CMCS 55785

subject Type Homework Help
subject Pages 17
subject Words 1915
subject Authors Gary B. Shelly, Kathleen McMahon, Misty E. Vermaat, Tristen Kendall

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
____ software is privately owned software and limited to a specific vendor or computer
model.
a. Stand-alone
b. Freeware
c. Proprietary
d. Shareware
Because ____ are components in larger products, they usually are small and have
limited hardware.
a. telematics
b. embedded computers
c. handhelds
d. smart watches
With a(n) ____, users write on the screen or issue instructions to a Tablet PC, for
example, by tapping on the screen.
a. graphic tool
page-pf2
b. stylus
c. digital pen
d. keypad
On a ____, such as that illustrated in the accompanying figure, all of the computers and
devices (nodes) on the network connect to a central device.
a. bus network
page-pf3
b. ring network
c. star network
d. token ring network
Some solid state drives have form factors of ____.
a. 1.8 inch
b. 2.5 inch
c. 3.5 inch
d. 5.25 inch
During the support phase, the purpose of a meeting called the ____ is to find out if the
information system is performing according to the users' expectations.
a. performance monitoring
b. post-implementation system review
c. expectation review subphase
d. security phase
page-pf4
Impact printers can handle ____.
a. dusty environments
b. extreme temperatures
c. the use of noncontinuous paper
d. vibrations
A(n) ____ utility allows users to copy selected files or an entire hard disk to another
storage medium.
a. copy
b. restore
c. safeguard
d. backup
page-pf5
____ is a type of nonvolatile memory that can be erased electronically and
reprogrammed, similar to EEPROM.
a. Flash memory
b. L1 cache
c. firmware
d. microcode
With Windows Vista, a warm boot can be performed by ____.
a. pressing the power button on the computer
b. clicking a button on the task bar, then a Start menu button, then a Lock menu button,
then a command on the Lock button menu
c. pressing the restart button on the computer
d. all of the above
page-pf6
Computer manufacturers, software vendors, and retailers usually pay workers like the
one shown in the accompanying figure, based on ____.
a. an hourly wage
b. a yearly salary
c. the number of customers contacted
d. the amount of product they sell
Most of today's processors have a bus clock speed of ____ MHz.
a. 400
b. 667
c. 800
page-pf7
d. 1600
____ is a set of technologies from Microsoft that allows almost any type of program to
run on the Internet or an internal business network.
a. .JIT
b. .RPG
c. .NET
d. .VPE
The wider the bus, the ____ the transfer of data.
a. greater the number of transfer steps required and the slower
b. greater the number of transfer steps required and the faster
c. fewer the number of transfer steps required and the slower
d. fewer the number of transfer steps required and the faster
page-pf8
Each employee or customer who uses a computer in a large business is a(n) ____ user.
a. multinational
b. telematic
c. global
d. enterprise
A ____ does not replicate itself to other computers.
a. virus
b. worm
c. Trojan horse
d. all of the above
page-pf9
____ oversees research and sets standards and guidelines for many areas of the Internet.
a. ARPANET
b. NSFnet
c. LISTSERV
d. World Wide Web Consortium (W3C)
The mission of ____ is to contribute to the growth of the Web.
a. the W3C
b. ARPA
c. the NSF
d. ICANN
____ is the application of human intelligence to computers.
a. KM
b. TP
c. AI
page-pfa
d. RI
A(n) ____ is an item that contains data, as well as the actions that read or process the
data.
a. object
b. hyperlink
c. action link
d. event
A ____ is a device that provides a central point for cables in a network.
a. hub
b. packet
c. node
d. router
page-pfb
A microwave ____ is an earth-based reflective dish that contains the antenna,
transceivers, and other equipment necessary for microwave communications.
a. carrier
b. transport
c. station
d. dish
A user response is ____.
a. a collection of unprocessed text, numbers, images, audio, and video
b. a series of instructions that tells a computer what to do and how to do it
c. an instruction issued by replying to a question that is displayed
d. an instruction that causes a program to perform a specific action
page-pfc
A(n) ____ occurs when the incoming electrical power increases significantly above the
normal 120 volts.
a. overvoltage
b. undervoltage
c. spike
d. unstable flow
Application software, such as ____, often includes Web page authoring features.
a. TurboTax
b. Excel
c. Word
d. Microsoft Money
A DBMS that creates a log usually provides a(n) ____ utility that uses the logs and/or
backups to restore a database when it becomes damaged or destroyed.
a. recovery
b. restoration
page-pfd
c. resumption
d. baseline
____ is the process of setting up the software to work with the computer, printer, and
other hardware components.
a. Running
b. Installing
c. Loading
d. Leading
Popular application software includes ____ software.
a. word processing
b. spreadsheet
c. database
d. presentation graphics
page-pfe
Each tick of the system clock equates to a ____.
a. clock shot
b. clock spring
c. clock rhythm
d. clock cycle
Some ____ use filtering software to restrict the access of certain Web sites by minors.
a. businesses
b. libraries
c. schools
d. parents
page-pff
A(n) ____ line is a type of always-on connection that is established between two
communications devices.
a. dial-up
b. baseband
c. dedicated
d. network
A(n) ____ processor is a chip with two or more separate processors.
a. parallel
b. compressed
c. multi-core
d. binary
page-pf10
In the machine cycle steps illustrated in the accompanying figure, the term ____ refers
to the process of translating instructions into signals the computer can execute.
a. fetching
b. decoding
c. executing
d. storing
Case 2
In your database course, your instructor has given you a small database that has a lot of
invalid data, issuing the challenge to you that you work to apply validation rules to the
page-pf11
data and determine what checks need to be applied in order to restore integrity to the
data.
The instructor tells you that this is a mailing database, and yet you can see at a glance
that there are some records with no data in the city field. What kind of check should you
run on this field?
a. completeness check
b. consistency check
c. range check
d. check digit
A macro recorder is similar to a movie camera because both record all actions until
turned off.
Businesses seldom provide goods or services to other businesses, so little e-commerce
takes place between businesses.
page-pf12
Each token ring network has several tokens.
Hot spots are businesses that provide individuals and companies access to the Internet
free or for a fee, usually a fixed monthly amount.
Every entity on the ERD has an entry in the project dictionary.
page-pf13
In the accompanying figure, which shows common ways to access the Internet, a(n)
____________________ is a company that provides access to users with
Internet-enabled mobile devices.
Because virtual memory is faster than RAM, users may notice the computer speeding
up while it uses virtual memory.
page-pf14
A(n) digital signal consists of a continuous electrical wave.
_________________________
Adding additional hardware often is the easiest method to grow, or scale, an
information system.
PC and PC-compatible computers usually use the Macintosh operating system (Mac
OS).
Identification verifies that an individual is the person he or she claims to be.
_________________________
page-pf15
A client controls access to the resources on a network.
The ____________________ system is a number system that has just two unique digits,
0 and 1, called bits.
The average USB flash drive can hold more than 320 billion characters.
_________________________
page-pf16
Discuss FTP, including all relevant terms in your explanation.
On a data flow diagram, a rectangle with no sides is a(n) ____________________.
A video card or motherboard, in the case of integrated video, must have enough video
memory to generate the resolution and number colors you want to display.
page-pf17
A standard game console is small enough to fit in one hand, making it more portable
than a handheld game console.
Computers process information (output) into data (input).
To start up, a computer locates an operating system in storage and loads it into
____________________.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.