CICS 41560

subject Type Homework Help
subject Pages 14
subject Words 1515
subject Authors Catherine Laberta

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
An application service provider (ASP):
A) supplies companies with e-commerce tools.
B) is a Web language used to write server-based scripts.
C) provides an Internet entry point to a business or individual.
D) hosts software and deploys it over the Internet to the provider's customers.
_________is the lower layer of Internet communication design.
A) ISP
B) DSL
C) TCP
D) IP
How do most wireless LANs ensure security with radio transmission?
A) By using a random series of frequencies
B) By splitting the signals
C) By scrambling the signals
page-pf2
D) All of the above
Which of the following is the integration of processes, software, hardware, and
standards of two or more enterprise systems?
A) ASP
B) EAI
C) GUI
D) OSS
Waterfall model
A) The underlying cause
B) Allows analysts to return to a previous phase
page-pf3
A feeling of anxiety and incapacity experienced when people are presented with more
information than they can handle is known as:
A) computerized stress syndrome.
B) digital distress.
C) information overload.
D) digital anxiety.
A large database containing all information possessed by a corporation is known as
a(n):
A) Oracle file.
B) query.
C) data mine.
D) data warehouse.
The first OS function is:
page-pf4
A) starting the computer.
B) scanning the hard disk for errors.
C) loading the applications.
D) prompting the user for an ID and password.
When enterprises want all aspects of their computing integrated into one application, it
is referred to as a:
A) common information interchange.
B) common virtual system.
C) common integrated platform.
D) common integrated system.
Which of the following is NOT a network communications device?
A) Switch
B) NIC
C) Router
page-pf5
D) LAN
.net
In the Windows operating system, which utility should be used to delete unwanted
programs?
A) Defragment
B) Erase Programs
C) Windows Programs and Features
D) Clean Disk
page-pf6
With object-oriented programming, information hiding is also known as:
A) translation.
B) encapsulation.
C) conversion.
D) inheritance.
______________is an activity that has an identifiable output and value to the
organization's customers.
A) Business process
B) Competitive advantage
C) Customer service
D) Business reengineering
Which of the following is NOT a function that operational support systems provide?
A) Analyze
B) Charge back
page-pf7
C) Manage
D) Monitor
Which of the following techniques uses color intensity to add realism to a
three-dimensional object?
A) Lossy compression
B) Ray tracing
C) Image editing
D) Bitmapping
A _________controls a set of computers by infecting them with a malicious program.
A) wiki
B) thread
C) blog
D) bot herder
page-pf8
The new emerging legal field that tracks and combats computer-related crimes is called:
A) Web law.
B) Web policing.
C) Internet crime fighting.
D) cyberlaw.
Which of the programming languages is one of the earliest and at one time, was the
most widely used business programming language in the world?
A) Visual Basic
B) Java
C) COBOL
D) C++
page-pf9
_______is a group of interrelated Web development techniques that combine
HTML/XHTML and JavaScript to provide interactive Web pages.
A) ERP
B) AJAX
C) TCP/IP
D) Oracle
A(n)_________________is known as the underlying cause of an objectionable or
unacceptable result.
A) challenge
B) error
C) symptom
D) problem
page-pfa
Some schools still might refer to the MIS degree as:
A) CIS.
B) CISM.
C) ISM.
D) IRM.
_______is the capability to store previously visited Web page files and graphics on
your computer.
A) Phrase searching
B) Saving
C) Caching
D) Uploading
CES is a:
A) trade show
C) programming language.
page-pfb
B) new operating system.
D) certificate.
Which of the following is NOT an advantage of the bus topology?
A) Length
B) Reliable
C) Simple
D) Easy to expand
The artificial language created to tell the computer what to do in a step-by-step manner
is known as:
A) development language.
B) heuristics.
C) programming language.
D) codification.
page-pfc
Which of the following checks to see that the hardware is operating appropriately?
A) ROM
B) RAM
C) BIOS
D) POST
Which of the following is NOT a feature of the Java programming language?
A) A program written in Java can be executed on any type of computer that has
installed the Java Virtual Machine software.
B) Java includes miniprograms called applets that are made available through a network
or over the Internet.
C) The Java language enables programmers to create programs that "write once, run
everywhere."
D) Java programs execute much faster than those written in languages such as C or C+
+.
page-pfd
Which of the following names is the path that houses the Web page in the fictitious
URL given below?
http://www.univ.edu/classroom/welcome.htm
A) classroom
B) welcome.htm
C) classroom/welcome.htm
D) www.univ.edu
Assume that you are working in a computer lab. Each time a PC boots, you see the
same Windows desktop and application options. This computer lab is using
a____________ structure.
A) Hierarchical
B) Decentralized
C) Distributed
D) Centralized
page-pfe
All of the following is true about database server software EXCEPT:
A) users never directly interact with it.
B) it runs on a LAN.
C) it responds to users' requests for information.
D) it is easy to use.
_______is the use of networks or the Internet to carry out business of any type.
A) E-business
B) E-commerce
C) E-sales
D) E-tailing
In_____________program design, a program is designed by focusing on the main goal
to be achieved and then breaking up the program into manageable components.
page-pff
A) top-down
B) control structure
C) algorithmic
D) object-oriented
A local area network (LAN) in which all the computers are equals is called
a(n)___________network.
A) client/server
B) equal sharing
C) peer-to-peer
D) equal resource
The________________________division keeps track of information about each
employee.
A) accounting department
page-pf10
B) human resources department
C) marketing and sales department
D) production/operations department
One of the newest 802.11 standard is______.
Due to the fact that file________________programs are less complex than a database
management system, they are less expensive and easier to use.
Many organizations use software known by the acronym__________ to manage and
coordinate an organization's resources and information.
page-pf11
A helpful place to look for troubleshooting guidance in Microsoft Windows is the Help
and_______utility.
Shoulder surfing
Previously, Macs used a Motorola or IBM chip, but they have switched to the
______chip.
page-pf12
Multimedia and graphics software
A) Application programs such as personal finance
B) Personal desktop publishing, image-editing, and three-dimensional representation
programs
C) Professional desktop publishing, image-editing, and three-dimensional
representation programs
Images obtained through digital cameras and camcorders are________mapped images.
A(n)____________contains a group of one or more related fields.
DDoS is a_________denial of service.
page-pf13
Experience with the Internet transmission protocol, known by the
acronym___________, is a sought-after technical skill in today's market.
The term malware is short for ______software.
____________-is the name for techniques that make information stored in databases
available through Internet connections.
page-pf14
Applications such as personal finance, home design, and games are examples
____________of home and/or programs.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.