CDA 76773

subject Type Homework Help
subject Pages 24
subject Words 2430
subject Authors Catherine Laberta

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
WML is a specialized form of XML used by wireless devices.
The cursor is also known as the insertion point.
PROM requires a special device to write instructions on a blank chip one time only.
E-business refers to buying, selling, and providing customer service over the Internet.
page-pf2
Google has joined the Internet browser competition with its entry named Chrome.
Errors in programming code could cause a computer to become nonresponsive.
An advantage of networking is centralized data management.
page-pf3
Intel is the only producer of PC chips.
In the address of a site, https:// instead of http:// tells the user that the Web site is
secure.
A network is a group of two or more computers connected for the purpose of sharing
resources.
The form factor is a specification for how internal components are mounted in the
system unit.
page-pf4
The failure to perform backups on data, information, and software on a regular basis
should not be a concern of computer users.
A series of steps that results in the solution to a problem is called an algorithm.
NICS can only be used with wireless networks.
page-pf5
VoIP is too complex to be installed and configured by a novice user.
A value-added network is a public data network that offers end-to-end dedicated lines
with guaranteed security.
Mbps stands for megabytes per second.
Intranets are networks that belong to an enterprise and are only accessible by the
employees.
page-pf6
Operating system software refers to all of the programs that enable the user to use the
computer to perform tasks and accomplish work.
Agile methods encourage teamwork, self-organization, and accountability.
Reducing software piracy will have no effect on creating jobs.
page-pf7
MIS programs usually involve several semesters of higher mathematics.
Windows 7 is available in six versions.
Most Disaster Recovery plans are unwritten and are merely reactions to unforeseen
events occurring.
A compiler translates source code into object code.
page-pf8
Tailor-made applications often cost much less than general-purpose applications.
The public nature of the Internet has lessened privacy issues.
Circuit switching works best when avoiding delivery delays is essential.
page-pf9
The FTC and Department of Justice have primary jurisdiction over spammers.
Operational feasibility means that the project needed can be completed with newly
procured resources.
Ripping CDs is also referred to as burning CDs.
Podcasts continue to contain just sound, although expansion to include images and
video are in the developmental stages.
page-pfa
System requirements refer to the maximum level of equipment that a program needs to
run.
Another term for information hiding is encapsulation.
The physical address of a network node is assigned by the software in use.
page-pfb
Screen output display is a permanent record.
The most important and well-recognized type of application software is the computer's
operating system.
A communication device is a software component that moves data into and out of a
computer.
On non-Apple systems, the FireWire port is called a _______port.
A) 1439
B) 1394
C) 2008
page-pfc
D) 1995
A _______________enables users to create, edit, and manage databases in which files
or tables are independent of each other.
A) database management system
B) relational database management system
C) file management program
D) network database management system
When should documentation of an information system be undertaken?
A) When the completed information system is shipped to consumers
B) At the start of the project to report project goals
C) Throughout all phases of the life cycle
D) At the end of the project to summarize results
page-pfd
A _____is a client that relies on the server for its processing ability.
A) limited client
B) terminal client
C) thin client
D) minimal client
BASIC is widely accepted as a teaching language in academia.
All of the following are needed to access your computer in a multiuser environment
EXCEPT a(n):
page-pfe
A) home directory.
B) password.
C) user name.
D) Internet address.
Which of the following is NOT true about Web hosting services?
A) It provides e-advertising to increase sales.
B) It offers site management utilities.
C) It provides server space.
D) It makes the site available to the public.
The process of loading the OS to memory is which of the following?
A) Configuration
B) Booting
C) Installing
page-pff
D) Authentication
Which of the following types of language is representative of the first generation of
programming languages?
A) Procedural
B) Object-oriented
C) Assembly
D) Machine
Computer science students are encouraged to supplement their technical degrees with
all of the following 'soft" business skills EXCEPT:
A) computer history.
B) project management.
C) teamwork.
D) interpersonal communication.
page-pf10
The first graphical Web browsers were developed in which of the following years?
A) 1993
B) 1970
C) 2005
D) 1988
Which of the following is the maximum transfer speed for all digital line protocols such
as switched
multimegabit data service (SMDS)?
A) 11 Mbps
B) 155 Mbps
C) 56 Kbps
D) 1 Gbps
page-pf11
Which of the following statements is TRUE?
A) Most commercial computer programs are free of programming errors.
B) Most errors cause programs to run slowly or perform needless tasks.
C) Most commercial computer programs average between two and four errors per 1,000
lines of code.
D) Most errors in programs cause serious miscalculations.
Historically, an operational support system controlled which of the following?
A) Enterprise access to computer networks
B) An organization's access to external computing systems
C) Telephone and computer networks for telecommunications service providers
D) Mainframe access to peripherals
TCP/IP
page-pf12
A postimplementation system review document is used to:
A) evaluate whether the system has met its goals.
B) document any remaining problems with the final system.
C) credit programmers and other developers for their work on the project.
D) determine if the project has been completed on time and within budget.
Another name for a home page is a(n):
A) URL.
B) Web site.
C) index page.
D) hypertext page.
page-pf13
Application software:
A) includes programs that you use to complete a specific task such as letters and
presentations.
B) is used to find the source of computer malfunctions.
C) provides the environment in which the operating system functions.
D) refers to background programs that prepare the computer to start up.
Identifying and managing project risk is determined by of which of the following?
A) Senior management
B) Information technology steering committee
C) Project team
D) Project manager
A _________is a computer program used by search engines to roam the World Wide Web
via the Internet, visit sites and databases, and keep the databases of the Web search
page-pf14
engines pages up-to-date.
A) spider
B) searcher
C) snail
D) seeker
An IP address is composed of:
A) four sets of numbers separated by periods.
B) five sets of numbers separated by periods.
C) four sets of numbers separated by commas.
D) five sets of numbers separated by commas.
The basic advantage of Internet telephony is that:
A) it is a new and experimental technology.
B) there is only one provider of this service.
page-pf15
C) you don't pay-long distance charges.
D) webcams can be used.
All of the following are necessary in a good disaster recovery plan EXCEPT:
A) timely recovery process.
B) ongoing evaluation of the process.
C) test of the backup system.
D) on-site physical backup protection.
Of the currently employed access control methods,_________is the most secure
because it involves identification of the user's body, such as his or her eyes or
fingerprints.
A) biometric authentication
B) callback
C) smart card
D) "know and have" authentication
page-pf16
Wired technologies are:
A) connected through the air.
C) connected by a physical medium.
B) connected end to end.
D) buried underground.
Which of the following magazines is specifically related to technology management?
A) InformationWeek
B) UnixWorld
C) SC Magazine
D) C++ Systems Journal
page-pf17
Drivers for frequently used input and output devices are:
A) often included with most operating systems.
B) no longer needed if the computer has Plug-and-Play capability.
C) programs that enable the user to install the system utilities faster.
D) interchangeable because input and output devices can now use the same information
to enable them to work.
Which of the following is still the most common method for data entry?
A) Microphone
B) Stylus
C) Scanner
D) Keyboard
page-pf18
Switch
A) Central wiring device often used in a star topology
B) Occurs when two workstations attempt to access the LAN simultaneously
C) Unit of data that is passed in a ring topology
D) Has all nodes attached in a circular wiring arrangement
Floating-point notation:
A) requires newer computers to have a special chip called a math coprocessor.
B) has no advantage if used with numbers containing fractional points.
C) allows the computer to work with very large, but not very small, numbers.
D) uses no fixed number of digits before or after the decimal point.
CASE
A) Bar chart showing project timelines
B) Project management software that includes documentation and graphical output
support
page-pf19
Which of the following types of port is used by an infrared mouse?
A) Parallel
B) IrDA
C) PS/2
D) Serial
A database that can store multimedia information is called a__________database.
A) media-embedded
B) query-driven
C) object-oriented
D) media-enabled
page-pf1a
Which of the following is NOT an example of a solid state storage device?
A) Flash memory card
B) ExpressCard
C) Smart card
D) Cache memory
A systems________________is a problem-solving computer professional who works
with users and managers in determining the organization's information system needs.
Operating system
page-pf1b
File formats that are limited to specific software vendors or computer models are
called_______file formats.
Sales_____________automation is software that is used interchangeably with CRM to
automate many of the business processes involved with sales, including processing and
tracking orders, managing customers and other contacts, and monitoring and controlling
inventory.
The goal of_________________________is to improve existing processes and
optimize assets by effectively and efficiently managing the entire life cycle of these
business processes.
page-pf1c
PSTN
A) Global telephone system for data and voice communications
B) Communications standard that enables both digital telephone and data service
C) High-speed leased lines used by corporations and universities
The_________step in the machine cycle interprets what action the program is telling
the computer to perform.
Synthesizer
A) Produces music by generating musical notes
B) A representation of an image as a matrix of pixels
page-pf1d
Cooling fan
A) Any size of case that contains the computer's main hardware
B) Prevents computer components from being damaged by heat
C) Specification for mounting internal components such as the motherboard
The process of copying a file from another computer to your computer is referred to
as________.
Tools such as Microsoft Project and Sharepoint are used_______________.
A) to create a budget for the system
B) as a project notebook that stores documentation for a project
C) for analysis of current systems
D) for creating a maintenance plan for a project
page-pf1e
The writing on a tablet PC can be converted to standard text with
recognition_____software.
Shareware
A DoS attack is a denial of_______attack.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.