In a worksheet, the intersection of a row and a column is called a ____.
a.footerb.

tablec.pointer d.cell (!)

With bitmapped images, the color of each ____ is represented by bits; the more bits used, the better the image quality.
a. vector b. map c.

(!)pixel d. byte

Some ____ must be added in pairs for optimal performance.
a. interfaces b. memory modules (!) c.

USB ports d. hard drives

The ____ allows individuals to "placeshift" multimedia content from their home TVs and DVRs to their portable computer or mobile device.
a. Singmedia b.

Slingbox (!) c. Shiftmedia d. Singbox

____ programs are software programs that are distributed on the honor system.
a. Commercial b.

Shareware (!) c. Freeware d. Public domain

Case-Based Critical Thinking QuestionsCase 16-1Jack is a computer programmer who spends most of the day at his desk. Recently, he visited the doctor to get advice about persistent eyestrain and an aching back.

To combat his eyestrain, Jack's doctor advised him to ____.

a. use a light touch on the keyboard b. use a lower screen resolution (!) c.

use a footrest d. turn down the volume when using headphones

____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive.
a. Remote access b.

Identity theft (!) c. Spams d. Software theft

A ____ is equal to 1,024 bytes.
a. kilobyte (KB) (!) b. megabyte (MB) c.

gigabyte (GB) d. terabyte (TB)

External hard drives today typically connect to a computer via a USB or ____ port.
a. IrDA b. Bluetooth c.

Firewall d. FireWire

The ____ implements regulations for unsolicited e-mail messages and lays the groundwork for a federal Do Not E-Mail Registry.
Selected Answer: USA Patriot ActAnswers: a. Sarbanes-Oxley Actb. USA Patriot ActCAN-SPAM act (!)d. Junk Fax Prevention Act
In a typical client-server database application, the client is called the ____.

Selected Answer: Correcta. front endAnswers: front end (!)b. back endc. portald.

rear end

Case-Based Critical Thinking QuestionsCase 14-2The JL Group is a political think tank that is incorporating new media into their analyses.The employees of JL Group who use the database of the company for their daily work, without having knowledge of how the underlying database is structured, interact with the database ____.
Selected Answer: Correctc. using the user interfaceAnswers: a. through the database designerb.

through the database programmer Correctc. using the user interface (!)d. using the database script

Question 150 out of 1 pointsCase-Based Critical Thinking QuestionsCase 4-2Lisa is a student who regularly uses the computers at her local Internet café to listen to music, talk to her friends and family through the Internet, and play computer games.The Internet café has recently enacted a new policy that says that all users must use the ____ attached to their computers when carrying out activities on the computer that will provide sound, so as to not disturb the other users.

Selected Answer: Incorrect [None Given]Answers: a. scanners Correctb. headphones (!)c. iPod docksd. speakers
A computer that is controlled by a hacker or other computer criminal is referred to as a ____.
Selected Answer: Correctd.

botAnswers: a. clientb. spiderc. server Correctd. bot

A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.
Selected Answer: Correctd.

hot siteAnswers: a. buddy siteb. white roomc. alternate pad Correctd.

hot site (!)

Most ____ programs are available to try free of charge, but typically a small fee is required to use the program regularly.
Selected Answer: Incorrectb. freewareAnswers: a. public domainb. freeware Correctc.

shareware (!)d. commercial

Case-Based Critical Thinking QuestionsCase 2-2Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit documents. Recently, he has come to realize that in order to keep the computer performing at its best, he needs to carry out regular system maintenance on the computer.Jack can use the ____ program to locate and delete temporary files, such as installation files, Web browsing history, and files in the Recycle Bin.
Selected Answer: Incorrect [None Given]Answers: a.

Windows Registryb. Disk Defragmenterc. Temporary Files Correctd. Windows Disk Cleanup (!)

The bus width and bus speed together determine the bus's ____ or bandwidth; that is, the amount of data that can be transferred via the bus in a given period of time.
Selected Answer: Correctc.

throughputAnswers: a. machine cycleb. memory Correctc. throughput (!)d. clock speed

____ is a set of rules for exchanging data over the Web.
Selected Answer: Incorrecta.

MP3Answers: a. MP3 Correctb. XML (!)c. PDFd. CGI

Case-Based Critical Thinking QuestionsCase 2-1Jess is a musician who has just bought a new computer. Now she has to determine how to connect this computer to the devices that were connected to her old computer.

To connect her external hard drive where her music files are stored to the computer, Jess needs to use the ____ port.

Selected Answer: Incorrect [None Given]Answers: Correcta. USB (!)b. serialc. modemd. network
The ____ Web is a predicted evolution of the current Web in which all Web content is stored as if it were data in a database so that it can be retrieved easily when needed to fulfill user requests.

Selected Answer: Incorrectc. CentralAnswers: Correcta. Semantic (!)b. Intelligentc. Centrald.

Knowledge

A company's ____ oversees routing transaction processing and information systems activities, as well as other computer-related areas.
Selected Answer: Incorrectc. chief data officer (CDO)Answers: a. chief security officer (CSO) Correctb. chief information officer (CIO) (!)c. chief data officer (CDO)d.

chief executive officer (CEO)

A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network.
Selected Answer: Correctd. wormAnswers: a. virusb. hackerc. software Correctd.

worm (!)

The ____ contains all data definitions for a database, including table structures, security information, relationships between the tables in the database, and so on.
Selected Answer: Correctb. data dictionaryAnswers: a. database book Correctb. data dictionary (!)c.

data boxd. data book

____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.
Selected Answer: Correctb. PasswordsAnswers: a.

Usernames Correctb. Passwords (!)c. PINsd. Codes

An inventory management system that goes beyond just inventory to act as a complete distribution system is referred to as a ____ management system (WMS).

Selected Answer: Correctb. warehouseAnswers: a. warranted Correctb. warehouse (!)c. wirelessd.

world

External hard drives today typically connect to a computer via a USB or ____ port.
Selected Answer: Correctd. FireWire Answers: a. IrDAb. Bluetoothc.

Firewall Correctd. FireWire (!)

The most common type of database used on PCs today is a(n) ____.
Selected Answer: Incorrectc. two-way databaseAnswers: Correcta.

relational database (!)b. concurrent databasec. two-way databased. one-dimensional database

With the ____, businesses sell goods or services to individual consumers.
Selected Answer: Correctc. business-to-consumer (B2C) modelAnswers: a.

business-to-business (B2B) modelb. consumer-to-consumer (C2C) model Correctc. business-to-consumer (B2C) model (!)d. business-to-government (B2G) model

____ is a software development approach that continues the programming trend of breaking a software program into small and more manageable pieces that overlap in functionality as little as possible.
Selected Answer: Incorrecta. Object-Oriented Programming (OOP)Answers: a.

Object-Oriented Programming (OOP) Correctb. Aspect-oriented programming (AOP) (!)c. Structured programmingd. Object Programming (OP)

Filenames typically include a ____ at the end of the filename.

Selected Answer: Incorrectb. file subnameAnswers: a. file attachmentb. file subname Correctc. file extension (!)d. file subscript
Charts are inserted into an Excel spreadsheet using the commands in the Charts group on the ____ tab on the Ribbon.

Selected Answer: Incorrectd. DataAnswers: a. Tools Correctb. Insert (!)c. Formatd. Data
A ____ is a large screen computer either built into a table or designed to be used on a table and that allows multi-touch input from multiple users.

Selected Answer: Correctc. table PCAnswers: a. digitizing tabletb. touch coding system Correctc. table PC (!)d. tactile feedback screen
____ is a video format developed by Microsoft for use with Windows Media Player.

Selected Answer: Correctd. .wmvAnswers: a. .avib. .

movc. .mp3 Correctd. .wmv (!)

Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.

Selected Answer: Correcta. threat definitionsAnswers: Correcta. threat definitions (!)b. fraud tipsc. virus reportsd. viruses
____ is the process of gathering, storing, accessing, and analyzing data about a company in order to make better business decisions.

Selected Answer: Correctb. Business intelligenceAnswers: a. Business flowchart Correctb. Business intelligence (!)c.

System architectured. Enterprise architecture

A USB ____ is a device that plugs into your PC's USB port to convert one port into several USB ports.
Selected Answer: Incorrectc. busAnswers: a. module Correctb. hub (!)c.

busd. connector

A personal computer (PC) or ____ is a small computer system designed to be used by one person at a time.
Selected Answer: Correctc. microcomputerAnswers: a. microchipb. small processor Correctc.

microcomputer (!)d. processor

Smart cards and holographic drives are examples of ____ systems.
Selected Answer: Incorrectd. artificial intelligenceAnswers: a. Wi-Fi Correctb.

storage (!)c. satellited. artificial intelligence

Although many of us may prefer not to think about it, ____—the complete malfunction of a computer system—and other types of computer-related disasters do happen.
Selected Answer: Correctb. system failureAnswers: a.

interrupted power Correctb. system failure (!)c. spikesd. software piracy

Case-Based Critical Thinking QuestionsCase 1-1Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties.

Sarah needs to store digital photographs of houses she is previewing. She needs to be able to copy these to the computer at her office. What type of storage device should she use?

Selected Answer: Incorrectd. firewire portAnswers: a. data projector Correctb. USB flash drive (!)c.

scannerd. firewire port

____ is a specialized agency of the United Nations and attempts to resolve international commercial disputes about intellectual property between private parties.
Selected Answer: Correctb. WIPOAnswers: a. OLPC Correctb. WIPO (!)c.

USPTOd. DRM

____ are used for marketing purposes, such as sending advertisements that fit each individual's interests or trying to sign people up over the phone for some type of service.
Selected Answer: Correctb. Marketing databasesAnswers: a.

Government databases Correctb. Marketing databases (!)c. Educational databasesd. Research databases

One type of nonvolatile RAM, called MRAM, uses ____ polarization rather than an electrical charge to store data.
Selected Answer: Incorrectb. magnetochargedAnswers: a.

magnetobalancedb. magnetocharged Correctc. magnetic (!)d. magnetoselective

One factor affecting digital camera quality is the number of pixels, measured in ____, used to store the data for each image.
Selected Answer: Correctb.

megapixelsAnswers: a. kilopixels Correctb. megapixels (!)c. gigapixelsd. terapixels

____ was originally developed as a programming language designed for processing text.

Selected Answer: Incorrecta. JavaScriptAnswers: a. JavaScript Correctb. Perl (!)c. AJAXd.

ActiveX

____ are useful for identifying procedures and summarizing the decision making process for one step of a system.
Selected Answer: Incorrecta. Data dictionariesAnswers: a. Data dictionariesb. Feasibility reportsc. Entity-relationship diagrams Correctd.

Decision tables (!)

The ____ enables up to 127 devices to be connected to a computer through a single port on the computer's system unit.
Selected Answer: Correcta. USB standardAnswers: Correcta. USB standard (!)b. HyperTransport busc.

AGP (Accelerated Graphics Port) busd. PCI Express Bus

The file management program incorporated into Windows 8 is ____.
Selected Answer: Incorrecta. Disk CleanupAnswers: a. Disk Cleanupb.

StuffIt Correctc. File Explorer (!)d. WinZip

One of the properties that can be assigned to a field is a(n) ____ to specify the format (such as letters, numbers, or symbols) that must be entered into a field.
Selected Answer: Incorrectd.

format structureAnswers: Correcta. input mask (!)b. data filterc. data maskd. format structure

____ have begun to replace ROM for storing system information, such as a PC's BIOS.
Selected Answer: Correcta.

Flash memory chipsAnswers: Correcta. Flash memory chips (!)b. Microprocessorsc. Adapter cardsd. Motherboards

Case-Based Critical Thinking QuestionsCase 13-2Kelly is a college sophomore majoring in computer science.

She is interested in gaining exposure to the most useful and current programming languages and techniques.One of the languages that Kelley is learning is ____ an object-oriented programming language that is commonly used to write Web applications.

Selected Answer: Incorrectd. Visual BasicAnswers: a.

Cb. COBOL Correctc. Java (!)d. Visual Basic

____ is the process of building the Web site, including developing all of the components to be used on the Web site, creating the actual Web pages, testing the site, and publishing the site.

Selected Answer: Incorrecta. Web site designAnswers: a. Web site designb. Web site planning Correctc. Web site development (!)d. Web site deployment
Plasma displays use a layered technology like LCD and ____ and looksimilar to LCD displays.

Selected Answer: Correctc. OLEDAnswers: a. SEDb. IMOD Correctc. OLED (!)d. PHOLED
Case-Based Critical Thinking QuestionsCase 3-2Rodney owns a computer that he uses to work, keep in touch with friends and family, watch movies, listen to music, and use the Internet.

If Rodney wants to be able to record, erase, and overwrite the files on a CD, he should get a ____.

Selected Answer: Incorrectb. CD-BDAnswers: a. CD-Rb. CD-BD Correctc. CD-RW (!)d.

CD-HD

The Windows ____ shown in the accompanying figure contains the following objects: Windows, Icons, Menus, Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.
Selected Answer: Incorrectd. commandAnswers: a. general menu Correctb. desktop (!)c.

toolboxd. command

For designing the layout of a Web page, ____ are commonly used when designing animated components.
Selected Answer: Incorrecta. page layoutsAnswers: a.

page layoutsb. flowcharts Correctc. storyboards (!)d. plots

Conventional dial-up connects to the Internet at a maximum of ____.
Selected Answer: Incorrectd.

128 KbpsAnswers: a. 10.2 Kbpsb. 28.8 Kbps Correctc. 56 Kbps (!)d.

128 Kbps

____ identify users by a particular unique biological characteristic.
Selected Answer: Correcta. Biometric access systemsAnswers: Correcta. Biometric access systems (!)b. Possessed object access systemsc. Possessed knowledge access systemsd.

Password access systems

A ____ is a group of values and other data organized into rows and columns, similar to the ruled paper worksheets traditionally used by bookkeepers and accountants.
Selected Answer: Correctd. spreadsheetAnswers: a. cellb.

documentc. block Correctd. spreadsheet (!)

A ____ holds a single category of data (such as customer names or employee telephone numbers) that will be stored in a database.
Selected Answer: Incorrectb. recordAnswers: Correcta. field (!)b.

recordc. celld. table

A ____ is the smallest unit of data that a binary computer can recognize.
Selected Answer: Incorrectb. byteAnswers: a.

datumb. byte Correctc. bit (!)d. pixel

The earliest programming languages—machine language and assembly language—are referred to as ____.
Selected Answer: Incorrectb. procedural programming languagesAnswers: a.

third-generation programming languages (3GLs)b. procedural programming languagesc. interpreted languages Correctd. low-level languages (!)

A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____.
Selected Answer: Incorrectd. e-scamsAnswers: a.

dot frauds Correctb. dot cons (!)c. e-consd. e-scams

One of the most straightforward ways to improve the quality of the hits returned in a search is to use ____—essentially typing more than one keyword in a keyword search.

Selected Answer: Incorrecta. character searchingAnswers: a. character searchingb. index searchingc. code searching Correctd. phrase searching (!)
Print speed is typically measured in ____.

Selected Answer: Incorrectb. dots per second (dps)Answers: Correcta. pages per minute (ppm) (!)b. dots per second (dps)c. characters per second(cps)d.

pixels per minute (ppm)

Popular drawing programs include ____ and CorelDRAW.
Selected Answer: Correcta. Adobe IllustratorAnswers: Correcta. Adobe Illustrator (!)b. Harvard Graphicsc.

Corel Paint Shop Prod. IBM Storyboard

____ memory allows you to use more memory than is physically available on your computer.
Selected Answer: Correctb. VirtualAnswers: a. Multithreading Correctb. Virtual (!)c.

Bufferd. Shared

____ refers to identifying the browser used by each visitor, typically via JavaScript code.
Selected Answer: Incorrectb. Browser mappingAnswers: a. Personalizationb.

Browser mappingc. Visitor identification Correctd. Browser sniffing (!)

Case-Based Critical Thinking QuestionsCase 7-2Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network.

Gabrielle is planning to connect selected devices to the network wirelessly with a wireless ____.

Selected Answer: Incorrectb. hubAnswers: a. hotspotb. hubc.

data point Correctd. access point (!)

Adding to the problem of unethical ____ is the use of digital cameras today, which eliminate the photo negatives that could be used with film cameras to show what photographs actually looked like at the time they were taken.
Selected Answer: Correctd. digital manipulationAnswers: a. identity theftb. cybersquattingc.

digital counterfeiting Correctd. digital manipulation (!)

Hollerith's machine was used to process the 1890 U.S. Census data and was able to complete the task in ____, instead of the decade it usually took to process the data by hand.

Selected Answer: Incorrectb. four yearsAnswers: a. two monthsb. four years Correctc. two and a half years (!)d. six years
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.

Selected Answer: Correctd. threat definitionsAnswers: a. virus reportsb. virusesc. fraud tips Correctd.

threat definitions (!)

There are independent Web sites (such as the ____ Web site) that report on the validity of current online rumors and stories.
Selected Answer: Incorrecta. IdentifierAnswers: a. Identifierb. Phisher Correctc. Snopes (!)d.

Spammer

Case-Based Critical Thinking QuestionsCase 14-2The JL Group is a political think tank that is incorporating new media into their analyses.The JL Group has gathered data on voting habits. In order to make sure that respondents cannot claim to have voted in more elections than is possible given their age, ____ rules can be assigned to the database tables.
Selected Answer: Incorrectd. index validationAnswers: a. dynamicb.

DBA validation Correctc. record validation (!)d. index validation

In a 16.8-million-color (called photographic quality or ____) image, three bytes (24 bits) are used to store the color data for each pixel in the image.
Selected Answer: Incorrectb. mega colorAnswers: a.

real colorb. mega colorc. full color Correctd. true color (!)

Rearranging the data on the hard drive so all files are stored in contiguous locations is called ____.
Selected Answer: Incorrectb. disk backupAnswers: Correcta.

disk defragmentation (!)b. disk backupc. file compressiond. disk cleanup

____ bring buyers and sellers together to facilitate transactions between the two parties.

Selected Answer: Correctb. Brokerage sitesAnswers: a. E-tailers Correctb. Brokerage sites (!)c. M-Brokersd.

Shop carts

Some ____ must be added in pairs for optimal performance.
Selected Answer: Incorrectb. interfacesAnswers: Correcta. memory modules (!)b.

interfacesc. hard drivesd. USB ports

____ store checkout information in the customer's account for use with purchases on that site only.
Selected Answer: Incorrectc. Site-specific online payment accountsAnswers: a.

Site-specific electronic check accountsb. Site-specific smart cardsc. Site-specific online payment accounts Correctd. Site-specific digital wallets (!)

The most common flat-panel technologies include liquid crystal display (LCD), various types of light emitting diode (LED), and ____.

Selected Answer: Incorrectb. HDTVAnswers: Correcta. gas plasma (!)b. HDTVc. HD-integratedd.

DVR

Case-Based Critical Thinking QuestionsCase 7-2Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network.Gabrielle is planning to connect selected devices to the network wirelessly with a wireless ____.
Selected Answer: Incorrectc.

hotspotAnswers: a. hub Correctb. access point (!)c. hotspotd. data point

Ultraportables conforming to Intel's standards can be marketed as ____.

Selected Answer: Incorrecta. hybridsAnswers: a. hybrids Correctb. Ultrabooks (!)c. smallframe computersd. IntelBooks
Data definition involves describing the properties of the data that go into each database table, specifically the ____ that make up the database.
Selected Answer: Incorrecta. recordsAnswers: a. records Correctb. fields (!)c. charactersd. rows
Program ____ use graphic symbols and relational operators (such as < for "less than" and = for "equal to") to portray the sequence of steps needed to fulfill the logic in that program, module, or method.
Selected Answer: Incorrectc. pseudocodeAnswers: Correcta. flowcharts (!)b. structure chartsc. pseudocoded. models
Middleware for Web database applications is commonly written as ____—short sections of code written in a programming or scripting language that are executed by another program.
Selected Answer: Incorrectb. JavaScriptsAnswers: Correcta. scripts (!)b. JavaScriptsc. appletsd. utilities
Case 8-2Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports.Brenda also orders movies and television through the Internet via a(n) ____ provider, which allows users to download video for a small fee.
Selected Answer: Incorrectc. RSSAnswers: a. VoIP Correctb. VOD (!)c. RSSd. blog
One advantage of a dial-up connection is ____.
Selected Answer: Incorrecta. connection speedAnswers: a. connection speed Correctb. security (!)c. continuous availabilityd. sharing the connection
A(n) ____ is a form of protection available to the creator of an original artistic or literary work, such as a book, movie, software program, musical composition, or painting.
Selected Answer: Incorrectb. patentAnswers: a. intellectual ownership rightb. patent Correctc. copyright (!)d. trademark
One of the most common painting programs is ____.
Selected Answer: Incorrecta. Adobe's AcrobatAnswers: a. Adobe's Acrobatb. IBM's Storyboard Correctc. Microsoft Paint (!)d. Macromedia's Dreamweaver
One measurement of the speed of a CPU is the ____, which is rated in megahertz (MHz) or gigahertz (GHz).
Selected Answer: Incorrectb. CPU rpmAnswers: a. system rpmb. CPU rpm Correctc. CPU clock speed (!)d. system speed
____ is increasingly being tied to crime and even death in some countries.
Selected Answer: Incorrectc. OLPCAnswers: a. CVSb. CADc. OLPC Correctd. Internet addiction (!)
____ devices are designed to withstand much more physical abuse than conventional devices.
Selected Answer: Correctd. RuggedizedAnswers: a. Securedb. Malleablec. Flexible Correctd. Ruggedized (!)
Artificial intelligence systems that attempt to imitate the way a human brain works are called ____.
Selected Answer: Incorrectb. robotsAnswers: a. biometric systemsb. robotsc. expert systems Correctd. neural networks (!)
RAID 0 uses disk ____, which spreads files over several disk drives.
Selected Answer: Incorrecta. mirroringAnswers: a. mirroringb. burningc. clustering Correctd. striping (!)
To record data, holographic storage systems split the light from a blue laser beam into ____ beams.
Selected Answer: Correcta. twoAnswers: Correcta. two (!)b. fourc. fived. ten
A ____ is a separate piece of hardware containing multiple high-speed hard drives.
Selected Answer: Correctb. storage serverAnswers: a. storage drive Correctb. storage server (!)c. storage clientd. storage base
In reaction to scandals, Congress passed the Sarbanes-Oxley Act of 2002, which includes provisions to require ____ to personally vouch for the truth and fairness of their company's disclosures.
Selected Answer: Incorrecta. CEOs and CIOsAnswers: a. CEOs and CIOsb. CCVs and DRMs Correctc. CEOs and CFOs (!)d. SOAs and DRMs
____ are utility programs that search for documents and other files on a user's hard drives.
Selected Answer: Incorrectc. Search enginesAnswers: Correcta. Search tools (!)b. Tool boxesc. Search enginesd. Tool programs
Like graphics data, ____—such as a song or the sound of someone speaking—must be in digital form in order to be stored on a storage medium or processed by a PC.
Selected Answer: Incorrecta. pixel dataAnswers: a. pixel data Correctb. audio data (!)c. giga datad. audio programs
Digital still cameras most often use ____ cards for storage.
Selected Answer: Incorrecta. RAM memoryAnswers: a. RAM memoryb. ROM memoryc. laser memory Correctd. flash memory (!)
____ have begun to replace ROM for storing system information, such as a PC's BIOS.
Selected Answer: Incorrectb. MotherboardsAnswers: a. Microprocessorsb. Motherboards Correctc. Flash memory chips (!)d. Adapter cards
Media that allow random access are sometimes referred to as ____ media.
Selected Answer: Incorrectc. nonidentifiableAnswers: a. optical Correctb. addressable (!)c. nonidentifiabled. identifiable
Java is currently one of the most popular programming languages and has replaced ____ as the programming language used for the computer science Advanced Placement exam taken by high school students to earn college credit.
Selected Answer: Incorrectb. BASICAnswers: a. Visual Basicb. BASIC Correctc. C++ (!)d. C
Case-Based Critical Thinking QuestionsCase 6-2Bryan has just started an internship in which he uses a database frequently. The database contains information about the company's employees. Bryan's supervisor senses that he is anxious about using the database and drops by to give him a short tutorial.Bryan's supervisor explains that to retrieve information from the database, Bryan needs to use a ____.
Selected Answer: Incorrectd. formulaAnswers: a. formb. presentation Correctc. query (!)d. formula
Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ____ uniquely identifies a Web page.
Selected Answer: Incorrecta. Web ID (WID)Answers: a. Web ID (WID)b. universal resource identifier (URI) Correctc. uniform resource locator (URL) (!)d. Web resource identifier (WRI)
Case-Based Critical Thinking QuestionsCase 12-2Mother Goose Computing, Inc. provides computational biology consulting services. They are currently updating several of their systems.For the protein folding division, Mother Goose is planning to implement the new system module by module. This is called a ____ conversion.
Selected Answer: Incorrectd. pilotAnswers: a. directb. parallel Correctc. phased (!)d. pilot
Copyrights apply to both published and unpublished works and remain in effect until ____.
Selected Answer: Incorrecta. 10 years after the creation of the workAnswers: a. 10 years after the creation of the workb. 70 years after the creation of the workc. 10 years after the creator's death Correctd. 70 years after the creator's death (!)
Case-Based Critical Thinking QuestionsCase 10-1Smith Web Design is creating a secure Web site for a local doctor. In addition to providing basic information about her practice, she wants her patients to be able to log on and access their records, including images such as X-rays and MRIs.After patients log on, they should be able to download scanned versions of their X-rays and MRIs. These images should be provided in the ____ format.
Selected Answer: Incorrectd. JPEGAnswers: a. GIFb. BMP Correctc. TIF (!)d. JPEG
One of the simplest hashing algorithms involves dividing the primary key field by a particular ____.
Selected Answer: Correctd. prime numberAnswers: a. irrational numberb. power of twoc. transcendental number Correctd. prime number (!)
The process of evaluating and correcting the structures of the tables in a database to minimize data redundancy is called ____.
Selected Answer: Incorrectd. cyclic redundancy checkAnswers: a. zeroing Correctb. normalization (!)c. zonificationd. cyclic redundancy check
____ keys on a keyboard are used for issuing commands in some programs.
Selected Answer: Incorrectc. AlphanumericAnswers: a. Arrow Correctb. Function (!)c. Alphanumericd. Number
____ account numbers are essentially disposable credit card numbers that can be used to buy goods and services that will be charged to the customer's regular credit card.
Selected Answer: Incorrectb. OnlineAnswers: Correcta. Virtual (!)b. Onlinec. Temporaryd. Prepaid
When Mary started college, her parents bought her a new computer that came with minimal software. She is now looking into purchasing additional software.Mary needs word processing software for her classes, but she has to budget her resources carefully this semester. She might consider using ____, which is available as a free download via the Internet.
Selected Answer: Correctb. OpenOfficeAnswers: a. WordPerfect Office Correctb. OpenOffice (!)c. Microsoft Officed. SmartSuite.org
In an expert system, the ____ is a software program that applies the rules to the data stored in the knowledge base in order to reach decisions.
Selected Answer: Incorrectd. rules processorAnswers: Correcta. inference engine (!)b. knowledge busc. data authorityd. rules processor
There are four basic categories of software: commercial software, shareware, freeware, and ____.
Selected Answer: Incorrectc. licensed softwareAnswers: Correcta. public domain software (!)b. publish softwarec. licensed softwared. advertising software
To prevent individuals from making unauthorized copies of feature films purchased on DVDs or downloaded via the Internet, many of these items contain copy protection or some other form of ____.
Selected Answer: Incorrectc. RSIAnswers: Correcta. DRM (!)b. AACSBc. RSId. patents
___ is a new alternative for homes and businesses today in areas where there is fiber optic cabling available all the way to the building.S
elected Answer: Incorrectc. DSLAnswers: Correcta. BoF (!)b. ISDNc. DSLd. T1
Some wireless ____ are created by cities or large organizations to provide free or low-cost Internet access to residents of a particular area.
Selected Answer: Incorrectd. LANsAnswers: a. WANsb. PANs Correctc. MANs (!)d. LANs
____ software can control which devices can be connected to an employee's computer.
Selected Answer: Incorrecta. Device authenticationAnswers: a. Device authentication Correctb. Data-leakage prevention(!)c. Network quarantined. Professional firewall
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.
Selected Answer: Incorrectc. identity theftAnswers: a. DoS attacksb. spammingc. identity theft Correctd. typosquatting (!)