COP 37395

subject Type Homework Help
subject Pages 18
subject Words 1948
subject Authors Gary B. Shelly, Kathleen McMahon, Misty E. Vermaat, Tristen Kendall

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
HTML uses ____, which are codes that specify links to other documents and indicate
how a Web page is displayed when viewed on the Web.
a. links
b. icons
c. keys
d. tags
____ consists of electronic components that store instructions waiting to be executed
and data needed by those instructions.
a. The processor
b. The CPU
c. The control unit
d. Memory
____ programs usually have fewer capabilities than retail programs.
a. Shareware
b. Public-domain
page-pf2
c. Freeware
d. Custom
In a newsgroup, a ____ consists of the original article and all subsequent related replies.
a. magnet
b. link
c. flame
d. thread
page-pf3
A printer, such as that shown in the accompanying figure, creates images using a laser
beam and powdered ink, called ____.
a. woofer
b. spoiler
c. toner
d. cracker
____, such as those shown on the keyboard in the accompanying figure, are special
keys programmed to issue commands to a computer.
a. Function keys
b. Toggle keys
c. Arrow keys
page-pf4
d. Numeric keys
Which of the following is an example of Web page authoring software?
a. Adobe InDesign
b. Adobe Dreamweaver
c. Adobe Illustrator
d. Agilix GoCourse
Identify the letter of the choice that best matches the phrase or definition.
a. virtualization
b. lossless
c. lossy
d. sleep mode
e. hibernate
f. administrator account
g. user name
h. password
i. gadget
j. permissions
k. thrashing
l. taskbar
m. BIOS
n. command language
o. application software
p. anti-spam
q. pop-up
r. antivirus
s. fragmented
t. account
1) When purchasing this, users must ensure that it works with the operating system
installed on their computer.
2) Enables you to access all files and programs on the computer or network, install
programs, and specify settings that affect all users on a computer or network.
3) If the POST completes successfully, this searches for specific operating system files
called system files.
4) When working with a command-line interface, the set of commands entered into the
computer is called this.
5) A unique combination of characters that identifies a specific user.
6) A private combination of characters associated with the user name that allows access
to certain computer resources.
7) To make a program active in Windows Vista, click its program button here.
8) Define who can access certain resources and when they can access those resources.
9) If application software has stopped responding and the hard disk's LED blinks
repeatedly, the operating system probably is doing this.
page-pf6
10) A mini-program with minimal functionality that connects to another program or
provides information.
11) The practice of sharing or pooling computing resources, such as servers.
12) For each user, a network administrator establishes this, which enables the user to
access, or log on to, a computer or to a network.
13) When the contents of a file are scattered across two or more noncontiguous sectors.
14) Compression type in which a compressed file can be returned to its exact original
state.
15) To protect a computer from virus attacks, install this kind of program and update it
frequently.
16) Type of compression in which the quality of a file decreases slightly each time the
file is compressed, which makes it impossible to restore the file to its exact original
state.
17) Saves any open documents and programs to RAM, turns off all unneeded functions,
and then places the computer in a low-power state.
18) An Internet advertisement that appears in a new window in the foreground of a Web
page displayed in a user's browser.
19) A filtering program that attempts to remove spam before it reaches a user's inbox.
20) Saves any open documents and programs to a hard disk before removing power
from the computer.
page-pf7
A(n) ____ reader is a device that uses a light source to read characters, marks, and
codes and then converts them into digital data that a computer can process.
a. character
b. literature
c. legibility
page-pf8
d. optical
Case 2
Ports and connectors have always been a little bit of a mystery to you, so you have
decided to learn more about them.
You are looking for a port that will allow a system unit to have the capability of
recording sounds that have been created by a synthesizer and then processing the
sounds to create new sounds. Which of the following ports satisfy this requirement?
a. IrDA
b. Bluetooth
c. eSATA
d. MIDI
A(n) ____ changer is a device that enables users to join two connectors that are both
female or both male.
a. gender
b. MTF
page-pf9
c. interpolation
d. FTM
The ____ defines a popular video compression standard.
a. Moving Pictures Experts Group (MPEG)
b. Advanced Research Projects Agency (ARPA)
c. National Science Foundation (NSF)
d. Digital Subscriber Line (DSL)
A computer contains many electric, electronic, and mechanical components known as
____.
a. software
b. input devices
c. output
d. hardware
page-pfa
____, from Adobe Systems, is a popular multimedia authoring program with powerful
features that allow developers to create highly interactive multimedia applications.
a. Producer
b. ToolBook
c. Director
d. Authorware
page-pfb
____, as shown in the accompanying figure, is a query language that allows users to
manage, update, and retrieve data.
a. XML
b. DBMS
c. SQL
d. QBE
Computer equipment manufacturers include all of the following companies EXCEPT
____.
a. Apple Computer and HP
b. Network Associates and Red Hat
c. IBM and Lucent Technologies
d. Intel and Dell
page-pfc
____ is a technology that provides high-speed Internet connection using regular copper
telephone lines.
a. DSL
b. ISP
c. CMOS
d. OSP
At a photo sharing ____, users can create an online photo album and store their digital
photographs.
a. exchange
b. market
c. community
d. application
page-pfd
____ is a network standard that specifies no central computer or device on the network
should control when data can be transmitted.
a. Ethernet
b. Telnet
c. IEEE
d. Gopher
Businesses often use scanners for image processing, which consists of ____ images.
a. manipulating
b. printing
c. analyzing
d. storing
Depending on the type of SCSI, which stands for small computer system interface,
page-pfe
users can daisy chain a maximum of ____ devices together.
a. 7
b. 8
c. 12
d. 15
With virtual memory, which is illustrated in the accompanying figure, a ____ is the
amount of data and program instructions that can swap at a given time.
a. log
b. page
c. spool
page-pff
d. boot
____ is a job title in the operations area of an IT department.
a. Project leader/manager
b. Database analyst
c. Project manager
d. Data communications analyst/VoIP specialist
During ____, a systems analyst carefully designs every menu, screen, and report
specified in the requirements.
a. storage design
b. database design
c. program design
d. input and output design
page-pf10
External sources of data for a DSS might include ____.
a. interest rates
b. population trends
c. sales orders
d. raw material pricing
A ____ is a message that reveals a solution to a game or ending to a movie or program.
a. spoiler
b. disruptor
c. flame
d. chat
page-pf11
Case 1
You are in the market for a new operating system, but you have very particular criteria
as you make your selection.
You are looking for an operating system that is both flexible and powerful, but that
offers a graphical user interface as well. You do not want the OS to be proprietary.
Which of the following is your best bet?
a. Windows Me
b. Linux
c. Mac OS X
d. Windows Vista
A(n) ____ utility assists programmers with identifying syntax errors and finding logic
errors in a program.
a. logic
b. debug
c. syntax
d. analysis
page-pf12
A .NET-compatible language compiles the program source code into ____.
a. Java
b. JavaScript
c. Perl
d. MSIL
____ systems manage information about customers, interactions with customers, past
purchases, and interests.
a. CMS
b. CRM
c. VPN
d. RAID
____________________ software provides standard contracts and documents
associated with buying, selling, and renting property; estate planning; marriage and
divorce; and preparing a will or living trust.
page-pf13
Analog signatures help to prevent e-mail forgery.
In a forward recovery, the DBMS uses the log to undo any changes made to a database
during a certain period, such as an hour.
page-pf14
A portal like the one in the accompanying figure seldom includes search capabilities or
a link to a search engine.
The two most popular GUIs available for ____________________ are GNOME and
KDE.
Computers process information (output) into data (input).
page-pf15
Because they are easy to understand, analysts find that class diagrams like the one in
the accompanying figure are an ideal tool for communicating system requirements with
users. _________________________
page-pf16
A(n) ____________________ display uses a separate transistor for each liquid crystal
cell and thus displays high-quality color that is viewable from all angles.
Structured design provides a way to package the data and the program (or procedure)
together.
A newer use of OLED technology is in the head-mounted display (HMD), which is a
display in a helmet, goggles, or glasses
The ____________________ manages the security of the database, check backup and
recovery procedures, and monitors the performance of the database.
page-pf17
When a computer is purchased, it seldom has any software preinstalled on its hard disk.
A(n) ____________________ is usually open to modification by the general public.
When computer users ____________________ a document, they enter text or numbers,
insert graphical images, and perform other tasks using an input device.
page-pf18
Discuss what note taking software is and how it is used.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.