Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
303 Cards in this Set
- Front
- Back
In which stage of the software development life cycle are specifications produced? |
design
|
|
What does it mean when a software product is declared “gold”?
It has sold more than a million copies. It is free from errors. It is ready to be released to the public. It has won an award for excellence in software development. |
It is ready to be released to the public.
|
|
If you wrote a Java program and saved it to disk, what type of file would it be?
a batch file a source code file an executable file a database file |
a source code file
|
|
Which programming approach includes a protected set of variables?
object-oriented programming modules rapid application development structured programming |
object-oriented programming
|
|
QA stands for quality assistance.
True False |
False
|
|
What indicates the start of a comment in a C-based language?
quotation marks parenthesis forward slashes exclamation marks |
forward slashes
|
|
Which one of the following refer to a low-level language?
machine code pseudocode hacking code dead code |
machine code
|
|
Hardware technology improves at a faster rate than improvements in software development.
True False |
True
|
|
Which programming approach was developed to bring order to the chaotic field of programming?
structured programming modules object-oriented programming rapid application development |
structured programming
|
|
Which one of the following is a scripting language?
RPG DHTML C++ Visual Basic |
DHTML
|
|
Most professional software sold today is written in some form of
DHTML. VB. C or C++. WML. |
C or C++.
|
|
In contrast to high-level languages, low-level languages
are easier to learn and use. are similar to human languages. run faster. take up more disk space. |
run faster.
|
|
Before a program is considered ready for public release, it must undergo a scripted set of tests called a
test run. test battery. test gauntlet. test harness. |
test harness.
|
|
What might programmers call a colleague who has lazy habits and sloppy workmanship?
hacker packer backer slacker |
hacker
|
|
Modularity refers to the degree to which program elements are
standardized. protected from error. independent and reliable. structured. |
independent and reliable.
|
|
Which classic programming element refers to the ability to repeat parts of the program?
variables executable statements looping decision statements |
looping
|
|
Assembly language was developed to replace
scripting languages. popular languages. graphical user interface languages. machine code. |
machine code.
|
|
At which stage of the problem-solving process is the program actually coded?
Implement and test the solution. Write an algorithm. Brainstorm solutions and choose the best one. Analyze the problem. |
Implement and test the solution.
|
|
Which one of the following is a commonly used 4GL?
COBOL assembly language BASIC HTML |
HTML
|
|
How many generations of computer programming language currently exist?
four five six seven |
five
|
|
Identifying the problem and analyzing the problem are the same thing.
True False |
False
|
|
In contrast to human languages, programming languages
have larger vocabularies. contain 100 to 200 words and symbols. are much more complex. have more difficult syntax. |
contain 100 to 200 words and symbols.
|
|
Infinite loops cause computers to “lock-up” or “freeze.”
True False |
True
|
|
The process of writing a computer program is similar to
drawing a map. developing a photo. writing a term paper. drawing a picture. |
writing a term paper.
|
|
Which documentation tool is used primarily by beginning programmers?
flowcharts comments CASE tools Gantt charts |
flowcharts
|
|
Identifying the problem and analyzing the problem are the same thing.
True False |
False
|
|
In contrast to human languages, programming languages
have larger vocabularies. contain 100 to 200 words and symbols. are much more complex. have more difficult syntax. |
contain 100 to 200 words and symbols.
|
|
Infinite loops cause computers to “lock-up” or “freeze.”
True False |
True
|
|
The process of writing a computer program is similar to
drawing a map. developing a photo. writing a term paper. drawing a picture. |
writing a term paper.
|
|
Which documentation tool is used primarily by beginning programmers?
flowcharts comments CASE tools Gantt charts |
flowcharts
|
|
Which movie format is specifically for Apple?
MOV AVI MPEG MPEG2 |
MOV
|
|
What would be used to create the underlying shape of a three-dimensional object on a two-dimensional surface?
a wireframe diagram a GIF image a raster image CG FX |
a wireframe diagram
|
|
What problem does the Flash format solve?
increased time for digital cable picture to come into focus need for increased bandwidth with HDTV illegal copying of DVD movies long download time on Web pages that have moving images |
long download time on Web pages that have moving images
|
|
What is the science of moving a mobile robot through an environment called?
elocution locomotion navigation electrocution |
navigation
|
|
The quality of a virtual reality system is characterized in terms of its
reality. inventiveness. immersiveness. escapism. |
immersiveness.
|
|
What program do you need installed on your computer in order to create PDF documents?
Adobe Acrobat Quark Immedia mTropolis Macromedia Director |
Adobe Acrobat
|
|
Getting a robot to know how hard to squeeze an object is a problem of
locomotion. tactile perception. visual perception. audio perception. |
tactile perception.
|
|
In contrast to bitmap graphics, vector graphics
can reproduce detailed images. list every pixel the computer should draw on the screen. take a megabyte or more of disk space to store. store an image as a series of shapes. |
store an image as a series of shapes.
|
|
What term characterizes the degree to which a virtual reality game feels real?
transientness submissiveness immersiveness timeliness |
immersiveness
|
|
In contrast to compressed graphics files, bitmap graphics files
are frequently used on Web pages. display more quickly than other file formats. take up much less disk space. draw perfect images. |
draw perfect images.
|
|
How many times can a digital copy be reproduced with no degradation of quality?
500 50,000 5 million infinitely |
infinitely
|
|
Which AI technology attempts to actually simulate the workings of the human mind?
intelligent agents genetic algorithms neural networks expert systems |
neural networks
|
|
Cynthia Breazeal is known for her efforts to build a type of
musical robot. autonomous robot. walking robot. sociable robot. |
sociable robot.
|
|
Where might clip art be used?
Web page video game animated movie 3D modeling program |
Web page
|
|
Which movie was made with the aid of CG FX?
Star Wars Cars Adventures of Mickey Mouse The Wizard of Oz |
Cars
|
|
What do bitmaps digitize?
images sounds video text |
images
|
|
What is the last step in creating a multimedia application?
starting the design cycle all over again contracting with support staff to maintain it writing the work to a portable storage medium releasing it to the public |
writing the work to a portable storage medium
|
|
Massively multiplayer online games are considered advanced programs because
they have been developed by experts in multimedia and artificial intelligence. they allow players to create their own avatars and virtual reality. they involve enormous numbers of online players interacting in real time. they merge the fields of graphics, online interaction, and artificial intelligence. |
they merge the fields of graphics, online interaction, and artificial intelligence.
|
|
AVI and MOV are media storage formats used for compressed video.
True False |
True
|
|
At the present time, graphic artists generally use separate programs for creating and editing graphics.
True False |
True
|
|
This illustration is an example of
converting an analog signal. using a natural-language interface. making a music CD. digitizing graphics. |
converting an analog signal.
|
|
Speech-based interface will make it possible for computers
to become less expensive. to become wearable. to grow in power. to shrink in size. |
to become wearable.
|
|
Creating a robot that can solder tiny joints is a problem in tactile perception.
True False |
False
|
|
What do tabloid newspapers use to alter the photos of movie stars?
computer graphic special effects vector graphics raster image-editing programs 3D modeling programs |
raster image-editing programs
|
|
A four-letter file name extension such as .tiff goes with Macintoshes.
True False |
True
|
|
When adults come across offensive or unwanted material on the Internet, they should
e-mail the Web site with their objections. complain to the Internet service provider. inform local law enforcement officials. click the Back button on the browser and leave the site. |
click the Back button on the browser and leave the site.
|
|
What protection do employees have against employer monitoring of their behavior?
the ACLU’s Fair Electronic Monitoring Policy laws that prevent electronic surveillance of employees in the workplace a company pledge to respect any aspect of employee privacy All of the above |
a company pledge to respect any aspect of employee privacy
|
|
Computer ethics is considered a branch of normative ethics.
True False |
False
|
|
What might be a new ethical question in the future?
Should the government control Internet content? Should strict copyright laws be enforced? Should Web sites be allowed to compile consumer profiles? Should robots be prevented from copying certain human behaviors? |
Should robots be prevented from copying certain human behaviors?
|
|
What type of ethical issue is involved when young people download music from the Internet?
personal and social issues property protection issues public protection issues privacy protection issues |
property protection issues
|
|
It would be considered fair use of protected material to use which of the following without permission?
a young child’s storybook stanza of poetry line from a poem chapter from a novel |
line from a poem
|
|
What type of ethical issue is involved when a Web site preaches overthrow of the U.S. government?
property protection issues privacy protection issues public protection issues personal and social issues |
personal and social issues
|
|
Which company attempted to link cookies with names and addresses from a database?
Real Networks Microsoft DoubleClick Intel |
DoubleClick
|
|
What is different about public information posted on the Internet and public information filed at city hall?
The information is free on the Web. The information is more accessible on the Web. The information is more complete at city hall. There is no difference. |
The information is more accessible on the Web.
|
|
A virus must enter a computer disguised in another file.
True False |
True
|
|
What is the name of the protocol used today to protect the transmission of credit card data over the Web?
NSA SSL B2C ATM |
SSL
|
|
Computer codes of ethics tell people what to do in difficult situations.
True False |
False
|
|
Is it ethical to make free copies of copyrighted materials? This issue was raised by the invention of the
cassette tape recorder. Napster program. video recorder. All of the above |
All of the above
|
|
Which of the following is not a name of an FBI Internet wiretap program?
Omnivore Carnivore Herbivore DCS1000 |
Herbivore
|
|
Ensuring ethical behavior on computers and the Internet begins with
individual computer users. teachers. government. commercial Web sites. |
individual computer users.
|
|
As of 2000, what had the federal government done to protect consumer privacy on the Internet?
passed a law protecting children under the age of 13 from privacy violations passed a law giving consumers the right to choose whether to opt-in to receive cookies or opt-out not to receive cookies passed a law protecting adults from privacy violations passed a law forbidding Internet companies from selling personal information |
passed a law protecting children under the age of 13 from privacy violations
|
|
Gathering information on a person’s lifestyle habits for the purpose of selling products is an example of a
commercial threat to privacy. government threat to privacy. workplace threat to privacy. consumer threat to privacy. |
commercial threat to privacy.
|
|
What percentage of those 65 or older are online?
6 percent 16 percent 26 percent 36 percent |
26 percent
|
|
How can you tell if you are using a secure site?
Look for the seal of approval from a third-party organization that promotes industry self-regulation. Look for the site’s link to a privacy statement. Look for a yellow key icon in the status bar at the bottom of the page. Look for https:// in the URL box at the top of the page. |
Look for https:// in the URL box at the top of the page.
|
|
If you purchase a term paper on the Internet and turn it in as your own work, you are
reproducing. scanning. plagiarizing. stealing. |
plagiarizing.
|
|
An example of making computer hardware more accessible to people with disabilities is
greater capacity hard disks. the mouse. smaller keyboards. the “sticky keys” feature. |
the “sticky keys” feature.
|
|
In 1999, a major lawsuit was filed against America Online on behalf of people with
motor impairments. speech impairments. auditory impairments. visual impairments. |
visual impairments.
|
|
In contrast to patents, copyrights
help protect intellectual property. encourage and protect artistic and literary endeavors. award ownership of an idea or invention to its creator for a fixed number of years. allow people the right to control their creations and charge others for their use. |
encourage and protect artistic and literary endeavors.
|
|
What will this software protect against?
identity theft phishing viruses All of the above |
viruses
|
|
Which is not an industrial property classification of the WIPO?
inventions trademarks industrial designs copyright |
copyright
|
|
In which Microsoft program do MCDBA certificate holders specialize?
Word Outlook Excel Access |
Access
|
|
Teaching individuals how to use computer systems is called
technical support. application training. technical training. customer support. |
technical training.
|
|
Cisco certificates are generally good for
one year. two years. three years. four years. |
two years.
|
|
Software engineers and programmers generally have college degrees in
computer information systems. computer science. computer engineering. electrical engineering. |
computer science.
|
|
What certification is CompTIA best known for?
A A+ AA AAA |
A+
|
|
All of the following are true of certification tests except
they cost money each time they are taken. they are fairly easy and most people pass them the first time. they must be taken at an approved testing center. they might have a corresponding course of study available at a local community college. |
they are fairly easy and most people pass them the first time.
|
|
Intel and Microsoft are product developers.
True False |
True
|
|
Graduates of a computer information systems degree program are likely to get jobs as
application developers. hardware designers. programmers. system-level software developers. |
application developers.
|
|
Certification tests are usually lengthy
true-false tests. multiple-choice tests. essay tests. demonstration tests. |
multiple-choice tests.
|
|
In contrast to smaller IT companies, large IT departments offer
more variety in job tasks. less job stability. a more rigid work schedule. a more relaxed work environment. |
a more rigid work schedule.
|
|
The information technology industry has been accused of ageism because the majority of the workforce are
male. young. middle-aged. senior citizens. |
young.
|
|
Application programmers need good interpersonal skills.
True False |
True
|
|
The science of designing equipment so that it does not cause the user physical injury is called
georgics. aeronautics. histrionics. ergonomics. |
ergonomics.
|
|
What is a good tip for anyone hoping to be successful in our modern, technological world?
Become certified in a specialty and stick with it. Choose a career carefully because it will be your lifelong work. Spot trends as early as possible and then adjust your career direction accordingly. Start your own consulting business so you will always have a job. |
Spot trends as early as possible and then adjust your career direction accordingly.
|
|
In which category of information technology careers do computer engineers generally work?
application development sales and support hardware design software development |
hardware design
|
|
According to a 2005 survey, what percentage of companies use social networking sites to search for information on job candidates?
10 30 45 75 |
75
|
|
What idea did Michael Dell have?
to start a direct-mail marketing company for computers to sell made-to-order computers to make computers accessible to people with visual impairment to manufacture a more user-friendly personal computer |
to sell made-to-order computers
|
|
In carpal tunnel syndrome, the carpal tunnel becomes infected.
True False |
False
|
|
CompTIA certification programs are vendor specific.
True False |
False
|
|
The above is a page from Cisco’s Web site. Cisco is
a two-year college. an IT company. an online university. a computer e-tailer. |
an IT company.
|
|
Which one of the following abbreviations represents an entry-level Cisco certificate?
CCNP CCDP CCIP CCDA |
CCDA
|
|
The content to be learned for most of the above certificates changes nearly every
month. year. five years. decade. |
year.
|
|
In the mid-1990s, which company offered certification in networking that could substitute for college courses?
Novell Microsoft Oracle Cisco |
Novell
|
|
What business model does Cisco follow?
consultant product developer small business IT department |
product developer
|
|
What programming approach allows programmers to reuse components?
|
Modular Code
|
|
Low-level programming languages are
|
closer to what a computer actually executes
|
|
An instruction that assigns a value to a unit of memory is considered a(n)
|
Executable Statement
|
|
During which problem-solving step is pseudocode written?
|
Write the algorithm
|
|
Which of these is a documentation tool?
Compiler Interpreter Debugger Flowchart Applet |
Flowchart
|
|
Which of the following is an advantage of an interpreted program over a compiled program?
It takes less time to develop an interpreted program than a compiled program to perform the same task. An interpreted program runs faster than a compiled one. An interpreted program is managed by a strict runtime manager that forbids it from making unauthorized changes to memory All of these A and C only |
A and C only
|
|
Which tool translates source code into machine code one instruction at a time?
|
Interpreter
|
|
Which of the following is not a classic programming element?
looping applets variables executable statements decision statements |
applets
|
|
If-Then instructions are examples of
|
decision statements
|
|
David has just finished analyzing his client's programming problem. Which problem-solving step is next?
|
Brainstorm Solutions
|
|
Mistakes in the way elements of an instruction are phrased, are called
|
Syntax errors
|
|
Which of these is a first generation programming language?
machine code source code assembly language all of these a and c only |
a and c only
|
|
What is the name for a high-level, conceptual programming language that computers cannot read?
|
Pseudocode
|
|
Which of the following is an example of a third generation programming language?
assembly HTML GUI C++ ALGOL |
C++
|
|
High-level programming languages
|
are easier to learn than low-level ones.
|
|
HTML is a ____ generation language.
|
Fourth
|
|
Which programming approach enables classes of data to be given rules as to how it can be changed or utilized at runtime?
|
Object-Oriented programming
|
|
A small, limited version of a program that is used to test a solution is called
|
prototype
|
|
At which stage of programming project is the user manual usually written?
|
Implement and test the solution
|
|
The special term used to describe programming language files is
|
source code
|
|
Elizabeth is using compartmentalized groups of instructions as she creates a program. What approach is she using?
|
structured programming
|
|
Which of these is/are key steps in the Rapid Application Development (RAD) approach?
using second generation tools (2GL) using prototypes early in the process re-using existing code All of these b and c only |
b and c only
|
|
What part of the development process could perhaps be best facilitated in a virtual environment, where the physical computer or network is protected and unaffected?
|
implementation and testing
|
|
Cindy is researching what is involved in the Accounts Receivable process. What step is she at in writing a computer program?
|
Analyze the problem
|
|
What name is given to the technique that breaks a large programming project into small problems?
|
the divide-and-conquer approach
|
|
To be processed by a computer, all multimedia elements must be
|
in a digital format
|
|
Which type of file can display an animated image?
|
GIF
|
|
Digital media is more efficient than analog media because
|
it can be reproduced many times with no loss of quality.
|
|
What term describes the cartoon-like images that can be used when creating greeting cards?
|
clip art
|
|
The process of reducing audio or video information to a data file is called
|
digitizing
|
|
A file format that is specific to an application is called
|
a native format
|
|
Which of these full names describe a format or formats used for digitizing photographs?
vector graphics joint photographic experts group tagged image file format All of these b and c only |
b and c only
joint photographic experts group tagged image file format |
|
Which of the following graphics file formats is not common on x86, Windows-based computers:
.bmp .jpg .tiff .pict .png |
.pict
|
|
What word describes a tool used by graphics applications to render images as rows of pixels?
|
raster
|
|
When a 3D graphics rendering program produces an object or an entire image without the shading, just a rendering of the position of shapes that could be shaded later the result is called a(n)
|
wireframe
|
|
In the computer game World of Warcraft, the often animated symbols used to represent players' characters on-screen is called a(n)
|
avatar
|
|
This term is used both to describe an active example of a class of data in an object-oriented program, and a rendering of an active 3D world in a computer game.
|
instance
|
|
The industry group that represents the interests of game software publishers, especially for combating piracy, is called the
|
Electronic Gaming Industry Consortium
|
|
The aspect ratio of a true high-definition video component is:
|
16:09
|
|
What is an image broken into before it can be used by a computer?
|
pixels
|
|
Which type of graphics file stores every pixel of the image that will be drawn on the screen?
|
bitmap
|
|
Which file format is rarely used in Web pages?
|
bitmap
|
|
Analysts estimate the number of pirated movie downloads per day in 2006 will top
|
1 million downloads
|
|
An electronic component that can digitally record video to a hard drive or optical disc, and may also serve as a high-definition tuner, is known by the abbreviation
|
DVR
|
|
Which type of file uses geometric shapes to produce images?
|
vector graphics
|
|
The integration of several different types of communication into one interface is called
|
multimedia
|
|
Which of the following is considered a multimedia element?
text sound video All of these b and c only |
All of these
|
|
Which of the following graphics formats is not commonly used on Macintosh computers?
|
BMP
|
|
A graphics file can be transported to a different application by first
|
exporting the file to a standard format
|
|
What method is used to shorten the download time of large image files on the Web?
|
data compression
|
|
COPPA is a federal act designed to prohibit Web sites from
|
collecting or sharing personal data on children under 13
|
|
Which of these organizations is not involved in ensuring consumer privacy on the Web?
BBBOnline TRUSTe WebTrust OPA DMCA |
DMCA
|
|
What is making it difficult for the FBI to use computers to fight crime?
|
public key encryption
|
|
Which group reached an agreement with the FTC that users should be told when their information will be used in a consumer profile?
|
Network Advertising Initiative
|
|
The school of thought stating that morals differ from one society to another is known as
|
moral relativism
|
|
Ethics are the same as
|
Internalized principles
|
|
Theresa, who lost her job last year, shoplifted a package of rolls to feed her young daughter. People in which ethical category would say, that's OK?
|
applied ethics
|
|
Marketers keep personal information about people's lifestyles and buying habits in
|
consumer profiles
|
|
A system of ethical principles that describes fairness and equality as an optimum state to be applied as a benchmark for behavior and strategy, is called
|
normative ethics
|
|
Computer ethics is a branch of
|
applied ethics
|
|
What visual cues on a Web site page tell you that your e-commerce transaction is secure
|
a locked padlock icon and a URL that begins with https:
|
|
What compelled ToySmart.com to break its consumer data privacy pledge?
|
The company went bankrupt.
|
|
The company that publicly demonstrated that data attached to cookies could not be used to circumvent privacy, is
|
DoubleClick
|
|
Widespread publication of whic type of public records can cause someone serious harm?
|
Criminal records, driver's license records and bankruptcy records
|
|
After further review, Carnivore has been renamed as
|
DCS1000
|
|
what source of information poses the greatest potential threat to personal privacy?
|
electronic databases
|
|
How can publicly available false information cause harm to individuals?
|
People don't have to be knowledgeable researchers to discover and disseminate it.
|
|
The belief that moral are eternal, unchanging laws is called
|
moral relativism
|
|
Which protocol protects e-commerce transactions with encryption techniques?
|
SSL
|
|
Web sites promise to keep consumer data confidential by
|
publishing privacy statements
|
|
What did the FBI's program called Carnivore do?
|
It read e-mail it was legally permitted to intercept.
|
|
Into which threat category do internet cookies fall?
|
commercial threat
|
|
One format for long, hexadecimal (base 16) ID numbers coded into hardware and software, is known as
|
Global Unique Identifiers
|
|
Which of the following do persistent cookies usually contain?
credit card numbers passwords preferences All of these b and c only |
b and c only
passwords preferences |
|
The small data records containing behavioral data and Web session states, that Web servers store on clients' hard drives, are called
|
cookies
|
|
Which of the following is a common entry point of many IT careers?
|
sales and support
|
|
Which of these roles falls outside the purview of a database administrator?
application developer Web server facilitator technical support person technical trainer operations manager |
Web server facilitator
|
|
Which of these high-ranking positions pays the least per annum?
Systems Analyst System Programmer Database Administrator Web Administrator |
Web administrator
|
|
Which IT area includes people with artistic backgrounds?
|
multimedia development
|
|
Which of the following is not a common characteristic of a programmer?
|
disinterest in anything outside the computer
|
|
At which of these job level can computer technicians be found?
part-time while still in school full time, entry level with no experience part-time in network administration All of these a and b only |
All of these
|
|
Technical writers are often
|
English majors and/or systems analysts
|
|
Which of these is a Web master's responsibility?
maintaining load balancing among the Web servers maintaining the Web site's interface with the database using programming skills to maintain user interaction with the site using programming skills to maintain user interaction with a site All of these a and c only |
a and c only
maintaining load balancing among the Web servers using programming skills to maintain user interaction with the site |
|
The creation of new computer programs for commercial sale is called
|
software development
|
|
The process of testing new software products before they are released is called
|
quality assurance
|
|
Systems analyst, network administrator, and Web master are careers in the field of
|
application development
|
|
Who is responsible for the day to day operations of a database?
|
database administrator
|
|
Which job involves installing and repairing computer hardware and software as well as using interpersonal skills?
|
technical support
|
|
Mary wants to prepare for a career in which she can design a distribution management system. She is class president and has a part-time job providing technical support for two small businesses in town. What should she aim for?
|
systems analyst
|
|
Developers principally concerned with the creation of functionality for end users, are considered
|
application developers
|
|
When technical sales people get tired of selling, they often become
|
technical trainers
|
|
The product that is the result of QA testing is
|
deficiency report
|
|
Which of the following is not a primary responsibility of a network administrator?
|
dissecting source code
|
|
Which job title describes a person who primarily repairs printers, installs computer operating systems, and connects computers to make a network
|
technician
|
|
Which of these jobs is not an entry-level position?
|
network administrator
|
|
Which of these jobs currently has the highest average salary?
systems analyst database administrator QA tester technical trainer technical writer |
systems analyst
|
|
What other hat must a systems analyst often wear when designing information systems?
|
Project manager
|
|
Technical sales people make most of their money
|
from their commissions
|
|
Which of these jobs is very people-centered and pays the most?
Technical writing Technical training Technical service Technical support Technical sales |
Technical sales
|
|
Which of these jobs, on average, is the highest paid?
Technical trainer Systems programmer Technical writer Multimedia developer Quality assurance tester |
Systems programmer
|
|
OOP
|
object-oriented programming
|
|
BCPL
|
Basic Combined Programming Language
|
|
DHTML
|
Dynamic Hypertext Markup Language
|
|
RPG
|
Report Program Generator
|
|
FORTRAN
|
FORmula TRANslator
|
|
VB
|
Visual Basic
|
|
RAD
|
rapid application development
|
|
XML
|
Extensible Markup Language
|
|
DOM
|
document object model
|
|
SDLC
|
software development life cycle
|
|
QA
|
quality assurance
|
|
WML
|
Wireless Markup Language
|
|
XHTML
|
Extensible Hypertext Markup Language
|
|
perl
|
practical extraction and report language
|
|
4GL
|
fourth-generation (programming) language
|
|
PLC
|
programmable logic controller
|
|
COM
|
Component Object Model
|
|
BASIC
|
Beginner's All-purpose Symbolic Instruction Code
|
|
JVM
|
Java Virtual Machine
|
|
COBOL
|
COmmon Business-Oriented Language
|
|
HTML
|
Hypertext Markup Language
|
|
CASE
|
computer-aided software engineering
|
|
VR
|
virtual reality
|
|
RL
|
real life
|
|
GIF
|
graphics interchange format
|
|
WoW
|
World of Warcraft
|
|
CG FX
|
computer graphic special effects
|
|
DVR
|
digital video recorder
|
|
LD
|
link death; your internet connection failed
|
|
ESA
|
Entertainment Software Association
|
|
MPEG
|
Moving Picture Experts Group
|
|
AFK
|
away from keyboard
|
|
TIFF
|
tag image file format
|
|
HDTV
|
high-definition television
|
|
MMO
|
massively multiplayer online
|
|
MIDI
|
Musical Instrument Digital Interface
|
|
JPEG
|
Joint Photographic Experts Group
|
|
PNG
|
Portable Network Graphics
|
|
AI
|
artificial intelligence
|
|
PvP
|
Player versus player; an area that allows players to harm one another.
|
|
BMP
|
bitmap
|
|
EPS
|
encapsulated PostScript
|
|
CFR
|
computerized facial recognition
|
|
URL
|
Uniform (or Universal ) Resource Locator
|
|
FTC
|
Federal Trade Commission
|
|
CIPA
|
Children's Internet Protection Act
|
|
GUID
|
Global Unique Identifier
|
|
EUCD
|
European Union Copyright Directive
|
|
NSA
|
National Security Agency
|
|
ATM
|
Automated Teller Machine
|
|
NET Act
|
No Electronic Theft Act
|
|
BSA
|
Business Software Alliance
|
|
OPA
|
Online Privacy Alliance
|
|
FBI
|
Federal Bureau of Investigation
|
|
NFB
|
National Federation of the Blind
|
|
SSL
|
Secure Sockets Layer
|
|
MMORPG
|
Massively multiplayer online role-playing game
|
|
WIPO
|
World Intellectual Property Organization
|
|
TCPA
|
Telephone Consumer Protection Act of 1991
|
|
AUP
|
Acceptable use policy
|
|
GPS
|
Global Positioning System
|
|
DMCA
|
Digital Millennium Copyright Act
|
|
SPA
|
Software Publishers Association
|
|
CAN-SPAM Act
|
Controlling the Assault of Non-Solicited Pornography And Marketing Act of 2003
|
|
IP
|
intellectual property
|
|
EOUSA
|
Executive Office for United States Attorneys
|
|
DHS
|
United States Department of Homeland Security
|
|
HIPPA
|
Health Insurance Portability and Accountability Act of 1996
|
|
FISMA
|
Federal Information Security Management Act of 2002
|
|
GUI
|
graphical user interface
|
|
USA PATRIOT Act
|
Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001
|
|
COPPA
|
Children's Online Privacy Protection Act of 1998
|
|
ISP
|
Internet service provider
|
|
TLS
|
Transport Layer Security
|
|
AOL
|
America Online
|
|
WAN
|
Wide Area Network
|
|
CCIP
|
Cisco Certified Internetworking Professional
|
|
CCSP
|
Cisco Certified Security Professional
|
|
MCSD
|
Microsoft Certified Solution Developer
|
|
QA
|
Quality Assurance
|
|
MCAD
|
Microsoft Certified Application Developer
|
|
CCDA
|
Cisco Certified Design Associate
|
|
TIA
|
Telecommunications Industry Association
|
|
CNA
|
Certified Novell Administrator
|
|
MCSE
|
Microsoft Certified Systems Engineer
|
|
MCDBA
|
Microsoft Certified Database Administrator
|
|
MCSA
|
Microsoft Certified Systems Administrator
|
|
CCNA
|
Cisco Certified Network Associate
|
|
MCP
|
Microsoft Certified Professional
|
|
MIT
|
Massachusetts Institute of Technology
|
|
CIS
|
Computer Information Systems
|
|
OCDBA
|
Oracle Certified Database Administrator
|
|
CTP
|
Convergence Technologies Professional
|
|
CNE
|
Certified Novell Engineer
|
|
Comp TIA
|
Computing Technology Industry Association
|
|
OCAD
|
Oracle Certified Application Developer
|
|
LAN
|
Local Area Network
|
|
MOS
|
Microsoft Office Specialist
|
|
IT
|
Information Technology
|