MPCS 39041

subject Type Homework Help
subject Pages 8
subject Words 941
subject Authors Gary B. Shelly, Kathleen McMahon, Misty E. Vermaat, Tristen Kendall

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
To ____________________ a program file, a program like the one in the accompany
figure records information such as the file size and file creation date in a separate file.
To meet their large-scale needs, enterprises use special hardware geared for heavy use.
page-pf2
Internal comments, which generally are at the top of a program, explain the program's
purpose and identify the program name, its author, and the date written.
Because they require little arm movements, users enter large amounts of data into touch
screens.
____________________ is the process of transferring data, instructions, and
information from memory to a storage medium.
Explain the difference between perpendicular and longitudinal recording.
page-pf3
Supporting systems help all levels of users make decisions.
A(n) ____________________ is a vertical lever mounted into a base that is moved in
different directions to control the actions of a simulated vehicle or player.
A(n) ____________________ is a collaborative Web site that allows users to add to,
modify, or delete the Web site content via their Web browser.
page-pf4
Discuss at least three applications appropriate for an object-oriented database.
page-pf5
A(n) ____________________, such as those shown in the accompanying figure, is a
miniature image that represents a program, an instruction, or some other object.
Web services include traditional user interfaces, such as a Web page.
In some software applications, the computer can speak the contents of a document
through voice output.
page-pf6
Many organizations and businesses have strict written policies governing the
installation and use of software and enforce their rules by checking networked or online
computers periodically to ensure that all software is licensed properly.
Explain what virtual memory is and why it is important, making sure to explain the
following key terms: swap file, page, and thrashing.
page-pf7
A disadvantage of storage virtualization is that the storage cannot be configured
quickly.
An important responsibility of a CSO is to develop a computer security plan.
A counter is a graphical image that points to a URL.
A(n) ____________________ is someone who accesses a computer or network
illegally but has the intent of destroying data, stealing information, or other malicious
page-pf8
action.
In a diagram such as the one pictured in the accompanying figure, a(n)
____________________ is a holding place for data and information.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.