quarantining viruses C. inoculating key files D. assassinating all viruses
D. assassinating all viruses
Facial recognition is an example of ________ authentication. A. access B. photo C. verification D. biometric
D. biometric
The intersection of a row and a column in a spreadsheet program is known as a _______. A. label B. formula C. function D. cell
D. cell
All of the following are top cybercrimes reported to IC3 in 2011, EXCEPT __________. A. Identity Theft B. non-auction/non-delivery of merchandise C. advance fee fraud D. child pornography
D. child pornography
MS-DOS first used a(n) _______ interface. A. menu-driven B. graphical-user C. event-driven D. command-driven
D. command-driven
A database schema is also called a(n)____. A. information system B. summary report C. relation D. data dictionary
D. data dictionary
Classification, affinity grouping, and estimation are _________ methods used by managers to make their data more meaningful. A. modeling B. staging C. artificial intelligence D. data mining
D. data mining
In object-oriented programming, ________ allows a new class to automatically pick up all the data and methods of an existing class. A. reusability B. regression C. compilation D. inheritance
D. inheritance
The cell address C5 indicates that the cell ______. A. contains a label values of "C5" B. is at row C, column 5 of the worksheet C. is used in a formula involving the value "C5" D. is at column C, row 5 of the worksheet
D. is at column C, row 5 of the worksheet
In a network that uses the star topology, the signal that is sent to indicate a signal collision is called a ____. A. hit B. crash C. stop D. jam
D. jam
A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT _______. A. use your debit card information to purchase items illegally B. assume your identity C. steal your logon and passwords for various accounts D. launch a denial of service (DoS) attack on your computer
D. launch a denial of service (DoS) attack on your computer
All of the following are ways that can infect your computer with a virus, EXCEPT _________. A. sharing flash drives B. downloading video files from peer-to-peer sites C. downloading or running an e-mail attachment file D. logging into e-mail
D. logging into e-mail
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as __________. A. packet filtering B. packet switching C. static addressing D. logical port blocking
D. logical port blocking
The small circuit boards that hold a series of RAM chips are called _______. A. flash memory cards B. expansion cards C. virtual memory D. memory modules
D. memory modules
The amount of RAM that is actually on the memory modules in your computer is the _____ memory. A. virtual B. nonvolatile C. permanent D. physical
D. physical
All of the following are types of multimedia and entertainment software, EXCEPT ______. A. digital audio software B. gaming software C. drawing software D. productivity software
D. productivity software
An editor is a ________. A. program that helps compile code B. tool that helps programmers as they enter program code, highlighting keywords and alerting them to typos C. tool that helps programmers write and test their programs D. program that translates code into binary 1s and 0s, ignores comments, and helps programmers input correct, appropriate code
D. program that translates code into binary 1s and 0s, ignores comments, and helps programmers input correct, appropriate code
7. All of the following involve tasks for network administration, EXCEPT ________. A. installing new computers and devices on the network B. updating and installing new software on the network C. setting up proper security for a network D. purchasing initial equipment for the network
D. purchasing initial equipment for the network
A(n) __________ is a way of retrieving information from one or more table that defines a particular subset of data. A. validation rule B. field constraint C. enquiry D. query
D. query
Robotic cameras used by television stations for sports events require a ______ operating system. A. single-user, single-task B. single-user, multitask C. multiuser D. real-time
D. real-time
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network. A. viewing B. Browsing C. filtering D. screening
D. screening
2. All of the following are benefits of networks EXCEPT, _________. A. sharing an Internet connection B. sharing printers and other peripherals C. sharing files D. sharing an operating system
D. sharing an operating system
A subset of e-commerce that uses social networks to assist in marketing and purchasing products is known as _____. A. Social businesses B. social shopping C. social enterprise D. social commerce
D. social commerce
A(n) ______ is an input device that looks like a pen. A. joystick B. e-pen C. pointer D. stylus
D. stylus
In a database, a group of related records is called a(n) ________. A. memo B. field C. object D. table
D. table
Cache memory levels are defined by ______. A. the amount of storage space on chip B. the physical size of the chip C. the speed of the chip D. the chip's proximity to the CPU
D. the chip's proximity to the CPU
All of the following are used to classify network architectures, EXCEPT _____________. A. the distance between nodes B. the protocol used to exchange data between nodes C. the communication medium used to transport data D. the number of nodes on the network
D. the number of nodes on the network
A _____ is a virus that is triggered on a certain date. A. worm B. script C. logic bomb D. time bomb
D. time bomb
The root servers know the location of all DNS servers that contain the master listings for an entire ______. A. IP address B. subdomain C. Web site D. top-level domain
D. top-level domain
The _____ of the operating system enables the user to communicate with the computer system. A. window B. modem C. network adaptor card D. user interface
D. user interface
A(n) _______ is a small program that performs general housekeeping tasks for your computer. A. operating system B. user interface C. application software D. utility program
D. utility program
Software designed for specific industry is known as _____. A. multimedia B. general business C. project management D. vertical market
D. vertical market
In a _________ system, each step is dependent on the previous step being completed first. A. top-down B. rapid development C. bottom-up D. waterfall
D. waterfall
The current version of wireless Ethernet is ______. A. 802.11m B.802.11g C.802.11p D.802.11n
D.802.11n
Application software specifically designed to interact with the user to capture and analyze data
DBMS
In most current systems ________ is the type of RAM used.
DDR3
A(n) ________ server takes a pool of IP addresses and shares them with hosts on the network on an as-needed basis.
DHCP
The protocol using port 53 is ________.
DNS
Data contained in the database is accurate and reliable
Data Integrity
All of the following are advantages of using a database except _____. "Maintaining Data Integrity" "Data Redundancy" "Flexible Use of Data" "Information Sharing"
Data Redundancy
Occurs when there is duplicate information in tables
Data Redundancy
Indicates what type of data can be stored in the field
Data Type
___________ is the process of ensuring that data entered into a database is correct (or at least reasonable) and complete.
Data Validation
________ helps to ensure data integrity by maintaining information in only one place.
Data centralization
true
Data is the raw input that users have at the start of a job.
_______ ________ are a way of breaking down large data warehouses into smaller, more manageable pieces.
Data marts
What is important to remember when designing a database? "Data redundancy leads to wasted time and increased errors. Design your database to avoid redundancy" "Formatting is as important as data layout" "To design a database, a person must know a programming language such as SQL" "Databases are appropriate for maintaining small amounts of data but not so much for large amounts")
Data redundancy leads to wasted time and increased errors
Collection of related data that can be easily stored, sorted, organized, and queried
Database
DBMS stands for ___________
Database management system .
The process of running a program over and over to find errors and make sure the program behaves in the way it should is known as ________.
Debugging
________ is the process of identifying and removing errors in programming code.
Debugging
Helps managers develop solutions for specific problems
Decision Support System
If all students at a college were from New Jersey, the "State" field could be set to a _____. "Test Value" "Foreign Key" "Default Value" "Standard Value"
Default Value
__________ are the values the database uses for the field unless the user enters another value.
Default Values
In the ________ step of the system development life cycle, a detailed plan is generated for the programmers to follow.
Design
Which of the following Windows utility programs arranges files on your hard drive in sequential order?
Disk Defragmenter
develop and documentation
During which phase of the system development life cycle are flowcharts and data-flow diagrams developed?
Which of the following statements concerning IP addresses is TRUE? A. Static IP addresses change often. B. Dynamic IP addresses are assigned manually by a network administrator. C. ISPs must maintain a pool of IP addresses for all of their subscribers. D. Dynamic addressing is normally handled by DHCP.
Dynamic addressing is normally handled by DHCP.
Broad-based software systems that integrate multiple data sources and tie together the various processes of an enterprise to enable information to flow more smoothly
Enterprise Resource Planning System
A(n) ________ program is the binary sequence that has been translated from source code by a compiler for use by the CPU.
Executable
________ involves putting data into an electronic file in a format that another application can understand.
Exporting
Notebooks are often equipped with a(n) ________ slot that allows you to read flash memory cards such as CompactFlash, Memory Sticks, and Secure Digital cards.
ExpressCard
The acronym XML stands for ________.
Extensible Markup Language
(True/False) A data warehouse includes data that pertains to just one period in time
FALSE
(True/False) All of the data in a relational database is stored in the same table
FALSE
(True/False) All related data , even simple tasks, should be housed in a database to create organized information
FALSE
(True/False) Data integrity means that the data contained in a database is safe from hackers and corrpution
FALSE
(True/False) Data mining is the process by which great amounts of data are normalized
FALSE
(True/False) Forecasting allows managers to assign a value, based on some criterion, to data
FALSE
(True/False) Primary keys have to be numbers that are already contained in the database
FALSE
(True/False) Small slices of a data warehouse are called data mines
FALSE
(True/False) There are no disadvantages associated with using databases
FALSE
(True/False) Transaction processing means that transaction data is accumulated until a certain point is reached, and then a number of transactions are processed all at once
FALSE
3D sound cards are bidirectional.
FALSE
3D sound is the same as surround sound.
FALSE
A P2P network needs network operating system software installed on every node.
FALSE
A network-ready device is a device that might be attached to a network but still has to connect to a networked computer first.
FALSE
A switch is a network navigation device that merely retransmits a signal to all other nodes attached to it.
FALSE
A tiled window cannot be resized.
FALSE
Accessing data from the hard drive to send to the CPU is faster than accessing data from RAM.
FALSE
All computers do not need an operating system.
FALSE
An attribution license allows anyone to use, modify, and copy your work, but only for noncommercial purposes.
FALSE
CMOS is a special kind of memory that uses a great deal of power.
FALSE
Cache memory is a form of ROM.
FALSE
Cell phones do not require special service providers to connect to the Internet.
FALSE
Current cell phones and smartphones feature cameras that are just as powerful as stand-alone digital cameras.
FALSE
Current wireless Ethernet networks in the United States are based on the IEEE 802.3 standard.
FALSE
Ethernet networks are always connected using twisted-pair cable technology.
FALSE
Flash memory is volatile.
FALSE
In a peer-to-peer network, one computer acts as the server.
FALSE
It is not possible to configure a client/server network for home use.
FALSE
Level 1 cache memory always contains more storage area than Level 2 cache.
FALSE
Limiting your signal range does not help increase wireless network security.
FALSE
MAN stands for mobile area network.
FALSE
MP3 files can be played only on iPods
FALSE
Moore's Law predicts that the number of transistors inside a CPU will triple every 18 months.
FALSE
Notebook and desktop processors are basically the same and therefore interchangeable.
FALSE
One of the advantages of VoIP is that an interruption in power does not interrupt the ability to make calls.
FALSE
P2P networks are more commonly used in small businesses than in homes
FALSE
RAM is nonvolatile storage.
FALSE
RAM is stored directly on the CPU.
FALSE
RAM is your computer's permanent storage space for data that is entered from the keyboard.
FALSE
Safe boot is a special diagnostic mode designed for troubleshooting errors that occur during the boot process.
FALSE
The Apple iPhone uses a Microsoft operating system.
FALSE
The Mac OS does NOT support P2P networking.
FALSE
The Microsoft Video file format uses an extension of .mpg.
FALSE
The combination of a computer's operating system and application software is referred to as the computer's platform.
FALSE
The conversion rate is the number of times per second music is measured and converted into a digital value.
FALSE
The cost of a P2P network is slightly greater than the cost of a client/server network.
FALSE
The percentage of time that your CPU is working is referred to as processing time.
FALSE
The video subsystem is made up of the video card and speakers.
FALSE
There are more virus attacks on cell phone and smartphones than there are on PCs.
FALSE
Thunderbolt can carry three channels of information on the same connector.
FALSE
Tiles view is the most interactive view of a Windows folder.
FALSE
Twisted-pair cable is made up of plastic or glass fibers that transmit data at extremely fast speeds.
FALSE
Upgrading your CPU can increase how quickly data can move to or from the CPU.
FALSE
WEP is a stronger form of security than WAP.
FALSE
When virtual memory is in use, the condition of excessive paging is called swapping.
FALSE
When your computer runs out of RAM, the operating system borrows space from the CPU.
FALSE
You can send messages that include text, sound, images, and video clips using SMS.
FALSE
If you regularly download and upload files, chances are that you are using ________.
FTP
T/F A data-flow diagram provides a visual representation of an algorithm.
False
T/F An information system is the set of steps that needs to be followed to ensure that software development proceeds in an orderly fashion.
False
T/F During the program debugging stage, the software is tested by the people who will use the program.
False
T/F PROLOG is an example of a fourth-generation programming language.
False
T/F Programming languages are often classified in groups called eras.
False
T/F Syntax errors are caught only at runtime.
False
T/F Third-generation languages use a set of short, English-like commands that speak directly to the CPU.
False
T/F int, float, char, and bool are examples of operators.
False
A category of information in a database table
Field
Another name for the primary key is the key _____
Field
________ size defines the maximum number of characters or digits that a particular field can hold.
Field
Property that must be satisfied for an entry to be accepted into the field
Field Constraint
Defines the maximum number of characters or numbers that a field can hold
Field Size
The name of the free Internet browser from Mozilla is ________.
Firefox
machine
First-generation languages are known as ________ languages.
false
First-generation programming languages use symbols and commands to help programmers tell the computer what to do.
design
Flowcharts and data flow diagrams are used during which step of the SDLC?
________ are shortcut keys that you press to perform special tasks; each software application has its own set of tasks assigned to these keys.
Function keys
The amount of RAM recommended for most systems today is measured in ________.
GB
Two types of video memory are ________.
GDDR3 and GDDR5
________ is a special copyleft license used for software.
GNU
A ________ performs the same kind of computational work that a CPU performs but is specialized to handle 3-D graphics and image and video processing.
GPU
________ are easy-to-use mini desktop programs that give you information at a glance or quick access to frequently used tools including weather information, calendar items, or games.
Gadgets
Which of the following is NOT an example of an instant messenger service? A. GoogleTalk B. Windows Live Messenger C. Jabber D. Google Docs
Google Docs
Which of the following is NOT an example of an instant messenger service? A. Google Talk B. Windows Live Messenger C. Jabber D. Google Docs
Google Docs
A visual search engine that uses pictures from our smartphone to search the Web for more information is known as ________.
Google Goggles
In a database, an object field is used for storing __________. "Variable-length text and numbers" "Graphics and audio content" "Fixed-length text and numbers" "Data about physical objects such as computers"
Graphics and audio content
A ________ is a network located in your home that connects to all your digital devices.
HAN
A ________ is a network located in your home that is used to connect all of your digital devices.
HAN
________ is a single cable that carries all audio and video information from devices connected to a TV to the TV itself.
HDMI
false
HTML and XHTML are NOT programming languages.
Special symbols called tags are used in which of the following languages?
HTML/XHTML
Which is NOT a networking protocol?
HyperText Transfer Protocol (HTTP)
Which is NOT a networking protocol? A. Apple File Protocol (AFP) B. NetBIOS Extended User Interface (NetBEUI) C. Internet Packet Exchange (IPX) D. HyperText Transfer Protocol (HTTP)
HyperText Transfer Protocol (HTTP)
________ provides high-speed information processing by enabling a new set of instructions to start before the previous set has been finished.
Hyperthreading
________ is the organization responsible for the Internet's domain name system and IP address allocation.
ICANN
A(n) ________ address is a unique number that identifies a computer, server, or device connected to the Internet.
IP
________ is an IP addressing scheme that uses 128-bit addressing.
IPv6
________ printers have tiny hammer-like keys that strike the paper through an inked ribbon.
Impact
Which of the following is NOT a main operation of a database management system (DBMS)? A. Creating databases and entering data B. Implementing data mining C. Viewing and sorting data D. Outputting data
Implementing data mining
waterfall
In a ________ system, each step is dependent on the previous step being completed first.
In a database, ________ fields store numbers used to perform calculations.
In a database, ________ fields store numbers used to perform calculations.
record
In a database, a collection of related fields is a(n) ________.
field
In a database, a(n) ________ is a data category such as "First Name" or "Street Address."
formulas
In a spreadsheet, equations you build yourself using values and cell references are called:
inheritance
In object-oriented programming, ________ allows a new class to pick up all the characteristics of an existing class.
data and methods
In object-oriented programming, each object from a given class is described by its
derived
In object-oriented terms, a new, modified class is called a(n) ________ class.
values
In spreadsheet software, ________ are the numerical data that represents a quantity or an amount and are often the basis for a calculation.
analysis
In the ________ phase, the problem is explored in depth and program specifications are developed.
maintenance and evaluation
In the ________ step of the system development life cycle (SDLC), the system's performance is monitored to determine if it meets the needs of the end user.
problem statement
In the program development life cycle, the ________ is a clear description of what tasks the computer must accomplish and how a program will execute these tasks and respond to unusual situations.
insurance
In which industries is COBOL still commonly used?
A(n) ________ language is executed one line at a time, as each line is translated.
Interpreted
Which of the following is NOT a function of the operating system?
It manages the removal of spyware
Which of the following is something a network adapter does NOT do? A. It uses high-powered signals so data can move easily over network transmission media. B. It allows or denies access to the computer in which it is installed. C. It verifies that all information transmitted from the computer is correctly received by the recipient. D. It breaks down data and puts it into packets.
It verifies that all information transmitted from the computer is correctly received by the recipient.
Which of the following is something a network adapter does NOT do? A. It uses high-powered signals so data can move easily over network transmission media. B. It allows or denies access to the computer in which it is installed. C. It verifies that all information transmitted from the computer is correctly received by the recipient. D. It breaks down data and puts it into packets.
It verifies that all information transmitted from the computer is correctly received by the recipient.
Which of the following statements is NOT true about the JPEG file format?
JPEGs are larger than raw files
When you want to extract data from two or more tables, you can use a(n) _____ query
Join
The primary key is a unique field also referred to as _____.
Key Field
control structures
Keywords in a programming language that allow the programmer to redirect the flow of the program based on a decision are called
Which of the following is not a category of information systems? "Management Information System" "Office Support System" "Knowledge-Based System" "Transaction Processing System"
Knowledge-Based System
Which of the following is NOT an example of a WAN?
LANs connected in a single building
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.
MAC
A large network designed to provide access to a specific geographic area, such as a large city is a ________.
MAN
Which of the following was the first widely used operating system installed in personal computers?
MS-DOS
Which of the following was the first widely used operating system installed in personal computers?
MS-Dos
Which of the following is a single-user, multitask operating system?
Mac OS
The Apple iPhone uses a version of ________ as an operating system.
Mac OS X
First-generation languages are known as ________ languages.
Machine
Apple developed ________ Mouse, which is the first multitouch wireless mouse.
Magic
Information system that produces management reports
Management Information System
All of the following are part of the process of data staging for a data warehouse except _____. "Storage" "Extraction" "Transformation" "Normalization"
Normalization
The process of eliminating data redundancy by ensuring that tables in a database pertain to a single topic is called _____.
Normalization
Confirms that only numbers are entered in the field
Numeric Check
The newest cell/smartphone displays are ________, which allow bright, sharp imaging and draw less power.
OLED
Databases that contain not only data, but also methods of processing or manipulating that data are called ____________ databases.
Object-Oriented
Designed to assist employees in accomplishing their day-to-day tasks and to improve communications
Office Support System
A(n) ________ is designed to improve communications and assist employees in accomplishing their daily tasks.
Office Support System (OSS)
XO is the name of the computer being provided by the ________ project.
One Laptop per Child
A _____ relationship indicates that for each record in a table, there is only one corresponding record
One-to-Many
Transaction processing done in real time
Online Transaction Processing
The most essential software in your computer system is the ________.
Operating System
Information is most closely related to which of the following?
Output
A ________ is a network used by one person connected via wireless media.
PAN
A network used to communicate among devices close to one person is called a ________.
PAN
5th
PROLOG (PROgramming LOGic) is an example of a ________ generation language.
In a(n) ________ network, each node connected to the network communicates directly with every other node.
Peer-to-peer
________ networks do not require a dedicated server.
Peer-to-peer
Which of the following is the largest unit of measure for the size of a computer file?
Petabyte
Which of these statements about physically protecting your computer is FALSE?
Power surges can be blocked by using a computer surround
Which of these statements about physically protecting your computer is FALSE? A. The computer should sit on a flat level surface. B. Power surges can be blocked by using a computer surround. C. It is best to unplug computers during an electrical storm. D. Old surge protectors can deliver power to your computer without protecting it.
Power surges can be blocked by using a computer surround.
Each record must have a unique field called a(n) ________ field.
Primary Key
service
Problems discovered after the commercial release of a program are generally addressed by downloadable software updates, also known as ________ packs.
A. data expected to be provided B. rules for transforming the input into output C. information expected to be produced D. starting point of programming work E. violation of the strict, precise set of rules that define a language
Processing B Problem Solving D Inputs A Syntax Error E Outputs C
comments
Programmers can insert ________ into program code to clarify sections of code.
________ is the process of translating a task into a series of commands that a computer will use to perform that task.
Programming
The standard keyboard is known as the ________ keyboard.
QWERTY
SQL is a(n) __________. "Type of database architecture" "Query Language" "Application Programming Language" "Relational database program"
Query Language
All of the following can be used for backing up data files EXCEPT:
RAM
________ is the abbreviation for the place in the computer where the programs and data the computer is currently using are stored.
RAM
Kernel memory is ________.
RAM memory used by the operating system
The basic input/output system is stored on a ________ chip.
ROM
The operating system of a cell phone is stored in ________.
ROM
Ensures that data entered into the database falls within a certain span of numbers
Range Check
Podcasts deliver their content using ________.
Really Simple Syndication
Which of the following is NOT type a of management information system (MIS) report?
Redundancy
Which of the following is NOT type a of management information system (MIS) report? A. Detail B. Summary C. Redundancy D. Exception
Redundancy
false
Regeneration allows programmers to easily reuse existing classes from other projects, enabling them to quickly produce new code.
____________ databases are characterized by logical linkages between tables via primary and foreign keys.
Relational
A(n) ____________ organizes data in table format by logically grouping similar data into relations (or tables that contain related data).
Relational Database
Which protocol is used to transmit e-mail over the Internet?
SMTP
In Access, the Simple Query Wizard uses ________ to create a query.
SQL
A(n) ________ uses the same kind of memory that flash drives use and have no spinning platters or motors.
SSD
false
Second-generation languages use a sequence of bits-1s and 0s.
Transport Layer Security (TLS) and ________ are two protocols that provide data integrity and security for Internet transmission.
Secure Sockets Layer
All of the following are benefits of networks EXCEPT, ________. A. sharing an Internet connection B. sharing printers and other peripherals C. sharing files D. sharing an operating system
Sharing an operating system
java applets
Small Java-based programs are called
vertical market
Software designed for a specific industry is known as ________ software.
application software
Software that lets you do tasks at home, school, and work is called:
All of the following are media management software used to organize music, video, and pictures, EXCEPT ________. A. Windows Media Player B. Sony Sound Forge C. Apple iTunes D. Winamp
Sony Sound Forge
c++
Special symbols called tags are used in which of the following languages?
One virus called ________ is used to trick users into downloading an infected file to their phone, which steals online banking information.
Spyeye Mobile Banking
________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet.
Spyware
Which of the following is not a possible primary key? "Social Security Number" "Driver's License Number" "Street Address" "Student ID Number"
Street Address
Database query language
Structured Query Language
SQL stands for ________.
Structured Query Language
Provides a consolidated picture of detailed data
Summary Report
Windows uses a memory-management technique known as ________ to monitor which applications you use the most and preloads them into your system memory.
SuperFetch
All of the following can be considered to be network operating systems EXCEPT:
Symbian OS
A. sentences in programming code B. agreed-on set of rules defining how the language must be structured C. coding symbols that represent fundamental actions of a language D. specific words with predefined meanings in a programming language
Syntax B Statements A Data Types E Operators C Key words D
On a Windows system, you can determine the amount of RAM by looking in the ________ window.
System Properties
utility
System software includes the operating system and ________ programs that help manage resources
(True/False) "Data integrity" means that that data contained in the database is accurate and reliable
TRUE
(True/False) A consistency check compares the values of data in two or more fields in a database to see if these values are reasonable
TRUE
(True/False) A record is a group of related database fields
TRUE
(True/False) Almost all relational databases today use structured query language, or SQL
TRUE
(True/False) Data dictionary and database schema refer to the same thing
TRUE
(True/False) Data mining is the process by which large amounts of data are analyzed to spot otherwise hidden trends
TRUE
(True/False) Data redundancy in a database can result in a waste of data entry time, storage space, and processing time
TRUE
(True/False) Databases provide for data centralization
TRUE
(True/False) Databases, data warehouses, and data marts are integral parts of information systems because they store the information that makes information systems functional
TRUE
(True/False) If you are going to store a phone number as a 10-digit number with no formatting, then the number data type is appropriate for that field
TRUE
(True/False) Information systems are software-based solutions used to gather and analyze information
TRUE
(True/False) Many businesses mine data to understand their customers better
TRUE
(True/False) Object-oriented databases are adept at handling unstructured data such as audio clips, video clips, pictures, and extremely large documents
TRUE
(True/False) Precautions must be taken to guarantee that information entered into a database is in a useful format
TRUE
(True/False) Real-time processing means that the database is queried and updated while the transaction is taking place
TRUE
(True/False) The objective of an ERP is to accumulate all information relevant to running a business in a central location and make it readily available to whomever needs the information to make decisions
TRUE
(True/False) The two main advantages of multidimensional databases are that they can easily be customized to provide information to a variety of users (based on their need) and they can process data much faster than pure relational databases can
TRUE
(True/False) To establish a relationship between two tables, both tables must have a common field
TRUE
A Blu-ray burner will most likely record both CDs and DVDs.
TRUE
A client computer is the computer on which users accomplish specific tasks.
TRUE
A common-driven-interface is one in which you enter commands to communicate with the computer system.
TRUE
A computer's memory subsystem is made up only of RAM.
TRUE
A digital camera's resolution in measured in megapixels.
TRUE
A firewall can come in either software or hardware form.
TRUE
A microbrowser is a special Internet browser made for mobile devices.
TRUE
A multiuser operating system is also described as a network operating system.
TRUE
A printer connected to a wireless network is considered to be a node on that network.
TRUE
A single computer can function as both a client and a server, but performance will be degraded.
TRUE
A virtual phone number can be assigned to your cell phone or smartphone to keep your true number private.
TRUE
All desktop and notebook systems sold today are network ready
TRUE
Although 802.11n will work with 802.11g adapters, you will not achieve 802.11n data transfer rates unless all adapters are 802.11n.
TRUE
Boot Camp is a utility that allows you to run Windows and Mac OS X at the same time.
TRUE
Cell phones can fall victim to viruses.
TRUE
DRM-free music can legally be moved from system to system
TRUE
DRM-free music is music that has been released without any digital rights management.
TRUE
Every computer is designed with a maximum limit on the amount of RAM it can support.
TRUE
External hard drives are an ideal solution when you need more storage than a flash drive can provide.
TRUE
Full-featured GPS systems can play MP3 files, display photos, and connect to the Internet.
TRUE
Hard drive access time is measured in milliseconds.
TRUE
Hard drives have been growing in storage capacity by about 50 percent each year.
TRUE
Hard drives have the largest capacity of any storage device.
TRUE
If you install a device that is not PnP, you will be prompted to install a driver.
TRUE
In Safe mode, only the essential devices of the system function.
TRUE
Installing a device driver can sometimes cause system instability.
TRUE
It is generally better to extend your wired network using wireless technology than to use repeaters or splice cable.
TRUE
Level 2 cache is slightly farther away from the CPU than Level 1 cache or on a separate chip.
TRUE
Linux does not have a default user interface.
TRUE
Linux is an open source operating system that can be used both on personal computers and as a networking operating system.
TRUE
Live Icons allow you to preview the actual contents of a specific file or folder from within a window without actually having to open the file.
TRUE
MMS allows you to save all, none, or part of a message.
TRUE
MMS stands for Multimedia Message Service.
TRUE
Most computers today come with Ethernet adapters already installed.
TRUE
Netbooks are more powerful than cell phones and smartphones because they run a full-featured operating system.
TRUE
Not all PMP devices are necessarily just music players.
TRUE
PnP stands for Plug and Play.
TRUE
Raw files are larger than JPEG files.
TRUE
Saving a file as a JPEG actually means that you will lose a bit of detail.
TRUE
Solid state drives have no platters or motors.
TRUE
Some cell phones come equipped with a keyboard for faster typing of e-mail and text messages.
TRUE
Temporary data and instructions are not stored on the hard drive because it is faster to retrieve data from RAM.
TRUE
Text prediction algorithms provide a list of popular words and save typing time when using text messaging.
TRUE
The CPU is located on the motherboard.
TRUE
The High Contrast accessibility feature allows you to select a color scheme setting in which you control the contrast between text and background.
TRUE
The Internet is an example of a client/server network.
TRUE
The Windows Backup and Restore Utility allows you to make a duplicate copy of all the data on your hard drive.
TRUE
The amount of memory your video card needs depends on what you want to display on your monitor.
TRUE
The control unit coordinates the activities of all computer components except for the CPU itself.
TRUE
The most recent version of the Mac operating system is called Mac OS X.
TRUE
The practice of piggybacking is illegal in many places.
TRUE
The type of processor in the computer dictates which operating system a desktop uses.
TRUE
The use of multiple cores on one CPU chip allows the execution of two or more sets of instructions at the exact same time
TRUE
The user interface is part of a computer's operating system.
TRUE
There are digital cameras on the market that can play both music and videos.
TRUE
Upgrading your operating system to the newest version might help increase system reliability.
TRUE
Video cards often include their own RAM.
TRUE
VoIP can be considered an alternative to a traditional landline phone service.
TRUE
WML refers to the format used to create Web content for cell phones and smartphones.
TRUE
When a network is created to provide Internet access to a specific geographic area, that network will generally be designated as a MAN.
TRUE
When converting analog waves to digital waves, the higher the sampling rate, the more accurately the original wave can be re-created.
TRUE
When using Windows, you should create a restore point before installing new software.
TRUE
Windows 7 will run with 1 GB of RAM, but the system might be challenged by limited resources, especially with graphic-intensive programs.
TRUE
Wireless networks are more vulnerable to attack than wired networks.
TRUE
With the Plug and Play standard, adding hardware to your computer becomes easier.
TRUE
With video editing software, you can review video clips frame by frame.
TRUE
You can download a version of Linux from the Internet for free.
TRUE
You can use System Restore to restore your system's settings back to a specific date when everything was working properly.
TRUE
You can use the Windows ________ to check on a nonresponsive program.
Task Manager
If you want to automatically defragment your hard drive every week, you can set a predetermined time using the ________.
Task Scheduler
________ is the use of equipment to provide voice communications over a distance.
Telephony
Which of the following is the first step in the boot process?
The BIOS is activated by powering on the CPU
Which of the following does NOT occur during the power-on self-test?
The OS is moved into RAM
Which of the following does NOT occur during the power-on self-test? A. The video card and video memory are tested. B. The OS is moved into RAM. C. The BIOS is identified. D. Memory is tested.
The OS is moved into RAM
portability
The ability to create programs with higher-level programming languages that can be moved from one type of computer to another is called:
extensible markup language
The acronym XML stands for ________.
Which of the following statements concerning IPv4 addresses is FALSE?
The addresses are 16-bit numbers
Which of the following is NOT a step in the boot process?
The antivirus program checks all files for viruses
what-if
The automatic recalculation ability of spreadsheet software makes it easy to perform ________ analysis.
executable program
The binary sequence that instructs the CPU to run the programming code is called a(n)
The CPU consists of which two parts?
The control unit and the arithmetic logic unit
compilation
The process by which program code is converted into machine language is called
Which of the following statements about object-oriented databases is FALSE? A. They are more complex than relational databases. B. They use a query language to access and manage data. C. They are good at handling unstructured data. D. They store data in table format.
They store data in table format
Which statement does NOT describe fifth-generation languages? A. They are the most "natural" of languages. B. Problems are presented as a series of facts or constraints rather than as a specific algorithm. C. They use a set of short, English-based commands (such as SUB) that speak directly to the CPU. D. The system of facts can be queried.
They use a set of short, English-based commands (such as SUB) that speak directly to the CPU.
________ languages use symbols and commands to help programmers tell the computer what to do.
Third-generation
________ is new technology that supports fast transfer rates of 10 Gb/s.
Thunderbolt
In a Windows folder, to display files and folders as icons in list form, use ________ view.
Tiles
The World Wide Web was invented by ________.
Tim Berners-Lee at CERN
Mac OS X includes a backup utility called ________.
Time Machine
actionscript
To develop Web-based multimedia, Adobe Flash includes a programming language named ________, which is similar to JavaScript in its keywords, operators, and classes.
Which of the following is a reason for creating a list instead of creating a database? "To organize data for simple tasks" "To prevent data inconsistency" "To prevent data redundancy" "To make it easier to share data in a central location"
To organize data for simple tasks
A(n) ______________ is used to keep track of everyday business activities.
Transaction Processing System
Supports order processing, payroll, and other routine transactions
Transaction Processing System
coding
Translating an algorithm into a programming language is called ________.
T/F Actual programming takes place in the development and documentation step of the SDLC.
True
T/F An algorithm is a set of specific, sequential steps that describe in natural language exactly what the computer must do to complete its task.
True
T/F Data is the raw input that users have at the start of the job.
True
T/F HTML and XHTML are NOT programming languages.
True
T/F In a program, a variable declaration tells the operating system that the program needs to allocate storage space in RAM.
True
T/F Programming languages can be read by humans.
True
T/F Repetitive tasks are ideal candidates for computerization.
True
________ is a social networking service that enables you to exchange short text messages with your friends or "followers."
Which of the following operating systems is used primarily with mainframes as a network operating system?
UNIX
The unique address for a particular Web site is the ________.
URL
All of the following are terms related to part of the boot process EXCEPT:
USB
All of the following are terms related to part of the boot process, EXCEPT ________ A. ROM B. BIOS C. RAM D. USB
USB
The most common way to connect devices to a computer is to use the ________ port.
USB
To transfer files from your computer to a portable media player (PMP), most newer PMPs use a ________ port or a FireWire port.
USB 2.0
All of the following operating systems support P2P networking, EXCEPT ________. A. Windows B. OS X C. Unix D. Linux
Unix
A(n) ________ is a small program that performs general housekeeping tasks for your computer.
Utility Program
A ________ uses the public Internet communications infrastructure to build a secure, private network.
VPN
Criteria used to ensure that data entered into the database is correct (or at least reasonable) and complete
Validation Rules
The process of optimizing RAM storage by borrowing hard drive space is called ________.
Virtual Memory
3d
Virtual reality is a simulated ________ environment that a user can manipulate and explore as if he or she were in that world.
A powerful programming language used for prototyping Windows applications is ________.
Visual Basic
Which of the following would NOT be used to build Web sites with interactive capabilities? A. Active Server Pages B. PHP (hypertext preprocessor) C. Visual Basic D. Java Server Pages
Visual Basic
________ is a form of voice-based Internet communication that turns a standard Internet connection into a means to place phone calls, including long-distance calls.
VoIP
Web content specially designed for viewing via a cell phone or smartphone is written in a format called ________.
WML (Wireless Markup Language)
When you access CNN or Intel's Web site you are accessing it through a ________ server.
Web
problem and opportunity identification
What is the first step of the system development life cycle?
information
When creating a problem statement, the ________ is the result the user requires from the data.
C++
Which language do programmers use if the problem requires a lot of number crunching?
Java
Which language is used for applications that need to collect information from networked computers?
.NET framework
Which of the following development environments enables Web sites to talk to each other easily by introducing a standard way for software to interact through Web services?
freeware
Which of the following is software that you can use for an unlimited time at no charge?
visual basic
Which of the following is the programming language often used to build Windows applications
pseudocode
Which of the following is/are NOT part of a program's problem statement?
It is the ability of a Web page to display itself based on choices the reader makes.
Which of the following statements describes dynamic decision making?
structured classes
Which of these elements is NOT common to all programming languages?
They use a set of short, English-based commands (such as SUB) that speak directly to the CPU.
Which statement does NOT describe fifth-generation languages?+
customer relationship management software
Which type of software stores client information in one central database for use by sales professionals?
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
White-hat
technical writers
Who is responsible for writing internal documentation for software programs?
The version of Windows 7 that is most appropriate for high-end PC users, gamers, and multimedia professionals is ________.
Windows 7 Ultimate
Windows 7 incorporates ________, which enables you to migrate files and settings from a Windows Vista system to a Windows 7 system via a network connection.
Windows Easy Transfer
WPA stands for ________.
Wireless Protocol Access
classes
With object-oriented analysis, programmers identify all the categories of input that are part of the problem into
What has spawned Mathematical Markup Language and Wireless Markup Language?
XML
All of the following are forms of RAM EXCEPT:
XRAM
Which of the following statements concerning the Windows Recycle Bin is TRUE?
You can restore files that have been moved to the Recycle Bin
true
You must use decision points to develop an algorithm that includes unpredictable steps.
keywords
______ are words that are reserved in a specific programming language due to their predefined meanings.
logical
_______ errors are caught only when the program executes.
productivity
_______ software includes programs that enable you to perform various tasks generally required in home, school ,and business.
decision points
________ are points at which a program must choose from a range of different actions based on the value of its current inputs.
keywords
________ are words that are reserved in a specific programming language due to their predefined meanings.
top-down
________ design is a systematic approach in which a problem is broken down into a series of high-level tasks.
JAD, joint application development
________ helps designers adapt to changes in program specifications quickly and helps ensure successful, useful results.
programming
________ involves identifying which parts of a task a computer can perform, describing those tasks in a very specific and complete manner, and translating this description into the language spoken by the computer's CPU.
blender
________ is a free, open source program that supports home video game production by collecting a number of tools into one package.
java
________ is a language that, due to its object-oriented model, allows programmers to benefit from its large set of existing classes.
pseudocode
________ is organized like an outline, with various levels of indentation to indicate the sequence of actions within the program.
third generation
________ languages use symbols and commands to help programmers tell the computer what to do.
integrated help
________ means the help documentation is built directly into the software instead of being provided in printed manuals
open source
________ programs are free on the condition that any changes you make to improve the source code also must be distributed for free.
software
________ refers to a set of instructions that tells a computer what to do.
system
________ software helps run the computer and coordinates instructions between application software and the computer's hardware.
multimedia
________ software includes image, video, and audio editing software.
virtual reality
________ software turns artificial environments into realistic experiences.
Enterprise resource planning, ERP
________ systems consolidate multiple systems into one and improve the coordination of business areas across multiple departments.
prototyping
________, building a small program model, is a form of rapid application development (RAD).
Which of the following is necessary if you want your Ethernet network to connect to the Internet through a DSL or cable modem?
a DSL/cable router
A set of rules for exchanging electronic information is called ________.
a computer protocol
honey pot
a computer system that is set up to attract unauthorized users by appearing to be a key part of a network or a system that contains something of great value
server
a computer that both sites and shares resources on a network
client
a computer that request those records
wireless network interface card
a computing device that connects to a network using wireless access needs to have a special network adapter card
terminator
a device that absorbs a signal so that it is not reflected back onto parts of the network that have already received it
bridge
a device that is used to send dat between these different collisions domains
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________.
a firewall
network
a group of two or more computers that are configured to share information and resources such as printers, files, and databases
bastion host
a heavily secured server located on a special perimeter network between the companies secure internal network and the firewall
Digital formats are descriptions of signals as ________.
a long string of numbers
Opera Mobile is an example of ________.
a microbrowser
Which of the following is NOT an example of a network node?
a mouse
Client/server networks are controlled by a central server that runs a specialized piece of software called ________.
a network operating system (NOS)
personal area network (PAN)
a network used to connect computing devices that are in close proximity to each other
The most common type of home network is ________.
a peer-to-peer (P2P) network
intranet
a private network set up by a business or an organization that is use exclusively by a select group of employees, customers, and suppliers, volunteers, or supporters
file server
a server that stores and manages files for network users
dedicated server
a server used to fulfill one specific function, such as handling email
protocol
a set of rules for exchanging communication
print que
a software holding area for print jobs
Which of the following devices translates electronic data into radio waves?
a transceiver
shielded twisted-pair (STP)
a twisted-pair cable that contains a layer of foil shielding the reduce interference
Which of the following devices is needed to share an Internet connection on a wireless network?
a wireless router
_______ is the branch of computer science that deals with the attempt to create computers that think like humans.
a. Artificial intelligence
________ helps to ensure data integrity by maintaining information in only one place.
a. Data centralization
Which of the following is NOT a main operation of a database management system (DBMS)?
a. Implementing data mining
Which of the following statements about object-oriented databases is FALSE?
a. They store data in table format.
Which of the following operating systems is used primarily with mainframes as a network operating system? a. UNIX b. Mac OS c. Symbian OS d. Windows Vista
a. UNIX
An individual trained in the design and building of databases is called a database ________.
a. administrator
Management information systems (MIS) provide reports called ________, which show conditions that are unusual or need attention from users of the system.
a. exception reports
A ________ temporarily displays records that match the specified criteria.
a. filter
In a data warehouse, data gathered from sales, billing, and inventory departments are examples of ________ sources.
a. internal data
Data staging consists of all of the following steps, EXCEPT ________.
a. mining of data
Each record must have a unique field called a(n) ________ field.
a. primary key
A data ________ is a large-scale electronic repository of data that contains and organizes all of an organization's data in one place.
a. warehouse
When referring to hard drives, seek time and latency are the two factors that make up ________.
access time
QuickBooks and Peachtree are examples of ________ software.
accounting
proxy server
acts a a go-between connection computers on the internal network with those on the external network (internet)
application server
acts as a reposition for application software
jam signal
alerts that a data collision occurred
Text prediction ________ provide a list of popular words and save typing time when using text messaging.
algorithms
centralized
all clients connect to a server that preforms a task for them.
bus topology
all computers are connected in sequence on a single cable
electronic data interchange (EDI)
allows the exchange of large amounts of business data in a standardized electronic format
What is Android?
an operating system for cell/smartphones
Images are a representation of light waves called ________ or continuous waves.
analog
possessed object
any object that a user carries to identify themselves and that grants them access to a computer system or computer facility
A(n) ________ is a small program that resides on a server designed to be downloaded and run on a client computer.
applet
The general software you use to do tasks at home, school, or work is known as ________ software.
application
When a client computer connects to a network and requests the use of Microsoft Office 2010, for example, the ________ server delivers the software to the client computer.
application
ring topology
are laid out in a configuration resembling a circle. data flows around the circle form device to device in one direction only
extranet
area of an intranet that only certain corporations or individuals can access is called
brute force attack
attempting to access an account by repeatedly trying different passwords
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.
authentication
In a transaction-processing system, if transaction data are accumulated until a certain point and then many transactions are processed all at once, this is called ________ processing.
b. batch
Unstructured data such as video clips and pictures are known as ________ because of the way they are
b. binary large objects (BLOBs)
In a database, a ________ is synonymous with a category of information.
b. field
The location of a file is specified by its ______. a. drive letter b. file path c. file type d. file extension
b. file path
A Web address is stored as a(n) ________ field in a database.A Web
b. hyperlink
Data ________ means that the data contained in a database is accurate and reliable.
b. integrity
An expert system and a natural language processing system are both ________.
b. knowledge-based systems
The main path, analogous to an interstate highway system, of the Internet along which data travel the fastest is known as the Internet ________.
backbone
Using a ________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.
backdoor program
In Windows, which character is used as a path separator?
backslash (\)
CSMA/CD
because most star networks are Ethernet networks they use a method used on all Ethernet networks to avoid data collisions
access method
because two signals transmitted at the same times on a bus network may cause a data collision this is established to control which computer is allied to use the transmission media at a certain time
Before its final commercial release, software is often provided free or at a reduced cost in a(n) ________ version to certain test sites or to interested users.
beta
executable program
binary code understood by a CPU
BLOB stands for ______ _____ _____
binary large object
Unstructured data such as video clips and pictures are known as ________ because of the way they are encoded.
binary large objects (BLOBs)
The number of bits the video card uses to represent each pixel on the monitor is called ________.
bit depth
A ________ is a personal journal posted on the Web.
blog
________ viruses are often transmitted by a flash drive left in a USB port.
boot-sector
Which of the following network adapters is most likely to be preinstalled in a typical notebook computer today?
both a wireless and wired network adapter
A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as a(n) ________.
breadcrumb trail
Podcasts enable you to ________.
broadcast over the Internet using compressed audio and video files such as MP3s and MP4s
If a numeric field has a size of 5, which is the highest number it can hold?
c. 99999
Which of the following is NOT a data source for a data warehouse?
c. Data mine
What does the acronym DBMS stand for?
c. Database management system
_______ size defines the maximum number of characters or digits that a particular field can hold.
c. Field
________ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table.
c. Referential integrity
A ________ is automatically displayed in a field unless the user enters something different.
c. default value
Prior to entering data into a database, you must create a data ________ entry for each field in the database.
c. dictionary
In a database, a chart is stored in a(n) ________ field.
c. object
A(n) ________ is designed to improve communications and assist employees in accomplishing their daily tasks.
c. office support system (OSS)
A(n) ________is a way of retrieving information from one or more tables that defines a particular subset of data.
c. query
In a transaction-processing system (TPS), if the TPS database is queried and updated while the transaction is taking place, this is called ________ processing.
c. real-time
If a business keeps two lists, one for employee payroll and one for employee benefits information, both containing name and address information, this is an example of data ________.
c. redundancy
All of the following are top cybercrimes reported to the IC3 in 2011, EXCEPT ________. A. identity theft B. non-auction/non-delivery of merchandise C. advance fee fraud D. child pornography
child pornography
________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission
circuit switching
With object-oriented analysis, programmers identify categories of input that are part of the problem into ________.
classes
Running the Disk Cleanup utility is a quick way to ________.
clear out unnecessary files
The majority of Internet communications follow the ________ model of network communications.
client/server
A network that has 10 or more nodes is usually configured as a ________.
client/server network
New technologies pushing the boundaries of printing include ________.
cloud printing, 3-D printing and ink-less printing
Which of the following is NOT a common network topology?
cluster
Cable television, as well as some networks, uses ________ cable.
coaxial
MPEG-4, H.264, and DivX are all examples of ________.
codecs
hybrid topology
combining multiple topologies into one network
Computers that typically use special security protocols to protect personal, sensitive buyer information are known as ________ servers.
commerce
The process by which program code is converted into machine language is called ________.
compilation
A ________ check determines if all required fields were entered with appropriate data.
completeness
A(N) ________ check determines whether all required fields were entered with appropriate data.
completeness
Which of the following activities is carried out by the ALU?
completion of all arithmetic calculations
fiber optic cable
composed of a glass fiber though which the data is transmitted
wide area networks (WAN)
comprise large number of users over a wider physical area or separate LANs that are miles apart
All of the following can be used in a Windows file name EXCEPT:
*
All of the following can be used in a Windows file name, EXCEPT ________. A. * B. # C. % D. $
*
5) testing and installation; 4) analysis; 3) design; 2)analysis 1)problem/opportunity identification
...
A portable media player can play files with all of the following file extensions EXCEPT:
.doc
If Microsoft Word 2010 is used to create a file, which file extension is added automatically?
.docx
if Microsoft Word 2010 is used to create a file, which file extension is added automatically?
.docx
1) class 2) data 3)reusability 4) method
1)defined by information and actions 2) another term for information 3) ability to apply classes from other projects to a new project 4) another term for behavior
1. 1GL; 2. 3GL; 3. 1GL; 4. 5GL; 5. 4GL
1. assembly language; 2. c++; 3. machine language; 4. PROLOG; 5. SQL
1) interpreter 2) IDE 3) executable program 4) compiler 5)source code
1.translates source code line by line into intermediate form 2)developmental tool to help programmers write, compile, and test programs 3)binary code understood by a CPU 4)program that understands both the syntax and the machine language 5)programmers' instructions written in a higher-level language
The maximum memory you can install using the 64-bit version of Windows 8 Pro is ________ GB.
192
Windows 8 is offered in ________ versions.
2
There are ________ levels of cache memory.
3
If a numeric field has a size of 5, which is the highest number it can hold?
99999
function
=AVERAGE(A10:A25) is an example of a spreadsheet ________.
Which of the following statements is true about optical media?
A Blu-ray burner will most likely burn both CDs and DVDs
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
A DDoS attack
Which of the following statements about a graphical user interface is FALSE?
A GUI is a command-driven interface
flow chart
A ________ is a visual diagram of a process, including the decisions that need to be made along the way.
false
A data-flow diagram provides a visual representation of an algorithm.
binary
A decision that can be answered in only one of two ways, yes (true) or no (false), is called a(n) ________ decision.
Which of the following is NOT a main characteristic associated with desktop computers as compared to notebooks?
A desktop computer is more expensive
algorithm
A flowchart is a graphical representation of the steps and decision points in a(n) ________.
testing plan
A problem statement also includes a(n) ________, which lists specific input numbers a program would typically expect the user to enter as well as the precise output that a perfect program would return for those values.
software as a service
A relatively new trend of on-demand software deployment in which the application is hosted by the vendor and made available to the customer over the Internet is called ________.
integrated software
A(n) ________ application is a single software program that incorporates the most commonly used tools of productivity software into one stand-alone program.
runtime
A(n) ________ error is caught when the program executes.
syntax
A(n) ________ error is caused by not following the strict, precise set of rules for a specific programming language.
logical
A(n) ________ error occurs when a program executes but provides incorrect output.
information system
A(n) ________ includes data, people, procedures, hardware, and software.
editor
A(n) ________ is a special tool that helps programmers as they enter the code, highlighting keywords and alerting them to any typographical errors.
interpreted
A(n) ________ language is executed one line at a time, as each line is translated.
To develop Web-based multimedia, Adobe Flash includes a programming language named ________, which is similar to JavaScript in its keywords, operators, and classes.
A) ActionScript
Which language do programmers use if the problem requires a lot of number crunching? A) C++ B) HTML C) FORTRAN D) Java
A) C++
The standard communications protocol used on most client/server networks is ________. A) Ethernet B) NOS C) TCP/IP D) VPN
A) Ethernet
Which cable type is the most costly to install? A) Fiber-optic B) Twisted-pair C) ThinNet coaxial D) ThickNet coaxial
A) Fiber-optic
________ is the instructions programmers have written in a higher-level language.
A) Source code
A(n) ________ server is a server that stores and manages files for network users. A) file B) e-mail C) print D) database
A) file
A ________ is a visual diagram of a process, including the decisions that need to be made along the way.
A) flowchart
A ________ topology is created when more than one topology is used to build a network. A) hybrid B) multiple-use C) fusion D) crossover
A) hybrid
Which of the following is the final stage of the program development life cycle (PDLC)?
A) implementing the project
If Microsoft Word 2010 is used to create a file, which file extension is added automatically? A. .docx B. .doc C. .docs D. .docf
A. .docx
In a relational database, what is a relationship? A. A link between tables that defines how the data are related B. The primary key in the database C. The links among databases D. The array of tables in a database
A. A link between tables that defines how the data are related
______ is a personal journal posted on the web. A. blog B. podcast C. wiki D. webcast
A. Blog
The control unit is one component of the ______. A. CPU B. RAM C. front side bus D. clock
A. CPU
Which of the following is NOT a factor to consider when selecting network cabling? A. Cable diameter B. Interference C. Maximum run length D. Bandwidth
A. Cable diameter
____ networks contain servers as well as computers that individual users access and use. A. Client/server B. Peer-to-peer C. Switch D. CSMA/CD
A. Client/server
Which of the following statements about cookies is NOT true? A. Cookies obtain your personal information by searching your hard drive. B. Cookies are text files. C. Cookies help companies determine the traffic flow through their Web site. D. Some companies sell the personal information found in cookies to other companies
A. Cookies obtain your personal information by searching your hard drive.
When checking to see whether a particular name is registered on the internet, your computer consults a database that is maintained on a(n) __________ server. A. DNS B. URL C. Internet D. Web
A. DNS
During which phase of the system development life cycle are flowcharts and data-flow diagrams developed? A. Design B. Analysis C. Development and documentation D. Testing and installation
A. Design
A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses. A. Dynamic B. Static C. Assigned D. Mobile
A. Dynamic
Which of the following causes interference when a cable is exposed to strong electromagnetic fields? A. EMI B. RFI C. STP D. IEEE
A. EMI
Text such as <b> this should be bolded. </b> is an example of an HTML ______. A. Element B. Script C. Instruction D. Marker
A. Element
Social ____________ is an unwanted piggyback program that usually downloads with software you are installing from the internet. A. Engineering B. Theft C. Pretexting D. Pharming
A. Engineering
_______ is applied science concerned with designing and arranging machines and furniture so that people use so that the people using them aren't subjected to an uncomfortable or unsafe experience. A. Ergonomics B. Positioning C. Occupational safety D. Repetitive strain prevention
A. Ergonomics
__________ involves putting data into an electronic file in a format that another application can understand. A. Exporting B. Importing C. Batch processing D. Data mining
A. Exporting
Which cable type is the most costly to install? A. Fiber-optic B. Twisted-pair C. ThinNet coaxial D. ThickNet coaxial
A. Fiber-optic
Which of the following provides a visual representation of patterns that an algorithm comprises? A. Flowchart B. Pseudocode C. Source code D. Structure chart
A. Flowchart
Two types of video memory are _______. A. GDDR3 and GDDR5 B. SRAM and DRAM C. IrDA and IDE D. 4-bit and 8-bit
A. GDDR3 and GDDR5
More than 50% of smartphones use an operating system developed by ____. A. Google B. Apple C. Microsoft D. Symbian
A. Google
Any part of the computer that you can touch is called _____. A. Hardware B. Software C. Operating system D. Input
A. Hardware
A typical ________ is made up of one or more network switches to which ISPs connect. A. Internet Exchange Point B. Router Point C. Gateway Inference D. Point of Preference
A. Internet Exchange Point
The most common type of monitor is a ________. A. liquid crystal display (LCD) B. light-emitting diode (LED) C. organic light-emitting diode (OLED) D. cathode ray tube (CRT)
A. Liquid crystal display (LCD)
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address. A. MAC B. IP C. SSID D. network
A. MAC
A large network designed to provide access to a specific geographic area, such as a large city is a __________. A. MAN B. PAN C. LAN D. WAN
A. MAN
Which of the following has the greatest bandwidth? A. OC-768 B. T1-lines C. OC-48 D. T-3 lines
A. OC-768
A(n) _____ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system A. Port B. Drive C. Slot D. Expansion bus
A. Port
The basic input/output system is stored on a _____ chip. A. ROM B. CPU C. RAM D. CMOS
A. ROM
Sending a movie trailer over the Internet is most appropriate using the ______ protocol. A. Real time transport B. Connection- oriented C. User datagram D. TCP/IP
A. Real time transport
_____ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table. A. Referential integrity B. Normalization C. Database consistency D. Record integrity
A. Referential integrity
________ databases have the largest market share among the primary types of electronic databases. A. Relational B. Flat-file C. Multidimensional D. Object Oriented
A. Relational
__________ databases have the largest market share among the primary types of electronic databases. A. Relational B. Flat-file C. Multidimensional D. Object-oriented
A. Relational
Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network? A. Routers and switches B. USB ports C. Firewalls D. Network interface cards (NIC)
A. Routers and switches
Transport Layer Security (TLS) and ______ are two protocols that provide data integrity and security for internet transmission A. Secure sockets layer SSL B. Pretty good Privacy (PGP) C. Hypertext Transfer Protocol (HTTP) D. Public-key encryption
A. Secure sockets layer SSL
Web 2.0 is classified as the _____. A. social Web B. social network C. social page D. social computer
A. Social Web
Which of the following is the most commonly used client/server network topology? A. Star B. Cluster C. Ring D. Hierarchical
A. Star
Which of the following networks has high scalability? A. Star B. Ring C. Bus D. Hybrid
A. Star
A _____ was the first device with touch-screen capabilities. A. tablet PC B. notebook C. pocket PC D. desktop
A. Tablet PC
Which of the following is the first step in the boot process? A. The BIOS is activated by turning on the computer. B. The BIOS checks that all devices are in place. C. The OS is loaded into the RAM. D. Configuration and customization settings are check
A. The BIOS is activated by turning on the computer
Which of the following statements concerning IPv4 addresses is FALSE? A. The addresses are 16-bit numbers. B. IPv4 is the original IP addressing scheme. C. The addresses contain four octets. D. In binary, each octet of an IP address contains eight positions filled by either a 1 or 0.
A. The addresses are 16-bit numbers.
Which of the following information is NOT contained in a packet? A. The size (in bytes) of the packet B. The address to which the packet is sent C. The address from where the packet originates D. The data that are transmitted
A. The size (in bytes) of the packet
Which protocol prepares data for transmission but has no resending capabilities? A. UDP B. Telnet C. HTTP D. TCP
A. UDP
Flash drive plug into a(n)______. A. USB Port B. Serial port C. Expansion slot D. Drive bay
A. USB Port
The most common way to connect devices to a computer is to use the ______ port. A. Universal serial bus (USB) B. FireWire 400 C. FireWire 800 D. Ethernet
A. Universal serial bus (USB)
_____ is a powerful programming language used to build a wide range of Windows applications. A. Visual Basic B. PHP C. BASIC D. HTML
A. Visual Basic
5. Podcasts enable you to ____. A. broadcast over the Internet using compressed audio and video files such as MP3s and MP4s B. post journal entries on the Web C. communicate with friends in real time D. edit video files over the Web
A. broadcast over the Internet using compressed audio and video files such as MP3s and MP4s
You can keep track of IM contacts by using a ______. A. buddy list B. people finder C. search engine D. breadcrumb trail
A. buddy list
The majority of Internet communications follow the ______ model of network communications. A. client/server B. peer-to-peer C. circuit switching D. IXP
A. client/server
A(n) ___________ check determines whether all required fields were entered with appropriate data. A. completeness B. range C. consistency D. alphabetic
A. completeness
35. Using your computer for non-work activities while you are being paid to do your job is known as ________. A. cyberloafing B. cybersleeping C. cyberlazing D. cyberbreaking
A. cyberloafing
A ____ is a collection of related data that can be stored, sorted, organized, and queried. A. database B. list C. filter D. data mine
A. database
Each device attached to your computer comes with a special program called a _____ that facilitates communication between the device and the OS. A. device driver B. translator C. communication utility D. device configuraton
A. device driver
Computer-aided design software is used primarily by _______. A. engineers to create models B. airline pilots to navigate C. project managers to track tasks D. game makers to create games
A. engineers to create models
In a database, a _______ is synonymous with a category of information A. field B. record C. row D. table
A. field
A Web address is stored as a(n) ________ field in a database. A. hyperlink B. text C. address D. memo
A. hyperlink
Adobe Photoshop and Corel PaintShop Photo Pro are examples of ______ software. A. image-editing B. painting C. Web page authoring D. computer-aided desig
A. image-editing
In a data warehouse, data gathered from sales, billing, and inventory departments are examples of ________ sources. A. internal data B. external data C. metadata D. exported data
A. internal data
A peer-to-peer network is an example of ______ administration. A. local B. wide area C. central D. corporate
A. local
The ________ contains the central electronic components of the computer. A. motherboard B. system unit C. peripheral unit D. input unit
A. motherboard
The Siri speech-recognition feature on Apple's iPhone 4s is an examples of a ______. A. natural language processing (NLP) system B. decision support system C. management information system (MIS) D. database management system (DBMS)
A. natural language processing (NLP) system
Inkjet printers and laser printer are examples of ________ printers. A. nonimpact B. impact C. dot-matrix D. thermal
A. nonimpact
FBI-related scams involve ________. A. people pretending to represent official organizations B. running auctions that do not exist C. convincing people to send money as a "good faith" gesture D. collecting funds and not delivering the goods
A. people pretending to represent official organizations
All of the following are ways to avoid injuries when working on computers, EXCEPT ______. A. place monitor at least 10" from eyes B. purchase an adjustable chair C. ensure proper lighting D. take breaks
A. place monitor at least 10" from eyes
The capability of moving a completed programming solution easily from one type of computer to another is known as _________. A. portability B. scalability C. transferability D. inheritance
A. portability
A ________ is a set of rules for how information and communication are exchanged. A. protocol B. token C. switch D. packet
A. protocol
In the URL http://www.pearsonhighered.com/techinaction, the portion labeled "http" is the ______. A. protocol B. domain name C. path D. top-level domain
A. protocol
All of the following are categories of viruses, EXCEPT ________. A. snakes B. boot sector C. email D. encryption
A. snakes
9. A computer network is defined as two or more computers connected via ________ so that they can communicate with each other. A. software and hardware B. the Internet C. at least one server D. Ethernet cable
A. software and hardware
All of the following are examples of optical drives, EXCEPT ______. A. solid-state disc B. compact disc C. digital video disc D. Blu-ray disc
A. solid-state disc
The type of software that is best used to create a simple budget is ____. A. spreadsheet worksheet B. word processing software C. presentation software D. database software
A. spreadsheet worksheet
The four functions of the computer include input, process, output, and ______. A. storage B. calculating C. retrieval D. saving
A. storage
Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a process called ______ programming. A. visual B. drag and drop C. layout D. applications
A. visual
RAM is an example of _______. A. volatile B. nonvolatile C. permanent D. mobile
A. volatile
A(n) ______ takes advantage of file transport methods to spread on their own. A. worm B. script C. encryption D. time bomb
A. worm
false
ASP, JSP, and PHP are examples of programming languages that are used to develop number crunching. applications.
Microsoft ________ is a database management system.
Access
true
Actual programming takes place in the development and documentation step of the SDLC.
An individual trained in the design and building of databases is called a database _____
Administrator
true
Adobe Flash is a software product for developing Web-based multimedia.
A. can be answered in only two ways (i.e., yes/no) B. translate an algorithm into a programming language C. text-based approach to documenting an algorithm D. set of specific, sequential steps to complete a task E. keywords that direct the flow of a program
Algorithm D Binary Decisions A Control Structures E Coding B Pseudocode C
Which of the following is NOT an example of a common data type? "Object" "Hyperlink" "Numeric" "Alphanumeric"
Alphanumeric
Which statement pertaining to system reliability is FALSE? A. Having the latest version of software products can make your system more reliable. B. An accumulation of temporary Internet files has no effect on your computer's overall performance. C. You can clean out unnecessary programs from your Startup folder. D. When you defrag your hard drive, it works more efficiently.
An accumulation of temporary Internet files has no effect on your computer's overall performance.
Which statement pertaining to system reliability is FALSE?
An accumulation of temporary internet files has no effect on your computer's overall performance
rapid application development (RAD)
An alternative approach to systems development, called ________, makes use of a prototype at the beginning of the project.
A. ensure that the system works properly B. monitor the system to be sure it meets the needs of the users C. generate a detailed plan for the programmers to follow D. programming occurs E. create a statement of the goals and objectives
Analysis E Design C Maintenance and Evaluation B Testing and installation A Development and Documentation D
The most popular tablet operating system was developed by ________
Apple
tags
(HTML) uses special symbols called ________ to present information on the Web.
________ is the branch of computer science that deals with the attempt to create computers that think like humans.
Artificial intelligence
To develop Web-based multimedia, Adobe Flash includes a programming language named ________, which is similar to JavaScript in its keywords, operators, and classes. A) SilverLight B) ActionScript C) Active Server Pages D) LimeLight
B) ActionScript
________ is a protective layer made of glass or plastic, which is wrapped around the core of a fiber-optic cable for protection. A) Shielding B) Cladding C) Sheathing D) Coating
B) Cladding
What is the final step of the system development life cycle? A) Testing and installation B) Maintenance and evaluation C) Analysis D) Design
B) Maintenance and evaluation
In a(n) ________ network, each node connected to the network communicates directly with every other node. A) Client/server B) Peer-to-peer C) Intranet D) Extranet
B) Peer-to-peer
________, building a small program model, is a form of rapid application development (RAD).
B) Prototyping
________ is a Web-based universal chat service that lets you communicate with users on a variety of IM services from any computer without having to install a special program.
Meebo
Windows 8 is the operating system developed by ________.
Microsoft
Which of the following is a database management system? "SQL" "Microsoft Excel" "Microsoft Access" "Microsoft Project"
Microsoft Access
video editing
Microsoft Movie Maker is an example of ________ software.
Which of the following applications is considered an office support system? "A company's expert system" "An ATM system" "Windows XP" "Microsoft Office"
Microsoft Office
true
Microsoft's new SilverLight product supports the development of multimedia Web applications.
Which of the following is not a data-mining technique? "Clustering" "Model Management" "Classification" "Affinity Grouping"
Model Management
helps programmers find logical errors
Most integrated development environments (IDEs) include a debugger that
The latest version of the Mac OS X is the ________
Mountain Lion
Large databases accessed by many users, such as those used by ebay, are usually designed as _____ databases.
Multidimensional
A technique for understanding spoken or written language
Natural Language Processing