CAS CS 61152

subject Type Homework Help
subject Pages 22
subject Words 2286
subject Authors Catherine Laberta

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
The host name is the name of the group or institution hosting the site.
A toggle key has two positions: on and off.
A gigaPoP is a POP that provides access to a backbone service capable of data transfer
rates exceeding 1 Gbps.
Location awareness technology is available through cell phones.
page-pf2
RAM memory is located on the motherboard and holds all programs in use and
documents in progress.
Only employers that are part of the IT industry are demanding higher levels of
computer literacy.
There are five steps of the machine cycle.
page-pf3
The Symbian OS boasts a reduced demand on the processor and memory.
A study by the National Cyber Security Alliance indicates that less than one in four
Americans are fully protected against malware.
Amazon SimpleDB is founded on the attribute oriented key/value model.
page-pf4
A lot of software piracy takes place on file-sharing sites.
Unlike other computer networks, WANs do NOT use protocols.
An advantage of networking is fewer security threats.
With radio transmissions, data travels through the air.
page-pf5
The motherboard contains the CPU.
Prolonged keyboard use can cause carpal tunnel syndrome.
Java is considered to be an object-oriented, high-level, cross-platform programming
language.
page-pf6
If a program is compatible, it is said to be a native application for a given processor
design.
DDR2-SDRAM and DDR3-SDRAM need to have a constant power supply to avoid
losing their contents.
A spider is a type of Internet virus.
The eco-friendly attitude of Blu-ray applies to both the production process and the
office environment.
page-pf7
A B2C business uses the Internet to supply consumers with services, information, or
products.
A heat sink keeps the system unit cool.
A business continuity plan in an organization is far more developed, complex and
comprehensive than a disaster recovery plan.
page-pf8
Scalability refers to systems interacting effectively regardless of the platform on which
they are built.
A Web database engineer uses multimedia software to create presentations, including
animation and video.
Many ISPs offer free antivirus protection to their subscribers.
page-pf9
Stealing the key used for encryption is called key intermediation.
CRM software keeps track of an organization's interactions with its
customers.
Search engines maintain databases of viruses and other malicious software that reside
on the Internet.
A table is a collection of databases.
page-pfa
Twisted-pair wire is used for telephones.
The system requirements for a software program indicate the:
A) maximum level of power the computer needs to run the software.
B) number of peripheral devices that must be attached to your computer.
C) minimum level of equipment needed for the computer to run the software.
D) average level of power needed for the computer to run the software.
.edu
page-pfb
A) The University of Wisconsin
B) A clothing store
Which of the following company or university departments typically has the
responsibility for managing information technology and systems?
A) Computer operations (OS)
B) Information and technology systems (ITS)
C) Information systems (IS)
D) Computer management group (CMP)
A common reason for using hard disk partitions in a computer system is that:
A) partitioned hard disks have a faster access time.
B) a different partition can be used for each application software product.
C) hard disks over 1 GB in capacity must be partitioned due to their size.
D) partitions enable the computer to boot different operating systems.
page-pfc
Bluetooth is a(n)____________radio transmission technology.
A) long-range
B) fiber-optic
C) short-range
D) experimental
Qualified computer science graduates find their theoretical and analytical skills make
them good candidates for which of the following types of firm?
A) Field engineering
B) Software development
C) Application training
D) Software research
page-pfd
AJAX
A) Includes Ethernet, TCP/IP, and LAN administration
B) Includes skills operating system configuration and maintenance, networking, and
systems programming
C) Combines HTML/XHTML and JavaScript to provide Web 2.0 development
techniques
The hexadecimal representation for the decimal 10 is:
A) A.
B) 15.
C) B.
D) 10.
The goal of Secure Electronic Transmissions (SET) is to:
A) alert the network administrator to packet sniffing activities.
B) add public key encryption techniques to all Internet traffic.
page-pfe
C) provide firewall standards for all network servers.
D) create safe online transactions using digital certificates.
Virtual memory is an enhanced way to utilize the main memory by:
A) using a part of ROM as an extension of RAM to conserve the main memory.
B) creating pages of variable size to use when the swap file is full.
C) dividing data and instructions into multitasking units.
D) using a hard disk swap file when memory is full.
Microsoft Windows Server 2008 is designed to support which of the following types of
computing in a corporate environment?
A) Client/server
B) Mobile
C) Wireless
D) Centralized
page-pff
When someone refers to the front end of a database server, this refers to which of the
following:
A) how the retrieval component of the database works.
B) backup and storage components of the database.
C) the server and programming code.
D) the part of the program that the user manipulates.
The systems development life cycle provides____________________.
A) a formal structure for decision making in development
B) exact solutions at several phases of development
C) a structure of logical guide to system development with the goal of improving the
development process and quality
D) a complex structure that offers limited choices at each stage of development
page-pf10
Security activities are done in which of the following phases of the SDLC?
A) Implementation
B) Planning
C) Design
D) All of the above
In order from slowest to fastest, the correct order of the types of Internet access is as
follows:
A) dial-up, cable, DSL, satellite, FiOS.
B) FiOS, satellite, cable, DSL, dial-up.
C) DSL, dial-up, FiOS, cable, satellite.
D) dial-up, DSL, cable, satellite, FiOS.
Like a traffic officer, the computer's OS works at the intersection of:
page-pf11
A) application software and the computer's hardware.
B) application software and the user.
C) the user and the computer's hardware.
D) application software, the user, and the computer's hardware.
Which of the following is NOT true about digital telephony?
A) The telephone transmits human voices with digital versus analog signals.
B) Most telephones in the local loop use digital telephony.
C) Digital telephony is often implemented as an in-house company telephone system.
D) The audio signal is clearer, with less electronic noise than is found in analog
systems.
When a computer is connected to a network, it is called a:
A) router.
page-pf12
B) communications device.
C) peripheral.
D) node.
Rapid application development, or RAD, includes each of the following features
EXCEPT:
A) re-using software components.
B) active user involvement through the use of workshops and focus groups to gather
information.
C) more formality in documentation and team communication.
D) prototyping early and repeated testing.
______is the act of one company contracting with another to provide services, that
might otherwise be performed by in-house employees, performed by another company.
A) Labor dumping
B) Outsourcing
C) Employment transferring
page-pf13
D) Contracting
Tracking network assets and maintenance is one function of which of the following?
A) Operational Support Systems
B) Customer Relationship Management
C) Software-as-a-Service
D) Enterprise Resource Tracking
The two main categories of software are:
A) system software and application software.
B) user software and computer software.
C) task software and instructional software.
D) internal software and external software.
page-pf14
Compression enables faster downloads, but then you have to_______the files after
downloading.
A) encrypt
B) decompress
C) zip
D) decrypt
When storing data about an employee, the name, street, and telephone number would be
entered in:
A) records.
B) tables.
C) keys.
D) fields.
page-pf15
The greater the number of_________on a microprocessor, and proximity to each other,
the faster the processing speed.
A) disks
B) registers
C) buses
D) transistors
An interpreter translates code_________at a time.
A) one line
B) all lines
C) one module
D) one block
_______is a Windows 7 feature, which enables users to instantly see a list of relevant
documents,pictures, music, and e-mails on their PCs that match the entered description.
A) Jump list
page-pf16
B) Snap
C) Windows Search
D) Pin
As a best practice, costing the most money,____________system conversion is safest.
A) parallel
B) phased
C) direct
D) pilot
Software that you can use on a "try before you buy" basis is known as:
A) groupware.
B) freeware.
C) shareware.
D) commercial software.
page-pf17
EAI
A) Offers one standardized technology package
B) Integrates multiple enterprise systems
C) Comprised of hardware, software, data, people, and procedures
D) Allows a business to integrate information and applications on a company-wide
basis
E) Permits users to customize technology tools
All of the following are critical to the success of Business Process Reengineering
EXCEPT:
A) customer focus.
B) cross-functional participation.
C) infrequent communication.
D) active leadership.
page-pf18
System software includes the operating system and the______utilities.
The ultimate nonprocedural language would be_________language, the
everyday language that people speak.
Enlargements that cause an unattractive distortion are referred to as the________.
The______ sublimation printer produces high quality color output that is difficult
to distinguish from color photographs.
page-pf19
A business that uses the Internet to provide another business with the materials,
services, and/or supplies it needs to conduct its operations is known by the acronym
________.
_________, short for JavaScript Object Notation, is a text-based, human-readable
technique for representing simple data structures and objects.
Each track on a disk is subdivided into smaller, pie-shaped wedges called______.
page-pf1a
Although most companies that maintain databases today claim that they sell
user________information only to bona fide customers, activists are concerned with
what happens to the information after it's sold.
__________refers to the capability of sending a message without disclosing your
identity.
Visual Basic uses the _________-driven programming language in which code modules
are written to execute in response to user actions.
Commercial software
page-pf1b
A) Software without a copyright that can be copied, changed, and used at no charge
B) Copyrighted software that contains measures to prevent unauthorized duplication
C) Copyrighted software that you must pay for before using
A software_________is a collection of individual, full-featured, standalone programs
that are bundled and sold together.
A(n)________enables participants to create a shared workspace
during videoconferencing.
A DAC converts the digital signal into real-world________output.
page-pf1c
A(n)______is the smallest piece of information with which a computer can work.
A(n)_______is a point of light.
A battery-powered piece of equipment that provides backup power to a computer for a
limited time is known by the acronym ________.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.