CICS 14713

subject Type Homework Help
subject Pages 20
subject Words 2396
subject Authors Gary B. Shelly, Kathleen McMahon, Misty E. Vermaat, Tristen Kendall

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A Kodak ____ CD is a type of CD-ROM that stores digital versions of a single roll of
film using a jpg file format.
a. Picture
b. Image
c. Optical
d. Graphics
page-pf2
When a program evaluates a condition in a(n) ____, which is illustrated in the
accompanying figure, it yields one of two possibilities: true or false.
a. if-then-else control structure
b. case control structure
c. do-while control structure
d. do-until control structure
page-pf3
For a wireless device to transmit signals via infrared light waves, both the computer and
the device must have a(n) ____ port.
a. IrDa
b. FireWire
c. USB
d. either b or c
Many Internet security programs include ____.
a. a firewall
b. filtering capabilities
c. antivirus program
d. macro recorders
The storage capacity of a DVD-ROM is ____ that of a CD because images are stored at
higher resolutions.
a. greater than a CD, and a DVD's quality far surpasses
b. less than a CD, but a DVD's quality far surpasses
page-pf4
c. greater than a CD, but a DVD's quality is far less than
d. less than a CD, and a DVD's quality is far less than
____ is a computer forensics certification sponsored by International Association of
Computer Investigative Specialists that tests basic knowledge of forensics ethics,
imaging, examination, collection, and reporting.
a. CEECS
b. CCE
c. SCNP
d. CISSP
A retinal ____ works similarly to an iris recognition system, but instead scans patterns
of blood vessels in the back of the retina.
a. reader
b. opticon
c. scanner
d. basal monitor
page-pf5
A(n) ____ is an output device that conveys text, graphics, and video information.
a. display
b. image
c. peripheral
d. resolution
page-pf6
Today, programmers use commercial ____ software to develop charts such as the one
shown in the accompanying figure.
a. do-while control
b. if-then-else control
c. flowcharting
d. case control
A(n) ____ printer forms characters and graphics on a piece of paper without actually
striking the paper.
a. nonimpact
b. dot matrix
page-pf7
c. shuttle-matrix
d. line
____ is a security certification sponsored by The Security Certified Program that tests
skills with firewalls and defending against network intrusions.
a. CWP
b. CCIE
c. SCNA
d. SCNP
Case 2
The area of network communications standards is an area with which you are not
familiar, so you have decided to study it in some detail. You expect to have to network a
wide range of devices in the near future, so this is a timely subject of study.
You are looking for a technology that will replace the requirement for a line-of-sight
transmission between devices like digital cameras, fax machines, and printers, and you
would also like the data transfers between the devices to occur at a rate of up to 3 Mbps.
Which of the following network standards is a good match for your needs?
page-pf8
a. Wi-Fi
b. Bluetooth
c. RFID
d. TCP/IP
____ is an Internet certification sponsored by Cisco that tests expert level knowledge in
areas of internetwork communications, security, routing, and switching.
a. OCP
b. CWP
c. CCIE
d. CIW
A(n) ____ drive like that in the accompanying figure fits into a port that is itself an
interface that can connect up to 127 different peripherals together with a single
connector.
a. hub
b. USB
page-pf9
c. daisy
d. smart
A(n) ____ device is any hardware component that allows users to enter data or
instructions (programs, commands, and user responses) into a computer.
a. output
b. input
c. entry
d. screen
page-pfa
A(n) ____ check is a validity check performed on data like that in the accompanying
figure, which ensures users enter only alphabetic data into a field.
a. alphabetic
b. binary
c. text
d. ASCII
All of the following are characteristics of hard disks EXCEPT____.
a. write-protect notch
b. read/write head
c. sectors and tracks
d. capacity
page-pfb
The top of a window has a(n) ____, which is a horizontal space that contains the
window's name.
a. view bar
b. title bar
c. frame name
d. dialog box
Job titles in the technical services area of an IT department include all of the following
EXCEPT ____.
a. database administrator
b. graphic designer/illustrator
c. Web designer
d. e-commerce director
page-pfc
One approach to content filtering is through a rating system of ____, which is similar to
those used for movies and videos.
a. ICRA
b. AOL
c. MSN
d. BSA
During ____, a systems analyst identifies the required programs and the relationship
among each program, as well as input, output, and database specifications.
a. storage design
b. database design
c. program design
d. input and output design
Voice ____ occurs when a person's voice is heard or when the computer talks through
speakers on the computer.
a. output
page-pfd
b. faxing
c. input
d. throughput
A command is ____.
a. a collection of unprocessed text, numbers, images, audio, and video
b. a series of instructions that tells a computer what to do and how to do it
c. an instruction issued by replying to a question that is displayed
d. an instruction that causes a program to perform a specific action
Many United States government agencies have informational Web sites providing ____.
a. advocacy
b. the congressional budget
c. census data
d. tax codes
page-pfe
Employee ____ involves the use of computers to observe, record, and review an
employee's use of a computer, including communications such as e-mail messages,
keyboarding activity, and Web sites visited.
a. filtering
b. monitoring
c. spamming
d. indexing
All of the following are competing rewritable DVD formats except ____.
a. DVD-RW
b. DVD+R
c. DVD+RAM
d. DVD+RW
page-pff
Programmers use a ____ to create computer programs.
a. programming language
b. program development tool
c. binary interface
d. user management device
____ use is the use of a computer or its data for unapproved or possibly illegal
activities.
a. Unacceptable
b. Illegitimate
c. Unauthorized
d. Unenforced
IBM Certified Solutions Expert " Informix is a ____ certification that tests advanced
skills of administration of Informix.
a. spreadsheet
page-pf10
b. database
c. server
d. network
A(n) ____ cam is a type of digital video camera that enables a home or small business
user to capture video and still images, send e-mail messages with video attachments,
add live images to instant messages, broadcast live images over the Internet, and make
video telephone calls.
a. online
b. Web
c. conference
d. vid
You interact with a program through its ____, which controls how you enter data and
instructions and how information is displayed on the screen.
a. operating system
b. storage
page-pf11
c. user interface
d. icon
A CMS ____.
a. facilitates communication between human resources personnel and employees
b. includes information about the files and data, called metadata
c. focuses on issues related to inventory of parts and forecasting future demand
d. assists support personnel in providing the best solutions for customers
Dynamic HTML uses the ____, which defines every item on a Web page as an object.
a. Rexx
b. XML style set
c. DOM
d. DHTML style set
page-pf12
Many ____ offer free recycling to customers.
a. schools
b. office supply stores
c. computer manufacturers
d. convenience stores
Current USB flash drives like the one in the accompanying figure have transfer rates of
____.
a. 2 MBps
b. 4 MBps
c. 12 MBps
d. 20 MBps
page-pf13
When the processor needs an instruction or data, it searches memory in this order: L1
cache, then L2 cache, then L3 cache (if it exists), then RAM with a greater delay in
processing for each level it must search.
A(n) ____________________ display uses fewer transistors, requires less power, and is
less expensive than an active-matrix display.
Using tax preparation software, taxpayers can file their state and federal tax returns
online, in a process called e-filing.
On notebook and some handheld computers, smart phones, and other mobile devices,
the keyboard is built in the top of the system unit.
page-pf14
A joystick usually includes buttons called triggers that are pressed to activate certain
events.
Home users are the primary users of Web services.
In the preliminary investigation, the systems analyst defines the problem or
improvement accurately. _________________________
page-pf15
In an IP address, the number in each group is between 0 and ____________________.
In a relational database, the only data redundancy (duplication) exists in the common
columns (fields) used for relationships.
Discuss the process of selecting a certification. Include a list of the factors to consider
in the selection process.
page-pf16
Some computers use more than one processor chip.
Operating systems rarely provide a means to establish Internet connections.
page-pf17
A serif font does not have the short decorative lines at the upper and lower ends of the
characters.
Discuss the options for preparation for certification.
page-pf18
The ____________________ is the worldwide telephone system that handles
voice-oriented telephone calls.
A DSL ____________________ sends digital data and information from a computer to
a DSL line and receives digital data and information from a DSL line.
page-pf19
A(n) ____________________ is a vulnerable computer designed to entice an intruder
to hack into it.
With ____________________, the computer will detect human motions.
Computers process data into ____________________.
Some vendors will give a demonstration of the product(s) specified in a vendor
proposal.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.