CMCS 22467

subject Type Homework Help
subject Pages 14
subject Words 1542
subject Authors Gary B. Shelly, Kathleen McMahon, Misty E. Vermaat, Tristen Kendall

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Nearly all keyboards, such as that shown in the accompanying figure, have a(n) ____
that switches between two states each time a user presses the key.
a. arrow key
b. function key
c. toggle key
d. numeric key
Retail and grocery stores use the ____ bar code.
a. UPC (Universal Product Code)
b. Interleaved 2 of 5
c. Codabar
d. POSTNET (Postal Numeric Coding Technique)
A single user/____ operating system allows a single user to work on two or more
programs that reside in memory at the same time.
a. multitasking
b. interfacing
page-pf2
c. command-based
d. throttle
The ____ consists of a worldwide collection of electronic documents.
a. Telnet
b. Web
c. Internet
d. both B and C
A(n) IT code of conduct is a written guideline that helps determine whether a specific
computer action is ____.
a. practical
b. permissible
c. acceptable
d. ethical
page-pf3
A(n) ____ computer is a computer that can perform all of its input, processing, output,
and storage activities by itself.
a. mainline
b. mainframe
c. personal
d. terminal
A(n) ____ is a company that purchases products from manufacturers and then resells
these products to the public offering additional services with the product.
a. RUP
b. EMR
c. UML
d. VAR
page-pf4
The ____ video standard has a typical resolution of 1600 x 1200.
a. XGA
b. SVGA
c. SXGA
d. UXGA
____ TV is a service that provides television programs over the cellular network.
a. Integrated
b. 2G
c. Mobile
d. Cellular
____________________ cache is a type of cache that helps speed the processes of a
computer because it stores frequently used instructions and data.
page-pf5
The ____ enables a program to perform one or more actions repeatedly as a loop as
long as a certain condition is met.
a. sequence control structure
b. selection control structure
c. repetition control structure
d. compliance control structure
ExpressCard modules are the next generation of ____ Cards.
a. Flash
b. PC
c. integrated
d. embedded
page-pf6
RFID tags contain ____.
a. MICR characters
b. bar codes
c. a memory chip
d. an antenna
More complex DBMSs maintain a(n) ____, which is a listing of activities that change
the contents of a database.
a. recovery utility
b. roster
c. backup plan
d. log
The term ____, commonly describes a business or venture of any size.
a. enterprise
b. corporation
page-pf7
c. consortium
d. functional unit
____ specialist (or data communications analyst), which is a job title in the operations
area of an IT department, evaluates, installs, and monitors data and/or voice
communications equipment and software and maintains connections to the Internet and
other WANs.
a. WAN
b. Mobile
c. VoIP
d. Operations
Using ____________________ software, you can add, change, delete, sort, and retrieve
data.
page-pf8
A(n) ____ provider is a business that provides individuals and companies access to the
Internet for free or for a fee.
a. service
b. access
c. host
d. e-mail
Many retailers see the technology shown in the accompanying figure as an alternative
to bar codes because it ____.
a. requires direct contact
b. does not require line-of-sight transmission
c. requires each item to be checked out individually
d. all of the above
Computers, monitors, and other equipment contain ____.
a. lead
page-pf9
b. toxic materials
c. mercury
d. flame retardants
A carefully designed database makes it easier for a user to ____.
a. rewrite the underlying structure of the database
b. query the database
c. create reports
d. modify the data
A ____ consists of a keyboard, a monitor, a video card, and memory, often housed in a
single unit.
a. magstripe
b. PC
c. terminal
d. teller machine
page-pfa
A single user/single ____ operating system allows only one user to run one program at a
time.
a. throttle
b. function
c. indexing
d. tasking
In the event a backup file is used, a(n) ____ program reverses the process and returns
backed up files to their original form.
a. restore
b. return
c. reversal
d. backup
page-pfb
A group of two or more integrated hard disks is called a(n) ____.
a. pocket
b. UFC
c. RAID
d. baseline
____ software allows users to create, access, and manage a database.
a. Text management
b. Database
c. Context management
d. Basis
____ is the collection and summarization of data and information.
page-pfc
a. Documentation
b. Notetaking
c. Feasibility
d. Project recording
Many companies offer training on their products in the form of ____.
a. books
b. CBT
c. video-based training
d. instructor-led training in a classroom
The ____ is a worldwide collection of networks that connects millions of businesses,
government agencies, educational institutions, and individuals.
a. Web
b. Telnet
c. Newsnet
page-pfd
d. Internet
A(n) ____________________ is an item that can contain both data and the procedures
that read or manipulate that data.
A(n) ____ is a single point in an electronic image.
a. pica
b. pixel
c. icon
d. key
page-pfe
A file ____ utility is a utility that shrinks the size of a file(s).
a. unit
b. compression
c. matrix
d. conversion
A ____ houses RDRAM chips.
a. DIMM (dual inline memory module)
b. SIMM (single inline memory module)
c. RIMM (Rambus inline memory module)
d. CIMM (Cantus inline memory module)
Leading, sometimes referred to as directing, is an activity performed by managers that
involves ____.
a. instructing and authorizing others to perform the necessary work
b. identifying and combining resources so that a company can reach its goals and
objectives
page-pff
c. establishing goals and objectives
d. measuring performance and, if necessary, taking corrective action
A(n) ____ is a duplicate of a file, program, or disk that can be used if the original is
lost, damaged, or destroyed.
a. restored file
b. bot
c. IP file
d. backup
Intel's ____________________ technology provides the capability to track computer
hardware and software, diagnose and resolve computer problems, and secure computers
from outside threats.
page-pf10
Current WiMAX standards have data transfer rates up to 70 Mbps.
_________________________
According to netiquette, Internet users should assume all material is accurate and
up-to-date.
A(n) ____________________ is a LAN that uses no physical wires.
page-pf11
A(n) ____________________ works with the analyst, programmer, and user to create
system documentation and user materials.
____________________ is a computer phrase that points out the accuracy of a
computer's output depends on the accuracy of its input.
A computer's processing ____________________ is among the attributes that
determine the category it best fits.
DVD-ROM drives can read DVDs at speeds of 52X or more.
page-pf12
Ink-jet printers produce text and graphics in both black-and-white and color on a variety
of paper types.
The number of pages a single ink-jet cartridge can print varies by manufacturer and the
type of documents being printed.
Computer conferences, conventions, and trade shows often last for a week.
page-pf13
A(n) ____________________ device is a device that initiates an instruction to transmit
data, instructions, or information.
A(n) ____________________ device like the one in the accompanying figure
page-pf14
authenticates a person's identity by translating a personal characteristic into a digital
code that then is compared with a digital code stored in the computer verifying a
physical or behavioral characteristic.
A systems analyst often performs the two activities in the design phase at the same time
instead of sequentially.
Windows Vista includes file managers called ____________________.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.