CS 79264

subject Type Homework Help
subject Pages 16
subject Words 1967
subject Authors Gary B. Shelly, Kathleen McMahon, Misty E. Vermaat, Tristen Kendall

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
The ____ is the component of the processor that performs arithmetic, comparison, and
other operations.
a. machine unit
b. control unit
c. ALU
d. CPU
____ is a security certification sponsored by The Security Certified Program that tests
network security skills related to wireless security, e-mail security, digital certificates,
digital signatures, and biometrics.
a. SCNA
b. CIW
c. CWP
d. CCIE
Case 2
page-pf2
In your work in the IT department, you are charged with asking the difficult questions
about the feasibility of new systems as they are being developed.
Knowing that you are an expert on feasibility assessment, a colleague has come to you
for advice on an issue of schedule feasibility. His project deadline has been adjusted
twice before and cannot be extended again. What is an option for him?
a. Creating a new schedule
b. Reducing the project scope
c. Increasing the project creep
d. Performing a payback analysis
With ____, users access account balances, pay bills, and copy monthly transactions
from a bank's computer right into their personal computers.
a. online investing
b. online banking
c. neural networks
d. All of the above
Unless otherwise specified by a license agreement, users do not have the right to ____
page-pf3
software.
a. copy
b. export
c. lease
d. rent
____ occurs when retailers use the Web to sell their products or services.
a. Web merchandising
b. E-tail
c. Online banking
d. Online merchandising
A manager would have ____ privileges to member data in a discount warehouse
database.
a. read-only
b. write-only
page-pf4
c. full-update
d. no access
The trend of computers and devices with technologies that overlap is known as ____.
a. indexing
b. coalescence
c. concatenation
d. convergence
Case 1
One form of software theft is the theft of the software from software manufacturers,
which is known as piracy. Because this has historically been rather easy to do, the
practice has become very common. As a computer instructor you feel it is your
responsibility to explain this practice to students through the use of some examples.
All of the following are permissible under a EULA except which of the following?
a. Jamie installs Quark Xpress on a single computer.
page-pf5
b. Christine leases her copy of Dreamweaver 8.
c. Phuong-Dao makes one copy of Microsoft Office 2007 as a backup.
d. Isaiah sells his copy of Adobe Photoshop CS2, having removed it from his computer
first.
Comparable to a tape recorder, a tape ____ reads and writes data and information on a
tape.
a. reader
b. drive
c. port
d. adapter
page-pf6
A user of a relational database, such as that pictured in the accompanying figure, refers
to a file as a ____.
a. table
b. column
c. row
d. relationship
page-pf7
____ consist(s) of a series of instructions that tells the computer what to do and how to
do it.
a. GUIs
b. Storage utilities
c. Sharing communities
d. Software
A(n) ____ is an electronic device, operating under the control of instructions stored in
its own memory, that can accept data, process the data according to specified rules,
produce results, and store the results for future use.
a. input device
b. computer
c. output device
d. both a and c
Memory (chips) accesses items in ____.
page-pf8
a. nanoseconds
b. microseconds
c. milliseconds
d. seconds
A(n) ____ is a unique combination of characters, such as letters of the alphabet and/or
numbers, that identifies a specific user.
a. password
b. e-mail reference
c. user name
d. user clause
When a company uses the ____ approach, many programs and users share the data in a
database.
a. front-end
b. concatenated
c. database
page-pf9
d. memory-based
Monitors like the one in the accompanying figure come in a variety of sizes, the more
common being all of the following EXCEPT ____ inches.
a. 15
b. 17
c. 20
d. 22
Companies can develop software in-house using their own IT personnel or ____ it,
which means having an outside source develop it for them.
a. fast-track
b. share the development of
c. externalize
d. outsource
page-pfa
On a network such as the one illustrated in the accompanying figure, if one node fails
____.
a. only that node is affected
b. only the nodes before that node are affected
c. only the nodes after that node are affected
d. all the nodes are affected
page-pfb
To read encrypted data, the recipient must ____, or decipher, it into a readable form.
a. secure
b. decrypt
c. secure
d. digitize
Keyboards, such as that shown in the accompanying figure, contain keys that allow
users to position the insertion point, also known as a(n) ____ in some programs.
a. icon
b. cursor
c. button
d. menu
page-pfc
____ is the delivery of education via some electronic method such as the Internet,
networks, or CDs/DVDs.
a. Distance learning
b. Dynamic Help
c. Web-based learning
d. E-learning
A(n) ____ device is any hardware component that conveys information to one or more
people.
a. input
b. communications
c. terminal
d. output
____ specialist, which is a job in the training area of an IT department, answers
hardware, software, and networking questions in person, over the telephone, and/or in a
chat room.
a. Help desk
page-pfd
b. Networking
c. Chat room
d. VoIP
During ____, a systems analyst builds upon the data dictionary developed during the
analysis phase.
a. storage design
b. database design
c. program design
d. input and output design
Storage devices access items in ____.
a. nanoseconds
b. microseconds
c. milliseconds
d. either B or C
page-pfe
Case 2
You have reached a plateau in your career and you have decided that it is time to pursue
a certification so that you can move to a new level in your professional life.
You are looking for some training options. Money is an important consideration for you
since you do not have a lot of resources, but you do have some money to spend.
Furthermore, you have not typically performed well studying all on your own. What is
the best option for you?
a. Following a self-guided course using CDs and DVDs from your local library.
b. Enrolling in an online training course.
c. Registering for a boot camp that will immerse you in intensive coursework for up to
two weeks.
d. Using the certification sponsor's Web site, and the Web sites of some private
individuals, as a guide for your study.
____ are radio waves that provide a high-speed signal transmission.
a. Generations
b. Microwaves
page-pff
c. Fixed access events
d. Indices
One member of the project team is the project ____, who manages and controls the
budget and schedule of the project.
a. leader
b. comptroller
c. assistant
d. analyst
____ is a business transaction that occurs over an electronic network such as the
Internet.
a. E-convergence
b. E-browsing
c. E-marketing
d. E-commerce
page-pf10
A(n) ____ is an opening inside the system unit in which additional equipment can be
installed.
a. domain
b. supply
c. port
d. bay
A(n) ____ is a chip that controls the manipulation and display of graphics on a display
device.
a. USB
b. MIDI
c. GPU
d. S-video
page-pf11
With a(n) ____, users interact with the software using text, graphics, and visual images
such as icons.
a. GUI
b. DUI
c. HUI
d. BUI
____________________ is a simple, interactive problem-solving language developed
by John Kemeny and Thomas Kurtz.
A DBMS provides a variety of techniques to restore a database to a usable form in case
it is damaged or destroyed.
page-pf12
Explain what the Macintosh operating system is, and list some of the enhanced features
of the latest version of the OS.
page-pf13
Many companies list their job openings, internship opportunities, and career
opportunities on their Web sites.
On a ring network, if the hub fails the entire network is inoperable until the hub is
repaired.
A(n) ____________________ is a built-in connection to another related Web page or
part of a Web page.
A(n) ____________________ server is a dedicated server that manages network traffic.
page-pf14
During the ____________________ phase, four major activities are performed: (1)
review and approve the project requests, (2) prioritize project requests, (3) allocate
resources to approved projects, and (4) form a project development team for each
approved project.
Educational software seldom includes games or content to make the learning experience
more fun.
The ____________________ standard specifies that computers and devices on the
network share or pass a special signal, called a token, in a unidirectional manner and in
a preset order.
page-pf15
Perpetrators of back doors trick their victims into interacting with phony Web sites.
A dial-up modem connected to a sending computer converts the computer's digital
signals into analog signals.
The ____________________ programming language, developed by Dennis Ritchie at
Bell Laboratories, originally was designed for writing system software.
page-pf16
Removable hard disks have storage capacities up to 500 GB.
A(n) ____________________ is an individual business activity.
Application software is said to be downward compatible, meaning it will run on a new
version of an operating system.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.