• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/100

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

100 Cards in this Set

  • Front
  • Back
A popular plug-in application that enables readers to view, navigate, and print files in Portable Document Format is __________.
Acrobat Reader
A ____ is a thin desktop monitor that detaches from the computer to function as a portable wireless touch screen, which can access the computer remotely.
smart display
A _____ has pins on opposite sides of the circuit board that connect together to form one set of contacts.
SIMM (single inline memory module)
An 8-bit video card (also called 8-bit color) uses 8 bits to store information about each pixel and thus can display _____ different colors.
256
A GPS receiver is a handheld, mountable, or embedded device that can contain all of the following except a(n) _____.
floppy disk
When a computer sends data over the Internet, the data is divided into small pieces called _____.
packets
With ISDN, the same telephone line that could carry only one computer signal now can carry three or more signals at once through the same line, using a technique called _____.
multiplexing
For small business and home networks, a ____ allows multiple computers to share a single high-speed Internet connection such as a cable modem or DSL modem.
router
_____ enables users to listen to music as it downloads to their computers.
Streaming audio
A _____ equals approximately 1 billion bytes.
gigabyte (GB)
_____ is used primarily on mainframe computers and high-end servers.
Extended Binary Coded Decimal Interchange Code (EBCDIC)
Manufacturers often use _____ to represent the sharpness of an image on a display screen.
pixels per inch (PPI)
A _____ is a high-speed network that connects networks in an area such as a city or town and handles the bulk of communications activity across that region.
metropolitan area network (MAN)
Client/server network architecture usually ___________.
provides several computers with data and resources from a single computer
A major shortcoming of a ring network is that __________.
if a computer on the network fails, all the devices after the failed device cannot function
Wireless transmission media used in communications include all of the following except _____.
fiber-optic cable
_____ is the process of a computer receiving information, such as a Web page, from a server on the Internet.
Downloading
A(n) _____ is a compiled program that runs on the client.
applet
The _____ standard defines how a Web server communicates with outside sources.
CGI (common gateway interface)
In a computer processor, the control unit __________.
directs and coordinates most of the operations in the computer
Spyware in a computer __________.
secretly collects information about the user, often related to the person’s Web-browsing habits
Bell Labs licensed _____ for a low fee to numerous colleges and universities, where the operating system obtained a wide following.
UNIX
Compressed files are also called __________ files.
zipped
In object-oriented (OO) design, the concept of packaging data and procedures into a single object is called _____.
encapsulation
A(n) _____ version is a test version of a system is not ready for release but is stable enough to be tested by end users
beta
_____ is a set of technologies from Microsoft that allows almost any type of program to run on the Internet or an internal business network.
NET
A program has its own documentation, called _____.
comments
The machine language version that results from compiling a 3GL is called the _____.
object code or object program
A(n) _____ is an action to which an object-oriented program responds.
event
Some users input music and other sound effects using external _____ devices such as an electronic piano keyboard.
MIDI
A _____ is a window on the screen that displays notes and drawings simultaneously on the screens of all participants in a video conference.
whiteboard
To add special multimedia effects and interactive capabilities to Web pages, programmers use all of the following scripting languages except __________.
Vista
_____ is free software that has been donated for public use and has no copyright restrictions.
Public-domain software
Microsoft ____ is an example of a personal DTP program.
Publisher
____ software allows users to track, control, and manage the events, resources, and costs of a project.
Project management
_____ is a common data type in databases that consists of Web addresses that link to a document or Web page.
Hyperlink
A(n) _____ verifies that a required field contains data.
completeness check
A multidimensional database uses the idea of a ____ to represent the dimensions of data available to a user.
data cube
A(n) _____ program interacts with a DBMS, which in turn interacts with the database.
front-end
_____ is a process designed to ensure the data within the relations (tables) in a relational database contains the least amount of duplication.
Normalization
All of the following are SQL keywords except ____.
OBJECT
A Web page has a unique address, called a ____.
URL
Popular database management systems include all of the following except __________.
Mac OS X
_____ software enables users to convert an image from a fax modem to text and then edit it.
Optical character recognition (OCR)
The banking industry almost exclusively uses ____ for check processing.
MICR
The _____ is the most important data and information gathering technique for the system developer.
interview
Tools that a systems analyst uses for process modeling include all of the following except _____.
class diagrams
A _____ identifies the product(s) a systems analyst wants from a vendor.
request for quotation (RFQ)
With a _____, only one location in the company uses a new system, so it can be tested.
pilot conversion
____ processing implies that there is no interaction with the user while the program is being executed.
Batch
All of the following are recommended defenses against botnets, DoS attacks, and spoofing except __________.
never opening e-mail attachments
In a grocery store, a(n) _____ is a combination of an electronic cash register, bar code reader, and printer.
point of sale (POS) terminal
A(n) ____ is a group of processing steps that are treated as a single activity to perform a desired result.
transaction
A(n) _____ allows the user to choose specific files to backup, regardless of whether or not the files have changed since the last incremental backup.
selective backup
The _____ is the destructive event or prank a malicious-logic program is intended to deliver.
payload
When a mobile user connects to a main office using a standard Internet connection, a _____ provides the mobile user with a secure connection to the company network server.
virtual private network (VPN)
A _____ is a mathematical formula that can be used to encrypt and decrypt sensitive data.
hash
A _____ installs, configures, and maintains LANs, WANs, intranets, and Internet systems.
network administrator
A _____ works with the analyst, programmer, and user to create documentation and user materials.
technical writer
Entry-level jobs for graduating _____ students include database analyst, software engineer, systems programmer, computer technician, and computer consultant.
computer science (CS)
_____ is a certification that tests advanced knowledge of installing, configuring, and operating LANs and WANs.
Cisco Certified Network Professional (CCNP)
Commonly used methods to retrieve and maintain data in a database include all of the following except _____.
validation rules
An integration test _____.
verifies that an application works with other applications
Integrated case products, sometimes called I-CASE or a CASE workbench, include which of these capabilities?
a. Project dictionary
b. Code generators
c. Diagrams and prototyping
d. Quality assurance
e. All of the above
A unit test _____.
verifies that each individual program works by itself
Using _____, engineers can test the design of a car or bridge before it is built.
CAE
CIM software _____.
assists support personnel in providing the best solutions for customers
A _____ is a program that assists in the management and tracking of all the activities in a business from start to finish.
workflow application
_____ software tracks leads and inquiries from customers, stores a history of all correspondence and sales to a customer, and allows for tracking of outstanding issues with customers.
CRM
_____ is the process of collecting data from the Internet as a source for a data warehouse.
Web farming
The two main components of an expert system are ____.
knowledge base and inference rules
A special kind of DSS, called a(n) ____, supports the strategic information needs of executive management.
EIS
A _____ is a special window that provides information, presents available options, or requests a response.
dialog box
To "cut" involves removing a portion of a document and storing it in a temporary storage location, sometimes called a _____.
clipboard
When computer users _____ a document, the computer transfers the document from memory to a storage medium.
save
_____ enables users to write and print checks, track checking account activity, and update and reconcile balances on demand.
Accounting software
Business software suites typically include all of the following programs except ____.
note taking
A Web browser program allows _____.
users to access and view Web pages on the Internet
_____ is the delivery of education at one location while the learning takes place at other locations.
Distance learning (DL)
Hyperstudio is a multimedia authoring software application that allows users to create presentations called ____.
stacks
_____ allows users to share documents with others in real time.
An online meeting
A _____ is a legal agreement that permits users to install software on multiple computers, usually at a volume discount.
site license
____ uses the Internet, instead of the public switched telephone network, to connect a calling party and one or more called parties.
Internet telephony
Examples of _____ are real estate agents, insurance agents, meter readers, package delivery people, journalists, consultants, and students.
mobile users
Many large businesses have _____ software, which allows the company to provide a personalized touch and customized service to its customers.
customer relationship management (CRM)
Which of the following is not required for video conferencing?
Webcam
Many large companies use the words, ____, to refer to the huge network of computers that meets their diverse computer needs.
enterprise computing
When a user specifies a domain name, a _____ translates the domain name into its associated IP address so data can route to the correct computer.
DNS server
When using a search engine, use a(n) ____ after the search word to find plurals or variations of that word.
asterisk
Many FTP sites require a(n) ____ to access files.
login name and password
On the Web, ____ involves the display of 3-D images that users explore and manipulate interactively.
VR
A wireless portal is a portal specifically designed for _____.
Web-enabled mobile devices
Some mailing lists are called _____, named after a popular mailing list software product.
LISTSERVs
A popular Web-based type of discussion group that does not require a newsreader is a ____.
message board
A ____ is an area with the capability of wireless Internet connectivity.
hot spot
The gap between those who have access to computers and those who do not is referred to as the ____.
digital divide
The computer that a hacker uses to execute a DoS or DDoS attack, known as a _____, is completely unaware that it is being used to attack other systems.
zombie
The 1986 _____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.
Electronic Communications Privacy Act (ECPA)
To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the _____.
Business Software Alliance (BSA)
_____ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
Ergonomics