How can we help?

You can also find more resources in our Help Center.

519 terms

COSC 100

STUDY
PLAY
________ is the semiconductor material used to make transistors.
Silicon
The ________ is the box that contains the central electronic components of the computer.
system unit
Which type of software lets you dictate letters, e-mails, and voice commands?
speech recognition software
CD ripping refers to ________.
encoding CDs to MP3 format
Multimedia software includes all of the following EXCEPT:
utility software.
GPS software allows users to ________.
locate restaurants, airports, and points of interest
Which type of software helps managers with tasks such as scheduling charts?
project management software
Software that does "back office" operations and processing functions such as billing, production, inventory management, and human resources management is called ________.
enterprise resource planning software
The special memory storage areas built into the CPU are called ________.
registers
Which of the following is an example of discounted software?
educational versions of software
Angel and Blackboard are examples of ________.
course management software
The ASCII code can represent ________ unique characters.
256
In a spreadsheet, the columns and rows form individual boxes called _______.
cells
Which type of software stores client information in one central database for use by sales professionals?
customer relationship management software
Software designed for a specific industry is known as ________ software.
vertical market
The CPU processing cycle has how many steps?
4
Unicode uses ________ bits to code character data.
16
Microsoft ________ is software that allows students who have Tablet PCs to write their notes directly onto the tablet, using it as an electronic notebook.
OneNote
Software you can use to create a budget is called ________.
spreadsheet software
Every software program has a set of ________ that specify the minimum recommended standards for the operating system, processor, RAM, and hard drive capacity.
system requirements
Custom software, developed to address the needs of a specific company, is known as ________ software.
proprietary
Which of the following sequences lists the speed of memory from the fastest to the slowest?
registers, Level 1 cache, Level 2 cache, RAM
QuarkXPress and Adobe InDesign are examples of ________ software.
desktop publishing
Presentation software includes all of the following features EXCEPT:
formulas.
In a spreadsheet, equations you build yourself using values and cell references are called ________.
formulas
Microsoft Office and Corel WordPerfect Office are examples of ________.
software suites
All of the commands in an instruction set are written in ________ language, which is easier for humans to work with than binary.
assembly
An example of software that includes electronic checkbook registers and automatic bill payment tools is ________.
Intuit Quicken
Which Microsoft program is used to create technical drawings, map basic block diagrams, and more?
Visio
Predesigned forms that provide the basic structure for a particular kind of document are known as ________.
templates
The cell address F7 indicates that the cell ________.
is at column F, row 7 of the worksheet
Computer-aided design software is used primarily by ________.
engineers to create models
The main purpose of the decode stage is for the CPU's ________ to translate program instructions into commands the CPU can understand.
control unit
Which type of software is used at colleges to keep track of student records?
database software
A(n) ________ software installation allows you to decide which features you want to install on the hard drive.
custom
The ________ number system uses the digits 0-9 and the symbols A-F.
hexadecimal
QuickBooks and Peachtree are examples of ________.
accounting software
Illegally copying an application onto another computer is called ________.
software piracy
Microsoft Word and OpenOffice.org Writer are examples of ________.
word processing software
The primary benefit of a spreadsheet program is ________.
its ability to automatically recalculate formulas and functions
System software does all of the following EXCEPT ________.
add graphics and pictures to files
Web-based application software is software that ________.
is stored completely on a Web server instead of your hard drive
Software refers to a set of instructions that tells the computer what to do. These instruction sets are called ________.
programs
When available, the best way to remove an unwanted software application is to ________.
use the application's uninstall program
Software that lets you do tasks at home, school, and work is called ________.
application software
Which type of software is used to keep track of appointments, to-do lists, and telephone numbers?
personal information manager (PIM) software
Adobe Dreamweaver is an example of ________.
Web page authoring software
The collection of commands that a specific CPU executes is called its ________
instruction
Which type of software is used to make a slide show?
presentation software
Adobe Premiere Pro and Microsoft Live Movie Maker are examples of ________ software.
digital video editing
Which file format enables users to share, view, and print any file as long as they have the appropriate program installed?
PDF
The organization responsible for rating computer games is the ________.
Entertainment Software Rating Board
Software that is distributed for free, but often with the condition that you pay for it if you like and intend to use it, is called ________.
shareware
What type of memory stores frequently used instructions or data needed by the CPU?
cache
A byte is composed of ________ bits.
8
In the URL http://www.prenhall.com, the portion labeled .com is the ________.
top-level domain
All of the following are ways to communicate on the Internet EXCEPT:
hyperlinks.
The "s" in https stands for ________.
secure socket layer
Podcasts enable you to ________.
broadcast over the Internet using compressed audio and video files such as MP3s and MP4s
One way to mark a Web site so that you can return to it later without typing the address is to ________.
use Favorites or Bookmarks
Which of the following is the desktop search feature in Mac OS X Snow Leopard?
Spotlight
If you wanted to keep a written online journal, you would use ________.
a weblog
The Internet backbone refers to ________.
the main pathway of high-speed communications lines through which all Internet traffic flows
________ is a social networking service that enables you to exchange short text messages with your friends or "followers."
Twitter
E-commerce that involves businesses buying and selling goods and services to other businesses is called ________.
B2B
Which of the following is similar to the Windows System Properties dialog box and displays hardware and software information on a Mac?
System Profiler
Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called ________.
plug-ins
Which of the following are personal video journal entries posted on the Web?
vlogs
Which of the following is a free Web authoring suite?
SeaMonkey
The Internet2 is a project ________.
to develop new Internet technologies
You can keep track of IM contacts by using a ________.
buddy list
The name of the free Internet browser from Mozilla is ________.
Firefox
Facebook and MySpace are considered to be ________.
social networking Web sites
What protocol allows files to be transferred from a Web server so that you can view them on your computer using a browser?
HTTP
Web 2.0 describes ________.
a trend of new Web applications that combine the functionality of multiple applications
A(n) ________ is a keyword or term that is assigned to a piece of information such as a Web page, digital image, or video and describes the site so that it can be found again by browsing or searching.
tag
A set of programs that searches the Web to find information is called a ________.
search engine
Which of the following is most likely to be a popular choice for a broadband Internet connection in a rural area?
satellite
The large scale networking (LSN) project is ________.
a U.S. government Internet research project
Which of the following is NOT a type of broadband Internet connection?
dial-up
Which of the following is an open source operating system?
Linux
A Web site that allows anyone to add or edit content is called a ________.
wiki
Search engines have which three parts?
a spider, an indexer, and search engine software
When building your own computer, which of the following is NOT required?
a router
RSS stands for ________.
Really Simple Syndication
Instant messaging (IM) services are programs that enable you to ________.
communicate in real time with others who are online
The Internet is ________.
a large network of networks
The text version of a Web site's Internet address is called the ________.
Uniform Resource Locator (URL)
Which of the following is free software to create or edit digital art?
GIMP
The World Wide Web was invented by ________.
Tim Berners-Lee at CERN
OpenOffice 3 includes all of the following components EXCEPT:
Word.
Podcasts use which of the following technologies?
RSS
A webcast is ________.
the broadcast of audio or video content over the Internet
A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as a(n) ________.
breadcrumb trail
The concept of the Internet developed from ________.
the Cold War crisis
All of the following are examples of multimedia EXCEPT:
text.
In the URL http://www.prenhall.com, the portion labeled http is the ________.
protocol
Which of the following provides the highest speed Internet connection?
cable
The default file format for saving a spreadsheet in Calc is ________.
.ods
The advantage of a dial-up Internet connection is ________.
low cost
HTTP is the abbreviation for ________.
hypertext transfer protocol
All of the following are parts of a URL EXCEPT:
hyperlinks.
Webcasts differ from podcasts in that webcasts ________.
are not updated automatically
The agency that first began funding the Internet was called the ________.
Advanced Research Projects Agency Network
________ microphones pick up sound from only one direction.
Unidirectional
Computers gather data, which means that they allow users to ________ data.
input
In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of
eight bits.
Inkjet printers and laser printers are examples of ________ printers.
nonimpact
________ is the theory that holds that there is no universal moral truth and that instead there are only beliefs, perspectives, and values.
Relativism
After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered ________.
output
A ________ is approximately 1 million bytes
megabyte
________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.
Embedded
________ ports are now the most common ports for connecting input and output devices to the computer.
Universal serial bus (USB)
________ is a form of permanent memory that holds all the instructions the computer needs to start up.
ROM
________ printers have tiny hammer-like keys that strike the paper through an inked ribbon.
Impact
Computers process data into information by working exclusively with ________.
numbers
The type of monitor that looks like a traditional television set is called a ________ monitor.
cathode-ray tube (CRT)
Which of the following is NOT one of the four major data processing functions of a computer?
analyzing the data or information
________ is the applied science concerned with designing and arranging things that people use so that the people and things interact most efficiently and safely.
Ergonomics
Devices such as monitors and printers that are connected to the computer are called ________.
peripheral devices
The ________ contains the central electronic components of the computer.
motherboard
________ is a power mode that allows the computer to save an image of the desktop to the hard drive and enter a state of reduced power consumption to save energy.
Hibernate
Which of the following is an example of an input device?
a scanner
________ software is the set of programs that enables the computer's hardware devices and application software to work together.
System
Large, expensive computers that support hundreds of users simultaneously are called ________.
mainframes
A(n) ________ enables you to enter data (text, images, and sound) and instructions (user responses and commands) into the computer.
input device
All of the following are types of cyberbullying EXCEPT:
calling a co-worker to schedule a meeting
________ plug into slots on the motherboard and provide additional functionality for your computer.
Expansion cards
Restarting a computer when it is already powered on is called ________.
a warm boot
________ are large printers used to produce oversize pictures that require precise continuous lines, such as maps and architectural plans.
Plotters
Which of the following ethical philosophies states that decision making should be based on the particular circumstances and not on fixed laws?
situational ethics
A ________ is approximately 1 billion bytes.
gigabyte
A(n) ________ uses an internal sensor or laser to detect the mouse's movement.
optical mouse
The ________ language consists of just two digits: 0 and 1.
binary
The hard disk drive is a ________ storage device, meaning that it stores data permanently.
nonvolatile
The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a ________.
touch pad
A ________ is a portable computer that features a touch-sensitive screen and handwriting recognition software.
Tablet PC
________ is the place in a computer where the programs and data the computer is currently using are stored.
RAM
Any computer parts that you can actually touch are considered to be ________.
hardware
USB ports are fast replacing traditional ________ ports because of their ability to transfer data quickly.
parallel and serial
Intellectual property (such as music, writing, and software) is protected through ________ law.
copyright
The ________ port resembles a standard phone jack.
modem
A person who does not conform to a set of approved standards of social or professional behavior ________.
commits unethical behavio
________ are a form of permanent storage that can be seen and accessed from outside the system unit and are typically used for CD and DVD drives.
External drive bays
A ________ enables your computer to connect to other computers or to the Internet.
network interface card (NIC)
The ________ is used in combination with other keys to perform shortcuts and special tasks.
Control (Ctrl) key
Correct
________ is data that has been organized or presented in a meaningful fashion.
Information
Social media sites are about sharing information. The use of this information can raise questions regarding ________.
personal privacy
The term "bit" is short for ________.
binary digit
The S-video and the ________ ports on a computer facilitate connecting the computer to multimedia devices such as TVs and DVD players.
DVI
A(n) ________ is a device that looks like a skinny pen but has no ink.
stylus
________ binary digits (or bits) combine to create one byte.
Eight
Flash drives plug into a(n) ________.
USB port
Monitor screen grids are made up of millions of pixels, with each pixel containing ________ subpixels of colors.
three
The term ________ describes computing devices or peripherals that use techniques, parts, and methods from an earlier time that are no longer popular.
legacy technology
A(n) ________ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system.
port
Google restricting its search engine services in China by not allowing search results for sites considered objectionable by the Chinese government is an example of ________.
censorship
________ is the set of computer programs that enables the hardware to perform different tasks.
Software
RAM is considered volatile storage, which means it is ________.
temporary
The ________, housed inside the system unit, regulates the wall voltage to the voltages required by the computer chips.
power supply
All the following are examples of input devices EXCEPT a ________.
printer
The ________ requires companies to provide mechanisms for employees and third parties to anonymously report complaints, including ethics violations.
Sarbanes—Oxley Act
Which personal computer was chosen as "machine of the year" by Time magazine?
IBM PC
A ________ is a special device that is installed in your computer and allows it to communicate with other devices on the network.
network adapter
Unwanted e-mail is called ________.
spam
Which of the following is NOT necessarily part of being computer literate?
being able to build a computer
________ is a type of wireless communication that transmits data through radio waves.
Bluetooth technology
What was the first word processing application to be used on personal computers?
WordStar
Technology no longer protected by copyright, available to everyone, is considered to be ________.
in the public domain
The ________ computer had switches on the front of it, which were used to enter data using 0s and 1s.
Altair
Many online courses are designed to use management software like ________ so that students can communicate outside of class, take quizzes online, and find their class materials easily.
Blackboard or Moodle
The ________, weighing 24.5 pounds, was the industry's first portable computer.
Osborne
The goal of ________ is to provide solutions to physical problems, such as providing sight to the blind.
biomedical chip research
The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement specialty called ________.
computer forensics
________ is the study of molecules and structures whose sizes range from 1 to 100 nanometers.
Nanoscience
Children who do not have access to ________ and ________ won't be prepared for future employment.
the Internet, computers
What programming language revolutionized the software industry because beginning students could learn it easily?
BASIC
By studying the data produced by ________, scientists hope to improve the prediction of weather phenomena.
simulations
The graphical user interface was developed by ________.
Xerox
________ tags are small versions of the roadway electronic toll system used in many states to automate paying tolls as motorists pass through the toll station.
RFID
Many people believe Grace Hopper's greatest contribution to computing was ________.
the compiler
To set up a(n) ________, you must have an appropriate computer and digital devices connected to a home network.
digital home
Being ________ means being familiar enough with computers that you understand their capabilities and limitations.
computer literate
A ________ is a small device that enables users to carry digital information.
Smartphone
________ is a field of study focused on information handling and retrieval of information automatically.
Information technology
A ________ is a specially designed scannable sticker that resembles an inkblot and contains all the important information about a UPS package.
MaxiCode
________ is the application of computer systems and techniques to gather potential legal evidence.
Computer forensics
The Microsoft Authorized Refurbisher program supports refurbishers by allowing ________ to be installed for free on refurbished systems.
certain Microsoft operating systems and Office software
Which of the following do today's educators NOT need to be familiar with to create constructive computerized lessons and to interact with students?
Web authoring software
Medical students can train on ________ and experience firsthand how a human would react to a particular treatment.
patient simulators
One of the reasons the Apple II computer was popular was that ________.
the operating system instructions were stored in ROM
________ computing relates to emotion or deliberately tries to influence emotion.
Affective
The prefix nano stands for ________.
one-billionth
The ________ is a global effort in which bioengineers are creating realistic computer simulations of all systems and features of the human anatomy.
Physiome Project
Surgeons use ________ to perform delicate operations by manipulating devices through computers instead of manually.
robotics
All of the following are examples of real security and privacy risks EXCEPT:
spam.
While engineers work to create computers that can understand us emotionally, ________ are also evolving toward a more human appearance.
computer systems
When a job is sent to other countries, as many programming jobs have been, it is said to have been ________.
offshored
________ tags, when placed on an animal, can be used to record and track in a database all of the animal's movements.
RFID
One type of chip already being implanted in humans as a means of verifying a person's identity is called a(n) ________.
VeriChip
One potential application of ________ is to provide sight to the blind
biomedical chip implants
A ________ allows you to transfer media from your computer to other media devices (such as a plasma TV).
digital media adapter
Which of the following allowed users to interact with the computer more easily?
the graphical user interface
The difference between people with access to computers and the Internet and those without this access is known as the ________.
digital divide
The first commercial Internet Web browser was developed by ________ in 1995.
Netscape
A nanometer is ________.
one-billionth of a meter
The emotional-social prosthesis (ESP) device, developed by a group at the MIT Media Lab, is targeted at helping people who have ________.
autism
________ is the science revolving around building devices on an extremely small scale.
Nanotechnology
________ is the nerve center of any digital home, allowing you to interface with the different digital devices connected to the network.
A computer
The process of searching huge amounts of data with the hope of finding a pattern is called ________.
data mining
In a Windows folder, to display files and folders as icons in list form, use ________ view.
Tiles
The ________ is responsible for managing the processor and all other components of the computer system, and is an essential part of the operating system.
kernel
In Windows, a file path starts with a ________.
drive letter
In the Windows operating system, the hard drive is represented as the ________.
C Drive
The version of Windows 7 that is most appropriate for high-end PC users, gamers, and multimedia professionals is _______.
Windows 7 Ultimate
Which of the following would be a name of a Microsoft Access document.
inventory.accdb
During the virtual memory process, the operating system moves data to a temporary storage area on the hard drive called the ________ file.
swap
A(n) ________ builds Web pages to deploy the materials that the content creators develop.
Web publisher
Which of the following is a single-user, multitask operating system?
Mac OS
When a U.S. company hires a company outside of the United States, they are using a technique called ________.
offshoring
XO-1 is the name of the computer being provided by the ________ project.
One Laptop per Child
C:\Documents\Spring 2012\CIS 101\Term Paper\Computer Technology is an example of a ________.
file path
All of the following are terms related to part of the boot process EXCEPT:
USB.
Microsoft Windows and Mac OS use a ________ interface.
graphical user
The process of replacing repeated patterns of letters in a file with a shorter placeholder is called ________.
file compression
The ________ of the operating system allows the user to communicate with the computer system.
user interface
f you want to automatically defragment your hard drive every week, you can set a predetermined time using the ________.
Task Scheduler
Which of the following is the first step in the boot process?
The BIOS is activated by powering on the CPU.
The OS allows you to organize the contents of your computer in a hierarchical structure of ________.
directories
Which of the following is NOT a function of the operating system?
It manages the removal of spyware.
You can use the Windows ________ to check on a nonresponsive program.
Task Manager
Some video games require a ________ operating system.
real-time
The basic input/output system is stored on a ________ chip.
ROM
________ are easy-to-use mini desktop programs that give you information at a glance or quick access to frequently used tools including weather information, calendar items, or games.
Gadgets
Which of the following does NOT occur during the power-on self-test?
The OS is moved into RAM.
Which of the following is a file compression utility?
WinZip
Which of the following is NOT a step in the boot process?
The antivirus program checks all files for viruses.
The most essential software in your computer system is the ________.
operating system software
Which of the following was the first widely used operating system installed in personal computers?
MS-DOS
In Windows, you can create ________ to reset your system in the case of a malfunction.
restore points
When an operating system receives an interrupt from the printer and pauses the CPU, it is performing which of the following functions?
processor management
The ________ is a program that manages the data between the operating system and all input and output devices attached to the system.
BIOS
Which of the following operating systems is used primarily with mainframes as a network operating system?
UNIX
Which of the following statements about a graphical user interface is FALSE?
A GUI is a command-driven interface.
With Windows Explorer, you can perform all of the following file management actions EXCEPT:
editing files.
________ staff the phones, respond to Internet live chat, or respond to e-mail and solve problems for customers or employees, either remotely or in person.
Helpdesk analysts
The location of a file is specified by its ________.
file path
The ________ contains all of the different configurations used by the OS and by other applications.
registry
The combination of operating system and processor in a computer is referred to as a computer's ________.
platform
Programmers, systems analysts, project managers, and technical writers are generally considered part of a(n) ________ team.
systems development
Before upgrading your OS, you should back up your ________.
data files
When a U.S. business hires a third party within the United States to provide services they offer to their customers, it is called ________.
outsourcing
The ________ manages the flow of data and information through the computer system by coordinating the hardware, software, user interface, processor, and system memory.
operating system
An IT professional working a(n) ________-based job reports for work to the same location each day and interacts with the same people on a regular basis.
office
If Microsoft Word 2010 is used to create a file, which file extension is added automatically?
.docx
When your computer is in Safe mode, you can use the ________ to view and change the properties of all devices attached to the computer.
Device Manager
Real-time operating systems can be found in ________.
scientific instruments
Which of the following types of programs help manage system resources such as the hard drive?
utility programs
Which of the following statements concerning the Windows Recycle Bin is TRUE?
You can restore files that have been moved to the Recycle Bin.
Which of the following Windows utility programs arranges files on your hard drive in sequential order
Disk Defragmenter
Mac OS X Snow Leopard includes a backup utility called ________.
Time Machine
Which of the following is NOT a degree that prepares students for IT careers?
ACM
All of the following can be considered to be network operating systems EXCEPT
Symbian OS.
If you want to save a file that will be opened by people who use a wide variety of software, any of the following formats would be safe EXCEPT ________.
.docx
In Windows, which character is used as a path separator?
backslash (\)
Network, database, and Web server administrators are generally considered part of the ________ department.
information systems
Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS
device driver
All of the following can be used in a Windows file name EXCEPT:
*.
Windows 7 introduces the concept of ________, which are folders that gather files from different locations and display the files as if they were all saved in a single folder.
libraries
All of the following are forms of RAM EXCEPT:
XRAM.
Which statement pertaining to system reliability is FALSE?
An accumulation of temporary Internet files has no effect on your computer's overall performance.
Notebooks are often equipped with a(n) ________ slot that allows you to read flash memory cards such as CompactFlash, Memory Sticks, and Secure Digital cards.
ExpressCard
Kernel memory is ________.
RAM memory used by the operating system
Moore's Law is a rule that predicts ________.
the pace at which CPUs improve
The CPU is connected to the system memory by the ________.
front side bus
Windows 7 incorporates ________, which enables you to migrate files and settings from a Windows Vista system to a Windows 7 system via a network connection.
Windows Easy Transfer
CPU speed, also called clock speed, is measured in ________.
gigahertz
Which of the following statements is true about optical media?
A Blu-ray burner will most likely burn both CDs and DVDs.
To make sure your computer performs reliably, you can do all of the following EXCEPT:
increase the front side bus speed.
________ provides high-speed information processing by enabling a new set of instructions to start before the previous set has been finished.
Hyperthreading
Front side bus speed is measured in ________.
megahertz
The control unit is one component of the ________.
CPU
The amount of RAM recommended for most systems today is measured in ________.
GB
When referring to hard drives, seek time and latency are the two factors that make up ________.
access time
A video card is an expansion card installed inside your ________.
system unit
The small circuit boards that hold a series of RAM chips are called ________.
memory modules
A ________ performs the same kind of computational work that a CPU performs but is specialized to handle 3-D graphics and image and video processing.
GPU
Running the Disk Defragmenter utility will ________.
make the hard drive work more efficiently.
The CPU consists of which two parts?
the control unit and the arithmetic logic unit
On a Windows system, you can determine the amount of RAM by looking in the ________ window.
System Properties
Cache memory levels are determined by ________.
the chip's proximity to the CPU
The percentage of time your CPU is working is referred to as CPU ________.
usage
Each of the following is a computer subsystem EXCEPT the:
data subsystem.
Which of the following activities is carried out by the ALU?
completion of all arithmetic calculations
Running the Disk Cleanup utility is a quick way to ________.
clear out unnecessary files
The amount of RAM that is actually on the memory modules in your computer is the ________ memory.
physical
An expansion card that translates binary data into images is a(n) ________.
video card
Two types of video memory are ________.
GDDR3 and GDDR5
When referring to hard drives, access time is measured in ________.
milliseconds
Which is the fastest type of optical drive on the market?
Blu-ray drives
Which of the following is NOT a main characteristic associated with desktop computers as compared to notebooks?
A desktop computer is more expensive.
All of the following are advantages of notebook computers EXCEPT:
you get more speed for a lower price.
Which of the following devices translates electronic data into radio waves?
a transceiver
The ________ is the maximum speed at which data can be transmitted between two nodes on a network.
data transfer rate
A wireless network uses which of the following as its transmission medium?
radio waves
Which of the following UTP cable types is the cheapest and often used in home networks?
Cat 5E
Sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network?
routers and switches
Throughput, the actual speed of data transfer that is achieved in a network, is usually ________.
less than or equal to the data transfer rate
When setting up a network, you should set up any computers running the Microsoft Windows 7 operating system ________.
first
WPA stands for ________.
WiFi Protected Access
A(n) ________ allows sharing of a broadband Internet connection.
router
Normal telephone wire is ________.
twisted-pair cable
Due to the expansion of media files on home computers, ________ options are now being marketed; however, they are not as full featured as their business-world counterparts.
home network server
Which of the following devices is needed to share an Internet connection on a wireless network?
a wireless router
One way to increase security on a network is by installing a ________.
firewall
Most ________ allow you to connect wireless and wired computers to the same network.
wireless routers
A ________ is a network located in your home that is used to connect all of your digital devices.
HAN
A network that has 10 or more nodes is usually configured as a ________.
client/server network
Client/server networks are controlled by a central server that runs a specialized piece of software called ________.
a network operating system (NOS)
A(n) ________ keeps track of data packets and, in conjunction with network interface cards, helps the data packets find their destination without running into each other on an Ethernet network.
switch
Which of the following is necessary if you want your Ethernet network to connect to the Internet through a DSL or cable modem?
a DSL/cable router
Which transmission medium is able to transmit data the fastest?
fiber-optic cable
Network adapters ________.
enable nodes in a network to communicate with each other
The most common type of home network is ________.
a peer-to-peer (P2P) network
Network architectures are classified according to ________.
the way they are controlled and the distance between their nodes
The most popular transmission media option for wired Ethernet networks is ________.
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.
Which of the following is NOT an example of a network node?
a mouse
Which of the following is NOT an example of a WAN?
LANs connected in a single building
A computer network is defined as two or more computers connected with ________ so that they can communicate with each other.
software and hardware
Which of the following network adapters is most likely to be preinstalled in a typical notebook computer today?
both a wireless and wired network adapter
Text prediction ________ provide a list of popular words and save typing time when using text messaging.
algorithms
Images are a representation of light waves called ________ or continuous waves.
analog
Opera Mobile is an example of ________.
a microbrowser
SMS delivers messages to the appropriate mobile device using ________ technology.
store-and-forward
Which of the following uses radio waves to transmit data signals over short distances and does not need a direct line of sight?
Bluetooth
Which of the following statements is NOT true about the JPEG file format?
JPEGs are larger than raw files.
A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.
digital signal processor
The operating system of a cell phone is stored in ________.
ROM
Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?
sampling rate
Web content specially designed for viewing via a cell phone or smartphone is written in a format called ________.
WML (Wireless Markup Language)
________ is the use of equipment to provide voice communications over a distance.
Telephony
A ________ runs a full-featured operating system and weighs less than two pounds
netbook
Which of the following allows you to download and play music with restrictions enforced about its use?
tethered downloads
_______ is a form of voice-based Internet communication that turns a standard Internet connection into a means to place phone calls, including long-distance calls.
VoIP
________ is a special copyleft license used for software.
GNU
Digital formats are descriptions of signals as ________.
a long string of numbers
An analog-to-digital converter chip ________.
converts the sound waves from a voice into digital signals
The most full-featured and powerful cell phones are put in the category of ________.
smartphones
To transfer files from your computer to a portable media player (PMP), most newer PMPs use a ________ port or a FireWire port.
USB 2.0
The Apple iPhone uses a version of ________ as an operating system.
Mac OS X
________ is a single cable that carries all audio and video information from devices connected to a TV to the TV itself.
HDMI
An iPod is an example of a ________.
portable media player (PMP).
The newest cell/smartphone displays are ________, which allow bright, sharp imaging and draw less power.
OLED
Text messaging is also called ________.
short message service (SMS)
Flash memory, used by most MP3 players, is a type of ________.
nonvolatile memory
What is Symbian?
An operating system for cell/smartphones.
Broadcasting your video to a live audience over the Web is referred to as ________.
webcasting
A portable media player can play files with all of the following file extensions EXCEPT ________.
.doc
A base transceiver station receives a request for cellular service and passes that request to a central location called a ________.
mobile switching center
LogMeIn is an example of a ________.
remote access service for mobile devices
Ensuring that two devices, for example, a PC and a cell phone or smartphone, have the same files is the process of ________.
synchronizing
Which of the following is the process of sharing files between two or more computers?
peer-to-peer (P2P) sharing
Which of the following is specialized software made to display Web pages on a cell phone?
microbrowser
MPEG-4, H.264, and DivX are all examples of ________.
codecs
All of the following are advantages of VoIP EXCEPT:
reliability.
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
A DDoS attack
Which of the following classifications of viruses can change its own code to avoid detection?
polymorphic
A(n) ________ virus runs a program that searches for common data files, compresses them, and makes them unusable.
encryption
________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet.
Spyware
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
virus signature
A cyberspace ________ is an attempt to make someone believe something that is untrue.
hoax
Which of the following statements about cookies is NOT true?
Cookies obtain your personal information by searching your hard drive.
The most likely method a hacker would use to access a computer is ________.
entering through its Internet connection
All of the following approaches can be taken to protect your notebook computer from theft EXCEPT:
installing an external hard drive.
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
cybercrime
A ________ is a virus that is attached to documents such as Word or Excel files.
macro virus
Which of the statements about protecting against power surges is FALSE?
Printers do not require power surge protection.
________ is doing non-work-related activities with a computer while you are being paid to do your job.
Cyberloafing
A(n) ________ virus temporarily erases its code from the files where it resides and then hides in the computer's active memory.
stealth
A ________ works independently of host file execution and is much more active in spreading itself than a virus is.
worm
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?
a Trojan horse
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT:
launch a denial of service (DoS) attack on your computer.
Which type of virus was the famous Michelangelo virus?
a time bomb
A ________ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times.
logic bomb
The purpose of network address translation (NAT) is to ________.
hide user IP addresses from the Internet
All of the following can be used for backing up data files EXCEPT:
RAM.
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.
biometric
During the process of ________ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
inoculation
_______ occurs when a hacker takes control of a Bluetooth-enabled device to make phone calls, read phonebook entries, send and receive text messages, and more.
Bluebugging
Adware and spyware are referred to collectively as ________.
grayware
With regard to computer protection, quarantining is defined as ________.
placing a found virus in a secure area on the hard drive
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
logical port blocking
Which of these statements about physically protecting your computer is FALSE?
Power surges can be blocked by using a computer surround.
Drive-by downloads occur when ________.
a Web site downloads harmful software onto your computer
A computer virus normally attaches itself to another computer program known as a ________.
host program
Using a ________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.
backdoor program
________ makes broadband users more vulnerable to attacks.
Static addressing
Rules for creating passwords include all of the following EXCEPT:
keep your password written down and stored in any easy-to-remember location.
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
engineering
Many ________ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT).
routers
________ encourages Internet users to reveal sensitive information that could lead to identity theft by sending e-mails that look like they are from legitimate companies but are, in fact, fake.
Phishing
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.
keystroke loggers
For complete protection when backing up your files, you should use a program that creates a(n) ________ of your entire system.
image backup
A ________ is a secure Internet pathway that large corporations use to protect sensitive data.
VPN
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________.
a firewall
Small Java-based programs are called ________.
Java applets
Violations of the strict, precise set of rules that define a programming language are called ________.
syntax errors
An alternative approach to systems development, called ________, makes use of a prototype at the beginning of the project.
rapid application development (RAD)
Which of the following statements about pseudocode is TRUE?
It is a text-based approach to documenting an algorithm.
What is the first step of the system development life cycle?
problem and opportunity identification
Which of the following statements about Java is FALSE?
Java can run only on a Windows operating system.
To develop Web-based multimedia, Adobe Flash includes a programming language named ________, which is similar to JavaScript in its keywords, operators, and classes.
ActionScript
The two main types of decision points are the binary decision and the ________.
loop
Translating an algorithm into a programming language is called ________.
coding
Which statement does NOT describe fifth-generation languages?
They use a set of short, English-based commands (such as SUB) that speak directly to the CPU.
Which phase of the system development life cycle explores the problem in depth and develops program specifications?
analysis
Structured Query Language (SQL) is an example of a ________.
ourth-generation language
The loop decision point consists of three features: an initial value, a set of actions to be performed, and a(n) ________.
test condition
Which phase of the system development life cycle generates a detailed plan for programmers to follow?
design
Who is responsible for writing internal documentation for software programs?
technical writers
Which language do programmers use if the problem requires a lot of number crunching?
C++
________ is the process of translating a task into a series of commands that a computer will use to perform that task.
Programming
________ is a text-based approach to documenting an algorithm.
Pseudocode
The language that the CPU understands, consisting of a sequence of bits, is called
machine language.
Which statement about selecting the right programming language for a project is FALSE?
Programming languages require the same amount of time to execute.
Which of the following development environments enables Web sites to talk to each other easily by introducing a standard way for software to interact through Web services?
the .NET framework
________ is the instructions programmers have written in a higher-level language.
________ is the instructions programmers have written in a higher-level language.
In a ________ system, each step is dependent on the previous step being completed first
waterfall
Keywords in a programming language that allow the programmer to redirect the flow of the program based on a decision are called ________.
control structures
The process by which program code is converted into machine language is called ________.
compilation
What is the final step of the system development life cycle?
maintenance and evaluation
A ________ is a visual diagram of a process, including the decisions that need to be made along the way.
flowchart
With object-oriented analysis, programmers identify all the categories of input that are part of the problem into
classes.
A variable declaration tells the operating system to allocate storage space ________.
in RAM
Which language is used for applications that need to collect information from networked computers?
Java
Most integrated development environments (IDEs) include a debugger that ________.
helps programmers find logical errors
BASIC, FORTRAN, COBOL, C++, and Java are all ________-generation languages.
third
Which of the following is taught as the beginning computer language at many colleges and universities?
Java
________ enables users to define their own tags and facilitates exchange of information between Web sites.
XML
During which phase of the system development life cycle are flowcharts and data-flow diagrams developed?
design
Which of the following would NOT be used to build Web sites with interactive capabilities?
Java
Which of the following is/are NOT part of a program's problem statement?
pseudocode, or the text-based approach to documenting the algorithm
A(n) ________ is a set of specific, sequential steps that describe in natural language exactly what the computer must do to complete its task.
algorithm
Which of the following is the first stage of the program development life cycle (PDLC)?
describing the problem
The method of algorithm creation used when a programmer breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks is called:
top-down design.
Decision points consist of binary decisions and ________.
repeating loops
Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a process called ________ programming.
visual
How many steps are there in the system development life cycle?
6
In object-oriented programming, ________ allows a new class to automatically pick up all the data and methods of an existing class.
inheritance
In object-oriented programming, each object from a given class is described by its ________.
data and methods
A(n) ________ error is caught when the program executes.
runtime
________, building a small program model, is a form of rapid application development (RAD).
Prototyping
PROLOG (PROgramming LOGic) is an example of a ________-generation language.
fifth
The binary sequence that instructs the CPU to run the programming code is called a(n) ________.
xecutable program
Which of the following statements describes dynamic decision making?
It is the ability of a Web page to decide how to display itself based on choices the reader makes.
A ________ is a program that a Web site uses to make information available to other Web sites.
Web service
Which of the following is the final stage of the program development life cycle (PDLC)?
implementing the project
________ is a powerful programming language used to build a wide range of Windows applications.
Microsoft Visual Basic
Creating programs with higher-level programming languages that can be easily moved from one type of computer to another provides ________.
portability
Special symbols called tags are used in which of the following languages?
HTML/XHTML
In a database, a record is a ________.
group of related fields
In a database, a video clip would be stored in a(n) ________ field.
object
Which type of database excels in the storage of structured (analytical) data?
relational
Nontraditional data such as audio clips, video clips, pictures, and very large documents are called ________.
unstructured data
When creating a database with a DBMS, you must create a description of the data called the ________.
data dictionary.
In a database, a text field capable of holding complete paragraphs is referred to as a ________ field.
memo
Microsoft ________ is a database management system.
Access
In a database, a field is a ________.
category of information
A data dictionary is also called a ________.
database schema
An example of ________ would be customer demographic data purchased from third parties or statistics compiled by the federal government.
external data
In a transaction-processing system (TPS), if the TPS database is queried and updated while the transaction is taking place, this is called ________.
real-time processing
________ is reordering records in a database.
Sorting
Management information systems provide reports that show conditions that are unusual or need attention from users of the system. These reports are called ________.
exception reports
A ________ displays a subset of data from a table (or tables) based on the criteria specified.
select query
In a database table that stores name and address information, "State" would be an example of a(n) ________.
field name
Customer Relationship Management (CRM) software contains sophisticated databases that are designed to ________ and track all interactions with customers.
manage
Which of the following is NOT a likely primary key?
street address
What does the acronym DBMS stand for?
database management system
________ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table.
Referential integrity
If a college's database maintains a student's major and GPA information in only one place, this is an example of ________.
data centralization
A(n) ________ is designed to improve communications and assist employees in accomplishing their daily tasks.
office support system
________ is the process of reducing data redundancy by recording data only once.
Normalization
A ________ check ensures that the data entered into the database is within a certain range of numbers.
range
A ________ check ensures that the data entered into the database is within a certain range of numbers.
range
The type of information system that uses model management systems is a(n) ________.
decision support system
The ________ indicates what type of data can be stored in a field.
data type
A spreadsheet you create in Microsoft Excel that contains the supplies needed to start the semester is an example of a(n) ________.
list
Which of the following is NOT a database component?
list
In a transaction-processing system, if transaction data is accumulated until a certain point and then many transactions are processed all at once, this is called ________.
batch processing
The speech-recognition feature of Microsoft Windows is an example of a ________.
natural language processing (NLP) system
When you want to extract data from two or more tables, you use a(n) ________ query.
join
To store a Web address, use a(n) ________ field in a database.
hyperlink
A ________ relationship indicates that for each record in a table, there is only one corresponding record in a related table.
one-to-one
________ helps to ensure data integrity by maintaining information in only one place.
Data centralization
Data ________ means that the data contained in a database is accurate and reliable.
integrity
If a college keeps two lists, one for registration and one for overdue library books, both containing name and address information, this is an example of data ________.
redundancy
A data ________ is a large-scale electronic repository of data that contains and organizes all of an organization's data in one place.
warehouse
An individual trained in the design and building of databases is called a database ________.
administrator
An expert system and a natural language processing system are both ________.
knowledge-based systems
If a numeric field has a size of 7, which is the highest number it can hold?
9999999
________ defines the maximum number of characters or numbers that a particular field can hold.
Field size
The most commonly used type of database in the market today is the ________ database.
relational
In Access, the Simple Query Wizard uses ________ to create a query.
SQL
Exception reports and summary reports are part of a(n) ________.
management information system
________ is the branch of computer science that deals with the attempt to create computers that think like humans.
Artificial intelligence
In a data warehouse, data gathered from sales, billing, and inventory departments are examples of ________ sources.
internal data
Which of the following is a reason for creating a list instead of creating a database?
to organize data for simple tasks
Unstructured data such as video clips and pictures are known as ________ because of the way they are encoded.
binary large objects (BLOBs)
Computational fields are a type of database field used to store ________.
formulas
Oracle Database 11g is an example of which type of database?
multidimensional database
Classification, affinity grouping, and estimation are ________ methods used by managers to make their data more meaningful.
data mining
The ________ is the value that the database uses for the field unless the user enters another value.
default value
________ databases can easily be customized to provide information to a variety of users (based on their need) and can process data much faster than pure relational databases
Multidimensional
Data in a multidimensional database is organized in a ________ format.
cube
A database ________ instructs a database to search for particular pieces of data.
query
In a database, ________ fields store numbers used to perform calculations.
numeric
Which of the following statements about object-oriented databases is FALSE?
They store data in table format.
SQL uses ________ to extract records from a database by using English-like expressions that have variables and operations.
relational algebra
A ________ relationship indicates that for a record in one table, there can be many related records in another table.
one-to-many