Trojans are computer programs that seem to perform one function while actually doing something else
To assure you can remember your password it is a good idea to base it on information you can easily remember such as your birthday
A computer is a multiple purpose device that can do all of the following EXCEPT ____
The master controller for all activities that take place within a computer is ____
the operating system
A(n) ____ is a microprocessor-based computing device designed to meet the computing needs of an individual
A super-thin slice of semiconducting material packed with microscopic circuit elements is a(n) ____
all of the above
The type of data where text, numbers, graphics, sound, and video have been converted into discrete digits as represented in the accompanying figure is ____
The type of data that is represented using an infinite scale of values as represented in the accompanying figure is ____
The ____ is the part of the microprocessor that performs arithmetic operations, as shown in the accompanying figure
Cloud computing is the term given to analyzing cloud patterns and, with the help of the computer, predicting the weather
____ are intended to work within LANs to monitor and direct packets being transported from one device to another
The accompanying figure represents the connection of your computer to the Internet
the router marked A should belong to a(n) ____; ISP
Digital audio is music, speech, and other sounds represented in a binary format for use in digital devices
Solid state storage cards hold data without consuming power, so they do not lose data when the camera is turned off
CDs with copy protection cannot be duplicated, and music that is ripped to another format does not play back correctly
if you have dialed Directory Assistance lately to obtain a telephone number, you have probably encountered ____
You have just decreased the number of pixels, resolution, and file size of your graphic by selecting a portion of the image. What have you done to your graphic?
You have cropped your graphic.
A vector graphic can quite easily be converted into a bitmap graphic through a process called ____
You can use a scanner, like the one in the accompanying figure, to convert a printed image into a bitmap graphic
When you increase the resolution of an existing graphic, as illustrated in the accompanying figure, the file size decreases
With images that contain strong curved or diagonal lines, pixel interpolation can result in ____ effects, such as those in the accompanying figure
A vector graphic, like the one shown in the accompanying figure, resizes better than a comparable bitmap graphic
The computer industry encompasses those companies that manufacture computers and computer components
An experimental device that typically must be further developed and perfected before going into production is called a(n) ____
The life cycle of a new computer product is shown in the accompanying figure, in which box B represents ____
The life cycle of a new computer product is shown in the accompanying figure, in which box C represents ____
The accompanying figure represents computer and software marketing channels. In that figure, Box A represents ____
In a fixed-length field, when the data entered is shorter than the allocated field length, blank spaces automatically fill the field
If a name field contains an entire name, it is difficult to individually manipulate the first name, last name, and middle initial
The data accessed by data mining and other analysis techniques is often stored in a data ____
in the accompanying figure, the relationship shown in the top row is a one-to-many relationship
____ is the process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices.
Technology ____ is a process by which several different technologies with distinct functionality evolve to form a single product.
All of the following require both parties to be online at the same time EXCEPT ____.
A set of computer programs that helps a computer monitor itself and function more efficiently is ____.
A(n) ____ converts all the statements in a program in a single batch and the resulting collection of instructions is placed in a new file.
A collection of preprogrammed activities such as addition, subtraction, counting, and comparison is called a(n) ____.
In terms of an authentication protocol, the phrase 'something a person knows' refers to ____.
In terms of an authentication protocol, the phrase 'something a person possesses' could refer to ____.
ATM card or credit card
In terms of an authentication protocol, the phrase 'something a person is' refers to a(n) ____.
biometrics; fingerprint, facial features, retinal pattern
A term which can refer to a person who manipulates computers with malicious intent is a ____.
Black hat or cracker
A hacker posing as a legitimate representative of an official organization such as your bank is an example of ____.
Every domain name corresponds to a unique IP address that has been entered into the ____.
Domain Name System
The ____ protocol allows the transfer of files from one computer to another over any TCP/IP network.
FTP; File Transfer Protocol
A(n) ____ is a device that contains a variety of input and output jacks, plus audio-processing circuitry.
____ is a graphics format with built-in compression that stores True Color bitmap data very efficiently in a small file.
____ can be used to create the illusion of three dimensions by smoothly blending shades from one color to another or from light to dark.
A ____ watermark is a pattern of bits inserted at various places in an image or a content stream that can be used to track, identify, verify, and control content use.
Punched cards were first used for ____.
controlling textile looms & input, processing, and data storage.
The first phase of testing generally carried out by the software publisher's in-house test team is called ____.
White Box Testing
____ refers to hardware manufacturers that sell their products directly to consumers.
A(n) ____ investigates the requirements of a business or organization, its employees, and its customers in order to plan and implement new or improved customer service.
Careers in computer ____ focus on computer architecture and programming computers to make them work effectively and efficiently.
____ degrees focus on the computer equipment and software used by businesses.
Data ____ refers to the process of analyzing information in databases to discover previously unknown and potentially useful information.
____ refers to a branch of data mining that focuses on predicting future probabilities and trends.
Database ____ software is designed to manage billions of records and several hundred transactions per second.
A field ____ rule is a specification that the database designer sets up to filter the data entered into a particular field.
The ____ operator specifies that both of the search criteria must be true for the record to be selected.