MPCS 80655

subject Type Homework Help
subject Pages 13
subject Words 1469
subject Authors Catherine Laberta

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Safety-critical systems have which of the following type of systems that kick in if the
main computer goes down?
A) Fail-safe
B) Backup
C) Active/passive standby
D) Terminal
Each memory address is stored in______form.
A) binary
B) serial
C) parallel
D) compressed
This type of software collects your personal information, monitors your Web surfing
habits, and distributes this information to a third party.
A) Pop-upware
B) Spyware
page-pf2
C) Malware
D) Advertisement software
Terminator
A) Special connector at the end of a bus
An enterprise data center is an open unsecured repository for data.
Moving a call center from the United States to India is an example of:
A) offshoring.
page-pf3
B) transferring.
C) outsourcing.
D) exporting.
The written computer instructions that programmers create are called:
A) heuristics.
B) object modules.
C) blocks.
D) code.
An important feature of object-oriented programming is the concept of_________, a
category of objects.
A) methods
B) module
C) capsules
D) class
page-pf4
Using a technique known as__________, a message is sent to a computer system using
an IP address disguised as one from a trusted source.
A) hacking
B) illegal access
C) electronic data collection
D) IP spoofing
ERD
The scope of a backbone can be all of the following EXCEPT:
page-pf5
A) atmospheric.
B) regional.
C) transcontinental.
D) continental.
Firewalls are used to:
A) restrict outsiders from accessing internal data.
B) eavesdrop on employee e-mail.
C) check for viruses on a company's network.
D) prevent employees from sending e-mail beyond the confines of the network.
How many phases exist in the program development life cycle?
A) Four
B) Six
C) Three
page-pf6
D) Five
A CASE tool includes project management features, documentation tools, data
dictionaries, and
graphical and coding support. CASE stands for:
A) complex-automated software enterprise.
B) complex-assisted software engineering.
C) computer-aided software engineering.
D) computer-assisted software enterprise.
________is the obligation for parties to a lawsuit to exchange documents that exist only
in electronic form.
A) E-evidence
B) E-discovery
C) E-exchange
D) E-law
page-pf7
Which of the following is one of the MOST widely known IT career search site?
A) PostIT.com
B) Jobs4U.com
C) Monster.com
D) Dice.com
_________are gatherings where manufacturers, designers, and dealers meet specifically
to demonstrate their products and services.
A) Trade shows
B) Conferences
C) Job fairs
D) Training seminars
page-pf8
PnP is an abbreviation for which of the following terms?
A) Package-and-Protect
B) Peripheral-and-Plugin
C) Plug-and-Play
D) Passive-and-Predictive
A technique that uses more than one processor to execute a program is called:
A) megaprocessing.
B) parallel processing.
C) co-processing.
D) serial processing.
Microsoft Word and Excel are examples of__________programs.
page-pf9
A) standalone
B) tailor-made
C) custom
D) integrated
An information technology steering committee includes all of the following except:
A) middle managers.
B) information systems personnel.
C) senior managers.
D) end users.
Which of the following happens when you launch an application?
A) The program changes the registry so the computer knows what kind of application
you are using.
page-pfa
B) A dialog box displays asking you to verify that you do want the program to appear
on screen.
C) Program files are copied from the hard disk to the memory.
D) Data files are copied from the memory to the hard disk.
Which of the following is the first step toward a true natural language interface?
A) Control classes
B) Mnemonics
C) Fast compilers
D) Continuous speech recognition
_________________processing systems allow you to enter transaction data and see
immediate results.
A) Summary
B) Batch
C) Online
page-pfb
D) Operational
How does a Web search service that offers a subject guide differ from a general-purpose
search engine?
A) It searches every Web page currently available across the world and reports results
only when an exhaustive search has been completed.
B) It offers a smaller selection of quality pages related to a set of the more useful Web
pages in a given category.
C) It uses a wizard with a series of questions to help you refine your search.
D) It employs multiple commercial search engines to find the maximum set of Web
pages related to the query.
Which of the following is NOT true about baud?
A) It is the rate at which two modems can exchange data.
B) It is the number of signaling elements per second.
C) It can be equal to bps.
D) It can be less than bps.
page-pfc
Which of the following is NOT a technol ogy that threatens online anonymity?
A) Ubiquitous computing
C) Radio frequency identification
B) Cookies
D) Phreaking
Which of the following subcomponents of the CPU takes instructions from memory and
decodes the instructions?
A) Control unit
B) Arithmetic-logic unit
C) Data bus
D) Microprocessor
page-pfd
Which of the following is the process in which documents and data are sent to the next
person who needs them?
A) Group dynamics
B) Workgroup relaying
C) Workflow automation
D) Facsimile transmission
_______is the maximum storage capacity for a CD-ROM.
A) 250 MB
B) 1,500 MB
C) 950 MB
D) 700 MB
Which of the following disciplines use scientific and engineering research to improve
computing?
A) Information engineering
B) Computer science
page-pfe
C) Information science
D) Computer engineering analyst
The__________is responsible for managing memory.
A) firmware
B) operating system
C) embedded memory program
D) buffer
As in dial-up, DSL uses phone lines but also requires a special________modem.
page-pff
_______is the use of networks or the Internet to carry out business of any type.
The extensive use of slower twisted-pair, analog-driven cabling to most homes
and businesses causes a problem known as the______-mile problem.
The central processing unit is located within the system's case. The system case is also
known as the system ______.
Dumpster diving
A) Examination of a company's trash for user IDs or passwords
B) Theft of a poorly chosen password
page-pf10
Bandwidth across a cable connection is shared among_______, causing speed to vary.
Crimes that use the Internet are called_________.
A network_______point sends and receives data between computers that have
wireless adapters.
page-pf11
To_______an application means to quit or shut down the program.
The algorithms that are used to compress and decompress files are called______.
A networked computer may be called a node or a(n)_______.
A(n)_______screen uses a pressure-sensitive panel that detects where users have
tapped the screen.
page-pf12
A(n)__________error is a mistake the programmer makes in designing the solution to
a problem.
__________refers to conducting business internationally in such a way that delivery of
services or products is similar in all locations.
The RHCE certificate, or Red Hat Certified_____________certificate, is a
performance-based certification for Red Hat Linux network design, deployment, and
administration.
page-pf13
The act of one company contracting with another to provide services that might
otherwise be performed by in-house employees is called .
Broken links are also called_____links.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.