A ___ is a program that extends the capability of a browser.`
___ is data that has been processed into a useful form.
Transports large number files, add storage space to notebook computer, easily store large audio/video files
Advantages of portable hard disks and removable hard disks
less than $100
A reasonable quality ink-jet printer costs ____.
To write on a CDRW disc, users must has software and ____.
slower and more
Broadcast radio is ___ susceptible to mouse then physical transmission media but provides flexibility and portability.
A ___ is a program that removes or blocks certain items from being displayed
virtual private network
A ____ provides a mobile user with secure connection to connection to company network server
primary key and unique name
In a relational database, each row has a ____ and each column has a _____.
A comm ____ is a transmission media on which date, interactions, and info travel
___ refers to core activities of a business, involving creation, selling, and support of products
establishing goals and objectives
Planning, performed by managers, involves _____.
___ cable consists of a single copper wire surrounded by at least three layers: insulation, woven metal, plastic coating
A ____ is a small text file that a web servers stores on a users computer.
____ occurs when someone steals personal or confidential information.
High-availability system may include ___ components that allow for a functioning component to take over automatically of one that fails.
A ____ is someone who tries to access a computer or network illegally.
A ____, also called program logic, is a graphical or written description of step by step procedures to solve problem.
A ___ stationary pointing device with a ball on its top or side (similar to mechanical mouse)
_____ commonly describes a business or venture of any size.
A ___ source is a company or person a user believes will not knowingly send a virus-infected file
CPU (Central Processing Unit)
The ___ interprets and carries out basic instructions that operate a computer
An _____ allows users to share documents with others in real time.
Media players, digital cameras, smart phones, not laptops
Devices including ____, ____, _____, often have internal miniature hard disks.
An ______ program is filtering program that attempts to remove spam before it reaches a users inbox
E-commerce that actually takes place between businesses is called _____
A ____ drive is the drive from which a personal comp starts
____ is a program placed on computer without users knowledge that secretly collects info about the user
____ uses a modem that sends digital data and info from a computer to a DSL line
A _____ is a duplicate of a file, program, or disk that can be used if the original is lost
matches a company's requirements exactly
The advantage of custom software is that it _________.
______ use is the use of a computer or its data for unapproved or illegal activities.
The _____ is the core of an operating system that maintains computers clock, starts application, and assigns resources (devices, programs, data, and info)
____ is the process of planning, scheduling, and then controlling the activities during system development cycle.
A ____ is an opening inside the system unit in which additional equip can be installed.
A ____ is malware that copies itself repeatedly
object code or program
The machine language version that results from compiling a 3GL is called the ______
A ___ player is a program that allows you to view images and animation, listen to audio, and watch videos
___ is an unsolicited email sent to many recipients at once
In Windows 7, Windows ____ feature protects your comp from external threats
Info ____ refers to the right to deny or restrict the collect and use of info about users
A programming language's ___ is a set of grammar and rules that specifies how to write instructions for a solution algorithm.
_____ info is gathered in the ongoing operations of an enterprise-sized organization
A ____ program is a utility that protects a comp against viruses by identifying and removing any viruses.
Organized set of program development activities is known as the program life development ______.
A ____ is a wireless network that provides Internet connection to mobile devices
_____ is the process of comparing data with a set of rule to find out if data is correct
With _______ memory, the operating system allocates a portion of a storage medium, the hard ski, to function as additional RAM.
_____ is a network standard that specifies no central device on the network should control when data can be transmitted
The location in a retail store where a consumer pays for goods or services is ____.
misspelling a command, leaving out punctuation, typing words out of order, NOT using wrong control structure
Syntax errors will be cause by _____, ______, _______.
An ______ system is an info system that captures and stores knowledge of human experts then imitates reasoning and decision making.
A _____ is a working model of a proposed system.
Scope ____ occurs when one activity in a project has led to another that was not originally planned, thus scope has grown`
Many companies use OCR character on a ____ document, which is returned to company that creates and sends it.
A _____ is a comm device that connects multiple comps together and transmits data to its correct destination on a network
In doc management system, a central library or ______ stores all documents within a company
An alt to maintaining an alt computer facility is to enter into a _______ backup relationship with another firm, where one firm provides space to other in case of disaster.
______ computing involves the use of computers in networks (LAN and WAN) that encompass a variety of diff operating systems, protocols, and network architectures.
_____ storage is an internet service that provides storage to computer users
____ is a collection of unprocessed items which can include text, numbers, images, audio and video.
spreadsheets, presentations, documents but NOT emails
Google Docs is a cloud storage provide for ____, ____, ____.
If back file is used, a ____ program reverses the process and returns backed up files to original form
Programs that act without users knowledge to alter computer operations (virus, worm, trojan horse, root kit)
A ____ info system generates accurate and organized info so managers can make decisions, solutions, supervise, and track progress
Video ____ is the process of capturing full motion images into a computer and storing them on a storage medium
_____ systems continue running and performing tasks for at least 99% of the time.
Most retail stores use ____ terminal to record purchases, credit, debit, and inventory
CMS (Content management system)
____ includes information about files and data called metadata
In operating system, ____ can fix bugs, enhance security, and modify device drivers.
Windows ____ is an upgrade to Windows 2003 Server.
CRM (Customer relationship management)
___ software tracks leads and inquiries from customers, store history of all sales to customer, and allows for tracking of outstanding issues with customers
An ____ disc is a storage media type that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
____ software is application software developed by user or at users request
An _____ reader is a device that uses light source to read characters, marks, and codes then coverts them into digital data that comp can process
To convert an assembly language source program into machine language, programmers use an ______.
operating systems and utility programs
Two types of system software are _____.
Internet ad firms often use ____ to collect info about users web habits
HRIS (human resource info system)
A _____ is a system that manages one or more human resource function
With _____, users invest in stocks, options, bonds, treasuries, and so on without using a broker
a _____ backup copies all of the files in a computer
Tape storage requires ___ access, which refers to reading or writing data consecutively
A spyware ____ is a program that detects and deletes spyware and similar programs.
Content ____ is the process of restricting access to certain material on the web.
Comp ___ occurs when a computer consumes someones entire social life
Two examples of ______ are cable television lines and telephone lines.
OMR (optical mark recognition)
____ is a technology that reads hand draw marks such as small circles or rectangles
A ____ does not replicate itself to other computers
___ computing provides computing needs to computer users via Internet
CRM (customer relationship management)
____ systems manage info about costumers, interactions, past purchase, and interests.
An _____ network, most recent net standard, conforms to the gov security standards and uses more sophisticated encryption than WPA
A UPS connects between a computer and a _____
A ____ backup (partial) allows user to choose specific files to backup
Some external peripherals have an AC ______, which is an external power supply.
Software ____ occurs when someone steals software media, intentionally erase programs, or illegally copies.
Digital ____ is the discovery, collection, and analysis of evidence found on comps and networks.
An ____ system is a collection of hardware, software, data, people, and procedures that work to produce quality information.
ERM (Employee Relationship Mgt)
A _____ system automates and manages much of the communications between employees and businesses
___ occurs when retailers use web to sell their products or services
A ____ identifier is a physiological or behavioral characteristic such as fingerprints and eye patterns.
____ is the transmission of messages and files via computer network
____ high speed internet connections use antenna on a house or business to communicate with a tower location via radio signals
A cable ___ allows access to high sped internet service through cable television network
POST (power on self test)
The BIOS executes a series of test, called ____, which check various system components including buses, clock, adapter cards, RAM chips and drives.
Many businesses use __ to limit employees web access
In the latest Windows conversion, the __ consists of several files that contain system configuration info.
encryption, web apps, passwords
Many cloud storage providers offer _____
____ holds data, instructions, and info for future use.
The core of a _____ cable consists of dozens/hundreds of thin strands of glass or plastic that use light to transmit signals
____ is a combo of an electric cash register, bar code reader, and printer.
Software ___ is an unauthorized and illegal duplication of copyrighted software.
A hardcopy is also called a ____
The process of locating and correcting syntax and logic errors in a program is known as ____ the program.
People connect wirelessly to the internet through a ____ using their mobile devices
On larger computers, tape cartridges are mounted in a separate cabinet called a tape ______
A certificate ____ is an authorized person or company that issues and verifies digital certificates.
Computer Matching and Privacy Protection Act
The 1988 ____ regulates the use of government data to determine the eligibility of individuals for federal benefits.
A ____ line is a type of always-on connection that is established between two communications devices.
have redundant data and isolate data
A major weakness of a lot of file processing systems is that they ____.
A(n) ____ modem sends and receives data and information to and from a digital line.
A wireless ____ point is a central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
Windows ___ is Microsofts fastest, most efficient operating system to date
An IT code of conduct is a written guideline that helps determine whether a specific computer action is ______.
A ____ overcomes the major disadvantage of CD-R disks, which is being able to write on them only once.
Often users ____, or transfer a copy of, the images from a digital camera to a computer's hard disk.
A typical enterprise consists of hundreds of operating entities, called ____ including departments, centers, and divisions.
Some cloud storage services charge an additional per ____ fee for data transferred to and from the cloud storage service.
A(n) ____ is the intersection of a column and row in a worksheet.
WWW and email
____ are two of the more widely accessed Internet services.
An image ____ is a graphical image that points to one or more Web addresses.
verifies that each individual program works by itself
A unit test ____.
A(n) ____ is a display device that is packaged as a separate peripheral.
____ enables users to speak to other users over the Internet.
A network ____ refers to the layout of the computers and devices in a communications network.
Plug and Play
____ means the operating system automatically configures new devices as users install them.
do-while control structure
A(n) ____ tests a condition at the beginning of the loop and repeats one or more times as long as the condition is true.
A(n) ____ interface controls how users enter data and instructions into a computer and how information is displayed on the screen.
A(n) ____ is a window on the screen that provides areas for entering or changing data in a database.
A tape ____ is a small, rectangular, plastic housing for tape.
A(n) ____ performs calculations on the data in a worksheet and displays the resulting value in a cell.
A(n) ____ utility assists programmers with identifying syntax errors and finding logic errors in a program.
A(n) ____ display is a lightweight display device with a shallow depth, such as an LCD monitor or plasma monitor, that does not use CRT technology.
____ is a magnetically coated ribbon of plastic capable of storing large amounts of data and information at a low cost.
Sometimes a company uses a(n) ____, which allows customers or suppliers to access part of its intranet.
A(n) ____ hard disk is a hard disk that you insert and take out of a drive, and it may either be built into the system unit or external and connected via a USB or FireWire port.
____ are employees who are responsible for coordinating and controlling an organization's resources.
The kernel is memory ____, which means it remains in memory while the computer is running.
Linux is ____ software, which means its code is provided for use, modification, and redistribution.
buses that eliminate the need to install cards in expansion slots
The USB (universal serial bus) and FireWire bus are ____.
A card ____ is a device that reads data, instructions, and information stored on flash memory cards.
use heel of hand as pivot point
To prevent repetitive strain injury, take all of the following precautions except ____.
Transport Layer Security TLS
____, which provides encryption of all data that passes between a client and an Internet server, requires only that the client has a digital certificate.
A(n) ____ viewer is a utility that allows users to display, copy, and print the contents of a graphics file.
A(n) ____ is a touch-sensitive display device that users interact with by touching the screen with a finger.
A(n) ____ suppressor uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching a computer and other electronic equipment.
In sequence, most SYStem development life cycles contain five phases: ____.
A(n) ____ database is an application appropriate for an object-oriented database that contains text, graphics, video, and sound.
In the ____ phase, system developers perform four major activities: (1) develop programs, (2) install and test the new system, (3) train users, and (4) convert to the new system.
With ____, the processor begins fetching a second instruction before it completes the machine cycle for the first instruction.
____ privileges for data involve establishing who can enter new data, change existing data, delete unwanted data, and view data.
____ cable consists of one or more twisted-pair wires bundled together.
____ is the process of dividing a disk into tracks and sectors, so the operating system can store and locate data and information on the disk.
Data ____ identifies the quality of data in a database.
A processor contains small high-speed storage locations, called ____, that temporarily hold data and instructions.
Project leaders can use project ____ software to assist them in planning, scheduling, and controlling development projects.
KM (Knowledge management)
____ is the process by which an enterprise collects, archives, indexes, and retrieves its knowledge or resources.
an instruction that causes a program to perform a specific action
A command is ____.
In Windows, the ____ contains a list of programs that open automatically when users boot the computer.
The processor relies on a small quartz crystal circuit called the ____ clock to control the timing of all computer operations.
____ report usually list just transactions.
____ is/are not considered spyware because a user knows it/they exist(s).
One popular use of ____ is to store a prepaid amount of money, such as for student purchases on campus.
Some ____ printers spray ink, while others use heat or pressure to create images.
____ systems provide forecasting for inventory control, manage and track shipping of products, and provide information and analysis on inventory in warehouses.
The amount of data, instructions, and information that can travel over a communications channel sometimes is called the ____.
The area of the hard disk used for virtual memory is called a(n) ____ file because it exchanges data, information, and instructions between memory and storage.
The case of the system unit, sometimes called the ____, is made of metal or plastic and protects the internal electronic components from damage.
A(n) ____ is a utility that removes a program, as well as any associated entries in the system files.
A(n) ____ card, which is similar in size to a credit card or ATM card, stores data on a thin microprocessor embedded in the card.
The ____ enables a program to perform one or more actions repeatedly as a loop as long as a certain condition is met.
A(n) ____ gives authors and artists the exclusive rights to duplicate, publish, and sell their materials.
Wi Fi (Ethernet, powerline, phoneline)
Types of wired home networks include all of the following EXCEPT ____.
A ____ port was formerly referred to as an IEEE 1394 port.
A momentary overvoltage, called a ____, occurs when the increase in power lasts for less than one millisecond (one thousandth of a second).
OIS (operational info system)
A(n) ____ is an information system that enables employees to perform tasks using computers and other electronic devices, instead of manually.
characters per second (cps)
The speed of a dot-matrix printer is measured by the number of ____ it can print.
A personal ____ is a utility program that detects and protects a personal computer and its data from unauthorized access.
One purpose of using test data is to try to cause a ____, which is an error that causes a program to stop running.
A(n) ____ is an output device that visually conveys text, graphics, and video information.
Some computers improve hard disk access time by using a disk ____, which consists of memory chips that store frequently accessed items.
Together, the four basic operations of a processor (fetching, decoding, executing, and storing) comprise a(n) ____ cycle.
____ a program involves translating the solution algorithm into a programming language (usually on paper) and then typing the programming language code into the computer.
second oldest copy
With a three-generation backup policy, the parent is the ____.
____ is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct expected of individuals while online.
OLAP (online analytical processing)
Programs that analyze data, such as those in a DSS (decision support system), sometimes are called ____ programs.
instructing and authorizing others to perform the necessary work
Leading, sometimes referred to as directing, is an activity performed by managers that involves ____.
write-protect notch (read/write head, sectors and tracks, capacity)
All of the following are characteristics of hard disks EXCEPT ____.
any program instructions that a program never executes
Dead code is _____.
A(n) ____ is an information system that helps users analyze data and make decisions.
____ is the most common type of volatile memory.
A(n) ____ information system is a system that serves as a central repository for the tasks of the marketing functional unit.
program development life cycle
The ____ follows these six steps: (1) analyze the requirements, (2) design the solution, (3) validate the design, (4) implement the design, (5) test the solution, and (6) document the solution.
AI (artificial intelligence)
____ is the application of human intelligence to computers.
facilitates communication between employees and the business
An ERM system ______.
A(n) ____ drive like that in the accompanying figure fits into a port that is itself an interface that can connect up to 127 different peripherals together with a single connector.
NAS (network area storage)
____ devices are servers connected to a network with the sole purpose of providing storage.
Windows ____ is an operating system that includes functionality, applications, and a user interface designed for specific types of smart phones.
A(n) ____ is a collection of every action that users make as they move through a Web site.
A form that sends entered data across a network or the Internet is called a(n) ____.
The latest version of the Macintosh operating system, Mac ____, is a multitasking operating system available only for computers manufactured by Apple.
A single user/single ____ operating system allows only one user to run one program at a time.
____ clients are small, terminal-like computers that mostly rely on a server for data storage and processing.
One of the more common causes of ____ is an electrical power variation.
A USB ____ is a device that plugs in a USB port on the system unit like the one in the accompanying figure and contains multiple USB ports in which users plug cables from USB devices.
Many people initially referred to the functions of a TPS (transaction processing system) as ____.
The purpose of memory ____ is to optimize the use of random access memory (RAM).
A(n) ____ identifies data outside of a normal condition.
lower costs and easier installation/modification (faster data transmission and smaller size, less susceptible to noise, better security for signals)
Fiber-optic cables have all of the following advantages over cables that use wire except ____.
Windows ____ is a scaled-down Windows operating system designed for use on communications, entertainment, and computing devices with limited functionality.
FTP (File transfer protocol)
Windows ____ is a scaled-down Windows operating system designed for use on communications, entertainment, and computing devices with limited functionality.
Web sites use a ____ to keep track of items in a user's shopping cart.
a named collection of stored data, instructions, or info
A file is _________.
CMOS (complementary metal oxide semiconductor)
During a cold boot on a personal computer, the POST (power-on self test) results are compared with data in a ____ chip.
RAID and a tape player, optical disc jukeboxes, Internet backup and NAS devices
An enterprise storage system may use ____.
An FTP ____ is a computer that allows users to upload and/or download files using FTP.
A(n) ____ operating system is an operating system that organizes and coordinates how multiple users access and share resources on a network.
An operational manager makes a(n) ____ decision, which is a decision that involves day-to-day activities within a company.
A disaster ____ plan is a written plan describing the steps a company would take to restore computer operations in the event of a disaster.
A(n) ____ is a window that provides information, presents available options, or requests a response.
tape (CDs, DVDs, Hard disks)
All of the following use direct access EXCEPT ____.
Instead of using CD-R, many users opt for ____, which is an erasable multisession disc users can write on multiple times.
____ is the number of bytes (characters) a storage medium can hold.
military intelligence, insurance agencies, law enforcement
Digital forensics is used by ____.
____ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system breaches.
the same on multiple operating systems
A cross-platform program is one that runs ____.
A(n) ____ flash memory card has a storage capacity of 512 MB to 8 GB.
A(n) ____ is a small metal or plastic device that looks like a tiny ink pen but uses pressure instead of ink.
A(n) ____ occurs when the incoming electrical power increases significantly above the normal 120 volts.
One type of spyware, called a(n) ____, is hidden on Web pages or in e-mail messages in the form of graphical images.
Users can purchase a software program that selectively ____ cookies.
A _____ is a series of instructions that tells a computer what to do and how to do it.
____ is a conversation that takes place over the Internet using a telephone connected to a computer, mobile device, or telephone adapter.
____, which allows users to choose an encryption scheme that passes between a client and a server, requires that both the client and server have digital certificates.
Many scanners include ____ software, which can read and convert text documents into electronic files.
With ____, the broadcast signals are digitized when they are sent via over-the-air broadcasts from local television networks, satellite, or cable.
A(n) ____ is a small, flat, rectangular pointing device that is sensitive to pressure and motion.
A(n) ____ copies the files that have changed since the last full backup or last incremental backup.
____ allows users to pay bills from their computer, that is, transfer money electronically from their account to a payee's account such as the electric company or telephone company.
SAN (storage attached network)
A(n) ____ is a high-speed network with the sole purpose of providing storage to other servers to which it is attached.
oldest copy of the file
With a three-generation backup policy, the grandparent is the ____.
Novell's ____ is a server operating system designed for client/server networks.
____ is any data and instructions entered into the memory of a computer.
During ____, a systems analyst builds upon the data dictionary developed during the analysis phase.
the use of all capital letters is the equivalent of shouting
According to netiquette, Internet users should assume ____.
Audio ____ is the process of entering any sound into the computer such as speech, music, and sound effects.
The components of a domain name are separated by ____.
A(n) ____ operating system supports two or more processors running programs at the same time.
High-availability systems often include a feature called ____, which allows components, such as a RAID hard disk or power supplies, to be replaced while the rest of the system continues to perform its tasks.
A ____ is a device that provides a central point for cables in a network.
____ is a technology that provides high-speed Internet connection using regular copper telephone lines.
FTP sites can be ____, whereby anyone can transfer some, if not all, available files.
A group of two or more integrated hard disks is called a(n) ____.
single user/single tasking
Smart phones and other small computing devices often use a ____ operating system.
A(n) ____ circuit, which is etched on a computer chip, contains many microscopic pathways capable of carrying electrical current.
A(n) ____ is an identification code that consists of a set of vertical lines and spaces of different widths.
A(n) ____ device is any hardware component that conveys information to one or more people.
____ means in a location separate from the computer site.
____ is the technology of authenticating a person's identity by verifying a personal characteristic.
Personal computers, display devices, and printers should comply with guidelines of the ____ program.
For smaller business and home networks, a ____ allows multiple computers to share a single high-speed Internet connection such as through a cable modem or DSL modem.
Networks, servers, mainframes, and supercomputers allow hundreds to thousands of users to connect at the same time, and thus are ____.
____ software, such as operating systems and utility programs, consists of the programs that control or maintain the operations of a computer and its devices.
Middle managers make ____ decisions, which are short-range decisions that apply the specific programs and plans necessary to meet stated objectives.
CompactFlash, Secure Digital and Memory Stick, xD Picture Card
Common types of flash memory cards include ____.
A(n) ____ operating system enables two or more users to run programs simultaneously.
measuring performance and if necessary, taking corrective action
Controlling is an activity performed by managers that involves ____.
Executive managers primarily are responsible for ____ decisions, which are decisions that center on a company's overall goals and objectives.
A(n) ____, such as a keyboard or printer, is a device that connects to the system unit and is controlled by the processor in the computer.
General purpose, or ____ systems cross the boundaries of functional units and are used by one or more functional units in an enterprise.
Compressed files, sometimes called ____.
special purpose terminals
____, such as POS terminals and automated teller machines, perform specific tasks and contain features uniquely designed for use in a particular industry.
The operating system that a computer uses sometimes is called the ____.
____, such as accountants, engineers, and other professionals, include individuals whose jobs center on the collection, processing, and application of information.
The purpose of the system ____ is to assess the feasibility of each alternative solution and then recommend the most feasible solution for a project.
____ is a multitasking operating system developed in the early 1970s by scientists at Bell Laboratories.
____ servers pack a complete computer server, such as a Web server or network server, on a single card.
____ is the most advanced form of digital television.
A ____ is an instruction, or set of instructions, a user follows to accomplish an activity.
the actions to be taken to restore full information processing operations
In a disaster recovery plan, the recovery plan specifies ____.
____ software is privately owned software and limited to a specific vendor or computer model.
A(n) ____ computer is a computer that continues to operate when one of its components fails, ensuring that no data is lost.
Users are turning to ____ for crisper, higher-quality output than they can achieve with analog television.
CVS (comp vision syndrome)
Users may have ____ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image.
____ radio is a wireless transmission medium that distributes radio signals through the air over long distances.
A virus ____ is an e-mail message that warns users of a nonexistent virus, worm, or Trojan horse.
IP (internet protocol)
____ refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos.
____ is a special formatting language that programmers use to format documents for display on the Web.
graphical user interface (GUI)
With a ____, users interact with menus and visual images such as icons, buttons, and other objects to issue commands.
inkjet printers, photo printers, laser printers, thermal printers, mobile, printers, label and postage printers (EXCEPT line printers and dot matrix printers)
Commonly used nonimpact printers include all of the following EXCEPT ____.
____ storage is the physical material on which a computer keeps data, instructions, and information.
If a hard disk is damaged, a computer can be booted from a(n) ____ disk, which is usually a CD that contains a few system files that will start the computer.
RSI (repetitive strain injury)
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
The purpose of the ____ phase is to construct, or build, a new or modified system and then deliver it to the users.
KMS (knowledge management system)
Organizations implement ____ to assist in the task of knowledge management.
Memory Stick PRO Duo
A(n) ____ flash memory card has a storage capacity of 1 GB to 16 GB.
identifying and combining resources so that company can reach goals and objectives
Organizing is an activity performed by managers that includes ____.
Uptime is a measure of ____.
____ computing combines many servers and/or personal computers on a network to act as one large computer.
dial up connection
Although it is an inexpensive way for users to connect to the Internet, ____ is slower-speed technology.
UPS uninterruptible power supply
A(n) ____ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.
make disc denser by packing pits closer, use two layers of pits, be double sided
A storage technique that a DVD-ROM can use to achieve a higher storage capacity than a CD-ROM is to ____.
OCR (optical character recognition)
____ is a technology that involves reading typewritten, computer-printed, or hand-printed characters from ordinary documents and translating the images into a form that the computer can process.
____ services include a relatively new set of software technologies that allows businesses to create products and B2B (business-to-business) interactions over the Internet.
A(n) ____ operating system is a complete operating system that works on a desktop computer, notebook computer, or mobile computing device.
A(n) ____ system is a set of programs containing instructions that coordinate all the activities among computer hardware resources.
A competing operating system to Windows Phone is Palm ____, which runs on Palm-powered PDAs and smart phones.
When using spreadsheet software, the rows and columns collectively are called a(n) ____.
how a company uses backup files and equipment to resume information processing
In a disaster recovery plan, the backup plan specifies ____.
A(n) ____ is a defined process that identifies the specific set of steps involved in completing a particular project or business process.
Each tick of the system clock equates to a ____.
clicking a button on the task bar, then a Start menu button, then a Lock menu button
With Windows, a warm boot can be performed by ____.
A(n) ____ consolidates data usually with totals, tables, or graphs, so managers can review it quickly and easily.
Voice ____ is the process of entering data by speaking into a microphone.
stores and manages files
A file server is a dedicated server that ____.
most recent copy of the file
With a three-generation backup policy, the child is the ____.
Comparable to a tape recorder, a tape ____ reads and writes data and information on a tape.
The ____ is firmware that contains a computer's startup instructions.
Many worksheet cells contain a number that can be used in a calculation, called a(n) ____.
____ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer.
The communications device that connects a communications channel to a sending or receiving device such as a computer is a(n) ____.
A(n) ____ certificate is a notice that guarantees a user or Web site is legitimate.
ALU (arithmetic logic unit)
The ____ is the component of the processor that performs arithmetic, comparison, and other operations.
A(n) ____ copies only the files that have changed since the full backup.
A(n) ____, sometimes called an archival backup, copies all of the files in a computer.
The overall technology strategy often is referred to as the information ____ of a company.
The data ____ stores a data item's name, description, and other details about each data item.
A(n) ____ is made of aluminum, glass, or ceramic and is coated with an alloy material that allows items to be recorded magnetically on its surface.
____ uses a condensed form of English to convey program logic.
analyze requirements, design solution, validate design, implement design, test solution, and document solution
In sequence, the program development life cycle consists of six steps: ____.
The ____ phase consists of two major activities: (1) if necessary, acquire hardware and software and (2) develop all of the details of the new or modified information system.
____ is a measure of how suitable the development of a system will be to a company.
A(n) ____ card is a removable device that allows users to transfer data and information conveniently from mobile devices to their desktop computers.
A ____ is a numeric password either assigned by a company or selected by a user.
Most ____ devices include a small optical scanner for reading characters and sophisticated software to analyze what is read.
A(n) ____ modem is a digital modem that sends and receives digital data over the cable television (CATV) network.
A NAS (network attached storage) server often is called a storage ____ because it is a piece of equipment with only one function — to provide additional storage.
The power ____ is the component of the system unit that converts the wall outlet AC power into the DC power a computer requires.
Naval officer ____, a pioneer in computer programming, was a prime developer of COBOL.
____ is the practice of sharing or pooling computing resources, such as servers and storage devices.
With ____ multitasking, the operating system interrupts a program that is executing and passes control to another program waiting to be executed.
The ____ unit is the component of the processor that directs and coordinates most of the operations in the computer.
electronic communications privacy act
The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.
A pop-up ____ is a filtering program that stops pop-up ads from displaying on Web pages.
A(n) ____ has the same intent as a cracker, but does not have the technical skills and knowledge.
The ____ unit is a case that contains electronic components of the computer used to process data.
A particularly devastating type of DoS attack is the ____ DoS attack, in which multiple unsuspecting computers are used to attack multiple computer networks.