cs final

Ace your homework & exams now with Quizwiz!

One objective of the ____ project was to create a computer network that would allow researchers located in different places to communicate with each other.

ARPANET

One of the most obvious initial changes in Windows Vista was the ____ interface.

Aero

____ is a broad term to describe creating and managing an application throughout its entire life cycle—from design through coding and testing, to maintenance, and, eventually, to retirement.

Application lifecycle management (ALM)

____ that allow individuals to perform specific tasks are launched via the operating system, such as by using the Windows Start menu on Windows computers.

Apps

____ takes the idea of breaking down a program into separate and reusable functions to the next level by focusing on the encapsulation of programming policies.

Aspect-oriented programming (AOP)

___ values are values that represent one of two states—yes (true) or no (false).

Boolean

Case 3-2 Rodney owns a computer that he uses to work, keep in touch with friends and family, watch movies, listen to music, and use the Internet. If Rodney wants to be able to write, erase, and overwrite the files on a CD, he should get a ____.

CD-RW

Ensuring that the private data stored by a business is adequately protected is increasingly the responsibility of a _____

CPO

The ____ used to be the norm for desktop computers.

CRT monitor

____ is freeware software.

Chrome (Web browser)

A ____ is used to illustrate when, how, and in what order the statements in a computer program, module, or method are performed.

Control Structure

During the 1980s and early 1990s, ____ was the dominant operating system for microcomputers.

DOS (Disk Operating System)

____ refers to organizing the content to be transferred to DVD, such as importing video clips, creating the desired menu structure, and so forth.

DVD authoring

____ create the actual database based on the design generated by the database designer and get it ready for data entry.

Database developers

____ refers to using a personal computer to combine and manipulate text and images to create attractive documents that look as if they were created by a professional printer.

Desktop publishing

Common IDEs include Visual Studio and ____.

Eclipse

____ are illustrations of faces showing smiles, frowns, and other expressions that are created with keyboard symbols.

Emoticons

____ is a conceptual blueprint that defines the structure and operations of an enterprise (a business, organization, government agency, or other entity).

Enterprise architecture

A database that combines object and relational database technology can be referred to as an object-oriented database management system (OODBMS).

False

A scripting language is a type of language that uses symbols or tags to describe what a document should look like.

False

A selection control structure is simply a series of statements that follow one another.

False

At the lowest level, words are entered into database fields (columns), which hold single pieces of data in the database, such as product names or quantities.

False

Data accessibility refers to protecting data against destruction and misuse—both intentional and accidental.

False

Database developers are the people responsible for managing the databases within an organization.

False

Database developers are the people responsible for managing the databases within an organization. _________

False

If a field needs to store decimal places, the Long Integer field size can be used.

False

One or more rounds of outside tests for programs created for mass distribution are referred to as alpha tests. _________________________

False

Views need to be designed to extract the requested information from a relational database, as efficiently as possible.

False

With most programs, compiling or interpreting a program for the first time will result in errors, and the assembling process consists of locating and correcting these errors.

False

With the do until structure, the statements in the loop are repeated as long as a certain condition is true. _________________________

False

____ have begun to replace ROM for storing system information, such as a computer's BIOS.

Flash memory chips

____ are designed to scan flat objects one page at a time.

Flatbed scanners

____ keys on a keyboard are used for issuing commands in some programs.

Function

The specifications for ____ are developed by the World Wide Web Consortium (W3C) and are continually evolving.

HTML

____ are small components typically made out of aluminum with fins that help to dissipate heat.

Heat sinks

____ coordinates activities related to the Internet's naming system, such as IP address allocation and domain name management.

ICANN (Internet Corporation for Assigned Names and Numbers)

A musician who posts his music video on YouTube is an example of a(n) ____ .

Internet content provider

____ is a consortium of researchers, educators, and technology leaders from industry, government, and the international community that is dedicated to the development of revolutionary Internet technologies.

Internet2

____ is the language used by students taking the Advanced Placement (AP) Computer Science exam.

Java

____ was developed to enable Web authors to implement interactive content on Web sites, such as to animate an item, or pop up a window to point to an item.

JavaScript

__ errors occur when a formula is written incorrectly, when a mistake is made with a decision condition, or when the wrong variable name is used.

Logic

The first official recorded use of the word "bug" in the context of computing is associated with the temporary failure of the ____ computer.

Mark II

DBMSs available for use on personal computers include ____ and Corel Paradox.

Microsoft Access

Text messaging is a form of messaging frequently used by mobile phone users. If the messages also include photos, audio, or video, ____ is used instead.

Multimedia Messaging Service (MMS)

____ refers to guidelines for online behavior.

Netiquette

____ devices are high-performance storage systems that are connected individually to a network to provide storage for the computers connected to that network.

Network attached storage (NAS)

The UML standards are developed by the ____.

OMG

Case 5-1 Janet is studying operating systems as part of her Understanding Computers 101 class. After learning about the different types of operating systems, she realizes that she uses a number of them in her daily life. Janet recently purchased a new Apple computer. The operating system of that computer is ____

OS X

___ managers include supervisors, office managers, foremen, and other managers who supervise nonmanagement workers.

Operational

____ input data from special forms to score or tally exams, questionnaires, ballots, and so forth. a. Optical character recognition (OCR) devices

Optical mark readers (OMRs)

The documentation resulting from the design phase of the ____ is a set of design specifications that illustrates the program needed to fulfill the program requirements.

PDLC

Case 14-2 The JL Group is a political think tank that is incorporating new media into their analyses. The JL Group is in the process of creating dynamic Web pages to poll politically aware young adults. They are interested in creating scripts that are compatible with many types of databases; therefore, they decide to use the ____ language.

PHP

___ is the first phase of the PDLC.

Problem Analysis

High-level object-oriented programming languages include C++, C#, Java, Dart, and ____.

Python

Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports. Because she is an avid baseball fan, Brenda has subscribed to the ____ feed of her local team so that news about her team is delivered to her as it becomes available.

RSS

____ Web sites provide access to specic types of useful information, such as maps and driving directions.

Reference

The ____ is a tool in versions of Microsoft Office starting with Office 2007 that consists of tabs, which contain groups of related command buttons for the program being used.

Ribbon

Case-Based Critical Thinking Questions Case 14-1 James is a recent college graduate and has six months of IT experience. He is thinking about pursuing a certification program in order to demonstrate that he is serious about IT. James learns that database designers work with systems analysts and other individuals involved in the ____.

SDLC

The ____ cards used with mobile phones today are a special type of smart card.

SIM

Case 13-1 The Rainbow Trout Company specializes in developing software that is used by amateur and professional fishermen with a wide variety of needs. As such, the company often work on projects with constantly changing requirements. The Rainbow Trout Company maintains a database of clients. To search through this database, they use ____, a 4GL.

SQL

____ programs are software programs that are distributed on the honor system.

Shareware

____ focuses on specifying what the new system will look like and how it will work.

System design

External hard drives typically connect to a computer via an external port (such as a USB or ____ port) or a wireless connection.

Thunderbolt

A display device is the most common form of output device.

True

A program bug is an error that causes a program to malfunction.

True

A(n) file management system is a program that allows the creation of individual database tables, each of which is stored in its own physical file and is not related to any other file.

True

A(n) macro is a sequence of saved actions (such as keystrokes, mouse clicks, and menu selections) that can be replayed whenever needed within the application program in which it was created.

True

After all the tables in a database application have been created and their primary keys designated, the tables can be related to one another via their primary keys so that a primary key for one table can be used to extract data from other tables as needed. __

True

Before running code written in any programming language, be sure you know how to interrupt program execution in case you have a logic error and the program becomes stuck in an endless loop.

True

Comments are usually preceded by a specific symbol.

True

Font face refers to a named collection of text characters that share a common design, such as Calibri or Times New Roman.

True

Graphics software—also called digital imaging software—is used to create or modify images.

True

IBM's DB2 program contains a hybrid XML/relational database server.

True

In a(n) procedural program, variables can be accessed and their values changed from any module in the program, as appropriate.

True

Java programs are compiled into a format called bytecode.

True

Java source code cannot be converted into object code using a Python compiler.

True

Most databases created today do not use the hierarchical or network models; however, these models, which are generally used with legacy mainframe systems, are still operational and so must be maintained.

True

Object-oriented and multidimensional databases are two examples of NoSQL (Not Only SQL) databases.

True

Objects stored in an OODBMS can be retrieved using queries, such as with queries written in object query language (OQL)—an object-oriented version of SQL.

True

Once the system containing the program is up and running, the implementation process of the program implementation and maintenance phase is complete.

True

One advantage of the n-tier architecture is that it allows the program code used to access the database to be separate from the database, and the code can be divided into any number of logical components.

True

One of the most recent adaptive software development approaches is agile software development (ASD).

True

One property that makes 4GLs easier to use is that they are declarative, rather than procedural like third-generation languages.

True

Program coding is the process of writing the actual program steps in the proper format for a particular programming language.

True

Pseudocode expresses the steps in a program, module, or method, but it uses English-like statements in place of the flowchart's graphical symbols.

True

Sometimes ​run time errors occur because the program tries to do something that isn't possible, such as dividing a numeric value by zero.

True

Spyware is a possible privacy risk.

True

Structured query language (SQL) is recognized as the standard query language for relational databases.

True

There are application programs that help users write their own programs in a form the computer can understand using a programming language.

True

To use a macro recorder, you start the macro recorder and then perform the desired tasks—the macro recorder records all of the keystrokes and mouse clicks you make until the recorder is turned off.

True

Unlike ASCII and EBCDIC, Unicode is a universal international coding standard designed to represent text- based data written in any ancient or modern language, including those with different alphabets.

True

While COBOL is not inherently suited to developing interactive applications or cloud software, new versions of COBOL are evolving to support new applications.

True

With logic errors, the program will run but the output will be wrong.

True

​One of the most common types of software used in conjunction with a multi-dimensional database is Online Analytical Processing (OLAP).

True

Case 3-2 Rodney owns a computer that he uses to work, keep in touch with friends and family, watch movies, listen to music, and use the Internet. Rodney wants to be able to easily carry files with him wherever he goes but he also has a tendency to lose things. Knowing this, he should probably save those files on a ____ drive which he can then attach to his backpack.

USB flash

To connect multiple USB devices to a single USB port, a ____ can be used.

USB hub

Common types of possessed objects are smart cards, RFID-encoded badges, magnetic cards, ____, and smartphones that are swiped through or placed close to a reader to be read.

USB security tokens

____ is one of the most widely-used versions of Linux.

Ubuntu

Ultraportables conforming to Intel's standards can be marketed as ____.

Ultrabooks

____ create the menus, forms, and input screens used with a program or database.

User interface (UI) builders

In ASPs, the code to tie the database to the Web site is typically written in JavaScript or ____.

VBScript

____ is the use of video cameras to monitor activities of individuals, typically for work-related or crime- prevention purposes.

Video surveillance

Today, the standard term for placing telephone calls over the Internet or any other type of data network is ____.

VoIP

____ is typically free and virtually all ISPs used with personal computers include e-mail service in their monthly fee.

Web-based e-mail

Case 2-2 Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit documents. Recently, he has come to realize that in order to keep the computer performing at its best, he needs to carry out regular system maintenance on the computer. Jack can use the ____ program to locate and delete temporary files, such as installation files, Web browsing history, and files in the Recycle Bin.

Windows Disk Cleanup

One reason a computer might become inefficient is that when programs are uninstalled, pieces of the program are sometimes left behind or references to these programs are left in operating system files such as the ____.

Windows registry

Case 1-1 Sarah is a busy real estate agent with a growing clientele. She is looking to purchase a new computer and software so that she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch up photos of real estate properties. Sarah has hired a programmer to create a Web page for her business. What type of programming language will the programmer most likely use?

XHTML

_ is a set of rules for exchanging data over the Web.

XML

____ is a set of rules for exchanging data over the Web.

XML

To navigate to a new Web page for which you know the URL, type that URL in the browser's ____ bar and press Enter.

address

Media that allow random access are sometimes referred to as ____ media.

addressable

Case 13-1 The Rainbow Trout Company specializes in developing software that is used by amateur and professional fishermen with a wide variety of needs. As such, the company often work on projects with constantly changing requirements. The Rainbow Trout Company uses the ____ approach, which organizes teams of people working closely together so that continuous learning and adaptation can occur as the project is developed.

agile software development

In the program design phase of the PDLC, the specifications developed during the problem analysis phase are used to develop a(n) ____ for the program.

algorithm

The characteristics of an entity are called ____.

attributes

To determine if the information from a Web page can be trusted, you should evaluate both the ____ and the source.

author

Most tracking software do not ____.

automatically send videos and photos of possible suspects to law enforcement

Creating a(n) ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy.

backup

The bus width and bus speed together determine the bus's ____.

bandwidth

A ____ is an optical code that represents data with bars of varying widths or heights.

barcode

Anthony is passionate about politics and enjoys sharing and discussing his views with others over the Internet. Every day, Anthony makes a new post to his personal ____, which is a Web page that displays entries in chronological order.

blog

A ____ is an area in RAM or on the hard drive designated to hold input and output on their way in or out of the computer system.

buffer

Mary is entering her senior year of college. She has a meeting on Friday with her advisor to discuss her career plans. Mary is also interested in identifying the business needs of a system and ensuring the systems meet those needs. Her advisor will probably tell her to look into becoming a ____.

business analyst

With a ____, the databases used by the system are all located on a single computer, such as a server or mainframe computer.

centralized database system

In addition to the four primary computer operations, today's computers almost always perform ____ functions.

communications

A ____ is designed for a specific programming language and translates programs written in that language into machine language so they can be executed.

compiler

A ____ is a collection of computers and other devices that are connected in order to enable users to share hardware, software, and data, as well as to communicate electronically with each other.

computer network

Case 1-2 Jamie is interested in pursuing some aspect of computer technology as a career. He is very comfortable working with PCs and has a broad knowledge of the typical systems and applications software that people use. He has always enjoyed working closely with people and has a good facility for explaining how technical systems work. From the description provided, what type of computer-related job would Jamie probably enjoy the most?

computer operations personnel

A ____ is used to illustrate when, how, and in what order the statements in a computer program, module, or method are performed.

control structure

A(n) ____ is used to describe the characteristics of all data used in a system.

data dictionary

If a new database is to be used with existing data, the data needs to be transferred from the old files to the new system—a process called __

data migration

If a new database is to be used with existing data, the data needs to be transferred from the old files to the new system—a process called ____

data migration

The ____ takes instructions from the prefetch unit and translates them into a form that the control unit can understand.

decode unit

In addition to their full versions, some commercial software is available in a ____ or trial version.

demo

Case 12-2 Mother Goose Computing, Inc. provides computational biology consulting services. They are currently updating several of their systems. For the genomics division, Mother Goose is planning to replace the old system by the new one all at once. This is called a ____ conversion.

direct

To help store, organize, and retrieve documents once they have been created in or converted to digital form, a(n) ____ system can be used.

document management

A fraud or scam carried out through the Internet is a form of ____.

dot con

Case 6-1 When Mary started college, her parents bought her a new computer that came loaded with the bare essentials in terms of software applications. She is now looking into purchasing additional software. Mary enjoys taking digital photos and would like software that would allow her to perform tasks such as correct brightness or contrast, eliminate red eye, crop, resize, etc. In order to have this functionality on her computer, she needs a photo ____ program.

editing

Normalization is usually viewed as a multistep process, moving the table structures from first normal form (1NF) to usually fifth normal form (5NF).

false

Repairing or restoring data that has become corrupt, such as the result of a storage media error or a computer virus, is a database analysis activity.

false

Software that connects two otherwise separate applications (such as a Web server and a DBMS) is referred to as interware.

false

A ____ holds a single category of data (such as customer names or employee phone numbers) that will be stored in a database.

field

A ____ limits the search to a particular search characteristic, such as the page title, URL, page text, top-level domain, or Web site.

field search

Data definition involves describing the properties of the data that go into each database table, specifically the ____ that make up the database.

fields

Filenames typically include a ____ at the end of the filename.

file extension

Video data—such as home movies, feature films, video clips, and television shows—is displayed using a collection of ____.

frames

A(n) ____ is a named, preprogrammed formula, such as to compute the average of a group of cells or to calculate a mortgage payment amount.

function

Some 3D projectors are designed to project ____.

holograms

A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.

hot site

Many schools, particularly college campuses, today have wireless ____ that allow students to connect their devices wirelessly to the Internet and to campus resources from anywhere on campus.

hotspots

Enterprise storage systems typically use fast Fibre Channel or ____ connections and are scalable so more hard drives can be added as needed up to the maximum system capacity.

iSCSI

Collecting in-depth information about an individual is known as ____.

identity theft

A(n) ____ is a collection of elements (people, hardware, software, and data) and procedures that interact to generate information needed by the users in an organization.

information system

One of the properties that can be assigned to a field is a(n) ____ to specify the format (such as letters, numbers, or symbols) that must be entered into a field.

input mask

A ____ is approximately 1,000 bytes.

kilobyte (KB)

A(n) ____ uses charged liquid crystals located between two sheets of clear material to light up the appropriate pixels to form the image on the screen.

liquid crystal display (LCD)

When ____ occur during preliminary debugging, dummy print statements—statements that are temporarily inserted into the code to display status information on the screen—can be used to help locate the error.

logic errors

Partitions are sometimes referred to as ____.

logical drives

The earliest programming languages are referred to as ____.

low-level languages

Magnetic RAM (MRAM) uses ____ rather than an electrical charge to store data.

magnetic polarization

Continually evaluating and improving the security measures used with the database is a database ____ activity.

maintenence

One factor affecting digital camera quality is the number of pixels, measured in ____, used to store the data for each image.

megapixels

Anthony is passionate about politics and enjoys sharing and discussing his views with others over the Internet. Anthony regularly visits several popular political ____, which are Web pages designed to facilitate written discussions between people on specific subjects.

message boards

The display device for a desktop computer is formally called a ____.

monitor

Display devices can be ____ displays, in which each pixel can only be one of two colors, such as black or white.

monochrome

A ____ typically rests on the desk or other flat surface close to the user's computer, and it is moved across the surface with the user's hand in the appropriate direction to point to and select objects on the screen.

mouse

Mary is entering her senior year of college. She has a meeting on Friday with her advisor to discuss her career plans. Mary might want to consider becoming a ____, as she would eventually like to manage networks for an organization and determine what changes, if any, are needed.

network systems and data communications analyst

Artificial intelligence systems that attempt to imitate the way a human brain works are called ____

neural networks

One nanometer (nm) is ____ of a meter.

one-billionth

The ____ boots the computer, launches application software, and ensures that all actions requested by a user are valid and processed in an orderly fashion.

operating system

Case 4-1 Stacey is the office manager for a small business and is looking for a new printer and scanner for her office. When buying a scanner, Stacey needs to make sure that the scanner has a high enough ____, usually measured in the number of dots per inch (dpi), for the business needs of the office.

optical resolution

By ____, you instruct companies with whom you do business not to share your personal information with third parties.

opting out

One of the most straightforward ways to improve the quality of the hits returned in a search is to use ____— essentially typing more than one keyword in a keyword search.

phrase searching

The ____ tries to predict what data and instructions will be needed and retrieves them ahead of time in order to help avoid delays in processing.

prefetch unit

When a proposal for a new system or system modification is submitted, one of the first steps is to conduct a ____.

preliminary investigation

A ____ is an image designed to enhance a presentation (such as an electronic slide show or a printed report) visually, typically to convey information more easily to people.

presentation graphic

The field in a table that is used to relate that table to other tables is called the ____.

primary key

The most common HD format is 1080p, which uses a screen resolution of 1,920 Χ 1,080 and displays screen images one line at a time, called ____.

progressive display

When a digitally signed document is received, the recipient's device uses the sender's ____ key to verify the digital signature.

public

Regardless of the device being used, software typically falls into four basic categories of software: commercial software, shareware, freeware, and ____.

public domain software

A ____ is a question, or, in database terms, a request for specific information from the database.

query

Case 6-2 Bryan has just started an internship in which he uses a database frequently. The database contains information about the company's employees. Bryan's supervisor senses that he is anxious about using the database and drops by to give him a short tutorial. Bryan's supervisor explains that to retrieve term-109information from the database, Bryan needs to use a ____.

query

A ____ is a collection of related fields.

record

Case 14-2 The JL Group is a political think tank that is incorporating new media into their analyses. The JL Group has gathered data on voting habits. In order to make sure that respondents cannot claim to have voted in more elections than is possible given their age, ____ rules can be assigned to the database tables.

record validation

The most common type of database used with personal computers today is a ____.

relational database

A ____ displays table information with a more formal, businesslike appearance.

report

Fifty years ago, computers were used primarily by researchers and ____.

scientists

Most operating systems include security features, such as an option to download and install ____ automatically from the operating system's manufacturer on a regular basis.

security patches

With a ____, the direction that the program control takes depends on the results of a certain condition.

selection control structure

Computing technologies make it possible to have ____, traditional appliances with some type of built-in computer or communications technology.

smart appliances

When a software program is purchased, the buyer is acquiring a(n) ____ that permits him or her to use the software.

software license

A variety of problems have emerged from our extensive use of computers and related technology, ranging from stress and health concerns, to the proliferation of ____ and malware.

spam

A ____ is a group of values and other data organized into rows and columns, similar to the ruled paper worksheets traditionally used by bookkeepers and accountants.

spreadsheet

Case 2-2 Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit documents. Recently, he has come to realize that in order to keep the computer performing at its best, he needs to carry out regular system maintenance on the computer. Jack can speed up his computer by scanning it for viruses and ____.

spyware

The types of ____ systems used with personal and business computers today include smart cards.

storage

A(n) ____ occurs when the programmer has not followed the proper rules of the programming language being used.

syntax error

A ____ is a large screen computer either built into a table or designed to be used on a table that allows multi- touch input from multiple users.

table PC

Case 15-2 Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information. In order to lessen the chances of his main e-mail address getting spam, he uses a ____ e-mail address when shopping online.

throw-away

NoSQL databases are organized differently than relational databases are organized and therefore, they do not usually use tables and SQL.

true

The JPEG images taken by most digital cameras today use 24-bit ____.

true color images

Virtually all DBMSs include a ____ for easy data input, modification, and retrieval.

user interface

Case 14-2 The JL Group is a political think tank that is incorporating new media into their analyses. The employees of JL Group who use the database of the company for their daily work, without having knowledge of how the underlying database is structured, interact with the database ____.

using the user interface

System software is usually divided into two categories: operating systems and ____ programs.

utility

One of the most popular ____ options is Netflix.

video-on-demand

An inventory management system that goes beyond just managing inventory to act as a complete distribution system (including inventory, order, shipping, and transportation management among other features) is often referred to as a ____ management system (WMS).

warehouse

A computer ____ is the amount of data (typically measured in bits or bytes) that a CPU can manipulate at one time.

word

A single spreadsheet document is often called a ____.

worksheet


Related study sets

Elements 1-20, plus Fe, Ni, Cu, Zn, Br, I, Sn, Pb, Hg, Ag, Au.

View Set

Microbiology - Exam 1 (Assignment) Ch.1

View Set

AP Bio Select Review Questions Chapters 13-14

View Set

respiratory chapter 20 questions

View Set

Anatomy & Physiology II Lecture (Connect Questions) Respiratory System

View Set

Chapter 5 Computer Science Questions-AB

View Set

Chapter 24: Environmental Emergencies

View Set

Unit 5 Managing/Coordinating Care

View Set