CMCS 12561

subject Type Homework Help
subject Pages 17
subject Words 1938
subject Authors Gary B. Shelly, Kathleen McMahon, Misty E. Vermaat, Tristen Kendall

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A(n) ____ copies only the files that have changed since the full backup.
a. full backup
b. differential backup
c. selective backup
d. incremental backup
The ____ is a worldwide collection of networks that links millions of businesses,
government agencies, educational institutions, and individuals.
a. Internet
b. Telnet
c. Web
d. NSFNet
The ____ format has smaller files sizes, never require special viewer software, and thus
are used on the Web frequently.
a. BMP
b. GIF
page-pf2
c. TIFF
d. PNG
____ is a database certification sponsored by Oracle that tests knowledge of developing
and deploying large-scale Oracle database management systems.
a. OCP
b. CWP
c. CCIE
d. CIW
With a three-generation backup policy, the grandparent is the ____.
a. most recent copy of the file
b. second oldest copy of the file
c. oldest copy of the file
d. original file
page-pf3
An information system supports ____ activities of users.
a. daily
b. short-term
c. long-range
d. all of the above
Web designer, which is a job title in the technical services area of an IT department,
develops graphical content using all of the following EXCEPT ____.
a. Visual Basic
b. multimedia tools
c. Photoshop
d. Flash
page-pf4
A standard portal is shown in the accompanying figure, and the customization of a
user's pages within such a portal to meet their needs is called ____.
a. externalization
b. click streaming
c. personalization
d. data storage
Students enrolled in four-year CIS programs receive a bachelor's degree usually with an
emphasis in ____.
a. software development
b. networking
page-pf5
c. systems analysis and design
d. help desk staffing
With a type of memory module called a(n) ____, such as that shown in the
accompanying figure, the pins on opposite sides of the circuit board do not connect and
thus form two sets of contacts.
a. SIMM
b. RIMM
c. DIMM
d. CIMM
Case 2
You have just been hired as the network administrator for a brand-new startup company,
and your first task is to select the server operating system that you will suggest to the
head of the IT team as the one you recommend for the office.
You have been asked to select a server OS that will provide maximum flexibility, as
three of the vice presidents in the office are all using different clients (one prefers
Linux, one uses UNIX, and the third runs Windows). What is the best choice given
page-pf6
these circumstances?
a. Solaris
b. Windows Server 2008
c. NetWare
d. Linux
Users are turning to ____ for crisper, higher-quality output than they can achieve with
analog television.
a. DTV
b. XTV
c. CTV
d. HTV
When computer users ____ a document, the computer sends a copy of the document to
a medium such as paper.
a. create
b. print
page-pf7
c. format
d. edit
A(n) ____source is a company or person a user believes will not send a virus-infected
file knowingly.
a. legitimate
b. trusted
c. secure
d. backup
The ____ interprets and carries out the basic instructions that operate a computer.
a. control unit
b. binary device
c. CPU
d. compressor
page-pf8
The ____ video standard has a typical resolution of 1024 x 768.
a. XGA
b. SVGA
c. SXGA
d. UXGA
Attached to a computer's ____ port, a PC video camera usually sits on top of the
monitor.
a. parallel
b. FireWire
c. serial
d. USB
page-pf9
A(n) ____ computer is a type of personal computer designed so the system unit, input
devices, and any other devices fit entirely on or under a desk or table.
a. desktop
b. mobile
c. encapsulated
d. handheld
Compared with relational databases, object-oriented databases ____.
a. can store more types of data
b. access data faster
c. allow programmers to reuse objects
d. all of the above
page-pfa
An audio ____ device, such as that shown in the accompanying figure, is a component
of a computer that produces music, speech, or other sounds, such as beeps.
a. input
b. throughput
c. output
d. storage
In a disaster recovery plan, the recovery plan specifies ____.
a. information for simulating various levels of disasters and recording an organization's
ability to recover
page-pfb
b. the steps to be taken immediately after a disaster strikes
c. the actions to be taken to restore full information processing operations
d. how a company uses backup files and equipment to resume information processing
A(n) ____ system is an information system that captures and stores the knowledge of
human experts and then imitates human reasoning and decision making.
a. integrated
b. expert
c. KM
d. mirroring
A(n) ____ consists of an original newsgroup article and all subsequent related replies.
a. link
b. index
c. aggregate
d. thread
page-pfc
Identify the letter of the choice that best matches the phrase or definition.
a. digital signature
b. digital certificate
c. CA
d. noise
e. PUE
f. TLS
g. S-HTTP
h. clickjacking
i. Digital Millennium Copyright Act (DCMA)
j. Web bug
k. CTS
l. Fair Credit Reporting Act
m. virus hoax
n. password
o. script kiddie
p. ciphertext
q. plaintext
r. CAN-SPAM Act
s. piracy
t. copyright
1) Usually does not have advanced computer and technical skills.
2) A successor to Secure Sockets Layer.
3) Often appears in the form of a chain letter that requests a user to send a copy of the
e-mail to as many people as possible.
4) Most systems require that a user selects this on his or her own.
5) Used by applications that must verify the authenticity of a client.
6) An authorized person or company that issues and verifies digital certificates.
7) Any unwanted signal, usually varying quickly, that is mixed with the normal voltage
entering a computer.
8) In the encryption process, the unencrypted, readable data.
9) In the encryption process, the encrypted (scrambled) data.
10) A ratio that measures how much power enters the computer facility against the
amount of power required to run the computers.
11) An encrypted code that a person, Web site, or organization attaches to an electronic
message to verify the identity of the message sender.
12) Protects any tangible form of expression.
13) A common infringement of copyright.
14) A notice that guarantees a user or a Web site is legitimate.
15) Gives law enforcement the right to impose penalties on people using the Internet to
distribute spam.
16) A scam in which a button or link on a Web site contains a malicious program.
17) It fails to define a legitimate business need.
18) Makes it illegal to circumvent antipiracy schemes in commercial software.
19) The inflammation of the nerve that connects the forearm to the palm of the wrist.
20) Hidden on Web pages in the form of graphical images
page-pff
The ____ is the electronic component that interprets and carries out the basic
instructions that operate the computer.
a. motherboard
b. control unit
c. processor
d. arithmetic unit
____ is a hardware certification sponsored by the Computing Technology Industry
Association that tests entry-level knowledge of personal computer setup, configuration,
maintenance, and troubleshooting.
a. SCNA
b. IBM eServer
c. A+
d. All of the above
page-pf10
A(n) ____ mouse, like the one shown in the accompanying figure, uses devices that
emit and sense light to detect movement.
a. mechanical
b. tracking
c. optical
d. enhanced
Systems analysts discuss various aspects of a development project with the ____
committee, which is a decision-making body in a company.
a. steering
b. JAD
c. directors
d. management
Professional organizations that are influential in the computer industry are the ____.
a. Association of Personal Computer User Groups (APCUG) and Java User Group
(JUG)
page-pf11
b. Association for Computing Machinery (ACM) and Association of Information
Technology Professionals (AITP)
c. Linux Users Groups WorldWide (LUGWW) and Bureau of Labor Statistics (BLS)
d. all of the above
Typically, Web pages created with DHTML are ____ to user interaction.
a. less animated and responsive
b. less animated but more responsive
c. more animated but less responsive
d. more animated and responsive
A personal ____ is a utility that detects and protects a computer from unauthorized
intrusions.
a. firewall
b. antihacker
c. threat neutralizer
d. protection utility
page-pf12
Software ____ is the unauthorized and illegal duplication of copyrighted software.
a. theft
b. extortion
c. piracy
d. terrorism
While the computer is running, the platters in a hard disk (such as that shown in the
accompanying figure) usually rotate at 5,400 to 15,000 ____________________, which
allows nearly instant access to all tracks and sectors.
page-pf13
By compressing files, a backup utility program requires more storage space for the
backup files than for the original files.
Striping impairs disk access time, but does offer data duplication.
A(n) signature ____________________ system recognizes the shape of a handwritten
signature, as well as measuring the pressure exerted and the motion used to write the
signature.
A Web database usually resides on a(n) ____________________.
page-pf14
AOL differs from many OSPs in that it provides gateway functionality to the Internet,
meaning it regulates the Internet services to which members have access.
Entry-level jobs for graduating ____________________ students, given the credentials
listed in the accompanying figure, include software engineer, network security
specialist, computer hardware designer, new hardware tester, and IT consultant.
page-pf15
Detailed analysis sometimes is called technical design.
A(n) ____________________ printer generates images by pushing electrically heated
pins against heat-sensitive paper.
____________________ uses a computer and special software to aid in product design.
page-pf16
A computer output microfilm recorder is the device that records the images on
microfiche.
Users can purchase a software program that selectively blocks cookies.
A(n) ____________________ is a predefined formula that performs common
calculations such as adding the values in a group of cells.
Writing a CGI script requires computer programming skills.
page-pf17
Because Perl has weak text processing capabilities, it has become an unpopular
language for writing scripts.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.