COMPSCI 37205

subject Type Homework Help
subject Pages 18
subject Words 2123
subject Authors Gary B. Shelly, Kathleen McMahon, Misty E. Vermaat, Tristen Kendall

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
IT certification can do all of the following EXCEPT ____.
a. enhance employees' careers
b. provide employees with added credibility among peers and employers
c. increase employee salaries
d. guarantee job security
A standard CD-ROM is called a ____ disc because manufacturers write all items on the
disc at one time.
a. multisession
b. single-session
c. unisession
d. compound-session
Which of the following is an example of computer-aided design software?
a. Adobe InDesign
b. Autodesk AutoCAD
page-pf2
c. Adobe Illustrator
d. Adobe Audition
____ software provides a means for sharing, distributing, and searching through
documents by converting them into a format that can be viewed by any user.
a. Tax preparation
b. Business
c. Document management
d. Accounting
A(n) ____ is a working model of a proposed system.
a. adaptation
b. feasibility scheme
c. mockup
d. prototype
page-pf3
A(n) ____ operating system is an operating system that organizes and coordinates how
multiple users access and share resources on a network.
a. client
b. multitasking
c. server
d. administrative
A(n) entertainment Web site contains content that describes a cause, opinion, or idea.
_________________________
A(n) ____ is application software that includes an appointment calendar, address book,
notepad, and other features to help users organize personal information.
a. PIM
page-pf4
b. PIT
c. PIN
d. PIC
A NAS (network attached storage) server often is called a storage ____ because it is a
piece of equipment with only one function to provide additional storage.
a. appliance
b. secure site
c. warehouse
d. utility
An FTP site is a collection of files including ____ that reside on an FTP server.
a. text
b. program files
c. video clips
d. graphics
page-pf5
____ high-speed Internet connections use an antenna on a house or business to
communicate with a tower location via radio signals.
a. Satellite
b. FTTP
c. Fixed wireless
d. DSL
A ____ provides personal organizer functions such as a calendar, appointment book,
address book, calculator, and notepad.
a. PPA
b. PDA
c. PSA
d. mainframe
page-pf6
With a(n) ____, users choose which folders and files to include in a backup.
a. full backup
b. incremental backup
c. differential backup
d. selective backup
Case 2
In your introductory course on computers, your professor has decided to dedicate a
lecture to computer ethics. There is a lot of ambiguity in this topic, and she has
presented a range of circumstances for you and your classmates to review.
Which is NOT an issue surrounding the concept of fair use, from copyright law?
a. The right of students to post their own term papers on the Web.
b. The rights of a faculty member to print material from the Web and distribute it to the
members of her class for instructional purposes.
c. The use of an anonymizer program to surf the Web anonymously.
d. The rights of individuals to download contents of your Web site, modify it, and then
put it on the Web again as their own.
page-pf7
A data ____ is a collection of related records, as shown in the accompanying figure,
stored on storage media such as a hard disk, CD, or DVD.
a. validator
b. rubric
c. set
d. file
____ software lets users modify audio clips and produce studio-quality sound tracks.
a. Sound publishing
b. Audio editing
c. Tracking
d. Sound management
page-pf8
In a chart such as the one shown in the accompanying figure, a dotted line connects a(n)
____ symbol, which explains or clarifies the logic in a solution algorithm.
a. pseudo
b. annotation
c. case
d. if-then
During a cold boot on a personal computer, the POST (power-on self test) results are
compared with data in a ____ chip.
page-pf9
a. CMOS
b. UNIX
c. BIOS
d. SCSI
A disaster ____ plan is a written plan describing the steps a company would take to
restore computer operations in the event of a disaster.
a. restoration
b. recovery
c. prevention
d. baseline
A(n) ____ device is a hardware component that enables a computer to send (transmit)
and receive data, instructions, and information to and from one or more computers.
a. reading
b. transmitting
c. communications
page-pfa
d. reception
2G (second generation), which is a category of cellular transmissions, transmit digital
data at speeds including which of the following?
a. 9.6 Kbps
b. 19.2 Kbps
c. 144 Kbps
d. 2.4 Mbps
Computer engineering students usually are required to take ____ courses during the
programs.
a. mathematics
b. basic engineering
c. marketing
d. physics
page-pfb
____ create drawings and sketches by using a pressure-sensitive pen or a cursor on a
graphics tablet.
a. Architects
b. Designers
c. Mapmakers
d. Physicians
A category into which industry experts typically classify computers is ____.
a. microframes
b. enhanced computers
c. personal computers
d. supercomputers
page-pfc
A data ____ is a huge database that stores and manages the data required to analyze
historical and current transactions.
a. stockyard
b. warehouse
c. storehouse
d. storage unit
Career opportunities in the computer equipment field involve the ____ of computer
equipment.
a. marketing
b. manufacture
c. design
d. production
An application that supports a front-end program sometimes is called the ____.
a. back end
b. RDBMS
page-pfd
c. GUI
d. collaborative database
A chat ____ is a location on an Internet server that permits users to chat with each other.
a. base
b. room
c. home
d. space
When a processor requests ____ from the hard disk, the hard disk first checks the disk
cache.
a. output
b. data
c. instructions
d. information
page-pfe
A ____ is the unit of energy a surge protection device can absorb before it can be
damaged.
a. Joule
b. spike
c. hash
d. macro
A(n) ____ is a specific named location on a storage medium that contains related
documents.
a. firewall
b. password
c. folder
d. passkey
page-pff
The process of locating and correcting syntax and logic errors in a program is known as
____ the program.
a. debugging
b. rerunning
c. deduping
d. recoding
page-pf10
To find a Web page, the user of a resource like that in the accompanying figure, would
simply enter a word or phrase, called ____, in the search engine's text box.
a. keywords
b. icons
c. hits
d. any of the above
What is the system clock?
page-pf11
The person overseeing network operations, called the network
____________________, uses the network OS to add and remove users, computers,
and other devices to and from a network.
Personal DTP programs typically guide users through the development of a document
page-pf12
by asking a series of questions, offering numerous predefined layouts, and providing
standard text that can be added to documents.
Discuss a comparison of personal computer processors. Distinguish between Intel and
Intel-compatible processors.
One of the more widely used transmission media for network cabling and telephone
systems is twisted-pair cable.
page-pf13
A home powerline cable network is an easy-to-install and inexpensive network that uses
existing telephone lines in the home.
The computer industry has created thousands of high-tech jobs, even in companies
whose primary business is not computer-related.
With weights that exceed 100 tons, desktop computers can store more than 20,000 times
the data and information than an average supercomputer.
page-pf14
A corrupt individual stealing credit card numbers to make fraudulent purchases is an
example of information theft.
The purpose of ____________________ is to take the complexity out of C++ and still
provide an object-oriented programming language.
Methods that guarantee a computer or network is safe from computer viruses, worms,
and Trojan horses exist.
A newer type of TFT technology, called ____________________, uses organic
page-pf15
molecules that produce an even brighter, easier-to-read display than standard TFT
displays.
A(n) ____________________ is a nonprocedural language that enables users and
programmers to access data in a database.
CAM allows engineers to create a computer prototype for use in testing under a variety
of conditions, such as hurricanes and earthquakes.
page-pf16
____________________ information is error free.
Each location on a(n) ____________________ corresponds to a specific location on the
screen.
page-pf17
Typical jobs for workers in the ____________________ field include service
technician, computer repairperson, repair technician, and computer technician (like the
one in the accompanying figure).
KM technology senses a person's actions and, based on logical assumptions and prior
experience, takes the appropriate action to complete a task.
page-pf18
A device-dependent program runs on computers provided by a variety of
manufacturers.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.