• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/151

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

151 Cards in this Set

  • Front
  • Back
The Internet is:
a large network of networks.
Which of the following is a contributing factor as to why the Internet was created?
A. To provide communication from various locations
B. To provide a common source of communication with many computers
C. To serve as a reliable form of communication
D. All of the above.
The practice of tricking unsuspecting Internet users into sharing personal information with scammers, possibly leading to identity theft, is known as:
phishing.
Individual Internet users enter an ISP through a:
point of presence.
The 's' in https:// stands for ________ site.
Secure
All of the following are parts of the URL EXCEPT:
hyperpoint.
Which of the following statements concerning packet switching is FALSE?
All packets must take the same route to their destination.
An IP address that never changes is called a(n)
static address
Which type of e-commerce occurs when a merchant uses the Internet to supply consumers with goods or services?
B2C
All of the following are indications that a Web site is secure EXCEPT
a plug-in icon on the status bar.
The purpose of following a deliberate procedure when buying a microcomputer is to _________________ .
clarify your thinking about what your systems needs are
Direct manufacturers are companies that _______________ .
sell directly to the public
What four deliberate steps (in order of priority) should you take when you plan on buying a microcomputer system?
Perform an analysis of your processing needs before clarifying budget restraints, software needs and hardware needs.
Which of the following activities is carried out by the ALU?
completion of all arithmetic calculations
When there is not enough RAM installed in your system, it becomes limited in how fast it can send data to the CPU because there is not enough memory. This is referred to as being
memory bound
When referring to hard drives, seek time and latency are two factors that make up
access time
A computer monitor's resolution is the
number of pixels displayed on the screen.
A combination of a phone and a PDA is referred to as a
smartphone
An analog-to-digital converter chip
converts the sound waves from a voice into a digital signal.
__________ is the text-entry system for drawing images and entering text by writing on the surface of a tablet PC.
digital ink
Which of the following actions can help to improve system reliability?
Remove temporary Internet files and run Disk Defragmenter regularly.
All of the following approaches can be taken to protect your notebook computer from theft EXCEPT
installing a removable internal harddrive
Which of the following is NOT a possible primary key?
street address
Which of the following refers to a decision-making support system for teams?
GDSS
Employees involved with the distribution and communication of information are called
data workers
These systems often present summary information in graphical format.
ESS
A parent node with several child nodes is what kind of relationship?
one-to-many
When data is processed at the same time that a transaction occurs, it is called_____.
real-time processing
____ databases store not only data but also instructions to manipulate the data.
object-oriented
which of the following is not an advantage of using a database
reliability
During which phase of the Systems Analysis and Design Cycle are users trained to use the new system?
Systems Implementation
The ____ approach of conversion simply involves abandoning the old system and using the new system on a specific date
direct
The ongoing testing and analysis of an existing system is called system___.
maintenance
The development of the program specification is associated with the____ step in the Systems Design Life Cycle.
analysis
In the preliminary investigation phase of the System Design Life Cycle, which one of the following tasks would NOT be included?
gathering the specific data
The information flow required by supervisors is mostly ________
vertical
Which view of information focuses on the meaning and content of the data?
logical view
The most important part of any information system is data?
people
During the __________ phase, the current and proposed systems are documented using flowcharts and data-flow diagrams.
design
__________ is a systematic approach in which a problem is broken down into a series of high-level tasks.
Top-down design
Photo printers for home use are available in two technologies: ink-jet and
dye-sublimation
Which of the following is NOT video codec?
MP3
Digital cameras support the ________ file types.
RAW and JPEG
In digital recording, the recording device needs a chip called a(n) ________, which digitizes waves into a series of numbers.
analog-to-digital converter (ADC)
Graphic programs widely used in the graphic arts profession include __________.
desktop publishing programs, image editors and illustration programs
What is the wearable display device called that includes two LCD panels?
headset
What do you call the devices that translate eye and body movements into computer input?
Biological feedback
All of the following are steps in the CPU machine cycle EXCEPT
generate
The least expensive and most simplistic type of RAM is
DRAM
The ability to work on more than one instruction during the four stages of processing is called
pipelining
A network configuration in which each device is attached to a common connecting cable is called a ____ network.
Bus
Which networking technology operates at the same frequency as wireless phones and microwaves?
Wi-Fi
Which of the following is NOT a home networking technology?
Infrared
Assume your neighbor logs in to his company e-mail server while using your home computer but forgets to exit the application. Which statement is TRUE concerning the relationship between you and your neighbor's business-related e-mail?
It is considered unethical by many professional codes of conduct to read the e-mail.
Sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network?
routers and switches
Which network topology is considered a passive topology because its nodes do nothing to help the data move through the network?
bus
Packet __________ is a form of protection for your computer that looks at each packet that comes into your computer network.
screening
A __________ server (for example, a print server or communications server) has one main function.
dedicated
One or more network switches to which ISPs connect are referred to as:
Internet Exchange Points (IXPs)
Banks of modems where individual users connect to the internet are called __________
router points
The last step of the programming procedure is concerned with:
maintenance
The ________ describes the development and technical details of a program, including how the program works and how users interact with the program.
documentation
____ refers to testing by a select group of potential users in the final stage of testing a program.
Beta testing
Object-oriented programming ______________.
allows you to interact with objects when coding software
A(n) __________ error could be the result of the programmer making an incorrect calculation.
logic
The actual writing of a program in a programming language is called
coding
Which statement about selecting the right programming language for a project is FALSE?
All programming languages require the same amount of time to execute.
Which of the following is the first stage of the PDLC?
specification
What object-oriented langage is used programming computer applications?
C++
The loop decision point consists of three features: an initial value, a set of actions to be performed, and a(n)
test condition
Which of the following would NOT be considered correct netiquette
Using all capital letters in an e-mail response
If software falls under the General Public License, it:
may be copied and used freely
Which of the following is NOT considered plagiarism?
Use a quote from a public speech on your history take-home exam, but cite the orator in your bibliography.
The ethical issue that involves who is able to read and use data is
access
If a country requires Internet service providers to block objectionable foreign Web sites, this raises issues regarding
censorship
If an individual created a set of songs that imitated the style and lyrics of songs from Disney's "The Lion King," this would be an issue dealing with
copyright
At the heart of every computer code of ethics is to:
avoid harm and protect human life
A friend gives you a disk containing software, but when you try to install it on your computer, the installation fails. What might cause this problem?
the software is machine-dependent and has already been installed elsewhere
Which of the following is NOT a measure for protecting the security of your computer?
accessing instant messenger
the program that search engines run on
spider
viruses,worms, adware, and spyware are all types of
malware
devices connected to a network are called
nodes
type of network administration that uses a device to communicate between computers
client/server
the actual speed of transfer is called
throughput
the device that allows a computer to connect to a network is called a
Network interface card
WAN, MAN, and LAN are three types of
classifications of Client/server networks
the phystical layout of computer transmission media and other components is called a networks
topology
The four types of network topologies include bus, ring,____, and hybrid
star
_______ is an active topology, where each computer accepts then resends the packet
ring
-_____ is a passive topology, where the nodes do not move the data along the network
Bus
In the _____ topology all nodes are connected to a central communication device
star
what device in a network makes the packets
Network Interface Card
_____ send information between two networks using IPs
routers
__________ is a collection of large national and international networks, and is the first tier of the network hierarchy
internet backbone
Tier 2 of the network hierarchy is made up of
regional or national ISPs
Tier3 of the network hierarchy is made up of
local ISPs
_______ are high speed twisted pair lines that are numbered according to their throughput
T-lines
the protocol for sending mail over the internet
SMTP, simple mail transfer protocol
protocol for attaching files to email
Mutltipurpose Internet mail extensions(MIME)
______ is a list of instructions
a program
_________ involves general problem solving
systems analysis and design
__________ involves specific problem solving
programming
__________ is the process of translating a task into a series of commands a computer will use to perform that task
programming
Step 1 of the programming involves
program specification, describing the problem and setting goals
Step 2 of the programming procedure involves
program design
_______ involves defining methods and data
object-oriented analysis
_______ is a short hand method of writing instructions
psuedocode
program_________ are detailed sequence of steps graphically displaying flow of actions and decision points
flowcharts
Step 3 of the programming procedure involves
program code
______ is the translation of an algorithm into a programming language
coding
Type of programming language used to build windows applications
Visual Basic
Type of programming language used for operating systems
C
Type of programming language used for modern applications that includes object-oriented design
C++
______is a programming language that is platform independent and has many object-oriented features
Java
______ not true programming languages but sets of rules for marking up blocks of text so that a browser knows how to display them
XHTML and HTML
________ used to make web sites interactive
Javascript
_____ and ________ are languages that transfer user information into a request for more infromation from a company's computer
ASP, JSP
_______ enables elaborate animations to be created fro webpages
Flash
________ enables computers to efficiently transfer information between web sites
Extensive Mark-up Language (XML)
type of protocol that prepares data fro transmission, checks for errors, and resends lost data
Transmission control protocol
type of protocol that sends data from computer to computer
Internet protocol
type of protocol that is used in file sharing, uploading and downloading files
File transfer protocol
SSL stands for _____, which protects sensitive information
secure socket layer
______ number of times per minute an MP3 is measured
sampling rate
_______database has a one-to-many relationship
Hierarchal
_______ database has a many-to-many relationship
network
_______ has a flexible one-to-many relationship
relational
_______provides timely and accurate information for managers to make business decisions
MIS or Management Informations systems
GDSS means
Group decision support system
___ is an information system that is designed for top-level management
ESS or executive support system
______ information system such as CAD and CAM used by workers such as engineers and scientists
KWS knowledge work system
______ information system used by office workers such as secretaries and clerks
OSS or office support system (OAS office automation system)
The five parts of an information system are procedures, software, hardware, data, and the most important ________
people
________ is a collection of activities and elements working together to accomplish a common goal
system
The first phase of the SDLC involves
identifying problems and suggesting broad alternatives as solutions
Phase ______ involves designing the system
three
Phase _______ involves system analysis
two
Phase ______ involves system maintenance
six
Phase ______ involves system development
four
Phase______ involves system installation and implementation
five
________ is described as a "quickie" way of developing a system
prototyping
the speed of this refers to how fast operations are synchronized
system clock
_____ and _____ make up the central processing unit
control unit and arithmetic logic unit
Step ____ of the SDLC involves Program testing
four
______ means testing a program and eliminating the errors
debugging
_______ errors are violations in rules of programming language
syntax
_______errors is when instructions are out of place
logic
System documentation, descriptions and procedures about a program are completed in step_______ of SDLC
five
Step six of SDLC involves ________ where errors are fixed and updated
Program Maintenance
who is the leading group of computer criminals
employees
_____ is the guidelines that involve showing respect for others and yourself while you are online
netiquette