CDA 78235

subject Type Homework Help
subject Pages 24
subject Words 2589
subject Authors Catherine Laberta

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
IP is a connection-less protocol.
The Internet protocols are collectively called TCP/IP.
The goal of the Agile method is to enable an organization to deliver systems quickly,
change them quickly, and change them often.
A software license is actually a contract with the software publisher.
page-pf2
The security of a system should be completed in the implementation phase of the
systems development life cycle.
Many businesses use VPNs to provide their employees and customers with a quick,
secure access to corporate information.
Although some individuals may be discouraged from participating in e-commerce
activities because of privacy concerns and fears regarding the use of information
collected by Web sites, the Internet retail sector continues to thrive.
page-pf3
ISP is an acronym for Internet service provider.
Both outsourcing and labor dumping are driven by the search for cheap labor.
With lossless compression, the file is compressed so that it can be completely restored.
page-pf4
Object-oriented programming is a technique similar to structured programming.
Object-oriented databases are the newest type of database.
The Apple Quick Time plug-in enables movies, animation, and virtual reality worlds to
be viewed within a browser window.
C is a language that combines the benefits of high-level programming languages with
the_________efficiency of an assembly language.
page-pf5
The kernel is the central part of the OS that consists of the actions the OS uses most
frequently, such as managing hardware.
USB flash drives are also known as memory sticks.
Report generators and query languages are examples of nonprocedural languages.
page-pf6
With nonstreaming video, the video picture starts playing right after the user clicks the
video link.
A smart card is also known as an ICC.
In a DDoS attack, the commandeered computers are called zombies and the individual
computers are called botnets.
An OSis a malicious program that enters the computer without permission.
page-pf7
People who lose their jobs because of structural unemployment will eventually get them
back.
Windows 7 and Windows Vista use Explorer as a file manager.
Many companies are hiring students who have taken many computer classes but hold
degrees in other fields.
page-pf8
COBOL is the least used business programming language.
Interoperability prevents computers of different brands from working together.
The newest standard for the PC card, mostly used in notebooks, is called the
ExpressCard.
page-pf9
The Internet is the physical connection of millions of networks.
The term wireless access point is used to describe a node on a network that acts as a
receiver and transmitter of wireless radio signals between other nodes on a network.
Custom software is developed for general-purpose use.
The universal key technique uses two different keys, one for encryption of a message
and a different one for decryption.
page-pfa
Security specialists will be in high demand to protect data,
communication, and technological investments.
Data validation refers to procedures that define acceptable input ranges for each field in
a record.
Biometric authentication is individualized and cannot be fooled.
page-pfb
A transaction processing system is essentially the same as a management information
system.
IrDA ports offer data transfer rates of 10 Mbps.
External NICs are always plugged into a chip on the motherboard.
Facebook and WordPress both use Google AppEngine Datastore as their database
system.
page-pfc
More than 100 million technology devices are recycled each year
Middleware is software that enables access to objects and queries them about what
types of data they contain.
The term OLAP means:
A) offline analytical processing.
C) online architecture protocol.
B) online analytical processing.
D) offline architecture protocol.
page-pfd
CBT stands for:
A) common binary transfer.
C) computer-based training.
B) computer-basic training.
D) core background transfer.
If two companies need to exchange data and documents over the Internet, they may be
using______________standards.
A) SAN
B) RAID
C) ASP
D) EDI
page-pfe
In a(n)______topology, the network nodes are connected to a central hub or switch.
A) star
B) ring
C) layered
D) hierarchical
A project scope is_______________________________.
A) the measure of the status of the project represented graphically
B) a document that explains the nature of the system's problem
C) all of the total project's elements and features
D) a needs analysis that explains the system's needs
page-pff
The current digital generation of phones is referred to as:
A) 1G.
B) 4G.
C) 3G.
D) 2G.
An algorithm used as a bridge between binary code and keyboard characters is known
as:
A) character code.
B) hot swapping.
C) cache.
D) data dependency.
DSL
page-pf10
Networking
A) Includes Ethernet, TCP/IP, and LAN administration
B) Includes skills operating system configuration and maintenance, networking, and
systems programming
C) Combines HTML/XHTML and JavaScript to provide Web 2.0 development
techniques
The best way to improve the performance of your computer is to:
A) install a larger hard disk in the computer so that you can store more swap files.
B) increase the size of the swap file so that you can use variable pages.
C) install more RAM in the computer because the random access memory works faster
than the hard disk.
D) increase the use of virtual memory because the paging technique increases the speed
of the memory.
page-pf11
The term internationalization is sometimes referred to glocalization and means:
A) enforcing local customs.
B) conducting business internationally and adjusting for local trends and tastes.
C) thinking globally and acting globally.
D) bringing global trends and tastes to a local environment without regard for local
customs.
Which of the following is the study of converting information into encoded or
scrambled formats?
A) Cryptography
B) Numerology
C) Cartography
D) Epistemology
Decision support systems:
page-pf12
A) allow the manager to ask questions of the database and analyze future scenarios.
B) support management's strategic planning function.
C) have a user interface that provides decision makers with information necessary to
make effective decisions.
D) capture knowledge from books and experienced individuals and make it useful in
other areas.
Which of the following is NOT a function of communication devices?
A) Encryption
B) Boost signal strength
C) Facilitate digital communication
D) Determine efficient data-transfer pathways
Which of the following is the name for the high-capacity transmission lines that carry
WAN traffic?
page-pf13
A) Backbones
B) Negotiators
C) Coaxial cables
D) Cores
Structured query language (SQL) used in conjunction with databases is often used as an
example of________a -generation language.
A) fourth
B) second
C) third
D) first
A file management program:
A) enables a user to create, edit, and manage databases with files that are linked
and interdependent on each other.
B) enables a user to create, edit, and manage databases with the files or tables being
independent of each other.
page-pf14
C) is a program that can connect several files or tables to manage, access, store, and edit
in a structured manner.
D) is essentially a table of tables containing a list of all details and tables in a database.
Which of the following certifications would an IT professional who could install;
configure; and operate LANs, WANs, or dial-up services seek?
A) CNE
B) NNP
C) CCNA/CCIE
D) MSCA
In newer browsers, if a Web site requires a plug-in to function:
A) the plug-in will automatically install behind the scenes.
B) a pop-up will appear indicating which plug-in is needed.
C) the user will be asked to pay for the plug-in first.
page-pf15
D) the user cannot proceed further.
A_______is a simple broadcast device that does not manage traffic and usually results
in frequent collisions.
A) plug
B) hub
C) centralized computer
D) switch
Which of the following security measures on home and portable devices will deter
unauthorized access to a person's account?
A) Turn off services such as Bluetooth when not in use.
B) Do not leave cell phones and PDAs on tables at restaurants and college facilities.
C) Do not leave a secured account active on the monitor and walk away.
D) All of the above.
page-pf16
Which of the following is the best definition of a computer hacker?
A) A hacker is a slang term for a professional programmer.
B) A hacker is a person who is highly skilled in computer programming but has had no
formal education.
C) A hacker is a criminal who tries to discover computer capabilities not mentioned in
software manuals, as well as modify them to obtain maximum performance.
D) A hacker is creates bogus work-at-home opportunities, chain letters, get-rich-quick
scams via email, chat rooms, and websites.
All of the following are drawbacks associated with prototyping EXCEPT:
A) users may confuse the prototype with the finished system causing potential
disappointment by those users when necessary changes are made.
B) prototype development could use funds that might be needed for pre-implementation
testing prior to implementation.
C) a poorly constructed or managed prototype could use up time needed for final
system development.
D) developers and future users can get distracted while developing and using the
prototypes.
page-pf17
The main course focus for the management information systems field includes:
A) application software and business processes.
B) engineering concepts and mathematics.
C) analysis and problem solving.
D) programming and mathematics.
A data mart is a:
A) view of information in a data warehouse that focuses attention on a specific data
element.
B) language that is similar to SQL but with the added ability to access multiple
dimensions.
C) popular process for business analysis that involves manipulation and analysis of data
from multiple perspectives.
D) smaller scale data warehouse project that supports one division rather than an entire
organization.
page-pf18
________means that data is separate from the application software using it.
A) Data integrity
B) Data duplication
C) Data consistency
D) Data independence
All of the following are part of the systems development life cycle EXCEPT:
A) maintenance.
B) analysis.
C) integration.
D) design.
page-pf19
Which of the following is NOT true about Cat-6 twisted-pair cable?
A) It supports speeds up to 1 gigabyte per second.
B) It utilizes all four pairs of copper wire.
C) It has superior immunity from external noise.
D) Its bandwidth is 200 MHz.
Which of the following wireless communications medium transmits data via beams of
light through the air?
A) Infrared
B) Sealed-beam
C) Ultraviolet
D) Microwave
Which of the following types of storage uses two laser beams to create a
three-dimensional image?
A) Holographic
page-pf1a
B) Fiber optic
C) Graphical
D) Integrated circuit
Strategic decision making is done by which of the following managers:
A) senior.
B) middle.
C) operational.
D) All of the above.
A requirements analysis is a process that determines________________________-.
A) the hardware required to support new users in the future and to make sure it will
integrate into the system
B) the requirements of the system by counting the number of users
C) the requirements that the users would prefer to have in the new system
page-pf1b
D) the requirements of the system by evaluating how the system will meet the needs of
end users
A complete URL has four parts: protocol,______, path, and resource name.
A) network id
B) domain name
C) server name
D) IP address
Zero configuration, also known as____________, is a method for networking devices
via an Ethernet cable that does not require configuration and administration.
page-pf1c
The_________is a database that stores configuration information on installed
peripherals and software.
Hexadecimal
A) Uses base 16 characters to represent binary numbers
B) Most widely used character code
C) A character coding method created by IBM and used on its mainframes
D) One quintillion bytes
E) The number system used by computers
Mac OS
A) Operating system used on most personal computers
B) Many computer users prefer this operating system for its security, stability, and
ease of use
C) Operating system developed by Microsoft that requires the use of a command-line
interface
page-pf1d
Data may be input into a PDA using a stylus or_____
Employees with knowledge of Web-database integration will have to have the
knowledge of how to configure and maintain a Web server such as ________, the
market leader.
Data___________uses statistical analysis and modeling to find information.
page-pf1e
A keyboard uses switches and _______to translate keystrokes into a signal the
computer can understand.
Sasser and Slammer are examples of________.
Users are able to customize their tools to suit their needs in a(n)_________structure.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.