COSC 44493

subject Type Homework Help
subject Pages 18
subject Words 2334
subject Authors Gary B. Shelly, Kathleen McMahon, Misty E. Vermaat, Tristen Kendall

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
____ is a networking certification sponsored by Sun that tests knowledge of
administering Sun networks.
a. SCNP
b. SCNA
c. CISSP
d. CCE
A(n) ____ mouse is a battery-powered mouse that transmits data using wireless
technology, such as radio waves or infrared light waves.
a. light
b. optical
c. wireless
d. radio
During a(n) ____ telephone call, both parties see each other as they communicate over
the Internet.
a. Web
page-pf2
b. video
c. online
d. bilateral
The faster the clock speed, the more ____ the processor can execute per second.
a. registers
b. functions
c. arguments
d. instructions
Many programmers use an IPO chart during the ____ step of program development.
a. Design Solution
b. Analyze Requirements
c. Validate Design
d. Implement Design
page-pf3
When a process consists of many ____, a systems analyst always will use a decision
table or tree instead of structured English.
a. conditions
b. indices
c. rules
d. protocols
A ____ is a less formal method that uses a standard form to request information about a
product or service.
a. request for quotation (RFQ)
b. request for system services (RFSS)
c. request for proposal (RFP)
d. request for information (RFI)
page-pf4
In a(n) ____ recovery, the DBMS uses the log to undo any changes made to a database
during a certain period.
a. backward
b. restorative
c. undo
d. model
Many companies use OCR characters on a(n) ____ document, which is a document that
is returned to the company that creates and sends it.
a. flip
b. inverse
c. report
d. turnaround
A(n) ____ operating system is a complete operating system that works on a desktop
computer, notebook computer, or mobile computing device.
page-pf5
a. multitasking
b. media-based
c. single-user
d. stand-alone
Video ____ is the process of capturing full-motion images into a computer and storing
them on a storage medium such as a hard disk or DVD.
a. input
b. indexing
c. recognition
d. concatenation
page-pf6
On a network, the major differences between the server (like the one in the
accompanying figure) and client computers is that the server ordinarily has ____.
a. less power, less storage space, and decreased communication capabilities
b. less power, less storage space, but expanded communication capabilities
c. more power, more storage space, but decreased communication capabilities
d. more power, more storage space, and expanded communication capabilities
Case 2
page-pf7
You have reached a plateau in your career and you have decided that it is time to pursue
a certification so that you can move to a new level in your professional life.
Which of the following is not a factor to consider in selecting a certification?
a. Talk to people in the industry.
b. Read evaluations of certifications.
c. Look at job listings to see what certifications are sought.
d. Study salary projections juxtaposed with certifications to determine expected future
income.
Issues that must be addressed during input and output design include ____.
a. types of media to use
b. data entry validation techniques
c. formats
d. protocols
Some computer and chip manufacturers use the term ____ to refer to a personal
computer processor chip.
page-pf8
a. microprocessor
b. parallel processor
c. coprocessor
d. perpendicular processor
____ is an electrical disturbance that can degrade communications.
a. Latency
b. Noise
c. Coax
d. Hub
In the ____ phase, system developers perform four major activities: (1) develop
programs, (2) install and test the new system, (3) train users, and (4) convert to the new
system.
a. implementation
b. planning
c. operational
page-pf9
d. analysis
A project ____ contains all documentation for a single project.
a. CD
b. notebook
c. DVD
d. either A or C
The camera in an iris recognition system scans patterns of blood vessels in the back of
the retina.
page-pfa
____ is an Internet standard that permits file uploading and downloading with other
computers on the Internet.
a. Telnet
b. FTP
c. IM
d. Webcasting
Sources for names of software vendors include ____.
a. commercial indices c. computer magazines
b. trade shows d. trade publications
A typical enterprise consists of hundreds of operating entities, called ____ including
departments, centers, and divisions.
a. aggregates
b. functional units
c. clusters
d. operatories
page-pfb
A(n) ____ is a wireless network that provides Internet connections to mobile computers
and other devices.
a. wi-spot
b. hot link
c. quick spot
d. hot spot
Computer ____ occurs when a computer consumes someone's entire social life.
a. craving
b. consumption
c. addiction
d. railroading
page-pfc
____ is the number of bytes (characters) a storage medium can hold.
a. Resolution
b. Dimensionality
c. Capacity
d. Retention
Case 2
You"ve begun work as a consultant to individuals and businesses, making
recommendations to them about the kinds of systems they should buy and what
equipment they should have.
Aaron is a user who travels extensively. Which of the following is he NOT likely to
need?
a. cloud storage
b. portable hard disk for backup
c. 2.5 TB hard disk
d. USB flash drive
page-pfd
Examples of mobile technology include all of the following EXCEPT ____.
a. digital cameras
b. portable media players
c. smart phones
d. servers
A certificate ____ is an authorized person or company that issues and verifies digital
certificates.
a. authority
b. agency
c. office
d. bureau
In a relational database, each row ____.
a. and each column has a primary key
page-pfe
b. has a unique name and each column has a primary key
c. has a primary key and each column has a unique name
d. and each column has a unique name
The advantage of a prototype is that ____.
a. users always view the prototype as an initial system, which is the result of an
extensive analysis
b. users can work with the system before it is completed to make sure it meets their
needs
c. it always has adequate documentation
d. all of the above
____ allows users to pay bills from their computer, that is, transfer money electronically
from their account to a payee's account such as the electric company or telephone
company.
a. Online trading
b. EFT
c. Online banking
page-pff
d. E-tail
Given a scanned object, a user can ____.
a. post it to a Web site
b. include it in another document
c. attach it to an e-mail message
d. store it on a storage medium
page-pf10
As shown in the accompanying figure, a(n) ____ program protects a computer against
viruses by identifying and removing any computer viruses found in memory, on storage
media, or on incoming files.
a. hoax
b. secure
c. antivirus
d. antispyware
Two popular ____ are Microsoft Office 2007 and Apple iWork.
a. personal information managers
page-pf11
b. software suites
c. clip art/image galleries
d. application service providers
____ is any unwanted signal, usually varying quickly, that is mixed with the normal
voltage entering a computer.
a. Undervoltage
b. Noise
c. Overvoltage
d. A spike
Of Windows Vista, Netware, Mac OS X, and UNIX, all are examples of stand-alone
operating systems except ____________________.
page-pf12
Discuss the seven different categories into which perpetrators of cybercrime and other
intrusions fall.
page-pf13
The secure connection that a virtual private network (VPN) creates between a user's
computer and a company's network is called a(n) ____________________ tunnel.
LCD monitors use a digital signal to produce a picture.
Discuss the two ways of recording video
page-pf14
Each computer or device on a local area network, called a ____________________,
often shares resources such as printers, large hard disks, and programs.
A top level DFD (data flow diagram) identifies only the ____________________
process.
A(n) ____________________ is a document that contains the formatting necessary for
page-pf15
a specific document type.
In the fast-paced world of technology, job titles are standardized.
With ____________________ service, an optical terminal at your house receives the
signals and transfers them to a router connected to your computer.
page-pf16
____________________ software is free software, but it has been donated for public
use and has no copyright restrictions.
Word processing software usually includes public-domain clip art.
The search feature, in combination with the replace feature, allows users of word
processing software to substitute existing characters or words with new ones.
page-pf17
____________________ is a programming certification sponsored by Microsoft that
tests knowledge of developing Web or Windows-based applications using programs in
the Visual Studio suite and the .NET framework.
Small business computer users might print several hundred pages a day.
The activities related to running a business are called ancillary activities.
page-pf18
Examples of HTML ____________________ are <b> to bold text, <p> to indicate a
new paragraph, and <hr> to display a horizontal rule across the page.
Whereas a relational database can store more than two dimensions, a multidimensional
database is a two-dimensional table.
To access data in a ____________________ database, users fill in a form on a Web
page.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.