Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
151 Cards in this Set
- Front
- Back
The Internet is:
|
a large network of networks.
|
|
Which of the following is a contributing factor as to why the Internet was created?
|
A. To provide communication from various locations
B. To provide a common source of communication with many computers C. To serve as a reliable form of communication D. All of the above. |
|
The practice of tricking unsuspecting Internet users into sharing personal information with scammers, possibly leading to identity theft, is known as:
|
phishing.
|
|
Individual Internet users enter an ISP through a:
|
point of presence.
|
|
The 's' in https:// stands for ________ site.
|
Secure
|
|
All of the following are parts of the URL EXCEPT:
|
hyperpoint.
|
|
Which of the following statements concerning packet switching is FALSE?
|
All packets must take the same route to their destination.
|
|
An IP address that never changes is called a(n)
|
static address
|
|
Which type of e-commerce occurs when a merchant uses the Internet to supply consumers with goods or services?
|
B2C
|
|
All of the following are indications that a Web site is secure EXCEPT
|
a plug-in icon on the status bar.
|
|
The purpose of following a deliberate procedure when buying a microcomputer is to _________________ .
|
clarify your thinking about what your systems needs are
|
|
Direct manufacturers are companies that _______________ .
|
sell directly to the public
|
|
What four deliberate steps (in order of priority) should you take when you plan on buying a microcomputer system?
|
Perform an analysis of your processing needs before clarifying budget restraints, software needs and hardware needs.
|
|
Which of the following activities is carried out by the ALU?
|
completion of all arithmetic calculations
|
|
When there is not enough RAM installed in your system, it becomes limited in how fast it can send data to the CPU because there is not enough memory. This is referred to as being
|
memory bound
|
|
When referring to hard drives, seek time and latency are two factors that make up
|
access time
|
|
A computer monitor's resolution is the
|
number of pixels displayed on the screen.
|
|
A combination of a phone and a PDA is referred to as a
|
smartphone
|
|
An analog-to-digital converter chip
|
converts the sound waves from a voice into a digital signal.
|
|
__________ is the text-entry system for drawing images and entering text by writing on the surface of a tablet PC.
|
digital ink
|
|
Which of the following actions can help to improve system reliability?
|
Remove temporary Internet files and run Disk Defragmenter regularly.
|
|
All of the following approaches can be taken to protect your notebook computer from theft EXCEPT
|
installing a removable internal harddrive
|
|
Which of the following is NOT a possible primary key?
|
street address
|
|
Which of the following refers to a decision-making support system for teams?
|
GDSS
|
|
Employees involved with the distribution and communication of information are called
|
data workers
|
|
These systems often present summary information in graphical format.
|
ESS
|
|
A parent node with several child nodes is what kind of relationship?
|
one-to-many
|
|
When data is processed at the same time that a transaction occurs, it is called_____.
|
real-time processing
|
|
____ databases store not only data but also instructions to manipulate the data.
|
object-oriented
|
|
which of the following is not an advantage of using a database
|
reliability
|
|
During which phase of the Systems Analysis and Design Cycle are users trained to use the new system?
|
Systems Implementation
|
|
The ____ approach of conversion simply involves abandoning the old system and using the new system on a specific date
|
direct
|
|
The ongoing testing and analysis of an existing system is called system___.
|
maintenance
|
|
The development of the program specification is associated with the____ step in the Systems Design Life Cycle.
|
analysis
|
|
In the preliminary investigation phase of the System Design Life Cycle, which one of the following tasks would NOT be included?
|
gathering the specific data
|
|
The information flow required by supervisors is mostly ________
|
vertical
|
|
Which view of information focuses on the meaning and content of the data?
|
logical view
|
|
The most important part of any information system is data?
|
people
|
|
During the __________ phase, the current and proposed systems are documented using flowcharts and data-flow diagrams.
|
design
|
|
__________ is a systematic approach in which a problem is broken down into a series of high-level tasks.
|
Top-down design
|
|
Photo printers for home use are available in two technologies: ink-jet and
|
dye-sublimation
|
|
Which of the following is NOT video codec?
|
MP3
|
|
Digital cameras support the ________ file types.
|
RAW and JPEG
|
|
In digital recording, the recording device needs a chip called a(n) ________, which digitizes waves into a series of numbers.
|
analog-to-digital converter (ADC)
|
|
Graphic programs widely used in the graphic arts profession include __________.
|
desktop publishing programs, image editors and illustration programs
|
|
What is the wearable display device called that includes two LCD panels?
|
headset
|
|
What do you call the devices that translate eye and body movements into computer input?
|
Biological feedback
|
|
All of the following are steps in the CPU machine cycle EXCEPT
|
generate
|
|
The least expensive and most simplistic type of RAM is
|
DRAM
|
|
The ability to work on more than one instruction during the four stages of processing is called
|
pipelining
|
|
A network configuration in which each device is attached to a common connecting cable is called a ____ network.
|
Bus
|
|
Which networking technology operates at the same frequency as wireless phones and microwaves?
|
Wi-Fi
|
|
Which of the following is NOT a home networking technology?
|
Infrared
|
|
Assume your neighbor logs in to his company e-mail server while using your home computer but forgets to exit the application. Which statement is TRUE concerning the relationship between you and your neighbor's business-related e-mail?
|
It is considered unethical by many professional codes of conduct to read the e-mail.
|
|
Sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network?
|
routers and switches
|
|
Which network topology is considered a passive topology because its nodes do nothing to help the data move through the network?
|
bus
|
|
Packet __________ is a form of protection for your computer that looks at each packet that comes into your computer network.
|
screening
|
|
A __________ server (for example, a print server or communications server) has one main function.
|
dedicated
|
|
One or more network switches to which ISPs connect are referred to as:
|
Internet Exchange Points (IXPs)
|
|
Banks of modems where individual users connect to the internet are called __________
|
router points
|
|
The last step of the programming procedure is concerned with:
|
maintenance
|
|
The ________ describes the development and technical details of a program, including how the program works and how users interact with the program.
|
documentation
|
|
____ refers to testing by a select group of potential users in the final stage of testing a program.
|
Beta testing
|
|
Object-oriented programming ______________.
|
allows you to interact with objects when coding software
|
|
A(n) __________ error could be the result of the programmer making an incorrect calculation.
|
logic
|
|
The actual writing of a program in a programming language is called
|
coding
|
|
Which statement about selecting the right programming language for a project is FALSE?
|
All programming languages require the same amount of time to execute.
|
|
Which of the following is the first stage of the PDLC?
|
specification
|
|
What object-oriented langage is used programming computer applications?
|
C++
|
|
The loop decision point consists of three features: an initial value, a set of actions to be performed, and a(n)
|
test condition
|
|
Which of the following would NOT be considered correct netiquette
|
Using all capital letters in an e-mail response
|
|
If software falls under the General Public License, it:
|
may be copied and used freely
|
|
Which of the following is NOT considered plagiarism?
|
Use a quote from a public speech on your history take-home exam, but cite the orator in your bibliography.
|
|
The ethical issue that involves who is able to read and use data is
|
access
|
|
If a country requires Internet service providers to block objectionable foreign Web sites, this raises issues regarding
|
censorship
|
|
If an individual created a set of songs that imitated the style and lyrics of songs from Disney's "The Lion King," this would be an issue dealing with
|
copyright
|
|
At the heart of every computer code of ethics is to:
|
avoid harm and protect human life
|
|
A friend gives you a disk containing software, but when you try to install it on your computer, the installation fails. What might cause this problem?
|
the software is machine-dependent and has already been installed elsewhere
|
|
Which of the following is NOT a measure for protecting the security of your computer?
|
accessing instant messenger
|
|
the program that search engines run on
|
spider
|
|
viruses,worms, adware, and spyware are all types of
|
malware
|
|
devices connected to a network are called
|
nodes
|
|
type of network administration that uses a device to communicate between computers
|
client/server
|
|
the actual speed of transfer is called
|
throughput
|
|
the device that allows a computer to connect to a network is called a
|
Network interface card
|
|
WAN, MAN, and LAN are three types of
|
classifications of Client/server networks
|
|
the phystical layout of computer transmission media and other components is called a networks
|
topology
|
|
The four types of network topologies include bus, ring,____, and hybrid
|
star
|
|
_______ is an active topology, where each computer accepts then resends the packet
|
ring
|
|
-_____ is a passive topology, where the nodes do not move the data along the network
|
Bus
|
|
In the _____ topology all nodes are connected to a central communication device
|
star
|
|
what device in a network makes the packets
|
Network Interface Card
|
|
_____ send information between two networks using IPs
|
routers
|
|
__________ is a collection of large national and international networks, and is the first tier of the network hierarchy
|
internet backbone
|
|
Tier 2 of the network hierarchy is made up of
|
regional or national ISPs
|
|
Tier3 of the network hierarchy is made up of
|
local ISPs
|
|
_______ are high speed twisted pair lines that are numbered according to their throughput
|
T-lines
|
|
the protocol for sending mail over the internet
|
SMTP, simple mail transfer protocol
|
|
protocol for attaching files to email
|
Mutltipurpose Internet mail extensions(MIME)
|
|
______ is a list of instructions
|
a program
|
|
_________ involves general problem solving
|
systems analysis and design
|
|
__________ involves specific problem solving
|
programming
|
|
__________ is the process of translating a task into a series of commands a computer will use to perform that task
|
programming
|
|
Step 1 of the programming involves
|
program specification, describing the problem and setting goals
|
|
Step 2 of the programming procedure involves
|
program design
|
|
_______ involves defining methods and data
|
object-oriented analysis
|
|
_______ is a short hand method of writing instructions
|
psuedocode
|
|
program_________ are detailed sequence of steps graphically displaying flow of actions and decision points
|
flowcharts
|
|
Step 3 of the programming procedure involves
|
program code
|
|
______ is the translation of an algorithm into a programming language
|
coding
|
|
Type of programming language used to build windows applications
|
Visual Basic
|
|
Type of programming language used for operating systems
|
C
|
|
Type of programming language used for modern applications that includes object-oriented design
|
C++
|
|
______is a programming language that is platform independent and has many object-oriented features
|
Java
|
|
______ not true programming languages but sets of rules for marking up blocks of text so that a browser knows how to display them
|
XHTML and HTML
|
|
________ used to make web sites interactive
|
Javascript
|
|
_____ and ________ are languages that transfer user information into a request for more infromation from a company's computer
|
ASP, JSP
|
|
_______ enables elaborate animations to be created fro webpages
|
Flash
|
|
________ enables computers to efficiently transfer information between web sites
|
Extensive Mark-up Language (XML)
|
|
type of protocol that prepares data fro transmission, checks for errors, and resends lost data
|
Transmission control protocol
|
|
type of protocol that sends data from computer to computer
|
Internet protocol
|
|
type of protocol that is used in file sharing, uploading and downloading files
|
File transfer protocol
|
|
SSL stands for _____, which protects sensitive information
|
secure socket layer
|
|
______ number of times per minute an MP3 is measured
|
sampling rate
|
|
_______database has a one-to-many relationship
|
Hierarchal
|
|
_______ database has a many-to-many relationship
|
network
|
|
_______ has a flexible one-to-many relationship
|
relational
|
|
_______provides timely and accurate information for managers to make business decisions
|
MIS or Management Informations systems
|
|
GDSS means
|
Group decision support system
|
|
___ is an information system that is designed for top-level management
|
ESS or executive support system
|
|
______ information system such as CAD and CAM used by workers such as engineers and scientists
|
KWS knowledge work system
|
|
______ information system used by office workers such as secretaries and clerks
|
OSS or office support system (OAS office automation system)
|
|
The five parts of an information system are procedures, software, hardware, data, and the most important ________
|
people
|
|
________ is a collection of activities and elements working together to accomplish a common goal
|
system
|
|
The first phase of the SDLC involves
|
identifying problems and suggesting broad alternatives as solutions
|
|
Phase ______ involves designing the system
|
three
|
|
Phase _______ involves system analysis
|
two
|
|
Phase ______ involves system maintenance
|
six
|
|
Phase ______ involves system development
|
four
|
|
Phase______ involves system installation and implementation
|
five
|
|
________ is described as a "quickie" way of developing a system
|
prototyping
|
|
the speed of this refers to how fast operations are synchronized
|
system clock
|
|
_____ and _____ make up the central processing unit
|
control unit and arithmetic logic unit
|
|
Step ____ of the SDLC involves Program testing
|
four
|
|
______ means testing a program and eliminating the errors
|
debugging
|
|
_______ errors are violations in rules of programming language
|
syntax
|
|
_______errors is when instructions are out of place
|
logic
|
|
System documentation, descriptions and procedures about a program are completed in step_______ of SDLC
|
five
|
|
Step six of SDLC involves ________ where errors are fixed and updated
|
Program Maintenance
|
|
who is the leading group of computer criminals
|
employees
|
|
_____ is the guidelines that involve showing respect for others and yourself while you are online
|
netiquette
|