MPCS 15605

subject Type Homework Help
subject Pages 16
subject Words 1677
subject Authors Gary B. Shelly, Kathleen McMahon, Misty E. Vermaat, Tristen Kendall

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Symptoms of a user with computer addiction include all of the following except ____.
a. craves computer time
b. unable to stop computer activity
c. neglects family and friends
d. irritable when at the computer
A(n) ____ is someone who tries to access a computer or network illegally.
a. uninstaller
b. hacker
c. backup
d. cyberterrorist
The ____ is a scientific and educational organization dedicated to advancing knowledge
and proficiency of information technology.
a. ICS
b. CES
page-pf2
c. ACM
d. CAS
A printer, such as that shown in the accompanying figure, uses software that enables it
to interpret a(n) ____, which tells the printer how to lay out the contents of a printed
page.
a. unified modeling language (UML)
b. page description language (PDL)
c. object-oriented language (OOL)
d. hypertext markup language (HTML)
page-pf3
Object-oriented and object-relational databases often use a query language called ____
to manipulate and retrieve data.
a. OQL
b. SQL
c. TQL
d. AQL
____ are audio output devices that rest inside the ear canal.
a. Earbuds
b. Headphones
c. VoIP
d. E-phones
page-pf4
Ethernet and token ring LANs often use physical transmission media.
_________________________
The communications device that connects a communications channel to a sending or
receiving device such as a computer is a(n) ____.
a. modem
b. CATV
c. digitizer
d. interpolator
____ means the operating system automatically configures new devices as users install
them.
a. Virtual memory
b. Operational buffering
c. Page logging
d. Plug and Play
page-pf5
In a(n) ____ recovery, the DBMS uses the log to reenter changes made to a database
since the last save or backup.
a. instant
b. baseline
c. integrated
d. forward
____ software provides the capabilities of adjusting or enhancing image colors, adding
special effects such as shadows and glows, and the like.
a. Color library
b. Multimedia authoring
c. Image editing
d. Professional desktop publishing
page-pf6
____ is a process of verifying the technical knowledge of an individual who has
demonstrated competence in a particular area.
a. Competence analysis
b. Articulation
c. Certification
d. Expert analysis
In the accompanying figure, memory ____ on the motherboard hold the memory
page-pf7
modules.
a. slots
b. contacts
c. sleeves
d. pins
Most e-mail programs allow users to create a(n) ____, which contains a list of names
and e-mail addresses.
a. TCP
b. glossary
c. address book
d. table of contents
The information in an electronic profile includes ____.
a. age
b. spending habits
page-pf8
c. address
d. number of dependents
____ software allows users to draw pictures, shapes, and other graphical images with
various on-screen tools.
a. Paint
b. Design
c. Pixel manipulation
d. Color library
page-pf9
In the accompanying figure, a program called a print ____ intercepts documents to be
printed from the operating system and places them in the queue.
a. player
b. buffer
c. spooler
d. queue
A(n) ____ keyboard has a design that reduces the chance of wrist and hand injuries.
a. basal
b. enhanced
c. strength-building
d. ergonomic
page-pfa
Most DBMSs include a(n) ____ feature, like the one in the accompanying figure, which
has a graphical user interface to assist users with retrieving data.
a. QBA
b. SQL
c. QBE
d. schema
____ is a multitasking operating system developed in the early 1970s by scientists at
Bell Laboratories.
a. Linux
b. Perl
c. NetWare
d. UNIX
page-pfb
One purpose of using test data is to try to cause a ____, which is an error that occurs
while a program is running.
a. run-time error
b. syntax error
c. one-time error
d. logic error
page-pfc
On a(n) ____ network, such as that illustrated in the accompanying figure, one or more
computers act as a server and the other computers on the network request services from
the server.
a. dedicated
b. client/server
c. integrated
d. indexed
page-pfd
Digital forensics is used by ____.
a. military intelligence
b. insurance agencies
c. law enforcement
d. all of the above
The ____ follows these six steps: (1) analyze the requirements, (2) design the solution,
(3) validate the design, (4) implement the design, (5) test the solution, and (6) document
the solution.
a. program development life cycle
b. post-implementation system review
c. system development cycle
d. preliminary investigation
A(n) ____ agreement ensures that if a student transfers to a four-year college or
university, he or she will receive credit for most of the courses taken at the community
college level.
a. encapsulation
page-pfe
b. articulation
c. credit
d. transfer
Many developers use multimedia authoring software for ____.
a. CBT
b. WBT
c. TBT
d. ABT
A(n) ____ system is a collection of hardware, software, data, people, and procedures
that work together to produce quality information.
a. data
b. information
c. feature
d. support
page-pff
____ are the fastest, most powerful computers and the most expensive.
a. Desktop computers
b. Notebook computers
c. Midrange servers
d. Supercomputers
A(n) ____ is a small ceramic or metal component with fins on its surface that absorbs
and disperses heat produced by electrical components such as a processor.
a. liquid cooler
b. system brake
c. control unit
d. heat sink
page-pf10
Windows Vista ____ offers the Aero interface (shown in the accompanying figure) to
basic users.
a. Home Basic
b. Home Premium
c. Professional
d. Enterprise
A(n) ____________________ joins a cable to a peripheral.
page-pf11
All sizes of computers typically use the same operating system.
A wireless access point (WAP) should be configured to broadcast a network name, in
order to increase security.
Discuss the steps involved in acquiring hardware and software, including definitions of
RFQ, RFP, and RFI.
page-pf12
Some RAM chips, flash memory chips, and other types of memory chips use
____________________ technology because it provides high speeds and consumes
little power.
In a networked environment, no authorized computer user can access data and
information stored on other computers on the network.
page-pf13
In a database, each row, called a(n) ____________________, contains data about a
given person, product, object, or event.
In a diagram such as the one shown in the accompanying figure, each class can have
one or more lower levels called ____________________.
page-pf14
Once in memory, the computer can carry out, or ____________________, the
instructions in a program.
Comparison operations include basic calculations such as addition, subtraction,
multiplication, and division.
Windows Vista is an example of a(n) utility program. _________________________
page-pf15
After users approve a layout chart, the systems analyst develops a mockup for
programmers.
IBM is one of the smaller computer companies with fewer than 3,150 employees and
annual sales of less than $8.1 million.
A(n) ____________________ is a legal agreement that permits users to install software
on multiple computers, usually at a volume discount.
____________________, which is a main area of an IT department, analyzes, designs,
develops, and implements new information technology and improves existing systems.
page-pf16
Most personal computers and servers use Unicode. _________________________

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.