Study sets, textbooks, questions
Upgrade to remove ads
CMPT 1020 Computer Concepts Final Review
Terms in this set (114)
Packetization refers to breaking information into small parts for transmission across the Internet (T/F)
In a Ribbon GUI, _______ are used to divide the ribbon into major activity areas.
Digital video recorder
Application programming interface
Which of the following is not one of the three basic components of cloud computing? (Clients, wireless connectivity, servers, datacenters)
Querying the database and generating reports is assisted by the application generation subsystem (T/F)
In binary arithmetic, 111 plus 111 is 222 (T/F)
10 pico seconds takes longer than 50 nano seconds (T/F)
Fiber-optic cable transmits data as pulses of light through tiny tubes of glass (T/F)
A(n) _______ is a private network that connects more than one organization.
In a network environment, a client provides resources for the servers (T/F)
The organization can switch to the old system if the new system fails in the parallel conversion approach (T/F)
A financial budget would be created in what type of data file?
Money collected from or owed by customers is called _______. (2 words)
Utility suites come with one program only (T/F)
Because Mac OS X market share is so large, more application programs are developed to run under Mac OS X than any other operating system (T/F)
C++ is an example of a machine language (T/F)
An uncompressed 256 color graphic with a resolution of 800 x 500 would require how many bytes of storage?
Service set identifier
Gathering data and information in the systems analysis phase can be achieved through conducting interviews and studying documents (T/F)
Secondary storage provides temporary or volatile storage (T/F)
The archiving and search features of the web make your online identity available indefinitely (T/F)
This is performed to determine whether the new procedures are actually furthering productivity.
_______ refers to the process whereby a single physical computer can support multiple operating systems.
A _______ is a list of instructions for the computer to follow to accomplish the task of processing data into information.
Pathways that support communication among the various electronic components on the system board are called _______.
Knowledge workers use specialized information systems, called KWSs, to create information in their area of expertise (T/F)
A type of specialty processor devoted exclusively to protecting your privacy.
_______ make up the basic structure of a relational database with columns containing field data and rows containing record information.
Digital rights management
The five types of personal computers are: desktops, laptops, tablets, smartphones, and _______.
The operating system is often referred to as the software environment or software _______.
Network interface cards (NIC) are connected through _______ slots on the system board.
Selecting the ________ (2 words) is the first step in implementing a new system.
_______ messaging is the process of sending short electronic messages using a wireless network.
File _______ expands compressed files.
Microsoft Access is an example of general-purpose application software (T/F)
A _______ is someone who gains unauthorized access to computer systems.
The category of operating system used for handheld devices.
_______ (acronym) ports are an audiovisual port typically used to connect large monitors.
A database is a collection of related data (T/F)
What offers a combination of the features of RAM and ROM?
Network interface card
Which of the following is not an example of a document file created by a word processor? (report, essay, spreadsheet)
_______ Area Networks are countrywide and worldwide networks.
Using structured programming techniques, the program's processing steps can be identified using _______ program design.
Small data files that are deposited on a user's hard disk when they visit a website are called _______.
Due to its expanded storage capability, fast access speed, and high reliability, _______ is often used by Internet servers and large organizations.
In a database, primary keys are often used to link tables (T/F)
For browsers to connect to resources on the Internet, the location of the resources must be specified through addresses called _______.
A podcast is an audio file that is distributed through downloads or the use of a feed, such as _______.
This type of language uses natural languages to allow humans to communicate more directly to a computer.
Problem and constraint
_______ (2 words) are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver.
The hard disk's surface is scratched and some or all of the data is destroyed when there is a _______. (2 words)
What port is used for connecting musical instruments to a sound card?
In _______, (3 words) data is processed at the same time the transaction occurs.
Hypertext transfer protocol secure
One clue that an image might be a _______ graphic is a flat, cartoon-like quality.
The system unit, also known as the system chassis, is a container that houses most of the electronic components that make up a computer system (T/F)
Advanced Research Projects Agency Network
When evaluating alternative systems, systems designers must consider economic feasibility, _______ feasibility, and operational feasibility.
_______ (2 words) is concerned with protecting software and data from unauthorized tampering or damage.
The most widely used character encoding standard today is _______.
The duties of a database administrator include determining which people have access to what kinds of data in the database; these are referred to as _______ rights.
In the data analysis step, the idea is to learn how information currently flows and to pinpoint why it is not flowing properly (T/F)
Internet Service Provider
_______ are used to quickly create a presentation by providing predesigned styles and layouts as well as suggested content based on the type you choose.
Antivirus programs protect your computer system from viruses or malicious programs. This is an example of which type of software?
As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the _______.
A _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
In a _______ database, not all the data in a database is physically located in one place.
Which of the following refers to a system that summarizes detailed data from the transaction processing systems in standard reports for middle-level managers?
Management information system
Read only memory
What-if analysis is a very powerful and simple tool to test the effects of different assumptions in a spreadsheet (T/F)
_______ are cell phones with wireless connections to the Internet.
This type of network strategy uses central servers to coordinate and supply services to other nodes on the network.
Local Area Network
Office automation systems are designed primarily to support data workers (T/F)
Secure file transfer protocol
The component of the information system that is described as raw, unprocessed facts, including text, numbers, images, and sounds, is called _______.
_______ (2 words) languages can be run on more than one kind of computer.
When evaluating a website's content, whether or not the information is up to date is considered part of the _______ element.
Identity theft and mistaken identity are the same (T/F)
_______ scanning devices use fingerprints and iris scanners to identify individuals.
RAID connects several inexpensive hard-disk drives to one another (T/F)
Application software can be categorized as either general-purpose, specialized, or _______ apps.
Program _______ graphically present the detailed sequence of steps needed to solve a programming problem.
_______ workers use OAS systems and are involved with the creation of information in their areas of expertise.
What are the two major software types?
System software and application software
System software cannot handle technical details without user intervention (T/F)
Time cards containing statements of hours worked are an example of _______ data.
_______ programming techniques consist of top-down program design, pseudocode, flowcharts, and logic structures.
This is the final task in Phase 3: Systems Design.
A. Select the best design
B. Design alternative systems
C. Write a systems design report
D. Examine hardware requirements
Write a systems design report
Program objectives, desired outputs, needed inputs, and processing requirements are all recorded in this.
Program specifications document
System software includes all of the following except:
This document presents the costs versus the benefits and outlines the effect of alternative designs on the organization (Systems analysis report, preliminary investigation report, initialization report, systems design report).
Systems design report
_______ (2 words) processing is also known as online processing.
A _______ is a communications system connecting two or more computers.
The decimal system is base 10 and the binary system is base 1 (T/F)
Expand "RSI" (type of workplace injury)
Repetitive strain injury
This type of computer criminal creates and distributes malicious programs.
A program that replicates itself and clogs computers and networks is called a(n) _______.
Convert binary 1111 to hexadecimal
Convert binary 0111 to decimal
Convert binary 1000 to decimal
Convert binary 1001 to decimal
Sets with similar terms
Computer Apps Test 3
CSCI 1100- Ch.10
Exam 3 ISQS Delgadillo
Other sets by this creator
Chem Final Review
Chem Exam 3 Review
Geometry Ch. 3
Other Quizlet sets
Ideology of Cold War Vocab
methods in teaching exam 2
Exam - chapter 13- electricity