CS 1 Final Exam

Ace your homework & exams now with Quizwiz!

True or False -- Most spreadsheet programs do not have built-in Web capabilities.

False

True or False -- RAM capacity is measured in bits.

False

True or False -- Storage media are volatile.

False

True or False -- Direct Internet connections are much slower than dial-up connections.

False

True or False -- Today's CPUs contain hundreds of millions of transistors, and the number doubles approximately every 18 months, a phenomenon known as Moliere's Law.

False

True or False -- Traditionally, the magnetic particles on a hard disk have been aligned vertically, perpendicular to the hard disk's surface.

False

True or False -- Typically, in hierarchical database management systems, a one-to-one relationship exists between data entities.

False

Using virtual memory is faster than just using RAM.

False

Windows 98 was built from the ground up using a different kernel than the other versions of Windows.

False

True or False -- Arranging data for efficient retrieval is called data organization.

True

True or False -- The graphics tablet is typically connected to a computer via a USB port.

True

Creating a ____ means making a duplicate copy of important files so you can restore those files if needed.

backup

Comments are usually preceded by a specific symbol.

True

Fourth-generation languages are commonly used today to access databases.

True

True or False -- Pharming ​attacks often increase after the occurrence of large data breaches that expose names and e-mail addresses of individuals, along with the businesses that these individuals patronize.

False

True or False -- Portable barcode readers are always used in point-of-sale (POS) systems.

False

True or False -- RFID tags need to be within line of sight of a reader.

False

True or False -- ROM (read-only memory), also called main memory or system memory, is used to store the essential parts of the operating system while the computer is running.

False

True or False -- Repeated threats or other malicious behavior that poses a credible threat of harm carried out online is referred to as phishing.

False

True or False -- Semirugged devices are designed to withstand drops onto concrete, extreme temperature variations, and use while being bounced around over rough terrain in a vehicle.

False

True or False -- Single-core CPUs allow computers to work simultaneously on more than one task at a time.

False

True or False -- Spam refers to harmful programs that can be installed on our computers without our knowledge.

False

True or False -- The Cut command in Windows can be replaced by the keyboard shortcut [Ctrl]+[C].

False

True or False -- The ISP is the largest and most well-known computer network in the world.

False

True or False -- The backside bus (BSB) has been one of the most common types of expansion buses in past years.

False

True or False -- There are buses inside the CPU, as well as on the memory channel.

False

True or False -- Unintentional encryption can result in huge data losses during or after a natural disaster or a terrorist attack.

False

True or False -- Wired displays connect to a computer or other device (such as to a smartphone) using a wireless networking connection such as Wi-Fi, Bluetooth, or a special wireless standard designed for transmitting multimedia.

False

True or False -- With a DVD, the storage medium and the storage device are permanently sealed together to form one piece of hardware called a fixed-media storage system.

False

True or False -- With random access, the data can only be retrieved in the order in which it is physically stored on the medium.

False

True or False -- With rewritable optical media, the laser permanently alters the disc surface.

False

Most Windows computers typically use ____, which supports much larger hard drives and files than the older FAT32 and includes better security and error-recovery capabilities.

NTFS

____ devices are high-performance storage systems that are connected individually to a network to provide storage for the computers connected to that network.

Network attached storage (NAS)

Plasma displays use a layered technology like LCD and ____ and look similar to LCD displays.

OLED

The UML standards are developed by the ____.

OMG

The documentation resulting from the design phase of the ____ is a set of design specifications that illustrates the program needed to fulfill the program requirements.

PDLC

To restore a file or folder deleted from your computer's hard drive, open the ____ and restore the file.

Recycle Bin

____ Web sites provide access to specific types of useful information, such as maps and driving directions.

Reference

____ optical discs can be written to, erased, and overwritten just like magnetic hard disks.

Rewritable

The ____ cards used with mobile phones today are a special type of smart card.

SIM

Low-level languages make programs easier to write.

False

Markup languages are most often used to add dynamic content to a Web page or to integrate a Web page with a database.

False

True or False -- Advocates of war driving and cyberstalking state that, unless individuals or businesses protect their access points, they are welcoming others to use them.

False

True or False -- CRT monitors use digital signals to display images, which allows for sharper images.

False

You must have the necessary hardware to support to use multiple monitors, such as the appropriate ____.

monitor ports

True or False -- Cloud databases allow Web pages to be static Web pages; that is, Web pages in which the appearance or content of the pages changes based on the user's input.

False

True or False -- Data accessibility refers to protecting data against destruction and misuse—both intentional and accidental.

False

True or False -- Display device size is measured diagonally from corner to corner as opposed to the way TV screens are measured.

False

True or False -- Display devices are used to select and manipulate objects, to input certain types of data (such as handwritten data), and to issue commands to the computer.

False

True or False -- Dr. Herman Hollerith's Punch Card Tabulating Machine and Sorter was the first electromechanical machine that could read slide rules.

False

True or False -- Due to the rising number of violent thefts of smartphones in major U.S. cities, cloud locks have been receiving increased attention.

False

True or False -- Embedded computers are computers that host data and programs available to a small group of users.

False

A hard drive that uses FDE is often referred to as a(n) ____.

self encrypting hard drive

A(n) ____ occurs when the programmer has not followed the proper rules of the programming language being used.

syntax error

True or False -- FTP programs block access to a computer from outside computers and enable each user to specify which programs on his or her computer are allowed to have access to the Internet. _________________________

False

True or False -- Joysticks are headphones with a built-in microphone.

False

True or False -- LCD displays do not use backlighting, which makes them energy efficient and lengthens the battery life of portable devices using these displays.

False

True or False -- LCD displays use layers of organic material, which emit a visible light when electric current is applied.

False

True or False -- Most recent software programs, including the latest versions of Microsoft Windows, OS X, and Microsoft Office, use ASCII.

False

True or False -- One type of self-contained business application designed to work over the Internet or a company network is a(n) Internet service.

False

Folders can contain both files and other folders (called subfolders).

True

Java programs are compiled into a format called bytecode.

True

There are no standard XML tags.

True

True or False -- A strategy that is sometimes used with keywords is the wildcard approach.

True

True or False -- A user inputs data into a computer, and then the computer processes it.

True

Direct Internet connections are typically ____ connections.

broadband

Businesses and other organizations (particularly ____ providers) have tremendous storage needs.

cloud

Chrome OS is the first ____

cloud operating system

To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.

codes of conduct

____ is a useful sales and marketing tool to help companies match customers with products they would be likely to purchase.

customer profiling

Conventional personal computers that are designed to fit on or next to a desk are often referred to as ____.

desktop computers

Some mobile apps are designed to be compatible with popular ____ such as Microsoft Office.

desktop software

True or False -- Although cost is a factor when comparing similar devices, it is often not the most compelling reason to choose a particular technology.

True

True or False -- At its most basic level, word processing is used to do what was done on a typewriter before computers were commonplace.

True

True or False -- Automating the data entry process is referred to as source data automation.

True

True or False -- Before using a dial-up access number to connect to the Internet, verify that it is a local telephone number; if it is not, you will incur long-distance charges.

True

True or False -- Businesses and ISPs typically archive e-mail messages that travel through their servers.

True

True or False -- Cloud software is delivered on demand via the Web to wherever the user is at the moment, provided he or she has an Internet connection.

True

True or False -- Computer literacy is knowing about and understanding computers and their uses.

True

True or False -- Computer speakers are the most common type of audio output device.

True

True or False -- Conventional RAM is volatile.

True

True or False -- Data integrity refers to the accuracy of data.

True

True or False -- Drawing programs typically create vector graphics, which use mathematical formulas to represent image content instead of pixels.

True

True or False -- Each location in memory has an address.

True

True or False -- Each pixel in a monochrome graphic can be only one of two possible colors (such as black or white).

True

True or False -- Early computers required programs to be written in machine language.

True

True or False -- NoSQL databases are organized differently than relational databases are organized and therefore, they do not usually use tables and SQL.

True

True or False -- Open source software are programs made up of source code that is available to the public.

True

True or False -- Spyware is a possible privacy risk.

True

True or False -- Users do not have to be concerned with how files are physically stored on a storage medium.

True

True or False -- Virtually all computer users will need at least one convenient USB port to be used to connect external hard drives, USB flash drives, printers, mice, and other USB-based hardware.

True

True or False -- Web browsers maintain a History list, which is a record of all Web pages visited during the period of time specified in the browser settings.

True

Two of the most common design and manufacturing systems are known as CAM and CAD.

True

User documentation normally consists of a user's manual containing instructions for running the program, a description of software commands, and so forth.

True

Windows Vista replaced Windows XP.

True

____ was originally developed in the late 1960s at AT&T Bell Laboratories as an operating system for midrange servers.

UNIX

Online shopping and online investing are examples of ____.

e-commerce

One common way to deal with spam that makes it to your computer is to use a(n) ____.

e-mail filter

Some 3D projectors are designed to project ____.

holograms

A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.

hot site

The most common type of Internet search is the ____.

keyword search

A ____ is approximately 1,000 bytes.

kilobyte (KB)

The ____ is cited as a disadvantage of Web-based training and distance learning by some educators.

lack of face-to-face contact

Regardless of how storage devices are connected to a computer, ____ and/or names are typically assigned to each storage device.

letters of the alphabet

A(n) ____ uses charged liquid crystals located between two sheets of clear material to light up the appropriate pixels to form the image on the screen.

liquid crystal display (LCD)

Today's CPUs are formed using a process called ____ that imprints patterns on semiconductor materials.

lithography

When ____ occur during preliminary debugging, dummy print statements—statements that are temporarily inserted into the code to display status information on the screen—can be used to help locate the error.

logic errors

A(n) ____ is an information system that provides decision makers with regular, routine, and timely information that is used to make decisions.

management information system (MIS)

One factor affecting digital camera quality is the number of pixels, measured in ____, used to store the data for each image.

megapixels

Two specific types of ____ are e-commerce systems and point-of-sale (POS) systems.

order entry systems

One of the simplest hashing algorithms involves dividing the primary key field by a particular ____.

prime number

Often the storage device and storage medium are two separate pieces of hardware (that is, the storage medium is ____).

removable

A ____ displays table information with a more formal, businesslike appearance.

report

The ____ contains a list of technical specifications for equipment, software, and services needed for a new system, as determined during the system design phase, and requests that vendors propose products that meet those specifications.

request for proposal (RFP)

A record is also called a ____.

row

____ are designed to withstand much more physical abuse than conventional devices.

ruggedized devices

Fifty years ago, computers were used primarily by researchers and ____.

scientists

Middleware for cloud database applications is commonly written as ____—short sections of code written in a programming or scripting language that are executed by another program.

scripts

Most search sites use a ____—a software program—in conjunction with a huge database of information about Web pages to help visitors find Web pages that contain the information they are seeking.

search engine

The surface of a hard disk is organized into tracks and pie-shaped groups of ____.

sectors

Computing technologies make it possible to have ____, traditional appliances with some type of built-in computer or communications technology.

smart appliances

The types of ____ systems used with personal and business computers today include smart cards.

storage

A storage medium is inserted into its corresponding ____ in order to be read from or written to.

storage device

The key element of the microprocessor is the ____—a device made of semiconductor material that controls the flow of electrons inside a chip.

transistor

Terascale computing is the ability of a computer to process one ____ floating point operations per second (teraflops).

trillion

____ form images by spraying tiny drops of liquid ink onto the page, one printed line at a time.

Ink-jet printers

____ occurs when data is entered into the computer.

Input

Application programmers manage day-to-day processing once a system has become operational.

False

Application software runs in the background at all times, making it possible for you to use your computer.

False

C is an object-oriented programming language developed by Sun Microsystems.

False

Filename rules are the same in all operating systems.

False

____ are utility programs that search for documents and other files on a user's hard drives.

Search tools

A variety of problems have emerged from our extensive use of computers and related technology, ranging from stress and health concerns, to the proliferation of ____ and malware.

Spam

Common online investing services include the ability to set up a(n) ____ that displays the status of the stocks you specify.

online portfolio

The ____ refers to a world where everyday physical objects are connected to, and uniquely identifiable on, the Internet so they can communicate with other devices.

Internet of Things (IoT)

____ refer to the variety of systems in place to record the details of a company's financial transactions (such as payments and purchases).

accounting systems

____ is the use of video cameras to monitor activities of individuals, typically for work-related or crime-prevention purposes.

video surveillance

Popular drawing programs include ____, CorelDRAW, and Corel Painter.

Adobe Illustrator CC

____ are the standard for business documents and come in both personal and network versions.

Laser printers

Each place value in a binary number represents ____ raised to the appropriate power.

2

Hybrid notebook-tablet computers are also called convertible tablets or ____.

2-in-1 computers

Conventional dial-up connects to the Internet at a maximum of ____.

56 Kbps

When selecting font size in a document, ____ points equals one-inch-tall text.

72

One of the most obvious initial changes in Windows Vista was the ____ interface.

Aero

The ____ is the section of a CPU core that performs arithmetic involving integers and logical operations.

ALU

Most application programs have a built-in help feature, typically available through a(n) ____ button.

Help

____ refers to using a personal computer to combine and manipulate text and images to create attractive documents that look as if they were created by a professional printer.

Desktop publishing

____ versions of freeware and open source software are often available to the public for testing.

BETA

____ is freeware software.

Chrome (Web browser)

The bus width and bus speed together determine the bus's ____.

bandwidth

Rearranging the data on the hard drive so all files are stored in contiguous locations is called ____.

Disk Defragmentation

____, as it relates to the Internet, encompasses what information about individuals is available, how it is used, and by whom.

Privacy

High-level object-oriented programming languages include C++, C#, Java, Dart, and ____.

Python

RAID 0 uses disk ____, which spreads files over two or more hard drives.

Striping

____ focuses on specifying what the new system will look like and how it will work.

System design

External hard drives typically connect to a computer via an external port (such as a USB or ____ port) or a wireless connection.

Thunderbolt

Data mining used in conjunction with Web site data is referred to as Web mining.

True

To connect multiple USB devices to a single USB port, a ____ can be used.

USB hub

Common types of possessed objects are smart cards, RFID-encoded badges, magnetic cards, ____, and smartphones that are swiped through or placed close to a reader to be read.

USB security tokens

System software is usually divided into two categories: operating systems and ____ programs.

Utility

____ is a set of rules for exchanging data over the Web.

XML

To navigate to a new Web page for which you know the URL, type that URL in the browser's ____ bar and press Enter.

address

In the program design phase of the PDLC, the specifications developed during the problem analysis phase are used to develop a(n) ____ for the program.

algorithm

Digital camcorders are similar to conventional ____ camcorders.

analog

CRT monitors use ____.

analog signals

A ____ is the smallest unit of data that a binary computer can recognize.

bit

The number of bits used to store color information about each pixel is called ____.

bit depth

A(n) ____ is a flat, touch-sensitive device used in conjunction with a digital pen.

graphics tablet

LCD panels used with computer monitors typically include a light, usually at the rear of the display device—a technique referred to as ____ .

backlighting

Creating a(n) ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy.

backup

____ carry on written "conversations" with people in a natural language.

chatterbots

The various types of communications systems that are in place at many organizations include e-mail, messaging, videoconferencing, ____, and telecommuting.

collaborative (workgroup) computing

A field is also called a ____.

column

The objective of ____ is to gather useful data about the system being studied.

data collection

Case-Based Critical Thinking Questions Case 6-1 When Mary started college, her parents bought her a new computer that came loaded with the bare essentials in terms of software applications. She is now looking into purchasing additional software. Mary enjoys taking digital photos and would like software that would allow her to perform tasks such as correct brightness or contrast, eliminate red eye, crop, resize, etc. In order to have this functionality on her computer, she needs a photo ____ program.

editing

Collecting in-depth information about an individual is known as ____.

electronic profiling

Case-Based Critical Thinking Questions Case 3-1 Dan is a small business owner who depends on his computer to keep track of customer and sales data. He is investigating storage options because it is critical for him to ensure that his data is safe in the event of a computer failure. As Dan is very concerned about maintaining the security of his business data, he should look for an external hard drive that comes with built-in ____.

encryption

Case-Based Critical Thinking Questions Case 14-1 James is a recent college graduate and has six months of IT experience. He is thinking about pursuing a certification program in order to demonstrate that he is serious about IT. James is most interested in becoming a database designer. Another name for this career choice is database ____.

engineer

Case-Based Critical Thinking Questions Case 6-2 Bryan has just started an internship in which he uses a database frequently. The database contains information about the company's employees. Bryan's supervisor senses that he is anxious about using the database and drops by to give him a short tutorial. Bryan is told by the supervisor that to create a database, he first needs to create the database ____ itself, and then he can create the necessary database objects.

file

Case-Based Critical Thinking Questions Case 12-1 Mary is entering her senior year of college. She has a meeting on Friday with her advisor to discuss her career plans. Mary might want to consider becoming a ____, as she would eventually like to manage networks for an organization and determine what changes, if any, are needed.

network systems and data communications analyst

Artificial intelligence systems that attempt to imitate the way a human brain works are called ____.

neural networks

One nanometer (nm) is ____ of a meter.

one-billionth

Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.

privacy policy

Case-Based Critical Thinking Questions Case 2-2 Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit documents. Recently, he has come to realize that in order to keep the computer performing at its best, he needs to carry out regular system maintenance on the computer. Since Jack has a Windows system, he can right-click a hard drive icon in File Explorer, select Properties, and then select the ____ option on the Tools tab to check that hard drive for errors.

Check

Most operating systems include security features, such as an integrated ____, to protect against unauthorized access via the Internet.

Firewall

____ programs can protect against someone accessing your computer via the Internet or a wireless connection.

Firewall

____ consists of nonvolatile memory chips that can be used for storage by the computer or the user.

Flash memory

____ have begun to replace ROM for storing system information, such as a computer's BIOS.

Flash memory chips

A computer operations manager designs and builds the end-user interfaces and tools used with cloud services.

False

A paperless office can be implemented today through a variety of technologies and processing techniques.

False

A scripting language is a type of language that uses symbols or tags to describe what a document should look like.

False

A selection control structure is simply a series of statements that follow one another.

False

A(n) GIS program helps design buildings, bridges, and other structures; design new products; design mechanical and electrical systems; and so forth.

False

A(n) data mart typically stores data for an entire enterprise.

False

A(n) systems analyst codes system software, fine-tunes operating system performance, and performs other system software-related tasks.

False

All programs and data located in RAM are divided into fixed-length pages or variable-length files.

False

Cleanup programs evaluate your system, looking for problems and making recommendations for fixing any errors that are discovered

False

Cleanup programs evaluate your system, looking for problems and making recommendations for fixing any errors that are discovered.

False

ERP refers to the transfer of data electronically between companies using networks, such as the Internet.

False

In 1994, Microsoft announced that all versions of Windows after 3.11 would be full-fledged operating systems instead of just application environments.

False

In Windows, users can use the search box located at the lower-left corner of the File Explorer window to search for files and folders in the current location that match the keywords entered into the search box.

False

Most application systems today look for and recognize new devices each time the computer boots.

False

Most operating systems are designed for either 16-bit or 32-bit CPUs.

False

One advantage of playing against a computer is that even if the human player makes a mistake, there is still hope that the computer opponent will make its own mistake at a later time, to level the playing field in that game.

False

One or more rounds of outside tests for programs created for mass distribution are referred to as alpha tests

False

Operating systems manage and process data from the time it is generated (such as data resulting from orders, documents, and other business transactions) through its conversion into information.

False

Robots of the future are expected to have a less humanoid form than the household robots currently on the market.

False

Structure charts are used to illustrate the step-by-step logic that is to take place within a program, module, or method.

False

TPS transactions are typically processed using batch processing.

False

The SCM describes the development of a system from the time it is first studied until the time it is updated or replaced.

False

The Windows Action Manager lists all the program and processes currently running on a computer.

False

The combination of hardware, software, and other resources used to increase productivity and facilitate communications in the office, is collectively referred to as a(n) system development life cycle.

False

The data dictionary resulting from the system analysis phase includes any instruments (such as questionnaires or interview questions) used in the data gathering stage, as well as the resulting diagrams, tables, trees, models, and other tools used to summarize and analyze the gathered data.

False

The goal of business intelligence is to provide a detailed picture of an organization, its functions, and its systems, as well as the relationships among these items.

False

The older DOS operating system and some versions of the UNIX and Linux operating systems use a(n) graphical user interface.

False

The older DOS operating system and some versions of the UNIX and Linux operating systems use a(n) graphical user interface. _________________________

False

The purpose of computer-aided manufacturing (CAM) is to reduce the time designers spend developing products.

False

The repetition control structure is also called the selection control structure.

False

The three most common types of language translators are compilers, interpreters, and coders.

False

True or False -- "Tracking up data" refers to creating a second copy of important files.

False

True or False -- A computer does not always do whatever the instructions, or program, tell it to do.

False

True or False -- A database that combines object and relational database technology can be referred to as an object-oriented database management system (OODBMS).

False

True or False -- A database typically consists of interrelated tables that contain forms and reports.

False

True or False -- A government database is a collection of data about people that is collected and maintained by private industry.

False

True or False -- A graphics tablet is also called a digitizing tablet.

False

True or False -- A(n) display screen is a programmable, electronic device that accepts data, performs operations on that data, presents the results, and stores the data or results as needed.

False

True or False -- A(n) e-diary is a Web page that contains short, frequently updated entries in chronological order.

False

True or False -- A(n) keyword search uses lists of categories instead of a search box.

False

True or False -- Abbreviations or acronyms, such as BTW for "between the words," are commonly used to save time in all types of communications today.

False

True or False -- According to the online version of the Merriam-Webster Dictionary, the term "aphorize" means "to steal and pass off the ideas or words of another as one's own" or to "use another's production without crediting the source."

False

True or False -- Advocates of war driving and cyberstalking state that, unless individuals or businesses protect their access points, they are welcoming others to use them. _________________________

False

True or False -- All public Wi-Fi hotspots are free.

False

True or False -- An external flash memory card reader that connects via an RJ14 port can be used when the destination device doesn't have a built-in reader.

False

True or False -- Application service providers (ASPs) supply the information that is available through the Internet.

False

True or False -- As a hard drive begins to get full, it takes less time to locate the data stored on the hard drive.

False

True or False -- At the lowest level, words are entered into database fields (columns), which hold single pieces of data in the database, such as product names or quantities.

False

True or False -- Because of its large size, audio data is usually encrypted to reduce its file size when it is transmitted over the Internet or stored on a smartphone or another device.

False

True or False -- Cache memory today is usually external cache.

False

True or False -- Computer programmers are the people who use computers to perform tasks or obtain information.

False

True or False -- Database developers are the people responsible for managing the databases within an organization.

False

True or False -- Each pixel on an LCD display emits visible light in the necessary color.

False

True or False -- For an even higher level of security than a scheduled backup, presence backup can be used.

False

True or False -- For extended power outages, generators are needed.

False

True or False -- Hardware theft can take many forms, including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement.

False

True or False -- If a field needs to store decimal places, the Long Integer field size can be used.

False

True or False -- Images need to be scanned at a lower resolution if the image will be enlarged significantly.

False

True or False -- In 1993, a group of professors and students at the University of Illinois National Center for Supercomputing Applications (NCSA) released the Netscape Web browser. _________________________

False

True or False -- In a typical word processing program, a footer is text entered by the user that appears at the top of every page.

False

True or False -- In a worksheet, functions are words, column headings, and other nonmathematical data.

False

True or False -- In addition to hardware, software, data, and procedures, the fifth major component of a computer system are codes.

False

True or False -- In determining where to store specific data in a(n) centralized DBMS, factors such as communications cost, response time, storage cost, and security are key considerations.

False

True or False -- In terms of functionality, the distinction between NAS and HHD is blurring because they both provide storage services to the network.

False

True or False -- Independent Web sites such as Snopes.com reports on the sources of current online rumors and stories.

False

True or False -- Instant messaging (IM) is the original industry term for the process of placing telephone calls over the Internet. _________________________

False

True or False -- Mobile tablets are extremely powerful computers used for complex computations and processing.

False

True or False -- Most application programs that allow text editing have a(n) editing spot that looks like a blinking vertical line on the screen and shows where the next change will be made to the document currently displayed on the screen.

False

True or False -- Most printers today are impact printers.

False

True or False -- Normalization is usually viewed as a multistep process, moving the table structures from first normal form (1NF) to usually fifth normal form (5NF).

False

True or False -- Once an image is inserted into a document, it cannot easily be modified.

False

True or False -- Once you have an Internet connection, you are ready to begin programming the Web—that is, to use a Web browser to view Web pages.

False

True or False -- One of the most important skills an Internet user can acquire today is how to successfully publish databases on the Internet.

False

True or False -- One or more adjacent sectors form a(n) track, the smallest amount of disk space that can be used to hold a file.

False

True or False -- One-dimension (1D) barcodes contain data only vertically.

False

True or False -- Online auctions allow you to check your account balances, make electronic payments, view your transaction history, and more.

False

True or False -- Optical character recognition (OCR) is a technology used primarily by the banking industry to facilitate check processing.

False

True or False -- Optical marks are characters specifically designed to be identifiable by humans as well as by an OCR device.

False

True or False -- Ownership rights for original creative works are referred to as software licenses.

False

True or False -- Performance-based exams cannot be administered and taken online.

False

True or False -- Printers produce soft copy.

False

True or False -- Read a Web site's piracy rules before providing any personal information.

False

True or False -- Repairing or restoring data that has become corrupt, such as the result of a storage media error or a computer virus, is a database analysis activity.

False

True or False -- Satellite communication (more commonly called s-com) is the process of exchanging electronic messages between individuals over a network—usually the Internet.

False

True or False -- Scanners produce images through either impact or nonimpact technologies.

False

True or False -- Software that connects two otherwise separate applications (such as a Web server and a DBMS) is referred to as interware.

False

True or False -- Some software tools are designed for recovery, instead of prevention; that is, they are designed to locate lost or stolen hardware. One example is device tracking software.

False

True or False -- The Web is a worldwide collection of separate, but interconnected, networks accessed daily by billions of people using a variety of devices to obtain information, disseminate information, or communicate with others.

False

True or False -- The control unit takes the instructions fetched by the prefetch unit and translates them into a form that can be understood by the control unit, ALU, and FPU.

False

True or False -- The data dictionary includes data located in the database tables.

False

True or False -- The development rights of a software program specify the allowable use of the program.

False

True or False -- The external hardware components are located inside the main box or system unit of the computer.

False

True or False -- The finished specifications for a table are commonly referred to as the table format.

False

True or False -- The hard drives of devices to be disposed of should be destroyed before they are sold or recycled. _________________________

False

True or False -- The lack of feedback is one disadvantage of Web-based training and distance learning.

False

True or False -- The main circuit board inside the system unit is called the megaboard.

False

True or False -- The most common security protocol used with secure Web pages is Secure Sockets Layer (SSL).

False

True or False -- The number of digital photos that can be stored in a camera at one time depends only on the capacity of the card being used.

False

True or False -- The primary function of employee monitoring is to track employee productivity.

False

True or False -- The process of recording data onto a recordable or rewritable optical disc is called tracking.

False

True or False -- The process of representing data in a form that can be understood by a digital computer is called decimal byte representation.

False

True or False -- The slide rule is considered by many to be the earliest recorded calculating device.

False

True or False -- The term surveillance refers to unsolicited e-mail sent to a large group of individuals at one time.

False

True or False -- The toolbar command button that pastes the last item copied or cut to the Clipboard to the current location can be replaced by the keyboard shortcut [Ctrl]+[P].

False

True or False -- The use of cookies provides no benefits to consumers.

False

True or False -- There are many options for protecting yourself against computer monitoring by your employer or the government.

False

True or False -- There are two parts to any storage system: the storage processor and the storage device.

False

True or False -- Thunderbolt ports are used to receive wireless transmissions from devices.

False

True or False -- To begin to use a computer, the user first turns on the power by pressing the power button, and then the computer displays a prompt for the user to decide the next course of action.

False

True or False -- To create presentation graphics, database software is used.

False

True or False -- To help you identify USB 3 ports, they are colored red.

False

True or False -- To protect hardware from damage due to power fluctuations, it is important for all computer users to use a voltage inverter.

False

True or False -- To write to, erase, or overwrite rewritable optical discs, track change technology is used.

False

True or False -- Typically, objects in painting programs can be layered so, if you place one object on top of another, you can later separate the two images if desired.

False

True or False -- USB ports are used to connect a computer to a phone outlet via telephone connectors.

False

True or False -- Views need to be designed to extract the requested information from a relational database, as efficiently as possible.

False

True or False -- Web services companies are the enterprises that own or operate the paths or "roadways" along which Internet data travels, such as the Internet backbone and the communications networks connected to it. _________________________

False

True or False -- Web-based software must be installed on the device being used before it is run.

False

True or False -- When entering a formula or function into a cell, most spreadsheet programs require that you begin with some type of symbol, usually the asterisk character (*).

False

True or False -- When hard drives containing critical data become damaged, systems design firms may be able to help out.

False

When you issue the command for your computer to store a document on your hard drive, the application software must make sure that the specified hard drive exists.

False

With most programs, compiling or interpreting a program for the first time will result in errors, and the assembling process consists of locating and correcting these errors.

False

With the do until structure, the statements in the loop are repeated as long as a certain condition is true.

False

The file management program incorporated into recent versions of Windows is ____.

File Explorer

Filenames typically include a ____ at the end of the filename.

File Extension

An important task that the operating system performs is ____, which keeps track of the files stored on a computer so that they can be retrieved when needed.

File Management

Using the Save As option on the File tab, before editing a document is a good idea, so you can return to the original version if needed.

True

While COBOL is not inherently suited to developing interactive applications or cloud software, new versions of COBOL are evolving to support new applications.

True

With File Explorer, use the View tab to specify how the items in the right pane are displayed

True

With File Explorer, use the View tab to specify how the items in the right pane are displayed.

True

With a JIT system, inventory, production resources, and finished products are limited to the right number at the right time as required to fill orders.

True

With logic errors, the program will run but the output will be wrong.

True

Case-Based Critical Thinking Questions Case 6-1 When Mary started college, her parents bought her a new computer that came loaded with the bare essentials in terms of software applications. She is now looking into purchasing additional software. Mary needs word processing software for her classes, but she has to budget her resources carefully this semester. She might consider using ____.

Office Online

Most computers today support the ____ standard, which means the computer automatically configures new devices as soon as they are installed and the computer is powered up.

Plug and Play

Product lifecycle management systems are designed to manage a product as it moves through the various stages of its life cycle, from design to manufacturing to retirement..

True

Pseudocode expresses the steps in a program, module, or method, but it uses English-like statements in place of the flowchart's graphical symbols.

True

Some expert systems are designed to take the place of human experts, while others are designed to assist them.

True

Sometimes ​run time errors occur because the program tries to do something that isn't possible, such as dividing a numeric value by zero.

True

Stand-alone utility programs are often available in a suite of related programs.

True

Structured programming embodies a top-down design philosophy.

True

System development can take place in-house or it can be outsourced to external companies.

True

The documents waiting to be printed are said to be in a(n) print queue, which designates the order the documents will be printed.

True

The goal of SCM is to reduce operating and inventory costs while meeting delivery objectives and increasing profits; that is, to be able to deliver the right product to the right place, at the right time, and at the right price.

True

The information systems (IS) department is also called the information technology (IT) department.

True

The purpose of the preliminary investigation is to define and evaluate the proposal for a new system or system modification relatively quickly, to see if it is worthy of further study.

True

There are many stand-alone utility programs available as an alternative to the operating system's utility programs.

True

There are two primary forms of DOS: PC-DOS and MS-DOS.

True

There have been many different versions of Windows over the years.

True

To use a macro recorder, you start the macro recorder and then perform the desired tasks—the macro recorder records all of the keystrokes and mouse clicks you make until the recorder is turned off.

True

True or False -- A common RAID technique is disk mirroring, in which data is written to two duplicate drives simultaneously.

True

True or False -- A disaster recovery plan is also called a business continuity plan.

True

True or False -- A display device is the most common form of output device.

True

True or False -- A good strategy to use when basic searching is not producing the desired results is field searching.

True

True or False -- A mainframe computer is a powerful computer used in many large organizations that need to manage large amounts of centralized data.

True

True or False -- A(n) Trojan horse is a type of malware that masquerades as something else—usually an application program. _________________________

True

True or False -- A(n) file management system is a program that allows the creation of individual database tables, each of which is stored in its own physical file and is not related to any other file.

True

True or False -- ASCII is the coding system traditionally used with personal computers.

True

True or False -- After all the tables in a database application have been created and their primary keys designated, the tables can be related to one another via their primary keys so that a primary key for one table can be used to extract data from other tables as needed.

True

True or False -- An e-mail address consists of a(n) username, followed by the @ symbol, followed by the domain name for the computer that will be handling that person's e-mail (called a mail server).

True

True or False -- Benchmark tests typically run the same series of programs on several computer systems that are identical except for one component (such as the CPU) and measure how long each task takes in order to determine the overall relative performance of the component being tested.

True

True or False -- Computer tapes are read by tape drives, which can be either an internal or an external piece of hardware.

True

True or False -- Digital video cameras include digital camcorders and small digital video cameras used in conjunction with computers and other devices.

True

True or False -- Even though in everyday use many people use the terms Internet and Web interchangeably, they are not the same thing.

True

True or False -- Fixed wireless Internet access is similar to satellite Internet access in that it uses wireless signals, but it uses radio transmission towers instead of satellites.

True

True or False -- Font size is measured in points.

True

True or False -- For most software programs, the licensing agreement or terms of use agreement is usually displayed and must be agreed to by the end user at the beginning of the software installation.

True

True or False -- Fourth-generation computers typically use a keyboard and mouse for input, a monitor and printer for output, and hard drives, flash memory media, and optical discs for storage.

True

True or False -- Fourth-generation computers typically use a keyboard and mouse for input, a monitor and printer for output, and hard drives, flash memory media, and optical discs for storage. _________________________

True

True or False -- Fourth-generation computers witnessed the development of computer networks, wireless technologies, and the Internet.

True

True or False -- Graphics software—also called digital imaging software—is used to create or modify images.

True

True or False -- Graphics tablets are often used in conjunction with image editing software to create original images or to modify digital photographs.

True

True or False -- Hashing procedures usually result in two or more records being assigned the same storage address, an event known as a collision.

True

True or False -- IBM's DB2 program contains a hybrid XML/relational database server.

True

True or False -- ISPs that offer free Internet access typically obtain revenue by selling on-screen ads.

True

True or False -- In addition to a keyboard, most computers today are used in conjunction with some type of pointing device.

True

True or False -- In its early years, the Internet was used primarily by the government, scientists, and educational institutions.

True

True or False -- In spreadsheet programs, when absolute cell references are used, formulas are copied exactly as they are written.

True

True or False -- Information processing is a vital activity today for all computer users, as well as for businesses and other organizations.

True

True or False -- Internal hard drives are not designed to be removed, unless they need to be repaired or replaced.

True

True or False -- Just as you can learn to drive a car without knowing much about car engines, you can learn to use a computer without understanding the technical details of how a computer works.

True

True or False -- Keystroke logging software can be used to record e-mail messages and documents before they are encrypted.

True

True or False -- Like any document created with software instead of paper and pencil, word processing documents can be retrieved, modified, and printed as many times as needed.

True

True or False -- Many news sites have searchable archives to look for past articles, although some require a fee to view back articles. _________________________

True

True or False -- Many-to-many entity relationships exist when one entity can be related to more than one other entity, and those entities can be related to multiple entities of the same type as the original entity.

True

True or False -- Mobile device management software secures and manages the mobile devices used in an organization.

True

True or False -- Most databases created today do not use the hierarchical or network models; however, these models, which are generally used with legacy mainframe systems, are still operational and so must be maintained.

True

True or False -- Most large storage systems are based on magnetic hard disks, although some systems can use a combination of magnetic and solid-state drives.

True

True or False -- Most search sites today are designed for keyword searches; some sites allow directory searches as well.

True

True or False -- Most spreadsheet programs allow multiple worksheets to be saved together in a single spreadsheet file, called a(n) workbook.

True

True or False -- N-tier database systems provide a great deal of flexibility and scalability, allowing the system to be modified as new needs and opportunities arise.

True

True or False -- Notebook and netbook computers usually have a keyboard that is similar to a desktop keyboard, but it is typically smaller.

True

True or False -- Notebook computers (also called laptops) are about the size of a paper notebook and open to reveal a screen and keyboard.

True

True or False -- Numeric passwords are often called PINs.

True

True or False -- Object-oriented and multidimensional databases are two examples of NoSQL (Not Only SQL) databases.

True

True or False -- Objects stored in an OODBMS can be retrieved using queries, such as with queries written in object query language (OQL)—an object-oriented version of SQL.

True

True or False -- One advantage of the n-tier architecture is that it allows the program code used to access the database to be separate from the database, and the code can be divided into any number of logical components.

True

True or False -- One advantage of using a biometric access system is its very high accuracy.

True

True or False -- One emerging data security risk is the exploitation of known but unpatched vulnerabilities by hackers.

True

True or False -- One of the most obvious types of hardware loss is hardware theft.

True

True or False -- One reason advanced users may partition a primary hard drive is to be able to use two different operating systems on the same hard drive.

True

True or False -- Online auctions are one of the most common ways to purchase items online from other individuals. _________________________

True

True or False -- Opt-out procedures can be confusing and time consuming, and they do not always work well.

True

True or False -- Optical discs are thin circular discs made out of polycarbonate substrate.

True

True or False -- Optical zoom specifications reflect how much the camera can zoom without losing image quality.

True

True or False -- PHOLED technology is especially appropriate for use on mobile devices, consumer electronics, and other devices where power consumption is an important concern.

True

True or False -- Paragraph formatting changes an entire paragraph at one time, such as specifying the line spacing for a particular paragraph.

True

True or False -- People who use the Internet for activities, such as looking up telephone numbers, browsing through online catalogs, or making an online purchase, are referred to as "users."

True

True or False -- Pipelining increases the number of machine cycles completed per second.

True

True or False -- Popular application programs such as Word or PowerPoint typically have mobile versions.

True

True or False -- Processors consist of a variety of circuitry and components that are packaged together and connected directly to the motherboard.

True

True or False -- Public domain software is not copyrighted; instead, the ownership rights to the program have been donated to the public domain.

True

True or False -- Public key encryption is also called asymmetric key encryption.

True

True or False -- Public video surveillance systems are often used in conjunction with face recognition technology to try to identify known terrorists and other criminals, to identify criminals when their crimes are caught on tape, and to prevent crimes from occurring.

True

True or False -- Recordable optical discs can be written to, but the discs cannot be erased and reused.

True

True or False -- Remote storage services accessed via the Internet are often referred to as cloud storage or online storage. These services can be provided either as a stand-alone service or as part of a cloud computing service.

True

True or False -- Remote storage services accessed via the Internet are often referred to as cloud storage.

True

True or False -- SSDs are becoming the norm for netbooks, mobile devices, and other very portable devices.

True

True or False -- SSDs are not subject to mechanical failures like magnetic hard drives, and are more resistant to shock and vibration.

True

True or False -- Security software protects devices against malware and other threats.

True

True or False -- Small office networks enable workers to access company records stored on a network server.

True

True or False -- Smartphones are prone to attacks and are known to have OS flaws.

True

True or False -- Some basic capabilities are often integrated directly into the motherboard instead of requiring the use of an expansion card.

True

True or False -- Some client-server database systems just have two parts (the clients and the server), others have at least one middle component between the client and the server; these systems are referred to as n-tier database systems.

True

True or False -- Some electronic tools, such as devices used by individuals to eavesdrop on wireless telephone conversations are illegal for individuals to use.

True

True or False -- Some new personal computers come with two partitions: a C drive partition ready to use for programs and data and a D drive partition set up as a recovery partition.

True

True or False -- Speech recognition systems enable the device being used to recognize voice input as spoken words.

True

True or False -- Spreadsheet templates are available to help users quickly create common types of business documents, such as balance sheets, income statements, invoices, and purchase orders.

True

True or False -- Storage devices are used to store data on or access data from storage media, such as DVD discs and flash memory cards.

True

True or False -- Storage devices can be internal (located inside the system unit), external (plugged into an external port on the system unit), or remote (located on another computer).

True

True or False -- Structured query language (SQL) is recognized as the standard query language for relational databases. Structured query language (SQL) is recognized as the standard query language for relational databases.

True

True or False -- System failure can occur because of a hardware problem, a software problem, or computer sabotage.

True

True or False -- Systems analysts design computer systems to be used within their companies.

True

True or False -- TOLED displays are transparent.

True

True or False -- Tablet computers are typically about the size of a notebook computer and are designed to be used with a digital pen/stylus or touch input.

True

True or False -- Technically, the Internet is the physical network, and the Web is the collection of Web pages accessible over the Internet.

True

True or False -- The Internet Society provides leadership in addressing issues that may impact the future of the Internet and oversees the groups responsible for Internet infrastructure standards.

True

True or False -- The background work area displayed on the screen for computers running Microsoft Windows is called the desktop.

True

True or False -- The binary numbering system uses only two symbols—the digits 0 and 1—to represent all possible numbers.

True

True or False -- The buses that connect peripheral (typically input and output) devices to the motherboard are often called expansion buses.

True

True or False -- The data on a(n) read-only disc cannot be erased, changed, or added to because the pits that are molded into the surface of the disc when the disc is produced are permanent.

True

True or False -- The most common internal hard drive interface standard for desktop computers today is serial ATA.

True

True or False -- The number of bits being transmitted at one time is dependent on the bus width.

True

True or False -- The system unit is the main case of a computer or mobile device.

True

True or False -- The term phosphorescence refers to a process that results in much more conversion of electrical energy into light instead of heat.

True

True or False -- The video card or the integrated graphics component determines the graphics capabilities of the computer.

True

True or False -- There are application programs that help users write their own programs in a form the computer can understand using a programming language.

True

True or False -- Tim Berners-Lee proposed the idea of the World Wide Web.

True

True or False -- To capture sound from a CD, ripping software is used.

True

True or False -- To comply with truth-in-advertising laws, a(n) unsubscribe ​e-mail address included in an unsolicited e-mail must be a working address. _________________________

True

True or False -- To convert analog sound to digital sound, several thousand samples—digital representations of the sound at a particular moment—are taken every second.

True

True or False -- To protect against data loss caused by a database failure, an accidental deletion, or another problem that renders the main copy of a database unusable, stringent backup procedures should be implemented.

True

True or False -- To protect against data loss due to disasters, some firms maintain a redundant copy of the database on a(n) mirrored ​drive, backing up the data at very frequent intervals to an off-site location.

True

True or False -- To retrieve information from a database, queries and reports are used.

True

True or False -- Transitions—special effects used between slides—can be applied to specific slides, or random transitions can be selected for the entire slide show.

True

True or False -- Typically data in a database is organized into fields, records, and files.

True

True or False -- USB flash drives are designed to be very small and very portable.

True

True or False -- Unlike ASCII and EBCDIC, Unicode is a universal international coding standard designed to represent text-based data written in any ancient or modern language, including those with different alphabets.

True

True or False -- When comparing the zoom capabilities of a digital camera, look for optical zoom, not digital zoom, specifications.

True

True or False -- While the memory used for disk caching can be a designated portion of RAM, today's hard drives typically use a disk cache consisting of memory chips located on a circuit board inside the hard drive case.

True

True or False -- Wireless networking allows the use of computers in virtually any location.

True

True or False -- With handwriting recognition, the computer interprets data handwritten with a digital pen as individual characters.

True

True or False -- With pipelining, a new instruction begins executing as soon as the previous one reaches the next stage of the pipeline.

True

True or False -- You can order free credit reports online quickly and easily via the AnnualCreditReport.com Web site.

True

True or False -- ​One of the most common types of software used in conjunction with a multi-dimensional database is Online Analytical Processing (OLAP).

True

True or False — Web conferences typically take place via a personal computer or mobile phone and are used by businesses and individuals.

True

True or False —One advantage of using personal computers for Internet access is that they have relatively large screens for viewing Internet content and keyboards for easier data entry.

True

Typically, information systems are used to support business intelligence (BI).

True

In spreadsheet programs, labels and constant values are always copied exactly to the new location; what happens to formulas when they are copied depends on whether they use relative cell referencing or ____.

absolute cell referencing

Partitions are sometimes referred to as ____.

logical drives

The earliest programming languages are referred to as ____.

low-level languages

A(n) ____ instruction might look like a meaningless string of 0s and 1s, but it actually represents specific operations and storage locations.

machine language

Magnetic RAM (MRAM) uses ____ rather than an electrical charge to store data.

magnetic polarization

Continually evaluating and improving the security measures used with the database is a database ____ activity.

maintenance

Case-Based Critical Thinking Questions ​ Case 1-1 Sarah is a busy real estate agent with a growing clientele. She is looking to purchase a new computer and software so that she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch up photos of real estate properties. What kind of computer would most likely fit Sarah's needs?

notebook computer

Two of the most significant approaches to programming are procedural programming and ____.

object-oriented programming

Case-Based Critical Thinking Questions Case 8-2 Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports. Brenda likes to download her music from a(n) ____ site and then transfer it to her portable digital media player so that she can listen to her music while she's away from her computer.

online music store

The ____ boots the computer, launches application software, and ensures that all actions requested by a user are valid and processed in an orderly fashion.

operating system

Case-Based Critical Thinking Questions Case 4-1 Stacey is the office manager for a small business and is looking for a new printer and scanner for her office. When buying a scanner, Stacey needs to make sure that the scanner has a high enough ____, usually measured in the number of dots per inch (dpi), for the business needs of the office.

optical resolution

By ____, you instruct companies with whom you do business not to share your personal information with third parties.

opting out

A(n) ____ uses a printhead consisting of pins that strike an inked ribbon to transfer the ink to the paper.

dot-matrix printer

In a printer, the number of ____ affects the quality of printed output.

dots per inch (dpi)

Small programs called ____ are used to communicate with peripheral devices, such as monitors, printers, portable storage devices, and keyboards.

drivers

A marketing activity that can be considered a privacy risk is ____.

e-profiling

The term ____ refers to chip-based storage.

memory

Case-Based Critical Thinking Questions Case 8-1 Anthony is passionate about politics and enjoys sharing and discussing his views with others over the Internet. Anthony regularly visits several popular political ____, which are Web pages designed to facilitate written discussions between people on specific subjects.

message boards

A personal computer or PC, originally called a ____, is a small computer designed to be used by one person at a time.

microcomputer

In the early 1980s, ____ were invented and computer use increased dramatically.

microcomputers

Web-based database requests are received by the Web server, which then converts the request into a database query and passes it on to the database server with the help of software called ____.

middleware

A(n) ____ is a computer used to host programs and data for a network.

midrange server

A ____ is loosely defined as a small device that has built-in computing or Internet capability.

mobile device

____ is the type of direct connection most commonly used with smartphones and tablets to keep them connected to the Internet via a cellular network.

mobile wireless internet access

A variety of ____ and network adapters are available to communicate electronically because there are different types of Internet and network connections.

modems

The display device for a desktop computer is formally called a ____.

monitor

All programs and data located in RAM are divided into fixed-length ____ or variable-length segments, depending on the operating system being used.

pages

Print speed is typically measured in ____.

pages per minute (ppm)

With a ____, both systems are operated in tandem until it is determined that the new system is working correctly, and then the old system is deactivated.

parallel conversion

Case-Based Critical Thinking Questions Case 12-2 Mother Goose Computing, Inc. provides computational biology consulting services. They are currently updating several of their systems. For the protein folding division, Mother Goose is planning to implement the new system module by module. This is called a ____ conversion.

phased

One of the most straightforward ways to improve the quality of the hits returned in a search is to use ____—essentially typing more than one keyword in a keyword search.

phrase searching

Case-Based Critical Thinking Questions Case 12-2 Mother Goose Computing, Inc. provides computational biology consulting services. They are currently updating several of their systems. For the biochemistry division, Mother Goose is planning to implement the new system first in their New York location. If it works properly, they will extend it to their Boston and Chicago locations. This is called a ____ conversion.

pilot

A ____ is the smallest colorable area on a display device.

pixel

With bitmapped images, the color of each ____ is represented by bits; the more bits used, the better the image quality.

pixel

The ____ orders data and instructions from cache or RAM based on the current task.

prefetch unit

The ____ tries to predict what data and instructions will be needed and retrieves them ahead of time in order to help avoid delays in processing.

prefetch unit

When a proposal for a new system or system modification is submitted, one of the first steps is to conduct a ____.

preliminary invesigation

A ____ is an image designed to enhance a presentation (such as an electronic slide show or a printed report) visually, typically to convey information more easily to people.

presentation graphic

Presentation slides can be advanced at predetermined intervals, by clicking or tapping on the screen, or by ____.

pressing the spacebar

The field in a table that is used to relate that table to other tables is called the ____.

primary field

Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. Before providing any personal information on a shopping site, Samuel always reads the Web site's ____.

privacy policy

Using the ____ browsing mode offered by some browsers can prevent personal information from being left on a public computer.

private

Many Web browsers, including Internet Explorer, Edge, Chrome, and Safari, have a(n) ____ option to browse the Web without leaving any history of the sites you visited on the computer you are using.

private browsing

Businesses and many individuals often use office suites, sometimes called ____, to produce written documents.

productivity software suites

Most DBMSs come bundled with a set of tools to perform a variety of necessary tasks, such as creating forms and reports and interfacing with query languages and ____ for complex applications.

programming languages

The most common HD format is 1080p, which uses a screen resolution of 1,920 Χ 1,080 and displays screen images one line at a time, called ____.

progressive display

For monitoring the physical locations of employees, video cameras are often used, but another possibility is the use of ____.

proximity cards

When a digitally signed document is received, the recipient's device uses the sender's ____ key to verify the digital signature.

public

Regardless of the device being used, software typically falls into four basic categories of software: commercial software, shareware, freeware, and ____.

public domain software

A ____ extracts specific information from a database by specifying particular conditions (called criteria) about the data you would like to retrieve.

query

A ____ is a question, or, in database terms, a request for specific information from the database.

query

Case-Based Critical Thinking Questions Case 6-2 Bryan has just started an internship in which he uses a database frequently. The database contains information about the company's employees. Bryan's supervisor senses that he is anxious about using the database and drops by to give him a short tutorial. Bryan's supervisor explains that to retrieve information from the database, Bryan needs to use a ____.

query

Some benefits can be computed relatively easily by calculating the amount of labor the new system will save, the reduction in paperwork it will allow, and so on. These gains are called ____ because they represent quantifiable dollar amounts.

tangible benefits

The JPEG images taken by most digital cameras today use 24-bit ____.

true color images

Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ____ uniquely identifies a specific Web page.

uniform resource locator (URL)

A collaborative Web page that is designed to be edited and republished by a variety of individuals is known as a(n) ____.

wiki

Keyboards can be built into a device, attached by inserting the keyboard's wired cable or ____ into a USB port, or connected via a wireless networking connection such as Bluetooth.

wireless receiver

To create a query, users can either type a query using SQL or, more commonly, use the query tools built into the DBMS (such as a query design screen or query ____) to create a query object.

wizard

A computer ____ is the amount of data (typically measured in bits or bytes) that a CPU can manipulate at one time.

word

Word processing programs use a feature called ____, which means the insertion point automatically moves to the beginning of the next line when the end of the screen line is reached.

word wrap

A single spreadsheet document is often called a ____.

worksheet

When computer systems perform in ways that would be considered intelligent if observed in human beings, it is referred to as ____.

artificial intelligence (AI)

Eight bits grouped together are collectively referred to as a ____.

byte

Case-Based Critical Thinking Questions Case 15-1 IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. One of IBF's clients owns a large number of expensive electronic devices and would like to be able to secure them in case of theft. IBF advises her to use ____.

cable locks

A ____ is a place to store something temporarily.

cache

A ____ holds a single category of data (such as customer names or employee phone numbers) that will be stored in a database.

field

A ____ limits the search to a particular search characteristic, such as the page title, URL, page text, top-level domain, or Web site.

field search

Data definition involves describing the properties of the data that go into each database table, specifically the ____ that make up the database.

fields

Anything (such as a program, letter, digital photograph, or song) stored on a storage medium is referred to as a(n) ____.

file

A ____ is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access.

firewall

Digital still cameras most often use ____ cards for storage.

flash memory

Individual database tables are often referred to as ____.

flat files

Program ____ use graphical symbols and relational operators (such as < for "less than" and = for "equal to") to portray the sequence of steps needed to fulfill the logic in that program, module, or method.

flowcharts

Although both the user and the computer use drive letters, ____ names, and filenames to save and retrieve documents, they perceive them differently.

folder

To keep files organized, related documents are often stored in ____ (also called directories) located on the storage medium.

folders

Video data—such as home movies, feature films, video clips, and television shows—is displayed using a collection of ____.

frames

In a typical client-server database application, the client is called the ____.

front end

A(n) ____ is a named, preprogrammed formula, such as to compute the average of a group of cells or to calculate a mortgage payment amount.

function

The most common flat-panel technologies include liquid crystal display (LCD), various types of light emitting diode (LED), ____, and e-paper.

gas plasma

A(n) ____ is used to describe the characteristics of all data used in a system.

data dictionary

The ____ contains all data definitions for a database, including table structures, security information, relationships between the tables in the database, and so on.

data dictionary

Because many mobile devices and personal computers today are continually connected to the Internet, securing those devices against computer viruses and ____ is essential for both individuals and businesses.

hackers

With the ____, the statements in the loop are repeated as long as a certain condition is false.

do until structure

To help store, organize, and retrieve documents once they have been created in or converted to digital form, a(n) ____ system can be used.

document management

Data files are often called ____.

documents

Virtually all personal computers come with a(n) ____ that is used to store most programs and data.

hard drive

One of the most recent adaptive software development approaches is agile software development (ASD).

True

Virtually all DBMSs include a ____ for easy data input, modification, and retrieval.

user interface

Tools such as Microsoft's ____ help to bridge different platforms and programming languages.

.NET framework

The numbering system we commonly use is called the decimal numbering system because it uses ____ symbols to represent all possible numbers.

10

Hollerith's machine was used to process the 1890 U.S. Census data in ____, as opposed to the decade it usually took to process the data manually.

2 and 1/2 years

Windows ____ was released in 2012.

8

A(n) ____ is a collection of an individual's work accessible through a Web site.

E-portfolio

One objective of the ____ project was to create a computer network that would allow researchers located in different places to communicate with each other.

ARPANET

____ is a broad term to describe creating and managing an application throughout its entire life cycle—from design through coding and testing, to maintenance, and, eventually, to retirement.

Application lifecycle management (ALM)

____ are businesses or other organizations that provide Internet access to others, typically for a fee.

Application service providers (ASPs)

____ is a Linux-based operating system developed by the Open Handset Alliance.

Android

____ includes all the programs that allow you to perform specific tasks on your computer, such as writing a letter.

Application Software

____ takes the idea of breaking down a program into separate and reusable functions to the next level by focusing on the encapsulation of programming policies.

Aspect-oriented programming (AOP)

Ensuring that the private data stored by a business is adequately protected is increasingly the responsibility of a ____.

CPO

One measurement of the speed of a CPU is the ____, which is rated in megahertz (MHz) or gigahertz (GHz).

CPU clock speed

Case-Based Critical Thinking Questions Case 5-2 Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on basic utility programs. Andrea tells Dean is that it is very important for him to ____ all of his important data on a regular basis to avoid data loss in the case of a problem with the computer. He can use a(n) ____ utility to do this.

Backup

____ are used to input data about a person so that the individual's identity can be verified based on a particular unique physiological characteristic.

Biometric readers

A relatively new type of very fast direct connection available to homes and businesses in areas where there is fiber-optic cabling available all the way to the building is generically called ____.

BoF

____ values are values that represent one of two states—yes (true) or no (false).

Boolean

A ____ is an area in RAM or on the hard drive designated to hold input and output on their way in or out of the computer system.

Buffer

____ is the process of gathering, storing, accessing, and analyzing data about a company in order to make better business decisions.

Business Intelligence

Some drive letters, such as the letter ____ that is typically used with the primary hard drive, are usually consistent from computer to computer and do not change even if more storage devices are added to the computer.

C

Case-Based Critical Thinking Questions Case 3-2 Rodney owns a computer that he uses to work, keep in touch with friends and family, watch movies, listen to music, and use the Internet. If Rodney wants to be able to write, erase, and overwrite the files on a CD, he should get a ____.

CD-RW

With about 85% of all business transactions being processed by ____ and about 200 billion lines of ____ code still in use today, knowing ____ could set an IT job applicant apart from the crowd..

COBOL

The ____ used to be the norm for desktop computers.

CRT monitor

____ are notes within the actual program code that identify key features and steps of the program but that are written in such a way that the computer knows to ignore them when the program is executed.

Comments

When information from an ERP or other type of internal system is exchanged between different applications (either within an organization or between organizations), it is called ____.

EAI

A ____ is a software program that is designed to cause damage to a computer or perform some other malicious act.

Computer Virus

____ is used specifically for the purpose of recording keystrokes, logging the programs or Web sites accessed, or otherwise monitoring someone's computer activity.

Computer monitoring software

____ is a special type of large, integrated system that ties together all types of a company's activities, such as planning, manufacturing, sales, marketing, distribution, customer service, and finance.

ERP

In DOS, the command ____ displays the files and folders in the current location.

DIR

During the 1980s and early 1990s, ____ was the dominant operating system for microcomputers.

DOS (Disk Operating System)

____ refers to organizing the content to be transferred to DVD, such as importing video clips, creating the desired menu structure, and so forth.

DVD authoring

____ is a growing concern because of the vast amounts of personal data stored in databases today and the many data privacy breaches that are occurring.

Data privacy

____ create the actual database based on the design generated by the database designer and get it ready for data entry.

Database developers

____ are useful for identifying procedures and summarizing the decision making process for one step of a system.

Decision Tables

____ are most often used to create Web pages and Web applications.

Markup languages

Case-Based Critical Thinking Questions Case 5-2 Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on basic utility programs. Andrea tells Dean that he should periodically perform ____ on his computer to optimize the hard drive so that it works more efficiently. This process works by rearranging the data on the hard drive so all files are stored in contiguous locations.

Disk fragmentation

____ are designed to be used with everyday objects, such as home appliances, gaming consoles, digital cameras, e-readers, digital photo frames, ATMs, toys, watches, GPS systems, home medical devices, voting terminals, and cars.

Embedded operating systems

____ are illustrations of faces showing smiles, frowns, and other expressions that are created with keyboard symbols.

Emoticons

When typing text in a word processing program, you should only press ____ after a short line (like a title), at the end of a paragraph, and to leave a blank line between paragraphs.

Enter

____ keys on a keyboard are used for issuing commands in some programs.

Function

____ allow the user to issue commands by selecting icons, buttons, menu items, and other objects—typically with a mouse, pen, or finger.

Graphical user interfaces

The specifications for ____ are developed by the World Wide Web Consortium (W3C) and are continually evolving.

HTML

One property that makes 4GLs easier to use is that they are declarative, rather than procedural like third-generation languages.

True

____ coordinates activities related to the Internet's naming system, such as IP address allocation and domain name management.

ICANN (Internet Corporation for Assigned Names and Numbers)

Charts are inserted into an Excel spreadsheet using the commands in the Charts group on the ____ tab on the Ribbon.

Insert

____ allows you to exchange real-time typed messages with people on your buddy list—a list of individuals that you specify.

Instant messaging

To request a Web page or other resource located on the Internet, use its ____.

Internet address

The primary infrastructure that makes up the ____ is typically owned by communications companies, such as telephone and cable companies.

Internet backbone

A musician who posts his music video on YouTube is an example of a(n) ____ .

Internet content provider

There are a number of options available today for listening to online music, including ____ such as Pandora.

Internet radio stations

____ is a consortium of researchers, educators, and technology leaders from industry, government, and the international community that is dedicated to the development of revolutionary Internet technologies.

Internet2

In addition to the normal business transaction processing systems, there are also specialty transaction processing systems used by law enforcement, the military, financial institutions, and other organizations.

True

In practice, the difference between system and application software is not always straightforward.

True

Case-Based Critical Thinking Questions ​ Case 1-2 Jamie is interested in pursuing some aspect of computer technology as a career. He is very comfortable working with PCs and has a broad knowledge of the typical systems and applications software that people use. He has always enjoyed working closely with people and has a good facility for explaining how technical systems work. Jamie's mother is a computer programmer and would like Jamie to follow in her footsteps. What course would she most likely suggest that Jamie take in college?

Java

Case-Based Critical Thinking Questions Case 13-2 Kelly is a college sophomore majoring in computer science. She is interested in gaining exposure to the most useful and current programming languages and techniques. One of the languages that Kelley is learning is ____, an object-oriented programming language that is commonly used to write Web applications.

Java

____ is the language used by students taking the Advanced Placement (AP) Computer Science exam.

Java

Some languages are traditional programming languages for developing applications; others, such as markup and scripting languages like HTML, XHTML, and ____, are designed to be used to create Web pages.

JavaScript

____ was developed to enable Web authors to implement interactive content on Web sites, such as to animate an item, or pop up a window to point to an item.

JavaScript

____ is the most widely used mobile operating system in the United States.

MAC OS

The first official recorded use of the word "bug" in the context of computing is associated with the temporary failure of the ____ computer.

Mark II

____ are programs designed to play audio and video files.

Media players

DBMSs available for use on personal computers include ____ and Corel Paradox.

Microsoft Access

One of the most common painting programs is ____.

Microsoft Paint

Managers are usually classified into three categories: executive, ____, and operational.

Middle

Class diagrams and use case diagrams are used to illustrate systems that are based on the concept of ____.

Objects

In traditional system development, the phases of system development are carried out in a preset order.

True

____ databases are designed to store a collection of summarized data for quick and easy data analysis.

Multidimensional

Text messaging is a form of messaging frequently used by mobile phone users. If the messages also include photos, audio, or video, ____ is used instead.

Multimedia Messaging Service (MMS)

____ refers to the ability of an operating system to have more than one program open at one time.

Multitasking

The term ____ refers to a wide variety of different database technologies that were developed in order to overcome some of the limitations of relational databases.

NoSQL

Procedures are small sections of program code also called modules or subprograms.

True

A computer's ____ is a collection of programs that manage and coordinate the activities taking place within the computer.

Operating System

____ managers include supervisors, office managers, foremen, and other managers who supervise non-management workers.

Operational

____ input data from special forms to score or tally exams, questionnaires, ballots, and so forth.

Optical mark readers (OMRs)

It is important to realize that with a markup language like HTML, the Web browser, Web browser settings, and device used to display the Web page ultimately determine what the Web page will look like.

True

Java source code cannot be converted into object code using a Python compiler.

True

Case-Based Critical Thinking Questions Case 14-2 The JL Group is a political think tank that is incorporating new media into their analyses. The JL Group is in the process of creating dynamic Web pages to poll politically aware young adults. They are interested in creating scripts that are compatible with many types of databases; therefore, they decide to use the ____ language.

PHP

____ was created to fill the need for a teaching tool to encourage structured programming.

Pascal

____ is a scam that redirects traffic intended for a commonly used Web site to a spoofed Web site set up in an effort to obtain users' personal information.

Pharming

____ is used to plan, schedule, track, and analyze the tasks involved in a project, such as the construction of a building or the schedule for preparing a large advertising campaign for a client.

Project management software

____ are particularly useful for individuals who need to scan barcodes while on the go.

Portable barcode readers

____ can be used, copied, modified, and distributed to others without restrictions.

Public domain software

Application programs can help users write their own programs in a form the computer can understand using a programming language such as Visual Basic, COBOL, C++, Java, or ____.

Python

One of the most common 2D barcodes, the ____ code represents data with a matrix of small squares.

QR

Network ports are used to connect a computer to a computer network via a networking cable—typically a cable using a(n) ____, which looks similar to a telephone connector but is larger.

RJ-45 connector

____ is an online tool designed for delivering news articles, blogs, and other content regularly published to a Web site.

RSS

Larger computers—such as high-end servers, mainframes, and supercomputers—sometimes use operating systems designed solely for that type of system.

True

The ____ is a tool in versions of Microsoft Office starting with Office 2007 that consists of tabs, which contain groups of related command buttons for the program being used.

Ribbon

Linux is increasingly being used with both mainframes and supercomputers.

True

Case-Based Critical Thinking Questions Case 13-1 The Rainbow Trout Company specializes in developing software that is used by amateur and professional fishermen with a wide variety of needs. As such, the company often work on projects with constantly changing requirements. The Rainbow Trout Company maintains a database of clients. To search through this database, they use ____, a 4GL.

SQL

Case-Based Critical Thinking Questions Case 13-2 Kelly is a college sophomore majoring in computer science. She is interested in gaining exposure to the most useful and current programming languages and techniques. During the summer, Kelly will be writing a compiler as part of a research project. To prepare, she is learning ____, a functional language.

Scheme

Most operating systems include security features, such as an option to download and install ____ automatically from the operating system's manufacturer on a regular basis.

Security patches

Once a file management program is open, you can look at the folders and files stored on your computer.

True

The ____ Web is a predicted evolution of the current Web in which all Web content is stored in a manner similar to data in a database so that it can be retrieved easily when needed to fulfill user requests.

Semantic

____ programs are software programs that are distributed on the honor system.

Shareware

Many business software services are offered as ____, including applications geared for collaboration, scheduling, customer service, accounting, project management, and more.

Software as a Service (SaaS)

Font face refers to a named collection of text characters that share a common design, such as Calibri or Times New Roman.

True

____ refers to the complete malfunction of a computer system.

System failure

____ consists of the operating system and utility programs that control your computer and allow you to use it.

System software

____ are made up of related records.

Tables

If a device driver file is deleted, becomes corrupted, or has a conflict with another piece of software, then the device will no longer work.

True

If an application is going to need to interact with existing programs, it may need to be coded in the same language as those other programs.

True

Once the system containing the program is up and running, the implementation process of the program implementation and maintenance phase is complete.

True

In 1950, Alan Turing—one of the first AI researchers—argued that if a machine could successfully appear to be human to a knowledgeable observer, then it should be considered intelligent.

True

____ cookies are cookies placed on your hard drive by a company other than the one associated with the Web page that you are viewing—typically a Web advertising company.

Third-Party

Case-Based Critical Thinking Questions Case 3-1 Dan is a small business owner who depends on his computer to keep track of customer and sales data. He is investigating storage options because it is critical for him to ensure that his data is safe in the event of a computer failure. A friend of Dan suggests to him that he can use an external hard drive for his data storage and backup needs. To use an external hard drive, Dan should make sure that his computer has an available USB or ____ port.

Thunderbolt

A program bug is an error that causes a program to malfunction.

True

A(n) macro is a sequence of saved actions (such as keystrokes, mouse clicks, and menu selections) that can be replayed whenever needed within the application program in which it was created.

True

Although Linux originally used a command line interface, most recent versions of Linux programs use a graphical user interface.

True

An emerging type of system is the digital ecosystem, which is the collection of people, products, services, and business processes related to a digital element.

True

An information system that combines geographic information with other types of data (such as information about customers, sales, and so forth) in order to provide a better understanding of the relationships among the data, is called a geographic information system (GIS).

True

As you work on your computer, the operating system continuously manages your computer's resources and makes them available to devices and programs when they are needed.

True

Before running code written in any programming language, be sure you know how to interrupt program execution in case you have a logic error and the program becomes stuck in an endless loop.

True

DSSs are most often used by middle and executive managers for unstructured decisions, which often need to be based on unpredictable events or incomplete knowledge.

True

Digital badges consist of icons that represent academic achievements or acquired skills.

True

Disk management programs diagnose and repair problems related to your hard drive.

True

File compression programs reduce the size of files so they take up less storage space on a storage medium or can be transmitted faster over the Internet.

True

File extensions should not be changed by the user because the operating system uses them to identify the program that should be used to open the file.

True

To keep a desktop computer or a server powered up when the electricity goes off in addition to protecting against power fluctuations, a(n) ____, which contains a built-in battery, can be used.

UPS

Case-Based Critical Thinking Questions ​ Case 1-1 Sarah is a busy real estate agent with a growing clientele. She is looking to purchase a new computer and software so that she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch up photos of real estate properties. Sarah stores digital photographs of houses she is previewing. She needs to be able to copy these to the computer at her office. What type of storage device should she use?

USB Flash Drive

Case-Based Critical Thinking Questions Case 3-2 Rodney owns a computer that he uses to work, keep in touch with friends and family, watch movies, listen to music, and use the Internet. Rodney wants to be able to easily carry files with him wherever he goes but he also has a tendency to lose things. Knowing this, he should probably save those files on a ____ drive which he can then attach to his backpack.

USB flash

Case-Based Critical Thinking Questions ​ Case 2-1 Jess is a musician who has just bought a new computer. Now she need to figure out how to connect this computer to the devices that were connected to her old computer. To connect her external hard drive, in which all of her music files are stored, to the computer, Jess needs to use a ____.

USB port

The ____ allows 127 different devices to connect to a computer via a single USB port on the computer's system unit.

USB standard

____ is one of the most widely-used versions of Linux.

Ubuntu

Ultraportables conforming to Intel's standards can be marketed as ____.

Ultrabooks

The keyboard shortcut [Ctrl]+[Z] is used to ____ the last change to the document.

Undo

Case-Based Critical Thinking Questions Case 5-2 Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on basic utility programs. Andrea advises Dean to remove unnecessary programs from his computer by using a(n) ____ utility.

Uninstall

The means by which an operating system or any other program interacts with the user is called the

User interface

____ create the menus, forms, and input screens used with a program or database.

User interface (UI) builders

In ASPs, the code to tie the database to the Web site is typically written in JavaScript or ____.

VBScript

Case-Based Critical Thinking Questions Case 8-2 Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports. Brenda also orders movies and television through the Internet via a(n) ____ provider, which allows users to download video for a fee.

VOD

____ memory allows you to use more memory than is physically available on your computer.

Virtual

are designed to be used with everyday objects, such as home appliances, gaming consoles, digital cameras, e-readers, digital photo frames, ATMs, toys, watches, GPS systems, home medical devices, voting terminals, and cars.

Virtual operating systems

Today, the standard term for placing telephone calls over the Internet or any other type of data network is ____.

VoIP

An example of a Wi-Fi security standard is ____.

WPA

____ refers to driving around an area with a Wi-Fi-enabled device to find a Wi-Fi network in order to access and use it without authorization.

War driving

____ generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online.

Web 2.0

____ is typically free and virtually all ISPs used with personal computers include e-mail service in their monthly fee.

Web-based e-mail

____ refers to any instruction delivered via the Web.

Web-based training (WBT)

Case-Based Critical Thinking Questions Case 5-1 Janet is studying operating systems as part of her Understanding Computers 101 class. After learning about the different types of operating systems, she realizes that she uses a number of them in her daily life. All the computers in Janet's school computer lab have the latest version of Windows installed, which is ____.

Windows 10

Case-Based Critical Thinking Questions Case 2-2 Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit documents. Recently, he has come to realize that in order to keep the computer performing at its best, he needs to carry out regular system maintenance on the computer. Jack can use the ____ program to locate and delete temporary files, such as installation files, Web browsing history, and files in the Recycle Bin.

Windows Disk Cleanup

Windows 10 replaces older mobile versions of Windows, including ____ and Windows RT, as well as older embedded versions of Windows.

Windows Phone Dragon

Case-Based Critical Thinking Questions Case 5-1 Janet is studying operating systems as part of her Understanding Computers 101 class. After learning about the different types of operating systems, she realizes that she uses a number of them in her daily life. Janet recently purchased a new Apple computer. The operating system of that computer is ____.

Windows Vista

One reason a computer might become inefficient is that when programs are uninstalled, pieces of the program are sometimes left behind or references to these programs are left in operating system files such as the ____.

Windows registry

Case-Based Critical Thinking Questions ​ Case 1-1 Sarah is a busy real estate agent with a growing clientele. She is looking to purchase a new computer and software so that she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch up photos of real estate properties. Sarah has hired a programmer to create a Web page for her business. What type of programming language will the programmer most likely use?

XHTML

Public key encryption utilizes a pair of encryption keys obtained through ____ .

a Certificate Authority

Media that allow random access are sometimes referred to as ____ media.

addressable

Case-Based Critical Thinking Questions Case 13-1 The Rainbow Trout Company specializes in developing software that is used by amateur and professional fishermen with a wide variety of needs. As such, the company often work on projects with constantly changing requirements. The Rainbow Trout Company uses the ____ approach, which organizes teams of people working closely together so that continuous learning and adaptation can occur as the project is developed.

agile software development

By their very nature, online communications lend themselves to ____.

anonymity

Access control at many businesses and organizations is provided by ____, which allow only authorized individuals to enter an office building, punch in or out of work, or access the company network via an access card or a fingerprint or hand scan.

authentication systems

To determine if the information from a Web page can be trusted, you should evaluate both the ____ and the source.

author

Most tracking software do not ____.

automatically send videos and photos of possible suspects to law enforcement

A ____ is an optical code that represents data with bars of varying widths or heights.

barcode

For an extra level of security, some smart cards today store ____ data in the card and use that data to authenticate the card's user before authorizing the smart card transaction.

biometric

Case-Based Critical Thinking Questions Case 8-1 Anthony is passionate about politics and enjoys sharing and discussing his views with others over the Internet. Every day, Anthony makes a new post to his personal ____, which is a Web page that displays entries in chronological order.

blog

Case-Based Critical Thinking Questions Case 3-2 Rodney owns a computer that he uses to work, keep in touch with friends and family, watch movies, listen to music, and use the Internet. If Rodney wants to record music files onto a CD, he needs to make sure that his operating system has CD-____ capabilities.

burning

A ____ is an electronic path over which data can travel.

bus

The ____ allows a core to communicate with other CPU components, such as the memory controller and other cores.

bus interface unit

Case-Based Critical Thinking QuestionsCase 12-1 Mary is entering her senior year of college. She has a meeting on Friday with her advisor to discuss her career plans. Mary is also interested in identifying the business needs of a system and ensuring the systems meet those needs. Her advisor will probably tell her to look into becoming a ____.

business analyst

Although more expensive than conventional outsourcing since it requires organizing its own facilities and hiring employees in a foreign country, ____ does give a company much more control over the employees and procedures used than with conventional outsourcing.

captive offshoring

In a worksheet, the intersection of a row and a column is called a ____.

cell

With a ____, the databases used by the system are all located on a single computer, such as a server or mainframe computer.

centralized database system

The key characteristics for an OODBMS (including objects, attributes, methods, ____, and inheritance) are similar to the object-oriented programming principles.

classes

Case-Based Critical Thinking Questions Case 13-1 The Rainbow Trout Company specializes in developing software that is used by amateur and professional fishermen with a wide variety of needs. As such, the company often work on projects with constantly changing requirements. To allow everyone, not just the original programmer, to understand the source code of a program, the Rainbow Trout Company follows a set of ____—a list of rules designed to standardize programming styles.

coding standards

In ____, the table field involved in the changes is locked until the changes to that field have been completed.

column-level locking

Touch screens allow the user to touch the screen with his or her finger to select ____ or otherwise provide input to the device associated with the touch screen.

commands

In addition to the four primary computer operations, today's computers almost always perform ____ functions.

communications

A ____ is designed for a specific programming language and translates programs written in that language into machine language so they can be executed.

compiler

A circuit board is a thin board containing ____ and other electronic components.

computer chips

A ____ is a collection of computers and other devices that are connected in order to enable users to share hardware, software, and data, as well as to communicate electronically with each other.

computer network

Case-Based Critical Thinking Questions ​ Case 1-2 Jamie is interested in pursuing some aspect of computer technology as a career. He is very comfortable working with PCs and has a broad knowledge of the typical systems and applications software that people use. He has always enjoyed working closely with people and has a good facility for explaining how technical systems work. From the description provided, what type of computer-related job would Jamie probably enjoy the most?

computer operations personnel

____ refers to the use of computers to help manage manufacturing operations and control the machinery used in those processes.

computer-aided manufacturing (CAM)

Many Web pages today use ____—small text files that are stored on your hard drive by a Web server—to identify return visitors and their preferences.

cookies

If a new database is to be used with existing data, the data needs to be transferred from the old files to the new system—a process called ____.

data migration

A(n) ____ is used to display output from a computer to a wall or projection screen.

data projector

A(n) ____ is responsible for setting up and managing large databases within an organization.

database administrator

The ____ takes instructions from the prefetch unit and translates them into a form that the control unit can understand.

decode unit

In addition to their full versions, some commercial software is available in a ____ or trial version.

demo

To supplement backup procedures, businesses and other organizations should have a(n) ____.

disaster recovery plan

In a(n) ____ check, the programmer "walks" through the program design, keeping track of the values of any loop counters and other variables in a tracing table to ensure the program does what it is intended to do.

desk

Case-Based Critical Thinking Questions Case 12-2 Mother Goose Computing, Inc. provides computational biology consulting services. They are currently updating several of their systems. For the genomics division, Mother Goose is planning to replace the old system by the new one all at once. This is called a ____ conversion.

direct

With ____, the computer uses each record's primary key field and a mathematical formula called a hashing algorithm to determine a unique address that identifies where the record is physically stored in the database file.

direct organization

To speed up magnetic hard drive performance, ____ is often used.

disk caching

Case-Based Critical Thinking Questions Case 4-2 Lisa is a student who regularly uses the computers at her local Internet café to listen to music, talk to her friends and family through the Internet, and play computer games. The Internet café provides ____ on some computers so that users can both listen and talk through the device during a telephone call made through the computer without disturbing other users.

headsets

Many schools, particularly college campuses, today have wireless ____ that allow students to connect their devices wirelessly to the Internet and to campus resources from anywhere on campus.

hotspots

Enterprise storage systems typically use fast Fibre Channel or ____ connections and are scalable so more hard drives can be added as needed up to the maximum system capacity.

iSCSI

When data is processed into a meaningful form, it becomes ____.

information

The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.

information privacy

Conventional CD discs use ____ lasers.

infrared

Case-Based Critical Thinking Questions Case 15-1 IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. Another client has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which technology would be useful in this case?

kill switch hard drives

Case-Based Critical Thinking Questions Case 4-1 Stacey is the office manager for a small business and is looking for a new printer and scanner for her office. After doing some research into printers, Stacey decides to buy a(n) ____ printer, since they are the standard for business documents and are typically faster and have better quality output than other types of printers.

laser

A ____ typically rests on the desk or other flat surface close to the user's computer, and it is moved across the surface with the user's hand in the appropriate direction to point to and select objects on the screen.

mouse

Common input devices include the keyboard, ____, and integrated video cameras.

mouse

____ refers to guidelines for online behavior.

netiquette

The process of evaluating and correcting the structures of the tables in a database to minimize data redundancy is called ____.

normalization

CD-ROM discs and DVD-ROM discs are ____ optical discs that come prerecorded with commercial products.

read-only

Hard disks are permanently sealed inside the hard drive case, along with the ____ and an access mechanism.

read/write heads

A ____ is a collection of related fields.

record

Case-Based Critical Thinking Questions Case 6-2 Bryan has just started an internship in which he uses a database frequently. The database contains information about the company's employees. Bryan's supervisor senses that he is anxious about using the database and drops by to give him a short tutorial. The supervisor explains that each employee's information forms a separate ____.

record

Case-Based Critical Thinking Questions Case 14-2 The JL Group is a political think tank that is incorporating new media into their analyses. The JL Group has gathered data on voting habits. In order to make sure that respondents cannot claim to have voted in more elections than is possible given their age, ____ rules can be assigned to the database tables.

record validation

A ____ partition contains the data necessary to restore a hard drive back to its state at the time the computer was purchased and is designed to be used only if the computer malfunctions.

recovery

The most common type of database used with personal computers today is a ____.

relational database

The ____ is the most widely used database model today.

relational database management system (RDBMS)

There are a number of special Web pages, called ____, available to help you locate what you are looking for on the Internet.

search sites

One advantage of a dial-up connection is ____.

security

Some worms are specifically written to take advantage of newly discovered ____ in operating systems and e-mail programs before the security patch to correct that vulnerability is available.

security holes

To facilitate using a computer lock, most portable computers today come with a ____—a small opening built into the system unit case designed for computer locks.

security slot

The time required to move the read/write heads to the cylinder that contains (or will contain) the desired data is called ____.

seek time

With a ____, the direction that the program control takes depends on the results of a certain condition.

selection control structure

____ devices can withstand being dropped or submerged into water.

semi-rugged

A ____ is a large screen computer either built into a table or designed to be used on a table that allows multi-touch input from multiple users.

table PC

Most ____ programs are available to try free of charge, but typically require a small fee if you choose to use the program regularly.

shareware

____ refers to typing your entire e-mail message or online post using capital letters.

shouting

A presentation graphics program contains an assortment of tools and operations for creating and editing slides, including preformatted ____ containing placeholders for the various elements in the slide.

slide layouts

Case-Based Critical Thinking Questions ​ Case 2-1 Jess is a musician who has just bought a new computer. Now she need to figure out how to connect this computer to the devices that were connected to her old computer. Jess has pictures from her old computer saved on a flash memory card. To transfer these to her new computer, she will insert the card into a(n) ____.

slot

The term ____ refers to the programs or instructions used to tell the computer hardware what to do.

software

Related software programs (such as a group of graphics programs, utility programs, or office-related software) are sometimes sold bundled together as a ____.

software suite

Case-Based Critical Thinking Questions Case 4-2 Lisa is a student who regularly uses the computers at her local Internet café to listen to music, talk to her friends and family through the Internet, and play computer games. Lisa needs to make sure that the computer that she is using has a ____ attached to it for her to be able to hear music and the sounds of a computer game.

speaker

A ____ is a group of values and other data organized into rows and columns, similar to the ruled paper worksheets traditionally used by bookkeepers and accountants.

spreadsheet

Case-Based Critical Thinking Questions Case 2-2 Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit documents. Recently, he has come to realize that in order to keep the computer performing at its best, he needs to carry out regular system maintenance on the computer. Jack can speed up his computer by scanning it for viruses and ____.

spyware

A ____ is the hardware where data is actually stored.

storage medium

A ____ is a separate piece of hardware containing multiple high-speed hard drives.

storage server

A ____ is responsible for maintaining a large, multiuser system.

system administrator

____ is the phase of system development in which the current system and identified problems are studied in depth and the needs of system users are assessed.

system analysis

To synchronize all of a computer's operations, a ____, which is located on the motherboard, is used.

system clock

Each step of the ____ results in some type of documentation that carries forward to the next step in the cycle.

system development life cycle

Case-Based Critical Thinking Questions Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. In order to lessen the chances of his main e-mail address getting spam, he uses a ____ e-mail address when shopping online.

throw-away

The means by which an operating system or any other program interacts with the user is called the ____.

user interface

Case-Based Critical Thinking Questions Case 14-2 The JL Group is a political think tank that is incorporating new media into their analyses. The employees of JL Group who use the database of the company for their daily work, without having knowledge of how the underlying database is structured, interact with the database ____.

using the user interface

In a computer program, ____ are named memory locations that are defined for that particular program and are used to store the current value of data items used in the program.

variables

Fourth-generation languages (4GLs) are sometimes called ____.

very high-level languages

One of the most popular ____ options is Netflix.

video-on-demand

An inventory management system that goes beyond just managing inventory to act as a complete distribution system (including inventory, order, shipping, and transportation management among other features) is often referred to as a ____ management system (WMS).

warehouse


Related study sets

DE Western Civ. Ch 1 Study Topic Sheet 2022-2023 - practice test

View Set

Muscle System Physiology Test Mastering

View Set

Reproductive and genitourinary system ATI test

View Set

M52: Dissociative, Personality, and Eating Disorders

View Set