CHAPTER 1-12 DISCOVERING COMPUTERS VOCAB

Database
Which of the following is a collection of data organized in a manner that allows access, retrieval, and use of that data?
A fragmented disk has many files stored in noncontiguous sectors.
Why is a fragmented disk slower than one that is defragmented?
contrast
Which of the following adjusts the difference in appearance between light and dark areas of a photo?
legal
What kind of software assists in the preparation of a will, for example?
font
Which of the following (with examples such as Cambria and Calibri shown in the accompanying figure) is a name assigned to a specific design of characters?
computer-aided design software (CAD)
Which of the following types of software do engineers, architects and scientists use to create designs?
1/72
A single point as shown in the accompanying figure is about what fraction of an inch in height?
image editing
What kind of software provides the capabilities of adjusting or enhancing image colors, adding special effects such as shadows and glows, and the like?
DTP
Designers and graphic artists can print finished publications on a color printer, take them to a professional printer, or post them on the web in a format that can be viewed by those without what kind of software?
disc burning
You recently lost some files that were important to you so you have resolved to back up the contents of your hard disk on a series of rewritable DVDs. What kind of software will you use to do this?
adware
Which of the following kinds of programs displays an online advertisement in a banner or pop-up window on webpages, email, or other Internet service?
restore
In the event a backup file is used, which kind of program reverses the process and returns backed up files to their original form?
search tool
Which kind of program attempts to locate a file on your computer or mobile device based on criteria you specify?
purchase a reputable antivirus program, update antivirus definitions regularly
Which of the following are valid steps toward virus protection?
spyware
A program has been placed on your smartphone without your knowledge and it is collecting personal information about you. What kind of application is this?
software suite
Which of the following is a collection of individual programs sold as a unit?
to make users more productive
Which of the following are uses for application software?
phishing
Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user’s personal and financial information?
in rows and columns collectively called a worksheet
In a spreadsheet program, how is data organized?
resize
As you edit some photos from your summer vacation, you decide to shrink one of your favorite photos to produce a wallet size. Which tool will you use for this?
one-sixth of an inch
You are working for a book publisher and devising the height of the pages that will be required to print a given book. The text for the book is about 10 points. What will be the approximate height of each character in the book?
synchronization
Your new calendar application allows you to make sure that your mobile device and your corporation’s server both have the latest version of any updated information. What is the term for this capability?
file manager
You are using a tool on your computer to organize a variety of files in folders. What is the term for this kind of tool?
note taking
Which of the following kinds of software enables users to enter typed text, handwritten comments, drawings, or sketches anywhere on a page and then save the page as part of a notebook?
project management software
An engineer who needs to manage new product development might use what type of software?
lifestyle
Which category of applications allows you to locate a nearby restaurant or check the weather forecast?
toll fraud
Which of the following kinds of malware is a malicious mobile app that uses a variety of fraudulent schemes to charge unsuspecting users for premium messaging services?
the document’s appearance
When a word processing program user formats a document, what does the user change?
multimedia authoring
What kind of software allows users to combine text, graphics, audio, video, and animation into an interactive application?
replicate itself, conceal itself, activate when a condition or event occurs
During the infection stage, what three actions does a computer virus typically perform?
device-tracking apps
Which of the following statements is not a safeguard against the failure of hardware?
asymmetric key encryption
What is another name for public key encryption?
IP
Which of the following refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos?
USB
Into which of the following kinds of ports do external fingerprint readers plug?
crimeware
Which term is used to describe software used by cybercriminals?
hand geometry systems
Which of the following can transmit germs?
personal identification number
The term, PIN, is an acronym for which of the following?
Biometric devices are an unreliable method of identification and notification.
Which of the following statements is not true about biometric devices?
clickjacking
Which of the following terms is used to describe a scam in which a website includes a button, image or link that contains a malicious program?
iris recognition system
Which of the following does a new federal laboratory use in its high security areas?
full backup
Which of the following copies all of the files in a computer?
intellectual property
Which of the following categories are the rights to which creators are entitled for their work?
cyberterrorist
Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?
decryption
To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?
Clear your history file when you are finished browsing.
In order to safeguard your personal information, which of the following is recommended?
digital
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?
VPN
Which of the following provides the mobile user with a secure connection to the company network server?
authoring ActiveX scripts
A perpetrator is using a botnet. Which of the following is the least likely use of his botnet?
spoofing
Which of the following refers to a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
compaction
In your encryption algorithm, you removed every third letter. Which algorithm did you use?
CAPTCHA
You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology?
digital security risk
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
password
Many websites, like that in the accompanying figure, require a user to enter a private combination of characters associated with a user name that allows access to certain computer resources. What is the term for this combination of characters?
CERT/CC
Which of the following is a federally funded Internet security research and development center?
spyware
Internet advertising firms often use which of the following to collect information about users web browsing habits?
a digital signature
Which of the following terms is used to describe an encrypted code that a person, website, or organization uses to verify the identity of the message sender?
information theft
When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________.
employee monitoring
Which of the following involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as email messages, keyboarding activity, and websites visited?
certificate authority
Which of the following is an authorized person or company that issues and verifies digital certificates?
a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider
The term, zombie, is _____________.
cloud
Your manager has asked you to shift usage and consumption of technology resources from a local environment managed by in-house IT staff to the Internet. What kind of computing will allow you to accomplish her goal?
ultrabook
What is the term for an ultrathin laptop (like the one shown in the accompanying figure) that uses the Windows operating system?
SLR
Which of the following cameras is a high-end digital camera that has interchangeable lenses and uses a mirror to display on its screen an exact replica of the image to be photographed?
form factor
You are going to make a decision about a server purchase based on whether it is a rack server, a blade server, or a tower server. On which of the following are you basing your decision?
virtual
Which kind of keyboard projects an image of a keyboard on a flat surface?
server farm
Which of the following is a network of several servers, like those in the accompanying figure, together in a single location?
cloud
Which of the following kinds of computing refers to an environment of servers that house and provide access to resources users access through the Internet?
surge protector
Which of the following protects against electrical power variations?
30 seconds
The video clips that users of video message services send are typically how long?
via a port
You want to connect your mobile device to a speaker. Which of the following is a way to do so?
discoverable mode
Your Bluetooth headset is waiting for another Bluetooth device to locate its signal. What is this mode known as?
bundle
Which of the following terms would you be looking for if you want to make a purchase of a variety of software at the same time that you purchase your new desktop?
75
You have a new e-book reader and you are expecting to be away on a long hike with it. How many hours of reading can you get from it before needing to recharge it?
server
You are looking for a computer to provide a central location for online game play. What kind of computer do you need?
It has extensive capabilities.
Which of the following is not true of the thin client on your desk at your office?
embedded computers
What is the technology featured in the trend known as the Internet of Things?
embedded computer
Which of the following is a special-purpose computer that functions as a component in a larger product?
mainframes
Which of the following do most major corporations use for business activities like billing millions of customers, preparing payroll for thousands of employees, and managing millions of items in inventory?
media
Which of the following is NOT a type of kiosk?
MMS
What is the term for the picture/video message service available on smartphones and other mobile devices?
Windows
Which of the following is an example of an operating system?
supercomputer
A type of computer usually has thousands of users. Which of the following is most likely to be the type of computer?
stylus
Which of the following is an alternative to the use of your finger to enter data on a tablet like the one shown in the accompanying figure?
vending kiosk
At your local supermarket there is a kiosk that allows you to rent your favorite movie on DVD. Of which of the following is this an example?
tower server
Your server room has ample floor space. Which of the following are you most likely to choose as a result?
mail server
You need to set up a computer to store and deliver email messages for your small business. Which of the following are you most likely to use?
Thunderbolt
You are looking for a general-purpose port to connect two devices together. Which of the following is your best bet?
ticket kiosk
Which of the following are you most likely to find on your next trip to an amusement park?
high blood pressure
Which of the following is NOT a likely complaint of someone who spends his or her workday using the computer?
26
It is estimated by one publisher that, on average, libraries replace a print book after how many checkouts?
the worldwide collection of blogs
To what does the term, blogosphere, refer?
Tim Berners-Lee
Who is the creator of the World Wide Web?
dongle
What is the name for a small device that connects to a computer?
Skype is an example of VoIP software.
Which of the following is true of VoIP?
FTP server
Which of the following is a computer that allows users to upload and/or download files using FTP?
email list
Which of the following is a group of email names and addresses used for mass distribution of a message?
Firefox
You are looking for a browser that will run on your computer, which uses the Linux operating system. Which of the following is an option for you?
website
Which of the following is a collection of related webpages and associated items, such as documents and pictures, stored on a web server?
streaming
When a radio station broadcasts a live sporting event over the Web, what technology are they using?
browser
If your cousin wanted to view information from the World Wide Web, what application software would you tell her to be sure she has on her computer?
tabbed browsing
Which of the following allows users to have multiple home pages that automatically open when the browser starts?
A Wi-Fi’s Internet service can be dial-up access.
Which of the following is NOT true of a Wi-Fi network?
anonymous
Which of the following defines FTP sites at which anyone can transfer some, if not all, available files?
registrar
You are going to form a partnership with an organization that sells domain names. What kind of organization is your partner?
chat
As shown in the accompanying figure, which of the following is a real-time typed conversation that takes place on a computer?
multimedia
Which of the following terms refers to any application that combines text with graphics, animation, audio, video, and/or virtual reality?
Web address
A Uniform Resource Locator is the same as which of the following?
phishing
What is the descriptor for a filter that warns or blocks you from potentially fraudulent or suspicious websites?
a worldwide collection of electronic documents
What is the World Wide Web?
browser
If your cousin wanted to view information from the World Wide Web, what application software would you tell her to be sure she has on her computer?
tabbed browsing
Which of the following allows users to have multiple home pages that automatically open when the browser starts?
A Wi-Fi’s Internet service can be dial-up access.
Which of the following is NOT true of a Wi-Fi network?
anonymous
Which of the following defines FTP sites at which anyone can transfer some, if not all, available files?
registrar
You are going to form a partnership with an organization that sells domain names. What kind of organization is your partner?
chat
As shown in the accompanying figure, which of the following is a real-time typed conversation that takes place on a computer?
multimedia
Which of the following terms refers to any application that combines text with graphics, animation, audio, video, and/or virtual reality?
Web address
A Uniform Resource Locator is the same as which of the following?
phishing
What is the descriptor for a filter that warns or blocks you from potentially fraudulent or suspicious websites?
a worldwide collection of electronic documents
What is the World Wide Web?
Internet backbone
The major carriers of Internet network traffic are known collectively by what term?
byte
You are looking for the basic storage unit on a mobile device. Which of the following represents a single character?
3-6 MB
What is the approximate data usage for sending and receiving 100 messages with no attachments?
a business transaction that occurs over an electronic network such as the Internet
Which of the following best describes e-commerce?
tethering
You want to make it possible for your smartphone to share its Internet access wirelessly with your friend’s device. Which of the following will you use?
access provider
Which of the following is a business that provides individuals and companies access to the Internet for free or for a fee?
Users can modify posts in a wiki but they cannot modify posts made by a blogger.
What is the difference between a wiki and a blog?
search text
To find a webpage, the user of a search engine would simply enter a word or phrase in the resource’s text box. What is the term for that phrase?
megabyte
Which of the following is equal to approximately one million characters?
DSL, Wi-Fi, fixed wireless
Which of the following identifies broadband Internet connections?
objectivity and currency
Which of the following are criteria for evaluating a website’s content?
point
In which of the following mouse operations do you move the mouse until the pointer is positioned on the item of choice?
swipe
Which of the following gestures would you use if you want to scroll on your new tablet?
Green computing
What involves reducing the electricity consumed and environmental waste generated when using a computer?
It is a service on the Internet.
The Internet is a worldwide network. What is the World Wide Web?
Bill Gates
Who is Microsoft’s founder?
Software
What consist(s) of a series of related instructions that tells the computer what tasks to perform and how to perform them?
You use an on-screen keyboard.
If a tablet has no keyboard, how do you type on it?
power
Which kind of user requires the capabilities of a powerful computer?
Wi-Fi
Most computers and many mobile devices, such as smartphones and portable media players, can connect to which kind of network?
pinch
In which gesture do you move two fingers together?
virus signatures
Which of the following is the term for known specific patterns of viruses?
spreadsheet
Which of the following kinds of software is NOT usually included by an installed operating system?
cloud storage
You do not want to store your data locally on your hard disk. You would rather store it using an Internet service. What is this kind of storage known as?
DOS
Which of the following is NOT an operating system used by today’s computers and mobile devices?
Application software
Word processing software, spreadsheet software, database software, and presentation software are examples of what category of computer software?
Data
If a computer adds together a list of numbers, what term identifies these numbers?
vaporware
Which of the following is NOT an example of malware?
slate
Which of the following style of tablet does not contain a physical keyboard?
drag
Which of the following mouse operations would you use if you want to draw a picture?
tap
In which gesture do you quickly touch and release one finger one time?
every three months
How often should you change your password?
press and hold
Which of the following gestures would you use if you want to get immediate access to allowable actions on your new tablet?
computer
Which of the following is an electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data according to specified rules, produce results, and store the results for future use?
media message
Which of the following is NOT a type of message you can send with a smartphone?
Its electronic components process data using instructions.
Which of the following is true about a computer?
e-book
Which of the following is an electronic version of a printed book, readable on computers and other digital devices?
scanner
Which of the following works in a manner similar to a copy machine?
It depends on your needs.
How do you determine which type of computer — tablet, laptop, or desktop — is best?
magnetic media
For which of the following is the spelling, disk, used?
Information
Which of the following conveys meaning and is useful to users?
Which of the following is contained on an integrated circuit and can act as an electronic switch that opens or closes the circuit for electrical charges?
transistor
Your business is looking to rely on cloud computing services to provide system backup and the archiving of earlier versions of files, for example. What is the term for this?
Storage as a Service
Which of the following means the computer automatically can configure cards like the one in the accompanying figure and other peripherals as users install them?
Plug and Play
Which of the following is the most common type of volatile memory?
RAM
The accompanying figure shows which of the following kinds of modules, which are small circuit boards where RAM chips usually reside, being inserted into the motherboard?
memory
Which kind of tablet typically does not include a physical keyboard and puts the case behind the display?
slate
Which of the following is a kind of ROM chip that contains permanently written data, instructions, or information that is recorded when the chip is manufactured?
firmware
Which of the following identifies ROM chips that contain permanently written data, instructions, or information?
firmware
Which of the following are the two leading manufacturers of personal computer processor chips?
Intel and AMD
In your engineering class, you are required to calculate the approximate size of a series of chips. Which of the following is true?
Most chips are no bigger than one-half-inch square.
Which of the following is an application that incorporates data from multiple providers into a new application?
mashup
Which component allows processors to perform at faster rates than those processors that do not have this component?
advanced transfer cache
Which of the following is NOT true of the new multi-core processor you have just purchased?
Each processor core on the multi-core processor runs at a faster speed than a single-core processor.
Which of the following is a case on a desktop that contains and protects the item shown in the accompanying figure and other electronic components?
system unit
What is the term for an electrical channel within the circuitry of a computer than can transfer 8 bytes of data at a time?
64-bit bus
Current processors include advanced transfer cache, a type of cache built directly on a processor chip. Which type of cache is this?
L2 cache
What are three names for the electronic component that interprets and carries out the basic instructions that operate a computer?
CPU, processor, central processing unit
Computer memory and computer storage are available in varying sizes. Which of the following is the largest amount of memory or storage?
terabyte (TB)
As shown in the accompanying figure, which of the following kinds of card is a circuit board that enhances functions of a component of the system unit and/or provides connections to peripherals?
adapter
Which of the following is a type of nonvolatile memory that can be erased electronically and rewritten?
Flash memory
Which of the following is another term for the system unit?
chassis
What is the role of an address when used in the context of computer memory?
It identifies the location of a byte in memory.
Which of the following is a small piece of semiconducting material, usually silicon, on which integrated circuits are etched?
computer chip
Which of the following cards converts computer output into a video signal that travels through a cable to the monitor, which displays an image on the screen?
graphics
How many fans are typically in a desktop case?
at least three
With the cover off the system unit of a lab computer, your instructor pointed out a type of nonvolatile memory that can be erased electronically and rewritten. What did your instructor call this memory?
flash memory
Which of the following consists of electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processed data (information)?
memory
Which of the following is a register function?
storing the location from where an instruction was fetched
Within the circuitry of a computer, each channel along which bits transfer allows the various devices both inside and attached to the system unit to communicate with each other. What are these channels, shown in the accompanying figure, called?
buses
When 8 bits are grouped together as a unit, how many individual characters can these 8 bits represent?
256
Which of the following describes the difference in light intensity between the brightest white and the darkest black that can be displayed on an LCD monitor?
Contrast ratio
What is the definition of software?
a series of related instructions that tells a computer or mobile device the tasks to perform and how to perform them
Which of the following reads the magnetic stripe on the back of credit cards, entertainment cards, bank cards, and other similar cards?
magstripe reader
Today’s joysticks, wheels, gamepads, and motion-sensing game controllers include a technology that sends resistance to the device in response to actions of the user. What is this technology called?
force feedback
Who created the mouse that is used on millions of computers today?
Douglas Engelbart
LCD monitors and LCD screens sometimes use a new type of technology to produce color, which produces a brighter display that is also easier to read. What is this new technology called?
OLED
Which of the following are tasks a pointing device can accomplish?
move a pointer on the screen, click buttons, select graphics
Which of the following is NOT a use of RFID?
routing bank checks
When your sister goes to work, what scientific discipline is used in the design of her workplace to incorporate comfort, efficiency, and safety for her?
ergonomics
Which of the following kinds of scanners works in a manner similar to a copy machine except it creates a file of the document in memory instead of a paper copy?
flatbed
Which of the following identify mouse types used with desktop computers?
optical mouse, touch mouse
What term refers to the process of entering input by speaking into a microphone?
voice input
Some input devices include a kind of output that provides the user with a physical response from the device. What kind of output is this?
tactile
Which kind of printer forms characters and graphics on a piece of paper without actually striking the paper?
nonimpact
Some touch screens recognize when you touch the screen with two fingers or two hands. If you are looking for a device on which you can do this, what type of touch screen should you search for?
multi-touch
Which of the following is a technology that reads hand-drawn marks such as small circles or rectangles?
OMR
To display the highest quality images, an LCD monitor should plug in to which type of port?
HDMI
If students in your class are taking a standardized test using a form with rectangles that they fill in with a pencil, what technology will be used to grade the test?
OMR
What is the technology called that enables you to print photos without a computer?
PictBridge
A wireless keyboard is a battery-powered device that transmits data to the system unit using wireless technology. Which of the following wireless technologies commonly are used for this purpose?
Bluetooth
What is the term for a motion you make on a touch screen with the tip of one or more fingers or your hand?
gesture
When a user types data on a keyboard, what is occurring?
The user is using an input device to enter input into the memory of the computer.
Which of the following is an identification code that consists of a set of vertical lines and spaces of different widths?
bar code
Most of these types of device include a small optical scanner for reading characters and sophisticated software to analyze what is read. What kind of device is this?
OCR
Retail and grocery stores use which kind of bar code?
UPC (Universal Product Code)
What kind of camera is found on a computer that allows you to be seen during a video telephone call?
webcam
What is the print option where the page is taller than it is wide?
portrait
Which of the following are audio output devices that rest inside the ear canal?
earbuds
Software that sees and possibly records everything that is typed on a keyboard raises the issue of privacy for the person doing the typing. What is this controversial software called?
keyboard monitoring software
A printer, such as that shown in the accompanying figure, creates images using a laser beam and powdered ink. What is this ink called?
toner
Which of the following is the mechanism that reads and writes items in the drive as it barely touches the disk’s recording surface?
read/write head
What happens when a computer or mobile device starts up?
The computer locates operating system in storage and loads it into RAM.
What is storage media?
The physical material on which a computer keeps data, instructions, and information.
You are looking for a backup that copies only the files that have changes since the last full backup. Which of the following will you use?
incremental backup
You want a storage medium that allows you to locate a particular data item immediately, without having to move consecutively through items stored in front of the desired data item or file. What kind of access will this storage medium use?
direct
Which of the following is true of SSDs compared to traditional hard disks?
SSDs have faster transfer rates.
A standard CD-ROM is called a single-session disc. Why are they called single-session discs?
Manufacturers write all items on the disc at one time.
Which of the following is NOT a cloud storage provider?
eCloud
Which of the following consists of a special-purpose chip and electronic circuits that govern the transfer of data, instructions, and information from a drive to and from the system bus and other components in the computer?
controller
Which of the following kinds of interfaces sends data one bit at a time?
serial
Which of the following is a high-capacity optical disc on which users can read but not write or erase?
DVD-ROM
What is being measured using KBps, MBps, and GBps?
transfer rate
Which of the following provides a myriad of financial reporting requirements and guidelines for public companies?
Sarbanes-Oxley Act
Which of the following is a good practice to follow to avoid scratching or damaging a disc like the one in the accompanying figure?
Hold the disc by its edges.
Which of the following statements is not true about hard drives?
A hard disk that is mounted inside the system unit is sometimes called a permadisk.
Storage devices access items in which of the following units of time?
milliseconds
Before any data can be read from or written on a hard disk, what must happen to the disk?
formatting
The use of microfilm and microfiche provides all of the following advantages EXCEPT ____.
they can be read without a reader
Which of the following refers to the process of writing on an optical disc?
burning
Users subscribe to a cloud storage service, like the kind advertised in the accompanying figure, to do all of the following EXCEPT to ____.
make enterprises provide data center functions
Which of the following does NOT use direct access?
tape
What does a controller control?
the interface between the hard disk and the system bus
Which of the following is NOT true about caring for optical discs?
Moisten a nonabrasive cloth with warm water and ammonia to clean the disc.
Which of the following kinds of storage is NOT used by NAS and SAN solutions?
flash memory
Which of the following is a type of backup you can only perform at your large enterprise?
continuous
How do discs, like the one in the accompanying figure, commonly store items?
in a single track that spirals from the center of the disc to the edge of the disc
What is the simplest RAID storage design?
mirroring
Which of the following is NOT true about storage media and devices?
Writing is the process of transferring items from storage media to memory.
The inflexible, circular platters on which kind of disks use magnetic particles to store data, instructions, and information?
hard
Which RAID level technique splits data, instructions, and information across multiple disks in the array?
striping
Which of the following is a set of programs containing instructions that coordinate all the activities among computer hardware resources?
operating system
What does the hibernate mode option do?
saves any open documents and programs to a hard drive before removing power from the computer or device
You want to clear the memory on your mobile device. Which of the following is sufficient?
warm boot
Which of the following is least likely to be a capability of the new server operating system your firm has developed?
providing touch screen technology
Which of the following is least likely to be the reason for an automatic update?
providing decryption
What is the term for the variety of forms in which Linux is available?
distributions
Which of the following statements is not true about operating systems designed to work with a server on a network?
Client computers cannot function unless they are connected to the network because they cannot access an operating system.
What is the term for the process of swapping items between memory and storage?
paging
Which of the following statements is not true about device drivers?
Devices on a computer can share drivers.
Which of the following are shortcuts to an app or other content in Windows?
tiles
What type of operating system allows two or more programs or apps to reside in memory at the same time?
multitasking
The company for which you work has just released an updated device driver version. Which of the following is least likely to be the reason for the release?
to manage new Internet connectivity issues
What is the purpose of memory management?
to optimize the use of RAM
A piece of software you use is privately owned and limited to a specific vendor. What is the term for this kind of software?
proprietary
What is an error in a program called?
a bug
What browser is included with Windows?
Internet Explorer
You are designing software that will allow users to interact with it through ordinary, intuitive behavior. Which of the following are you using?
NUI
Which of the following statements is not true about user interfaces?
Most computers today use a command-line interface.
What program is used to start and shut down a computer or mobile device, provide a user interface, manage programs and memory, and provide file management, among other functions?
an operating system
With which of the following are users who shut down their computer or mobile device regularly least likely to be concerned?
natural user interfacing
In this kind of memory, the operating system allocates a portion of a storage medium, usually the hard disk or a USB flash drive, to function as additional RAM. What kind of memory is this?
virtual
You are looking for a product developed by Microsoft to enable your organization to manage applications and websites either onsite or on the cloud. Which product will you use?
Windows Server
You have been developing an embedded operating system for a new product at your company, but a colleague of yours has been referring to it by another name. What is that name?
RTOS
Which of the following is NOT a wireless Internet connection?
DSL
An application you own will run on a new version of your operating system. What is the term for this kind of application?
upward compatible
Which file and disk management tool attempts to locate a file on your computer or mobile device based on specified criteria?
Search
What is another term for the operating system a computer uses?
platform
Which of the following is a proprietary mobile operating system specifically made for Apple’s mobile devices?
iOS
Which of the following consists of one or more chips on the motherboard that hold items such as data and instructions while the processor interprets and executes them?
RAM
A cross-platform application is one that runs in what way?
the same on multiple operating systems
Which of the following statements best describes the Ethernet network standard?
no central computer or device on the network should control when data can be transmitted
Which of the following defines guidelines that specify the way computers access the medium to which they are attached, the type(s) of medium used, the speeds used on different types of networks, and the type(s) of physical cable and/or the wireless technology used?
network standard
Which of the following technologies is the new tollbooth on the local highway most likely to use?
RFID
Which of the following is not a technology used by hot spots?
UWB
Which of the following is a transmission media on which data, instructions, or information travel?
communications channel
Which of the following is a wireless transmission medium that distributes radio signals through the air over long distances?
broadcast radio
Which statement best describes how the RFID standard works?
The network uses radio signals to communicate with a tag placed in or attached to an object, animal, or person.
You want to use the UMB cellular transmission standard on your new mobile phone. Which standard will you use?
4G
Which of the following has a port to which a cable connects in order to coordinate the transmission and receipt of data, instructions, and information to and from the computer or device containing it?
network interface card
Many home users are connecting multiple computers and devices together into a system. What is the name for this system?
home network
Which of the following can be avoided if a computer or mobile device has a motherboard that integrates networking capability?
NIC
Who invented the Ethernet?
Robert Metcalfe
Which of the following enables a computer or device that does not have built-in networking capability to access a network?
NIC
Which of the following kinds of modems is a modem that sends and receives digital data over and information to and from a digital line?
broadband
Which of the following is not an example of a dedicated line?
dial-up
What is the maximum transfer transmission rate for Bluetooth?
24 Mbps
What term is used to describe the time it takes a signal to travel from one location to another on a network?
latency
Microwave transmission involves sending signals from one microwave station to another. What is this often called?
fixed wireless
You run a large network in which it is important to keep a duplicate of the central devices in case the primary one fails. What category of network topology does this network use?
star network
Which of the following is a simple, inexpensive network that typically connects fewer than 10 computers?
peer-to-peer network
The amount of data, instructions, and information that can travel over a communications channel sometimes is called which of the following?
bandwidth
Which of the following terms is an electrical disturbance that can degrade communications?
noise
Which of the following technologies is your new mobile phone payment device most likely to use?
NFC
What does EFT stand for?
electronic funds transfer
Which of the following is not an application of communications satellite technology?
fixed wireless
Which of the following is not true of communications software?
Email, FTP, and VoIP are examples of system software for communications.
Your school computer library has a network that connects computers and devices within a few small rooms. What type of network does it likely use?
LAN
Which of the following is an earth-based reflective dish that contains the antenna, transceivers, and other equipment necessary for microwave communications?
microwave station
You are a technology expert and you have been asked to predict which technology will become the Internet standard for data transmission, replacing T3 lines. Which of the following are you most likely to predict?
ATM
Which of the following is a central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network?
wireless access point
A user of a database such as that pictured in the accompanying figure refers to a field as what?
column
Complex DBMSs maintain a listing of activities that modify the contents of a database. What is this listing called?
log
Which of the following is a program with which users interact that generally has a more user-friendly interface than a DBMS?
front end
Which of the following refers to the procedures that keep data current?
file maintenance
Which of the following statements is not true about relational databases?
Applications best suited for relational databases are those whose data can be organized into a three-dimensional table.
Which of the following is a database that stores data in tables that consist of rows and columns?
relational
Which of the following kinds of backup are used by organizations such as hospitals, communications companies, and financial institutions?
continuous
What company did Larry Ellison help found?
Oracle
To what does the term GIGO refer?
data integrity
Most DBMSs include a feature, as shown in the middle image within the accompanying figure, which has a graphical user interface to assist users with retrieving data. What is this feature called?
QBE
Which of the following contains a database that helps a group or department make decisions?
data mart
The developer of a relational database refers to a file as which of the following?
relation
In a database such as that pictured in the accompanying figure, which of the following is a connection within the data?
relationship
Which of the following is an item that contains data, as well as the actions that read or process the data?
object
As shown in the accompanying figure, which of the following is a query language that allows users to manage, update, and retrieve data?
SQL
A DBMS uses which of the following to perform validation checks?
data dictionary
Which of the following languages consists of simple, English-like statements that allow users to specify the data to display, print, or store?
query
Which of the following kinds of programs interacts with a DBMS, which in turn interacts with the database?
front end
Which of the following statements is NOT true about the database approach?
A disadvantage to the database approach is isolated data.
Your database was damaged due to hardware failure. What can you use to restore it?
a backup
Which of the following is a process designed to ensure the data within the relations (tables) contains the least amount of duplication?
normalization
Most of this kind of database products for servers and mainframes include SQL, an example of which is shown in the accompanying figure. What kind of database product is this?
relational
Which term does a user of a relational database use to refer to a file?
table
Which of the following is not one of the qualities associated with identifying the value of information?
expensive
What is a more user-friendly interface some users use instead of interacting directly with a DBMS?
front end
Which of the following is a window on the screen that provides areas for entering or changing data in a database?
form
In a database such as that pictured in the accompanying figure, users can set up a relationship between tables at any time, but the tables must have which of the following in common?
a column
Which of the following is a huge database that stores and manages the data required to analyze historical and current transactions?
data warehouse
What is another term for data dictionary?
repository
What is data redundancy?
Each department has its own files, so the same data might be stored in multiple files.
A user of a database such as that pictured in the accompanying figure refers to a field as what?
column
Complex DBMSs maintain a listing of activities that modify the contents of a database. What is this listing called?
log
Which of the following is a program with which users interact that generally has a more user-friendly interface than a DBMS?
front end
Which of the following refers to the procedures that keep data current?
file maintenance
Which of the following statements is not true about relational databases?
Applications best suited for relational databases are those whose data can be organized into a three-dimensional table.
Which of the following is a database that stores data in tables that consist of rows and columns?
relational
Which of the following kinds of backup are used by organizations such as hospitals, communications companies, and financial institutions?
continuous
What company did Larry Ellison help found?
Oracle
To what does the term GIGO refer?
data integrity
Most DBMSs include a feature, as shown in the middle image within the accompanying figure, which has a graphical user interface to assist users with retrieving data. What is this feature called?
QBE
Which of the following contains a database that helps a group or department make decisions?
data mart
The developer of a relational database refers to a file as which of the following?
relation
In a database such as that pictured in the accompanying figure, which of the following is a connection within the data?
relationship
Which of the following is an item that contains data, as well as the actions that read or process the data?
object
As shown in the accompanying figure, which of the following is a query language that allows users to manage, update, and retrieve data?
SQL
A DBMS uses which of the following to perform validation checks?
data dictionary
Which of the following languages consists of simple, English-like statements that allow users to specify the data to display, print, or store?
query
Which of the following kinds of programs interacts with a DBMS, which in turn interacts with the database?
front end
Which of the following statements is NOT true about the database approach?
A disadvantage to the database approach is isolated data.
Your database was damaged due to hardware failure. What can you use to restore it?
a backup
Which of the following is a process designed to ensure the data within the relations (tables) contains the least amount of duplication?
normalization
Most of this kind of database products for servers and mainframes include SQL, an example of which is shown in the accompanying figure. What kind of database product is this?
relational
Which term does a user of a relational database use to refer to a file?
table
Which of the following is not one of the qualities associated with identifying the value of information?
expensive
What is a more user-friendly interface some users use instead of interacting directly with a DBMS?
front end
Which of the following is a window on the screen that provides areas for entering or changing data in a database?
form
In a database such as that pictured in the accompanying figure, users can set up a relationship between tables at any time, but the tables must have which of the following in common?
a column
Which of the following is a huge database that stores and manages the data required to analyze historical and current transactions?
data warehouse
What is another term for data dictionary?
repository
What is data redundancy?
Each department has its own files, so the same data might be stored in multiple files.
What is an RFP?
a document in which a vendor selects products and quotes prices
What is the theory behind user buy-in?
if users are involved in system development, they are more likely to use and accept the new system
Which of the following is true of an integration test?
verifies that an application works with other applications
During which phase in the SDLC is the system installed and tested?
implementation
With this kind of conversion, a user stops using the old system and begins using the new system on a certain date. What is this kind of conversion?
direct conversion
Companies can develop software in-house using their own IT personnel or they can have an outside source develop it for them. What is the term for the latter option?
outsourcing
Which of the following summarizes in writing all the safeguards that are in place to protect an organization’s information assets?
computer security plan
With which of the following does the vendor select the product(s) that meets specified requirements and then quotes the prices?
request for proposal (RFP)
Which of the following is a professional who is hired based on expertise in a specialized area of computers, including service and advice?
IT consultant
What is another term for detailed analysis?
logical design
Which of the following describes an information system?
a collection of hardware, software, data, people, and procedures that work together to produce quality information
Which of the following is NOT true about object-oriented programming (OOP) languages?
OOP languages do not work well in a RAD environment.
In HTML, how is a tag used?
to specify how a webpage is displayed when viewed on the web
The disadvantage of this kind of conversion is that it is extremely risky and can disrupt operations seriously if the new system does not work correctly the first time. Which kind of conversion is this?
direct conversion
What is a VAR?
a company that purchases products from manufacturers and resells them to the public, also offering additional services with the product
In sequence, traditional system development contains five phases. What are they?
planning, analysis, design, implementation, support and security
During which of the following phases does a systems analyst carefully design every menu, screen, and report specified in the requirement?
detailed design
Which of the following is an advantage of an interpreter?
When it finds errors, it displays feedback immediately.
In this phase, system developers perform four major activities: (1) develop programs and apps, (2) install and test the new system, (3) train users, and (4) convert to the new system. What is this phase?
implementation
Which of the following is a chart type, also called a network diagram, that is best suited for scheduling large, complex projects?
PERT
Which of the following general guidelines should system development NOT follow?
repeat tasks intermittently
Which of the following phases consists of two major activities: (1) if necessary, acquire hardware and software and (2) develop all of the details of the new or modified information system?
design
Which of the following identifies the product(s) a systems analyst wants from a vendor?
request for quotation (RFQ)
HTML uses codes that specify links to other documents and indicate how a webpage is displayed when viewed on the web. What is the term for these codes?
tags
Which of the following kinds of products are software tools designed to support one or more activities of the system development cycle?
CASE
Which company developed the Java programming language?
Sun Microsystems
What does a benchmark test evaluate?
the performance of hardware or software
In an object-oriented programming language, what does an object represent?
a real person, place, event, or transaction
Companies today often have a person who is responsible for the physical security of an organization’s property and people and also is in charge of the digital security of computing resources. What is the title of this person?
CSO
Which of the following activities is NOT considered part of the planning phase?
conduct a preliminary investigation