CMCS 76267

subject Type Homework Help
subject Pages 21
subject Words 2082
subject Authors Catherine Laberta

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Public wireless access locations are called hot spots.
Menu-driven interfaces enable you to avoid memorizing keywords and symbols.
A good review of Business Process Management can be found at www.bpmbasics.com.
Top senior-level positions in a corporation, such the chief information officer, often
require a Master's or Ph.D.
page-pf2
Codecs use three different approaches to compression.
The F2 key is often referred to as the help key because it opens the help option in most
programs.
Commercial authoring tools save output in proprietary file formats.
page-pf3
An event-driven programming language is designed to execute in response to user
actions.
Screen output is sometimes called soft copy.
Systems engineering looks at the combination of people,
organizations, and technologies.
A free, real-time connection between two or more parties that uses a buddy list to
identify the users a person wishes to connect with is known as instant messaging.
page-pf4
USB stands for Universal Serial Bus.
Hubs are the only central wiring devices available to use the star topology.
Hardware reliability and accuracy are two advantages of computers.
page-pf5
Command-line user interfaces are very popular.
Inheritance refers to an object's capacity to replicate itself.
The perpetrators of corporate espionage are often former employees who have been
hired by a competing firm.
A fax modem and a fax machine are the same thing.
page-pf6
Before it is encrypted, a readable message is known as ciphertext.
Companies such as uLocate and BrickHouse can use the GPS in your cell phone to
determine your location.
An ExpressCard was previously known as a USB card.
page-pf7
Interoperability refers to an organization's ability to grow with increased user demand.
Baud rate and transmission rate must be equal values.
An organization can have more than five phases in its SDLC.
Procedural languages do NOT require the programmer to specify the steps in the
program.
page-pf8
Hexadecimal uses base 16 characters.
A memory address is stored in binary form.
Virtual keyboard images disappear completely when not in use.
page-pf9
A data file is made up fields, and within a field information is organized as distinct
records.
The proper time to write documentation for a project is at the beginning so that you
design a system to match the documentation.
It is unethical for publishers to bundle spyware with their programs.
page-pfa
Business Process Reengineering and Business Process Management are the same thing.
Online retailers use cookies to implement 'shopping carts."
A disadvantage of networking is loss of autonomy.
An algorithm is another term for detailed specification.
page-pfb
MPEG-3 absorbs many of the features of MPEG-1 and MPEG-2.
A software suite is an interconnected bundle of programs.
EIS
A) Computer-based system that generates predefined reports for management
B) System used by top management to make strategic decisions
C) System used to create simulations and ask what-if questions
page-pfc
Which of the following is NOT a factor affecting hard disk performance?
A) The drive's seek time
B) The spacing or placement of related data on the platters
C) The rotating speed of the platters
D) The existence of disk partitions
A spam text message is known as:
A) spim.
B) macro.
C) spem.
D) spam-text.
page-pfd
The_______contains a computer's main hardware components.
A) system unit
B) motherboard
C) master case
D) CPU
______protocols are used to ensure that modems can communicate with each other.
A) TCP/IP
B) Oscillation
C) Modulation
D) MMT
Assume you are sitting in a crowded Internet cafe and log in to your company network
to check e-mail during lunch. In this situation, you are susceptible to a technique of
password collection called:
A) shoulder surfing.
page-pfe
B) password stalking.
C) data diddling.
D) dumpster diving.
RDBMS
A) Relational database management system
B) Creates flat-file databases
URL is an abbreviation for which of the following terms?
A) Uniform Resource Locator
B) Unified Record Locator
C) Unified Record Label
D) Unique Resource Label
page-pff
Which of the following is the lossy file format used on the Web?
A) PNG
B) JPEG
C) BMP
D) GIF
POS terminal
A) A computer at a retail store that is also linked to a data communications network
B) A WAN connection point
________includes all the programs that provide the infrastructure and hardware control
needed for a computer, its peripheral devices, and other programs to function smoothly.
A) Application software
page-pf10
B) System software
C) Network software
D) Open source software
A(n)_____is a series of steps that results in the solution to a problem.
A) module
B) object
C) pseudo-solution
D) algorithm
Batch processing is a type of transaction processing system that:
A) allows a user to see immediate results when entering transactions.
B) uses the Internet to access the transaction after processing.
C) allows data to be scheduled for processing one time only.
D) allows for data to be processed at periodic intervals.
page-pf11
The recent branch of philosophy that deals with computer-related moral dilemmas is
called:
A) ergonomics.
B) moral beliefs.
C) computer ethics.
D) computer code of conduct.
The TCP layer of communication design:
A) ensures the security of information being transmitted from unauthorized parties.
B) handles the address part of each packet so that it gets to the right destination on the
Internet.
C) manages the assembling of a message or file into smaller packets that are transmitted
over the Internet.
D) None of the above.
page-pf12
SDLC
A) Model used to improve the quality of information systems
B) An unacceptable or undesirable result
Which of the following is NOT a main function of an information system?
A) Storing the data
B) Eliminating information
C) Processing data to produce information
D) Accepting input in the form of mission-critical data
RAM stands for:
A) rapidly accessed memory.
B) repeated auxiliary memory.
page-pf13
C) random access memory.
D) reliable associated memory.
Which of the following is NOT a technique you can effectively use to reduce the
amount of unauthorized e-mail on your computer?
A) Disable cookies on your Web browser
B) Avoid giving your name and e-mail address on marketing questionnaires
C) Reply to spam and ask to be removed from the mailing list
D) Use a "throwaway" e-mail address when visiting a chat room
Hyperlink
A) A text or graphic area that when clicked brings another document into view
B) Software that interprets HTML tags and displays Web pages
C) A hypertext document often written in HTML
page-pf14
_______include word processing, spreadsheet, database, presentation graphics, and
personal information management applications.
A) Applications that work through and run from the Internet
B) Personal productivity programs
C) Home and educational programs
D) Multimedia and graphics software
The_________________wireless memory card takes all the storage features of a
regular flash memory card and combines it with wireless circuitry.
A) Eye-Fi
B) WiFi
C) Ci-Fi
D) Hi-Fi
page-pf15
SMDS
A) A protocol used with 100 percent digital lines
_______, where networked computers work on small pieces of large complex tasks,
is revolutionizing research in a number of areas.
A) Group work
B) Shared resources
C) Complex-parceling
D) Distributed computing
Typically, which of the following degrees are required for a customer support
technician?
A) Doctorate
B) Associates
page-pf16
C) Bachelor's
D) Master's
A point of presence (POP) is a:
A) wired or wireless WAN network that enables users to access the WAN.
B) high-capacity transmission line carrying traffic for a WAN.
C) node on a WAN connected to the network through wireless technology.
D) terminal in a store that processes a local order and connects to a company database
through a WAN.
Category 5 enhanced uses all_______wire pairs.
A) 4
B) 5
C) 3
D) 2
page-pf17
________acts as a secure intermediary, offering users the ability to make payments
from their bank account or credit card without revealing personal financial information
to the seller.
A) PayPal
B) BuyerPal
C) CommercePal
D) PurchasePal
Which of the following keys or key combinations is typically used to display on-screen
help?
A) Esc
B) Enter
C) Ctrl + H
D) F1
page-pf18
Spyware software can perform all of the following EXCEPT:
A) it can relay information about you to the spyware's source.
B) it can avoid compatibility problems.
C) it can monitor your computer or online activity.
D) it can allow others to take control of your computer.
System utilities
System unit
A) Any size of case that contains the computer's main hardware
B) Prevents computer components from being damaged by heat
C) Specification for mounting internal components such as the motherboard
page-pf19
The process of eliminating logic and syntax errors is known as_________.
Bitmapped graphics are composed of tiny dots known as picture elements or
__________.
The Network+ certificate validates vendor-neutral skills for network_____________.
page-pf1a
The________consists of the actions that the OS uses most frequently, such as
starting applications.
A network of high-capacity storage devices connecting all of an organization's servers is
known by the acronym___________ .
The Department of Justice and the organization known by the
acronym_________have primary jurisdiction over spammers.
IRC is an Internet service that organizes chat groups, called__________, for
text-based conversations with other users.
page-pf1b
Public domain software
A) Software without a copyright that can be copied, changed, and used at no charge
B) Copyrighted software that contains measures to prevent unauthorized duplication
C) Copyrighted software that you must pay for before using
The amount of room that a system unit needs to fit on the desk is called the _________.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.