This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
In a typical file ____ system, each department or area within an organization has its
own set of files.
a. synthesis
b. processing
c. analysis
d. integration
Flash memory chips store data and programs on many ____.
a. portable media players
b. smart phones
c. digital voice recorders
d. PDAs
Controlling is an activity performed by managers that involves ____.
a. instructing and authorizing others to perform the necessary work
b. identifying and combining resources so that a company can reach its goals and
objectives
c. establishing goals and objectives
d. measuring performance and, if necessary, taking corrective action
Synchronous DRAM (SDRAM) chips ____.
a. transfer data twice for each clock cycle, when compared to DRAM
b. are synchronized to the system clock
c. do not have to be re-energized as often as DRAM chips
d. use pipelining techniques
The program ____ life cycle is a series of steps programmers use to build computer
programs.
a. management
b. development
c. application
d. execution
A personal ____ is a utility program that detects and protects a personal computer and
its data from unauthorized access.
a. access server
b. portal
c. secure site
d. firewall
A developer of ____ databases uses normalization to organize the data.
a. hierarchical
b. relational
c. flat
d. multidimensional
A user of a relational database, such as that pictured in the accompanying figure, refers
to a field as a ____.
a. table
b. column
c. row
d. relationship
____ is the process of transferring documents, graphics, and other objects from a
computer to a server on the Internet.
a. Uploading
b. Streaming
c. Downloading
d. Flowing
To help organize a presentation, you can view ____ versions of all the slides similarly
to how 35mm slides look on a photographer's light table.
a. iconic
b. thumbnail
c. resampled
d. edited
A ____ computer targets a specific audience and offers high-quality audio, video, and
graphics with optimal performance for sophisticated single-user and networked or
Internet multiplayer games.
a. multiplayer
b. gaming desktop
c. handheld
d. All of the above
The latest version of the Macintosh operating system, Mac ____, is a multitasking
operating system available only for computers manufactured by Apple.
a. Safari
b. OS IX
c. OS X
d. OS XI
As shown in the accompanying figure, a ____ network is a network topology in which a
cable forms a closed loop, with all computers and devices arranged along it.
a. bus
b. star
c. ring
d. variable
A network like the one shown in the accompanying figure ____ to install.
a. must span a smaller distance than a bus network, and it is more difficult
b. must span a smaller distance than a bus network, but it is easier
c. can span a larger distance than a bus network, but it is more difficult
d. can span a larger distance than a bus network, and it is easier
____, from Adobe Systems, is a multimedia authoring program that provides tools
developers need to build interactive training and educational programs.
a. Producer
b. ToolBook
c. Director
d. Authorware
An alternative to maintaining an alternate computer facility is to enter into a(n) ____
backup relationship with another firm, where one firm provides space and sometimes
equipment to the other in case of a disaster.
a. full-restoration
b. preventative
c. reciprocal
d. incremental
A cable ____ allows access to high-speed Internet services through the cable television
network.
a. transceiver
b. modem
c. receiver
d. dialer
Computer ____ are the moral guidelines that govern the use of computers and
information systems.
a. logistics
b. mechanics
c. ethics
d. rights
As shown in the accompanying figure, a(n) ____ drive is a flash memory storage device
that plugs in a USB port on a computer or portable device.
a. ATM
b. smart
c. thumb
d. thin
Most e-commerce actually takes place between businesses, which is called ____.
a. consumer-to-business (C2B) e-commerce
b. business-to-consumer (B2C) e-commerce
c. consumer-to-consumer (C2C) e-commerce
d. business-to-business (B2B) e-commerce
A(n) ____ copies all of the files in a computer.
a. full backup
b. incremental backup
c. differential backup
d. selective backup
A(n) ____ printer forms characters and graphics on a piece of paper by striking a
mechanism against an inked ribbon that physically contacts the paper.
a. NLQ
b. impact
c. laser
d. thermal
At home, every family member, or home ____, spends time on the computer for
different reasons.
a. player
b. user
c. manager
d. surfer
A(n) ____ operating system enables two or more users to run programs simultaneously.
a. multiplied
b. multiuser
c. engaged
d. rasterized
Computer viruses, worms, Trojan horses, and rootkits are classified as ____, which are
programs that act without a user's knowledge and deliberately alter the computer's
operations.
a. malware c. threats
b. untrusted sources
c. cyberextortionist
d. cybermals
A(n) ____ identifies data outside of a normal condition.
a. external report
b. detailed report
c. exception report
d. summary report
____ means that the people who are conversing on a computer are online at the same
time.
a. Automatic
b. Real-world
c. Real time
d. Mainline
A(n) ____ copies the files that have changed since the last full backup or last
incremental backup.
a. full backup
b. differential backup
c. selective backup
d. incremental backup
____ software is a simplified accounting program that helps home users and small
office/home office users balance their checkbooks, pay bills, track personal income and
expenses, set up budgets, manage home inventory, track investments, and evaluate
financial plans.
a. Accounting
b. Tax management
c. Personal finance
d. Financial editing
A graphic processing unit's ____ depth is the number of bits it uses to store information
about each pixel.
a. format
b. color
c. resolution
d. data
Users who subscribe to disk-based storage like the kind advertised in the accompanying
figure can save on the Internet hard disk in the same manner they save on their local
hard disk.
An e-mail program allows transmission of messages and files via a(n)
____________________ such as the Internet.
Home design/landscaping software includes hundreds of predrawn plans that users can
customize to meet their needs.
Users with an artistic ability can create their own graphics using paint/image editing
software and then ____________________ (bring in) the graphics into a presentation
software slide.
Breakthroughs in surgery, medicine, and treatments seldom result from scientists' use of
computers.
Manufacturers and other retailers usually list a computer's memory in terms of its
access time.
____________________ is a network technology that defines how messages are routed
from one end of a network to the other, ensuring the data arrives correctly by dividing it
into packets.
Although ____________________ lines are not a type of standard telephone line, they
are very popular ways for the home user to connect to the Internet.
____________________ is a method of developing software in which the programmer
writes and implements a program in segments instead of waiting until the entire
program is completed.
Most editions of Windows Server 2008 include Hyper-V, which is a virtualization
technology.
Depending on the device, manufacturers claim memory cards can last from 10 to 100
years.
A(n) ____________________ tests the data in two or more associated fields to ensure
that the relationship is logical.
A syntax error is a flaw in the design of a program that causes inaccurate results.
The complete integration provided by ERP (examples in the accompanying figure)
means information is shared rapidly and management receives a more complete and
timely view of an organization through the information.
The most widely used biometric device today is a(n) ____________________ scanner.
Some photo printers can print panoramic photos.
A(n) ____________________ is the smallest unit of data a computer can process.
Even if users are working on multiple programs simultaneously, it is impossible to run
out of RAM.
One popular use of the ____________________ network standard is in hot spots that
offer mobile users the ability to connect to the Internet with their wireless computers
and devices.
____________________ is a service that carries voice, data, video, and multimedia at
extremely high speeds.
Trusted by Thousands of
Students
Here are what students say about us.
Resources
Company
Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.