cis11
Digital Camera
A camera that takes and stores photographs as digital files. digital cash Allows so
class diagram
A class diagram provides the name of each object, a list of each object's attributes, a list of methods, and an indication of the associations between objects
data
A collection of unprocessed facts and figures, such as student names and Social Security numbers, is known as __________________-
Bluetooth is?
A common wireless technology for connecting peripherals is Bluetooth Bluetooth is a low-power technology, so it is ideal for mobile devices that don't have big batteries Bluetooth is used to connect wireless headsets to smartphones and is built into many smartphones, tablets, laptops, and desktops
exception report
An exception report contains information that is outside of normal or acceptable ranges
_____-input devices convert sounds into a form that can be processed by the system unit.
Audio
A utility program that makes a copy of all files or selected files that are in the libraries, contacts, and favorites on the desktop.
Backup and Restore
The capacity of a communication channel is measured in _______.
Bandwidth
This type of e-commerce often resembles the electronic version of the classified ads or an auction.
C2C
Small data files that are deposited on a user's hard disk when they visit a website are called _______.
Cookies
C2C
Electronic commerce involving individuals selling to individuals
Organizations use the following to allow suppliers and others limited access to their networks.
Extranets
file transfer
FTP, Web-based, and BitTorrent are popular types of
Parallel processing requires a computer to perform one complete task before beginning the next task.
False
Solid-state storage devices are different than hard disks in that they _______.
Has no moving parts
Audio Input
Is the process of inputting sound into the computer. A microphone is the most common audio input device.
A field that uniquely identifies each record.
Key field/primary keys
This operating system is designed to run only with Apple computers.
Mac OS
instruction pointer?
Machine language instructions for programs are held in memory; when the program begins, the memory address of the first instruction is placed in a part of the microprocessor's control unit called an instruction pointer
tracks sectors
Magnetic and optical media are divided into circular tracks and then further divided into pie-shaped sectors
Magnetic storage represents
Magnetic storage represents data by magnetizing microscopic particles on a disk or tape surface
search services
Maintain huge databases relating to information provided on the web and the internet
Niche Devices
Niche devices all have one thing in common: They contain a microprocessor
Which of the following types of character recognition systems is used for standardized multiple-choice testing?
OMR
Computer Abuse
Occurs when someone, who does not have permission, uses or accesses someone else's computer or causes damage without intention to harm
Output
Output is data that has been processed into a useful format. Printed text, spoken words, music, pictures, video, graphics are all examples
What is output?
Output is the result produced by a computer
For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distributed across each core--an operation called _______.
Parallel Processing
For multicore processors to be used effectively, computers must understand how to divid tasks into parts that can be distributed across each core- an operation called:
Parallel processing
Permissions
Permissions specify how shared files can be used Read and write permission - (full control) allows access for opening, viewing, modifying, and deleting files Read permission - allows authorized people to open a file and view it, but not modify or delete it Write-only permission - works like drop box, allowing people to put files in one of your folders, but not open, copy, or change any files you have stored there
Which view of data deals with how the data is actually formatted and located?
Physical view
Optical discs use these to represent data.
Pits and lands?
The series of dots that form the image on a monitor are called:
Pixels
Mice
Pointing device, Mice accomplish pointing, clicking, and dragging.
Impact printers
Printers that use mechanism. Strikes the paper
Property
Privacy concern related to who owns data
accuracy
Privacy concern that relates to the responsibility to ensure correct data collection.
encryption
Process of coding information to make it unreadable except to those who have a key.
Trojan horses
Programs that come into a computer system disguised as something else are called:
Encryption
Protects transmitted data that might be intercepted enroute and also stored data, which are rendered useless to a hacker even if he or she manages to gain access to files that are protected by other means
Audio Players
Small standalone software application or mobile app that offers tools for listening to digital audio and managing playlists, typically included with your computer's OS (operating system)
This hardware houses most of the electronic components that make up a computer system.
System unit
This type of computer is a thin slab that is all monitor with the system unit located behind the monitor.
Tablet
This type of computer is a thin slab that is almost all monitor with the system unit located behind the monitor.
Tablet
Xerox
The Alto computer, built by ____________, was the first to use a graphical user interface (GUI).
0s and 1s
The binary numbering system uses _________________
Web 1.0
The first generation of the Web is known as Web 1.0 and focused on linking existing information.
ISP
The most common way to access the Internet is through a(n)
A keyboard key, like Caps Lock, that turns a feature on or off is called a _______ key.
Toggle
True or False. The ATM works on the principle of real-time processing
True
Which type of port was developed to reduce the number of different types of ports on a computer?
USB
Which of the following can be used to connect several devices to the system unit and are widely used to connect keyboards, mice, printers, storage devices, and a variety of specialty devices?
USB Port
This character encoding scheme allows non-English characters and special characters to be represented.
Unicode
USB stands for _____________________.
Universal Serial Bus
spam
Unwanted and unsolicited e-mail
Linux
Which of the following platforms is free?
Word size is?
Word size refers to the number of bits that a microprocessor can manipulate at one time; it limits the amount of memory that the processor can access
bandwidth cap
Your bandwidth cap is the top speed allowed by your plan
DB-15
a 15-pin female port that transmits analog video
MiniDin-6 connector
a 6-pin variation of the S-Video port and looks like a PS/2 connector used by a keyboard or a mouse
DVI-A
a DVI (Digital Visual Interface) video port that only transmits analog data
HDMI connector
a connector that transmits both digital video and audio and is used on most computers and televisions
stylus
a device that is included with a graphics tablet and works like a pencil on the tablet
Product activation is ?
a means of protecting software from illegal copying by requiring users to enter a product key or an activation code
Laptops and tablets use _______ that are typically located outside the system unit. Select one: a. AC adapters b. batteries c. power supply units d. MiniDc
a. AC adapters
A computer's performance
affected by the speed of the pro- cessor, the amount of RAM, hard disk size and speed, capability of monitor, and disk organization.
Selective color change
algorithms are used to colorize black and white photos
The width of a monitor divided by the height of the monitor calculates the:
aspect ratio
With this type of memory, large programs are divided into parts and the parts are stored on a secondary device, usually a hard disk. Select one: a. Flash b. Cache c. Virtual d. Extended
c. Virtual
The Web was introduced in 1991 at
center for european nuclear research cern
Some popular form factors include:
component, clamshell, and slate
The process of pressing and releasing the left mouse button two times in rapid succession is known as ______________.
double-clicking
Client-based e-mail accounts require this special program to be installed in your computer
e-mail client
Parallel processing?
executes more than one instruction at a time and works well with today's multicore microprocessors
A record
holds data for a single entity—a person, place, thing, or event
Acceptance testing
is designed to verify that the new information system works as required
the lighter, non-pitted surface areas of the disc are called?
lands
Gigahertz (GHz) ?
means a billion cycles per second
Add-on programs for a variety of mobile devices including smartphones and tablets.
mobile apps
Smartphones
mobile devices with features similar to a tablet computer; provide telecommunications capabilities over cell phone networks
Activity trackers
monitors your steps and heart rate
Hard disks store and organize files using all the following, except:
paths
are the most important part of any information system.
people
The fax machine
performs both input and output functions through a telephone line.
Desktop, laptop, and tablet computers, and mobile devices are classified as
personal computers
Desktop, laptop, and tablet computers, and mobile devices are classified as _______.
personal computers
Programs that automatically start and operate as a part of your browser are called _______.
plug-ins
These apps allow mobile devices to use their digital cameras to scan special codes.
qr code reader
The process of accessing information from secondary storage devices is referred to as:
reading.
The quality and level of detail on a screen is determined by the ___________________.
resolution
This GUI includes tabs, groups and galleries
ribbon
These organize commonly used commands into a set of tabs.
ribbons
Portable
runs on battery power; its components are contained in a single case for easy transportation
On a hard disk each track is divided into invisible wedge-shaped sections called:
sectors
Tactical planning
setting incremental goals that can be achieved in a year or less
The most widely used handheld computers are
smartphones
Horizontal market
software is designed for common elements of many businesses
Date
stores dates in a format that allows them to be manipulated
Interframe compression
stores only the pixels that change color from one frame to the next
In the URL "http://www.simnetonline.com", what is the domain name?
www.simnetonline.com
PERT
(Program Evaluation and Review Technique) - used for analyzing the time needed to complete each project task
UDP
(User Datagram Protocol) is an alternative transport protocol which is faster than a TCP but does not perform error checking and cannot reorder packets
decision query
A decision query is a question or a set of instructions describing data that must be gathered to make a decision
Snipping Tool program
A full or partial screen shot of a window can be done with the _________________
Cybercrime
A general term that refers to any criminal activity that involves computers or networks; aka - e-crime or computer crime
graph database
A graph database offers an alternative way to track relationships; its structure resembles sociograms with their interlinked nodes
(GPU)
A graphics card contains a graphics processing unit (GPU) and a special video memory, which stores screen images as they are processed but before they are displayed
predictive methodology
A predictive methodology requires extensive planning and documentation up front; it's used to construct buildings and assemble cars—tasks that are well defined and predictable
Laser Printer
A printer that produces images using the same technology as copier machines.
private IP address
A private IP address can be allocated by any network without supervision from ICANN - but it cannot be used to send data over the Internet; it's not routable
procedure handbook
A procedure handbook is a type of user documentation that contains step-by-step instructions for performing tasks
quality-of-service metric
A quality-of-service metric is a technique used for measuring a specific QoS characteristic
Laptops and tablets use _______ that are typically located outside the system unit.
AC adapters
This process improves system performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU.
Disk caching
web log
Another name for a blog is _________
Which of the following is not a character encoding standard?
Answer: CISC From options: Unicode CISC ASC11 EBCDIC
column-oriented data model
The column-oriented data model stores data in columns, rather than in rows, so it works well in situations where the focus is on analysis of chunks of data
What does the term hot-swappable mean?
The computer can remain powered on while a device is plugged in or removed.
know information
The know information in a problem statement is the information that is supplied to the computer to help it solve a problem After identifying the known information, a programmer must specify how to determine when the problem has been solved
domain name system (DNS)
The mechanism for tracking domain names and their corresponding IP addresses is called the domain name system (DNS)
connection speed
The most common measurement of connection speed is the amount of data that can be transmitted in a specified time; technically, it is a measure of capacity
communicating
The most popular internet activity
The most popular microblogging site:
Instead of using a mouse, you can use this pointing device to control the pointer by rotating a ball with your thumb.
Trackball
This operating system is widely used by servers on the web, mainframe computers, and very powerful personal computers.
UNIX
Antivirus programs protect your computer system from viruses or malicious programs. This is an example of which type of software?
Utilities
Processors based on ARM technology ?
Processors based on ARM technology dominate tablet computers and smartphones ARM technology was originally designed by ARM Holdings, a British technology company founded by Acorn Computers, Apple Inc., and VLSI Technology ARM processors are energy efficient - an important characteristic for battery powered devices ARM processors are found in iPads, iPhones, and Surface tablets
This method of file transfer has been used for decades and is frequently used for uploading changes to a Website hosted by an Internet service provider.
FTP
assumption
In a problem statement, an assumption is something you accept as true in order to proceed with program planning
resource
In the context of digital devices, the term resource refers to any component that is required to perform work
communication protocol
In the context of networks, a communication protocol refers to a set of rules for efficiently transmitting data from one network node to another This process is called handshaking Networks use more than one protocol, and the collection of protocols for a network is referred to as a protocol stack
problem statement
In the context of programming, a problem statement defines certain elements that must be manipulated to achieve a result or goal A good problem statement for a computer program has three characteristics: It specifies any assumptions that define the scope of the problem It clearly specifies the known information It specifies when the problem has been solved
design phase
In the design phase of the SDLC, the project team must figure out how the new system will fulfill the requirements specified in the system requirements report
Proprietary software has restrictions?
Proprietary software has restrictions on its use that are delineated by copyright, patents, or license agreements
ENIAC
The ______ was the first working, digital, general-purpose computer.
Application programmers
create productivity applications such as Microsoft Office
The Internet is the largest _______ in the world
network
The Internet is the largest _______ in the world.
network
In most personal computer systems, the CPU is contained on a single chip called the _______.
microprocessor
Which of the following computers is also referred to as a server and is used to support end users for things such as retrieving data from a database or providing access to application software?
midrange
The operating system is often referred to as the software environment or software _______.
platform
Architects and engineers can use a(n) ______________ to print large drawings and designs.
plotter or multi-function device
Programs that automatically start and operate as a part of your browser are called
plug-ins
Programs that combine a variety of visual objects to create attractive, visually interesting presentations are called:
presentation graphics
During which phase is data, programs, and commands stored in RAM?
primary storage
The most widely used handheld computers are _______.
smartphones
On the motherboard, the connection points for chips are referred to as ____.
sockets
Identify the four basic categories of hardware in a microcomputer system.
system unit input/output secondary storage communication
The arrangement of keys on a keyboard, QWERTY reflects the keyboard layout by _______.
taking the letters of the first six alphabetic characters found on the top row of the keyboard
LCD (liquid crystal display)
technology produces an image by filtering light through a layer of liquid crystal cells
native resolution
the actual (and fixed) number of pixels built into an LCD monitor; for the clearest display, always set the resolution to the native resolution
1394b
a data transmission standard used by computers and peripherals (for example, a video camera) that transmits at 800 Mbps; also called FireWire 800
Portable media players
a handheld device that can store and play music; iPod touch is a portable media player
Tablets
a tablet computer is a portable computing device featuring a touch-sensitive screen used for input and output; uses a specialized OS
LED (light-emitting diode)
a technology used in an LCD monitor that uses less mercury than earlier technologies
A hash value is
a unique number derived from encoding one or more data sets, such as names, serial numbers, and validation codes
These types of ports typically provide connections to specialized devices such as camcorders and storage devices. Select one: a. FireWire b. Serial c. Parallel d. AGP
a. FireWire
Noise reduction
"noise" refers to spots, dust, and scratches left on old photos after they are scanned
Servers:
"serves" data to computers in a network; Google search results are provided by servers; about the size of a desk draw and mounted in racks of multiple servers
Backup
A backup is a copy of one or more files that is made in case the originals become damaged or lost Figuring out what to backup is important; backing up everything isn't always practical When deciding on what to back up, know what's important and ensure that current versions exist on more than one storage device
A communication network
A communication network (or communication system) links together devices to data and information can be shared among them
A communication port
A communication port (usually referred to simply as a port) is a virtual end point for data entering and leaving a digital device Communication ports are not a physical circuit, but rather an abstract concept of a doorway, an opening, or a portal through which data flows
A device driver is
A device driver is software that helps a peripheral device establish communication with its host device For example, the device driver for an HP printer sets up data streams from RAM to the printer and makes sure that the data is formatted in a way that the printer can work
A microprocessor is?
A microprocessor is an integrated circuit designed to process instructions It is the most important, and usually the most expensive, component of a digital device Intel Corporation is the world's largest chipmaker and supplies a sizeable percentage of the microprocessors that power desktops and laptops
multicore processor?
A microprocessor that contains circuitry for more than one processing unit is called a multicore processor
modem
A modem contains circuitry that converts the data-carrying signals from a digital device to signals that can travel over various communications channels
packet switching
A more efficient alterative to this process is packet switching technology, which divides a message into several packets that can be routed independently to their destination
software engineering
A related activity, software engineering, is a development process that uses mathematical, engineering, and management techniques to reduce the cost and complexity of a computer program while increasing its reliability and modifiability
router
A router is a device that controls the flow of data within a network and also acts as a gateway to pass data from one network to another
runtime error
A runtime error occurs when a program runs instructions that the computer can't execute
Smishing
A scam similar to phishing that uses text messages on cell phones
dedicated graphics, is?
A second option, called dedicated graphics, is graphics circuitry mounted on a small circuit board called a graphics card (or video card)
sequence diagram
A sequence diagram depicts the detailed sequence of interactions that take place for a use case
sort key
A sort key is the column of data that is used as the basis for rearranging the data
summary report
A summary report combines, groups, or totals data
supply chain
A supply chain is the sequence of organizations, people, activities, information, and resources involved in moving a product or service from supplier to customer
syntax error
A syntax error occurs when an instruction does not follow the syntax rules of the programming language
physical sort order
A table's physical sort order is the order in which data are arranged on storage devices
variable-length field
A variable-length field is like an accordion—it expands to fit the data you enter
Vector Graphics Basics
A vector graphic consists of a set of instructions for creating a picture Vector graphics include standard shapes such as circles and rectangles
A virtual machine (VM)
A virtual machine (VM) allows one computer to simulate the hardware and software of another Each VM has its own simulated processor, RAM, video card, input and output ports, and OS Popular VM software such as VMware and Parallels Desktop can run on most computers with Intel microprocessors, including Intel Macs, PCs, and generic Linux computers
Boot-Sector Virus
A virus that hides in the boot sectors of a disk, where the operating system accesses them every time it accesses the disk itself
Wireless Mouse
A wireless mouse is a battery-powered device that relies on infrared or radio waves to communicate with the computer.
Laptops and tablets use ____ that are typically located outside the system unit.
AC adapters
Forensic Accountants
Accountants who have the required technical and legal experience to research a given concern, follow leads, establish audit trails of questionable transactions, document their findings, organize evidence for external review and law enforcement bodies, and (if necessary) testify in court
DHCP
Activate DHCP (assigns addresses to each device that joins your network)
wireless encryption
Activate wireless encryption to scramble and unscramble data
The size, or _______, is measured by the diagonal length of a monitor's viewing area.
Active display area
Bluetooth Smart, ZigBee, and Z-Wave
Additional low-power short-range technologies developed specifically for IoT networks include Bluetooth Smart, ZigBee, and Z-Wave
DNS spoofing
Altering DNS records can change the destination of email, browser connections, and download requests Unauthorized changes to the DNS are called DNS spoofing
ecommerce application
An ecommerce application is the software that handles ecommerce transactions
plagiarism
An ethical issue relating to using another person's work and ideas as your own without giving credit to the original source.
An executable file -
An executable file contains a computer program that is carried out step-by-step within the microprocessor Software can contain viruses and other malware, so consumers should download new applications only from trusted sources Software developers usually have a Web site for distributing software; well-established developers tend to offer trustworthy products
expert system shell
An expert system shell is a software tool containing an inference engine and a user interface that developers use to enter facts and rules for a knowledge base
Scanner
An input device that can change images into codes for input to the computer.
crackers
Computer criminals who create and distribute malicious programs.
This subsystem defines the logical structure of the database by using a data dictionary or schema.
Data definition subsystem
If your computer freezes, pressing a combination of Ctrl, Alt, and _____________ should bring up a dialogue box that enables you to close the unresponsive program.
Delete
In a virtualized environment, this operating system runs on the physical machine.
Host
A web page typically contains _______, which contains the formatting instructions for displaying the web page.
Hypertext Markup Language (HTML)
zombies
Infected computers that can be remotely controlled
broadband
Network channels that are capable of moving at least two megabits of data per second (2 Mbps) are classified as broadband
Two categories of laser printers are:
Personal and shared
Bar code readers use _______ embedded in them to read bar codes.
Photoelectric cells
profiles
Photos, lists of personal interests, contact information, and other personal information displayed on Facebook.
Optical discs use these to represent data.
Pits and lands
In a network operating system, this computer coordinates all communication between computers.
Server
Types of "Big" computers are:
Supercomputers Mainframes Servers
wiki
Web site designed to allow visitors to use their browsers to add, edit, or delete the site's Content
A financial budget would be created in what type of data file?
Worksheet
B Male connector
a USB connector that connects a USB 1.x or 2.0 device such as a printer
Multiprocessing
a capability that supports a division of labor among all the processing units
Applet
a small program stored in a web page file and designed to run by web browser software
Copy command is?
allows you to make copies of essential files
biometric device
an input device that inputs biological data about a person; the data can identify a person's fingerprints, handprints, face, voice, eye, and handwriting
Which of the following is a function of the control unit? Select one: a. It provides pathways that support communication among the various electronic components. b. It directs the movement of electronic signals between memory and the arithmetic-logic unit. C c. It performs fundamental math operations like addition, subtraction, and so on. d. It uses the logic to compare two pieces of data.
b. It directs the movement of electronic signals between memory and the arithmetic-logic unit.
This type of computer is a thin slab that is almost all monitor with the system unit located behind the monitor. Select one: a. Laptop b. Tablet c. Desktop d. Smartphone
b. Tablet
Directory assistance
devices that disabled people use to command wheel chairs and other objects that make them more mobile
_______ provide additional information and request user input.
dialog boxes
Three ways to improve the performance of a hard disk include:
disk caching, RAID, and file compression.
If all the data in a database is not physically located in one place, it would be a(n) _______ database.
distributed
A use case diagram
documents the users of an information system and the functions they perform
Smartglasses
include Google Glass; controlled by voice commands or a touchpad on the rim; has a camera and display device that essentially beams an image toward the wearer's eye
Ping rate
indicates how quickly data can reach a server and bounce back to you
Desktop, laptop, and tablet computers, and mobile devices are classified as_______.
personal computers.
The Internet is a(n) _______ made up of wires, cables, satellites, and rules for exchanging information between computers connected to the network.
physical network
System conversion
refers to the process of deactivating an old information system and activating a new one; it is also referred to as a "cutover" or "to go live
contrast ratio
the contrast between true black and true white on a screen
pixel pitch
the distance between adjacent pixels on a screen; the smaller the number, the better
All components are controlled by _____ which depends on drivers.
the processor
logic error
A logic error is a type of runtime error in the logic or design of the program
Optomechanical Mouse
is the same as a mechanical mouse, but uses optical sensors to detect motion of the ball.
Bandwidth
is the transmission capacity of a communication channel
Ping
is utility software designed to measure responsiveness
DRM
To prevent copyright violations, corporations often use:
True or False. Media are the actual physical material that holds the data and programs.
True
True or False. Plug and Play has become a generic term that is associated with the ability to plug any device into a computer and have it play or work immediately.
True
True or False. Thermal printers use heat elements to produce images on heat-sensitive paper and are used at ATMs and gasoline pumps.
True
computed field
A computed field is a calculation that a DBMS performs, similar to the way a spreadsheet computes a formula
Display Devices
A computer display device that simply displays text and images is classified as an output device Touchscreens, however, can be classified as both input and output devices because they accept input and also display output
database index
A database index contains a list of keys, and each key provides a pointer to the data that contains the rest of the fields related to that key
lookup routine
A lookup routine validates a field entry by checking data in an in-house or third-party database
loyalty programs
A major source of data for CRM is produced by loyalty programs, or a rewards program, which is a marketing effort that provides customers with incentives for making purchases
A memory card is a?
A memory card is a flat, solid state storage medium commonly used to transfer files from digital cameras and media players to computers
multi-level sort
A multi-level sort arranges information by more than one field
multidimensional database
A multidimensional database organizes relationships over three or more dimensions; in the context of databases, a dimension is a layer based on a data element, such as a product, place, or customer, that can be used to categorize data
A multiple-user license is?
A multiple-user license is priced per copy and allows the allocated number of copies to be used simultaneously
Ethical Hacker
A network and computer expert who purposefully attacks a secured system to help its owners find any vulnerabilities that could be exploited by a malicious hacker; aka - intrusion testing or penetration testing
physical storage model
A physical storage model describes what actually happens on the disks and in the circuits
Trackball
A pointing device that works like a mouse turned upside down; the ball is on top of the device.
ribbon
A power cable and a(n) __________________ cable connect an optical drive to the motherboard.
normalization
A process called normalization helps database designers create a database structure that minimizes storage space and increases processing efficiency
process
A process is a routine that changes data by performing a calculation
microprocessor clock?
A processor specification, such as 3.4 GHz, indicates the speed of the microprocessor clock - a timing device that sets the pace for executing instructions
program editor
A program editor is a type of text editor specially designed for entering code for computer programs
relational database
A relational database stores data in a collection of related tables
report template
A report template contains the outline or general specifications for a report
structured file
A structured file uses a uniform format to store data for each person or thing in the file
Malware
A term for many types of malicious or damaging software, such as viruses, worms, and Trojan horses
text editor
A text editor is any word processor that can be used for basic text editing tasks, such as writing email, creating documents, and coding computer programs
A transaction processing system
A transaction processing system (TPS) provides a way to collect, process, store, display, modify, or cancel transactions
IM
A type of communication that allows two or more people to contact each other via direct, live communication.
Inkjet printer
A type of printer that uses a nonimpact process. Ink is squirted from nozzles as they pass over the media.
biometric
A type of scanning device such as fingerprint and iris (eye) scanner.
Web bug
A type of spyware that uses invisible images or HTML code hidden within a web page or an e-mail message.
executive information system (EIS)
An executive information system (EIS) is a type of decision support system designed to provide senior managers with information relevant to strategic management activities
object database
An object database, also called an object-oriented database, stores data as objects, which can be grouped into classes and defined by attributes and methods
office suite is
An office suite is a collection of programs that typically include word processing, spreadsheet, and presentation modules In the context of office suites, the term module refers to a component, such as a word processing module
user interface
An operating system gives your digital device a personality; it controls key elements of the user interface, which includes the visual experience as well as the keyboard, mouse, microphone, or touchscreen that collects user commands Behind the scenes, the OS is busy supervising critical operations that take place within a device
operational database
An operational database is used to collect, modify, and maintain data on a daily basis
Optical Mouse
An optical mouse uses a laser to detect the mouse's movement. Optical mice have no mechanical moving parts.
Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?
Internet Scam
dynamic addresses
Internet addresses that are temporarily assigned to a device are called dynamic addresses
Internet governance
Internet governance is simply a set of shared protocols, procedures, and technologies that evolve through common agreement among network providers
Stylus
Is a pen-like writing instrument. It is used for touch screens.
Which of the following is a function of the control unit?
It directs the movement of electronic signals between memory and the arithmetic-logic unit.
Network discovery
Network discovery is a setting that affects whether your computer can see other devices on a network, and whether your computer can be seen by others; it works in different ways on different devices Mobile devices - the OS may not offer a way to see other devices on a network Macs - OS X devices have no user-modifiable network discovery settings; offers file sharing instead Windows - Some OSs offer network discovery that allows users to turn it off or on
All of the following are commonly used units of measurement to describe memory capacity, except _______.
Nanobyte
Internet service providers (ISPs)
Networks that form the Internet are maintained by Internet service providers (ISPs)
Security Keyboards
Provides security features such as metric finger print reader, magnetic stripe, smart card readers.
Which of the following is not a function of the operating system?
Providing Internet access
All communications between a company's internal networks and the outside world pass through this server.
Proxy
Public domain software is not -
Public domain software is not protected by copyright because the copyright has expired or the author has placed the program in the public domain, making it available without restriction
This type of database is organized into many tables with common data items (key fields) linking the tables to one another.
Relational
schema
Relational databases are organized according to a schema, which is a blueprint for its structure; rows, columns, and tables of a database are part of its schema
Altaire
Released in 1975, the ____________ computer was the first personal computer.
cloud storage is?
Remote storage can also be available as an Internet service, in which case it is called cloud storage Cloud storage is provided to individuals by services such as Apple iCloud, Microsoft OneDrive, Google Drive, and Dropbox
Remote storage is?
Remote storage is housed on an external device that can be accessed from a network
There are several reasons why you might want to change the contents of ROM and boot loader instructions, including:
Repair User modification Forensics Updates
Worm
Replicate themselves repeatedly like a virus, and they can consume internal memory, disk space, and Internet bandwidth
Monitor
The display device on a computer
knowledge base
The facts and rules are incorporated into a knowledge base which is stored in a computer file and can be manipulated by software called an inference engine
formatting
The formatting process creates the equivalent of electronic storage bins
data redundancy
The goal of normalization is to minimize data redundancy—the amount of data that is duplicated in a database
analysis phase
The goal of the analysis phase is to produce a list of requirements for a new or revised information system; tasks for this phase include: Studying the current system Determining system requirements Writing a requirements report
detailed design phase
The goal of the detailed design phase is to create very detailed specifications for the complete information system
project development plan
The goal of these activities is to create a project development plan; this planning document includes: A short description of the project including its scope An estimate of the project costs and potential financial benefits A list of project team participants A schedule for the project, including an outline of its phases
planning phase
The planning phase for an information system project includes: Assembling the project team Justifying the project Choosing a development methodology Developing a project schedule Producing a project development plan
ICANN,
The organization that supervises internet addressing is ICANN, the Internet Corporation for Assigned Names and Numbers
protocols
The rules for exchanging data between computers.
The screen
The screen is part of the monitor. It includes the housing for its electrical componetnts. Screen out put is called soft copy because it is temporary.
syntax
The set of rules that specify the sequence of keywords, parameters, and punctuation in a program instruction is referred to as syntax
key-value data model;
The simplest structure for storing data in a NoSQL database is the key-value data model; each data item has a key that is a unique identifier similar to a relational database key such as CustomerID
True or False. Digital or interactive whiteboards display a computer's desktop and can be controlled using a special pen or a finger.
True
True or False. Discarded CRTs are a serious threat to the environment, given their high content levels of lead and other hazardous materials.
True
True or False. Does RAID give fast access speed?
True
True or False. File servers are appropriate devices to use in an enterprise storage system.
True
True or False. Function keys provide shortcuts for specific tasks.
True
True or False. If you have used Google Docs to create a word processing document, you have used cloud computing.
True
True or False. The most common protocol for website encryption is https (Hyper Text Transfer Protocol Secure).
True
True or False. The most common standard in LANs is called Ethernet.
True
True or False. The system unit, also known as the system chassis, is a container that houses most of the electronic components that make up a computer system.
True
USB ports are used to connect keyboards, mice, printers, storage devices, and a variety of specialty devices. Select one: True False
True
VGA and DVI ports provide connections to monitors. Select one: True False
True
eSATA ports provide high-speed connections for external hard disk drives, optical disks, and other large secondary storage devices. Select one: True False
True
chat
Two popular instant messaging services are Google Talk and Facebook
first-party
Type of cookie that provides information to a single site
web-based
Type of e-mail account that does not require an e-mail program to be installed on a user's computer is:
With this type of memory, large programs are divided into parts and the parts are stored on secondary device, usually a hard disk.
Virtual
Remote users can connect to an organization's network through this type of secure private connection.
Virtual Private Network (VPN)
When a single physical computer runs this type of software, it operates as though it were two or more separate and independent computers.
Virtualization
Which of the following allows the transmission of telephone calls over computer networks?
Voice over IP
WEP
WEP (wired equivalent privacy) is the oldest and weakest wireless encryption protocol
WPA
WPA (Wi-Fi Protected Access) and its cousins, WPA2 and PSK, offer more security
This type of boot occurs when the computer is already on and you restart it without turning off the power.
Warm boot
memory leak
When you want to run more than one application at a time, the OS has to allocate specific areas of memory for each; sometimes application requests memory but never releases it—a condition called a memory leak Memory "leaks" away into this application reserved area, eventually preventing other applications from accessing enough memory to function properly
System software
Which of the following is a collection of programs rather than a single program?
eSATA
Which of the following ports provide high-speed connections for external hard-disk drives, optical discs, and other large secondary storage devices?
processing insurance claims.
Which of the following uses would be most appropriate for a mainframe computer?
accesss
Which of the three privacy issues relates to the responsibility of those who have data to control who is able to use that data
flash memory
Which of these types of memory has no moving parts and is often used to transfer data between digital cameras and personal computers?
Procedures
Which part of an information system consists of the rules or guidelines for people to follow?
mini-HDMI connector
a smaller type of connector that transmits both digital video and audio used for connecting some devices such as a smartphone to a computer; also known as a HDMI mini connector
RFID is most associated with ___________________.
automobiles moving through tollways/ oxygen senors in exhaust pipes of automobiles/ grocery store bar codes
Touch Pad
a pointing device with a specialized surface that can convert the motion and position of your fingers to a relative position on screen.
composite video port
a port used by television or by a video card that is designed to send output to a TV; the port is round and has only a single pin in the center of the port; also called a RGB port
RGB port
a port used by television or by a video card that is designed to send output to a TV; the port is round and has only a single pin in the center of the port; also called composite video port
Pointing stick
a pressure-sensitive device that looks like a pencil eraser.
What might be used to predict earthquake or volcanic eruptions?
a probe/RFID/an adaptive computer device
MIDI (musical instrument digital interface)
a set of standards that are used to represent music in digital form; the port is a 5-pin DIN port that looks like a keyboard port, only larger
USB 3.0 Micro-B connector
a small USB connector used by SuperSpeed USB 3.0 devices; the connectors are not compatible with regular Micro-B connectors
pixel
a small spot on a fine horizontal scan line; illuminated to create an image on the monitor
Which of the following characteristics about RAID is incorrect?
one high-capacity hard disk drive
Device drivers are written for a specific combination of ____________ and devices.
operating systems
The type of media that uses laser technology to store data and programs is _______.
optical disc
The type of media that uses laser technology to store data and programs is
optical disk
A software license
or license agreement, is a legal contract that defines the ways in which a computer program may be used These licenses are sometimes referred to as EULAs (End User License Agreements)
Security
program specifications are formulated to so programmers remain aware of security throughout the software development life cycle
Performance
programmers need to carry out real-world tests to ensure that programs don't take too long to load
Usability
programs should be easy to learn and use and be efficient
Demonware is?
proprietary software made available as a trial version; it's distributed for free and often comes preinstalled on new devices
A monitor that was designed to act as an input device is known as a(n) ______________________ monitor.
touch screen
Special Input devices
trackball, joystick, wheel, pointing stick, graphics tablet, touch display screen, stylus, voice recognition devices, touchpad, scanner, digital camera, video input, and biometric input.
the arrow
the most common pointing device
WBS
(work breakdown structure) - breaks a complete task into a series of subtasks
file shredder softwar
To delete data from a disk in such a way that no one can ever read it, you can use a special file shredder software that overwrites supposedly empty sectors with random 1s and 0s; this is handy if you want to sell or donate your computer and want to make sure your personal data is no longer on the hard disk
Traceroute
To determine whether or not your slow Internet connection is caused by your ISP or your computer you can use a Traceroute, a network diagnostic tool that lists each router and server
currency
To evaluate the accuracy of information you find on the Web, you should consider the sites' authority, accuracy, objectivity, and:
cluster
To speed up the process of storing and retrieving data, a disk drive usually works with a group of sectors called a cluster or a block
True or False. Cutting and pasting material from a website directly into your own report or paper without giving proper credit to the original source is unethical.
True
Game consoles
devices for playing computer games such as Sony's Play Station and Nintendo's Wii
DVI stands for __________
digital video interface
Which of the following ports provide high-speed connections for external hard disk drives, optical disks, and other large secondary storage devices?
eSATA
Strategic planning
emphasis on long-range and future goals
Cloning
employs algorithms pulling pixels from one area and moving them to another
Input devices
enable you to input data and commands into the computer. The most common input devices are the keyboard and mouse.
The content of a website is broken down into a series of related pieces of information which is represented in a
graphical site map
Most applications use a(n) _______ that displays graphical elements called icons to represent familiar objects.
graphical user interface gui
What is the most common use for Bluetooth?
hands-free handsets for cell phones
The equipment that processes data in order to create information is called the
hardware
The equipment that processes data in order to create information is called the _______.
hardware
Mechanical Mouse
has a ball located on the bottom that rolls around on a flat surface as the mouse is moved. Sensors inside the mouse determine the direction and distance of the movement.
Solid-state storage devices are different than hard disks in that they:
have no moving parts.
The hard disk''s disk surface is scratched and some or all of the data is destroyed when there is a:
head crash
Database software
helps you enter, find, organize, update, and report information stored in a database Database software stores data as a series of records, which are composed of fields that hold data
web page typically contains _______, which contains the formatting instructions for displaying the web page.
hypertext markup language html
Limitations to iOS:
iOS limits your selection of apps to those provided by the online Apple App Store, unless you make unauthorized modifications to "jailbreak" the phone Background processes, such as music, voice calls, and notifications, provide very limited multitasking capabilities
These programs are used to create and edit vector images
illustration programs
These are specialized graphics programs for editing or modifying digital photographs.
image editors
library of electronic images is called a
image gallery
Image enhancemennt
improves brightness, color saturation, and focus
The difference between remote controls that use infrared light and those that use radio waves is that ___________________.
infrared light requires the user to point the remote control directly at the appliance
A local application is
installed on a computer's hard disk Office suites, games, and professional software tools are common examples of local applications for desktop and laptop computers
The most common way to access the Internet is through
internet service provider isp
Storage that retains its data after the power is turned off is referred to as:
nonvolatile storage.
A byte is formed by a group of _______.
8 bits
The type of mouse emits and senses light to detect mouse movement.
Optical
The processing speed of a microprocessor is typically represented by its _______.
clock speed
General-purpose applications include all of the following except
web authoring
Solid state storage is?
(sometimes called flash memory) stores data in erasable, rewritable circuitry, rather than on spinning disks or streaming tape
IPv6
(Internet Protocol version 6); uses 128 bits for each address; produces billions and billions of unique Internet addresses
XML
(eXtensible Markup Language) is a popular tool used to format document databases
FTTH
(fiber-to-the-home) is the use of high-capacity fiber-optic cables, rather than coaxial cables, to connect homes to broader municipal networks
4G
(fourth generation) technologies, such as WiMAX and LTE, rolled out in 2011
3-D Graphics
3-D Graphics are based on vectors stored as a set of instructions describing the coordinates for lines and shapes in a three-dimensional space Vectors form a wireframe that works like the framework for a tent The process of covering the wireframe surface with color and texture is called rendering The technique for adding light and shadows to a 3-D image is called ray tracing
Cellular services use _______ to provide wireless connectivity to the Internet.
3G and 4G cellular networks
A 32-bit-word computer can access
4 bytes at a time
A 32-bit-word computer can access _______.
4 bytes at a time
How a BitTorrent works
A BitTorrent network server breaks a movie file into pieces and begins to download those pieces to the first computer that requested the movie As more computers request the file, they become part of a "swarm" that uses peer-to-peer technology to exchange movie segments with each other After the server has downloaded all the segments to the swarm, its job is complete and it can service other requests
Wireless scanners
A Bluetooth barcode scanner uses Bluetooth wireless technology to scan data, such as from a hospital bracelet, and transmit it to a computer
CASE tool
A CASE tool (computer-aided software engineering tool) is a software application designed for documenting system requirements, diagramming current and proposed information systems, scheduling development tasks, and developing computer programs
A RISC is?
A RISC (reduced instruction set computer) processor performs instructions faster than a CISC (complex instruction set computer) processor
Wi-Fi - IEEE 802.11
A Wi-Fi device transmits data as radio waves and is compatible with Ethernet, so you can use the two technologies in a single network You can set up Wi-Fi in two ways Wireless mesh topology - devices broadcast directly to each other Star topology - a centralized broadcasting device, a wireless access point, coordinates communication among network devices
data type
A data type specifies the way data is represented on physical storage media and RAM
data breach
A data breach is an incident in which personal data is viewed, accessed, or retrieved without authorization Data breaches can be caused by the following: Malware attacks Employee negligence Insider theft
data center
A data center is a specialized facility designed to hold and protect computer systems and data
data store
A data store is a medium that holds data
decision model
A decision model is a numerical representation of a realistic situation, such as a cash-flow model of a business that shows how income adds to cash accounts
decision support system (DSS)
A decision support system (DSS) helps people make decisions by directly manipulating data, accessing data from external sources, generating statistical projections, and creating data models of various scenarios
disaster recovery plan
A disaster recovery plan is a step-by-step description of the methods used to secure data against disaster and a set of guidelines for how an organization will recover lost data and resume operations if and when a disaster occurs
A disk partition is
A disk partition is a section of a hard disk drive that is treated as a separate storage unit; most hard drives are configured with a single partition that contains the OS, programs, and data
document-oriented
A document-oriented database stores unstructured data, such as the text of a speech
top-level domain
A domain name ends with an extension that indicates its top-level domain, such as .edu or .org
field format
A field format is a template that adds the correct formatting as data is entered
field validation
A field validation rule is a specification that the database designer sets up to filter data entered into a particular field
A hard disk drive contains?
A hard disk drive contains one or more platters and their associated read-write heads A hard disk platter is a flat, rigid disk made of aluminum or glass and coated with magnetic iron oxide particles A read-write head mechanism in the disk drive magnetizes particles to write data, and senses the particles' polarities to read data
keyword
A keyword, or command, is a word with a predefined meaning Keywords differ depending on the programming language; there is a basic vocabulary that covers most necessary tasks
single-level sort
A single-level sort uses only one field to arrange records
A site license is?
A site license is generally priced at a flat rate and allows software to be used on all computers at a specific location
Cookie
A small text file that stores information about your browsing habits and interests, as well as other information that you may supply by logging onto the site
byte
A(n) __________ is 8 bits.
Launched in 1969 as a U.S. funded project that developed a national computer network, the Internet was initially called _______.
ARPANET
Which of the following measures the amount of time required by the storage device to retrieve data and programs?
Access speed
Hard disk drive specifications include:
Access time - the average time it takes a computer to locate data on the storage medium and read it Data transfer rate - the amount of data a storage device can move per second from the storage medium to RAM
computer Fraud and Abuse
Act that makes it a crime for unauthorized persons even to view- let alone copy or damage- data using any computer across state lines.
Firewire
Also known as IEEE 1394 and IEEE 1394b. The IEEE 1394 bus standard supports data transfer rates of up to 400 Mbps and can connect up to 63 external devices; IEEE 1394b provides speeds up to 3200 Mbps.
Identity Theft
An act in which someone wrongfully obtains and uses another person's personal data for fraud or deception
agile methodology
An agile methodology focuses on flexible development and specifications that evolve as the project progresses
OpenOffice
An alternative application suite to Microsoft Office is ___________________.
analytical database
An analytical database is used to collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions
data flow
An arrow symbolizes a data flow and indicates how data travels
expert system
An expert system, sometimes referred to as a knowledge-based system, is a computer system designed to analyze data and produce a recommendation, diagnosis, or decision based on a set of facts and rules
external entity
An external entity is a person, organization, or device used outside the information system that originates or receives data
cardinality
An important aspect of the relationship between record types is cardinality, which refers to the number of associations that can exist between two record types
An information system
An information system collects, stores, and processes data to provide useful, accurate, and timely information, typically within the context of an organization
system development life cycle
An information system progresses through several phases as it is developed, used, and retired; these phases encompass as system development life cycle, or SDLC
An ink jet printer has
An ink jet printer has a nozzle-like print head that sprays ink onto paper to form characters and graphics
port
An interface to which a peripheral device attaches to or communicates with the system unit.
organization
An organization is a group of people working together to accomplish a goal
mission; its mission statement
An organization's goal or plan is referred to as its mission; its mission statement describes not only an organization's goals, but also the way in which those goals will be accomplished
organizational chart
An organizational chart depicts the hierarchy of employees in an organization
Which of the following is not a popular desktop operating system?
Android
Which of the following is true about sharing software?
Answers: a. When a desktop computer uses software from a server, the software files remain permanently in RAM of the desktop computer. b. If the server where the software is installed is not functioning, the other desktop computers can still use the software. c.: Even if software is installed on a server, portions of it must also be installed on the desktop computers. d. Software only has to be installed and updated on one computer. Correct Software only has to be installed and updated on one computer.
enterprise
Any organization that seeks profit by providing goods and services is called a business or an enterprise
Application Software is?
Application Software is a set of computer programs that helps a person carry out a task
Computers run three main types of software:
Application software System software Development tools
a jailbreak?
Apps are available from other sources, but using them requires an unauthorized change to the device's software called a jailbreak After downloading and installing the jailbreak software, your device will be able to install apps from a variety of sources other than the iTunes App Store The process of making unauthorized modifications to any mobile device is called rooting
unit testing
As each application module is completed, it undergoes unit testing to ensure that it operates reliably and correctly
These types of ports typically provide connections to specialized devices such as camcorders and storage devices.
FireWire
ACFE
Association of Certified Fraud Examiners; An international professional organization committed to detecting, deterring, and preventing fraud and white-collar crime; conducts a biannual survey and publishes the results in its Report to the Nation on Occupational Fraud and Abuse
What is a computer?
At its core, a computer is a multipurpose device that accepts input, processes data, stores data, and produces output, all according to a series of stored instructions
ACL
Audit Control Language; Software used by forensic accountants for auditing tasks
Online banking is an example of what type of e-commerce?
B2C
a public IP address
Because a private IP address cannot be routed over the Internet a local router connects instead The local router has a public IP address that is routable over the Internet
This method of file transfer distributes file transfers across many different computers.
BitTorrent
These discs have a capacity of 50 gigabytes on one side.
Blu-Ray
The standard for high definition optical discs is:
Blu-ray
Which of the following holds the largest amount of data?
Blu-ray disc
Two wireless standards are WiFi and ________________.
Bluetooth
System software includes all of the following except:
Browsers
optical storage is?
CD, DVD, and Blu-ray (BD) technologies are classified as optical storage, which represents data as microscopic light and dark spots on the disc surface
Which of the following is not a character encoding standard?
CISC
Which of the following is not a character encoding standard? a. CISC b. EBCDIC c. Unicode d. ASCII
CISC
CPU cache is?
CPU cache (pronounced "cash") is a special high-speed memory that allows a microprocessor to access data more rapidly
A glass picture tube is known as a _______________.
CRT
Which of the following are files inserted into an HTML document that control the appearance of Web pages including layout, colors, and fonts?
CSS
The Web was introduced in 1991 at _______.
Center for European Nuclear Research (CERN)
narrowband
Channels slower than 2 Mbps are classified as narrowband
OMR, OCR, and MICR are all types of _______.
Character and mark recognition devices
Which of the following ports is used for connecting musical instruments to a sound card?
Choices MIDI S/PDIF MiniDP eSATA Correct answer: MIDI
thin client
Chrome OS is an example of a thin client because it depends substantially on processing and storage provided by a remote computer—in this case, cloud-based servers Unlike iPads, Chromebooks support multiple users, but provide limited storage space Chromebooks boot very quickly to a simple desktop where apps are displayed in the Chrome browser
In a computer network, this node that requests and uses resources available from other nodes.
Client
If Mr. Smith's bike has been sent to his new address, but the bill to his old one, it can most likely be attributed to a lack of data _______.
Integrity
This type of network strategy uses central servers to coordinate and supply services to other nodes on the network.
Client/server
processor
Clock speed measures the speed of the ________________
This allows you to upload and store documents on the Internet.
Cloud Storage
What is it called when servers on the Internet supply applications as a service, rather than a product?
Cloud computing
Which technology allows users to shift their desktop computing activities to computers on the Internet?
Cloud computing
Printers connect to the Internet that provide printing services to others on the Internet are called:
Cloud printers
This allows you to upload and store documents on the Internet.
Cloud storage
Virus
Code that attaches itself to other innocent files or programs and replicates itself; at some point, the code activates and destroys computer files, disrupts operating system activities, damages software, or initiates denial of service attacks
Multifunction Printer
Combines output options such as printing, scanning, copying, and faxing.
Access to these databases is offered to the public or selected outside individuals, for a fee.
Commercial Databases
Commercial software is?
Commercial software is usually sold in retail stores or on Web sites
circuit switching
Communication networks use a technology called circuit switching, which establishes a private link between one telephone and another for the duration of a call
modem
Communications hardware device that facilitates the transmission of data.
groups
Communities of individuals who share a common interest typically create Facebook ____
The combined information presented on this type of database can be used to change the whole merchandising strategy of a store.
Company
UNIVAC
Completed in 1951, the first commercially successful electronic digital computer was the ___________.
CSI
Computer Security Institute; An organization that conducts an annual survey to help determine the scope of cybercrime in the United States
Computer programming
Computer programming encompasses a broad set of activities that include planning, coding, testing, and documenting
Antivirus Software
Computer programs that scan inputs for malware and viruslike coding, identify malware already lodged in computer systems, clean infected systems, or perform some combination of these activities
compatible means?
Computers that operate essentially the same way and use the same software are said to be compatible or having the same "platform You can assess whether two computers are compatible by checking their operating systems
Guest Network
Configure the Guest Network (a second network on your LAN's router)
VPN
Connection that creates a secure virtual connection to a company LAN across the internet.
The following activities can get you started on choosing the right digital device:
Consider how you plan to use your device Choose the type of device Decide on a budget and stick to it Select a platform Check out the device's specifications
These specialty processors are designed to improve specific computing operations such as displaying 3-D images and encrypting data.
Coprocessors
IP
Internet Addresses are controlled by IP (Internet Protocol), which is part of the Internet protocol suite
All of the following are methods to protect a computer from theft EXCEPT ________.
Correct Answer: placing identification tags on the system unit and monitor Incorrect options below: securing the computer to the desk or table with cables and locks controlling access to computer labs carefully safeguarding a portable computer when traveling
Which of the following is true about flash memory?
Correct answer: It can be plugged into a USB port. Options It can be plugged into a USB port. It is faster than RAM. It has multiple moving parts. It requires constant power to store data.
wireless encryption key
Create a wireless encryption key (a network security key or password
SSID
Create an SSID (service set identifier); this will be the name of your wireless network
electronic profiles
Created by databases to provide highly detailed and personalized descriptions of individuals.
A type of specialty processor devoted exclusively to protecting your privacy.
Cryptoprocessor
A service that uses existing phone lines to provide high-speed connections is called _______.
DSL
Information collected by an organization from a variety of external and internal databases is stored in this special type of database.
Data warehouse
Employee records, including names, social security numbers, and related information, would typically be stored in what type of data file?
Database
executive dashboard
Decision makers can access analytical databases using an executive dashboard, provided by software such as iDashboards, which uses tools for visually displaying query results
This type of attack has the only goal of clogging computers and networks by making servers think a huge number of users are attempting to access to it.
Denial-of-service attack
Personal computers can be classified as: Desktop
Desktop Portable Mobile devices A personal computer is designed to meet the computing needs of an individual The term personal computer can be abbreviated as PC
With these systems, input and output devices are located outside the system unit.
Desktop systems
Android
Developed in 2007, Android is a mobile operating system that is a popular platform for tablet computers, smartphones, and ebook readers Android devices have a screen-based home button rather than a physical button In addition to touchscreen input, the Android OS supports voice input for Google searching, voice dialing, navigation, and other applications
What are development tools?
Development tools are used for creating software applications, Web sites, operating systems, and utilities
A list of connected devices can be viewed in the ____________________ window.
Device Manager
This type of program allows communication between a peripheral device, such as a mouse or printer, and the rest of the computer system.
Device driver
Pointing Device
Device, such as a mouse or trackball, that allows the user to select objects on the screen.
In many application programs, this feature is used to provide information or request input.
Dialog boxes
Corporations often use this to prevent copyright violations.
Digital Rights Management (DRM)
The small circuit boards and integrated circuits you see when you open up a digital device are the essence of digital electronics
Digital electronics represent data bits as electrical signals that travel over circuits in much the same way that electricity flows over a wire when you turn on a light switch
Which of these is not an example of solid state storage?
Digital versatile disc
The windows troubleshooting utility that identifies and eliminates nonessential files is called _______.
Disk Cleanup
Domain name servers
Domain name servers are scattered around the world and maintain lists of all domain names and their corresponding IP addresses
file hosting services
Dropbox and similar file hosting services store files in the cloud
Which of the following printer features enables you to print on both sides of a sheet of paper?
Duplex
bandwidth throttling
During peak times, ISPs can place further limits on speed, a process called bandwidth throttling
kernel
During the boot process, the OS kernel is loaded into RAM; a kernel provides essential operating system services, such as memory management and file access
implementation phase
During the implementation phase of the SDLC, the project team supervises the tasks necessary to construct the new information system
compressed air
Dust can be removed from fans and cooling fins by using _______________
A dedicated mobile device for storing and displaying ebooks and other electronic media including electronic newspapers and magazines.
E-book reader
A dedicated, mobile device for storing and displaying e-books and other electronic media including electronic newspapers and magazines.
E-book reader
Which physical connection is the fastest?
Fiber-optic cable
table
Each table is a sequence of records, similar to a flat file
Foldable Keyboards
Easlily transported keyboards. Primarily used with PDA, and pocket R-P-C devices. Soft to the touch, and are water resistant.
The category of operating system used for handheld devices.
Embedded
The process of coding information to make it unreadable except to those who have a special piece of information known as a key.
Encryption
Disaster recovery plans should:
Ensure the safety of people on the premises Continue critical business operations Minimize disruptions to operations Minimize immediate damage and prevent additional loss Establish a management chain Facilitate effective recovery tasks coordination
The study of human factors related to things people use.
Ergonomics
objectivity
Evaluate the accuracy of information on the Web by considering authority, accuracy, currency and _________
Social Engineering
Examples include: posing as a bona fide employee and convincing network administrators to give them new passwords over the phone; posing as a new, helpless employee who appears desperate and "borrows" a password from a fellow worker in order to accommodate a fictitious "emergency"
Before sending a large file over the Internet, you might want to use one of these programs.
File compression program
Parents can use this type of program to block access to selected Websites.
Filter
Microprocessors
Finding the microprocessor that's best for you depends on your budget and the type of work and play you plan to do If you know the make and model of a digital device, you can generally find processor specifications by searching online
RFID and NFC
Existing wireless technologies such as RFID and NFC offer potential solutions
Most microcomputers allow users to expand their systems by providing these on the system board.
Expansion slots
Most personal computers allow users to expand their systems by providing these on the system board.
Expansion slots
FTP
FTP (File Transfer Protocol) provides a way to transfer files from one computer to another over any TCP/IP network, such as a LAN or the Internet You can access FTP servers with FTP client software, such as FileZilla, or with a browser
ASCII supports Chinese and Japanese. Select one: True False
False
An MICR device senses the presence or absence of a mark, such as a pencil mark.
False
Biometric scanning devices are used to scan employee identification cards. true or false/
False
Firewire ports are used to connect keyboards, mice, printers, and storage devices. Select one: True False
False
Graphics cards connect the system board to secondary storage
False
Graphics cards connect the system board to secondary storage. Select one: True False
False
In a peer-to-peer network, only the central host computer supplies the resources, the other computers request resources from this host.
False
Parallel processing requires a computer to perform one complete task before beginning the next task. Select one: True False
False
The ALU tells the rest of the computer system how to carry out a program's instructions. Select one: True False
False
The number of bits that can travel simultaneously down a bus is known as the word size. Select one: True False
False
True or False. A magnetic card reader does not require the card to actually make contact with the reader.
False
True or False. A prototype is a set of communication rules for the exchange of information.
False
True or False. A rogue attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account.
False
True or False. Biometric scanning devices are used to scan employee identification cards.
False
True or False. CD-ROMs are often used to archive data and to record music downloaded from the Internet.
False
True or False. Cloud printers provide printing services to users without access to the Internet.
False
True or False. Optical scanners recognize individual letters or images.
False
True or False. The ALU tells the rest of the computer system how to carry out a program's instructions.
False
True or False. The process of saving information to a secondary storage device is referred to as embedding.
False
Virtual memory is stored on a RAM chip. Select one: True False
False
Which of the following is true about an internal hard disk?
Fixed amount of storage
When you reboot your system, the computer follows start-up instructions stored in this type of memory.
Flash
When you reboot your system, the computer follows startup instructions stored in this type of memory.
Flash
Which of the following offers a combination of features of RAM and ROM?
Flash Memory
Which of the following offers a combination of the features of RAM and ROM?
Flash Memory
Smartphones use which of these storage technologies?
Flash memory card
parallel processing
For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distributed across each core—an operation called ________.
This law gives you the right to look at your personal records held by government agencies.
Freedom of Information Act
Audio Software
General-purpose software and apps used for recording, playing, and modifying audio files, such as iTunes
redundancy
Having several instances of the same data is called data _____
The hard disk's disk surface is scratched and some or all of the data is destroyed when there is a _______.
Head crash
When you enter a keyword or phrase into a search engine the results display as a list of these.
Hits
A wireless access point that provides Internet access in a public place such as a coffee shop, library, bookstore, or university.
Hotspot
Every computer on the Internet has a unique numeric address called a(n) _______.
IP Addess
Internet exchange points
ISPs exchange data at Internet exchange points (IXPs)
Activities that take place during the design phase:
Identify potential solutions Evaluate solutions and select the best one Select hardware and software Develop application specifications Obtain approval
Ethernet adapter
If you want a wired network connection but your computer has no Ethernet port, you can purchase and install an Ethernet adapter (also called an Ethernet card)
IPv4
Internet Protocol version 4); is the Internet address standard; uses 32-bit addresses to identify Internet connected devices
capacitors are?
In RAM, microscopic electronic parts called capacitors hold the bits that represent data
transaction
In an information system context, a transaction is an exchange between two parties that is recorded and stored in a computer system
relationship
In database jargon, a relationship is an association between data that's sorted in different record types
microprocessor
In most personal computer systems, the CPU is contained on a single chip called the ___________________.
actors
In object-oriented jargon, the people who use the system are called actors; any task an actor performs is called a use case
ICASS
Integrated Computer-Assisted Surveillance System ; Used by the New York Stock Exchange to search for insider trading activities
form factor is?
In the computer industry the term form factor refers to the size and dimensions of a device or components, such as circuit boards and system units
information brokers
Individuals who collect and sell personal data.
hackers
Individuals who gain unauthorized access to your computer or computers that contain information about others.
_____ is any data or instructions that are used by a computer.
Input
What is input?
Input is whatever is typed, submitted, or transmitted to a computer
an exabyte
It is estimated that the Internet handles more than an exabyte of data every day; an exabyte is 1.074 billion gigabytes - a nearly unimaginable amount of data!
domain name
It's hard to remember the string of numbers in an IP address; most Internet destinations also have an easy-to-remember domain name, such as nike.com
Which programming language is used within HTML documents to trigger interactive features?
JavaScript
Which of the following is TRUE about monitors?
LCD panels have virtually replaced CRT display screens.
This commercial database offers news and information on legal, public records, and business issues.
LexisNexis
This social networking site is used for professional, business-oriented networking.
This version of UNIX is an open source operating system that is an alternative to Windows.
Linux
MIDI
MIDI (Musical Instrument Digital Interface) specifies a standard way to store music data for synthesizers, electronic MIDI instruments, and computers MIDI messages are instructions that specify the pitch of a note, the point at which the note begins, the volume of the note, etc. An MIDI message may look like this: Music composition software with MIDI support makes it easy to place notes on a screen-based music staff then play back the composition on a MIDI keyboard or through the speakers of a digital device
Process
Many activities—called processes—compete for the attention of a device's microprocessor To manage all these competing processes, an operating system must ensure that each process receives its share of attention from the microprocessor
static addresses
Many devices on the Internet have permanently assigned IP addresses called static addresses
expansion ports are?
Many digital devices have ports in the system unit for connecting cables and various add-ons; these ports are called expansion ports because they expand the options for input, output, and storage When you plug in a USB flash drive or insert a memory card, you are using an expansion port
help desk
Many organizations establish a help desk to handle end-user problems; it is staffed by technical support specialists
oleophobic coating is?
Many touchscreens are made from Gorilla Glass, which is designed to resist scratching and cracking, and oleophobic coating, designed to repel oils from fingertips
This version of Mac OS X has better power management and enhanced workflow options for multiple monitor setups.
Mavericks
Twitter is an example of what type of site?
Microblog
Which of the following are two important components of the system unit?
Microprocessor and memory
instruction set
Microprocessor technology is fascinating in its ability to perform an astounding variety of tasks based on a set of really simple instructions These instructions are referred to as an instruction set An instruction set contains a collection of instructions for actions that the circuitry in a microprocessor can perform
This type of embedded operating system is used by smartphones.
Mobile
data independence
Modern database tools support data independence, which entails separating data from the programs that manipulate it
Smart appliances
Modern refrigerators, washing machines, and other appliances are controlled by integrated circuits called microcontrollers that combine sensors with processing circuitry
report generator
Most DBMSs include a report generator, which is a software tool for specifying the content and format for a database report
32-bit or 64bit
Most PCs today have processors that use ____________ words.
lithium ion is?
Most of today's battery-powered digital devices contain a lithium ion (Li-ion) battery Li-ion batteries can overheat and in the worst case, they can explode Smart consumers don't operate devices that are hot to the touch
tethering
Most of today's smartphones include a tethering feature that connects wirelessly with other digital devices Setting up tethering to create a mobile hotspot is easy, just remember though that data sent over the connection accumulates toward your monthly data usage total
Expansion slots
Most personal computers allow users to expand their systems by providing these on the system board.
The system board is also known as the _______.
Motherboard
The system board is also known as the:
Motherboard
Which of the following is not a popular mobile operating system?
Mountain Lion
Which of the following allows a computer to run two or more operations simultaneously?
Multicore chip
These screens can be touched with more than one finger, which allows for interactions such as rotating graphical objects on the screen with your hand or zooming in and out by pinching and stretching your fingers.
Multitouch
This screens can be touched with more than one finger which allows for interactions such as rotating graphical objects on the screen with your hand or zooming in and out by
Multitouch
MAC address
NICs contain a MAC address (media access control address) used to identify devices on LANs
schema-less databases,
NoSQL tools create schema-less databases, allowing data structures such as fields to be added
productivity software
Office suites, such as Microsoft Office, are sometimes referred to as productivity software
sockets
On the motherboard, the connection points for chips are referred to as ___________________
non-volatile, meaning?
Once the data is stored it is non-volatile, meaning the circuits retain data without an external power source
WPA2
One of the best-known wireless encryption protocols is:
TCP
One of the core Internet protocols, TCP (Transmission Control Protocol) is responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order, and verifying that the data was not corrupted while in transit (a process called error checking)
flat file
One of the simplest models for storing data is a flat file that consists of a single, two-dimensional table of data elements
as integrated graphics, is?
One type of graphics circuitry, referred to as integrated graphics, is built into a computer's system board
Which of the following statements is incorrect?
Printer speed is measured in the number of words ringed per minute.
Nonimpact Printers
Printers that forms images without touching tha paper.
Expansion Slot
Opening on the motherboard where an expansion board, also called an adapter card, can be inserted.
Identify the program that coordinates computer resources, provides an interface between users and the computer, and runs applications.
Operating system
This system software is responsible for managing your computer's resources including memory, processing, and storage.
Operating system
This type of mouse emits and senses light to detect mouse movement.
Optical
Which of these is not a mass storage device?
Optical disc
payment gateway
Payment processing is based on an online payment gateway that authorizes credit and debit cards, PayPal, and Apple Pay transactions
______ are the most important part of any information system.
People
pirated software?
People who circumvent copyright law and illegally copy, distribute, or modify software are sometimes called software pirates, and their illegal copies are referred to as pirated software
The dark spots are called?
Pits
Portable software is
Portable software is designed for PCs and it runs from removable storage, such as a USB flash drive There are a limited number of portable apps, but the available selection covers most essential tasks Portable software is so simple to install that it is sometimes referred to as install-free software
Presentation software supplies
Presentation software supplies the tools for combining text, photos, clip art, graphs, animations, and sound into a series of electronic slides that can be shown on a screen or projector Popular prsentation software products include Microsoft PowerPoint, iWork Keynote, and Google Docs Slides
Which of the following statements is incorrect?
Printer speed is measured in the number of words printed per minute.
virus
Program that migrates through networks and operating systems, typically attaching themselves to different programs and databases.
What is software?
Programs form the software that sets up a computer to do a specific task
browsers
Programs that provide access to web resources
PIECES framework
Project team members can identify problems and opportunities using a variety of techniques, such as interviews and data analysis The PIECES framework helps classify problems in an information system; each letter of PIECES stands for a potential problem
Storage means?
Storage is a term used for the components of a digital device designed to hold data permanently
microblog
Publishes short sentences that only take a few seconds to write.
This computer component holds the program and data that is currently being processed.
RAM
Which of the following is not an example of secondary storage?
RAM
Which of the following will not retain data after the computer is turned off?
RAM
Which one of the following is not considered a form of secondary storage?
RAM
RAM (random access memory)?
RAM (random access memory) is a temporary holding area for data, application program instructions, and the operating system Higher RAM capacity adds to the expense of a device
motherboard
RAM comes on cards that fit into slots located on the __________________.
ROM (read-only memory) is?
ROM (read-only memory) is a type of memory circuitry that is housed in a single integrated circuit on the system board ROM contains a small set of instructions and data called the boot loader which tell a digital device how to start
Microwave communication uses high-frequency _______.
Radio waves
The process of accessing information from secondary storage devices is referred to as _______.
Reading
A collection of related fields such as a person's name, address, and age.
Record?
R. Recordable
Recordable technology uses a laser to change the color in a dye laser sandwiched beneath the clear plastic disc surface; the laser creates dark spots that are read as pits
Having several instances of the same data is called data _______.
Redundancy
Computer Fraud
Refers specifically to the use of computers or networks to commit a fraudulent act
Data Diddling
Refers to changing data before, during or after they are entered into a computer system; the change can delete, alter, or add important system data
Ripping
Ripping is a slang term that refers to the process of importing tracks from a CD or DVD to your computer's hard disk The technical term for ripping music tracks is digital audio extraction
___________________ are used extensively in manufacturing environments.
Robots
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.
Rogue
Analysis tools that support viewing all or selected parts of data, querying the database, and generating reports include query-by-example as well as specialized programming language called _______.
SQL
The GPS device in an automobile uses which communication channel?
Satellite
Phishing
Scams that use email or websites that claim to be legitimate but that ask you to provide or update your personal information such as account number, credit card number, or password
Which of the following is not a system software program type?
Sectors
Semiconductors are?
Semiconductors, such as silicon and germanium, are substances with properties between those of a conductor (like copper) and an insulator (like wood)
Software for PCs contains
Software for PCs contains a setup program that guides you through the installation process During the installation process, the setup program usually performs the following activities:
Audio Plugins
Software that works in conjunction with your computer's browser to manage and play audio from a Web page
EnCase
Software used by forensic accountants for file copying, custody documentation, and other forensic activities
firewall
Special hardware and software used to control access to a corporation's private network is known as:
Which of the following is not an example of a document file created by a word processor?
Spreadsheet
Universal Serial Bus
Standard for computer ports that support data transfer rates of up to 12 million bits per second.
Dumpster Diving
Stealing personal information from garbage cans
Which of the following is not a type of scanning device?
Stylus
SCM
Supply chains are complex, so businesses use SCM (supply chain management) to maximize efficiency and profitability
Operational units of the microprocessor are:
The ALU (arithmetic logic unit) is part of the microprocessor that performs arithmetic operations, such as addition and subtraction The ALU uses registers to hold data that is being processed The microprocessor's control unit fetches each instruction
ARPANET
The ARPANET, created in 1969, connected computers at UCLA, the Stanford Research Institute, the University of Utah, and UC California at Santa Barbara
jumpers
Switches on hard drives are also known as ___________
system requirements report
System requirements are incorporated into a document called a system requirements report that describes the objectives for the information system
System requirements specify ?
System requirements specify the operating system and minimum hardware capacities necessary for a software product to work correctly
There are four components of digital devices that require maintenance:
System unit Keyboard Screen Battery
Dot pitch (dp)
The LED's that form an image on the screen are spaced in a grid; dp is the distance in millimeters between like-colored LEDs
file system
The OS uses a file system to keep track of the names and locations of files that reside on a storage medium, such as a hard disk
Microsoft Windows is installed on more than 80% of the world's personal computers
The Windows OS got its name from the rectangular work areas displayed on its screen-based desktop Windows evolved from a Microsoft OS called DOS (Disk Operating System) that was designed to run on early PCs with Intel or Intel-compatible microprocessors The most recent versions of Windows are Windows 7, Windows 8, and Windows 10
homegroup
The Windows OS provides a tool for setting up a LAN called a homegroup; this makes it easy to share files among local computers, but does not provide Internet access
CPU
The ____________ consists of integrated circuits and serves as the heart of the computer.
Osborne
The ______________was the first portable computer
CRM
The acronym CRM stands for customer relationship management
ERP
The acronym ERP stands for enterprise resource planning; it is a suite of software modules that integrate major business activities; it is sometimes described as "the central nervous system of an enterprise"
Internet
The basic components of cloud computing are clients, service providers, and the _______.
Web pages
The browser interprets the HTML instructions and displays _____
privacy
The browser mode that ensures your browsing activity is not recorded.
network interface controller
The circuitry that enables a device to access a LAN is called a network interface controller (NIC)
data flow diagram
The core documentation tool for project teams using structured methodology is the data flow diagram (DFD), which graphically illustrates how data moves through an information system
UML
The current standard for object-oriented documentation is referred to as UML (Unified Modeling Language) Three of the most frequently used UML tools include use case diagrams, sequence diagrams, and class diagrams
The data fork is
The data fork is similar to files in other operating systems; it contains data, such as the commands for a program and graphics for a photo
cable Internet service
The gold standard of fixed Internet access is cable Internet service, which is offered by the same companies that supply cable television CATV stands for community antenna television With cables branching out from a central location, the topology of a CATV system works well as the infrastructure for a digital data network
online identity
The information that people voluntarily post in social networking sites, blogs, and photo- and video-sharing sites is used to create their:
code
The instructions that make up a computer program are referred to as code because program instructions for first-generation computers were entered in binary codes
What is a computer program?
The instructions that tell a digital device how to carry out processing tasks are referred to as a computer program, or simply a program
knowledge engineering
The process of designing, entering, and testing the rules in an expert system is referred to as knowledge engineering
maintenance phase
The maintenance phase of the SDLC involves the day-to-day operation of the system, making modifications to improve performance, and correcting problems
The most widely used business oriented social networking site.
Internet
The network that connects computers all over the world.
Screen resolution
The number of horizontal and vertical pixels that a device displays on the screen
Prices for digital devices can vary and depend on screen size, microprocessor size, and memory:
The price tag for a smartphone is $200-$500 Tablet computer prices range from $200 - $1,200 Desktop and Laptop computers usually cost a little more, with price points roughly grouped into three categories: Above $1,200 $500 - $1,200 Under $500
The primary purpose of system software is?
The primary purpose of system software is to help the computer system monitor itself in order to function efficiently (an example of system software is a computer operating system or OS)
entity-relationship diagram
The relationship between record types can be depicted graphically with an entity-relationship diagram (sometimes called an ER diagram or ERD)
The resource fork
The resource fork is a companion file that stores information about the data in the data fork, such as the file type and the application that created it
dedicated applications
The simplest tools for managing data are dedicated applications for specific data management tasks, such as keeping track of appointments or maintaining an address book To use one of these tools, simply enter your data; the software includes menus that allow you to manipulate your data once it is entered Dedicated applications are easy to use, however they generally don't allow users to add fields or change field names
default application
The software application associated with a specific file type is called a default application
logical storage model
The structure of files and folders displayed by File Explorer is called a logical storage model because it helps you create a mental picture of the way files are organized in a hierarchy of folders
system board is?
The system board houses all essential chips and provides connecting circuitry between them
browsers
These programs use a URL to provide access to web resources
Coprocessors
These specialty chips are designed to improve specific computing operations such as displaying 3D images and encrypting data.
application specifications
The team's systems analysts will create a set of application specifications that describe the way information system's software should interact with users, store data, process data, and format reports
DBMS
The term DBMS (database management system) refers to software that manages data stored in a database
NoSQL
The term NoSQL is used to refer to a group of technologies for managing databases that do not adhere to the relational model and standard SQL query language NoSQL technologies are effective for building and managing non-relational databases containing big data that may be unstructured and may be distributed across multiple servers
The term instruction cycle ?
The term instruction cycle refers to the process in which a computer executes a single instruction
management information system
The term management information system refers to any computer system that processes data and provides information within a business setting
quality of service
The term quality of service (QoS) refers to the level of performance a computer system provides
The term service pack?
The term service pack, which usually applies to operating system updates, refers to a set of updates Updates and service packs are designed to correct problems and address security vulnerabilities
stored program is?
The term stored program means that a series of instructions for computing a task can be loaded into a computer's memory
What is a system unit?
The term system unit is tech speak for the part of a digital device that holds the system board
An integrated circuit (IC) is a set of microscopic electronic circuits etched onto a thin slide of semiconducting material
The terms computer chip, microchip, and chip are commonly used to refer to integrated circuits
access
The three primary privacy issues are accuracy, property, and:
portable computer
The type of computer most vulnerable to theft is a ____________________.
B2C
The type of electronic commerce in which a business sells a product to the general public.
software piracy
The unauthorized copying and distribution of software is called:
smart sensors are?
The utopian vision for the Internet of Things (IoT) is a busy hive of smart sensors that work behind the scenes to collect data and use it to improve just about anything
Internet Infrastructure
The way networks fit together is referred to as the Internet Infrastructure
Add-on Gadgets
There are lots of options available for gadgets that accompany your digital devices
What is the most common user error when double-clicking the mouse?
There is too much time between the first and second click.
Denial of Service Attack
These attacks can take multiple forms and often involve malware; a single virus or worm program enlists the aid of innocent "zombie computers" which then send email messages to or request services from, the target system. The barrage of incoming mail or service requests then overwhelms the target system, typically requiring its owners to disable it
colocation center
These centers may be dedicated to information systems for a single company, or they may be a colocation center in which several corporations lease space and equipment
tracking
These cookies record your activities across different sites
Image scanners
These devices convert images into an electronic form that can be stored in a computer's memory. The image can then be manipulated.
Magnetic scanners
These devices read encoded information on the back of credit cards. The magnetic strip on the back of the cards contains the user's encoded account number.
Firewall
These limit external access to company computers
plug-ins
These programs are automatically started and operate as a part of your browser
Logic Bomb
These programs are similar to Trojan horse programs, except that they remain dormant until the computer system encounters a specific condition
spiders
These programs continually look for new information and update search services' database programs.
computer monitoring software
These programs record every activity and keystroke made on a computer.
Trojan Horse Programs
These programs reside in the disk space occupied by legitimate copies of computer programs
fuzzy logic
These systems are designed to deal with data that is imprecise or problematic; using a technique called fuzzy logic, an expert system can deal with this type of data by working with confidence levels
FireWire
These types of ports typically provide high-speed connections to specialized devices such as camcorders and storage devices.
success factors
They also serve as an evaluation checklist at the end of a project, so they are sometimes referred to as success factors
All of the following are true of DVD-ROM drives except:
They are also known as erasable optical discs.
What is the primary reason that Macintosh computers can now run Microsoft Windows as well as the Apple OS?
They are now using Intel processors.
Output devices
They display information. Monitors and printers are the most common output device.
Which statement about vaccuum tubes is not accurate?
They seldom need to be replaced.
integrated circuits
Third-generation computers are characterized by the use of ________________
Computer Fraud and Abuse Act of 1986
This act defines cybercrime as any illegal act for which knowledge of computer technology is essential for its perpetration, investigation, or prosecution; currently being evaluated for revision because much of its language was developed before the Internet boom
system unit
This hardware houses most of the electronic components that make up a computer system.
digital cash
This is the Internet's equivalent to traditional cash
ARPANET
This project launched the Internet
worm
This special type of virus fills a computer system with self-replicating information, clogging the system so that its operations are slowed or stopped.
denial of service
This type of attack attempts to slow down or stop a computer system or network by flooding it with requests for information and data.
dictionary
This type of attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
cloud
This type of computing frees users from owning, maintaining, and storing software and data
Bar code scanners
This type of scanner reads bar lines that are printed on products (for example, in a grocery store or department store).
internet security
This type of suite can be used to maintain your security and privacy while you are on the web:
the Internet backbone
Tier 1 networks, such as AT&T, represent the top of the Internet hierarchy and form the Internet backbone, a system of high-capacity routers and fiber-optic communication links providing the main routes for data speeding across the Internet
online processing
Transaction processing systems, such as banking, use online processing—a real-time method in which each transaction is processed as it is entered; this system software is often referred to as an OLTP (online transaction processing) system
The essential features of this include identifying, sending, and receiving devices and breaking information into small parts for transmission across the Internet.
Transmission control protocol/Internet protocol
Transmission of electronic messages over the Internet
Free computer games and free screen saver programs are typical carriers of _______.
Trojan horses
3-D HDTV requires special viewing glasses in order to achieve a three-dimensional viewing experience.
True
64-bit-word computer can access 8 bytes at a time. Select one: True False
True
A bus is a pathway for bits representing data and instructions. Select one: True False
True
Computers require direct current (DC) to power their electronic components and to represent data and instructions. Select one: True False
True
HDMI ports make it possible to use a computer as a video jukebox or an HD video recorder. Select one: True False
True
Mass storage devices are specialized high-capacity secondary storage devices designed to store large amounts of data for an organization.
True
Mini DP ports are audio-visual ports typically used to connect large monitors.
True
MiniDP ports are an audiovisual port typically used to connect large monitors. Select one: True False
True
Multitouch screens allow for interaction such as rotating graphical objects on the screen with your hand.
True
Plug and Play has become a generic term that is associated with the ability to plug any device into a computer and have it play or work immediately. Select one: True False
True
RAM is considered temporary, or volatile, storage. Select one: True False
True
Read-only memory (ROM) chips have information stored in them by the manufacturer. Select one: True False
True
Resolution for a printer is a measure of the clarity of images produced, measured in dpi (dots per inch).
True
Telephony is also known as Internet telephony, IP telephony, and Voice over IP (VoIP).
True
The control unit directs the movement of electronic signals between the memory and the ALU
True
The control unit directs the movement of electronic signals between the memory and the ALU. Select one: True False
True
The system unit, also known as the system chassis, is a container that houses most of the electronic components that make up a computer system.
True
The system unit, also known as the system chassis, is a container that houses most of the electronic components that make up a computer system. Select one: True False
True
True of False. It is highly likely that each one of us has an electronic profile created by information resellers.
True
True of False. The ATM works on the principle of real-time processing.
True
True or False. 64-bit-word computer can access 8 bytes at a time.
True
True or False. A firewall is a specialized technology designed to protect an organization's network against external threats.
True
True or False. A network gateway can be used to connect the LAN of one office group to the LAN of another office group.
True
True or False. A stylus uses pressure to draw images on a screen.
True
phishing
Used by scammers to trick Internet users with official-looking websites.
decision support worksheet,
Using a decision support worksheet, the project team can assign scores to each criterion, weigh them, and compare totals for all solutions
downloading
Using file transfer utility software, you can copy files to your, you can copy files to your computer from specially configured servers on the Internet. This is called:
This type of keyboard used a touch screen as the input device.
Virtual
With this type of memory, large programs are divided into parts and the parts are stored on a secondary device, usually a hard disk.
Virtual
computer
Web based e-mail account do not require an e-mail program to be installed on your ________
This type of e-mail account is more widely used because it frees the user from installing and maintaining an e-mail client on every computer used to access e-mail.
Web-based
_______ typically broadcast live events and use streaming technology in which audio and video files are continuously downloaded to your computer while you are listening to and/or viewing the content.
Webcasts
The operating system
What enables application software to work with specific types of hardware?
identity theft
What is the illegal assumption of someone's identity for the purposes of economic gain called?
BASIC
What programming language transformed the software industry because beginning students could learn it easily?
asymmetric connection
When Internet upload speed differs from download speed, you have an asymmetric connection
The first computers were "programmed" to perform a specific task by connecting wire circuitry in a certain way
When a computer "runs" software, it performs the instructions to carry out a task
pipeline processing?
When a processor begins to execute an instruction before it completes the previous instruction, it is using pipeline processing
integration testing
When all modules have been completed and tested, integration testing is performed to ensure that the modules operate together correctly
symmetric connection
When upload and download speeds are the same, you have a symmetric connection
device letter
When working with Windows, storage devices—where files can be saved—can also be identified by a device letter
Which of the following is a website specially designed to allow visitors to use their browser to add, edit, or delete the site's content?
Wiki
Plug-and-play is a part of the ________________ operating system.
Windows
The most widely used personal computer operating system.
Windows
Which of the following is not a well-known Web browser?
Windows Explorer
System image is
Windows includes a disk image option called System image; a bit-for-bit copy of the data from all sectors of a hard disk
serial processing?
With serial processing, the processor must complete all steps in the instruction cycle before it begins to execute the next instruction
Term used to describe the number of bits that a CPU can access at one time.
Word
supercomputers
_____________ are most often associated with modeling using finite element analysis.
People
_________________ are the most important part of any information system.
DVI-I
a DVI (Digital Visual Interface) video port that supports both analog and digital monitors
DVI-D
a DVI (Digital Visual Interface) video port that works only with digital monitors
DirectX
a Microsoft software development tool that software developers can use to write multimedia applications such as games, video-editing software, and computer-aided design software
Micro-B connector
a USB connector that has five pins and has a smaller height than the Mini-B connector; it is used on digital cameras, cell phones, and other small electronic devices
Mini-B connector
a USB connector that has five pins and is often used to connect small electronic devices, such as a digital camera, to a computer
Micro-A connector
a USB connector that has five pins and is smaller than the Mini-B connector; it is used on digital cameras, cell phones, and other small electronic devices
USB 3.0 B-Male connector
a USB connector used by SuperSpeed USB 3.0 devices such as printers or scanners
dxdiag.exe
a command used to display information about hardware and diagnose problems with DirectX
A Male Connector
a common type of USB connector that is flat and wide and connects a matching hub on a computer or USB hub
FireWire 400
a data transmission standard used by computers and peripherals (for example, a video camera) that transmits at 400 Mbps; also called 1394a
1394a
a data transmission standard used by computers and peripherals (for example, a video camera) that transmits at 400 Mbps; also called FireWire 400
FireWire 800
a data transmission standard used by computers and peripherals (for example, a video camera) that transmits at 800 Mbps; also called 1394b
UDF (Universal Disk Format) file system
a file system for optical media used by all DVD discs and some CD-R and CD-RW discs
CompactFlash (CF) card
a flash memory device that allows for sizes up to 137 GB, although current sizes range up to 32 GB
Mainframes
a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users; looks like a closet sized cabinet; used to provide centralized storage, processing and management for large amounts of data
LCD (liquid crystal display) monitor
a monitor that uses liquid crystal display technology; produces an image using a liquid crystal made of large, easily polarized molecules; flatter than CRT monitors and take up less desk space; also called a flat panel monitor
flat panel monitor
a monitor that uses liquid crystal display technology; produces an image using a liquid crystal made of large, easily polarized molecules; flatter than CRT monitors and take up less desk space; also called an LCD monitor
HDMI mini connector
a smaller type of connector that transmits both digital video and audio used for connecting some devices such as a smartphone to a computer; also known as a mini-HDMI connector
A data storage system has two main components
a storage medium and a storage device Storage medium - the disk, tape, CD, or DVD that contains data Storage device - the mechanical apparatus that records and retrieves data from a storage medium
KVM (Keyboard, Mouse, Video) switch
a switch that allows you to use one keyboard, mouse, and monitor for multiple computers; some also include sound ports so that speakers and a microphone can be shared among multiple computers
DVD (digital versatile disc or digital video disc)
a technology used by optical discs that uses a red laser beam and can hold up to 17 GB of data
xD-Picture card
a type of flash memory device that has a compact design and currently holds up to 8 GB of data
CRT (cathode-ray tube) monitor
a type of monitor first used in older television sets
plasma monitor
a type of monitor that provides high contrast with better colors than LCD monitors; they work by discharging xenon and neon plasma on flat glass, and don't contain mercury
OLED (Organic Light-Emitting Diode) monitor
a type of monitor that uses a thin LED layer or film between two grids of electrodes and does not use backlighting
With these systems, input and output devices are located outside the system unit. Select one: a. Desktop systems b. Personal digital assistants c. Smartphones d. Laptop computers
a. Desktop systems
Most personal computers allow users to expand their systems by providing these on the system board. Select one: a. Expansion slots b. Ports c. Sound cards d. Network cards
a. Expansion slots
Which of the following can be used to connect several devices to the system unit and are widely used to connect keyboards, mice, printers, storage devices, and a variety of specialty devices? Select one: a. USB port b. SATA c. Parallel port d. Firewire bus
a. USB port
Pathways that support communication among the various electronic components on the system board are called _______. Select one: a. bus lines b. network lines c. logic paths d. gate ways
a. bus lines
Which of the following ports provide high-speed connections for external hard disk drives, optical disks, and other large secondary storage devices? Select one: a. eSATA b. S/PDIF c. HDMI d. MiniDP
a. eSATA
File History is?
allows for automated data backup and file synchronization to make copies of files from your Documents, Music, Picture, etc
Multithreading
allows multiple commands, or threads to run simultaneously
Laptop
also referred to as a notebook computer; small and lightweight with a clamshell design and keyboard at the base
The most common way to access the Internet is through _______.
an Internet service provider (ISP)
video capture card
an adapter card that captures video input and saves it to a file on the hard drive
TV tuner card
an adapter card that receives a TV signal and displays TV on the computer screen
sound card
an expansion card with sound ports
Tiny circuit-boards etched onto squares of sand-like material, called silicon, are called _______.
chips
graphics tablet
an input device that can use a stylus to hand draw; it works like a pencil on the tablet and uses a USB port; also known as a digitizer or digitizing tablet
digitizing tablet
an input device that can use a stylus to hand draw; it works like a pencil on the tablet and uses a USB port; also known as a graphics tablet or digitizer
digitizer
an input device that can use a stylus to hand draw; it works like a pencil on the tablet and uses a USB port; also known as a graphics tablet or digitizing tablet
Touch-Sensitive Pad
an input device that enables users to scroll through and play music, view pictures, and etc on a portable media player
touch screen
an input device that uses a monitor or LCD panel as a backdrop for user options; can be embedded in a monitor or LCD panel or installed as an add-on device over the monitor screen
CD (compact disc)
an optical disc technology that uses a red laser beam and can hold up to 700 MB of data
Blu-Ray Disc (BD)
an optical disk technology that uses the UDF version 2.5 file system and a blue laser beam, which is shorter than any red beam used by DVD or CD discs; the shorter blue laser beam allows the discs to store more data than a DVD
Infared (IR)
an outdated wireless technology that has been mostly replaced by Bluetooth to connect personal computing devices
moving text, graphics, or interactive features on a web page are called
animations
This type of software can be described as end user software and is used to accomplish a variety of tasks.
application
Peripheral devices
are connected to the computer through serial, parallel, and Universal Serial Bus (USB) ports. USB is a newer standard expected to replace serial and parallel ports.
SCSI, IrDA, and Bluetooth
are special-purpose ports.
System requirements
are the criteria for successfully solving problems identified in an information system
Workers
are the people who directly carry out the organization's mission
Launched in 1969 as a U.S. funded project that developed a national computer network, the Internet was initially called
arpanet
refresh rate
as applied to monitors, the number of times in one second the monitor can fill the screen with lines from top to bottom; also called vertical scan rate
The BSD license originated
as the Berkeley Software Distribution license for a server operating system
Digital compositing
assembling more than one image into one by using clipping paths and alpha bending
Tiny circuit-boards etched onto squares of sand-like material, called silicon, are called____.
chips
A byte is formed by a group of _______. Select one: a. 4 bits b. 8 bits c. 12 bits d. 16 bits
b. 8 bits
This character encoding scheme allows non-English characters and special characters to be represented. Select one: a. ASCII b. Unicode c. EBCDIC d. ANSIC
b. Unicode
Term used to describe the number of bits that a CPU can access at one time. Select one: a. Bitrate b. Word c. Pulse width d. Character
b. Word
Frequently-accessed information is held in _______. Select one: a. hard drive b. cache memory c. flash memory d. read only memory
b. cache memory
The system board is also known as the _______. Select one: a. expansion slot b. motherboard c. expansion card d. bus
b. motherboard
On the motherboard, the connection points for chips are referred to as _______. Select one: a. slots b. sockets c. ports d. lines
b. sockets
In _______, transactions are collected over time and then processed all at once.
batch processing
For a higher level of security, __________________ can be used to match unique characteristics to the user.
bio-metric devices
Image editors edit images consisting of thousands of pixels that form this type of image.
bitmap
history file
browsers store the locations of sites visited in a:
Pathways that support communication among the various electronic components on the system board are called ____.
bus lines
Pathways that support communication among the various electronic components on the system board are called _______.
bus lines
A 32-bit-word computer can access _______. Select one: a. 2 bytes at a time b. 16 bytes at a time c. 4 bytes at a time d. 8 bytes at a time
c. 4 bytes at a time
Which of the following is not a character encoding standard? Select one: a. EBCDIC b. ASCII c. CISC d. Unicode
c. CISC
These specialty processors are designed to improve specific computing operations such as displaying 3-D images and encrypting data. Select one: a. Smartcards b. CPUs c. Coprocessors d. NIC cards
c. Coprocessors
A type of specialty processor devoted exclusively to protecting your privacy. Select one: a. Data cards b. Micro cards c. Cryptoprocessor d. Embedded cards
c. Cryptoprocessor
Which of the following offers a combination of the features of RAM and ROM? Select one: a. DRAM b. DDR c. Flash Memory d. Cache Memory
c. Flash Memory
Which of the following ports is used for connecting musical instruments to a sound card? Select one: a. MiniDP b. S/PDIF c. MIDI d. eSATA
c. MIDI
Which of the following allows a computer to run two or more operations simultaneously? Select one: a. Coprocessors b. Multiplexing c. Multicore chip d. Binary system
c. Multicore chip
The processing speed of a microprocessor is typically represented by its _______. Select one: a. bus line b. control unit c. clock speed d. ALU
c. clock speed
In most personal computer systems, the CPU is contained on a single chip called the _______. Select one: a. semiconductor b. ALU c. microprocessor d. control unit
c. microprocessor
For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distributed across each core—an operation called _______. Select one: a. arithmetic-logic processing b. multiplexer processing c. parallel processing d. graphics coprocessing
c. parallel processing
his type of e-commerce often resembles the electronic version of the classified ads or an auction
c2c
Frequently-accessed information is held in ____
cache memory
Frequently-accessed information is held in _______.
cache memory
A CD-RW disc _______.
can be erased and rewritten
A CD-RW disc:
can be erased and rewritten.
The ____ of a secondary storage device indicates how much data the storage medium can hold
capacity
Integrated circuits must be mounted on ____, which are then plugged into the motherboard.
chip carriers
Integrated circuits must be mounted on _______, which are then plugged into the motherboard.
chip carriers
a slate tablet
configuration has a narrow frame screen that lacks a physical keyboard; Apple iPad is a slate tablet
A dial-up
connection is a fixed Internet connection that uses a voiceband modem and the telephone company's circuit-switched network to transport data between your computer and your ISP
Supercomputers:
considered the fastest computers in the world at the time of construction; can tackle complex tasks other computers cannot; typical use includes breaking codes, modeling weather systems, and simulating nuclear explosions
Subscription
consumers pay an annual fee to use software; updates and upgrades are usually included in the pricing
Trial
consumers use a software product during a free trial period
fixed-length field
contains a predetermined number of characters (bytes)
Recovery drive (system repair disc)
contains parts of the OS necessary to boot your computer and diagnose system problems
A field
contains the smallest unit of meaningful information; it is the basic building block for a structured file or database
voiceband modem
converts digital signals from a computer into audible analog signals that can travel over telephone lines
Small data files deposited on your hard disk from websites you have visited
cookies
Shareware is
copyrighted software marketed under a try-before-you-buy policy; it was conceived as a low-cost marketing and distribution channel for independent programmers
Freeware is?
copyrighted software that—as you might expect—is available for free; it's fully functional and requires no payment for its use
Operational planning
covers activities that make day-to-day operations run smoothly
A computer can become infected with viruses in all the following ways, except by _______.
creating a new folder on your computer
The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person is called:
cyberbullying
When you reboot your system, the computer follows startup instructions stored in this type of memory. Select one: a. DRAM b. SDRAM c. Cache d. Flash
d. Flash
All of the following are commonly used units of measurement to describe memory capacity, except _______. Select one: a. Megabyte (MB) b. Gigabyte (GB) c. Terabyte (TB) d. Nanobyte (NB)
d. Nanobyte (NB)
Integrated circuits must be mounted on _______, which are then plugged into the motherboard. Select one: a. slots b. pins c. ports d. chip carriers
d. chip carriers
Tiny circuit-boards etched onto squares of sand-like material, called silicon, are called _______. Select one: a. buses b. slots c. sockets d. chips
d. chips
The electronic equivalent of a file cabinet is a
database
Data dependence
dependence is a term that refers to data and program modules being so tightly interrelated that they become difficult to modify
System documentation
describes a system's features, hardware architecture, and programming
User documentation
describes how to interact with the system to accomplish specific tasks
Ebook readers
designed for displaying the content of digital publications; NOOK and Kindle are eBook readers
Programs that allow you to mix text and graphics and focus on flexible page design and layout.
desktop publishing
Managers
determine organizational goals and plan how to achieve those goals; managers use the following methods
Parents can use this type of program to block access to selected Websites
filter
Desktop
fits on a desk and runs on power from a wall outlet; keyboard is typically separate from the monitor; popular in offices and schools
Secure Digital (SD) card
flash memory cards that follow the SD Association standards
Portable computers such as laptops require a _____________ monitor.
flat screen/cathode ray tube/liquid crystal display
Information engineering methodology
focuses on the data an information system collects before working out ways to process that data
Structured methodology
focuses on the processes that take place within an information system
Voice input devices
for visually impaired, blind, and physically challenged people.
When a file is broken up into small parts that are stored wherever space is available, the hard disk is said to become _______.
fragmented
Image compression
frames of a video are compressed using lossy and lossless compression
This method of file transfer has been used for decades and is frequently used for uploading changes to a Website hosted by an Internet service provider
ftp
Systems analysis and design
is a discipline that focuses on developing information systems according to the phases of an SDLC The scope of systems analysis and design encompasses the people, procedures, computers, communications networks, and software involved with handling information in an organization
BitTorrent
is a file sharing protocol that distributes the role of a file server across a collection of dispersed computers A BitTorrent network is designed to reduce the bandwidth bottleneck that occurs when many people attempt to download the same very large file, such as a feature-length film, or interactive 3-D computer game
DSL (digital subscriber line)
is a high-speed, digital, always-on, Internet access technology that runs over standard phone lines; it's offered by AT&T's U-verse service
Satellite Internet service
is a means of distributing broadband asymmetric Internet access by broadcasting signals to a satellite In many rural areas, satellite Internet service is the only alternative to a slow dial-up connection
A solid state drive (SSD) is?
is a package of flash memory that can be used as a substitute for a hard disk drive
A packet
is a parcel of data that is sent across a computer network; when packets reach their destination, they are reassembled into the original message according to their sequence numbers
A USB flash drive is ?
is a portable storage device that plugs directly into a computer's system unit using a built-in USB connector 45 cents per gb
A software update (sometimes called a software patch)?
is a small section of program code that replaces part of the software currently installed
Latency
is the elapsed time for data to make a round-trip from point A to point B and back to point A
Identity theft
is the fraudulent use of someone's personal information to carry out transactions, such as applying for loans, making purchases, collecting tax refunds, or obtaining false identity documents
A communication channel
is the medium used to transport information from one network device to another
Software customization
is the process of modifying a commercial application to reflect an organization's needs
Application testing
is the process of trying out various sequences of input values and checking the results to verify that the application works as it was designed
This social networking site is used for professional, business-oriented networking
LCD stands for __________________ display.
liquid crystal
What is the brightness of a projector rated in?
lumens
Malicious programs that damage or disrupt a computer system
malware
Most RAM is volatile -
meaning it needs electrical power to hold data
Jitter
measures the variability of packet latency caused when network traffic and interference can delay packets and create erratic data flow
Resolution of photographs is measured in ________________.
megapixels
System units are typically composed of metal because ____________________
metal protects the storage media from magnetic fields.
In most personal computer system, the CPU is contained on a single chip called the:
microprocessor
Smartwatches
multifunctional devices that include a camera, thermometer, compass, calculator, cell phone, GPS, media player, and fitness tracker
Most operating systems support the ability to switch between different applications. This is called _______.
multitasking
Laser Virtual Keyboards
packaged in a case smaller than a soda can, a laser beam is used to generate a full size laser keyboard. Generally used for smart phones and such.
_______ do not use streaming technology and are used to download media files to your computer.
podcasts
Peripherals connect through a ___________________.
port
formatting
preparing a hard drive volume, logical drive, or USB flash drive for use by placing tracks and sectors on its surface to store information (for example, FORMAT D:)
Device Manager
primary Windows 7/Vista/XP tool for managing hardware
Which part of an information system consists of the rules or guidelines for people to follow?
procedures
LCD Panels
produce an image by manipulating light within a layer of liquid crystal cells
Highly detailed and personalized descriptions of individuals are electronic:
profiles
In most cases, the word "software" is interchangeable with the word
program
In most cases, the word "software" is interchangeable with the word _______.
program
Freemium
provides free use of a stripped-down or basic version of the product but requires payment for upgraded features
Multitasking
provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously
Inpainting
reconstructing lost or unwanted areas in a photo
Correcting image distortion
reconstructing perspective with photoediting
Ecommerce
refers to business transactions that are conducted electronically over a computer network
Packet loss
refers to data that never reaches its destination or gets discarded because it arrives too late
Big data
refers to the huge collections of data that are difficult to process, analyze, and manage using conventional database tools An example of big data is the 1 million transactions generated by Walmart sales registers every hour Big data is a relatively new phenomenon that businesses are just beginning to deal with
An optical mouse uses _________________.
reflected beams of light
Gantt charts
shows the duration of development tasks as they occur over time
On the motherboard, the connection points for chips are referred to as _______.
sockets
Vertical market
software is designed for a specific industry or enterprise; the software that controls touchscreen order entry at fast food restaurants is an example of software designed for vertical markets
A Web application (or Web app) is?
software that is accessed with a Web browser Web apps are an example of cloud computing Some popular Web apps include: Gmail, Google Docs, and Turnitin Most Web apps require no installation at all on your local computer or handheld device
When a new version or edition of a software product is released it is referred to as a ?
software upgrade
Discontinuation of service
some cloud storage providers have closed down their services with little warning
Systems programmers
specialize in developing system software such as operating systems, device drivers, security modules, and communications software
Criteria for selecting a printer
speed, print quality, cost, usage
These special programs continually look for new information and update the databases used by search services.
spiders
Which would be the most appropriate type of application to create, analyze and forecast budgets?
spreadsheet
Wide range of programs that secretly record and report an individual's activities on the internet
spyware
ISDN
stands for Integrated Services Digital Network; it divides a telephone line into two channels, one for data and one for voice, by using packet switching
DCE
stands for data communication equipment; these devices control the speed of data over networks, convert signals from cables to wireless, check for corrupted data, and route data to its destination
DTE
stands for data terminal equipment and can be any device that stores or generates data
In the URL "http://www.simnetonline.com", ".com" is the
top level domain tld
This type of software works with end users, application software, and computer hardware to handle the majority of technical details
system
"Background" software that helps the computer manage resources is called
system software
"Background" software that helps the computer manage resources is called _______.
system software
Which of the following is a collection of programs rather than a single program?
system software
What are the two major software types?
system software and application software
Which of the following phases of the systems life cycle is considered to be an ongoing activity?
systems maintenance
A microcomputer that is smaller, lighter, and less powerful than a notebook, and which has a touch sensitive screen, is called a
tablet
A microcomputer that is smaller, lighter, and less powerful than a notebook, and which has a touch sensitive screen, is called a _______.
tablet
ROM. Read-only
technology stores data permanently on a disc, which cannot be later added to or changed; can potentially store data for 100 years
Plug-and-play
technology that allows a hardware compo- nent to be attached to a computer so that it is automatically configured by the operating system, without user intervention.
RW. Rewritable
technology uses phase change technology to alter a crystal structure on the disc surface; altering this structure creates patterns of light and dark spots resembling pits and lands
System testing
testing ensures that all the hardware and software components work together
A CD-RW is a compact disc __________________.
that is rewritable
CDFS (Compact Disc File System)
the 32-bit file system for CD discs and some CD-R and CD-RW discs
hot-swappable
the ability to plug or unplug devices without first powering down the system; USB devices are an example of this
In the URL "http://www.simnetonline.com", ".com" is the _______.
top-level domain (TLD)
Biometrics
the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting . It is information technology.
Screen size
the measurement in inches from one corner of the screen diagonally across to the opposite corner
Security and privacy risks?
the more places your data is stored and the more networks on which it tavels, the more susceptible it becomes to hackers and spying agencies
resolution
the number of pixels on a monitor screen that are addressable by software (example: 1024 x 768 pixels)
file system
the overall structure that an OS uses to name, store, and organize files on a disk; examples are NTFS and FAT32
One-time purchase
the software remains basically the same as when it was purchased
Control devices/ robots
the study, designed and use of robot system for manufacturing. Does testing, product inspection, painting, and packaging
Response rate
the time it takes for one pixel to change from black to white then back to black
The mouse is able to move in different directions through use of
the x and y coordinate system
3G
third generation) service was available in the U.S. beginning in 2001; common protocols include CDMA and GSM ED
Laser printers require _______________ to produce printed documents.
toner powder
Wired channels
transport data through wires and cables transport data from one device to another without the use of cable or wires
Object-oriented methodology
treats an information system as a collection of objects that interact to accomplish tasks
Open source software makes
uncompiled program instructions—the source code—available to programmers who want to modify and improve the software; Linux is an example of open source software Two of the most common open source and free software licenses are BSD and GPL
For browsers to connect to resources on the Internet, the location of the resources must be specified through addresses called
uniform resource locator url
For browsers to connect to resources on the Internet, the location of the resources must be specified through addresses called _______.
uniform resource locators (URLs)
One way to improve the storage capacity of a hard disk is to:
use file compression.
Real
used for fields that contain numbers with decimal places
Integer
used for fields that contain whole numbers
barcode reader
used to scan barcodes on products at the points of sale or when taking inventory
projector
used to shine a light that projects a transparent image onto a large screen and is often used in classrooms or with other large groups
Human Computer interface
uses eyecontrol to move pointer and make selections
hits
using a keyword, a search engine returns a list of related sites known as:
An external hard disk:
usually connects to a USB or FireWire port.
This type of image is made up of geometric shapes or objects
vector
Input and output components are ________________.
visible to the user
A customer service department using automated voice response system is an example of __________________.
voice commands/voice synthesizers
The GPL (General Public License)
was developed for a free operating system called GNU; it's slightly more restrictive than the BSD license because it requires derivative works to be licensed
This version of the web evolved to support more dynamic content creation and social interaction.
web 2.0
Which of the following programs would be used to create a website
web authoring
Service outages
when a cloud storage site has an outage, all the data stored there become temporarily inaccessible
Which of the following is not one of the three basic components of cloud computing?
wireless connectivity
WiFi stands for ___________________.
wireless fidelity
To create documents that consist primarily of text, you need this software
word processor