COMP 31387

subject Type Homework Help
subject Pages 25
subject Words 2449
subject Authors Catherine Laberta

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A machine cycle includes the instruction cycle and the execution cycle.
Kindle 2 is a portable, wired, paperback-sized e-book device.
Prototyping is eliminated when using RAD, rapid application development method.
Uploading and downloading is how computers transfer files between each other.
page-pf2
With respect to wireless networks, it is important to properly secure
your network and data, due to the fact that signals can extend
beyond the walls of your home.
A competitive advantage brings an organization up to the same level as other companies
in its industry.
An example of a soft skill is business acumen.
page-pf3
Packet-switching networks are reliable.
Data validation procedures, alphabetic checks, range checks, and consistency checks
are all used to enhance the data integrity of a database.
Common embedded operating systems that are installed on handheld devices include
Windows CE, Palm OS, Symbian OS, and Android.
TCP/IP experience is a highly sought-after technical skill.
page-pf4
In some cases PDAs can run commercial application software such as payroll.
Baud rate is often incorrectly used as a substitute for bps.
An important feature of object-oriented programming is the concept of class.
page-pf5
A cost-benefit analysis proves the benefits of hiring an outside company to complete a
project.
Active-matrix technology drives the display by changing each pixel individually as
needed.
A fat client accesses the server but does most of the processing on the data in its own
system.
When you first turn on or reset a PC, the CPU immediately begins to execute or work
on application instructions.
page-pf6
Spear phishing targets specific people.
Vendors and trainers claim that employers who hire certified employees have less
downtime and lower IT costs.
A single point of failure will not have much impact on a system's overall ability to
continue to function in the event of a failure.
page-pf7
An executive support system supports daily operational decision making.
Amazon SimpleDB is used by major Web sites such as microsoft.com.
Computer science and management information systems are basically similar academic
departments.
page-pf8
A file management program is most handy for large corporations.
One of the advancements of Web-database integration is the ability to pay bills online.
New technology is bringing new jobs that are cross disciplinary, involving artistic or
communication skills as well as technical skills.
Offshoring is the transfer of labor from other countries to the
United States.
page-pf9
Microsoft's SQL Data Services, based on the Azure Web Service platform is in final
form as is Amazon Simple DB.
In the cases of child identity theft, the most common perpetrator is the child's
neighbors.
Data warehouses are capable of storing all the information that a corporation possesses.
page-pfa
Hexadecimal numbers use the numbers 0 to 9 and the letters A to F.
Three types of feasibility must be examined to determine whether a project is feasible.
SQL is an acronym for Simple Query Language.
FERPA establishes standards for the transmission of electronic health care information.
page-pfb
A green screen enables participants in a video conference to create a shared workspace.
Unlike most other forms of DSL, HDSL is not a typical consumer service.
Convergence will be the future of home networking systems.
page-pfc
How many peripheral devices can be connected to a single USB port?
A) 8
B) 127
C) 1
D) 64
The collection of data in___________helps managers make decisions by representing
what business conditions look like at a particular point in time.
A) data mining
B) data marts
C) data warehouses
D) None of the above
Which of the following type of device gives you control over the movement of the
on-screen pointer?
A) Insertion
page-pfd
B) Output
C) Pointing
D) Cursor
A processor's instruction set:
A) is the same for different types of processors.
B) will run programs that were created for an incompatible processor.
C) is unique to the type of processor.
D) has nothing to do with the ability of the computer to run a program.
Any system component, such as hardware or software, that causes the entire system to
malfunction is called a:
A) cascading critical weakness (CCW).
B) fault intolerant element.
C) single point of failure (SPOF).
page-pfe
D) critical link.
Systems Administrator
A) Installs, maintains, and supports the operating system
B) Challenged to create new, cutting-edge technologies
Index page
A) The first page displayed when a user visits the top level of a Web site
B) A computer that stores and transmits Web pages when requested
File management program
page-pff
A) Relational database management system
B) Creates flat-file databases
Which of the following is the path through which messages are sent from one location
to another?
A) Bandwidth markers
B) Communications channels
C) Digital endpoints
D) Multiplexers
TPS
A) Information system that deals with skilled knowledge in an area
B) System that handles an organization's day-to-day accounting needs
page-pf10
When the compiler translates code, it:
A) translates source code into object code.
B) determines the number of lines of code.
C) calculates the amount of disk space.
D) checks for the programmer identification.
Which of the following types of IT position has the responsibility of ensuring overall
network reliability?
A) Network Programmer
B) Director of Network Services
C) Network Engineer
D) Network Analyst
Five bits result in________ possibilities.
A) 5
page-pf11
B) 26
C) 20
D) 32
A value-added reseller (VAR) is a company that:
A) writes specialized information system software.
B) tests software for errors and user satisfaction.
C) incorporates equipment and software from many sources to produce a specialized
system.
D) installs and maintains network equipment.
Problem
A) The underlying cause
B) Allows analysts to return to a previous phase
page-pf12
Symptom
A) Model used to improve the quality of information systems
B) An unacceptable or undesirable result
Which of the following generates the project plan after the appropriate solution has
been selected?
A) Project Leader
B) Outside vendor selected to develop the system
C) Systems Analyst
D) Project Sponsor
Vacation hackers, one of the newest trends in Internet fraud, involve all of the following
page-pf13
EXCEPT:
A) phony WiFi hot spots, called evil twins, are used to obtain data from
unsuspecting individuals.
B) users believe they are using a valid WiFi access point.
C) in addition to the information reaching the intended destination, such as an airport or
hotel, the cybercriminal also obtains the user's data.
D) travelers being targeted by Cybercriminals.
The amount of time it takes a device from the request for information to that
information's delivery is known as:
A) cycle time.
B) access time.
C) read time.
D) cache time.
Many corporate chief information officers shy away from adopting Linux because:
A) it's powerful.
page-pf14
B) it has not been properly tested.
C) it doesn't have a stable company behind it.
D) it's free.
Object-oriented
A) Holds a list of tables in the database
B) Newest type of database
Which of the following types of networks require an access point?
A) WiFi
B) Novell
C) Ethernet
D) Packet switching
page-pf15
To hinder corporate espionage, all of the following should be done EXCEPT:
A) protect against data deletion and loss by write and password
protecting documents.
B) create regular backups.
C) force password changes every 20 days if data within the organization is highly
secure.
D) make employees aware of security policies and the consequences of violating them.
Because Web browsers can read__________files, that form of animation is common on
the Web.
A) JPEG
B) TIFF
C) BMP
D) GIF
page-pf16
Which of the following is an example of a software suite?
A) Internet Explorer
B) Corel WordPerfect Office
C) Aldus PageMaker
D) Microsoft Access
A yottabyte represents 1_________bytes.
A) trillion
B) quadrillion
C) septillion
D) million
Operational decisions are made by which of the following types of manager:
A) senior.
page-pf17
B) middle.
C) operational.
D) All of the above.
A computerized version of a stand-alone fax machine is called a:
A) fax telephony.
B) digital faxer.
C) fax digitization.
D) fax modem.
Systems Analyst
A) Interacts with users and application developers to design information systems
B) Designs, codes, and tests software according to specifications
page-pf18
Which of the following hard disk drives uses flash memory to speed up the boot
process?
A) HDTV
B) SSD
C) HHD
D) FSD
________________is applying the abilities and concentrated power of many computers
in a network to a single problem at the same time.
A) Multitenancy computing
B) Enterprise computing
C) Grid computing
D) Cloud computing
page-pf19
A Web site's domain name correlates to the:
A) type of organization it belongs to.
B) Web server IP address.
C) network identifier.
D) path name.
A data flow diagram (DFD) is used to:
A) show a model of the eventual system without it being fully functional.
B) describe the different components of the information system and their interactions.
C) trace the flow of data through the proposed information system.
D) display the current status of each phase of the SDLC.
NICis an abbreviation for which of the following terms?
A) Network interface capability
page-pf1a
B) Network integration card
C) Network information card
D) Network interface card
Workflow automation still uses many manual processes to send documents and data.
Infrared
A) Transmits via beams of light through the air
B) Transmits via thin strands of glass or plastic
page-pf1b
A(n)_________is a method used to bypass normal authentication to secure access to
a computer.
Microsoft Windows
A) Operating system used on most personal computers
B) Many computer users prefer this operating system for its security, stability, and
ease of use
C) Operating system developed by Microsoft that requires the use of a command-line
interface
______________is a query language introduced by Microsoft in 1997 and is similar to
SQL (Structured Query Language) that has the added ability to access multiple
dimensions.
page-pf1c
Racetrack memory
A) A portable storage device that uses solid-state circuitry
B) The hardware components on which data is held
C) Uses the spin of electrons to store information
D) A copy of program, data, and information created in one secondary storage
medium that is duplicated to another
The type of Internet access that is often a viable alternative to dial-up in rural areas
where DSL or cable is not available is _______.
__________computing is applying the abilities of many computers in a network to a
single problem at the same time.
page-pf1d
Susceptibility to noise and interference is a major disadvantage
of_________transmissions.
QuickTime is the video file format developed by__________Computer that is widely
used in producing multimedia CDs.
The letter e in the name, Category 5e, stands for_________.
The ability of___________memory to allow memory operation at much higher speeds
than today's storage media is a great step forward in the area of transferring and
retrieving data.
page-pf1e
A computer uses_________memory when the RAM gets full.
A(n)________can help improve the accuracy of a search if you are unsure about the
exact spelling of a word.
In virtual memory, programs and data are divided into fixed size units called_______.
page-pf1f
The rate at which two modems can exchange data is known as the data_______rate.
A pointing device resembling a pencil eraser and located on some keyboards used to
move the cursor is called a pointing _____.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.