CS 20861

subject Type Homework Help
subject Pages 17
subject Words 1872
subject Authors Gary B. Shelly, Kathleen McMahon, Misty E. Vermaat, Tristen Kendall

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Compressed files, sometimes called ____.
a. ripped files, usually have a .rip extension
b. tipped files, usually have a .tip extension
c. slipped files, usually have a .slip extension
d. zipped files, usually have a .zip extension
E-mail messages can include a(n) ____ as an attachment.
a. browser
b. audio clip
c. graphic
d. video clip
Some input devices include ____ output that provides the user with a physical response
from the device.
a. utility
b. interactive
page-pf2
c. tactile
d. physical
A(n) ____ card converts computer output into a video signal that travels through a cable
to the monitor, which displays an image on the screen.
a. output
b. video
c. express
d. PC
A(n) ____ device is any hardware component that allows you to enter data and
instructions into a computer.
a. output
b. communications
c. input
d. terminal
page-pf3
In sequence, the program development life cycle consists of six steps: ____.
a. validate design, test solution, design solution, implement design, analyze
requirements, and document solution
b. implement design, document solution, test solution, validate design, design solution,
and analyze requirements
c. analyze requirements, design solution, validate design, implement design, test
solution, and document solution
d. test solution, analyze requirements, document solution, implement design, validate
design, and design solution
Sponsors of IT certifications include ____.
a. independent training companies
b. computer equipment vendors
c. professional organizations
d. computer resellers
page-pf4
As shown in the accompanying figure, a technique used to implement a storage system
is an optical ____, which holds hundreds of CDs or DVDs that can contain programs
and data.
a. server
b. vault
c. trunk
d. archive
page-pf5
In addition to computer-related skills, CIS majors should have ____.
a. excellent people skills
b. the ability to work in teams
c. a keen understanding of business
d. good presentation skills
An advantage of portable hard disks and removable hard disks is that users can ____.
a. transport a large number of files
b. add storage space to a notebook computer or Tablet PC
c. easily store large audio and video files
d. all of the above
page-pf6
Companies today often have a(n) ____ who is responsible for the physical security of a
company's property and people and also is in charge of securing computing resources.
a. CIT
b. CSO
c. CTO
d. CRO
Case 1
You have taken a new job as a network administrator. Although you have been an IT
professional within your organization for a number of years, this particular
responsibility is a new one for you, so you have been studying network topologies, for
example.
If you are charged with setting up a network for your team and there is one device
whose reliability you are concerned about, which of the following network topologies is
a bad idea for you?
a. bus
b. ring
c. star
d. intranet
page-pf7
A(n) ____ is an information system that enables employees to perform tasks using
computers and other electronic devices, instead of manually.
a. OIS
b. TPS
c. CASE
d. enterprise-wide system
____ software assists in the preparation of legal documents and provides legal
information to individuals, families, and small businesses.
a. Legal
b. Tax
c. Document management
d. Financial
On a peer-to-peer network, each computer, called a peer, has equal responsibilities and
capabilities, sharing ____ with other computers on the network.
page-pf8
a. hardware
b. protocols
c. data
d. information
Case 1
In all of the advertisements for personal computers, vendors usually state the type of
hard disk interface supported by the hard disk controller, so it is important that you
understand the types of available hard disk interfaces, so you can make the most
informed choice possible.
You are in the market for a disk controller that will support a high number of peripheral
devices. What disk controller will do the trick?
a. EIDE
b. SCSI
c. SATA
d. USB
page-pf9
A(n) ____ form collects data from visitors to a Web site, who fill in blank fields and
then click a button that sends the information.
a. scripting
b. processing
c. directing
d. mapping
A ____ stores images, audio clips, and/or video clips.
a. multimedia database
b. groupware database
c. computer-aided design (CAD) database
d. hypertext database
A(n) ____ is a high-capacity optical disc on which users can read but not write or erase.
a. DVD-RW
b. DVD-ROM
page-pfa
c. DVD-R
d. Blu-ray
The speed of a dot-matrix printer is measured by the number of ____ it can print.
a. characters per second (cps)
b. characters per minute (cpm)
c. pages per second (pps)
d. pages per minute (ppm)
page-pfb
An alternative to e-mail filtering is to purchase a(n) ____ program that attempts to
remove a message like the one in the accompanying figure before it reaches a user's
inbox.
a. email
b. sieve
c. filtering
d. anti-spam
Voice ____ is the process of entering data by speaking into a microphone.
a. matter
b. input
c. output
page-pfc
d. outreach
A report ____ allows users to design a report on the screen, retrieve data into the report
design, and then display or print the report.
a. printer
b. matrix
c. generator
d. dictionary
The ____ is firmware that contains a computer's startup instructions.
a. POST
b. BIOS
c. CMOS
d. DIOS
page-pfd
____ are two of the more widely accessed Internet services.
a. The World Wide Web and e-mail
b. FTP and message boards
c. Mailing lists and chat rooms
d. Instant messaging and newsgroups
A(n) ____ is a program that extends the capability of a browser.
a. player
b. plug-in
c. rebrowser
d. publisher
page-pfe
Each networked computer in a house can ____.
a. share a single high-speed Internet connection
b. access files and programs on other computers in the house
c. share peripherals such as a printer, scanner, external hard disk, or DVD drive
d. all of the above
A high-availability system may include ____ components, such as extra power supplies,
that allow for a functioning component to take over automatically the tasks of a similar
component that fails.
a. redundant
b. scalable
c. grid
d. ultradense
____ is a cache separate from the processor chip on the motherboard.
a. L1 cache
b. L2 cache
page-pff
c. L3 cache
d. L4 cache
The risk to a bus network is that ____.
a. devices attached or detached at any point on the bus disrupt the rest of the network
b. the failure of one device usually affects the rest of the network
c. the bus itself might become inoperable
d. all of the above
____ holds data, instructions, and information for future use.
a. Storage
b. Output
c. Throughput
d. Input
page-pf10
A(n) ____ printer is a special type of label printer that has a built-in digital scale and
prints postage stamps.
a. stamp
b. postage
c. digital
d. USPS
____ is a category of cellular transmission that transmitted analog data.
a. 1G (first generation)
b. 2G (second generation)
c. 3G (third generation)
d. All of the above
page-pf11
A(n) ____ is anyone who communicates with a computer or utilizes the information it
generates.
a. user
b. editor
c. manager
d. programmer
Smart cards contain a processor and have ____ capability.
a. communications
b. output
c. input
d. storage
A disk's storage locations consist of pie-shaped sections, which break the tracks into
small arcs called ____________________.
page-pf12
In an application generator, a(n) ____________________ is a window on the screen
that provides areas for entering or changing data in a database.
As a user receives an e-mail message, an incoming mail server operated by the user's
Internet access provider sends the messages directly to the user's computer.
If a memory chip can store 100 KB, it can hold approximately 100,000 bytes.
page-pf13
Presentation software provides a variety of layouts for each individual slide.
As a user moves a mouse, the pointer on the screen also moves.
A(n) ____________________ is a small program that tells the operating system how to
communicate with a specific device.
A stand-alone fax machine, for example, has a(n) ____________________ that convers
a scanned digitized image into an analog signal that is sent to a recipient's fax machine.
page-pf14
Flexible ____________________ programs help professionals prepare for certification
at their own pace and supplement other training methods.
A file ____________________ is a utility that performs functions related to file
management.
Experts estimate that hard disks using ____________________ recording will provide
storage capacities about 10 times greater than disks that use longitudinal recording.
page-pf15
Two of the more common tools in the UML are the use case diagrams and data flow
diagram. _________________________
Most businesses use a standard, such as ____________________, that defines how data
transmits across telephone lines or other means.
Programmers often build trapdoors into programs during system development.
page-pf16
Some hot spots require users to subscribe to a WiMAX, to which they pay per access
fees, daily fees, or a monthly fee.
In developing a computer security plan, the CSO should recognize that some degree of
risk is unavoidable.
Many browsers offer 128-bit encryption and 256-bit encryption, which are higher levels
of protection than 40-bit encryption because they have longer encryption keys.
The data in a key field is common to all records.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.