CMCS 62548

subject Type Homework Help
subject Pages 18
subject Words 2495
subject Authors Gary B. Shelly, Kathleen McMahon, Misty E. Vermaat, Tristen Kendall

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Case 1
You and your best friend from high school are both looking to begin degree programs in
the computer field, but you have different criteria for the program you select.
Your friend is looking for different things from his degree program. His interests are
more design-oriented, with a focus on electronics, and he would ultimately like to earn
a Ph.D. Which of the following disciplines is the best match for your friend?
a. CE
c. CIE
b. CS
d. CIS
Double Data Rate SDRAM (DDR SDRAM) chips are even faster than SDRAM chips
because they ____.
a. transfer data twice for each clock cycle
b. are synchronized to the system clock
c. do not have to be re-energized as often
d. use pipelining techniques
page-pf2
In the database pictured in the accompanying figure, a(n) ____ is a combination of one
or more related characters or bytes and is the smallest unit of data a user accesses.
a. field
b. member
c. record
d. identifier
____ are capable of processing more than 1 quadrillion instructions in a single second.
a. Desktop computers
b. Notebook computers
page-pf3
c. Midrange servers
d. Supercomputers
In a ____ like the one shown in the accompanying figure, a user types commands or
presses special keys on the keyboard (such as function keys or key combinations) to
enter data and instructions.
a. command-line interface
b. menu-driven interface
c. performance-monitor interface
d. graphical user interface (GUI)
page-pf4
Grid computing ____.
a. often is used in research environments
b. involves charging for the use of a grid based on processing time
c. combines many servers and/or personal computers on a network
d. all of the above
____ originally was developed at NASA's Jet Propulsion Laboratory as a procedural
scripting language similar to C and C++.
a. XML
b. Rexx
c. Tcl
d. Perl
page-pf5
____________________ allows users connected to a network to transfer money from
one bank account to another via transmission media.
An enterprise storage system may use ____.
a. RAID and a tape library
b. optical disc jukeboxes
c. Internet backup and NAS devices
d. all of the above
____ Certified Associate is an application software certification that tests a user's
expertise with Flash and Dreamweaver.
a. Microsoft
b. Adobe
page-pf6
c. Web
d. A+
Audio editing software usually includes ____, which are designed to enhance audio
quality.
a. clips
b. filters
c. matrices
d. subwoofers
Windows ____ is a scaled-down Windows operating system designed for use on
communications, entertainment, and computing devices with limited functionality.
a. UNIX
b. NetWare
c. Server 2008
d. Embedded CE
page-pf7
Information ____ refers to the right of individuals and companies to deny or restrict the
collection and use of information about them.
a. rights
b. acceptable use
c. restrictions
d. privacy
Communications software consists of programs that ____.
a. help users establish a connection to another computer or network
b. manage the transmission of data, instructions, and information
c. provide an interface for users to communicate with one another
d. all of the above
page-pf8
A ____ has pins on opposite sides of the circuit board that connect together to form one
set of contacts.
a. DIMM (dual inline memory module)
b. SIMM (single inline memory module)
c. RIMM (Rambus inline memory module)
d. CIMM (Cantus inline memory module)
A(n) ____________________ verifies that a required field contains data.
The purpose of the ____ is to provide ongoing assistance for an information system and
its users after the system is implemented.
a. analysis phase
b. planning phase
c. operation, support, and security phase
d. design phase
page-pf9
Today, ____ is a primary communications method for both personal and business use.
a. e-commerce
b. FTP
c. chat room
d. e-mail
____ includes music, speech, or any other sound.
a. Audio
b. Vodcasting
c. Video
d. Digeo
page-pfa
Query By Example uses a graphical user interface that assists users with retrieving data.
A(n) ____ chart identifies a program's inputs, its outputs, and the processing required to
transform the inputs into outputs.
a. structured
b. IPO
c. top-down
d. routine
A(n) ____ is any tangible item such as a chart, diagram, report, or program file.
a. object
b. entity
c. deliverable
d. source
page-pfb
____ clients are small, terminal-like computers that mostly rely on a server for data
storage and processing.
a. Thin
b. Grid
c. Integrated
d. Appliance
Place a CD or DVD in its protective case, called a(n) ____ box, when it is not being
used.
a. ROM
b. jewel
c. sector
d. ultimate
page-pfc
____ Certified Professional for Lotus Software is an application software certification
that tests knowledge of Lotus programs.
a. IBM
b. Microsoft
c. Adobe
d. Oracle
Some ____ printers spray ink, while others use heat or pressure to create images.
a. nonimpact
b. impact
c. band
d. shuttle-matrix
With a three-generation backup policy, the child is the ____.
a. most recent copy of the file
b. second oldest copy of the file
page-pfd
c. oldest copy of the file
d. original file
A(n) ____ flash drive is a flash memory device that plugs in a port like the one shown
in the accompanying figure on a computer or portable device.
a. peripheral
b. fixed
c. embedded
d. USB
page-pfe
____ is an Internet certification sponsored by the International Webmasters Association
that tests advanced knowledge in the areas of Web site design and development, and
server administration and security.
a. OCP
b. CWP
c. CCIE
d. CIW
A read/write ____ is the mechanism that reads and writes items in the drive as it barely
touches the disk's recording surface.
a. head
b. index
c. vector
d. notch
page-pff
Job titles in the system development and programming area of an IT department include
all of the following EXCEPT ____.
a. e-commerce director
b. system programmer
c. systems analyst
d. technical writer
Management information systems allow users to ____.
a. hire employees
b. supervise activities
c. solve problems
d. track progress
When users query a hierarchical database, the results often are displayed more quickly
than the same query of a relational database.
page-pf10
A TPS program routes customer telephone calls to the most appropriate support person
depending on the identity of the customer or responses the customer gives to prompts.
Describe what a content management system is.
page-pf11
Discuss ink-jet printing, including the costs, types of paper it accepts, what it can print
on, its resolution, and its speed.
page-pf12
Student chapters of professional organizations do not exist on college campuses.
____________________ is the process of converting readable data into unreadable
characters to prevent unauthorized access.
Explain three safeguards you can use to improve the security of wireless networks.
page-pf13
page-pf14
A MAN typically includes one or more WANs like those shown in the accompanying
figure, but covers a smaller geographic area than a LAN.
A(n) ____________________ is a utility that detects and protects a personal computer
from unauthorized intrusions.
page-pf15
The National Press Photographers Association believes that allowing even the slightest
alteration could lead to misrepresentations in photographs.
With Web page authoring software, users can view or modify the SQL associated with a
Web page.
A(n) ____________________ is a light-sensing input device that reads printed text and
graphics and then translates the results into a form the computer can process.
page-pf16
When a company uses the file processing approach, many programs and users share
data in a database.
A(n) ____________________ installs, configures, and maintains LANs, WANs,
intranets, and Internet systems.
____________________ is an encryption program you can purchase for your computer.
page-pf17
____________________ is a category of output that includes drawings, clip art, and
photographs.
To help consumers evaluate various processors, Intel and AMD now use a(n)
____________________ scheme that more accurately reflects the processing speed of
their chips.
____________________ are freestanding computers that usually include touch screens.
Security software tracks leads and inquiries from customers.
_________________________

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.