CICS 93850

subject Type Homework Help
subject Pages 14
subject Words 1659
subject Authors Catherine Laberta

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A hardware element of the system unit, which houses the electronic components used to
connect a computer to a network, is known as a network interface card.
Which of the following populations have been found to be MOST at risk from the threat
of cyberstalking?
A) People with a low level of computer literacy
B) College women
C) Public officials
D) Elderly people
Linux
A) Includes Ethernet, TCP/IP, and LAN administration
B) Includes skills operating system configuration and maintenance, networking, and
systems programming
C) Combines HTML/XHTML and JavaScript to provide Web 2.0 development
techniques
page-pf2
Which of the following is the name of the organization that sets Web standards?
A) W3C
B) IP
C) FTC
D) OSI
Cyberspace is defined as:
A) the collection of Internet service providers.
B) territory that isn't an actual physical space and that is accessible only with
computers.
C) the location where all the Internet servers are housed.
D) the overarching network of networks.
page-pf3
A markup language uses______________to define the structure of the text.
A) control structures
B) elements
C) tags
D) mnemonics
Which of the following is the common term for a link to a document that has
disappeared?
A) Visited link
B) Obsolete link
C) Defunct link
D) Broken link
Which of the following is NOT an extension of a Microsoft Windows executable file?
A) .exe
B) .bat
page-pf4
C) .com
D) .pdf
The terms back end of the database server is referring to which of the following:
A) how the database retrieves information.
B) the server and programming code.
C) backup and storage components of the database.
D) how the user interfaces with the database.
WAP-enabled devices require a_______, a special Web browser that has all the features
of computer-based browsers but is simplified to meet handheld device limitations.
A) minibrowser
B) demibrowser
C) modified browser
D) microbrowser
page-pf5
Which of the following network devices has the capability to determine the best path to
transmit data and determine alternative pathways?
A) Switch
B) Pathfinder
C) Director
D) Router
Outlook is an example of a(n):
A) e-mail database program.
B) high productivity program.
C) rendering program.
D) personal information management program.
page-pf6
The device that combines the capabilities of a handheld computer with mobile phone
capabilities and Web access is known as a _ .
A) minicomputer
B) mobile computer
C) multiphone
D) smartphone
Program instructions in their original form as written by the programmer are known as:
A) source code.
B) flowcharts.
C) heuristics.
D) object code.
Which of the following is NOT true about company intranets?
page-pf7
A) Intranet Web sites are similar to traditional Internet sites.
B) Firewalls control access to intranets from the outside.
C) Intranets cannot use TCP/IP protocols.
D) Intranets can only be accessed by authorized users within an organization.
Information systems
A) Offers one standardized technology package
B) Integrates multiple enterprise systems
C) Comprised of hardware, software, data, people, and procedures
D) Allows a business to integrate information and applications on a company-wide
basis
E) Permits users to customize technology tools
Starting a computer that is already turned on is called a:
A) warm boot.
B) cold boot.
C) power on.
page-pf8
D) warm load.
Typically, which of the following is a type of person who is selected to lead Business
Process Management initiatives?
A) Systems analyst
B) Business analyst
C) Project leader
D) Technical architect
Computer Relationship Management software allows a company to do which of the
following?
A) Locate leads, track prospects, proposals and sell
B) Contact customers and find new products and services that they may want to
purchase
C) Monitor a customer's satisfaction and repeat purchases
page-pf9
D) All of the above
RAD
A) Figure showing the movement of data through the system
B) Involves creating a small scale system mock-up
A Virtual Private Network (VPN) uses:
A) a virtual reality network simulator.
B) leased lines to provide security.
C) a company extranet with limited external access for authorized users.
D) a public network to lease transmission lines.
page-pfa
___________phishing is a type of phishing intended to target specific people and trick
them into providing personal information, which would enable identity theft.
A) Selective
B) Aimed
C) Targeted
D) Spear
_______is a type of speech recognition system, which requires a pause between each
word during the dictation process.
A) Limited
B) Discrete
C) Expansive
D) Continuous
The storage capacity of network-attached storage (NAS) devices ranges up to:
page-pfb
A) six-thousand kilobytes.
B) twelve petabytes.
C) seven-million bytes.
D) five-hundred megabytes.
DSL is_______than dial-up but is often_____than other broadband access options.
A) more expensive; less reliable
B) more expensive; less expensive
C) more reliable; more expensive
D) less reliable; more expensive
Web-database integration refers to:
A) the integration of traditional data mining methods with information gathered over
the Web.
page-pfc
B) a hardware directory for network administrators and IT professionals and does not
focus on single-user databases.
C) the name for techniques that make information stored in databases available through
Internet connections.
D) a business information provider that has a database of corporate contact available
online.
If a Business Continuity Plan can be thought of as a proactive measure then
a______________can be thought of as a reactive measure.
A) disaster prevention plan
B) disaster reaction plan
C) disaster recovery plan
D) disaster management plan
Which of the following is NOT a common application for SaaS?
A) Manufacturing
B) Procurement
page-pfd
C) HR
D) CRM
The capability of a Macintosh computer to work with a UNIX computer is an example
of:
A) interactivity.
B) cooperation.
C) communication.
D) interoperability.
.com
A) The University of Wisconsin
B) A clothing store
page-pfe
The Business Process Management philosophy encourages which of the following?
A) Managers to make bold sweeping changes if it reduces costs
B) Employees to suggest and implement changes within their areas of expertise
C) Only IT managers to make system wide changes
D) Employees to cut down on their work if it saves time and resources
A random access storage device can go directly to the requested data without having to
go through which of the following type of search sequence?
A) Indexed
B) Direct
C) Hashed
D) Linear
Starting a computer that is not already turned on is called a:
page-pff
A) fast load.
B) cold boot.
C) cold load.
D) warm boot.
A protocol suite specifies how the network functions, or its:
A) network architecture.
B) network package.
C) network suite.
D) network configuration.
A(n)__________topology solves the expansion problems of the bus topology by using
a central switch.
page-pf10
Processing
WML is an acronym that stands for_________Markup Language.
The obligation of parties to a lawsuit to exchange documents that exist only in
electronic form, such as e-mails, voicemails, instant messages, and data on handheld
devices, is called electronic ____________.
page-pf11
Project management includes the ability to plan and_____________ a project.
One of the earliest high-level programming languages,__________was used primarily
for business applications.
Fortran
A) Recent cross-platform language
B) Used for fast development of Windows applications
C) Suited for mathematical problem solving
A pointing device that is half the size of a normal mouse, but with all of the
same capabilities, is called a_____________ mouse.
page-pf12
______is a new Windows 7 feature, which is a quick and easy way to resize
open windows simply by dragging them to the edges of your screen.
The Microsoft middleware product is called _________.
The most important type of memory in a computer is_______________---access
memory.
page-pf13
Form factor
A) Any size of case that contains the computer's main hardware
B) Prevents computer components from being damaged by heat
C) Specification for mounting internal components such as the motherboard
A network using a ring topology uses a(n)________ to prevent collisions.
Data communications or _____________is the sending or receiving of messages
electronically between two locations.
page-pf14
__________key encryption, also known as asymmetric key encryption, is a security
process in which the use of two different keys safeguard data and provide
confidentiality.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.