COSC 100

Your page rank:

Total word count: 8694
Pages: 32

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

________ is the semiconductor material used to make transistors.


The ________ is the box that contains the central electronic components of the computer.

system unit

Which type of software lets you dictate letters, e-mails, and voice commands?

speech recognition software

CD ripping refers to ________.

encoding CDs to MP3 format

Multimedia software includes all of the following EXCEPT:

utility software.

GPS software allows users to ________.

locate restaurants, airports, and points of interest

Which type of software helps managers with tasks such as scheduling charts?

project management software

Software that does "back office" operations and processing functions such as billing, production, inventory management, and human resources management is called ________.

enterprise resource planning software

The special memory storage areas built into the CPU are called ________.


Which of the following is an example of discounted software?

educational versions of software

Angel and Blackboard are examples of ________.

course management software

The ASCII code can represent ________ unique characters.


In a spreadsheet, the columns and rows form individual boxes called _______.


Which type of software stores client information in one central database for use by sales professionals?

customer relationship management software

Software designed for a specific industry is known as ________ software.

vertical market

The CPU processing cycle has how many steps?


Unicode uses ________ bits to code character data.


Microsoft ________ is software that allows students who have Tablet PCs to write their notes directly onto the tablet, using it as an electronic notebook.


Software you can use to create a budget is called ________.

spreadsheet software

Every software program has a set of ________ that specify the minimum recommended standards for the operating system, processor, RAM, and hard drive capacity.

system requirements

Custom software, developed to address the needs of a specific company, is known as ________ software.


Which of the following sequences lists the speed of memory from the fastest to the slowest?

registers, Level 1 cache, Level 2 cache, RAM

QuarkXPress and Adobe InDesign are examples of ________ software.

desktop publishing

Presentation software includes all of the following features EXCEPT:


In a spreadsheet, equations you build yourself using values and cell references are called ________.


Microsoft Office and Corel WordPerfect Office are examples of ________.

software suites

All of the commands in an instruction set are written in ________ language, which is easier for humans to work with than binary.


An example of software that includes electronic checkbook registers and automatic bill payment tools is ________.

Intuit Quicken

Which Microsoft program is used to create technical drawings, map basic block diagrams, and more?


Predesigned forms that provide the basic structure for a particular kind of document are known as ________.


The cell address F7 indicates that the cell ________.

is at column F, row 7 of the worksheet

Computer-aided design software is used primarily by ________.

engineers to create models

The main purpose of the decode stage is for the CPU’s ________ to translate program instructions into commands the CPU can understand.

control unit

Which type of software is used at colleges to keep track of student records?

database software

A(n) ________ software installation allows you to decide which features you want to install on the hard drive.


The ________ number system uses the digits 0-9 and the symbols A-F.


QuickBooks and Peachtree are examples of ________.

accounting software

Illegally copying an application onto another computer is called ________.

software piracy

Microsoft Word and Writer are examples of ________.

word processing software

The primary benefit of a spreadsheet program is ________.

its ability to automatically recalculate formulas and functions

System software does all of the following EXCEPT ________.

add graphics and pictures to files

Web-based application software is software that ________.

is stored completely on a Web server instead of your hard drive

Software refers to a set of instructions that tells the computer what to do. These instruction sets are called ________.


When available, the best way to remove an unwanted software application is to ________.

use the application’s uninstall program

Software that lets you do tasks at home, school, and work is called ________.

application software

Which type of software is used to keep track of appointments, to-do lists, and telephone numbers?

personal information manager (PIM) software

Adobe Dreamweaver is an example of ________.

Web page authoring software

The collection of commands that a specific CPU executes is called its ________


Which type of software is used to make a slide show?

presentation software

Adobe Premiere Pro and Microsoft Live Movie Maker are examples of ________ software.

digital video editing

Which file format enables users to share, view, and print any file as long as they have the appropriate program installed?


The organization responsible for rating computer games is the ________.

Entertainment Software Rating Board

Software that is distributed for free, but often with the condition that you pay for it if you like and intend to use it, is called ________.


What type of memory stores frequently used instructions or data needed by the CPU?


A byte is composed of ________ bits.


In the URL, the portion labeled .com is the ________.

top-level domain

All of the following are ways to communicate on the Internet EXCEPT:


The "s" in https stands for ________.

secure socket layer

Podcasts enable you to ________.

broadcast over the Internet using compressed audio and video files such as MP3s and MP4s

One way to mark a Web site so that you can return to it later without typing the address is to ________.

use Favorites or Bookmarks

Which of the following is the desktop search feature in Mac OS X Snow Leopard?


If you wanted to keep a written online journal, you would use ________.

a weblog

The Internet backbone refers to ________.

the main pathway of high-speed communications lines through which all Internet traffic flows

________ is a social networking service that enables you to exchange short text messages with your friends or "followers."


E-commerce that involves businesses buying and selling goods and services to other businesses is called ________.


Which of the following is similar to the Windows System Properties dialog box and displays hardware and software information on a Mac?

System Profiler

Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called ________.


Which of the following are personal video journal entries posted on the Web?


Which of the following is a free Web authoring suite?


The Internet2 is a project ________.

to develop new Internet technologies

You can keep track of IM contacts by using a ________.

buddy list

The name of the free Internet browser from Mozilla is ________.


Facebook and MySpace are considered to be ________.

social networking Web sites

What protocol allows files to be transferred from a Web server so that you can view them on your computer using a browser?


Web 2.0 describes ________.

a trend of new Web applications that combine the functionality of multiple applications

A(n) ________ is a keyword or term that is assigned to a piece of information such as a Web page, digital image, or video and describes the site so that it can be found again by browsing or searching.


A set of programs that searches the Web to find information is called a ________.

search engine

Which of the following is most likely to be a popular choice for a broadband Internet connection in a rural area?


The large scale networking (LSN) project is ________.

a U.S. government Internet research project

Which of the following is NOT a type of broadband Internet connection?


Which of the following is an open source operating system?


A Web site that allows anyone to add or edit content is called a ________.


Search engines have which three parts?

a spider, an indexer, and search engine software

When building your own computer, which of the following is NOT required?

a router

RSS stands for ________.

Really Simple Syndication

Instant messaging (IM) services are programs that enable you to ________.

communicate in real time with others who are online

The Internet is ________.

a large network of networks

The text version of a Web site’s Internet address is called the ________.

Uniform Resource Locator (URL)

Which of the following is free software to create or edit digital art?


The World Wide Web was invented by ________.

Tim Berners-Lee at CERN

OpenOffice 3 includes all of the following components EXCEPT:


Podcasts use which of the following technologies?


A webcast is ________.

the broadcast of audio or video content over the Internet

A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as a(n) ________.

breadcrumb trail

The concept of the Internet developed from ________.

the Cold War crisis

All of the following are examples of multimedia EXCEPT:


In the URL, the portion labeled http is the ________.


Which of the following provides the highest speed Internet connection?


The default file format for saving a spreadsheet in Calc is ________.


The advantage of a dial-up Internet connection is ________.

low cost

HTTP is the abbreviation for ________.

hypertext transfer protocol

All of the following are parts of a URL EXCEPT:


Webcasts differ from podcasts in that webcasts ________.

are not updated automatically

The agency that first began funding the Internet was called the ________.

Advanced Research Projects Agency Network

________ microphones pick up sound from only one direction.


Computers gather data, which means that they allow users to ________ data.


In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of

eight bits.

Inkjet printers and laser printers are examples of ________ printers.


________ is the theory that holds that there is no universal moral truth and that instead there are only beliefs, perspectives, and values.


After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered ________.


A ________ is approximately 1 million bytes


________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.


________ ports are now the most common ports for connecting input and output devices to the computer.

Universal serial bus (USB)

________ is a form of permanent memory that holds all the instructions the computer needs to start up.


________ printers have tiny hammer-like keys that strike the paper through an inked ribbon.


Computers process data into information by working exclusively with ________.


The type of monitor that looks like a traditional television set is called a ________ monitor.

cathode-ray tube (CRT)

Which of the following is NOT one of the four major data processing functions of a computer?

analyzing the data or information

________ is the applied science concerned with designing and arranging things that people use so that the people and things interact most efficiently and safely.


Devices such as monitors and printers that are connected to the computer are called ________.

peripheral devices

The ________ contains the central electronic components of the computer.


________ is a power mode that allows the computer to save an image of the desktop to the hard drive and enter a state of reduced power consumption to save energy.


Which of the following is an example of an input device?

a scanner

________ software is the set of programs that enables the computer’s hardware devices and application software to work together.


Large, expensive computers that support hundreds of users simultaneously are called ________.


A(n) ________ enables you to enter data (text, images, and sound) and instructions (user responses and commands) into the computer.

input device

All of the following are types of cyberbullying EXCEPT:

calling a co-worker to schedule a meeting

________ plug into slots on the motherboard and provide additional functionality for your computer.

Expansion cards

Restarting a computer when it is already powered on is called ________.

a warm boot

________ are large printers used to produce oversize pictures that require precise continuous lines, such as maps and architectural plans.


Which of the following ethical philosophies states that decision making should be based on the particular circumstances and not on fixed laws?

situational ethics

A ________ is approximately 1 billion bytes.


A(n) ________ uses an internal sensor or laser to detect the mouse’s movement.

optical mouse

The ________ language consists of just two digits: 0 and 1.


The hard disk drive is a ________ storage device, meaning that it stores data permanently.


The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a ________.

touch pad

A ________ is a portable computer that features a touch-sensitive screen and handwriting recognition software.

Tablet PC

________ is the place in a computer where the programs and data the computer is currently using are stored.


Any computer parts that you can actually touch are considered to be ________.


USB ports are fast replacing traditional ________ ports because of their ability to transfer data quickly.

parallel and serial

Intellectual property (such as music, writing, and software) is protected through ________ law.


The ________ port resembles a standard phone jack.


A person who does not conform to a set of approved standards of social or professional behavior ________.

commits unethical behavio

________ are a form of permanent storage that can be seen and accessed from outside the system unit and are typically used for CD and DVD drives.

External drive bays

A ________ enables your computer to connect to other computers or to the Internet.

network interface card (NIC)

The ________ is used in combination with other keys to perform shortcuts and special tasks.

Control (Ctrl) key

________ is data that has been organized or presented in a meaningful fashion.


Social media sites are about sharing information. The use of this information can raise questions regarding ________.

personal privacy

The term "bit" is short for ________.

binary digit

The S-video and the ________ ports on a computer facilitate connecting the computer to multimedia devices such as TVs and DVD players.


A(n) ________ is a device that looks like a skinny pen but has no ink.


________ binary digits (or bits) combine to create one byte.


Flash drives plug into a(n) ________.

USB port

Monitor screen grids are made up of millions of pixels, with each pixel containing ________ subpixels of colors.


The term ________ describes computing devices or peripherals that use techniques, parts, and methods from an earlier time that are no longer popular.

legacy technology

A(n) ________ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system.


Google restricting its search engine services in China by not allowing search results for sites considered objectionable by the Chinese government is an example of ________.


________ is the set of computer programs that enables the hardware to perform different tasks.


RAM is considered volatile storage, which means it is ________.


The ________, housed inside the system unit, regulates the wall voltage to the voltages required by the computer chips.

power supply

All the following are examples of input devices EXCEPT a ________.


The ________ requires companies to provide mechanisms for employees and third parties to anonymously report complaints, including ethics violations.

Sarbanes—Oxley Act

Which personal computer was chosen as "machine of the year" by Time magazine?


A ________ is a special device that is installed in your computer and allows it to communicate with other devices on the network.

network adapter

Unwanted e-mail is called ________.


Which of the following is NOT necessarily part of being computer literate?

being able to build a computer

________ is a type of wireless communication that transmits data through radio waves.

Bluetooth technology

What was the first word processing application to be used on personal computers?


Technology no longer protected by copyright, available to everyone, is considered to be ________.

in the public domain

The ________ computer had switches on the front of it, which were used to enter data using 0s and 1s.


Many online courses are designed to use management software like ________ so that students can communicate outside of class, take quizzes online, and find their class materials easily.

Blackboard or Moodle

The ________, weighing 24.5 pounds, was the industry’s first portable computer.


The goal of ________ is to provide solutions to physical problems, such as providing sight to the blind.

biomedical chip research

The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called ________.

computer forensics

________ is the study of molecules and structures whose sizes range from 1 to 100 nanometers.


Children who do not have access to ________ and ________ won’t be prepared for future employment.

the Internet, computers

What programming language revolutionized the software industry because beginning students could learn it easily?


By studying the data produced by ________, scientists hope to improve the prediction of weather phenomena.


The graphical user interface was developed by ________.


________ tags are small versions of the roadway electronic toll system used in many states to automate paying tolls as motorists pass through the toll station.


Many people believe Grace Hopper’s greatest contribution to computing was ________.

the compiler

To set up a(n) ________, you must have an appropriate computer and digital devices connected to a home network.

digital home

Being ________ means being familiar enough with computers that you understand their capabilities and limitations.

computer literate

A ________ is a small device that enables users to carry digital information.


________ is a field of study focused on information handling and retrieval of information automatically.

Information technology

A ________ is a specially designed scannable sticker that resembles an inkblot and contains all the important information about a UPS package.


________ is the application of computer systems and techniques to gather potential legal evidence.

Computer forensics

The Microsoft Authorized Refurbisher program supports refurbishers by allowing ________ to be installed for free on refurbished systems.

certain Microsoft operating systems and Office software

Which of the following do today’s educators NOT need to be familiar with to create constructive computerized lessons and to interact with students?

Web authoring software

Medical students can train on ________ and experience firsthand how a human would react to a particular treatment.

patient simulators

One of the reasons the Apple II computer was popular was that ________.

the operating system instructions were stored in ROM

________ computing relates to emotion or deliberately tries to influence emotion.


The prefix nano stands for ________.


The ________ is a global effort in which bioengineers are creating realistic computer simulations of all systems and features of the human anatomy.

Physiome Project

Surgeons use ________ to perform delicate operations by manipulating devices through computers instead of manually.


All of the following are examples of real security and privacy risks EXCEPT:


While engineers work to create computers that can understand us emotionally, ________ are also evolving toward a more human appearance.

computer systems

When a job is sent to other countries, as many programming jobs have been, it is said to have been ________.


________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.


One type of chip already being implanted in humans as a means of verifying a person’s identity is called a(n) ________.


One potential application of ________ is to provide sight to the blind

biomedical chip implants

A ________ allows you to transfer media from your computer to other media devices (such as a plasma TV).

digital media adapter

Which of the following allowed users to interact with the computer more easily?

the graphical user interface

The difference between people with access to computers and the Internet and those without this access is known as the ________.

digital divide

The first commercial Internet Web browser was developed by ________ in 1995.


A nanometer is ________.

one-billionth of a meter

The emotional-social prosthesis (ESP) device, developed by a group at the MIT Media Lab, is targeted at helping people who have ________.


________ is the science revolving around building devices on an extremely small scale.


________ is the nerve center of any digital home, allowing you to interface with the different digital devices connected to the network.

A computer

The process of searching huge amounts of data with the hope of finding a pattern is called ________.

data mining

In a Windows folder, to display files and folders as icons in list form, use ________ view.


The ________ is responsible for managing the processor and all other components of the computer system, and is an essential part of the operating system.


In Windows, a file path starts with a ________.

drive letter

In the Windows operating system, the hard drive is represented as the ________.

C Drive

The version of Windows 7 that is most appropriate for high-end PC users, gamers, and multimedia professionals is _______.

Windows 7 Ultimate

Which of the following would be a name of a Microsoft Access document.


During the virtual memory process, the operating system moves data to a temporary storage area on the hard drive called the ________ file.


A(n) ________ builds Web pages to deploy the materials that the content creators develop.

Web publisher

Which of the following is a single-user, multitask operating system?

Mac OS

When a U.S. company hires a company outside of the United States, they are using a technique called ________.


XO-1 is the name of the computer being provided by the ________ project.

One Laptop per Child

C:\Documents\Spring 2012\CIS 101\Term Paper\Computer Technology is an example of a ________.

file path

All of the following are terms related to part of the boot process EXCEPT:


Microsoft Windows and Mac OS use a ________ interface.

graphical user

The process of replacing repeated patterns of letters in a file with a shorter placeholder is called ________.

file compression

The ________ of the operating system allows the user to communicate with the computer system.

user interface

f you want to automatically defragment your hard drive every week, you can set a predetermined time using the ________.

Task Scheduler

Which of the following is the first step in the boot process?

The BIOS is activated by powering on the CPU.

The OS allows you to organize the contents of your computer in a hierarchical structure of ________.


Which of the following is NOT a function of the operating system?

It manages the removal of spyware.

You can use the Windows ________ to check on a nonresponsive program.

Task Manager

Some video games require a ________ operating system.


The basic input/output system is stored on a ________ chip.


________ are easy-to-use mini desktop programs that give you information at a glance or quick access to frequently used tools including weather information, calendar items, or games.


Which of the following does NOT occur during the power-on self-test?

The OS is moved into RAM.

Which of the following is a file compression utility?


Which of the following is NOT a step in the boot process?

The antivirus program checks all files for viruses.

The most essential software in your computer system is the ________.

operating system software

Which of the following was the first widely used operating system installed in personal computers?


In Windows, you can create ________ to reset your system in the case of a malfunction.

restore points

When an operating system receives an interrupt from the printer and pauses the CPU, it is performing which of the following functions?

processor management

The ________ is a program that manages the data between the operating system and all input and output devices attached to the system.


Which of the following operating systems is used primarily with mainframes as a network operating system?


Which of the following statements about a graphical user interface is FALSE?

A GUI is a command-driven interface.

With Windows Explorer, you can perform all of the following file management actions EXCEPT:

editing files.

________ staff the phones, respond to Internet live chat, or respond to e-mail and solve problems for customers or employees, either remotely or in person.

Helpdesk analysts

The location of a file is specified by its ________.

file path

The ________ contains all of the different configurations used by the OS and by other applications.


The combination of operating system and processor in a computer is referred to as a computer’s ________.


Programmers, systems analysts, project managers, and technical writers are generally considered part of a(n) ________ team.

systems development

Before upgrading your OS, you should back up your ________.

data files

When a U.S. business hires a third party within the United States to provide services they offer to their customers, it is called ________.


The ________ manages the flow of data and information through the computer system by coordinating the hardware, software, user interface, processor, and system memory.

operating system

An IT professional working a(n) ________-based job reports for work to the same location each day and interacts with the same people on a regular basis.


If Microsoft Word 2010 is used to create a file, which file extension is added automatically?


When your computer is in Safe mode, you can use the ________ to view and change the properties of all devices attached to the computer.

Device Manager

Real-time operating systems can be found in ________.

scientific instruments

Which of the following types of programs help manage system resources such as the hard drive?

utility programs

Which of the following statements concerning the Windows Recycle Bin is TRUE?

You can restore files that have been moved to the Recycle Bin.

Which of the following Windows utility programs arranges files on your hard drive in sequential order

Disk Defragmenter

Mac OS X Snow Leopard includes a backup utility called ________.

Time Machine

Which of the following is NOT a degree that prepares students for IT careers?


All of the following can be considered to be network operating systems EXCEPT

Symbian OS.

If you want to save a file that will be opened by people who use a wide variety of software, any of the following formats would be safe EXCEPT ________.


In Windows, which character is used as a path separator?

backslash (\)

Network, database, and Web server administrators are generally considered part of the ________ department.

information systems

Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS

device driver

All of the following can be used in a Windows file name EXCEPT:


Windows 7 introduces the concept of ________, which are folders that gather files from different locations and display the files as if they were all saved in a single folder.


All of the following are forms of RAM EXCEPT:


Which statement pertaining to system reliability is FALSE?

An accumulation of temporary Internet files has no effect on your computer’s overall performance.

Notebooks are often equipped with a(n) ________ slot that allows you to read flash memory cards such as CompactFlash, Memory Sticks, and Secure Digital cards.


Kernel memory is ________.

RAM memory used by the operating system

Moore’s Law is a rule that predicts ________.

the pace at which CPUs improve

The CPU is connected to the system memory by the ________.

front side bus

Windows 7 incorporates ________, which enables you to migrate files and settings from a Windows Vista system to a Windows 7 system via a network connection.

Windows Easy Transfer

CPU speed, also called clock speed, is measured in ________.


Which of the following statements is true about optical media?

A Blu-ray burner will most likely burn both CDs and DVDs.

To make sure your computer performs reliably, you can do all of the following EXCEPT:

increase the front side bus speed.

________ provides high-speed information processing by enabling a new set of instructions to start before the previous set has been finished.


Front side bus speed is measured in ________.


The control unit is one component of the ________.


The amount of RAM recommended for most systems today is measured in ________.


When referring to hard drives, seek time and latency are the two factors that make up ________.

access time

A video card is an expansion card installed inside your ________.

system unit

The small circuit boards that hold a series of RAM chips are called ________.

memory modules

A ________ performs the same kind of computational work that a CPU performs but is specialized to handle 3-D graphics and image and video processing.


Running the Disk Defragmenter utility will ________.

make the hard drive work more efficiently.

The CPU consists of which two parts?

the control unit and the arithmetic logic unit

On a Windows system, you can determine the amount of RAM by looking in the ________ window.

System Properties

Cache memory levels are determined by ________.

the chip’s proximity to the CPU

The percentage of time your CPU is working is referred to as CPU ________.


Each of the following is a computer subsystem EXCEPT the:

data subsystem.

Which of the following activities is carried out by the ALU?

completion of all arithmetic calculations

Running the Disk Cleanup utility is a quick way to ________.

clear out unnecessary files

The amount of RAM that is actually on the memory modules in your computer is the ________ memory.


An expansion card that translates binary data into images is a(n) ________.

video card

Two types of video memory are ________.


When referring to hard drives, access time is measured in ________.


Which is the fastest type of optical drive on the market?

Blu-ray drives

Which of the following is NOT a main characteristic associated with desktop computers as compared to notebooks?

A desktop computer is more expensive.

All of the following are advantages of notebook computers EXCEPT:

you get more speed for a lower price.

Which of the following devices translates electronic data into radio waves?

a transceiver

The ________ is the maximum speed at which data can be transmitted between two nodes on a network.

data transfer rate

A wireless network uses which of the following as its transmission medium?

radio waves

Which of the following UTP cable types is the cheapest and often used in home networks?

Cat 5E

Sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network?

routers and switches

Throughput, the actual speed of data transfer that is achieved in a network, is usually ________.

less than or equal to the data transfer rate

When setting up a network, you should set up any computers running the Microsoft Windows 7 operating system ________.


WPA stands for ________.

WiFi Protected Access

A(n) ________ allows sharing of a broadband Internet connection.


Normal telephone wire is ________.

twisted-pair cable

Due to the expansion of media files on home computers, ________ options are now being marketed; however, they are not as full featured as their business-world counterparts.

home network server

Which of the following devices is needed to share an Internet connection on a wireless network?

a wireless router

One way to increase security on a network is by installing a ________.


Most ________ allow you to connect wireless and wired computers to the same network.

wireless routers

A ________ is a network located in your home that is used to connect all of your digital devices.


A network that has 10 or more nodes is usually configured as a ________.

client/server network

Client/server networks are controlled by a central server that runs a specialized piece of software called ________.

a network operating system (NOS)

A(n) ________ keeps track of data packets and, in conjunction with network interface cards, helps the data packets find their destination without running into each other on an Ethernet network.


Which of the following is necessary if you want your Ethernet network to connect to the Internet through a DSL or cable modem?

a DSL/cable router

Which transmission medium is able to transmit data the fastest?

fiber-optic cable

Network adapters ________.

enable nodes in a network to communicate with each other

The most common type of home network is ________.

a peer-to-peer (P2P) network

Network architectures are classified according to ________.

the way they are controlled and the distance between their nodes

The most popular transmission media option for wired Ethernet networks is ________.

The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.

Which of the following is NOT an example of a network node?

a mouse

Which of the following is NOT an example of a WAN?

LANs connected in a single building

A computer network is defined as two or more computers connected with ________ so that they can communicate with each other.

software and hardware

Which of the following network adapters is most likely to be preinstalled in a typical notebook computer today?

both a wireless and wired network adapter

Text prediction ________ provide a list of popular words and save typing time when using text messaging.


Images are a representation of light waves called ________ or continuous waves.


Opera Mobile is an example of ________.

a microbrowser

SMS delivers messages to the appropriate mobile device using ________ technology.


Which of the following uses radio waves to transmit data signals over short distances and does not need a direct line of sight?


Which of the following statements is NOT true about the JPEG file format?

JPEGs are larger than raw files.

A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.

digital signal processor

The operating system of a cell phone is stored in ________.


Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?

sampling rate

Web content specially designed for viewing via a cell phone or smartphone is written in a format called ________.

WML (Wireless Markup Language)

________ is the use of equipment to provide voice communications over a distance.


A ________ runs a full-featured operating system and weighs less than two pounds


Which of the following allows you to download and play music with restrictions enforced about its use?

tethered downloads

_______ is a form of voice-based Internet communication that turns a standard Internet connection into a means to place phone calls, including long-distance calls.


________ is a special copyleft license used for software.


Digital formats are descriptions of signals as ________.

a long string of numbers

An analog-to-digital converter chip ________.

converts the sound waves from a voice into digital signals

The most full-featured and powerful cell phones are put in the category of ________.


To transfer files from your computer to a portable media player (PMP), most newer PMPs use a ________ port or a FireWire port.

USB 2.0

The Apple iPhone uses a version of ________ as an operating system.

Mac OS X

________ is a single cable that carries all audio and video information from devices connected to a TV to the TV itself.


An iPod is an example of a ________.

portable media player (PMP).

The newest cell/smartphone displays are ________, which allow bright, sharp imaging and draw less power.


Text messaging is also called ________.

short message service (SMS)

Flash memory, used by most MP3 players, is a type of ________.

nonvolatile memory

What is Symbian?

An operating system for cell/smartphones.

Broadcasting your video to a live audience over the Web is referred to as ________.


A portable media player can play files with all of the following file extensions EXCEPT ________.


A base transceiver station receives a request for cellular service and passes that request to a central location called a ________.

mobile switching center

LogMeIn is an example of a ________.

remote access service for mobile devices

Ensuring that two devices, for example, a PC and a cell phone or smartphone, have the same files is the process of ________.


Which of the following is the process of sharing files between two or more computers?

peer-to-peer (P2P) sharing

Which of the following is specialized software made to display Web pages on a cell phone?


MPEG-4, H.264, and DivX are all examples of ________.


All of the following are advantages of VoIP EXCEPT:


________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

A DDoS attack

Which of the following classifications of viruses can change its own code to avoid detection?


A(n) ________ virus runs a program that searches for common data files, compresses them, and makes them unusable.


________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet.


A(n) ________ is the portion of virus code that is unique to a particular computer virus.

virus signature

A cyberspace ________ is an attempt to make someone believe something that is untrue.


Which of the following statements about cookies is NOT true?

Cookies obtain your personal information by searching your hard drive.

The most likely method a hacker would use to access a computer is ________.

entering through its Internet connection

All of the following approaches can be taken to protect your notebook computer from theft EXCEPT:

installing an external hard drive.

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?


A ________ is a virus that is attached to documents such as Word or Excel files.

macro virus

Which of the statements about protecting against power surges is FALSE?

Printers do not require power surge protection.

________ is doing non-work-related activities with a computer while you are being paid to do your job.


A(n) ________ virus temporarily erases its code from the files where it resides and then hides in the computer’s active memory.


A ________ works independently of host file execution and is much more active in spreading itself than a virus is.


Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?

a Trojan horse

A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT:

launch a denial of service (DoS) attack on your computer.

Which type of virus was the famous Michelangelo virus?

a time bomb

A ________ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times.

logic bomb

The purpose of network address translation (NAT) is to ________.

hide user IP addresses from the Internet

All of the following can be used for backing up data files EXCEPT:


Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.


During the process of ________ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.


_______ occurs when a hacker takes control of a Bluetooth-enabled device to make phone calls, read phonebook entries, send and receive text messages, and more.


Adware and spyware are referred to collectively as ________.


With regard to computer protection, quarantining is defined as ________.

placing a found virus in a secure area on the hard drive

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

logical port blocking

Which of these statements about physically protecting your computer is FALSE?

Power surges can be blocked by using a computer surround.

Drive-by downloads occur when ________.

a Web site downloads harmful software onto your computer

A computer virus normally attaches itself to another computer program known as a ________.

host program

Using a ________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.

backdoor program

________ makes broadband users more vulnerable to attacks.

Static addressing

Rules for creating passwords include all of the following EXCEPT:

keep your password written down and stored in any easy-to-remember location.

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.


Many ________ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT).


________ encourages Internet users to reveal sensitive information that could lead to identity theft by sending e-mails that look like they are from legitimate companies but are, in fact, fake.


Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.

keystroke loggers

For complete protection when backing up your files, you should use a program that creates a(n) ________ of your entire system.

image backup

A ________ is a secure Internet pathway that large corporations use to protect sensitive data.


You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________.

a firewall

Small Java-based programs are called ________.

Java applets

Violations of the strict, precise set of rules that define a programming language are called ________.

syntax errors

An alternative approach to systems development, called ________, makes use of a prototype at the beginning of the project.

rapid application development (RAD)

Which of the following statements about pseudocode is TRUE?

It is a text-based approach to documenting an algorithm.

What is the first step of the system development life cycle?

problem and opportunity identification

Which of the following statements about Java is FALSE?

Java can run only on a Windows operating system.

To develop Web-based multimedia, Adobe Flash includes a programming language named ________, which is similar to JavaScript in its keywords, operators, and classes.


The two main types of decision points are the binary decision and the ________.


Translating an algorithm into a programming language is called ________.


Which statement does NOT describe fifth-generation languages?

They use a set of short, English-based commands (such as SUB) that speak directly to the CPU.

Which phase of the system development life cycle explores the problem in depth and develops program specifications?


Structured Query Language (SQL) is an example of a ________.

ourth-generation language

The loop decision point consists of three features: an initial value, a set of actions to be performed, and a(n) ________.

test condition

Which phase of the system development life cycle generates a detailed plan for programmers to follow?


Who is responsible for writing internal documentation for software programs?

technical writers

Which language do programmers use if the problem requires a lot of number crunching?


________ is the process of translating a task into a series of commands that a computer will use to perform that task.


________ is a text-based approach to documenting an algorithm.


The language that the CPU understands, consisting of a sequence of bits, is called

machine language.

Which statement about selecting the right programming language for a project is FALSE?

Programming languages require the same amount of time to execute.

Which of the following development environments enables Web sites to talk to each other easily by introducing a standard way for software to interact through Web services?

the .NET framework

________ is the instructions programmers have written in a higher-level language.

________ is the instructions programmers have written in a higher-level language.

In a ________ system, each step is dependent on the previous step being completed first


Keywords in a programming language that allow the programmer to redirect the flow of the program based on a decision are called ________.

control structures

The process by which program code is converted into machine language is called ________.


What is the final step of the system development life cycle?

maintenance and evaluation

A ________ is a visual diagram of a process, including the decisions that need to be made along the way.


With object-oriented analysis, programmers identify all the categories of input that are part of the problem into


A variable declaration tells the operating system to allocate storage space ________.

in RAM

Which language is used for applications that need to collect information from networked computers?


Most integrated development environments (IDEs) include a debugger that ________.

helps programmers find logical errors

BASIC, FORTRAN, COBOL, C++, and Java are all ________-generation languages.


Which of the following is taught as the beginning computer language at many colleges and universities?


________ enables users to define their own tags and facilitates exchange of information between Web sites.


During which phase of the system development life cycle are flowcharts and data-flow diagrams developed?


Which of the following would NOT be used to build Web sites with interactive capabilities?


Which of the following is/are NOT part of a program’s problem statement?

pseudocode, or the text-based approach to documenting the algorithm

A(n) ________ is a set of specific, sequential steps that describe in natural language exactly what the computer must do to complete its task.


Which of the following is the first stage of the program development life cycle (PDLC)?

describing the problem

The method of algorithm creation used when a programmer breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks is called:

top-down design.

Decision points consist of binary decisions and ________.

repeating loops

Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a process called ________ programming.


How many steps are there in the system development life cycle?


In object-oriented programming, ________ allows a new class to automatically pick up all the data and methods of an existing class.


In object-oriented programming, each object from a given class is described by its ________.

data and methods

A(n) ________ error is caught when the program executes.


________, building a small program model, is a form of rapid application development (RAD).


PROLOG (PROgramming LOGic) is an example of a ________-generation language.


The binary sequence that instructs the CPU to run the programming code is called a(n) ________.

xecutable program

Which of the following statements describes dynamic decision making?

It is the ability of a Web page to decide how to display itself based on choices the reader makes.

A ________ is a program that a Web site uses to make information available to other Web sites.

Web service

Which of the following is the final stage of the program development life cycle (PDLC)?

implementing the project

________ is a powerful programming language used to build a wide range of Windows applications.

Microsoft Visual Basic

Creating programs with higher-level programming languages that can be easily moved from one type of computer to another provides ________.


Special symbols called tags are used in which of the following languages?


In a database, a record is a ________.

group of related fields

In a database, a video clip would be stored in a(n) ________ field.


Which type of database excels in the storage of structured (analytical) data?


Nontraditional data such as audio clips, video clips, pictures, and very large documents are called ________.

unstructured data

When creating a database with a DBMS, you must create a description of the data called the ________.

data dictionary.

In a database, a text field capable of holding complete paragraphs is referred to as a ________ field.


Microsoft ________ is a database management system.


In a database, a field is a ________.

category of information

A data dictionary is also called a ________.

database schema

An example of ________ would be customer demographic data purchased from third parties or statistics compiled by the federal government.

external data

In a transaction-processing system (TPS), if the TPS database is queried and updated while the transaction is taking place, this is called ________.

real-time processing

________ is reordering records in a database.


Management information systems provide reports that show conditions that are unusual or need attention from users of the system. These reports are called ________.

exception reports

A ________ displays a subset of data from a table (or tables) based on the criteria specified.

select query

In a database table that stores name and address information, "State" would be an example of a(n) ________.

field name

Customer Relationship Management (CRM) software contains sophisticated databases that are designed to ________ and track all interactions with customers.


Which of the following is NOT a likely primary key?

street address

What does the acronym DBMS stand for?

database management system

________ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table.

Referential integrity

If a college’s database maintains a student’s major and GPA information in only one place, this is an example of ________.

data centralization

A(n) ________ is designed to improve communications and assist employees in accomplishing their daily tasks.

office support system

________ is the process of reducing data redundancy by recording data only once.


A ________ check ensures that the data entered into the database is within a certain range of numbers.


A ________ check ensures that the data entered into the database is within a certain range of numbers.


The type of information system that uses model management systems is a(n) ________.

decision support system

The ________ indicates what type of data can be stored in a field.

data type

A spreadsheet you create in Microsoft Excel that contains the supplies needed to start the semester is an example of a(n) ________.


Which of the following is NOT a database component?


In a transaction-processing system, if transaction data is accumulated until a certain point and then many transactions are processed all at once, this is called ________.

batch processing

The speech-recognition feature of Microsoft Windows is an example of a ________.

natural language processing (NLP) system

When you want to extract data from two or more tables, you use a(n) ________ query.


To store a Web address, use a(n) ________ field in a database.


A ________ relationship indicates that for each record in a table, there is only one corresponding record in a related table.


________ helps to ensure data integrity by maintaining information in only one place.

Data centralization

Data ________ means that the data contained in a database is accurate and reliable.


If a college keeps two lists, one for registration and one for overdue library books, both containing name and address information, this is an example of data ________.


A data ________ is a large-scale electronic repository of data that contains and organizes all of an organization’s data in one place.


An individual trained in the design and building of databases is called a database ________.


An expert system and a natural language processing system are both ________.

knowledge-based systems

If a numeric field has a size of 7, which is the highest number it can hold?


________ defines the maximum number of characters or numbers that a particular field can hold.

Field size

The most commonly used type of database in the market today is the ________ database.


In Access, the Simple Query Wizard uses ________ to create a query.


Exception reports and summary reports are part of a(n) ________.

management information system

________ is the branch of computer science that deals with the attempt to create computers that think like humans.

Artificial intelligence

In a data warehouse, data gathered from sales, billing, and inventory departments are examples of ________ sources.

internal data

Which of the following is a reason for creating a list instead of creating a database?

to organize data for simple tasks

Unstructured data such as video clips and pictures are known as ________ because of the way they are encoded.

binary large objects (BLOBs)

Computational fields are a type of database field used to store ________.


Oracle Database 11g is an example of which type of database?

multidimensional database

Classification, affinity grouping, and estimation are ________ methods used by managers to make their data more meaningful.

data mining

The ________ is the value that the database uses for the field unless the user enters another value.

default value

________ databases can easily be customized to provide information to a variety of users (based on their need) and can process data much faster than pure relational databases


Data in a multidimensional database is organized in a ________ format.


A database ________ instructs a database to search for particular pieces of data.


In a database, ________ fields store numbers used to perform calculations.


Which of the following statements about object-oriented databases is FALSE?

They store data in table format.

SQL uses ________ to extract records from a database by using English-like expressions that have variables and operations.

relational algebra

A ________ relationship indicates that for a record in one table, there can be many related records in another table.


Share This

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more


A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message