• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/140

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

140 Cards in this Set

  • Front
  • Back

AN _____ IS NOT A COMPONENT OF COMPUTER HARDWARE. IT IS A TYPE OF COMPUTER SOFTWARE. THE COMPUTER'S _____ CONTROLS ALL OF THE COMPUTER'S ACTIVITIES.

OPERATING SYSTEM

THE _____ IS THE SINGLE CIRCUIT BOARD THAT CONTAINS A COMPUTER'S PROCESSOR, TEMPORARY MEMORY, AND OTHER ELECTRONIC COMPONENTS.

MOTHERBOARD

DECODING TAKES PLACE IN THE _____ _____ , LOCATED WITHIN A PROCESSOR'S CONTROL UNIT.

INSTRUCTION REGISTER (IR)

_____ IS A COMPUTER'S PRIMARY WORKING MEMORY.

RAM

_____ CACHE IS BUILT INTO A COMPUTERS PROCESSOR. _____ CACHE SITS BETWEEN THE PROCESSOR AND A COMPUTER'S RAM.

L1, L2

A COMPUTER USER CAN LOAD READ-ONLY PROGRAMS AND DATA ON _____ .

PROM, PROGRAMMABLE READ-ONLY MEMORY

COMPUTER MEMORY CHIPS ARE PHYSICALLY INSTALLED WITHIN THE COMPUTER ON _____ .



SIMMs, SINGLE IN-LINE MEMORY MODULES

A DISK DRIVE IS AN EXAMPLE OF A _____ STORAGE COMPONENT.

SECONDARY

_____ DEVICES ARE INPUT/OUTPUT UNITS THAT ALLOW THE COMPUTER TO INTERACT WITH OTHER USERS AND MACHINES.

I/O

A COMPUTER HARD DISK STORES INFORMATION IN UNITS KNOWN AS ____ .

SECTORS

A _____ IS COMPUTER DEVICE/PERIPHERAL THAT CONVERTS DATA INTO A SIGNAL THAT CAN BE TRANSMITTED OVER A TELEPHONE LINE.

MODEM

A COMPUTER THAT IS NOT CONNECTED TO A NETWORK IS REFERRED TO AS A _____ _____ .

STANDALONE COMPUTER

_____ COMPUTERS WERE DESIGNED TO SERVE HUNDREDS OF USERS AT ONE TIME.

MAINFRAME

A _____ IS A SPECIALIZED TYPE OF MULTI-USER SYSTEM. _____s ARE PRIMARILY USED FOR HIGH-SPEED SCIENTIFIC APPLICATIONS.

SUPERCOMPUTER

A _____ IS THE MOST BASIC BINARY ON/OFF SIGNAL.

BIT

HOW MANY ALPHANUMERIC CHARACTERS ARE STORED WITHIN ONE BYTE?

1;


A BYTE STORES ONE CHARACTER.


A CHARACTER IS MADE UP OF 8 BITS.

UNICODE IS A ___-BIT ENCODING SYSTEM

16

ASCII IS A ___-BIT ENCODING SYSTEM.

7

ANSI IS AN ___-BIT ENCODING SYSTEM.

8

_____ GRAPHICS ARE COMPRISED OF DIGITAL GEOMETRIC SHAPES.

VECTOR

A KILOBYTE CONTAINS _____ BYTES OF MEMORY.

1,024;


THE NUMBER OF 1,000 BYTES IS INACCURATE BECAUSE COMPUTER NUMBERING SYSTEMS ARE BASED ON TWOS INSTEAD OF TENS.

WHAT ABBREVIATION REPRESENTS A DATA TRANSFER RATE OF APPROXIMATELY 1 MILLION BITS PER SECOND?

1 Mbps

_____ IS THE TERM USED TO REFER TO THE EXECUTION OF MORE THAN ONE COMPUTER PROGRAM CONCURRENTLY FOR A SINGLE USER.

MULTITASKING

THE FUNCTION OF BOOTING, OR STARTING, A COMPUTER IS PERFORMED BY THE COMPUTER'S _____ _____ .

OPERATING SYSTEM

A _____ IS A GRAPHICAL-USER INTERFACE (GUI) ADDED AS AN OUTER LAYER TO AN OPERATING SYSTEM.

SHELL

MS-DOS WAS THE PRIMARY PC OPERATING SYSTEM FROM _____ THROUGH THE MID _____s.

1981, 1990

A UTILITY IS A TYPE OF _____ SOFTWARE.

SYSTEMS

A _____ _____ IS USED FOR THE PURPOSE OF PREVENTING STATIC IMAGES FROM BURNING INTO THE SCREEN OF COMPUTER MONITORS.

SCREEN SAVER

_____ CONVERT HIGH-LEVEL LANGUAGE SOFTWARE PROGRAMS INTO MACHINE LANGUAGE FOR LATER EXECUTION.

COMPILERS

_____ CONVERT HIGH-LEVEL LANGUAGE PROGRAMS INTO MACHINE LANGUAGE FOR IMMEDIATE EXECUTION.

INTERPETERS

AN _____ IS A PROGRAM THAT TRANSLATES ASSEMBLY-LANGUAGE SOFTWARE PROGRAMS INTO MACHINE LANGUAGE.

ASSEMBLER

_____s COLLECT STATISTICS ABOUT PROGRAMS TO HELP COMPUTER SYSTEMS RUN MORE EFFICIENTLY.

PROFILERS

IN GENERAL, AN ADVANTAGE OF USING AN INTERPRETER OVER A COMPILER IS THAT...

PROGRAMS ARE EASIER TO DEVELOP

____ ____ APPLICATION PROGRAMS ARE INTENDED FOR THE DESIGN AND LAYOUT OF COMPLEX DOCUMENTS ON A PERSONAL COMPUTER.

DESKTOP PUBLISHING

TO PRESERVE THE MOST FORMATTING INFORMATION WHEN SAVING A TEXT DOCUMENT, THE _____ FILE FORMAT SHOULD BE USED.

RTF, RICH TEXT FORMAT

_____ IS AN APPLIED SCIENCE DEVOTED TO INCORPORATING COMFORT, EFFICIENCY, AND SAFETY INTO THE DESIGN OF ITEMS IN THE WORKPLACE.

ERGONOMICS

TO PROMOTE A BETTER UNDERSTANDING OF SOFTWARE PIRACY PROBLEMS AND, IF NECESSARY, TO TAKE LEGAL ACTION, A NUMBER OF MAJOR WORLDWIDE SOFTWARE COMPANIES FORMED THE ______ .

BSA, BUSINESS SOFTWARE ALLIANCE

THE ______ PROHIBITS ACCESS TO STORED COMMUNICATION OR TRANSMITTED MESSAGES SUCH AS E-MAIL OR VOICE MAIL WITHOUT CONSENT OR A COURT ORDER.

ECPA, ELECTRONICS COMMUNICATION PROTECTION ACT

THE COMPUTER THAT A HACKER USES TO EXECUTE A DoS OR DDoS ATTACK, KNOWN AS A ______ , IS COMPLETELY UNAWARE THAT IT IS BEING USED TO ATTACK OTHER SYSTEMS.

ZOMBIE

WHAT REFERS TO A SOCIETY IN WHICH THOSE WHO DO NOT UNDERSTAND COMPUTERS WILL NOT BE EMPLOYABLE IN TODAY'S WORKPLACE?

DIGITAL DIVIDE

WHAT IS AN AREA WITH THE CAPABILITY OF WIRELESS INTERNET CONNECTIVITY ?

A HOTSPOT

WHAT IS A POPULAR WEB-BASED TYPE OF DISCUSSION GROUP THAT DOES NOT REQUIRE A NEWSREADER ?

MESSAGE BOARD

WHAT ARE SOME MAILING LISTS CALLED, NAMED AFTER A POPULAR MAILING LIST SOFTWARE PRODUCT ?

LISTSERVs

WHAT IS THE USE OF COMPUTERS TO SIMULATE A REAL OR IMAGINED ENVIRONMENT THAT APPEARS AS A THREE-DIMENSIONAL SPACE ?

(VR) VIRTUAL REALITY

WHAT DO MANY FTP SITES REQUIRE TO ACCESS FILES ?

LOGIN NAME AND PASSWORD

WHEN USING A SEARCH ENGINE, WHAT CAN YOU PLACE AFTER A SEARCH WORD TO FIND PLURALS OR VARIATIONS OF THAT WORD ?

ASTERISK

WHEN A USER SPECIFIES A DOMAIN NAME, WHAT TRANSLATES THE DOMAIN NAME INTO ITS ASSOCIATED IP ADDRESS SO DATA CAN ROUTE TO THE CORRECT COMPUTER.

DNS Server, DOMAIN NAME SERVER

What is it called when both an old and new system are used simultaneously for conversion to a new system?

Parallel Conversion

What is it when a person alters or obscures their identity?

Spoofing

What was the first functional computer in the United States?

The Atanasoff-Berry Computer

What is the order of steps in which the CPU follows in executing commands?

Fetch, decode, execute, writeback

What is the order of steps in which the CPU follows in executing commands?

Fetch, decode, execute, writeback

What type of image file is most used in pictures because of its ability to display smooth color transitions?

JPEG

What is the order of steps in which the CPU follows in executing commands?

Fetch, decode, execute, writeback

What type of image file is most used in pictures because of its ability to display smooth color transitions?

JPEG

What job function installs and monitors LANs?

Network Administrator

Approximately how fast do radio waves travel?

300 million m/s. The speed of light

Whose job is it to recognize the need for, and implement, new technology in a workplace?

CIO, Chief Information Officer

A manager purchases software to help analyze customer trends. What is this software called?

EMR, Enterprise Resource Management

Which job function creates and codes computer applications?

Software Engineer

What does URL stand for?

Uniform Resource Locater

What is a type of program which allows real time online transaction to occur?

OLTP, Online Transaction Processing

File extensions such as .text .bmp. and .mp3 are used to identify a files

Format

Which of the cf network technologies allows secure transmission of data over an unsecured public network link between private networks?

Virtual private network

The following is one of the goals of the green computing

Reducing power consumption of computer and peripherals

Which of the following is (are) true about EDI?


I. The EDI documents generally contain thesame information that paper documents do.


II. The speed in which the documents areexchanged is much faster than that of paperdocuments.


III. Transmission of EDI documents is lessaccurate than that of paper documents.

I and II only

Which of the following would NOT beconsidered an input device for a computer system?


(A) Image scanner


(B) Webcam


(C) Keyboard


(D) Mouse


(E) PC speaker



(E) PC speaker
In a relational database, each column represents...
an attribute

Which of the following violates intellectualproperty rights?


(A) Software piracy


(B) Data mining of social networks


(C) Launching a denial of service attack


(D) Hacktivism


(E) Spamming



Software piracy

Conversion of data files is part of which of thefollowing phases of the system developmentprocess?


(A) Analysis


(B) Design


(C) Implementation


(D) Development


(E) Maintenance

(C) Implementation

Which of the following technologies does NOTfacilitate knowledge management?


(A) Blogs


(B) Wikis


(C) Web conferencing


(D) Desktop sharing


(E) Biometrics

(E) Biometrics

The American Charity Association, a nonprofitfoundation, has a home page on the World WideWeb. Which of the following is the most likelyURL for its home page?


(A) http://www.charity.gov


(B) http://www.charity.edu


(C) http://www.charity.com


(D) http://www.charity.org


(E) ftp://www.charity.aca

(D) http://www.charity.org
What is the principal function of an operatingsystem?
To provide an interface between thehardware and the application software

A business often identifies that its software hasbeen trademarked by using a unique symbol orattaching the letters TM to its name. What is thepurpose of the trademark?


(A) To eliminate unauthorized copying anddistribution


(B) To identify the software as available for use,free of charge


(C) To identify and differentiate the product’sbrand


(D) To assure the user that the software isproperly licensed and ready to use


(E) To assure the user that the software containsunique features not found in other products

(C) To identify and differentiate the product’s brand
What term identifies the measure of accuracy,completeness, and currency of data?
Data integrity
The special formatting language used to createWeb pages is called
HTML

Which of the following best characterizes data ina data warehouse?


(A) Historical


(B) Normalized


(C) Relational


(D) Volatile


(E) Up-to-date

(A) Historical

Which of the following is designed to allow ateam to discuss a topic over an extended periodof time while keeping the responses organizedby topic?


(A) Data library


(B) File sharing


(C) Push technology


(D) Internet telephony


(E) Threaded discussion group

(E) Threaded discussion group

Which of the following is NOT a correctcharacterization of batch processing?


(A) It allows immediate updating of master files.


(B) It provides physical batch totals to be used incontrol procedures.


(C) It provides efficient updating of master files.


(D) It is most applicable for processing routineperiodic activities.


(E) It allows efficient scheduling of processing.

(A) It allows immediate updating of master files.

Which of the following best describes how GPSunits function?


(A) The receiver sends out regular query pulsesand waits to receive responses from a GPSsatellite.


(B) The receiver is passive and listens for theregular signals from GPS satellites, whichare then processed to find the distance fromthe satellites.


(C) The receiver sends out radio signals that arereflected back by satellites and detected bythe unit.


(D) The receiver acts as a homing beacon that istracked by the GPS satellites, whichperiodically send out position updates foreach tracked receiver.


(E) The receiver can detect an invisibleelectronic grid projected onto Earth’s surfaceand compares the location on this grid to astored map of Earth.

(B) The receiver is passive and listens for the regular signals from GPS satellites, which are then processed to find the distance from the satellites.

Which of the following is the most likelynegative consequence of participating in a socialnetworking website?


(A) Unintended disclosure of privateinformation


(B) Increase in spam


(C) Infection by a virus


(D) Download of a cookie containing personalpreferences


(E) Download of spyware

(A) Unintended disclosure of private information

Which of the following is not part of input data controls in the context of information processing

Verifying syntax of the code

Which of the following best describes a worm?


(A) A program that displays advertisements inpop-up windows


(B) A program that is installed on a computerwithout the user’s knowledge


(C) A virus that masquerades as another activeprogram


(D) A program that traces user activity


(E) A program that replicates itself repeatedly,using up system resources

(E) A program that replicates itself repeatedly, using up system resources

Which of the following is true about open-sourcesoftware?Select all that apply:


(A) It always provides product support.


(B) Its source code is freely available.


(C) It is copyrighted.


(D) It is shareware.

(B) Its source code is freely available.


(C) It is copyrighted.

Which of the following is a database whose dataare scattered across several physical servers?


(A) Data mine


(B) Data warehouse


(C) Relational database


(D) Distributed database


(E) Integrated database

(D) Distributed database

When developing a website, which of thefollowing activities should occur closest to theend of the process?


(A) Creating the navigation structure


(B) Purchasing a domain name


(C) Verifying all the hyperlinks


(D) Designing the style sheets


(E) Finalizing the graphics

(C) Verifying all the hyperlinks

Which of the following can support cloud-basedapplication development and deployment?


(A) Communications as a service


(B) Platform as a service


(C) Infrastructure as a service


(D) Software as a service


(E) Network as a service

(B) Platform as a service

Knowledge management software is designed todo which of the following?


(A) Identify patterns and trends in data


(B) Collect and store data in a way that can beeasily accessed


(C) Manage day-to-day interactions withcustomers


(D) Help analyze data and facilitate decisionmaking


(E) Facilitate organizational learning

(E) Facilitate organizational learning

An online storefront developer should test thedifferent versions of which of the following inorder to ensure usability for all users?


(A) Database management systems


(B) Hypertext markup languages


(C) Compilers


(D) Web browsers


(E) Search engines

(D) Web browsers

For which of the following consumerapplications would there be the LEASTjustification to access a national credit historydatabase?


(A) Credit card


(B) Mortgage


(C) Student loan


(D) Savings account


(E) Automobile lease

(D) Savings account

Metadata is best described as which of thefollowing?


(A) End-user data


(B) Data about data


(C) Data stored in a Web file format


(D) Data gathered by spyware


(E) Data returned by an Internet search engine

(B) Data about data

Which of the following is NOT an advantage ofhaving an entire department using the sameoffice software suite?


(A) Lower cost per application than if purchasedindividually


(B) Ease of moving data between suiteapplications


(C) Ease of moving data between users in thesame department


(D) Ease of installation and maintenance


(E) Optimal functionality of individualapplication packages

(E) Optimal functionality of individual application packages

Which of the following problem-solvingtechniques allows users to start with high-levelinformation and then select more specific,lower-level details?


(A) Ad hoc analysis


B) Exception reporting


(C) Drill-down analysis


(D) RFM analysis


(E) Cluster analysis

(C) Drill-down analysis

The Bluetooth standard uses what transmissionmethod for data transfer?


(A) Infrared


(B) Ethernet cable


(C) Radio waves


(D) Satellite


(E) Wi-Fi

(C) Radio waves

After a consumer purchases and downloads anMP3 file, which of the following is legal? Selectall that apply.


(A) Copying the file for personal use


(B) Copying the file and giving the copy to afriend


(C) Giving the original file as a gift


(D) Selling the original file


(E) Uploading the file to a public website

(A) Copying the file for personal use


(C) Giving the original file as a gift

Which of the following describes a website thatprovides access to multiple services such asnews, weather, sports, and stock indexes?


(A) Host


(B) Portal


(C) Domain


(D) Hot site


(E) Home page

(B) Portal

Which of the following statements about rapidapplication development is true?


(A) It is used during prototyping.


(B) It is designed to be platform dependent.


(C) It reduces dependency on object-orientedprogramming.


(D) It begins before requirements are defined.


(E) It allows programmers to preemptivelydetermine user interfaces without the users’input.

(A) It is used during prototyping.

Which of the following is true about userpasswords?


(A) They should be changed only by theadministrator.


(B) They must be no more than eight charactersin length.


(C) They are requested by CAPTCHAs.


(D) They are most secure when they consist ofletters, numbers, and special characters.


(E) They are required to be unique.

(D) They are most secure when they consist of letters, numbers, and special characters.

Developers quickly create a version of a systemand give it to the users for feedback. Thedevelopers then use the users’ feedback to revisethe system. This process repeats until the usersapprove the system. This method of developing asystem is called


(A) waterfall


(B) prototyping


(C) object-oriented


(D) end-user development


(E) joint application design

(B) prototyping

Which of the following is NOT true of socialnetworking sites?


(A) It is unethical for a company recruitingprospective employees to track theirpresence on and posts to social networkingsites.


(B) Any unethical activity on a socialnetworking site could have negativeconsequences outside the site.


(C) Some sites enable members to share materialwith many other members simultaneously.


(D) Some sites enable members to maintaincontact with other members.


(E) Some sites facilitate access to commercialsites.

(A) It is unethical for a company recruiting prospective employees to track their presence on and posts to social networking sites.

Which of the following information technologyprocesses is used to produce documents that areduplicate, uneditable digital copies?


(A) Word processing


(B) Photocopying


(C) Document imaging


(D) Desktop publishing


(E) OCR scanning

(C) Document imaging

Which of the following is NOT a means ofsecondary storage?


(A) External hard drive


(B) Cache memory


(C) USB flash drive


(D) Cloud storage


(E) Secure digital card

(B) Cache memory

The capability of computerized systems to storeand exchange information poses a potentialthreat to the individual’s right to


(A) free speech


(B) privacy


(C) equal access to information


(D) assembly


(E) consumer protection

(B) privacy

Which of the following is NOT a characteristicof a decision support system, as it is usuallydefined?


(A) It can be used as an aid in solving ad hocproblems.


(B) It is useful for what-if analysis.


(C) It is intended to help managers makedecisions.


(D) It makes the one best or optimal decision.


(E) It uses appropriate statistical andmathematical models.

(D) It makes the one best or optimal decision.

Which of the following uses the Internet, asopposed to using the public switched network, toenable voice communication?


(A) TCP/IP


(B) VoIP


(C) EFT


(D) EDI


(E) PBX

(B) VoIP

Which data model uses two-dimensional tablesto represent data structures?


(A) Relational


(B) Hierarchical


(C) Network


(D) Multidimensional


(E) Object-oriented

(A) Relational

Which of the following types of systemsdevelopment methods would be appropriatewhen a company does not have an expert ISdepartment?


I. Outsourcing


II. Traditional SDLC


III. RAD



(A) I only


(B) II only


(C) III only


(D) I and III only


(E) I, II, and III

(A) I only

Planning, scheduling, and overseeing thedevelopment of a new information system are allcomponents of which of the following?


(A) Systems analysis


(B) System modeling


(C) Knowledge management


(D) Cost-benefit analysis


(E) Project management

(E) Project management

Which of the following activities CANNOT beperformed in a link in an HTML document?


(A) Sending an e-mail


(B) Printing the current Web page


(C) Moving to another location on the currentWeb page


(D) Opening another Web page in the currentbrowser window


(E) Opening another Web page in a new browserwindow

(B) Printing the current Web page

A manager of a small business wants to use acomputer to store information about clients,vendors, inventory (item, number, price), andorders. The manager needs to be able to sort andgroup data for various reports. Which of thefollowing types of software packages would bebest for this task?


(A) Word processor


(B) Spreadsheet


(C) Database management system


(D) Presentation software


(E) System software

(C) Database management system

Which of the following directly affects themost users?


(A) Hacking


(B) Phishing


(C) Cyberextortion


(D) Identity theft


(E) Denial of service attacks

(E) Denial of service attacks

In considering the economic feasibility of asystems development project, which of thefollowing would a project manager be LEASTlikely to consider?


(A) The cost of developing the system comparedwith the potential benefits of using thesystem


(B) The return on the initial investment on thesystem


(C) When the project will break even


(D) Whether the company can afford the project


(E) Whether the hardware can be acquired forthe project

(E) Whether the hardware can be acquired for the project

A program written to access and update a masterdatabase that maintains sales of tickets to anupcoming concert is


(A) system software


(B) networking software


(C) a transaction processing system


(D) an operating system


(E) a knowledge management system

(C) a transaction processing system

Which of the following user-based activitieswould NOT be part of a website design project?


(A) Users being asked what information shouldappear on the website


(B) Users being asked what programminglanguage they are most comfortable with


(C) Users being asked about their securityconcerns


(D) Users being asked what statistical feedbackthey would like to receive(E) Users being instructed to look at similarwebsites

(B) Users being asked what programming language they are most comfortable with

Which of the following is an advantage ofoutsourcing?


(A) It enables a company to focus on corecompetencies.


(B) It decreases dependence on otherorganizations.


(C) It decreases the risk of disclosingconfidential information.


(D) It improves managerial control.


(E) It enhances in-house technical expertise.

(A) It enables a company to focus on core competencies.

Batch processing is LEAST likely to beapplied to(A) periodic merging of transaction records


(B) ad hoc querying of a marketing informationdatabase


(C) creating management reports


(D) transmitting monthly sales projections


(E) populating a data warehouse

(B) ad hoc querying of a marketing information database

Which of the following is a software agent usedby some Internet search engines to generatesearch results?


(A) Web bot


(B) TCP filter


(C) Auto responder


(D) Worm


(E) Macro

(A) Web bot

The maintenance phase of the systemdevelopment process could include all of thefollowing activities EXCEPT


(A) correcting errors in the software that weredetected after implementation


(B) changing the heading on a report


(C) updating entries in the tax table to reflectchanges in the tax rates


(D) adding a new function to an existing system


(E) performing a complete rewrite for anexisting system

(E) performing a complete rewrite for an existing system

The type of network that would most likely beused to link a corporation’s headquarters with itsfour branch offices located throughout a state isreferred to as


(A) a metropolitan area network


(B) a local area network


(C) an office area network


(D) a wide area network


(E) a broad area network

(D) a wide area network

Goals of a supply-chain management systeminclude which of the following?


I. Facilitate upselling of the product


II. Deliver the product to the customer morerapidly


III. Reduce the cost of procurement


(A) I only


(B) I and II only


(C) I and III only


(D) II and III only


(E) I, II, and III

(D) II and III only

Which of the following is a set of protocols usedto link different types of computers over theInternet?


(A) HTML


(B) HTTP


(C) ERP


(D) TCP/IP


(E) W3C

(D) TCP/IP

Which of the following does NOT provide datasecurity or access security?


(A) Data encryption


(B) Password protection


(C) Data encoding


(D) Biometric scan


(E) Digital certificate

(C) Data encoding

Which of the following is the term used when awebsite automatically downloads data or files toa computer whenever new data are available or atscheduled intervals?


(A) Web streaming


(B) Push technology


(C) Pipelining


(D) Spamming


(E) Web crawling

(B) Push technology

A geographic information system must havewhich of the following characteristics?


I. Records have identified geographiclocations.


II. The system uses global positioningsatellites.


III. The system provides results in a graphicformat.


(A) I only


(B) I and II only


(C) I and III only


(D) II and III only


(E) I, II, and III

(C) I and III only

Managers in an organization often usespreadsheets to assist with decision making.The process of using a spreadsheet to try outalternatives is called


(A) what-if analysis


(B) data mining


(C) flowcharting


(D) querying


(E) data manipulation

(A) what-if analysis

Having multiple operating systems installed onthe same personal computer enables the user todo each of the following EXCEPT


(A) run a proprietary operating system and anopen source operating system on the samecomputer


(B) run different versions of the same operatingsystem on the same computer


(C) access a larger variety of software


(D) create multiple IP addresses for thecomputer


(E) create a virtual server

(D) create multiple IP addresses for the computer

Which of the following is an asynchronoustechnology that a virtual team can use forcommunication?


(A) Conference call


(B) Videoconferencing


(C) VoIP


(D) E-mail


(E) Webinar

(D) E-mail

Which of the following is an application that canuse RFID technology?Select all that apply.


(A) Data transfer between smartphones


(B) Toll collection on a limited-access roadway


(C) Inventory management


(D) Credit card use


(E) Internet access


(F) Animal tracking

(B) Toll collection on a limited-access roadway


(C) Inventory management


(D) Credit card use


(F) Animal tracking

The process through which a user is verified andvalidated to access a computer network/system isreferred to as


(A) encryption


(B) password protection


(C) authentication


(D) account validation


(E) certification

(C) authentication

What is the term that describes the storage ofidentical data in multiple files?


(A) Data dependency


(B) Data integrity


(C) Data integration


(D) Data redundancy


(E) Data structure

(D) Data redundancy

Under which of the following conditions can apublic wireless network be used to transmitconfidential data most securely?


(A) The local computer has been scanned forviruses.


(B) The local computer has the latest operatingsystem and updates.


(C) The local computer connects to the networkusing VPN.


(D) All files on the local computer have beenbacked up.


(E) The network password meets all securitycriteria.

(C) The local computer connects to the network using VPN.

Using an ERP system has which of the followingadvantages?


I. It is easier to install than a typicaltransaction processing system.


II. It provides a centralized database fororganizational data.


III. It integrates processes over theorganization.


(A) I only


(B) II only


(C) I and II only


(D) II and III only


(E) I, II, and III

(D) II and III only


What is the primary difference between an intranet web page and an internet web page?

Restriction of access

A network administration is least likely to recommend which of the following technologies to share large quantities of information in a knowledge management system


A. Email


B. Wiki


C. Intranet


D. Discussion board


E. Shared network device

A. Email

A user has visited several websites, making purchases, initiating searches,and filling put online forms. Which of the following could the user access to revisit the webpage?


A. Cookies


B. Main memory


C. Internet preference


D. Web privacy settings


E. Web browser history

E. Web browser history

In a company with a large and effective IT workforce which of the following is the most likely title of the person who recommends enterprise wide upgrades of computer Hardware

Chief Technology Officer

A disaster recovery plan to safeguard a companies computer system can be used for all of the following occurrences except

System upgrades and hardware maintenance

Which of the following explains why digital Networks can transmit different types of data

Each data can be represented by strings and bits

what is the term that refers to the downloading of live video, audio, or animation in such a manner that the user can begin to access the content before the download is complete

Streaming