Advertisement Upgrade to remove ads

Help for Bus 1950 Final

A collection of preprogrammed activities such as addition, subtraction, counting, and comparison is called a(n) ____.

instruction set

In terms of an authentication protocol, the phrase 'something a person knows' refers to ____.

a password

A ____ is a series of characters that becomes a person's unique identifier.

user ID

In terms of an authentication protocol, the phrase 'something a person possesses' could refer to ____.

an ID card

In terms of an authentication protocol, the phrase 'something a person is' refers to a(n) ____.

biometric device

A problem a hacker can cause after breaking into your computer includes ____.

all of the above

A term which can refer to a person who manipulates computers with malicious intent is a ____.

all of the above

A ____ attack uses password-cracking software.

brute force

____ intercepts information sent over computer networks.

Sniffing

A hacker posing as a legitimate representative of an official organization such as your bank is an example of ____.

phishing

The type of data where text, numbers, graphics, sound, and video have been converted into discrete digits as represented in the accompanying figure is ____.

digital

The type of data that is represented using an infinite scale of values as represented in the accompanying figure is ____.

analog

The ____ is the part of the microprocessor that performs arithmetic operations, as shown in the accompanying figure.

ALU

As shown in the accompanying figure, the ____ fetches each instruction.

control unit

Facebook and Twitter are examples of social networking options.

true

Prior to 1940, the word computer was defined as a person who performs calculations.

true

An operating system is an example of application software.

false

Because of increased versatility, a videogame console is now considered a personal computer.

false

The purpose of a server is to serve computers on a network.

true

In the binary number system, 2 is used to represent the value 2.

false

Trojans are computer programs that seem to perform one function while actually doing something else.

true

To assure you can remember your password it is a good idea to base it on information you can easily remember such as your birthday.

false

All of the following require both parties to be online at the same time EXCEPT ____.

Bulletin Boards

A group of computers linked by wired or wireless technology is a(n) ____.

Network

The ____ is a collection of linked documents, graphics, and sounds.

Web

____ is a term that refers to entities that exist largely within computer networks.

Cyberspace

____ is the process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices.

Digitalization

Technology ____ is a process by which several different technologies with distinct functionality evolve to form a single product.

convergence

Digital imaging has had an effect in the following areas: ____.

All of The Above

A computer is a multiple purpose device that can do all of the following EXCEPT ____.

think independently

In a computer, most processing takes place in ____.

The CPU

A named collection of data that exists on a storage medium is known as (a) ____.

File

An area of a computer that temporarily holds data waiting to be processed is ____.

Memory

A set of computer programs that helps a person carry out a task is ____.

Application Software

A set of computer programs that helps a computer monitor itself and function more efficiently is ____.

System Software

The master controller for all activities that take place within a computer is ____.

The operating system

A(n) ____ is a microprocessor-based computing device designed to meet the computing needs of an individual.

Personal Computer

An ordinary personal computer that is connected to a network is a ____.

Workstation

Data becomes ____ when it is presented in a format that people can understand and use.

Information

The binary number 10 represents ____ in the decimal number system.

2

Data transmission speeds are typically expressed as ____.

bits

Storage is typically expressed as ____.

bytes

1,024 bytes is a ____.

Kilobyte

1,048,576 bytes is a ____.

Megabyte

C, BASIC, COBOL, and Java are examples of ____ programming languages.

high-level

The human-readable version of a program is called ____.

source code

A(n) ____ converts all the statements in a program in a single batch and the resulting collection of instructions is placed in a new file.

compiler

A(n) ____ converts and executes one statement at a time.

Interpreter

A collection of preprogrammed activities such as addition, subtraction, counting, and comparison is called a(n) ____.

Instruction Set

In terms of an authentication protocol, the phrase 'something a person knows' refers to ____.

Password

A ____ is a series of characters that becomes a person's unique identifier.

User ID

In terms of an authentication protocol, the phrase 'something a person possesses' could refer to ____.

ID Card

In terms of an authentication protocol, the phrase 'something a person is' refers to a(n) ____.

Biometric Device

A problem a hacker can cause after breaking into your computer includes ____.

All of the above

A term which can refer to a person who manipulates computers with malicious intent is a ____.

All of the Above

A ____ attack uses password-cracking software.

Brute Force

____ intercepts information sent over computer networks.

Sniffing

A hacker posing as a legitimate representative of an official organization such as your bank is an example of ____.

Phishing

The type of data where text, numbers, graphics, sound, and video have been converted into discrete digits as represented in the accompanying figure is ____.

Digital

The type of data that is represented using an infinite scale of values as represented in the accompanying figure is ____.

analog

The ____ is the part of the microprocessor that performs arithmetic operations, as shown in the accompanying figure.

ALU

As shown in the accompanying figure, the ____ fetches each instruction.

Control Unit

Data ____ refers to the process of analyzing information in databases to discover previously unknown and potentially useful information.

Mining

____ refers to a branch of data mining that focuses on predicting future probabilities and trends.

Predictive analytics

A fixed-length field contains a predetermined number of ____.

Bytes

____ refers to the number of associations that can exist between two record types.

Cardinality

A(n) ____ is an association between data that is stored in different record types.

Relationship

A ____ data type usually provides a variable-length field into which users can enter comments.

Memo

A field ____ rule is a specification that the database designer sets up to filter the data entered into a particular field.

Validation

____ is a query language.

SQL

A database audit can ____.

all of the above

A super-thin slice of semiconducting material packed with microscopic circuit elements is a(n) ____.

all of the above

All IP addresses are static.

false

All IP addresses are dynamic

False

The www in a URL is part of a domain name.

false

Television and data signals are carried over the same cable.

True

Cloud computing is the term given to analyzing cloud patterns and, with the help of the computer, predicting the weather.

False

P2P file sharing allows users to obtain files from other users on the Internet.

True

The Internet began with a project called ____.

ARPANET

An ISP may provide ____ services.

all of the above

Every domain name corresponds to a unique IP address that has been entered into the ____.

Domain Name System

The rate of data arriving at your computer is ____.

downstream speed

All of the following EXCEPT ____ are considered truly high-speed connections.

All are high speed

____ currently offers the fastest Internet access speeds.

DSL

____ replaced analog technology with digital technology and added support for text messages.

2G

____ technologies support digital transmission for both voice and data.

3G

Most messaging is based on a(n) ____ model.

Client/server

The ____ protocol allows the transfer of files from one computer to another over any TCP/IP network.

ftp

____ are intended to work within LANs to monitor and direct packets being transported from one device to another.

Routers

The accompanying figure represents the connection of your computer to the Internet; the router marked A should belong to a(n) ____.

ISP

In the accompanying figure, the type of signal represented by A is a(n) ____

Digital Signal

Digital audio is music, speech, and other sounds represented in a binary format for use in digital devices.

true

Solid state storage cards hold data without consuming power, so they do not lose data when the camera is turned off.

true

CDs with copy protection cannot be duplicated, and music that is ripped to another format does not play back correctly.

true

A(n) ____ is a device that contains a variety of input and output jacks, plus audio-processing circuitry.

Sound Card

If you have dialed Directory Assistance lately to obtain a telephone number, you have probably encountered ____.

speech recognition

A ____ graphic is composed of a grid of dots.

bitmap

When a bitmap graphic is enlarged, it still retains its original ____.

resolution

____ refers to the process of selecting part of an image.

Cropping

The quality of a bitmap graphic is ____ dependent.

resolution

One clue that an image might be a ____ graphic is a flat, cartoon-like quality.

Vector

____ is a graphics format with built-in compression that stores True Color bitmap data very efficiently in a small file.

JPEG

A ____ is a smooth blending of shades from one color to another or from light to dark.

gradient

A vector graphic can quite easily be converted into a bitmap graphic through a process called ____.

rasterizing

____ can be used to create the illusion of three dimensions by smoothly blending shades from one color to another or from light to dark.

Gradients

Today's ____ editing simply requires a computer hard disk and video editing software.

nonlinear

____ is a popular format for Web-based video that requires Adobe Flash Player.

Flash video

A ____ watermark is a pattern of bits inserted at various places in an image or a content stream that can be used to track, identify, verify, and control content use.

Digital

You can use a scanner, like the one in the accompanying figure, to convert a printed image into a bitmap graphic.

True

When you increase the resolution of an existing graphic, as illustrated in the accompanying figure, the file size decreases.

False

With images that contain strong curved or diagonal lines, pixel interpolation can result in ____ effects, such as those in the accompanying figure.

pixelated

A vector graphic, like the one shown in the accompanying figure, resizes better than a comparable bitmap graphic.

true

First-generation computers used vacuum tube technology.

True

Assembly language and machine language are the same.

false

High-level languages were developed for first-generation computers.

False

Programming the first commercial microcomputers was accomplished by flipping switches.

true

The computer industry encompasses those companies that manufacture computers and computer components.

true

In the United States, the IT industry is fully regulated by the FCC.

False

A computer certification will totally prepare a person for a job in the IT industry.

False

Laws and ethics are really just different words for the same concept.

false

A step-by-step process by which numbers are manipulated is a(n) ____.

algorithm

An experimental device that typically must be further developed and perfected before going into production is called a(n) ____.

prototype

Computers characterized by their use of vacuum tubes are considered ____-generation.

First

Computers characterized by their use of transistors are considered ____ -generation.

Second

Computers characterized by their use of microprocessors are ____-generation.

Fourth

The first phase of testing generally carried out by the software publisher's in-house test team is called ____.

White Box Testing

A set of testing conducted by a team of off-site testers is called ____.

Beta Testing

____ refers to hardware manufacturers that sell their products directly to consumers.

Manufacturer Direct

A person who designs, codes, and tests computer programs is a ____.

computer programmer

Careers in computer ____ focus on the design of computer hardware.

Engineering

Careers in computer ____ focus on computer architecture and programming computers to make them work effectively and efficiently.

Science

____ degrees focus on the computer equipment and software used by businesses.

Information Technology

To get maximum exposure for your resume in an online job database, you should focus on ____.

nouns

The accompanying figure represents computer and software marketing channels. In that figure, Box A represents ____.

distribution centers

The simplest model for storing data is the flat file.

true

The goal of normalization is to minimize data ____.

redundancy

The ____ operator specifies that both of the search criteria must be true for the record to be selected.

AND

Advantages of telecommuting include all the following EXCEPT ____.

Data Security

The accompanying figure represents computer and software marketing channels. In that figure, Box A represents ____.

distribution centers

The logical data type is used for true/false or yes/no data.

True

Database ____ software is designed to manage billions of records and several hundred transactions per second.

Server

In SQL terminology, creating a relationship between tables is referred to as ____ tables.

joining

The data accessed by data mining and other analysis techniques is often stored in a data ____.

warehouse

First-generation computers used vacuum tube technology.

true

A record contains the smallest unit of meaningful information.

false

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set