COSC 71424

subject Type Homework Help
subject Pages 13
subject Words 1658
subject Authors Dan Oja, June Jamrich Parsons

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
What does a Compact Privacy Policy do?
a. Blocks a company from installing cookies on your computer.
b. Describes how cookie data is used by a Web site.
c. Encrypts credit card information in a secure connection.
d. Acts as a contract between a consumer and a business for e-commerce purchases.
____ analytics focus on anticipating future probabilities and trends.
a. Data cubing c. Classification
b. Predictive d. OLAP
Which of the following is NOT true about USB ports?
a. Most computers only have one.
b. Mice, scanners, and joysticks can be used in USB ports.
c. USB ports can support storage devices.
d. Windows recognizes most USB devices when they are plugged into the port.
page-pf2
Which of the following is NOT considered one of the biggest computer
hardware-producing countries by dollar value?
a. U.S. c. India
b. Japan d. Singapore
The arrangement of fields, tables and relationships is called the database ____.
a. layout c. format
b. structure d. hierarchy
An input device called a(n) ____ has a flat surface used to turn a paper-based line
drawing into a vector graphic.
a. scanner c. digitizing tablet
page-pf3
b. rasterizer d. ray tracer
Describe some of the methods for retrieving images from a digital camera.
page-pf4
In the figure above, a(n) ____ backup is performed and restored.
a. full c. differential
b. incremental d. registry
____ memory makes the biggest difference in a computer system's operations.
a. CMOS c. RAM
b. ROM d. virtual memory
page-pf5
Which of the following is NOT an example of a program used to create server-side
programs?
a. ASP c. ERD
b. CGI d. PHP
A(n) ____________________-generation computer used vacuum tubes to store
individual bits of data.
Where is data saved permanently?
a. Memory
b. Storage
c. CPU
d. Printer
page-pf6
A(n) ____ is data generated by a Web server and stored in a text file on your computer.
a. HTML form c. cookie
b. click-through d. ID card
Utilities purchased from a vendor to enhance operating system features are called ____
utilities.
a. desktop c. third-party
b. FTP d. system
A virus ____ is a file that your antivirus software uses to identify and eradicate viruses.
a. signature c. checksum
b. definition d. patch
page-pf7
In the above figure the item labeled 3 is called the ____.
a. read-write head
b. magnetizer
c. laser
d. solid state storage
____ testing is the process of trying out various sequences of input values and checking
that the results are correct.
a. Unit c. Application
b. Integration d. System
page-pf8
The program flow shown in the figure above is determined by the ____ command.
a. GOTO c. BASIC
b. FOR...NEXT d. IF....THEN...ELSE
page-pf9
In the above figure, which number indicates the folder name?
a. 1 c. 3
b. 2 d. 4
Using ____ technology, a processor can begin to execute a second set of steps before it
completes the first instruction.
a. pipelining c. CISC
b. serial processing d. cache
A ____ is a touch-sensitive surface on which you can slide your fingers in order to
move the on-screen pointer.
a. joystick
b. trackpad
c. trackball
d. TrackPoint
page-pfa
Which of the following is NOT true about cache?
a. L1 and L2 cache are located on the processor chip.
b. Cache capacity is typically measured in kilobytes.
c. A processor can access data from its cache faster than from elsewhere on the system
board.
d. The amount and location of cache memory both affect performance.
The Windows ____ is a file that stores configuration information about the devices and
software installed on a computer system.
a. root directory c. Registry
b. backup d. Explorer
page-pfb
____ testing is used to verify that a system works as required.
a. Application c. Acceptance
b. Unit d. System
Most Prolog compilers provide a(n) ____ feature that allows you to track through each
instantiation.
a. trace c. walkthrough
b. debugger d. backtrack
____ is a type of code used to represent character data.
a. ASCII c. EBCDIC
b. Unicode d. All of the above are examples
page-pfc
In a network database, a(n) ____ is the rough equivalent to a child record type.
a. root c. owner
b. node d. member
Which of the following would most people consider to be the best example of a
peripheral device?
a. keyboard
b. scanner
c. printer
d. mouse
A(n) ____card carries data to speakers or headphones.
a. sound
b. audio
c. ISA
page-pfd
d. volume
An HTTP command that helps browsers communicate with Web servers is called a(n)
____.
a. image map c. socket
b. method d. status code
In a Prolog program, words in parentheses are called ____________________.
Windows Explorer is a Windows OS utility that helps you search the Internet.
page-pfe
Wireless networks are great for computers such as notebooks and tablets that do not
need to be constantly plugged into an outlet.
Describe three of the disadvantages to wireless networks.
Early IT industry pioneers located their businesses in ____________________ Valley.
page-pff
A pointing stick is usually used with a notebook instead of a PC.
Organizations that focus on political, social, or charitable goals are called
____________________ organizations.
When you receive a storage medium, typically you must format it before using.
page-pf10
Most application software allows you to perform some file management tasks, such as
designating a storage location for a saved file.
List four measures you can take to protect your computer from threats.
SSL protocol encrypts the text of an HTTP message before it is sent.
page-pf11
Bookmarks are the list of sites you have visited in previous Web sessions.
To set your resume apart when searching for a job online, use a distinctive e-mail
address, such as Ilovedogs@yahoo.net, instead of your name.
Video editing systems, calculators, and flight simulators are all examples of computers.
page-pf12
Having a mouse is one difference between PCs and laptop computers.
A video capture device can convert analog video into digital format.
Describe ways to find information on computer-related degree programs or
certifications.
A(n) ____________________ virus infects a miniature program used to automate
document and worksheet production.
page-pf13
____________________ storage stores data as microscopic light and dark spots on the
disc surface.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.