CMCS 84885

subject Type Homework Help
subject Pages 22
subject Words 2023
subject Authors Catherine Laberta

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
The Eye-Fi is a wireless memory card.
Analog signals are composed by sampling a digital wave at discrete points in time.
There are currently enough students graduating from U.S. colleges with degrees in
computer science.
Joint application development requires more project management skills than other
methods.
page-pf2
Unlike current flash memory, racetrack memory can only store data several thousand
times before it wears out.
A programmer must write code that describes an object when using RAD.
The first part of a complete URL specifies the directory name.
page-pf3
VPN is the acronym for virtual public network.
MMDS is an abbreviation for multichannel multipoint distribution services.
A backdoor is a vulnerability that could enable someone to crack an encryption code.
BD-ROM is a recordable video format.
page-pf4
The terms free software and open source software are sometimes used interchangeably,
but not everyone agrees that they mean the same thing.
A typical computer has different types of memory.
An ADSL modem separates an ordinary copper telephone line into three separate data
channels with different capacities and speeds.
page-pf5
A study by McAfee predicted threats to social networking sites such as Facebook will
decrease.
In a distributed structure, users have access to standardized tools.
Digital camera images are not converted into bit-mapped format.
System analysts identify and evaluate alternative solutions, make formal presentations
to management, and assist in the development of the system after an option has been
chosen.
page-pf6
Programmers must determine the requirements needed to modify an existing system or
develop a new one.
At Bluetooth's maximum transfer capacity, a user is able to move a document within a
few seconds.
The time it takes the read/write head to locate the data before reading begins is called
transfer performance.
page-pf7
The term globalization means the same as internationalization.
Compression programs were developed by Microsoft and cannot be used independent
of the Windows OS.
Category 6 twisted-pair cable is backward compatible with Cat-5e but not Cat 5.
page-pf8
In-house development costs less than purchasing a system from an outside vendor.
Linux-based OSs cannot be used with TiVo and Amazon Kindle.
The "V" in DVD can mean versatile.
The first successful graphical browser was Mosaic.
page-pf9
Web-hosted technology means the capability to upload files to an
online site.
The execute step in the machine cycle interprets what action the program is telling the
computer to perform.
Which of the following solid state storage devices is commonly used in smartphones
and MP3 players?
A) Flash memory card
B) Smart card
C) PCMCIA card
D) FMD card
page-pfa
A computer_________risk is an event, action, or situation that can lead to the loss
or destruction of computer systems or their data.
The computer function in which raw data is converted into meaningful information is
known as:
A) input.
B) output.
C) processing.
D) storage.
POP
A) A computer at a retail store that is also linked to a data communications network
page-pfb
B) A WAN connection point
Signals that inform the OS that something happened are:
A) operating system diversions.
B) program defects.
C) drivers.
D) interrupts.
Web sites dedicated to computer professionals can provide all of the following
EXCEPT:
A) training information.
C) forums to exchange information.
B) financial counseling.
D) instructional guides.
page-pfc
Which of the following is a type of product that complements the human body's best
posture and functionality?
A) Natural
B) Ergocentric
C) Ergonomic
D) Esoteric
A representation of an image as a matrix of pixels is called a_________image.
A) digitized
B) bit-mapped
C) digit recognition
D) scanned
page-pfd
The computer function in which raw data is received is known as:
A) output.
B) storage.
C) input.
D) processing.
Damaged areas of a disk that can no longer hold data are called:
A) inaccessible bytes.
B) spoiled tracks.
C) damaged clusters.
D) bad sectors.
Hexadecimal numbers are represented using numbers 0 to 9 and letters________
A) A to D
page-pfe
B) A to F
C) A to Z
D) None of the above
_____is a portable, wireless, paperback-sized e-book reading device that includes
a text-to-speech function.
A) Kindle 2
B) Wiki
C) Netbook
D) Digital e-book
Comparing a binary digit to a_______is an easy-to-understand analogy.
A) storage bin
B) memory chip
C) light switch
D) highway
page-pff
Because a network's layers are arranged vertically similar to the floors in a building,
with each "floor" having its own protocols, the layers are known as a:
A) protocol stack.
B) top-down protocols.
C) protocol suite.
D) modulation protocols.
Which of the following organizations have reported that many color laser printers
embed printer tracking dots on nearly every page at the urging of the U.S. government?
A) Electronic Frontier Foundation
B) National Printer Alliance
C) National Counterfeit Tracking Organization
D) Patriot Organization
page-pf10
RAD is an acronym for:
A) relevant application development.
B) random application design.
C) rapid application development.
D) responsible application design.
The ExpressCard is also known as the________card.
A) VGA
B) PCMCIA
C) SCSI
D) PS/2
page-pf11
FTP is an abbreviation for which of the following terms?
A) File transport program
B) File transfer protocol
C) File tagging program
D) File transfer program
Analog cellular services are being replaced by digital cellular technologies
called________.
A) DAC
B) DBS
C) PSTN
D) PCS
The ExpressCard provides enhancements in all of the following areas EXCEPT:
A) wireless communication.
B) multimedia.
page-pf12
C) additional memory.
D) cost.
Which of the following computer interfaces is the most popular?
A) Shortcut keystrokes
B) GUI
C) Menu-driven
D) Command-line
Which of the following is a small-scale model of an information system that is NOT
fully developed or operational?
A) Alpha model
B) Functional model
C) Prototype
D) Beta test
page-pf13
Which of the following type of graphic is created by a drawing program?
A) Vector
B) Raster
C) Bitmapped
D) Post-Script
Although virtual memory enables users to work with more memory than the amount of
RAM installed on the computer, __________ slows the computer down.
A) the operating system
B) segmentation
C) memory scrubbing
D) paging
page-pf14
The phases in the systems development life cycle in order are the following:
A) planning phase, design phase, analysis phase, maintenance phase,
and implementation phase.
B) design phase, analysis phase, planning phase, maintenance phase, and
implementation phase.
C) planning phase, analysis phase, design phase, implementation phase, and
maintenance phase.
D) analysis phase, planning phase, design phase, implementation phase, and
maintenance phase.
_______________sends more than one call over a single line.
A) Converging
B) Splitting
C) Diverging
D) Multiplexing
page-pf15
Which of the following wildcard characters can be used as a substitute for any number
of characters in a keyword?
A) !
B) ?
C) +
D) *
The number of operations per clock tick affects:
A) monitor resolution.
B) microprocessor performance.
C) disk drive capacity.
D) the bus size.
____________is when a person drives around with a notebook computer to look for
wireless networks.
A) Warcruising
page-pf16
B) Wardriving
C) Network surfing
D) Network sniffing
_________is an open source object-oriented programming language, which was
released in 1995.
A) PHP
B) Ajax
C) XML
D) Ruby
Because of their complexity, networks use an architecture that is divided into separate
network:
A) modules.
B) levels.
C) layers.
D) elements.
page-pf17
A leased line is a specially conditioned telephone line that enables continuous
and______communication between two points.
A) end-to-end
B) uninterrupted
C) interrupted
D) dial-up
A(n)_______is an electronic switch that directs the flow of electrical signals in
a computer.
Copy-protected software
page-pf18
A) Software without a copyright that can be copied, changed, and used at no charge
B) Copyrighted software that contains measures to prevent unauthorized duplication
C) Copyrighted software that you must pay for before using
____________should be an ongoing process that isn't put off until the end of the
project.
JAD stands for_________application development.
WPA is an acronym for WiFi__________Access.
page-pf19
_______list is a new Windows 7 feature where right-clicking on an appropriate icon
will result in the display of documents, pictures, songs, or Web sites used each day.
The new wave in office suites is_______-hosted technology, which means users
can upload files to an online site so the files can be viewed and edited from another
location.
___________servers are stripped-down, energy-efficient, low-cost modular computers
with server software installed that meet the needs of data centers.
page-pf1a
A Web___________engineer designs, develops, and tests Web-based services for Web
sites.
Heat is removed from the CPU by using heat sink or _____
Sites such as MSN, AOL, and Yahoo! are__________, or gateways, that provide
subject guides to Internet content.
The field of_____________engineering applies an interdisciplinary approach to the
creation and maintenance of quality systems.
page-pf1b
MS-DOS
A) Operating system used on most personal computers
B) Many computer users prefer this operating system for its security, stability, and
ease of use
C) Operating system developed by Microsoft that requires the use of a command-line
interface
_______area networks use cables, radio waves, or infrared transmissions to
connect computers and peripherals devices.
Using computers and computer programs to replace specified time and place learning
and teachers is called e- _________.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.