CDA 35882

subject Type Homework Help
subject Pages 22
subject Words 2163
subject Authors Catherine Laberta

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
There is currently no software to prevent pop-ups on your computer.
All new cell phones in the United States must have GPS awareness.
Hyperlinks are words or images you can click to bring another document into view.
Application software includes all the programs that provide the infrastructure and
hardware control needed for a computer, its peripheral devices, and other programs to
function smoothly.
page-pf2
A disk cleanup utility will search for and delete unusable files, along with any files in
the recycle bin.
Although Opera is a high-quality product for navigating the Internet, it is limited due to
its inability to be used with a wide range of operating systems.
The system unit houses the computer's peripheral hardware components.
page-pf3
The uncontrolled changes or bumps that occur during a project and lead to both
increased costs and a longer development schedule are known as scope creep.
Sales force automation software is used with ERP systems.
With packet switching, the message is sent over a physical end-to-end circuit.
In a P2P network, users can choose which files they wish to share.
page-pf4
The information technology steering committee is made of managers from the
information systems department.
Another term for network congestion is overloading.
Ada is an event-driven programming language.
page-pf5
Two or more sectors on a disk combine to form a cluster.
The systems analyst's job function is in the majority technical.
Once a disaster recovery plan is developed, the backup system should be tested
regularly.
It is estimated that between 2000 and 2015, 3.3 million service jobs will move overseas.
page-pf6
Data integrity refers to limiting accessibility of data to users.
The program specification defines the detailed coding that is to take place.
According to the Bureau of Labor and Statistics, professional, scientific, and technical
services will grow 50 percent by 2018.
page-pf7
A wiki is a free Web-based word processor and spreadsheet that allows project members
to share and edit documents online.
The waterfall method has a two-way flow of information so that a project can progress
forward or can return to a prior stage if results are not as desired.
Telecommuting is sometimes referred to as teleworking.
Palm OS was initially developed for PDAs in 1996 for use with a touch screen using
page-pf8
graphical user interfaces.
A globally unique identifier (GUID) is an identification number that is generate by a
hardware component or a program.
The hard disk drive, CD drive, and DVD drive in a computer are usually removable.
Middle managers must make strategic decisions about how to best organize resources.
page-pf9
One of the best resources on the Web for familiarizing yourself with many issues and
legislation relating to technology is the Association of IT Professionals.
The goal of business process management is to efficiently and effectively manage the
entire cycle of business processes.
A flexible keyboard can be folded and weighs just 250 grams.
page-pfa
Satellite access does not work well in rural or less congested areas.
Digitization is the transformation of data into digital format.
IrDA stands for Infrared Data Association.
Ubiquitous computing is defined as individuals interacting with one computer at a time.
page-pfb
Which of the following does a data flow diagram (DFD) illustrate?
A) Using a set of graphical symbols shows how data moves through the existing system
B) The relationship between organizations, departments, users, programs, and data
C) Explains the role of all data types in the system and how they impact the project
D) Depicts the role that data plays in the system
Business process reengineering focuses on two core aspects of an organization:
A) processes and management.
B) people and processes.
C) finance and operations.
D) people and finance.
page-pfc
HTML
_______is becoming more popular than previously used character codes due to its
ability to represent most, if not all, of the world's languages.
A) ASCII
B) EDCDIC
C) Extended ASCII
D) Unicode
Which type of software would you install if you want full-functioning word processing
and spreadsheet capabilities, and you want the programs to share resources?
A) Standalone programs for word processing and spreadsheets
B) A software suite containing word processing, spreadsheet, and other programs
C) An integrated program containing word processing, spreadsheet, and other programs
D) A network-integrated program that includes modules that share the same interface
page-pfd
Multimedia applications use more than one media.
Exception reports:
A) concern localized issues, such as an inventory shortage.
B) alert managers to unexpected developments.
C) are unimportant to managers.
D) provide a quick overview of the organization's performance.
The SLC transforms________signals into______signals.
A) digital; analog
B) long-distance; local
page-pfe
C) analog; digital
D) local; long-distance
Another term for a network administrator is a network:
A) operator.
B) engineer.
C) manager.
D) supervisor.
The document prepared at the end of Phase 1, which describes the existing system's
problems, details the proposed solution and a recommendation is called the:
A) project summary.
B) system proposal.
C) project proposal.
page-pff
D) system summary.
Which of the following switching methods is used by the Internet?
A) Packet
B) Token
C) Distributed
D) Circuit
Multidimensional databases:
A) are only usable when linked to a network.
B) are designed to store images, sounds, files, and text in a database.
C) store data in more than the two dimensions used by relational databases.
D) are also called flat-file databases.
page-pf10
Which of the following is NOT a disadvantage of networks?
A) Sharing important information
B) Security issues
C) Loss of autonomy
D) Lack of privacy
Devices such as the_________USB flash drive include special security software to
allow you to surf the Web privately and securely, while protecting your identity and
data.
When a virus self-modifies itself, the new copy is known as a:
A) m-virus.
page-pf11
B) variant.
C) beta.
D) macro virus.
A project dictionary is often used to:
A) record the names and contributions of all people working on the project.
B) explain all terminology relevant to the project.
C) teach users how to work with the new system.
D) track version updates to the system.
A CPU's word size is important because it determines which_________ the CPU can
use.
A) operating system
B) application software
C) disk storage
D) input devices
page-pf12
The main course focus for the system and software engineering field includes:
A) application software and business processes.
B) programming and mathematics.
C) engineering concepts and mathematics.
D) analysis and problem solving.
_______, which was originally an Apple browser, is now available for PCs.
A) Internet Explorer
B) Mozilla Firefox
C) Mosaic
D) Safari
page-pf13
_______transmit data by sending and receiving microwave signals to and from
Earth-based stations.
A) Infrared technologies
B) Bluetooth technologies
C) Satellites
D) Broadband technologies
A flash drive is a type of storage that uses which of the following circuitry?
A) Solid-state
B) Semiconductor
C) Virtual
D) Liquid crystal
The type of software that sits on top of the operating system and utilizes the computer's
capabilities to perform a user task is called:
page-pf14
A) utility software.
B) system software.
C) application software.
D) internal software.
Once a disaster recovery plan is developed, additional steps to ensure the plan continues
to function appropriately requires which of the following?
A) Updating backup software when needed
B) Testing the backup system regularly
C) Checking for security breaches regularly
D) All of the above
The central processing unit (CPU):
A) is a fairly simple device.
B) plays a minimal role in processing data.
page-pf15
C) is an integrated chip capable of processing signals.
D) is different from a microprocessor.
Which of the following protocols use Ethernet?
A) CSMA/CD
B) TCP/IP
C) IP
D) OSI
As of April 2010, Mozilla Firefox had_______percent of the browser market.
A) 7
B) 33
C) 4
D) 54
page-pf16
Which of the following job trends resource is available from the U.S. Department of
Labor's Bureau of Labor Statistics?
A) The Occupational Compensation Handbook
B) The Occupational Outlook Handbook
C) The Occupational Trend Handbook
D) The Occupational Career Handbook
_________can be compromised when smaller computer tools are lost or stolen.
A) Privacy
B) Security
C) Timely communication
D) Data accuracy
page-pf17
Ten years ago, most IT jobs were_________focused.
A) internally
B) externally
C) globally
D) outwardly
_______is the field that pertains to legal evidence found in computers and digital
storage media.
A) Computer evidence
B) Computer technology
C) Computer forensics
D) Computer discovery
If you borrowed software from a friend and installed it on your own computer,
you engaged in digital_______ .
page-pf18
The system utility that you would use to organize the data stored on your computer
is called a(n) _____ manager.
Adobe's_________Elements is an image-editing program designed for beginners
to prepare their pictures for output to a color printer.
______is Internet software that may monitor your computer or online activity, relay
information about you to its source, or allow others to take control of your computer.
page-pf19
The SSCP certificate, or_______Security Certified Practitioner certificate,
demonstrates vendor-neutral skills and competency for information security
practitioners.
Java
A) Recent cross-platform language
B) Used for fast development of Windows applications
C) Suited for mathematical problem solving
Antivirus software uses pattern-matching technique to examine files for telltale virus
code________.
page-pf1a
Opening a(n) _________file attachment presents the greatest risk of virus infection.
Linux
Software
A) Programs, such as a disk cleanup tool, that enable the computer to function properly
B) A series of instructions the computer needs to perform the basic operations in the
information-processing cycle
C) The programs that instruct a computer
page-pf1b
Freeware
_________software protects a computer from viruses.
Ethical hackers are also known as ______hats.
A _______, often used for collaboration, is a collection of Web pages designed to
enable anyone with access to contribute or modify its content.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.