This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
Public wireless access locations are called hot spots.
Menu-driven interfaces enable you to avoid memorizing keywords and symbols.
A good review of Business Process Management can be found at www.bpmbasics.com.
Top senior-level positions in a corporation, such the chief information officer, often
require a Master's or Ph.D.
Codecs use three different approaches to compression.
The F2 key is often referred to as the help key because it opens the help option in most
programs.
Commercial authoring tools save output in proprietary file formats.
An event-driven programming language is designed to execute in response to user
actions.
Screen output is sometimes called soft copy.
Systems engineering looks at the combination of people,
organizations, and technologies.
A free, real-time connection between two or more parties that uses a buddy list to
identify the users a person wishes to connect with is known as instant messaging.
USB stands for Universal Serial Bus.
Hubs are the only central wiring devices available to use the star topology.
Hardware reliability and accuracy are two advantages of computers.
Command-line user interfaces are very popular.
Inheritance refers to an object's capacity to replicate itself.
The perpetrators of corporate espionage are often former employees who have been
hired by a competing firm.
A fax modem and a fax machine are the same thing.
Before it is encrypted, a readable message is known as ciphertext.
Companies such as uLocate and BrickHouse can use the GPS in your cell phone to
determine your location.
An ExpressCard was previously known as a USB card.
Interoperability refers to an organization's ability to grow with increased user demand.
Baud rate and transmission rate must be equal values.
An organization can have more than five phases in its SDLC.
Procedural languages do NOT require the programmer to specify the steps in the
program.
Hexadecimal uses base 16 characters.
A memory address is stored in binary form.
Virtual keyboard images disappear completely when not in use.
A data file is made up fields, and within a field information is organized as distinct
records.
The proper time to write documentation for a project is at the beginning so that you
design a system to match the documentation.
It is unethical for publishers to bundle spyware with their programs.
Business Process Reengineering and Business Process Management are the same thing.
Online retailers use cookies to implement 'shopping carts."
A disadvantage of networking is loss of autonomy.
An algorithm is another term for detailed specification.
MPEG-3 absorbs many of the features of MPEG-1 and MPEG-2.
A software suite is an interconnected bundle of programs.
EIS
A) Computer-based system that generates predefined reports for management
B) System used by top management to make strategic decisions
C) System used to create simulations and ask what-if questions
Which of the following is NOT a factor affecting hard disk performance?
A) The drive's seek time
B) The spacing or placement of related data on the platters
C) The rotating speed of the platters
D) The existence of disk partitions
A spam text message is known as:
A) spim.
B) macro.
C) spem.
D) spam-text.
The_______contains a computer's main hardware components.
A) system unit
B) motherboard
C) master case
D) CPU
______protocols are used to ensure that modems can communicate with each other.
A) TCP/IP
B) Oscillation
C) Modulation
D) MMT
Assume you are sitting in a crowded Internet cafe and log in to your company network
to check e-mail during lunch. In this situation, you are susceptible to a technique of
password collection called:
A) shoulder surfing.
B) password stalking.
C) data diddling.
D) dumpster diving.
RDBMS
A) Relational database management system
B) Creates flat-file databases
URL is an abbreviation for which of the following terms?
A) Uniform Resource Locator
B) Unified Record Locator
C) Unified Record Label
D) Unique Resource Label
Which of the following is the lossy file format used on the Web?
A) PNG
B) JPEG
C) BMP
D) GIF
POS terminal
A) A computer at a retail store that is also linked to a data communications network
B) A WAN connection point
________includes all the programs that provide the infrastructure and hardware control
needed for a computer, its peripheral devices, and other programs to function smoothly.
A) Application software
B) System software
C) Network software
D) Open source software
A(n)_____is a series of steps that results in the solution to a problem.
A) module
B) object
C) pseudo-solution
D) algorithm
Batch processing is a type of transaction processing system that:
A) allows a user to see immediate results when entering transactions.
B) uses the Internet to access the transaction after processing.
C) allows data to be scheduled for processing one time only.
D) allows for data to be processed at periodic intervals.
The recent branch of philosophy that deals with computer-related moral dilemmas is
called:
A) ergonomics.
B) moral beliefs.
C) computer ethics.
D) computer code of conduct.
The TCP layer of communication design:
A) ensures the security of information being transmitted from unauthorized parties.
B) handles the address part of each packet so that it gets to the right destination on the
Internet.
C) manages the assembling of a message or file into smaller packets that are transmitted
over the Internet.
D) None of the above.
SDLC
A) Model used to improve the quality of information systems
B) An unacceptable or undesirable result
Which of the following is NOT a main function of an information system?
A) Storing the data
B) Eliminating information
C) Processing data to produce information
D) Accepting input in the form of mission-critical data
RAM stands for:
A) rapidly accessed memory.
B) repeated auxiliary memory.
C) random access memory.
D) reliable associated memory.
Which of the following is NOT a technique you can effectively use to reduce the
amount of unauthorized e-mail on your computer?
A) Disable cookies on your Web browser
B) Avoid giving your name and e-mail address on marketing questionnaires
C) Reply to spam and ask to be removed from the mailing list
D) Use a "throwaway" e-mail address when visiting a chat room
Hyperlink
A) A text or graphic area that when clicked brings another document into view
B) Software that interprets HTML tags and displays Web pages
C) A hypertext document often written in HTML
_______include word processing, spreadsheet, database, presentation graphics, and
personal information management applications.
A) Applications that work through and run from the Internet
B) Personal productivity programs
C) Home and educational programs
D) Multimedia and graphics software
The_________________wireless memory card takes all the storage features of a
regular flash memory card and combines it with wireless circuitry.
A) Eye-Fi
B) WiFi
C) Ci-Fi
D) Hi-Fi
SMDS
A) A protocol used with 100 percent digital lines
_______, where networked computers work on small pieces of large complex tasks,
is revolutionizing research in a number of areas.
A) Group work
B) Shared resources
C) Complex-parceling
D) Distributed computing
Typically, which of the following degrees are required for a customer support
technician?
A) Doctorate
B) Associates
C) Bachelor's
D) Master's
A point of presence (POP) is a:
A) wired or wireless WAN network that enables users to access the WAN.
B) high-capacity transmission line carrying traffic for a WAN.
C) node on a WAN connected to the network through wireless technology.
D) terminal in a store that processes a local order and connects to a company database
through a WAN.
Category 5 enhanced uses all_______wire pairs.
A) 4
B) 5
C) 3
D) 2
________acts as a secure intermediary, offering users the ability to make payments
from their bank account or credit card without revealing personal financial information
to the seller.
A) PayPal
B) BuyerPal
C) CommercePal
D) PurchasePal
Which of the following keys or key combinations is typically used to display on-screen
help?
A) Esc
B) Enter
C) Ctrl + H
D) F1
Spyware software can perform all of the following EXCEPT:
A) it can relay information about you to the spyware's source.
B) it can avoid compatibility problems.
C) it can monitor your computer or online activity.
D) it can allow others to take control of your computer.
System utilities
System unit
A) Any size of case that contains the computer's main hardware
B) Prevents computer components from being damaged by heat
C) Specification for mounting internal components such as the motherboard
The process of eliminating logic and syntax errors is known as_________.
Bitmapped graphics are composed of tiny dots known as picture elements or
__________.
The Network+ certificate validates vendor-neutral skills for network_____________.
The________consists of the actions that the OS uses most frequently, such as
starting applications.
A network of high-capacity storage devices connecting all of an organization's servers is
known by the acronym___________ .
The Department of Justice and the organization known by the
acronym_________have primary jurisdiction over spammers.
IRC is an Internet service that organizes chat groups, called__________, for
text-based conversations with other users.
Public domain software
A) Software without a copyright that can be copied, changed, and used at no charge
B) Copyrighted software that contains measures to prevent unauthorized duplication
C) Copyrighted software that you must pay for before using
The amount of room that a system unit needs to fit on the desk is called the _________.
Trusted by Thousands of
Students
Here are what students say about us.
Resources
Company
Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.