COP 68570

subject Type Homework Help
subject Pages 14
subject Words 1749
subject Authors Catherine Laberta

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
The four-step process of fetch, decode, execute, and store is called a(n):
A) machine cycle.
B) logical operation.
C) arithmetic operation.
D) instruction cycle.
System utilities are used for all of the following purposes EXCEPT to:
A) organize and find files on your computer.
B) serve as an Internet interface with your Internet browser.
C) create backups of system and application files.
D) protect your computer from viruses.
The drive to create a new system is caused by all of the following EXCEPT:
A) poor performance of existing system.
B) available budgetary funding.
C) lack of quality information.
page-pf2
D) security issues.
_______uses the spin of electrons to store information, resulting in the ability of
memory operation at much higher speeds.
A) Racetrack memory
B) Flash memory
C) Cellular memory
D) Primary memory
The cell phone application that uses GPS-enabled chips is called:
A) WhereRU.
B) location awareness.
C) OnStar.
D) positional reference systems.
page-pf3
Programmer Analyst
A) Interacts with users and application developers to design information systems
B) Designs, codes, and tests software according to specifications
Social networking is a way to:
A) expand your list of electronic contacts.
B) subscribe to "birds of a feather" newsletters.
C) build expanding online communities.
D) All of the above.
The most important type of memory that a typical computer uses during the processing
operation is __________ memory.
page-pf4
A) flash
B) random access
C) read-only
D) storage
A server is a computer that:
A) is ultrafast and designed to handle large processing jobs.
B) is designed for individual use.
C) plays a less important role in today's businesses.
D) makes programs and data available to people who are connected to a computer
network.
Traditional computer science departments at the university level focus on:
A) pure and applied mathematics.
B) analytical and technical skills to develop solutions to problems.
page-pf5
C) computer hardware technology.
D) business, economic, and educational applications of computers.
Oracle and DB2 are both categorized as the following:
A) database server software.
B) data integrity services.
C) data backup systems.
D) Web-only programs.
While the BIOS information is visible, you can press a special key, such as F8, to
access the:
A) operating system source code.
B) kernel.
C) computer's setup program.
D) list of software application programs.
page-pf6
A foreign key is a___________________________________.
A) field that is a primary key in another file
B) field that exists only in an orders table
C) field that is a primary key in the same file
D) field that is a redundant key in the same file
Approximately how many U.S. homes have access to high-speed cable Internet service?
A) 350 million
B) 120 million
C) 50 million
D) None of the above
page-pf7
Which of the following features enable the strongest WiFi encryption protection?
A) WAP
B) WEP
C) WPA
D) WDDI
An entity-relationship diagram (ERD) is used to:
A) describe the different components of the information system and their interactions.
B) trace the flow of data through the existing information system.
C) display the current status of each phase of the SDLC.
D) show a model of the eventual system without it being fully functional.
page-pf8
Which of the following departments is usually located in business schools?
A) MIS
B) EDP
C) CIM
D) ISM
A business analyst or process architect should possess the following qualities:
A) at a minimum an MBA.
B) knowledge of other companies' innerworkings.
C) some working knowledge of a general area of the business.
D) a strong IT background and good business knowledge of specific area of the
business.
If your computer doesn't have enough USB ports, it is possible to obtain a
USB_______.
A) PBX
page-pf9
B) hub
C) multiplexer
D) router
Operationally feasible means that the project:
A) can be completed within an organization's available resources.
B) can be operational with new resources.
C) can be operational with significant changes to the plan.
D) can be completed with planned new resources.
The pointing device that looks similar to a semi-blunt pen and is frequently used in
CAD applications is referred to as a:
A) joystick.
B) light pen.
C) stylus.
D) data pen.
page-pfa
Which of the following does gMUD stand for?
A) Graphical multiuser dimensions
C) Both A and B
B) Graphical multiuser dungeons
D) None of the above
Which of the following is NOT true about the reasons people like being beta testers?
A) They enjoy being on the cutting edge.
B) They get paid for their time.
C) They want their voices to be heard.
D) They may get the software free or at a discount.
page-pfb
A database consists of one or more of the following:
A) reports.
B) related data files.
C) product lists.
D) price lists.
DSS
A) Computer-based system that generates predefined reports for management
B) System used by top management to make strategic decisions
C) System used to create simulations and ask what-if questions
An information system includes which of the following?
A) People, hardware, software, data records, and activities that process an
page-pfc
organization's data and information
B) Hardware, software, data, and information
C) Computers, networks, printers, mobile devices, and the Internet
D) Networks, mobile devices, computers, and printers
A request for proposal (RFP) document:
A) considers the costs and benefits of different system proposals.
B) analyzes the information needs of end users.
C) requests that the company stockholders approve the proposed system.
D) asks a potential supplier to document the design, installation, and configuration of its
proposed system.
Technology has contributed to globalization, which has led to:
A) lower productivity.
B) higher wages.
C) outsourcing.
page-pfd
D) increased domestic employment.
Which of the following markup languages is used for sharing data and complex forms
in a Web-based environment?
A) Visual Studio.NET
B) XML
C) HTML
D) Active
Collision
page-pfe
The average life of a cell phone is_______months.
A) 12
B) 24
C) 30
D) 18
System utilities:
A) perform functions such as protecting your computer from viruses.
B) are loaded before the operating system is loaded.
C) have to be accessed through applications.
D) include features such as a word-processing program.
Data security:
A) ensures that the data is not accessible to an unauthorized user.
B) ensures updates and backup copies are made on a regular basis.
page-pff
C) ensures the completeness of data entered in a database.
D) ensures that the data is usable in a database.
A person who knows technical skills such as HTML/XHTML, AJAX, and server
configurations as well as marketing, advertising, and graphic design is a good candidate
for which of the following positions?
A) Digital media specialist
B) HTML coder
C) Web administrator
D) Java programmer
Which of the following is NOT one of the steps in the machine cycle?
A) Store
B) Execute
C) Pipeline
D) Decode
page-pf10
A(n)_________backup only copies those files that have been created or changed since
the last backup.
The American_____Code for Information Interchange (ASCII) character code is
most widely used on minicomputers, personal computers, and computers that make
information available on the Internet.
Bar code reader
page-pf11
If you do not perform regular________, you could permanently lose critical data
and information.
Backup
A) A portable storage device that uses solid-state circuitry
B) The hardware components on which data is held
C) Uses the spin of electrons to store information
D) A copy of program, data, and information created in one secondary storage
medium that is duplicated to another
__________computing occurs when a group of workers is connected so they can
collaborate effectively on a project.
page-pf12
________is older technology, device, or application that is being phased out in favor
of advance in new technology.
Third
A) Includes assembly language
B) Includes report generators and query languages
C) A high-level language that includes familiar English words
Computer________is another term for primary storage.
page-pf13
ASCII
A) Uses base 16 characters to represent binary numbers
B) Most widely used character code
C) A character coding method created by IBM and used on its mainframes
D) One quintillion bytes
E) The number system used by computers
A(n)__________is a simple broadcast device that does not manage traffic and usually
results in frequent collisions.
A private branch____________(PBX) is an internal digital telephone system often
installed within a large company or organization.
page-pf14
NOS is an acronym for_______ operating system.
A(n)__________sniffer is a program that examines traffic on a network, searching for
names, passwords, or credit card information.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.