MPCS 81768

subject Type Homework Help
subject Pages 15
subject Words 1922
subject Authors Gary B. Shelly, Kathleen McMahon, Misty E. Vermaat, Tristen Kendall

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
An advantage of an interpreter is that ____.
a. when it finds errors, it displays feedback immediately
b. interpreted programs run faster than compiled programs
c. an interpreter produces an object program
d. all of the above
A voice mailbox is a(n) ____ in a voice mail system.
a. storage location on a hard disk
b. input device
c. processor
d. output device
A ____ overcomes the major disadvantage of CD-R disks, which is being able to write
on them only once.
a. CD-ROM
b. DVD-ROM
page-pf2
c. CD-RW
d. DVD-R
A(n) ____ hard drive is a self-contained unit that you insert in and remove from a slot
or USB port in a device or a computer.
a. personal
b. mini
c. USB
d. removable
To convert an assembly language source program into machine language, programmers
use a program called a(n) ____.
a. manager
b. converter
c. assembler
d. compiler
page-pf3
In the database pictured in the accompanying figure, a field ____ uniquely identifies
each field.
a. tag
b. name
c. signal
d. basis
page-pf4
Often users ____, or transfer a copy of, the images from a digital camera to a
computer's hard disk.
a. upload
b. relay
c. reload
d. download
The 10-Gigabit Ethernet standard supports which of the following transfer rates?
a. 1 Gbps
b. 5 Gbps
c. 10 Gbps
d. 12 Gbps
____ software is a sophisticated type of application software that assists a professional
user in creating engineering, architectural, and scientific designs.
a. DTP
b. CAD
page-pf5
c. CBT
d. WBT
Word processing software includes a(n) ____, which reviews the spelling of individual
words, sections of a document, or the entire document.
a. table of contents
b. spelling checker
c. glossary
d. dictionary
The amount of data, instructions, and information that can travel over a
communications channel sometimes is called the ____.
a. broadband
b. latency
c. baseband
d. bandwidth
page-pf6
For multiple colors and shades of gray, each pixel in a digital camera requires less than
one bit of data.
Rambus DRAM (RDRAM) chips are another type of DRAM chips that are much faster
than SDRAM chips because they ____.
a. transfer data twice for each clock cycle
b. are synchronized to the system clock
c. do not have to be re-energized as often
d. use pipelining techniques
Examples of editing tasks are ____.
page-pf7
a. changing fonts
b. deleting text
c. inserting text
d. underlining text
____ printers often use continuous-form paper.
a. Laser
b. Thermal
c. Ink-jet
d. Impact
A(n) ____ is an online area in which users have written discussions about a particular
subject.
a. newsgroup
b. blueprint
c. real area
page-pf8
d. talk space
Case 2
Ports and connectors have always been a little bit of a mystery to you, so you have
decided to learn more about them.
You have a new wireless headset that you plan to connect to your smart phone. Which
of the following types of headsets do you have?
a. IrDA
b. Bluetooth
c. eSATA
d. MIDI
The size of a bus, called the bus ____, determines the number of bits that the computer
can transmit at one time.
a. diameter
b. width
c. circumference
page-pf9
d. interpolation
Mobile printers mainly use any of the following technologies except ____ technology.
a. ink-jet
b. laser
c. thermal
d. dye-sublimation
The first activity in the preliminary investigation is to ____.
a. specify the hardware and software needed
b. show users exactly how they will use a new system
c. interview the user who submitted the project request
d. recommend the most feasible solution for a project
page-pfa
Popular scripting languages include ____.
a. RPG
b. Perl
c. JavaScript
d. VBScript
In top-down design, after identifying the main routine the programmer decomposes
(breaks down) the main routine into smaller sections, called ____.
a. clusters
b. modules
c. links
d. sources
page-pfb
A(n) ____ is a touch-sensitive display device that users interact with by touching the
screen with a finger.
a. trackpad
b. touch screen
c. touchpad
d. stylus
A program is ____.
a. a collection of unprocessed text, numbers, images, audio, and video
b. a series of instructions that tells a computer what to do and how to do it
c. an instruction issued by replying to a question that is displayed
d. an instruction that causes a single specific action to be performed
____ is the delivery of education at one location while the learning takes place at other
locations.
a. Extended training (ET)
b. Faraway schooling (FS)
page-pfc
c. Remote teaching (RT)
d. Distance learning (DL)
Syntax errors will be caused by all of the following except ____.
a. misspelling a command
b. leaving out required punctuation
c. typing command words out of order
d. using the wrong control structure
A line chart displays bars of various lengths to show the relationship of data.
page-pfd
In managing a company's database, the data ____ focuses on the meaning and usage of
data.
a. administrator
b. manager
c. modeler
d. leader
A(n) ____ occurs when the electrical supply drops.
a. overvoltage
b. undervoltage
c. spike
d. unstable flow
High-availability systems often include a feature called ____, which allows
components, such as a RAID hard disk or power supplies, to be replaced while the rest
of the system continues to perform its tasks.
a. redundancy
page-pfe
b. power mapping
c. integration
d. hot-swapping
Case 1
In your new role as a DBA, you have inherited a database that has a lot of problems.
Your first task, you decide, is to identify the qualities of the information in your
database, or, in some unfortunate cases, the absence of these qualities.
The manager for the eastern division sales force is upset because she wants to
determine which members of her sales force need awards for high monthly sales, and
which employees need remediation because they have not sold enough product during
the past month. However, all of the sales information has not yet been entered into the
database. What kind of information is at issue in this instance?
a. useful information
b. accessible information
c. timely information
d. verifiable information
page-pff
To prevent unauthorized access and use, at a minimum a company should have a
written ____________________ that outlines the computer activities for which a
computer or network may and may not be used.
RAM technology uses battery power to retain information even when the power to the
computer is off.
When 8 bits are grouped together as a unit, they form a(n) ____________________.
page-pf10
Employees that telecommute have rigid work schedules that prevent them from
combining work and personal responsibilities.
____________________ is an networking certification sponsored by Microsoft that
tests technical expertise in one of several areas including managing and troubleshooting
Windows operating systems.
When a computer is running multiple programs concurrently, the one in the background
is the active program; that is, the one currently in use. _________________________
page-pf11
In a file processing system, the records in one file always relate to the records in other
files.
A multiuser operating system always processes tasks on a first-come, first-served basis.
_________________________
Enterprise-wide systems can collect and combine data more quickly and provide
executive management access to a more up-to-date and accurate view of what is
happening in an organization.
Most information is important to all people and groups of people.
page-pf12
Explain what a multidimensional database is, what its applications are, and what its
main advantage is.
The speed of a CD-ROM drive has no effect on how fast it installs programs or accesses
the disc.
page-pf13
Like other operating systems, Linux is proprietary software.
Although it can connect any number of computers, a client/server network typically
provides an efficient means to connect 10 or fewer computers.
_________________________
page-pf14
An EIS like the one shown in the accompanying figure typically uses internal data
sources such as sales orders or inventory records.
Examples of ____________________ devices and systems include fingerprint scanners,
hand geometry systems, and face recognition systems.
page-pf15
The computer that a hacker uses for nefarious purposes, known as a
____________________, is unaware that it is being used to attack other systems.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.