CLEP INFO SYSTEMS
_____ is a job title in the end-user computing area of an IT department. (A) Software engineer (B) Webmaster (C) Help Desk specialist (D) Systems analyst (E) Application programmer
A Help Desk specialist deals with problems in hardware, software, or communications systems.
A ____ network is an Internet network on which users connect directly to each other's hard disks and exchange files directly. (A) F2F (B) star (C) ring (D) mainframe (E) P2P
A P2P network is sometimes called a file-sharing network because users with compatible software and an Internet connection copy files from someone else's hard disk to their hard disk.
A _____ is a malicious-logic program that hides within or looks like a legitimate program and usually is triggered by a certain condition or action. (A) computer virus (B) worm (C) Trojan horse (D) honeypot (E) All of the above
A Trojan horse is named after the Greek myth. An example of a program a Trojan horse may use is a screen saver.
A _____ looks similar to a floppy disk but has much greater storage capabilities—up to the equivalent of 170 standard floppy disks. (A) Zip disk (B) CD (C) hard disk (D) DVD (E) PC Card
A Zip disk is a type of magnetic media that can store from 100 MB to 750 MB of portable data.
A _____ is a graphical element that you activate to cause a specific action to take place. (A) command box (B) button (C) dialog box (D) sub-menu (E) shortcut
A button can be activated with a mouse click.
A program determines the _____ by applying a formula to the numbers in the primary key. (A) data type (B) check digit (C) field size (D) secondary key (E) default value
A check digit is a number(s) or character(s) that is appended to or inserted into a primary key value.
A DBMS uses the _____ to perform validation checks. (A) data server (B) data warehouse (C) data mart (D) data dictionary (E) data model
A data dictionary is a DBMS element that contains data about each file in a database and each field within those files.
A _____ is any computer that directly connects to a network. (A) client (B) server (C) peer (D) host (E) guest
A host computer typically uses high-speed communications to transfer data and messages over the network.
A _____ is equal to exactly 1,024 bytes, but computer users often round it down to 1,000 bytes to simplify memory and storage definitions. (A) kilobyte (KB or K) (B) gigabyte (GB) (C) megabyte (MB) (D) terabyte (TB) (E) nanobyte (NB)
A kilobyte is often rounded down to 1,000 bytes for simplification. For example, if a memory chip can store 100 KB, it can hold approximately 100,000 bytes.
A _____ is the smallest element in an electronic image. (A) byte (B) pixel (C) character (D) point (E) bit
A pixel (short for picture element) represents a single point in an electronic image. The greater the number of pixels, the better the quality of the image.
In a database, each row, called a _____, contains data about a given person, product, object, or event. (A) record (B) form (C) cell (D) field (E) column
A record is a group of related fields in a database.
A(n) _____ is an interpreted program that runs on the server. (A) script (B) applet (C) servlet (D) browser (E) image map
A servlet is a server-side program that adds special multimedia effects and interactive capabilities to Web pages.
A _____ is an icon on the desktop that provides a user with immediate access to a program or file. (A) kernel (B) buffer (C) spooler (D) shortcut (E) menu
A shortcut icon is a small image displayed on the screen that represents a program, a document, or some other object.
With a procedural language, often called a _____, a programmer uses a series of English- like words to write instructions. (A) first-generation language (1GL) (B) second-generation language (2GL) (C) third-generation language (3GL) (D) fourth-generation language (4GL) (E) fifth-generation language (5GL)
A third-generation language assigns a name(s) to a sequence of program instructions, called a procedure, that tells the computer what to do and how to do it.
Some Web sites use ___ on their pages because graphics can be time-consuming to display. (A) hyperlinks (B) macros (C) animation (D) thumbnails (E) streaming
A thumbnail is a small version of a larger graphic.
A(n) _____ shows actors, which are drawn as stick figures, that connect to each function the actors can perform with an arrow. (A) data flow diagram (B) use case diagram (C) class diagram (D) entity-relationship diagram (E) sequence flow diagram
A use case diagram describes the functionality of a system with actors that the system interacts with and use cases, or services, that the system knows how to perform.
A bar code scanner uses ____ to read the bar code on a product. (A) laser beams (B) OCR (C) radio waves (D) MICR (E) OMR
A.) A bar code scanner reads a bar code by using light patterns that pass across the bar code lines.
A voice mailbox is a(n) _____ in a voice mail system. (A) storage location on a hard disk (B) processor (C) input device (D) output device (E) program
A.) A voice mailbox stores voice mail messages on a hard disk once they have been digitized.
An ERM system _____. (A) facilitates communication between human resources personnel and employees (B) includes information about the files and data, called metadata (C) focuses on issues related to inventory of parts and forecasting future demand (D) assists support personnel in providing the best solutions for customers
A.) An ERM system automates and manages much of the communication between employees and the business. Most ERM systems include a Web interface for employees.
In an IP address, the number in each group is between _____. (A) 0 and 255 (B) 250 and 555 (C) 256 and 511 (D) 550 and 755 (E) 750 and 955
A.) An IP address consists of four groups of 8-bit numbers, each separated by a period.
An enterprise ASP _____. (A) customizes and delivers high-end business applications (B) provides applications for a particular industry (C) delivers applications to meet a specific business need (D) supplies prepackaged, standard entertainment applications (E) manages integrated applications within a business
A.) An enterprise application-service provider is a third party that deploys, manages, and remotely hosts packaged software applications through a rental arrangement.
The most popular T-carrier line is the _____. (A) T1 line (B) T3 line (C) T2 line (D) T4 line (E) T5 line
A.) Businesses often use T1 lines to connect to the Internet. Many Internet service providers use T1 lines to connect to the Internet backbone. Home and small business users purchase fractional T1, in which they share a connection with other users.
Sharing resources on a network _____. (A) saves time and money (B) saves time and maintains equivalent costs (C) wastes time but saves money (D) saves time but wastes money (E) wastes time and money
A.) Computers sharing resources in a network store their own files and share any peripherals attached to any computer. This type of network is inexpensive and simple to install and maintain.
Software piracy continues for all of the follow- ing reasons EXCEPT that_____. (A) software piracy drives down the price of software for all users (B) in some countries, legal protection for software does not exist (C) software piracy is a fairly simple crime to commit (D) many buyers believe they have the right to copy software they have paid for (E) users feel software piracy is a victimless crime because companies already make millions and can afford the losses
A.) Software piracy is the unauthorized and illegal duplication of copyrighted software. Companies are often forced to raise their software prices to compensate for piracy.
Most _____ database products for mid-range servers and mainframes include SQL. (A) relational (B) multidimensional (C) object-oriented (D) hierarchical (E) All of the above
A.) Structured Query Language (SQL) is a query language that allows users to manage, update, and retrieve data in a relational database.
The Internet has its roots in _____, a network that became functional in 1969, linking scientific and academic researchers across the United States. (A) ARPANET (B) LISTSERV (C) NSFnet (D) MPEG (E) W3C
ARPANET was built by the Advanced Research Projects Agency (ARPA), an agency of the U.S. Department of Defense.
Internet advertising firms often use software, called _____, to collect information about the user's Web-browsing habits. (A) comware (B) groupware (C) postware (D) billware (E) adware
Adware is a program that is placed on a computer without a user's knowledge and collects information about the user's Web-browsing habits.
A(n) _____ uses devices that emit and sense light to detect the mouse's movement. (A) optical mouse (B) audio mouse (C) mechanical mouse (D) ergonomic mouse (E) laser mouse
An optical mouse uses optical sensors or lasers. An optical mouse is more precise than a mechanical mouse and does not require cleaning, but it is also more expensive.
_____, which allows users to choose an encryption scheme that passes between a client and a server, requires that both the client and server have digital certificates. (A) Secure Sockets Layer (SSL) (B) Secure HTTP (S-HTTP) (C) Secure Electronics Transactions (SET) Specifications (D) Pretty Good Privacy (PGP) (E) Certificate authority (CA)
Applications that must verify the authenticity of a client, such as online banking, use S-HTTP.
A(n) _____ usually lists just transactions. (A) external report (B) detailed report (C) exception report (D) summary report (E) internal report
B.) A MIS creates detailed reports to provide information about transactions, such as sales orders taken during a given period.
A CMS _____. (A) facilitates communication between human resources personnel and employees (B) includes information about the files and data, called metadata (C) focuses on issues related to inventory of parts and forecasting future demand (D) assists support personnel in providing the best solutions for customers (E) delivers products to customers
B.) A content management system (CMS) is a combination of databases, software, and procedures that organizes and allows access to various forms of documents and other forms.
_____ is a common data type in a database that consists of lengthy text entries. (A) Numeric (B) Memo (C) Object (D) Date (E) Hyperlink
B.) A data type specifies the kind of data a field can contain and how the field is used. The Memo data type stores lengthy text entries in a database.
Job titles in the management area of an IT department include all of the following EXCEPT: (A) project leader (B) desktop publisher (C) project manager (D) e-commerce administrator (E) database administrator
B.) Desktop publishers are professional designers who create sophisticated documents with text and graphics.
Organized information _____. (A) is error free (B) is arranged to suit the needs and requirements of a decision-maker (C) can be proven as correct or incorrect (D) has an age suited to its use (E) is always available when the decision-maker needs it
B.) Different people may need the same information presented in a different manner.
____ is the inflammation of the nerve that connects the forearm to the palm of the wrist. (A) CVS (B) CTS (C) Ergonomics (D) MIS (E) TPS
B.) Factors thatcause CTS (carpel tunnel syndrome) include prolonged typing, prolonged mouse usage, or continual shifting between the mouse and the keyboard.
Groupware is a component of a broad concept called _____, which includes network hardware and software that enables group members to communicate, manage projects, schedule meetings, and make decisions. (A) public Internet access (B) workgroup computing (C) Web services (D) short message service (E) peer-to-peer
B.) Groupware is a type of software that helps groups of people work together on projects and share information over a network.
A program that stores and distributes newsgroup messages is called a _____. (A) news client (B) newsreader (C) news server (D) newsmonger (E) news host
B.) To participate in a newsgroup, typically you use a program called a newsreader. Most browsers have newsreaders.
With ____ processing, the computer collects data over time and processes all transactions later, as a group. (A) online transaction (B) real-time (C) parallel (D) concurrent (E) batch
Batch processing is useful for applications where a computer or peripheral is needed for an extended time. Transactions can be saved and processed at a time when the needed resources are idle.
A _____ is the smallest unit of data a computer can process. (A) byte (B) field (C) character (D) record (E) bit
Bit is short for binary digit. The computer uses a binary system, which consists of two unique digits, 0 and 1.
A T3 line is _____. (A) slower than a T1 line and quite expensive (B) slower than a T1 line but quite inexpensive (C) equal in speed to 28 T1 lines but quite expensive (D) equal in speed to 28 T1 lines and quite inexpensive (E) equal in speed to 100 T1 lines but quite expensive
C.) A T3 line is equal in speed to 28 T1 lines. T3 lines are quite expensive. Main users of T3 lines include large companies, telephone companies, ISPs, and the Internet backbone.
A ring network _____ to install. (A) must span a smaller distance than a bus network, and it is more difficult (B) must span a smaller distance than a bus network, and it is more expensive (C) can span a larger distance than a bus network, but it is more difficult (D) must span a smaller distance than a bus network, but it is less expensive (E) can span a larger distance than a bus network, and it is easier
C.) A bus network consists of a single central cable, to which all computers and other devices connect. On a ring network, a cable forms a closed loop (ring) with all computers and devices arranged along the ring.
Which of the following is not a plug-in? (A) Acrobat Reader (B) Flash Player (C) Netscape Navigator (D) QuickTime (E) RealOne Player
C.) A plug-in is a program that extends the capability of a browser. Netscape Navigator is a browser.
A ____ is the text version of an IP address. (A) path name (B) host name (C) domain name (D) hyperlink (E) Web page address
C.) All-numeric IP addresses are difficult to remember and use. Thus, the Internet supports the use of a text name that represents one or more IP addresses.
In a recent report, the United States government attributed _____ of the country's economic growth to digital technologies, resulting in tremendous increases in productivity. (A) one eighth (B) one fourth (C) one third (D) one half (E) two thirds
C.) Both technical and non-technical jobs today require an understanding of how to use technology. By 2008, nearly half of all American employment will be in industries that either produce or use computer technology.
____ is a work arrangement in which employees work away from a company's standard workplace and often communicate with the office through the computer. (A) Internet commuting (B) Power computing (C) Telecommuting (D) Telecomputing (E) Mobile computing
C.) Many employees of large businesses telecommute, which allows them to combine work and personal responsibilities, such as child care.
A common netiquette rule is to avoid ____, which is the equivalent of shouting. (A) emoticons (B) italics font (C) all capital letters (D) bold font (E) acronyms
C.) Netiquette is the code of acceptable behaviors users should follow while on the Internet. To emphasize a word, users often use asterisks around a word rather than capital letters.
In a spreadsheet, a ____ is the intersection between a column and a row. (A) page (B) label (C) cell (D) chart (E) function
C.) Spreadsheet software identifies cells by the column and row in which they are located.
During a cold boot on a personal computer, the POST (power-on self-test) results are compared with data in a _____ chip. (A) BIOS (B) UNIX (C) SCSI (D) CMOS (E) DROM
CMOS (complementary metal-oxide semiconductor) technology uses battery power to retain information even when the power to the computer is off.
_____ typically consists of self-directed, self- paced instruction on a topic. (A) CBT (B) DTP (C) CAD (D) FAQ (E) CIM
Computer-based training (CBT) is a type of education in which students learn by using and completing exercises with instructional software.
Large-scale applications sometimes refer to a graphics tablet as a _____. (A) scanner (B) reader (C) pointer (D) digitizer (E) recognizer
D.) Artists, designers, and engineers use a digital pen with graphics tablets.
Font size is measured in points, which are about _____ of an inch in height. (A) 1/9 (B) 1/18 (C) 1/36 (D) 1/72 (E) 1/128
D.) Font size indicates the size of the characters in a particular font and is gauged by a measurement system called points.
Most e-commerce actually takes place between businesses, which is called _____. (A) consumer-to-business (C2B) e-commerce (B) business-to-consumer (B2C) e-commerce (C) consumer-to-consumer (C2C) e-commerce (D) business-to-business (B2B) e-commerce (E) Web-to-business (W2B) e-commerce
D.) Many businesses provide goods and services to other businesses, such as online advertising, recruiting, credit, sales, market research, technical support, and training.
Standard CRT monitors today usually display up to a maximum of _____ pixels. (A) 80x60 (B) 800x600 (C) 160x120 (D) 1600 x 1200 (E) 16,000 x 12,000
D.) Most monitors support a variety of screen resolutions. The norm is usually 800 x 600 pixels, while the maximum resolution for a standard monitor is typically 1600 x 1200 pixels.
With a _____, the vendor selects the product(s) that meets specified requirements and then quotes the prices. (A) request for quotation (RFQ) (B) request for information (RFI) (C) request for system services (RFSS) (D) request for proposal (RFP) (E) request for product price (RFPP)
D.) System analysts use three basic types of documents to summarize requirements for potential vendors: RFQ, RFP, and RFI. After sending RFPs to potential vendors, the system analyst receives and evaluates completed proposals.
An acceptance test _____. (A) verifies that each individual program works by itself (B) verifies that all programs in an application work together properly (C) verifies that an application works with other applications (D) is performed by end-users and verifies that the new system works with actual data (E) verifies that existing hardware is compatible with the new system
D.) Users perform an acceptance test during the final stage of testing, after developers have thoroughly tested the application with unit, system, and integration tests.
During _____, a systems analyst identifies the processing requirements for each program in the system. (A) storage design (B) database design (C) program design (D) input and output design (E) data entry design
During program design, details of the new system are developed.
A(n) _____, also called program logic, is a graphical or written description of the step-by- step procedures to solve the problem. (A) object model (B) style sheet (C) solution algorithm (D) source code (E) prototype
During the implementation phase of the system development cycle, programmers use the solution algorithm to design and code the necessary programs.
Hypermedia is made up of a ____ combination of text, audio, video, and graphical components that are linked electronically. (A) linear (B) parallel (C) sequential (D) synchronous (E) nonlinear
E.) Hypermedia allows users to jump to related information through links, rather than accessing information sequentially.
72. Which of the following is not true of a data warehouse? (A) It consists of data required for decision- making. (B) It may contain internal or external data sources. (C) It may use click streams as a source of information. (D) It contains current and historical transactions. (E) It only contains transaction information and does not include summations of data in the warehouse.
E.) In addition to storing current and historical transactions, a data warehouse contains summarizations of this data.
Web page authoring software includes all of the following EXCEPT: (A) Dreamweaver MX (B) Flash MX (C) FrontPage 2003 (D) Spider Writer (E) Excel
E.) Many developers use Web page authoring software to create sophisticated Web pages. Excel is a spreadsheet program.
An information system must share information, or have _____, with other information systems within an enterprise. (A) availability (B) scalability (C) probability (D) security (E) interoperability
E.) Systems that have interoperability are said to be open. Recent open ems employ XML and Web services to allow a greater level of interoperability.
____ are often integrated with transaction processing systems to generate accurate and timely reports for analysis. (A) OIS (B) CIM (C) CAE (D) CAD (E) MIS
E.) The TPS processes the transaction and updates customer and inventory information. The related MIS produces customer and inventory reports.
It would take a computer ____ to discover a password with 10 characters (assuming 1 million tries per second). (A) .000018 second (B) .02 second (C) 1 second (D) 30 seconds (E) 59 years
E.) The longer the password, the more effort required to discover it.
Examples of network operating systems include all of the following EXCEPT: (A) Windows Server 2003 (B) NetWare (C) UNIX (D) Linux (E) Windows XP
E.) Windows XP is a stand-alone, or client, operating system. UNIX and Linux are often called multipurpose operating systems because they are both standalone and network operating systems.
A _____ is a network that connects computers and devices in a limited geographical area, such as a home, school computer laboratory, or office building. (A) local area network (LAN) (B) wide area network (WAN) (C) regional area network (RAN) (D) variable area network (VAN) (E) metropolitan area network (MAN)
Each computer in a LAN shares resources, and they are often connected by via cables. A wireless LAN (WLAN) is a LAN that uses no physical wires.
A ____ is a window on a screen that provides areas for entering or changing data in a database. (A) record (B) cell (C) field (D) report (E) form
Forms are used to enter, retrieve, and maintain the data in a database.
_____ is copyrighted software provided for an unlimited time at no cost to a user. (A) Custom software (B) Public-domain software (C) Packaged software (D) Freeware (E) Shareware
Freeware is copyrighted software provided at no cost to a user by an individual or a company. Shareware is copyrighted software that is distributed free for a trial period.
Widely used procedural programming languages that the industry recognizes as standards include all of the following EXCEPT: (A) BASIC (B) C (C) COBOL (D) HTML (E) Java
HTML is not actually a programming language. It is a special formatting language that has specific rules for defining the placement and format of text, graphics, video, and audio on a Web page
A _____ is a separate area of a hard disk that holds an infected file until the infection can be removed. (A) quarantine (B) firewall (C) payload (D) honeypot (E) worm
If an antivirus program cannot remove an infection, it often quarantines the infected file so that other files will not become infected.
A(n) _____ is similar to an electronic filing cabinet that provides access to exact reproductions of the original documents. (A) charge-coupled device (B) optical reader (C) image processing system (D) video conference (E) bar scanner
Image processing systems typically store compressed image files in order to retrieve them efficiently.
_____ is a set of technologies by Sun Microsystems that allows programmers to develop and deploy Web services for an enterprise. (A) JIT (Java Instruction Technology) (B) JavaScript (C) JAD (Java Application Development) (D) JavaBuilder (E) J2EE (Java 2 Platform Enterprise Edition)
J2EE and .NET are two popular platforms for building and running Web services.
Of the graphics formats that exist on the Web, the two more common are _____ formats because of their smaller file sizes. (A) TIFF and BMP (B) BMPandPCX (C) TIFF and PCX (D) JPEG and GIF (E) GIF and BMP
JPEG and GIF graphics use compression techniques to reduce file size. The goal with JPEG is to reach a balance between image quality and file size. The GIF format works best with images that have only a few distinct colors.
_____ is the most widely used coding scheme used to represent data. (A) American Standard Code for Information Interchange (ASCII) (B) Unicode (C) Extended Binary Coded Decimal Inter- change Code (EBCDIC) (D) Multicode (E) Bytecode
Most personal computers and midrange servers use the ASCII coding scheme. Mainframe computers and highend servers use EBCDIC.
With ____, the computer processes each transaction as it is entered. (A) CIM (B) DBMS (C) OIS (D) MIS (E) OLTP
Most transaction processing systems today use online transaction processing (OLTP) systems.
____ devices read hand-drawn marks such as small circles or rectangles. (A) Bio-metric (B) Optical character recognition (OCR) (C) Magnetic ink character recognition (MICR) (D) Bar code reader (E) Optical mark recognition (OMR)
OMR is used for processing marks on a form, such as a test, survey, or questionnaire answer sheet.
The primary input device for a _____ is a digital pen, which allows users to write on the device's screen. (A) digital camera (B) notebook computer (C) desktop computer (D) Tablet PC (E) PDA
PDAs use a stylus, and Tablet PCs typically use a digital pen.
Many companies distribute documentation and reports in ____, which allows files to be easily downloaded and viewed on a variety of platforms using Adobe Acrobat Reader software. (A) HTML (B) XML (C) Microsoft Word (D) Microsoft Powerpoint (E) PDF
PDF is an electronicfile format that preserves formatting, fonts, and layouts across platforms. It is also greatly compressed, which means files can be accessed quickly on the Web.
Most PDAs today include, among other features, _____ functionality. (A) DTP (B) PIM (C) CAD (D) WBT (E) CAE
PIM (personal information manager) is application software that includes features to help a user organize personal information.
The technique of breaking a message into individual packets, sending the packets along the best route available, and then reassembling the data is called _____. (A) packet-catching (B) packet-building (C) packet-switching (D) packet-swapping (E) packet-messaging
Packet-switching is used in connection-less networks to send communications concurrently.
With _____ software, a mobile user can create and deliver a presentation to a large audience by connecting a mobile computer or device to a video projector that displays the presentation on a full screen. (A) word processing (B) presentation graphics (C) spreadsheet (D) database (E) browser
Presentation graphics allows a user to create visual aids for presentations to communicate ideas, messages, and other information to a group.
_____ is an operating systems certification that tests basic knowledge of setting up and managing a Linux operating system. (A) Red Hat Certified Technician (RHCT) (B) Microsoft Certified Professional (MCP) (C) Macromedia Certified Professional (D) IBM Certified Professional for Lotus Software (E) Network Systems Certified Professional (NSCP)
Red Hat is a leading distributor of various versions of the Linux operating system.
A(n) ___ system is a special kind of order- processing system that records purchases, processes credit or debit cards, and updates inventory. (A) Credit authorization (B) POS (C) CAE (D) MRP (E) Inventory control
Retail stores use POS (point-of-sale) systems to read in a bar code, complete a transaction, and print out a receipt.
_____ software helps salespeople manage customer contacts, schedule customer meetings, log customer interactions, manage product information, and take orders from customers. (A) SFA (B) ERM (C) CAE (D) CAD (E) ERP
SFA software equips traveling salespeople with the electronic tools they need to be more productive. SFA software often runs on PDAs or notebook computers.
With a _____, a company can select a word in a page to be automatically linked to another page chosen by the company. (A) Tracking tag (B) File link (C) Hyper-tag (D) Smart tag (E) Hyper-pointer
Smart Tags are somewhat like hyperlinks, except that they can lead to many different directions, providing a number of possible actions.
A(n) _____ consolidates data, usually with tools, tables, or graphs. (A) external report (B) exception report (C) detailed report (D) summary report (E) internal report
Summary reports are useful for managers to review information quickly and easily.
____ measures whether a company has or can obtain the hardware, software, and people needed to deliver and then support a proposed information system. (A) Operational feasibility (B) Schedule feasibility (C) Resource feasibility (D) Economic feasibility (E) Technical feasibility
System analysts measure technical feasibility by first analyzing whether the current hardware and software can used, and then determining what additional hardware, software, and human resources will be needed to deliver the new system.
One purpose of using test data is to try to cause a _____, which is an error that occurs while a program is executing. (A) one-time error (B) syntax error (C) logic error (D) run-time error (E) semantic error
System developers should test individual programs for run-time errors. They should also verify that all the programs work together in the system.
Internet transmissions commonly use _____. (A) Ethernet (B) token ring (C) TCP/IP (D) 802.11 (E) RFID
TCP/IP (Transmission Control Protocol/Internet Protocol) is a network technology that manages the transmission of data by dividing it up into packets. Each packet travels along the fastest available path via routers.
HTML (Hypertext Markup Language) uses ____ to specify how a document should be formatted. (A) keys (B) hyperlinks (C) macros (D) protocols (E) tags
Tags are codes that specify links to other documents and indicate how a Web page is displayed when viewed on the Web.
The _____ directs a company's information service and communications functions. (A) computer operator (B) quality assurance specialist (C) vice president of IT/chief information officer (CIO) (D) network security specialist (E) chief security officer (CSO)
The CIO is an executive IT position that reports to the CEO of the company
The _____ processor(s) is/are ideal for workstations and low-end servers. (A) Pentium (B) Xeon and Itanium (C) Celeron (D) Acceleron and Celerium (E) Pentium M
The Xeon processor is an Intel processor with clock speeds ranging from 1.4-2.4 GHz. The Itanium 2 processor is also an Intel processor with clock speeds ranging from 1.4-1.8 GHz.
A(n) _____ tests the data in two or more associated fields to ensure that the relationship is logical. (A) range check (B) completeness check (C) consistency check (D) alphabetic/numeric check (E) value check
The consistency check verifies that the relationship between two associated fields is logical. For example, the value in a Withdrawal Date field cannot occur earlier in time that the value in the Account Activated Date field.
Each computer or device on a local area network, called a _____, often shares resources such as printers, large hard disks, and programs. (A) hub (B) token (C) server (D) node (E) peer
The nodes in aLAN are often connected via cables. A wireless LAN (WLAN), by contrast, is a LAN that uses no physical wires to connect nodes.
The _____ for a project begins when the steering committee receives a project request. (A) support phase (B) implementation phase (C) design phase (D) planning phase (E) analysis phase
The planning phase is the first phase in the system development cycle. In the planning phase, the committee reviews project requests, prioritizes project requests, allocates resources, and forms the project development team.
The entire collection of Internet newsgroups is called _____, which contains thousands of newsgroups on a multitude of topics. (A) ARPANET (B) Dragnet (C) NSFnet (D) Usenet (E) W3C
Usenet is a worldwide distributed discussion system, with newsgroups classified hierarchically by name.
Businesses are the primary users of _____ because this technology provides a means for departments to communicate with each other, suppliers, vendors, and clients. (A) groupware (B) Web services (C) global positioning systems (D) short message services (E) PDAs
Web services are standardized tools used to create applications, products, and B2B interactions that can run on the Internet or an internal business network.
_____ is designed for workstations that use an titanium 2 processor. (A) Windows XP Home Edition (B) Windows XP Professional (C) Windows XP Tablet PC Edition (D) Windows XP 64-Bit Edition (E) Windows XP Media Center Edition
Windows XP 64-Bit Edition is designed to address the needs of technical workstation users who require large amounts of memory and floating point performance.
_____ consists of running the old system alongside the new system for a specified time. (A) Phased conversion (B) Duplicate conversion (C) Direct conversion (D) Pilot conversion (E) Parallel conversion
With parallel conversion, problems in the new system can be fixed before terminating the old system. However, it is costly to operate two systems at the same time.
Through _____, health-care professionals in separate locations can have live conferences on the computer. (A) teledoc (B) telemedicine (C) telecare (D) teleremedy (E) telehealth
With telemedicine, a doctor at one location can have a conference with a doctor at another location to view and discuss X-rays or other patient information
The emerging combination of ____ with EDI allows a standard framework to exchange different types of data via the Web. (A) HTML (B) DHTML (C) TPS (D) HTTP (E) XML
XML (extensible Markup Language) is a popular format for sharing data that allows Web page developers to create and use predefined tags.