Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/45

Click to flip

45 Cards in this Set

  • Front
  • Back
Which abbreviation represents a data transfer rate of approximately 1 million bits per second?
The abbreviation 1 Mbps represents a data transfer rate of approximately 1 million bits per second. The abbreviation 1 Gbps represents a data transfer rate of approximately 1 billion bits per second. The abbreviations 1 MB (1 megabyte) and 1 Mbits (1 megabit) represent static units of measurement rather than data transfer rates, because they are not expressed in terms of time.
How many bytes of memory are contained in a kilobyte?
1024
Which type of digital graphics is comprised of geometric shapes?
Vector
Which term denotes a graphical-user interface added as an outer layer to an operating system?
A shell is a graphical-user interface added as an outer layer to an operating system. DOS and OS/2 are different types of operating systems.
In the software development process, a language translator that converts a high-level language program into machine language for later execution is known as a
Compilers convert high-level language software programs into machine language for later execution. Interpreters convert high-level language programs into machine language for immediate execution.
Which of the following translates assembly-language software programs into machine language?
An assembler is a program that translates assembly-language software programs into machine language. Profilers collect statistics about programs to help computer systems run more efficiently
The first spreadsheet software was
VisiCalc was the first spreadsheet program. Its development helped popularize the use of personal computers in the early 1980s. Lotus 1-2-3, Microsoft Excel, and Quattro Pro are spreadsheet programs that were developed after VisiCalc.
Which type of computer processor has special enhancements for running multimedia applications?
The Intel MMX computer processor has special enhancements for running multimedia applications. The Intel Celeron processor is an economy processor designed for entry-level computer systems.
In a database applications program, a file is comprised of groups of
Records. Within databases, files are comprised of groups of records. Records contain multiple fields that store different types of information about a subject.
Which was the precursor of modern database management software?
File management software was the precursor of modern database management software.
In a traditional filing system, files that are NOT linked together are known as
Flat Files. In a traditional filing system, files that are not linked together are known as flat files. Schemas are descriptions of entire database structures that are used by database software to maintain a database
In which type of database models are files connected by means of physical links or addresses?
Network. In network database models, files are connected by means of physical links or addresses. Relational database models connect files using logical relationships rather than physical links or addresses.
What is an advantage of the network database model over the relational database model?
In general, network database models operate more efficiently than do relational database models. Network databases can generally retrieve results more quickly than can relational databases. However, network databases lack the flexibility of relational databases.
Information is transferred on the World Wide Web through what?
HTTP. Information is transferred on the Web through the use of HTTP, or hypertext transfer protocol. HTML is used to format the information that is transferred.
What enables individuals to join and participate in Internet group chat sessions?
The IRC protocol enables individuals to join and participate in Internet chat sessions. IRC stands for Internet Relay Chat.
What is used to connect two existing compatible networks to form a larger single network?
A bridge is a coupling device that connects two existing compatible networks to form a larger single network. A router is a device that links two individual networks whose characteristics are not compatible.
Each of the following represents a network topology EXCEPT



a. star.

b. bus.

c. gateway.

d. ring.
The correct answer is C. A gateway is not a type of network typology. It is an interface that facilitates communication between dissimilar networks. Star, bus, and ring all represent types of network topologies.
Each of the following represents a type of error detection EXCEPT



a. arithmetic checksum.

b. cyclic redundancy checksum.

c. simple parity.

d. Hamming code.
The correct answer is D. A Hamming code is a data code that is used in performing error correction. Arithmetic checksum, cyclic redundancy checksum, and simple parity all represent types of error detection.
Which of the following represents an advantage of parity bit error detection?



a. It is inexpensive.

b. It is highly sophisticated.

c. It is useful for particularly noisy transmission channels.

d. It is designed to detect single bit changes.
The correct answer is A. The primary advantage of parity bit error detection is that this method is inexpensive. It costs only one bit per byte of transmitted data. The fact that parity bit checking is designed to detect only single bit changes represents a disadvantage of the method.
What is produced using Lempel-Ziv encoding?
Zip files are produced using data compression based on Lempel-Ziv encoding. RLE (run-length encoding) and Huffman coding represent alternative data compression schemes.
Which step generally comes first within the software life cycle?
The analysis step generally comes first within the software life cycle. During the analysis phase, developers identify what the software should accomplish.
Procedural programming languages are also known as
imperative languages. Functional, object-oriented, and declarative languages each represent different programming language paradigms.
What type of programming language paradigms divides a program into units that describe entities with specific attributes or capabilities?
The object-oriented paradigm divides programs into units that describe entities, or objects, with specific attributes or capabilities. Applicative languages are another name for functional programming languages, which operate by connecting functions via their inputs and outputs.
An ordered set of executable steps that defines how a task is performed is known as a(n)
algorithm. Casing is a method for naming algorithms within software programs.
User-defined data types that include definitions of operations are known as
abstract data types. Real, or float, data types are primitive data types and are not user-defined.
What most likely begins pseudocode instructions for an input operation?
Pseudocode for input operations instructs a program to receive particular values. Instructions for input operations begin with the expression "Get the values for . . . ."
In C++ programming language, the output stream is known as
Cout. Cin represents the input stream.
What is a notation for representing the syntax of a programming language?
Backus-Naur Form (BNF) is a notation for representing the syntax of a programming language.
In algorithmic processes, a collection of instructions that is completed as a set and then repeated in a looping manner is known as a(n)
An iterative structure is a collection of instructions that is repeated in a looping manner within an algorithmic process. In iterative structures, instructions are completed as a set and then repeated.
Each of the following represents a type of software program control mechanism EXCEPT



a. sequential.

b. looping.

c. function.

d. conditional.
Functions represent units of programming code that perform specific procedures. Sequential, looping, and conditional are all types of control mechanisms.
According to the Church-Turing thesis, the limits of computability are defined by:
Turing Machines. The Church-Turing thesis states that "if there is an algorithm to do a symbol manipulation task, then there is a Turing machine to do that task." This thesis implies that Turing machines define the limits of computability. In this view, if a Turing machine cannot perform a particular symbol manipulation task, this means that there is no algorithm for this task, so no real computer will be able to perform the task either.
Who of the following led an effort that laid the foundation for the development of COBOL in 1959?
Grace Murray Hopper led an effort that laid the foundation for the development of COBOL in 1959. John Kemeny and Thomas Kurtz helped to develop BASIC in 1964.
The argument that negative personal information, such as criminal records, should be in the public domain is supported by who?
Federal judge Richard Posner advanced the argument that negative personal information should be in the public domain.
Intellectual property rights protect which of the following?



a. Individual privacy

b. Intangible creative works

c. Freedom of speech

d. Freedom from illegal searches and seizures
Intellectual property rights protect intangible creative works. Specifically, they protect the creative expression underlying a particular physical work, such as a software program.
What type of computer crime uses a Trojan horse to embezzle by transferring very small amounts of money, usually less than a penny per account, from large numbers of accounts?
The salami technique is an embezzlement technique through which a Trojan horse is used to embezzle by transferring very small amounts of money from large numbers of accounts. Computer matching is a technique used to uncover embezzlement by examining separate databases and identifying individuals common to databases.
What is a seemingly useful program that hides a computer virus?
A Trojan horse is a seemingly useful program that hides a computer virus. Trojan horses can also hide logic bombs. A logic bomb contains instructions for a malicious action to be executed based on specific conditions or the occurrence of a triggering event.
The director of information services within an organization is most likely referred to as the
The CIO, or chief information officer, is usually the title of the director of information services within an organization. A CEO, or chief executive officer, handles executive decision making. A COO, or chief operating officer, usually oversees the organization's business operations.
An information technology specialist who is interested in creating and maintaining Internet sites would most likely look for a job position as a
A Web application developer is responsible for creating and maintaining Internet sites. A specialist who wishes to work directly with Web sites would most likely look for a Web application developer position. A computer operator generally works with hardware, keeping systems operational.
What professional certifications qualifies an individual to analyze business requirements to design and implement computer infrastructures based on the Windows platform and Microsoft Servers software?
A Microsoft Certified Systems Engineer (MCSE) is qualified to analyze business requirements to design and implement computer infrastructures based on Windows and Microsoft Servers software. A Microsoft Certified Application Developer (MCAD) develops and maintains applications software.
Which of the following is NOT a basic component of computer hardware?



a. Input

b. Storage

c. Processor

d. Operating system
The correct answer is D. An operating system is not a component of computer hardware. It is a type of computer software. The computer's operating system controls all of the computer's activities.
What is commonly used to refer to the single circuit board that contains a computer's processor, temporary memory, and other electronic components?
The motherboard is the single circuit board that contains a computer's processor,
During the instruction-execution cycle, decoding takes place in which of the following components of the control unit?



a. Program counter (PC)

b. Memory address register (MAR)

c. Memory data register (MDR)

d. Instruction register (IR)
The correct answer is D. Decoding takes place in the instruction register (IR), located within a processor's control unit.
Which of the following types of cache is built into the computer processor?



a. PROM

b. L2

c. BIOS

d. L1
The correct answer is D. L1, or Level 1, cache is built into a computer processor. L2, or Level 2, cache sits between the processor and a computer's RAM.
What are devices that allow the computer to interact with other users and machines?
I/O devices are input/output units that allow the computer to interact with other users and machines.
The Unicode character encoding system has which type of code?
Unicode is a 16-bit encoding system. ASCII is a 7-bit encoding system, and ANSI is an 8-bit encoding system.