COP 98189

subject Type Homework Help
subject Pages 12
subject Words 1409
subject Authors Catherine Laberta

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
An unacceptable or objectionable result is known as a (n)________________.
A) symptom
B) problem
C) challenge
D) error
The term middleware refers to:
A) programs written in fourth-generation languages.
B) rapid application development techniques.
C) software that makes the connection between varied applications working on multiple
platforms.
D) object-oriented databases that store both data and procedures to manipulate the data.
All of the following are true regarding a virtual keyboard EXCEPT it:
A) may use a stylus to enter data.
B) is used on touch-sensitive screens.
page-pf2
C) is not an input device.
D) is also known as a soft keyboard.
Which of the following is an example of a cloud based computing database?
A) Microsoft Access
B) Amazon Simple DB
C) Filemaker Pro
D) None of the above
Which of the following competencies are demonstrated by the Microsoft Certified
Systems Engineer (MCSE) certificate?
A) Windows Server 2003, operating system, and LAN-based client/server development
B) Windows Server 2003 implementation and LAN-based client/server administration
C) Java programming
D) Web site management
page-pf3
Which of the following languages allow enterprises to publish and share financial
information with each other?
A) VRML
B) XML
C) XBRL
D) DHTML
The__________is the central part of the OS that consists of actions the OS uses most
frequently, such as starting applications.
A) core module
B) kernel
C) BIOS
D) critical data set
page-pf4
Typing a document into the computer is an example of:
A) output.
B) input.
C) storage.
D) processing.
A project manager has all of the following responsibilities EXCEPT:
A) tracking the deliverables against the project plan.
B) providing information to all who have an active role in the system development.
C) completing the programming necessary for the project.
D) identifying and managing project risk.
Much of what passes for________language interface is simply word matching.
page-pf5
A) natural
B) high-level
C) object
D) procedural
Which of the following types of software converts scanned text into a text file?
A) OCR
B) PDF
C) PDQ
D) OMR
A range check is a:
page-pf6
A) data validation technique that verifies numerical data.
B) data validation technique that verifies data entries fall within a certain span of
possible entries.
C) data validation technique that verifies there are no duplications in data entries.
D) data validation technique that verifies data has been filled in correctly.
In the strictest sense of the term, the_____contains the CPU.
A) system unit
B) motherboard
C) computing platform
D) unit frame
The word modem is a combination of which of the following words:
A) magnetize and demagnetize.
B) modulate and demodulate.
C) modify and demodify.
page-pf7
D) None of the above.
A phased system conversion:
A) implements components of the new system one at a time.
B) runs both the old and new systems simultaneously.
C) experiments with the new system on only a small group within the organization.
D) begins the new system directly after stopping the old one.
Workgroup computing allows members of a team to do all the following, EXCEPT:
A) connect.
B) collaborate.
C) communicate.
D) configure.
page-pf8
Data dictionary
A) Holds a list of tables in the database
B) Newest type of database
A hardware or software system's ability to continue functioning effectively as demands
and use increase is known as:
A) interoperability.
B) scalability.
C) compatibility.
D) continuity.
Systems analysts do the following:
A) communicate with a variety of individuals during the development of an information
page-pf9
system.
B) collect information, identify, and evaluate existing systems and proposed solutions.
C) work with users and management as a guide during development of an information
system.
D) All of the above.
_______are gaining in popularity - Web sites that provide quick access to information
from many sources in one location.
A) Browsers
B) Search engines
C) URLs
D) Aggregators
When using the class programming construct, a(n) ____________inherits data and
functions from its parent class.
A) super class
B) object
C) subclass
page-pfa
D) nested
Enterprise system
A) Offers one standardized technology package
B) Integrates multiple enterprise systems
C) Comprised of hardware, software, data, people, and procedures
D) Allows a business to integrate information and applications on a company-wide
basis
E) Permits users to customize technology tools
Most viruses act as file infectors by attaching themselves to a:
A) data file.
B) directory.
C) program file.
D) hard drive sector.
page-pfb
An ADC is simply a___________that has the circuitry to convert an analog signal into
a digital signal.
A) circuit board
B) switch
C) microchip
D) peripheral device
The ability to convey a message without disclosing your name or identity is known as:
A) cyberblocking.
B) anonymity.
C) confidentiality.
D) privacy.
page-pfc
Drill-down is a technique that allows managers to do the following:
A) systematically check the database for errors.
B) create a data model and then run simulations.
C) extrapolate data and interpret results.
D) view data for the entire firm and then move through the database hierarchy to lower
levels.
.org
A) Internal Revenue Service
B) A public service group
ISDN is an abbreviation for which of the following terms?
A) Integrated services digital network
B) Internet service digital network
C) Improved speed digital network
D) Immediate synchronous digital network
page-pfd
Machine language is said to be machine dependent because it is dependent on the:
A) source code.
B) hard drive.
C) version of memory.
D) processor.
Instead of looking up information in a printed manual, you can use a
program's_______feature to read documentation right on the computer.
A) View
B) Question
C) Help
D) About
page-pfe
OS is an abbreviation for which of the following terms?
A) Overlay System
B) Operations Schedule
C) Outsourced System
D) Operating System
The director of _________and development is a senior-level manager who is in charge
of all product development activities.
_________Modeling Language (UML) is an open method used to illustrate and
document the components of an object-oriented software system under development.
page-pff
The project______________explains all the terminology relevant to the project.
The Boolean search operator _________is similar in meaning to the exclusion operator.
Icons are used in a(n)________user interface.
page-pf10
Input, processing, output, and storage are collectively called
the________-processing cycle.
The skills and knowledge assessment process prepared by computer vendors
and professional associations is called ________.
Time bomb
A) Triggered on a certain date or event
B) Installed on the hard drive and infects your computer when you start it
C) Propagates through networks
SMIL is an acronym for Synchronized Multimedia_______Language.
page-pf11
MMDS will likely be replaced by_______.
A university that needs to install software on hundreds of computers may find it
more economical to purchase a(n)______ license.
An actual interruption of an event by an interrupt signal is called an interrupt________,
or IRQ.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.