CAS CS 30028

subject Type Homework Help
subject Pages 16
subject Words 1670
subject Authors Gary B. Shelly, Kathleen McMahon, Misty E. Vermaat, Tristen Kendall

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A systems ____ is responsible for designing and developing an information system.
a. manager
b. coordinator
c. analyst
d. developer
____ chart is a popular chart type.
a. Data
b. Column
c. Line
d. Pie
Investors often use ____ to buy and sell stocks and bonds without using a broker.
a. online investing
b. online banking
c. neural networks
page-pf2
d. All of the above
Physical transmission media used in communications include all of the following
except ____.
a. twisted-pair cable
b. coaxial cable
c. broadcast radio cable
d. fiber-optic cable
The first step in cleaning a computer is ____.
a. turn it off, unplug it, and unplug all cables from the ports
b. vacuum the fan on the back of the computer case
c. wipe the case with an antistatic wipe
d. open the case
page-pf3
The computer ____ field consists of manufacturers and distributors of computers and
computer-related hardware.
a. hardware
b. manufacturing
c. software
d. equipment
The processor relies on a small quartz crystal circuit called the ____ clock to control the
timing of all computer operations.
a. system
b. master
c. unit
d. control
page-pf4
The purpose of memory ____ is to optimize the use of random access memory (RAM).
a. performance
b. management
c. throttling
d. integration
All computer keyboards, such as that in the accompanying figure, have ____ that
includes letters of the alphabet, numbers, punctuation marks, and other basic keys.
a. arrow keys
b. a typing area
page-pf5
c. Internet controls
d. a numeric keypad
A(n) ____, sometimes called an archival backup, copies all of the files in a computer.
a. full backup
b. differential backup
c. selective backup
d. incremental backup
In contrast to most desktop computers, a typical notebook computer usually has about
____ keys.
a. 55
b. 70
c. 85
d. 100
page-pf6
An acceptance test ____.
a. verifies that each individual program works by itself
b. verifies that all programs in an application work together properly
c. verifies that an application works with other applications
d. is performed by end-users and verifies that the new system works with actual data
Until a few years ago, printing a document required connecting a computer to a printer
with a ____.
a. portage
b. cable
c. FireWire
d. SCSI link
page-pf7
As shown in the accompanying figure, a technique used to implement a storage system
is a(n) tape ____, which is a high-capacity tape system that works with multiple tape
cartridges for storing backups.
a. archive
b. network
c. appliance
d. library
page-pf8
Depending on the type of hard disk, transfer rates range from ____.
a. 12 -24 MBps
b. 125 - 200 KBps
c. 15 - 320 MBps
d. 4,500 " 15,000 rpm
One type of spyware, called a(n) ____, is hidden on Web pages or in e-mail messages in
the form of graphical images.
a. Web bug
b. forensic element
c. content filter
d. integrated bot
A(n) ____ device is an input device that allows a user to control a pointer on the screen.
page-pf9
a. tracking
b. pointing
c. basal
d. pad
In large companies, users write a formal request for a new or modified information
system, which is called a(n) ____ request.
a. system
b. IS
c. project
d. corporate
A(n) ____ device is any type of hardware capable of transmitting data, instructions, and
information between a sending device and a receiving device.
a. linkage
b. communications
page-pfa
c. dial-up
d. baseband
Content ____ is the process of restricting access to certain material on the Web.
a. remastering
b. filtering
c. indexing
d. masking
Current processors include advanced transfer cache, a type of ____ built directly on a
processor chip.
a. L1 cache
b. L2 cache
c. L3 cache
d. L4 cache
page-pfb
Which of the following replicates itself to other computers?
a. virus
b. Trojan horse
c. worm
d. SMS
A ____ is a small text file that a Web server stores on a user's computer.
a. worm
b. spike
c. cookie
d. payload
page-pfc
As shown in the accompanying figure, ____ programs are focused on creating actual
designs.
a. computer engineering
b. computer science
c. computer information systems
d. none of the above
Which of the following is a basic category of output?
a. text
b. graphics
c. data
d. video
page-pfd
Preventive maintenance of your computer requires a few basic products, including
____.
a. lint-free antistatic wipes and swabs
b. antistatic wristband
c. screen cleaning solution
d. all of the above
A(n) ____ is a small, flat, rectangular pointing device that is sensitive to pressure and
motion.
a. trackball
b. touchpad
c. optical mouse
d. stylus
page-pfe
____ data is sample data that mimics real data a program will process once it is in
production.
a. Sample
b. Manufactured
c. Test
d. Analogous
Case 2
You have just been hired as the network administrator for a brand-new startup company,
and your first task is to select the server operating system that you will suggest to the
head of the IT team as the one you recommend for the office.
The company is going to do a lot of work in the e-commerce space. Which of the
following server operating systems was designed for specifically this kind of work that
the new company will do?
a. NetWare
b. Solaris
c. Linux
d. UNIX
page-pff
____ are audio output devices that cover or are placed outside the ear.
a. Earphones
b. Earbuds
c. Headphones
d. VoIPs
____ is a set of technologies by Sun Microsystems that allows programmers to develop
and deploy Web services for a company.
a. JIT
b. JavaScript
c. Java EE
d. JavaBuilder
If a certification exam is not passed, the test-taker must ____.
a. pay the fee again to retake the test
page-pf10
b. immediately retake the test at no cost
c. never take the test again
d. complete a remedial course of study
____ maintenance is the process of including new features or capabilities in an
information system.
a. Performance
b. Adaptive
c. Corrective
d. Preventive
____ software, such as operating systems and utility programs, consists of the programs
that control or maintain the operations of a computer and its devices.
a. System
b. Application
c. Management
d. Program
page-pf11
For the small business and home user, an ISDN line provides slower transfer rates than
dial-up telephone lines.
____________________ software consists of the programs that control or maintain the
operations of the computer and its devices.
Certification training options are available to suit every learning style.
page-pf12
A machine-dependent language can run on many different types of computers and
operating systems. _________________________
In the past, e-commerce transactions were conducted primarily using mobile computers
and devices.
____________________ is a common data type that consists of lengthy text entries.
With relational database systems, during database design the systems analyst defines
the structure of each table in the system, as well as relationships among the tables.
page-pf13
The more bits used to represent a pixel in a digital camera, the fewer colors and shades
of gray that can be represented. _________________________
With a low-level language, each language instruction typically equates to multiple
machine language instructions.
Many smart phones and other mobile devices use XML as their markup language.
page-pf14
The user interface controls how data and instructions are entered and how information
displays on the screen.
In addition to access controls, a computer should maintain a(n)
____________________ trail that records both successful and unsuccessful access
attempts.
page-pf15
When the Start button shown in the accompanying figure is clicked, the Start menu is
displayed on the Windows Vista desktop.
When the systems analyst identifies the data and process requirements, the next step is
to develop detailed design specifications for the components in the proposed system.
A(n) ____________________ chart, such as that in the accompanying figure, shows a
trend during a period of time, as indicated by a rising or falling line.
LCD monitors have a small ____________________; that is, they take up less desk
space than older monitors.
page-pf16
The system development cycle is a dynamic iterative process.
After the systems analyst defines the technical requirements, the next step is to
summarize these requirements for potential vendors.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.