Create an account
The ________ is the box that contains the central electronic components of the computer.
Which type of software lets you dictate letters, e-mails, and voice commands?
speech recognition software
Which type of software helps managers with tasks such as scheduling charts?
project management software
Software that does "back office" operations and processing functions such as billing, production, inventory management, and human resources management is called ________.
enterprise resource planning software
Which type of software stores client information in one central database for use by sales professionals?
customer relationship management software
Microsoft ________ is software that allows students who have Tablet PCs to write their notes directly onto the tablet, using it as an electronic notebook.
Every software program has a set of ________ that specify the minimum recommended standards for the operating system, processor, RAM, and hard drive capacity.
Custom software, developed to address the needs of a specific company, is known as ________ software.
Which of the following sequences lists the speed of memory from the fastest to the slowest?
registers, Level 1 cache, Level 2 cache, RAM
In a spreadsheet, equations you build yourself using values and cell references are called ________.
All of the commands in an instruction set are written in ________ language, which is easier for humans to work with than binary.
An example of software that includes electronic checkbook registers and automatic bill payment tools is ________.
Which Microsoft program is used to create technical drawings, map basic block diagrams, and more?
Predesigned forms that provide the basic structure for a particular kind of document are known as ________.
The main purpose of the decode stage is for the CPU's ________ to translate program instructions into commands the CPU can understand.
A(n) ________ software installation allows you to decide which features you want to install on the hard drive.
The primary benefit of a spreadsheet program is ________.
its ability to automatically recalculate formulas and functions
Web-based application software is software that ________.
is stored completely on a Web server instead of your hard drive
Software refers to a set of instructions that tells the computer what to do. These instruction sets are called ________.
When available, the best way to remove an unwanted software application is to ________.
use the application's uninstall program
Which type of software is used to keep track of appointments, to-do lists, and telephone numbers?
personal information manager (PIM) software
Adobe Premiere Pro and Microsoft Live Movie Maker are examples of ________ software.
digital video editing
Which file format enables users to share, view, and print any file as long as they have the appropriate program installed?
The organization responsible for rating computer games is the ________.
Entertainment Software Rating Board
Software that is distributed for free, but often with the condition that you pay for it if you like and intend to use it, is called ________.
Podcasts enable you to ________.
broadcast over the Internet using compressed audio and video files such as MP3s and MP4s
One way to mark a Web site so that you can return to it later without typing the address is to ________.
use Favorites or Bookmarks
The Internet backbone refers to ________.
the main pathway of high-speed communications lines through which all Internet traffic flows
________ is a social networking service that enables you to exchange short text messages with your friends or "followers."
E-commerce that involves businesses buying and selling goods and services to other businesses is called ________.
Which of the following is similar to the Windows System Properties dialog box and displays hardware and software information on a Mac?
Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called ________.
What protocol allows files to be transferred from a Web server so that you can view them on your computer using a browser?
Web 2.0 describes ________.
a trend of new Web applications that combine the functionality of multiple applications
A(n) ________ is a keyword or term that is assigned to a piece of information such as a Web page, digital image, or video and describes the site so that it can be found again by browsing or searching.
Which of the following is most likely to be a popular choice for a broadband Internet connection in a rural area?
Instant messaging (IM) services are programs that enable you to ________.
communicate in real time with others who are online
The text version of a Web site's Internet address is called the ________.
Uniform Resource Locator (URL)
A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as a(n) ________.
The agency that first began funding the Internet was called the ________.
Advanced Research Projects Agency Network
In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of
________ is the theory that holds that there is no universal moral truth and that instead there are only beliefs, perspectives, and values.
After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered ________.
________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.
________ ports are now the most common ports for connecting input and output devices to the computer.
Universal serial bus (USB)
________ is a form of permanent memory that holds all the instructions the computer needs to start up.
The type of monitor that looks like a traditional television set is called a ________ monitor.
cathode-ray tube (CRT)
Which of the following is NOT one of the four major data processing functions of a computer?
analyzing the data or information
________ is the applied science concerned with designing and arranging things that people use so that the people and things interact most efficiently and safely.
Devices such as monitors and printers that are connected to the computer are called ________.
________ is a power mode that allows the computer to save an image of the desktop to the hard drive and enter a state of reduced power consumption to save energy.
________ software is the set of programs that enables the computer's hardware devices and application software to work together.
Large, expensive computers that support hundreds of users simultaneously are called ________.
A(n) ________ enables you to enter data (text, images, and sound) and instructions (user responses and commands) into the computer.
________ plug into slots on the motherboard and provide additional functionality for your computer.
________ are large printers used to produce oversize pictures that require precise continuous lines, such as maps and architectural plans.
Which of the following ethical philosophies states that decision making should be based on the particular circumstances and not on fixed laws?
The hard disk drive is a ________ storage device, meaning that it stores data permanently.
The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a ________.
A ________ is a portable computer that features a touch-sensitive screen and handwriting recognition software.
________ is the place in a computer where the programs and data the computer is currently using are stored.
USB ports are fast replacing traditional ________ ports because of their ability to transfer data quickly.
parallel and serial
Intellectual property (such as music, writing, and software) is protected through ________ law.
A person who does not conform to a set of approved standards of social or professional behavior ________.
commits unethical behavio
________ are a form of permanent storage that can be seen and accessed from outside the system unit and are typically used for CD and DVD drives.
External drive bays
A ________ enables your computer to connect to other computers or to the Internet.
network interface card (NIC)
The ________ is used in combination with other keys to perform shortcuts and special tasks.
Control (Ctrl) key
Social media sites are about sharing information. The use of this information can raise questions regarding ________.
The S-video and the ________ ports on a computer facilitate connecting the computer to multimedia devices such as TVs and DVD players.
Monitor screen grids are made up of millions of pixels, with each pixel containing ________ subpixels of colors.
The term ________ describes computing devices or peripherals that use techniques, parts, and methods from an earlier time that are no longer popular.
A(n) ________ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system.
Google restricting its search engine services in China by not allowing search results for sites considered objectionable by the Chinese government is an example of ________.
________ is the set of computer programs that enables the hardware to perform different tasks.
The ________, housed inside the system unit, regulates the wall voltage to the voltages required by the computer chips.
The ________ requires companies to provide mechanisms for employees and third parties to anonymously report complaints, including ethics violations.
A ________ is a special device that is installed in your computer and allows it to communicate with other devices on the network.
Which of the following is NOT necessarily part of being computer literate?
being able to build a computer
________ is a type of wireless communication that transmits data through radio waves.
Technology no longer protected by copyright, available to everyone, is considered to be ________.
in the public domain
The ________ computer had switches on the front of it, which were used to enter data using 0s and 1s.
Many online courses are designed to use management software like ________ so that students can communicate outside of class, take quizzes online, and find their class materials easily.
Blackboard or Moodle
The goal of ________ is to provide solutions to physical problems, such as providing sight to the blind.
biomedical chip research
The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement specialty called ________.
________ is the study of molecules and structures whose sizes range from 1 to 100 nanometers.
Children who do not have access to ________ and ________ won't be prepared for future employment.
the Internet, computers
What programming language revolutionized the software industry because beginning students could learn it easily?
By studying the data produced by ________, scientists hope to improve the prediction of weather phenomena.
________ tags are small versions of the roadway electronic toll system used in many states to automate paying tolls as motorists pass through the toll station.
To set up a(n) ________, you must have an appropriate computer and digital devices connected to a home network.
Being ________ means being familiar enough with computers that you understand their capabilities and limitations.
________ is a field of study focused on information handling and retrieval of information automatically.
A ________ is a specially designed scannable sticker that resembles an inkblot and contains all the important information about a UPS package.
________ is the application of computer systems and techniques to gather potential legal evidence.
The Microsoft Authorized Refurbisher program supports refurbishers by allowing ________ to be installed for free on refurbished systems.
certain Microsoft operating systems and Office software
Which of the following do today's educators NOT need to be familiar with to create constructive computerized lessons and to interact with students?
Web authoring software
Medical students can train on ________ and experience firsthand how a human would react to a particular treatment.
One of the reasons the Apple II computer was popular was that ________.
the operating system instructions were stored in ROM
The ________ is a global effort in which bioengineers are creating realistic computer simulations of all systems and features of the human anatomy.
Surgeons use ________ to perform delicate operations by manipulating devices through computers instead of manually.
While engineers work to create computers that can understand us emotionally, ________ are also evolving toward a more human appearance.
When a job is sent to other countries, as many programming jobs have been, it is said to have been ________.
________ tags, when placed on an animal, can be used to record and track in a database all of the animal's movements.
One type of chip already being implanted in humans as a means of verifying a person's identity is called a(n) ________.
A ________ allows you to transfer media from your computer to other media devices (such as a plasma TV).
digital media adapter
Which of the following allowed users to interact with the computer more easily?
the graphical user interface
The difference between people with access to computers and the Internet and those without this access is known as the ________.
The emotional-social prosthesis (ESP) device, developed by a group at the MIT Media Lab, is targeted at helping people who have ________.
________ is the science revolving around building devices on an extremely small scale.
________ is the nerve center of any digital home, allowing you to interface with the different digital devices connected to the network.
The process of searching huge amounts of data with the hope of finding a pattern is called ________.
The ________ is responsible for managing the processor and all other components of the computer system, and is an essential part of the operating system.
The version of Windows 7 that is most appropriate for high-end PC users, gamers, and multimedia professionals is _______.
Windows 7 Ultimate
During the virtual memory process, the operating system moves data to a temporary storage area on the hard drive called the ________ file.
A(n) ________ builds Web pages to deploy the materials that the content creators develop.
When a U.S. company hires a company outside of the United States, they are using a technique called ________.
C:\Documents\Spring 2012\CIS 101\Term Paper\Computer Technology is an example of a ________.
The process of replacing repeated patterns of letters in a file with a shorter placeholder is called ________.
The ________ of the operating system allows the user to communicate with the computer system.
f you want to automatically defragment your hard drive every week, you can set a predetermined time using the ________.
Which of the following is the first step in the boot process?
The BIOS is activated by powering on the CPU.
The OS allows you to organize the contents of your computer in a hierarchical structure of ________.
Which of the following is NOT a function of the operating system?
It manages the removal of spyware.
________ are easy-to-use mini desktop programs that give you information at a glance or quick access to frequently used tools including weather information, calendar items, or games.
Which of the following is NOT a step in the boot process?
The antivirus program checks all files for viruses.
Which of the following was the first widely used operating system installed in personal computers?
In Windows, you can create ________ to reset your system in the case of a malfunction.
When an operating system receives an interrupt from the printer and pauses the CPU, it is performing which of the following functions?
The ________ is a program that manages the data between the operating system and all input and output devices attached to the system.
Which of the following operating systems is used primarily with mainframes as a network operating system?
Which of the following statements about a graphical user interface is FALSE?
A GUI is a command-driven interface.
With Windows Explorer, you can perform all of the following file management actions EXCEPT:
________ staff the phones, respond to Internet live chat, or respond to e-mail and solve problems for customers or employees, either remotely or in person.
The ________ contains all of the different configurations used by the OS and by other applications.
The combination of operating system and processor in a computer is referred to as a computer's ________.
Programmers, systems analysts, project managers, and technical writers are generally considered part of a(n) ________ team.
When a U.S. business hires a third party within the United States to provide services they offer to their customers, it is called ________.
The ________ manages the flow of data and information through the computer system by coordinating the hardware, software, user interface, processor, and system memory.
An IT professional working a(n) ________-based job reports for work to the same location each day and interacts with the same people on a regular basis.
When your computer is in Safe mode, you can use the ________ to view and change the properties of all devices attached to the computer.
Which of the following types of programs help manage system resources such as the hard drive?
Which of the following statements concerning the Windows Recycle Bin is TRUE?
You can restore files that have been moved to the Recycle Bin.
Which of the following Windows utility programs arranges files on your hard drive in sequential order
If you want to save a file that will be opened by people who use a wide variety of software, any of the following formats would be safe EXCEPT ________.
Network, database, and Web server administrators are generally considered part of the ________ department.
Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS
Windows 7 introduces the concept of ________, which are folders that gather files from different locations and display the files as if they were all saved in a single folder.
Which statement pertaining to system reliability is FALSE?
An accumulation of temporary Internet files has no effect on your computer's overall performance.
Notebooks are often equipped with a(n) ________ slot that allows you to read flash memory cards such as CompactFlash, Memory Sticks, and Secure Digital cards.
Windows 7 incorporates ________, which enables you to migrate files and settings from a Windows Vista system to a Windows 7 system via a network connection.
Windows Easy Transfer
Which of the following statements is true about optical media?
A Blu-ray burner will most likely burn both CDs and DVDs.
To make sure your computer performs reliably, you can do all of the following EXCEPT:
increase the front side bus speed.
________ provides high-speed information processing by enabling a new set of instructions to start before the previous set has been finished.
When referring to hard drives, seek time and latency are the two factors that make up ________.
A ________ performs the same kind of computational work that a CPU performs but is specialized to handle 3-D graphics and image and video processing.
On a Windows system, you can determine the amount of RAM by looking in the ________ window.
Which of the following activities is carried out by the ALU?
completion of all arithmetic calculations
The amount of RAM that is actually on the memory modules in your computer is the ________ memory.
Which of the following is NOT a main characteristic associated with desktop computers as compared to notebooks?
A desktop computer is more expensive.
All of the following are advantages of notebook computers EXCEPT:
you get more speed for a lower price.
The ________ is the maximum speed at which data can be transmitted between two nodes on a network.
data transfer rate
Sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network?
routers and switches
Throughput, the actual speed of data transfer that is achieved in a network, is usually ________.
less than or equal to the data transfer rate
When setting up a network, you should set up any computers running the Microsoft Windows 7 operating system ________.
Due to the expansion of media files on home computers, ________ options are now being marketed; however, they are not as full featured as their business-world counterparts.
home network server
Which of the following devices is needed to share an Internet connection on a wireless network?
a wireless router
Most ________ allow you to connect wireless and wired computers to the same network.
A ________ is a network located in your home that is used to connect all of your digital devices.
Client/server networks are controlled by a central server that runs a specialized piece of software called ________.
a network operating system (NOS)
A(n) ________ keeps track of data packets and, in conjunction with network interface cards, helps the data packets find their destination without running into each other on an Ethernet network.
Which of the following is necessary if you want your Ethernet network to connect to the Internet through a DSL or cable modem?
a DSL/cable router
Network architectures are classified according to ________.
the way they are controlled and the distance between their nodes
The most popular transmission media option for wired Ethernet networks is ________.
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.
A computer network is defined as two or more computers connected with ________ so that they can communicate with each other.
software and hardware
Which of the following network adapters is most likely to be preinstalled in a typical notebook computer today?
both a wireless and wired network adapter
Text prediction ________ provide a list of popular words and save typing time when using text messaging.
Which of the following uses radio waves to transmit data signals over short distances and does not need a direct line of sight?
Which of the following statements is NOT true about the JPEG file format?
JPEGs are larger than raw files.
A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.
digital signal processor
Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?
Web content specially designed for viewing via a cell phone or smartphone is written in a format called ________.
WML (Wireless Markup Language)
Which of the following allows you to download and play music with restrictions enforced about its use?
_______ is a form of voice-based Internet communication that turns a standard Internet connection into a means to place phone calls, including long-distance calls.
An analog-to-digital converter chip ________.
converts the sound waves from a voice into digital signals
To transfer files from your computer to a portable media player (PMP), most newer PMPs use a ________ port or a FireWire port.
________ is a single cable that carries all audio and video information from devices connected to a TV to the TV itself.
The newest cell/smartphone displays are ________, which allow bright, sharp imaging and draw less power.
A portable media player can play files with all of the following file extensions EXCEPT ________.
A base transceiver station receives a request for cellular service and passes that request to a central location called a ________.
mobile switching center
Ensuring that two devices, for example, a PC and a cell phone or smartphone, have the same files is the process of ________.
Which of the following is the process of sharing files between two or more computers?
peer-to-peer (P2P) sharing
Which of the following is specialized software made to display Web pages on a cell phone?
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
A DDoS attack
Which of the following classifications of viruses can change its own code to avoid detection?
A(n) ________ virus runs a program that searches for common data files, compresses them, and makes them unusable.
________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet.
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
Which of the following statements about cookies is NOT true?
Cookies obtain your personal information by searching your hard drive.
The most likely method a hacker would use to access a computer is ________.
entering through its Internet connection
All of the following approaches can be taken to protect your notebook computer from theft EXCEPT:
installing an external hard drive.
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
Which of the statements about protecting against power surges is FALSE?
Printers do not require power surge protection.
________ is doing non-work-related activities with a computer while you are being paid to do your job.
A(n) ________ virus temporarily erases its code from the files where it resides and then hides in the computer's active memory.
A ________ works independently of host file execution and is much more active in spreading itself than a virus is.
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?
a Trojan horse
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT:
launch a denial of service (DoS) attack on your computer.
A ________ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times.
The purpose of network address translation (NAT) is to ________.
hide user IP addresses from the Internet
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.
During the process of ________ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
_______ occurs when a hacker takes control of a Bluetooth-enabled device to make phone calls, read phonebook entries, send and receive text messages, and more.
With regard to computer protection, quarantining is defined as ________.
placing a found virus in a secure area on the hard drive
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
logical port blocking
Which of these statements about physically protecting your computer is FALSE?
Power surges can be blocked by using a computer surround.
A computer virus normally attaches itself to another computer program known as a ________.
Using a ________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.
Rules for creating passwords include all of the following EXCEPT:
keep your password written down and stored in any easy-to-remember location.
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
Many ________ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT).
________ encourages Internet users to reveal sensitive information that could lead to identity theft by sending e-mails that look like they are from legitimate companies but are, in fact, fake.
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.
For complete protection when backing up your files, you should use a program that creates a(n) ________ of your entire system.
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________.
Violations of the strict, precise set of rules that define a programming language are called ________.
An alternative approach to systems development, called ________, makes use of a prototype at the beginning of the project.
rapid application development (RAD)
Which of the following statements about pseudocode is TRUE?
It is a text-based approach to documenting an algorithm.
Which of the following statements about Java is FALSE?
Java can run only on a Windows operating system.
Which statement does NOT describe fifth-generation languages?
They use a set of short, English-based commands (such as SUB) that speak directly to the CPU.
Which phase of the system development life cycle explores the problem in depth and develops program specifications?
The loop decision point consists of three features: an initial value, a set of actions to be performed, and a(n) ________.
Which phase of the system development life cycle generates a detailed plan for programmers to follow?
________ is the process of translating a task into a series of commands that a computer will use to perform that task.
The language that the CPU understands, consisting of a sequence of bits, is called
Which statement about selecting the right programming language for a project is FALSE?
Programming languages require the same amount of time to execute.
Which of the following development environments enables Web sites to talk to each other easily by introducing a standard way for software to interact through Web services?
the .NET framework
________ is the instructions programmers have written in a higher-level language.
________ is the instructions programmers have written in a higher-level language.
Keywords in a programming language that allow the programmer to redirect the flow of the program based on a decision are called ________.
The process by which program code is converted into machine language is called ________.
A ________ is a visual diagram of a process, including the decisions that need to be made along the way.
With object-oriented analysis, programmers identify all the categories of input that are part of the problem into
Which language is used for applications that need to collect information from networked computers?
Most integrated development environments (IDEs) include a debugger that ________.
helps programmers find logical errors
Which of the following is taught as the beginning computer language at many colleges and universities?
________ enables users to define their own tags and facilitates exchange of information between Web sites.
During which phase of the system development life cycle are flowcharts and data-flow diagrams developed?
Which of the following is/are NOT part of a program's problem statement?
pseudocode, or the text-based approach to documenting the algorithm
A(n) ________ is a set of specific, sequential steps that describe in natural language exactly what the computer must do to complete its task.
Which of the following is the first stage of the program development life cycle (PDLC)?
describing the problem
The method of algorithm creation used when a programmer breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks is called:
Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a process called ________ programming.
In object-oriented programming, ________ allows a new class to automatically pick up all the data and methods of an existing class.
In object-oriented programming, each object from a given class is described by its ________.
data and methods
________, building a small program model, is a form of rapid application development (RAD).
The binary sequence that instructs the CPU to run the programming code is called a(n) ________.
Which of the following statements describes dynamic decision making?
It is the ability of a Web page to decide how to display itself based on choices the reader makes.
A ________ is a program that a Web site uses to make information available to other Web sites.
Which of the following is the final stage of the program development life cycle (PDLC)?
implementing the project
________ is a powerful programming language used to build a wide range of Windows applications.
Microsoft Visual Basic
Creating programs with higher-level programming languages that can be easily moved from one type of computer to another provides ________.
Nontraditional data such as audio clips, video clips, pictures, and very large documents are called ________.
When creating a database with a DBMS, you must create a description of the data called the ________.
In a database, a text field capable of holding complete paragraphs is referred to as a ________ field.
An example of ________ would be customer demographic data purchased from third parties or statistics compiled by the federal government.
In a transaction-processing system (TPS), if the TPS database is queried and updated while the transaction is taking place, this is called ________.
Management information systems provide reports that show conditions that are unusual or need attention from users of the system. These reports are called ________.
A ________ displays a subset of data from a table (or tables) based on the criteria specified.
In a database table that stores name and address information, "State" would be an example of a(n) ________.
Customer Relationship Management (CRM) software contains sophisticated databases that are designed to ________ and track all interactions with customers.
________ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table.
If a college's database maintains a student's major and GPA information in only one place, this is an example of ________.
A(n) ________ is designed to improve communications and assist employees in accomplishing their daily tasks.
office support system
A ________ check ensures that the data entered into the database is within a certain range of numbers.
A ________ check ensures that the data entered into the database is within a certain range of numbers.
The type of information system that uses model management systems is a(n) ________.
decision support system
A spreadsheet you create in Microsoft Excel that contains the supplies needed to start the semester is an example of a(n) ________.
In a transaction-processing system, if transaction data is accumulated until a certain point and then many transactions are processed all at once, this is called ________.
The speech-recognition feature of Microsoft Windows is an example of a ________.
natural language processing (NLP) system
A ________ relationship indicates that for each record in a table, there is only one corresponding record in a related table.
________ helps to ensure data integrity by maintaining information in only one place.
If a college keeps two lists, one for registration and one for overdue library books, both containing name and address information, this is an example of data ________.
A data ________ is a large-scale electronic repository of data that contains and organizes all of an organization's data in one place.
An individual trained in the design and building of databases is called a database ________.
An expert system and a natural language processing system are both ________.
________ defines the maximum number of characters or numbers that a particular field can hold.
________ is the branch of computer science that deals with the attempt to create computers that think like humans.
In a data warehouse, data gathered from sales, billing, and inventory departments are examples of ________ sources.
Which of the following is a reason for creating a list instead of creating a database?
to organize data for simple tasks
Unstructured data such as video clips and pictures are known as ________ because of the way they are encoded.
binary large objects (BLOBs)
Classification, affinity grouping, and estimation are ________ methods used by managers to make their data more meaningful.
The ________ is the value that the database uses for the field unless the user enters another value.
________ databases can easily be customized to provide information to a variety of users (based on their need) and can process data much faster than pure relational databases
Which of the following statements about object-oriented databases is FALSE?
They store data in table format.
SQL uses ________ to extract records from a database by using English-like expressions that have variables and operations.
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together