How can we help?

You can also find more resources in our Help Center.

110 terms

CPSC 1105

Final Exam
STUDY
PLAY
Employers today rely on knowledge workers' _____ skills to keep them competitive.
computer
A general-purpose computer relies on the _____ being used to perform an activity.
software
A computer relies on the combination of _____ and _____ to operate.
hardware, software
A computer that manages information uses a _____ to organize and deliver it.
database
What two digits represent the binary number system?
0 and 1
A _____ is an example of a computer assigned to a special task.
kiosk
One thing to consider when choosing a mobile device is _____.
battery life
The speed of the ____ dictates how fast the processor can process data.
internal clock
Using Moore's Law, we can gauge how ____ processors might be in the coming years.
fast
Integrated circuits are also known as ____.
microchips
Most of today's PCs come equipped with at least 512 ____ of video memory.
megabytes
An example of digital convergence is our smart phone which combines many digital functions into one device.
True
A bit has two states, left or right.
False
ASCII is the standard used to represent ____ in digital form—with 1s and 0s.
keyboard characters
The ____ rate for a hard disk drive is much slower than that of solid-state storage.
access
The task of video _____ is to serve as a buffer between the processor and the monitor.
memory
Video cards have their own _____.
memory
A mouse and a touch pad are examples of ____ devices.
pointing
Display size is measured ____.
diagonally
Large retail stores use _____ terminals to track purchases and inventory.
POS
There are ____ stages to the software development life cycle.
five
Which of the following is NOT an object-oriented programming language?
UNIX
A PC comes with all of the following EXCEPT ____.
custom software
Small businesses can take advantage of _____ software in the cloud to keep track of their customers and everyday transactions.
CRM
A(n) ____ license defines the permissions, rights, and restrictions provided to the person who purchases a copy of a work.
software
All of the following are examples of freeware EXCEPT ____.
Microsoft Office
Many in the open-source movement are opposed to ____ software, like that developed by Microsoft.
proprietary
The ____ license was designed to fill the gap between full copyright and public domain options for authors, artists, and educators.
Creative Commons
If you create, develop, or pay to have a software program written, it becomes your intellectual property.
True
Shareware is software that is made available to the public at no cost.
False
A type of computer connection that provides Internet service through a phone line that services both the Interent and your phone is ____.
DSL
One feature of Internet2 technology is ____.
speed
The Internet has become an important part of daily life for only businesses and professionals.
False
Using the Web as a primary user interface to access the Internet is also referred to as ____.
cloud computing
A popular Web server software today is ____.
Apache
A cookie file is stored on a user's computer.
True
Google relies on ____ to relay information related to its mapped software.
satellites
Playing online Scrabble with others on the Web at any given time is an example of a ____ gaming experience.
multiplayer
Having a personal Web site that lists your accomplishments can help your job search.
True
Facebook is a popular Web application.
True
There is hope that WiMAX technology will help resolve the ____ problem.
last mile
A ____ is considered a telecommunications device that sends and receives signals.
all of the above
____ is a popular cable type used as network backbone by major telecommunications companies.
Fiber-optic
With the advent of ____ generation technology, broadband Internet services over cellular networks were made available.
fourth (4G)
A pager receives signals from ____.
transmitters
Tagging a photo with geographic data is known as ____.
geotagging
With Bluetooth, up to ____ devices can be paired simultaneously.
seven
Items such as a credit cards are beginning to take advantage of RFID technology through the use of a(n) ____ reader.
NFC
A ____ Area Network is the interconnection of personal information technology devices, typically wirelessly, within the range of an individual.
Personal
Wide Area Networks use telecommunication devices such as ____ to transmit data.
satellites
The ____ was the first eBook reading device to gain widespread acceptance.
Kindle
Only slate devices such as the iPad are capable of supporting eBooks.
False
An advantage of using a(n) ____ format is its ability to compress CD music files to one tenth their original size.
MP3
When you digitize a sound wave, you measure and record its ____ at regular time intervals called the sampling rate.
amplitude
Designers rely on ____ software to help them build prototypes for further research and testing.
CAD
An example of a vector graphic image is ____.
clip art
Digital photography captures, stores, and manipulates photographs digitally as a series of ____.
1s and 0s
All of the following are photo-editing software applications EXCEPT ____.
Adobe Illustrator
The editing tools provided on today's camcorders are as sophisticated and powerful as those provided by video-editing software.
False
Social networks employ virtual reality to provide an environment in which individuals can interact through the use of ____.
avatars
In a database, a collection of related fields that describes some object or activity is referred to as a ____.
record
Relationships between tables can be illustrated through a(n) ____ relationship diagram.
entity
When building a database, careful consideration must be given to ____.
content
In a database, your first name would be categorized as a ____.
field
____ usually involves breaking one table into two or more tables in order to correct a data problem or anomaly.
Normalization
A database ____ is a graphical representation of the structure of a database.
schema
A schema can stand alone or be part of a database.
True
On Amazon.com, when the customer is ready to make a purchase, the database ____ manages the entire process.
management system
Installation and ongoing function of software on a database system is the job of the database ____.
administrator
A retail store may use the ____ approach to analyze data collected from checkout scanners.
business-intelligence
In the ____ form of e-commerce, transactions between businesses across private networks, the Internet, and the Web are supported.
B2B
The popularity of ____ e-commerce is a good example of how customers can successfully implement their own sales strategy on the Web.
C2C
Companies take advantage of location-based advertising when you visit such sites as ____.
foursquare.com
Many e-tail sites support ____ virtual imagery, so you can easily view what you want to purchase in full detail.
three-dimensional
Online ____, such as uBid.com, provide a method for manufacturers to liquidate stock and for consumers to find a good deal.
clearinghouses
____ supply management services have played an important role in building relationships between corporate buyers and sellers.
Global
All of the following are technologies that play an important role in e-commerce EXCEPT ____.
DHTML
Electronic data interchange uses private communications networks called ____ networks.
value-added
Hosting companies provide all the necessary software tools to deliver e-commerce applications EXCEPT ____.
shipping
Information transmitted from an online sales transaction uses a secure ____ connection where buyers enter their account information and submit it.
encrypted
An MIS system uses a(n) ____ report when a request is made by a specific person for a specific purpose.
demand
A corporation relies on its ____ statistics to provide insight into the state of the business and its overall health.
key performance indicator
Management information systems are powered by ____.
databases
The final stage of decision making and problem solving is known as the ____ stage, where the results of a decision are reviewed.
monitoring
Which of the following is NOT a benefit of an ERP system?
low expense in time and money
Solutions that deliver improved customer service and targeted marketing support all of the following areas of an enterprise EXCEPT ____.
human resources
A(n) ____ system can help a business alleviate the need for multiple information system programs.
enterprise
The first step in systems analysis is to ____ of the organization and how the computer system can help solve them.
identify the overall goals
In a Gantt chart, each time a ____ is completed, a grid cell is marked to indicate its completion.
task
In a(n) ____ analysis, the strengths and weaknesses of the existing business are uncovered.
systems
Computerized expert systems use ____ to arrive at conclusions or make suggestions.
heuristics
Communication and language are key elements in the ____.
Turing Test
Singularity embraces the idea of ____ and other recent trends in technology.
Moore's Law
AI systems typically include all of the following EXCEPT ____.
concatenated methodologies
A(n) ____ system is software that is knowledgeable in a particular field or area.
expert
Computational intelligence is directly related to ____.
artificial intelligence
Medical robots are built with ____ machine capabilities and sophisticated AI controlling software.
high-precision
AI expert ____ has created an AI program he calls the Cybernetic Poet that can create poetry in the style of human poets.
Ray Kurzweil
Through ____, a computer can pick up movement in its environment.
visual input
Facial recognition is used in ____ to verify a person's identity.
authentication
____ permissions provide registered users with access to the files they need, while restricting access to private resources.
User
A company may hire a ____ hacker to learn about vulnerabilities in their system.
white-hat
All of the following are examples of malware EXCEPT for ____.
updates
The process of examining computing equipment to determine if it has been used for illegal, unauthorized, or unusual activities is known as ____.
computer forensics
A common form of authentication is a ____.
password
Through the use of ____, data is secured when it is stored and transported over a network.
encryption
In a Wi-Fi network, ____ provide several settings that can all but bulletproof a wireless network.
access points
An Internet ____ can be found in the form of a chain letter, scam, and false alarm.
hoax
An important function of a firewall is to protect all the ____ of a network or computer from undesirable data.
ports
In a distributed denial-of-service (DDoS) attack, the services of a(n) ____ can be halted.
Internet server