CIS 2

In order for navigational images or other images to be understandable to visitors using assistive technology systems, the images must be identified with a(n) ____ description.

a). assistive
b). Braille text
c). accessible text
d). alternative text

d). alternative text
A ____ is a small program inserted into a Web page that performs a specific task, such as changing the values in a stock portfolio, scrolling text or images across the screen, and so forth.

a). Java applet
b). servlet
c). function
d). subroutine

a). Java applet
Andrea is an aspiring songwriter and musician. She is creating a Web site that would allow her to showcase her talent and gain exposure.

Andrea does not yet have any CDs of her music, but she can still create audio files to put on her Web site using a microphone or ____ instrument.

a). WML
b). MIDI
c). WAV
d). XML

b). MIDI
In the example shown in the accompanying figure, ____ is being used to create an animated banner.

a). Adobe Flash
b). Adobe Dreamweaver
c). Adobe Fireworks
d). Adobe Contribute

a). Adobe Flash
____ refers to identifying the browser used by each visitor, typically via JavaScript code.

a). Browser mapping
b). Browser sniffing
c). Visitor identification
d). Personalization

b). Browser sniffing
When a markup language is used, markup ____ are inserted around the Web page content to identify where elements are to be displayed and how they should look when displayed.

a). tags
b). divisions
c). identifiers
d). boxes

a). tags
Smith Web Design is creating a secure Web site for a local doctor. In addition to providing basic information about her practice, she wants her patients to be able to log on and access their records, including images such as X-rays and MRIs.

In the “About Us” section of the Web site, the doctor wants to include a photo of her office. The best format to save the photo in is ____.

a). JPEG
b). BMP
c). GIF
d). TIF

a). JPEG
____ tags are similar to HTML tags, but there are stricter rules about how the markup tags are written.

a). XML
b). XHTML
c). JavaScript
d). Perl

b). XHTML
____ are table of contents pages that contain links to all main pages on the sites.

a). Drop-down menus
b). Search boxes
c). Frames
d). Site maps

d). Site maps
Once a Web site has been carefully designed, it is time to create it. This process is called ____.

a). Web site publication
b). Web site upload
c). Web site deployment
d). Web site development

d). Web site development
The ____ format is a standard format for Web page images and is used most often with logos, banners, and other nonphotographic images.

a). TIF
b). BMP
c). MPEG
d). GIF

d). GIF
____ is a set of rules for exchanging data over the Web.

a). MP3
b). PDF
c). XML
d). CGI

c). XML
____ is a video format developed by Microsoft for use with Windows Media Player.

a). .wmv
b). .mp3
c). .mov
d). .avi

a). .wmv
____ is a versatile video format developed by Apple and widely used to distribute video over the Web.

a). .wmv
b). .mp3
c). .mov
d). .avi

c). .mov
The ____ format is a format specifically created for Web page images.

a). TIF
b). BMP
c). PNG
d). PPT

c). PNG
Andrea is an aspiring songwriter and musician. She is creating a Web site that would allow her to showcase her talent and gain exposure.

Once Andrea has recorded her music in an audio file, she would need to use a ____ method to reduce the size of the file before making it available through her Web site.

a). filtering
b). streaming
c). buffering
d). compression

d). compression
Images created using Windows Paint and similar painting programs are usually saved in the ____ format.

a). GIF
b). BMP
c). JPEG
d). TIFF

b). BMP
When you break a large document apart, consider including a link to view or download the entire document intact either as a Web page or in a common format, such as Word or ____.

a). MDF
b). PDF
c). XHTML
d). XML

b). PDF
Today’s fast computers and ____ Internet connections make Web-based multimedia very feasible.

a). dial-up
b). broadband
c). microwave
d). ISDN

b). broadband
____ was originally developed as a programming language designed for processing text.

a). ActiveX
b). Perl
c). JavaScript
d). AJAX

b). Perl
____ is/are frequently added to buttons, logos, banners, and other Web page graphics.

a). Text
b). Content
c). Passwords
d). Code

a). Text
For designing the layout of a Web page, ____ are commonly used when designing animated components.

a). storyboards
b). flowcharts
c). page layouts
d). plots

a). storyboards
When a Web page requires a very large image (such as to better show a product, home for sale, or featured piece of art, for instance), a(n) ____ can be used to save loading time.

a). thumbnail image
b). button image
c). icon image
d). sample image

a). thumbnail image
____ is a language used to create Web pages to be displayed on WAP-enabled wireless devices, such as some older mobile phones and those used in some developing countries.

a). Wireless Markup Language (WML)
b). XHTML (Extensible Hypertext Markup Language)
c). XML (Extensible Markup Language)
d). Dynamic HTML (DHTML)

a). Wireless Markup Language (WML)
Some people are ____ who learn best by doing.

a). auditory learners
b). visual learners
c). manual learners
d). kinesthetic learners

d). kinesthetic learners
Most Web pages today are written in a ____— a coding system used to define the structure, layout, and general appearance of the content of a Web page.

a). programming language
b). scripting language
c). 4G language
d). markup language

d). markup language
Smith Web Design is creating a secure Web site for a local doctor. In addition to providing basic information about her practice, she wants her patients to be able to log on and access their records, including images such as X-rays and MRIs.

Smith Web Design has decided to place all navigation buttons in a column on the left hand side of the page. They should create these in the ____ format.

a). JPEG
b). BMP
c). GIF
d). TIF

c). GIF
For Web pages, the ____ or PNG format is usually selected for line art, such as clip art, logos, navigation buttons, and so forth.

a). TIF
b). GIF
c). MP3
d). BMP

b). GIF
The ____ format is a standard format for Web page images and is used most often with logos, banners, and other nonphotographic images.

a). TIF
b). BMP
c). MPEG
d). GIF

d). GIF
Some of the most popular Web site authoring programs are Microsoft Expression Web and ____.

a). Adobe Contribute
b). Adobe Flash
c). Adobe Dreamweaver
d). Adobe Fireworks

c). Adobe Dreamweaver
____ consists of predrawn electronic images.

a). ASCII art
b). Clip art
c). Graphics art
d). Drawing art

b). Clip art
Smith Web Design is creating a secure Web site for a local doctor. In addition to providing basic information about her practice, she wants her patients to be able to log on and access their records, including images such as X-rays and MRIs.

After patients log on, they should be able to download scanned versions of their X-rays and MRIs. These images should be provided in the ____ format.

a). JPEG
b). BMP
c). GIF
d). TIF

d). TIF
Images are available in many formats, such as TIF, BMP, GIF, JPEG, and ____.

a). AVI
b). MP3
c). PNG
d). MPEG

c). PNG
____ refers to identifying the browser used by each visitor, typically via JavaScript code.

a). Browser mapping
b). Browser sniffing
c). Visitor identification
d). Personalization

b). Browser sniffing
____ refers to the process of planning what your Web site will look like and how it will work.

a). Web site upload
b). Web site program
c). Web site deployment
d). Web site design

d). Web site design
GIF images are always rectangular, but can use a(n) ____ background color to make the images appear to be nonrectangular.

a). neutral
b). generic
c). all color
d). transparent

d). transparent
Whenever you include content on a Web page that requires a(n) ____, include an obvious link that takes visitors to a Web page where they can download its free version.

a). servlet
b). script
c). applet
d). plug-in

d). plug-in
Some e-commerce Web sites utilize ____ to display environments or show what products (such as a car or a home) look like in the real world.

a). shopping carts
b). stock information
c). virtual reality
d). status notification

c). virtual reality
With a streaming audio file, only a small portion of the audio file is initially downloaded and ____, and then the audio file can begin playing while the remainder of the file downloads simultaneously.

a). stored
b). archived
c). buffered
d). screened

c). buffered
____ tend to be more readable for large quantities of text, and so they are traditionally used for this purpose.

a). Serif typefaces
b). Arial typefaces
c). Sans serif typefaces
d). Dom Casual typefaces

a). Serif typefaces
____ tags are used by many (but not all) search engines to classify the Web page when it is added to a search database.

a). Page
b). Search
c). Site
d). Meta

d). Meta
Companies that follow the ____ do not sell goods or services directly to others, but instead bring buyers and sellers together within a specific industry or business process.

a). business-to-government (B2G) model
b). person-to-person (P2P) model
c). business-to-business (B2B) model
d). intermediary hub model

d). intermediary hub model
____ is the situation when a customer places items in his or her cart but never actually purchases them.

a). Shopping cart abandonment
b). Customer abandonment
c). Customer turn-around
d). Window shopping

a). Shopping cart abandonment
____ seals are issued by the Certificate Authority issuing the site’s SSL or EV SSL certificate and are designed to remind shoppers that the site is protected by that certificate.

a). Privacy
b). Protection
c). Warranty
d). Security

d). Security
Comparison shopping Web sites are sometimes called ____.

a). shopping bots
b). shopping bags
c). shopping carts
d). e-shopping

a). shopping bots
____ is the term used to describe conducting business transactions—generally financial transactions—via communications technology.

a). Internet-transaction
b). E-commerce
c). Net-commerce
d). Net-business

b). E-commerce
The goal of ____ is for your Web site to be listed as close as possible to the top of the search result hits that are displayed when an individual performs a Web search using keywords related to your site or business.

a). VOD
b). SSO
c). OTP
d). URLP

b). SSO
Sharon is a photographer who works for various wildlife magazines. In order to save money, she buys used digital photography equipment from the Internet.

Sharon has a different password for each Web site that she uses. However, she is afraid of forgetting some of these passwords and being unable to access her records. The best solution is for her to use ____.

a). shopping cart software
b). storefront software
c). banner ads
d). a digital wallet

d). a digital wallet
If you own the trademark to your business name, the ____ Consumer Protection Act protects your trademark in cyberspace.

a). Anticybersquatting
b). Online
c). Cyberbusiness
d). Trademark

a). Anticybersquatting
Web sites such Amazon.com, Walmart.com, Overstock.com, and BestBuy.com are examples of ____ sites.

a). B2B
b). B2C
c). B2G
d). C2C

b). B2C
The accompanying figure shows a ____ seal.

a). privacy
b). trust
c). security
d). warranty

c). security
To reassure customers, all e-commerce sites should develop and display a ____ policy stating how collected customer information will be used.

a). business model
b). customer
c). privacy
d). database

c). privacy
Because of the low overhead costs associated with ____, new e-commerce businesses can enter the marketplace relatively inexpensively.

a). shopping carts
b). online stores
c). shopping bags
d). storebots

b). online stores
Some ____ (VOD) services (like Netflix) offer monthly subscriptions for unlimited movie rental downloads.

a). video-on-demand
b). video-on-disk
c). video-on-delay
d). video-on-download

a). video-on-demand
____ (owned by eBay) is an online payment service that allows individuals to transfer money easily from their online payment account to someone else’s.

a). SimpleTech
b). PayPal
c). Wal-Mart
d). eBay

b). PayPal
John operates an online store, which he uses to sell homemade T-shirts and other articles of clothing.

John recently received a contract to print T-shirts for the US Department of Justice. This is an example of a ____ transaction.

a). B2C
b) B2B
c). B2G
d). C2C

c). B2G
John operates an online store, which he uses to sell homemade T-shirts and other articles of clothing.

John wants to reduce some of his day-to-day burden of inventory management and shipping. He should look into a(n) ____.

a). order-fulfillment company
b). electronic storefront
c). brick-and-mortar store
d). smart card

a). order-fulfillment company
Although many online auction sites are designed for transactions between consumers, some small businesses also sell their products at consumer auction sites (such as ____), either in addition to, or instead of, maintaining an e-commerce Web site.

a). PayPal
b). PriceGrabber.com
c). SimpleTech
d). eBay

d). eBay
____ is the process of building the Web site, including developing all of the components to be used on the Web site, creating the actual Web pages, testing the site, and publishing the site.

a). Web site planning
b). Web site design
c). Web site deployment
d). Web site development

d). Web site development
Although B2C was initially expected to be the most prominent type of e-commerce business model, revenues from the ____ model are now expected to far surpass the B2C marketplace.

a). C2C
b). B2G
c). B2B
d). B2E

c). B2B
Perhaps the biggest disadvantage of e-commerce from a customer standpoint is the ____.

a). inability to return items
b). difficulty of using credit cards
c). risk of fraud
d). inability to see merchandise

c). risk of fraud
____ store checkout information in the customer’s account for use with purchases on that site only.

a). Site-specific smart cards
b). Site-specific electronic check accounts
c). Site-specific online payment accounts
d). Site-specific digital wallets

d). Site-specific digital wallets
____ are special HTML or XHTML codes that provide information about a Web page and that are inserted into a Web page’s code at the time the page is created.

a). Meta tags
b). Beta tags
c). Zeta tags
d). Theta tags

a). Meta tags
____ bring buyers and sellers together to facilitate transactions between the two parties.

a). M-Brokers
b). E-tailers
c). Shop carts
d). Brokerage sites

d). Brokerage sites
Common ____ activities include providing online order status information, links for tracking delivery shipments, downloadable product manuals, and online technical support, such as via e-mail or live chat.

a). C2C
b). eCRM
c). eCMS
d). CBT

b). eCRM
One of the most recognized privacy seals is the ____ trustmark.

a). PayPal
b). TRUSTe
c). SimpleTech

b). TRUSTe
The collection of hardware, software, people, policies, and
d). Peer Impactstrategies used to perform and support e-commerce is referred to as a(n) ____.

a). Net-commerce system
b). Internet B-platform
c). e-commerce system
d). EB-platform

c). e-commerce system
Sharon is a photographer who works for various wildlife magazines. In order to save money, she buys used digital photography equipment from the Internet.

Recently, Sharon won a contract to photograph exhibits at the National Zoo. However, the magazine that commissioned these photos is located in a different state. Sharon can use a ____ to authenticate the validity of any contracts she signs electronically.

a). digital certificate
b). banner ad
c). digital wallet
d). permission-based ad

a). digital certificate
When intermediary hubs specialize in a specific industry (such as healthcare), they are sometimes called ____ hubs.

a). vertical
b). horizontal
c). centered
d). subscription

a). vertical
____ bring buyers and sellers together to facilitate transactions between the two parties.

a). M-Brokers
b). E-tailers
c). Shop carts
d). Brokerage sites

d). Brokerage sites
____ account numbers are essentially disposable credit card numbers that can be used to buy goods and services that will be charged to the customer’s regular credit card.

a). Temporary
b). Virtual
c). Prepaid
d).Online

b). Virtual
Instead of a formal auction with a specific ending time and an automatic winner, dynamic pricing sites—such as ____—allow buyers to bid on items or services listed for sale, and then the seller decides whether or not to accept each offer on an individual basis.

a). PriceGrabber.com
b). eBay
c). Priceline.com
d).PayPal

c). Priceline.com
In order to accept credit cards, a business typically opens an e-commerce merchant account, also called a(n) ____.

a). Internet merchant account
b). Net merchant account
c). Internet business account
d). Web card account

a). Internet merchant account
John operates an online store, which he uses to sell homemade T-shirts and other articles of clothing.

Some of John’s customers want to buy Christmas presents for their friends, but are unsure of what to select. John should encourage these customers to purchase ____ that the recipients can redeem at a later date.

a). digital wallets
b). digital gift certificates
c). smart cards
d). electronic storefronts

b). digital gift certificates
The accompanying figure shows a(n) ____ credit card.

a). B2B
b). B2C
c). VND
d). OTP

d). OTP
One option for online ads that is quickly moving into the forefront is the use of ____—that is, ads that are targeted to individuals based on their preferences, buying habits, or interests.

a). behavioral targets
b). behavioral ads
c). preference ads
d). ad mining

b). behavioral ads
____ businesses sell products and services to local, state, and federal government buyers.

a). B2B
b). C2C
c). B2C
d). B2G

d). B2G
For security purposes, PayPal users have the option of using a PayPal ____ during the logon process.

a). Virtual Credit
b). Security Key
c). eBillme
d). eWallet

b). Security Key
A ____ is responsible for maintaining a large, multiuser system.

a). software engineer
b). system administrator
c). vice president of information systems
d). programmer/analyst

b). system administrator
____ refers to the use of computers to help manage manufacturing operations and control machinery used in those processes.

a). Computer-aided manufacturing (CAM)
b). Computer-aided design (CAD)
c). Enterprise architecture
d). Product lifecycle management (PLM)

a). Computer-aided manufacturing (CAM)
Two specific types of ____ are e-commerce systems and point-of-sale (POS) systems.

a). order entry systems
b). accounting systems
c). office systems
d). document processing systems

a). order entry systems
____ is the process of gathering, storing, accessing, and analyzing data about a company in order to make better business decisions.

a). Business intelligence
b). System architecture
c). Business flowchart
d). Enterprise architecture

a). Business intelligence
____ focuses on specifying what the new system will look like and how it will work.

a). System analysis
b). System acquisition
c). System implementation
d). System design

d). System design
The ____ Web is a predicted evolution of the current Web in which all Web content is stored as if it were data in a database so that it can be retrieved easily when needed to fulfill user requests.

a). Intelligent
b). Knowledge
c). Central
d). Semantic

d). Semantic
Mother Goose Computing, Inc. provides computational biology consulting services. They are currently updating several of their systems.

For the protein folding division, Mother Goose is planning to implement the new system module by module. This is called a ____ conversion.

a). phased
b). direct
c). parallel
d). pilot

a). phased
The ____ contains a list of technical specifications for equipment, software, and services determined during the system design phase and requests that vendors propose products that meet those specifications.

a). benchmark test
b). request for proposal (RFP)
c). request for quotation (RFQ)
d). data dictionary

b). request for proposal (RFP)
An inventory management system that goes beyond just inventory to act as a complete distribution system is referred to as a ____ management system (WMS).

a). warranted
b). warehouse
c). wireless
d). world

b). warehouse
Managers are usually classified into three categories: executive, ____, and operational.

a). development
b). strategic
c). middle
d). decision

c). middle
When information from an ERP or other type of internal system is exchanged between different applications (either within an organization or between organizations), it is called ____.

a). ERP2
b). EDI
c). CRM
d). EAI

d). EAI
The various types of communications systems in place in many organizations include e-mail, messaging, online conferencing, ____, and telecommuting.

a). point-of-sale (POS) systems
b). collaborative (workgroup) computing
c). fingerprint payment systems
d). geographic information system (GIS)

b). collaborative (workgroup) computing
When computer systems perform in ways that would be considered intelligent if observed in humans, it is commonly referred to as ____.

a). artificial intelligence (AI)
b). computer-aided design (CAD)
c). computer-aided manufacturing (CAM)
d). neural networks

a). artificial intelligence (AI)
____ refer to the variety of systems in place to record the details of financial transactions, such as payments and purchases.

a). Accounting systems
b). Payroll systems
c). Order entry systems
d). Transaction processing systems

a). Accounting systems
____ is a special type of large, integrated system that ties together all types of a company’s activities, such as planning, manufacturing, sales, marketing, distribution, customer service, and finance.

a). ERP
b). EDI
c). GIS
d). DSS

a). ERP
A(n) ____ is responsible for setting up and managing large databases within an organization.

a). database administrator
b). application programmer
c). database analyst
d). data processing director

a). database administrator
Each phase of the ____ produces some type of documentation to pass on to the next phase.

a). system analysis
b). system development life cycle
c). system implementation
d). system acquisition

b). system development life cycle
____ is the phase of system development in which the problem area is studied in depth and the needs of system users are assessed.

a). Preliminary investigation
b). System design
c). System analysis
d). System acquisition

c). System analysis
Mary is entering her senior year of college. She has a meeting on Friday with her advisor to discuss her career plans.

Mary wants to avoid common mistakes that individuals make when they are starting out in the IT industry. Her advisor should tell her to beware of ____.

a). honing problem solving skills
b). mastering underlying principles of technology
c). adapting to new challenges
d). focusing too much on certifications

d). focusing too much on certifications
With a ____, both systems are operated in tandem until it is determined that the new system is working correctly, and then the old system is deactivated.

a). phased conversion
b). direct conversion
c). parallel conversion
d). pilot conversion

c). parallel conversion
Class diagrams and use case diagrams are used to illustrate systems based on the concept of ____.

a). procedures
b). functions
c). entities
d). objects

d). objects
____ are useful for identifying procedures and summarizing the decision making process for one step of a system.

a). Decision tables
b). Feasibility reports
c). Data dictionaries
d). Entity-relationship diagrams

a). Decision tables
____ is a conceptual blueprint that defines the structure and operations of an enterprise (a business, organization, government agency, or other entity).

a). Business intelligence
b). System architecture
c). Business flowchart
d). Enterprise architecture

d). Enterprise architecture
Mary is entering her senior year of college. She has a meeting on Friday with her advisor to discuss her career plans.

Mary is interested in identifying the business needs of a system and ensuring the systems meet those needs. Her advisor will probably tell her to look into becoming a ____.

a). database analyst
b). business analyst
c). communications analyst
d). computer operator

b). business analyst
____ is a useful sales and marketing tool to help companies match customers with products they would be likely to purchase.

a). Customer service
b). Customer profiling
c). Personalization
d). Data mining

b). Customer profiling
A(n) ____ is a collection of elements (people, hardware, software, and data) and procedures that interact to generate information needed by the users in an organization.

a). operating system
b). information system
c). device
d). utility program

b). information system
A(n) ____ provides regular, routine, and timely information to decision makers.

a). transaction processing system
b). office system
c). general ledger system
d). management information system (MIS)

d). management information system (MIS)
____ managers include supervisors, office managers, foremen, and other managers who supervise nonmanagement workers.

a). Operational
b). Executive
c). Middle
d). External

a). Operational
Although more expensive than conventional outsourcing since company staff must maintain the facilities, train employees, and oversee the facility, ____ does give the company much more control.

a). captive offshoring
b). indirect outsourcing
c). capital offshoring
d). pointed outsourcing

a). captive offshoring
To help store, organize, and retrieve documents once they have been created in or converted to an electronic format, ____ systems can be used.

a). transaction processing
b). document processing
c). document management
d). office automation

c). document management
A company’s ____ oversees routing transaction processing and information systems activities, as well as other computer-related areas.

a). chief executive officer (CEO)
b). chief security officer (CSO)
c). chief information officer (CIO)
d). chief data officer (CDO)

c). chief information officer (CIO)
Mother Goose Computing, Inc. provides computational biology consulting services. They are currently updating several of their systems.

For the protein folding division, Mother Goose is planning to implement the new system module by module. This is called a ____ conversion.

a). phased
b). direct
c). parallel
d). pilot

a). phased
Artificial intelligence systems that attempt to imitate the way a human brain works are called ____.

a). neural networks
b). expert systems
c). robots
d). biometric systems

a). neural networks
____ carry on written “conversations” with people in a natural language.

a). Expert systems
b). Intelligent agents
c). Chatterbots
d). Neural networks

c). Chatterbots
The objective of ____ is to gather useful data about the system under study.

a). data design
b). data processing
c). data collection
d). data analysis

c). data collection
A(n) ____ is used to describe the characteristics of data used in a database or other type of computer system.

a). system flowchart
b). input/output design
c). data dictionary
d). preliminary design

c). data dictionary
Mother Goose Computing, Inc. provides computational biology consulting services. They are currently updating several of their systems.

For the genomics division, Mother Goose is planning to replace the old system by the new one all at once. This is called a ____ conversion.

a). phased
b). direct
c). parallel
d). pilot

b). direct
Kelly is a college sophomore majoring in computer science. She is interested in gaining exposure to the most useful and current programming languages and techniques.

One of the languages that Kelley is learning is ____ an object-oriented programming language that is commonly used to write Web applications.

a). C
b). Java
c) Visual Basic
d). COBOL

b). Java
In a computer program, ____ are named memory locations that are defined for that particular program and are used to store the current value of data items used in the program.

a). cells
b). variables
c). objects
d). buses

b). variables
In a(n) ____ check, the programmer “walks” through the program design, keeping track of the values of any loop counters and other variables in a tracing table to ensure the program does what it is intended to do.

a). desk
b). line
c). alpha
d). bet

a). desk
____, which dates back to 1954, was designed by scientists and is oriented toward manipulating formulas for scientific, mathematical, and engineering problem solving applications.

a). COBOL
b). Pascal
c). BASIC
d). FORTRAN

d). FORTRAN
A(n) ____ is designed for a specific programming language and translates programs written in that language into machine language so it can be executed.

a). compiler
b). macro
c). generator
d). decoder

a). compiler
A ____ is simply a series of statements that follow one another. After the first statement has been carried out completely, the program control moves to the next statement, and so forth.

a). selection control structure
b). sequence control structure
c). control structure
d). repetition control structure

b). sequence control structure
Java is currently one of the most popular programming languages and has replaced ____ as the programming language used for the computer science Advanced Placement exam taken by high school students to earn college credit.

a). C++
b). Visual Basic
c). BASIC
d). C

a). C++
Kelly is a college sophomore majoring in computer science. She is interested in gaining exposure to the most useful and current programming languages and techniques.

During the summer, Kelly will be writing a compiler as part of a research project. To prepare, she is learning ____, a functional language.

a). C
b). Java
c). Visual Basic
d). Scheme

d). Scheme
The figure above shows the ____ control structure.

a). do until
b). do while
c). if-then-else
d). case

a). do until
Program ____ use graphic symbols and relational operators (such as
b). flowcharts
A(n) ____ occurs when a do while condition never becomes false or a do until condition never becomes true.

a). repetition loop
b). coded loop
c). if-then-else loop
d). infinite loop

d). infinite loop
Fourth-generation languages (4GLs) are ____.

a). procedural programming languages
b). very-high-level languages
c). high-level languages
d). interpreted languages

b). very-high-level languages
New trends in programming such as Microsoft’s ____ are helping to bridge different platforms and programming languages.

a). Visual Basic
b). ActiveX
c). .NET framework
d). SQL

c). .NET framework
A(n) ____ occurs when the programmer has not followed the proper rules of the programming language being used.

a). logic error
b). assembly error
c). syntax error
d). coding error

c). syntax error
Programmers often use temporary dummy print statements—print statements that are temporarily inserted into the code—to help locate a ____.

a). syntax error
b). rules error
c). compile-time error
d). logic error

d). logic error
____ is a broad term to describe creating and managing an application throughout its entire lifecycle—from design through testing.

a). Rapid application development (RAD)
b). Program development life cycle (PDLC)
c). Application Lifecycle Management (ALM)
d). Application software development life cycle (ASDLC)

c). Application Lifecycle Management (ALM)
The first official recorded use of the word “bug” in the context of computing is associated with the temporary failure of the ____ computer.

a). Mark II
b). ENIAC
c). UNIVAC
d). Apple II

a). Mark II
____ are notes within the actual program code that identify key features and steps of the program but that are written in such a way that the computer knows to ignore them when the program is executed.

a). Comments
b). Variables
c). Bugs
d). Loops

a). Comments
____ is a software development approach that continues the programming trend of breaking a software program into small and more manageable pieces that overlap in functionality as little as possible.

a). Object-Oriented Programming (OOP)
b). Structured programming
c). Object Programming (OP)
d). Aspect-oriented programming (AOP)

d). Aspect-oriented programming (AOP)
A(n) ____ is a software program that helps programmers develop software.

a). application generator
b). report generator
c). form generator
d). data generator

a). application generator
According to IBM, ____ has yielded significant benefits in the quality of the code and the speed with which programmers can write programs.

a). SDLC
b). OOP
c). PDLC
d). AOP

d). AOP
Rather than creating a complete object module for a program, a(n) ____ reads, translates, and executes the source program one line at a time.

a). compiler
b). interpreter
c). assembler
d). generator

b). interpreter
Two of the most significant approaches to programming are procedural programming and ____.

a). aspect-oriented programming
b). object-oriented programming
c). function programming
d). virtual programming

b). object-oriented programming
The Rainbow Trout Company specializes in developing software that is useful to amateur and professional fishermen. They often work on projects with constantly changing requirements.

To allow everyone, not just the original programmer, to understand the source code of a program, the Rainbow Trout Company follows a set of ____—a list of rules designed to standardize programming styles.

a). UMLs
b). flowcharts
c). RADs
d). coding standards

d). coding standards
A(n) ____ is designed for a specific programming language and translates programs written in that language into machine language so it can be executed.

a). compiler
b). macro
c). generator
d). decoder

a). compiler
Programs created for mass distribution often have two stages of testing: an internal onsite test and one or more rounds of outside tests (called ____).

a). benchmark tests
b). bug tests
c). alpha tests
d). beta tests

d). beta tests
The Rainbow Trout Company specializes in developing software that is useful to amateur and professional fishermen. They often work on projects with constantly changing requirements.

The Rainbow Trout Company uses the ____ approach, which emphasizes teams of people working closely together, which provides for continuous learning and adaptation as the project is developed.

a). expert programming
b). rapid application development
c). agile software development
d). team development

c). agile software development
____, which dates back to 1954, was designed by scientists and is oriented toward manipulating formulas for scientific, mathematical, and engineering problem solving applications.

a). COBOL
b). Pascal
c). BASIC
d). FORTRAN

d). FORTRAN
____ was designed as an easy-to-learn beginner’s language that would work in a friendly, nonfrustrating programming environment.

a). FORTRAN
b). COBOL
c). BASIC
d). Java

c). BASIC
In a(n) ____ check, the programmer “walks” through the program design, keeping track of the values of any loop counters and other variables in a tracing table to ensure the program does what it is intended to do.

a). desk
b). line
c). alpha
d). beta

a). desk
Kelly is a college sophomore majoring in computer science. She is interested in gaining exposure to the most useful and current programming languages and techniques.

One of the languages that Kelley is learning is ____ an object-oriented programming language that is commonly used to write Web applications.

a). C
b). Java
c). Visual Basic
d). COBOL

b). Java
____ is the first phase of the PDLC.

a). Program coding
b). Program design
c). Problem analysis
d). Program debugging

c). Problem analysis
Java is currently one of the most popular programming languages and has replaced ____ as the programming language used for the computer science Advanced Placement exam taken by high school students to earn college credit.

a). C++
b). Visual Basic
c). BASIC
d). C

a). C++
Kelly is a college sophomore majoring in computer science. She is interested in gaining exposure to the most useful and current programming languages and techniques.

During the summer, Kelly will be writing a compiler as part of a research project. To prepare, she is learning ____, a functional language.

a). C
b). Java
c). Visual Basic
d). Scheme

d). Scheme
In a computer program, ____ are named memory locations that are defined for that particular program and are used to store the current value of data items used in the program.

a). cells
b). variables
c). objects
d). buses

b). variables
Fourth-generation languages are commonly used to access ____.

a). documents
b). object code
c). databases
d). source code

c). databases
____ is a software development approach that continues the programming trend of breaking a software program into small and more manageable pieces that overlap in functionality as little as possible.

a). Object-Oriented Programming (OOP)
b). Structured programming
c). Object Programming (OP)
d). Aspect-oriented programming (AOP)

d). Aspect-oriented programming (AOP)
The earliest programming languages—machine language and assembly language—are referred to as ____.

a). low-level languages
b). third-generation programming languages (3GLs)
c). procedural programming languages
d). interpreted languages

a). low-level languages
The Rainbow Trout Company specializes in developing software that is useful to amateur and professional fishermen. They often work on projects with constantly changing requirements.

The Rainbow Trout Company maintains a database of clients. To search through this database, they use ____, a 4GL.

a). SQL
b). COBOL
c). C
d). Java

a). SQL
____ errors occur when a formula is written incorrectly, when a mistake is made with a decision condition, or when the wrong variable name is used.

a). Syntax
b). Compiler
c). Logic
d). Debugging

c). Logic
____ create the forms or screens used to input data into a program or database.

a). Form generators
b). Report generators
c). Application generators
d). Data generators

a). Form generators
____ are small programs that are designed to be inserted into Web pages and run using a Java-enabled Web browser.

a). Java zines
b). Java applets
c). Java bytecodes
d). Java VMs

b). Java applets
____ was created to fill the need for a teaching tool to encourage structured programming.

a). FORTRAN
b). Java
c). COBOL
d). Pascal

d). Pascal
____ values are values that represent one of two states—yes (true) or no (false).

a). Boolean
b). Character
c). String
d). Real

a). Boolean
With ____, the computer uses each record’s primary key field and a mathematical formula called a hashing algorithm to determine a unique address that identifies where the record is physically stored in the database file.

a). real-time organization
b). indexed organization
c). sequenced organization
d). direct organization

d). direct organization
Data definition involves describing the properties of the data that go into each database table, specifically the ____ that make up the database.

a). records
b). rows
c). fields
d). characters

c). fields
A field is also called a ____.

a). column
b). row
c). table
d). record

a). column
____ is a growing concern because of the vast amounts of personal data stored in databases today and the many breaches that have occurred in the recent past.

a). Data privacy
b). Data integrity
c). Data accessibility
d). Data legibility

a). Data privacy
____ are made up of related records.

a). Rows
b). Fields
c). Columns
d). Tables

d). Tables
James is a recent college graduate and has six months of IT experience. He is thinking about pursuing a certification program in order to demonstrate that he is serious about IT.

James is most interested in becoming a database designer. Another name for this career choice is database ____.

a). architect
b). developer
c). programmer
d). administrator

a). architect
James is a recent college graduate and has six months of IT experience. He is thinking about pursuing a certification program in order to demonstrate that he is serious about IT.

Database designers work with systems analysts and other individuals involved in ____.

a). CCP
b). DBMS
c). SDLC
d). CDMP

c). SDLC
In a typical client-server database application, the client is called the ____.

a). back end
b). rear end
c). portal
d). front end

d). front end
Individual database tables are often referred to as ____.

a). low files
b). base files
c). flat files
d). clear files

c). flat files
Most DBMSs come bundled with a set of tools to perform a variety of necessary tasks, such as building user interfaces, creating forms and reports, and interfacing with query languages and ____ for complex applications.

a). query wizards
b). programming languages
c). report generators
d). form screens

b). programming languages
One of the simplest hashing algorithms involves dividing the primary key field by a particular ____.

a). power of two
b. prime number
c). irrational number
d). transcendental number

b. prime number
The field in a table that is used to relate that table to other tables is called the ____.

a). composite key
b). secondary key
c). primary key
d). primary field

c). primary key
The JL Group is a political think tank that is incorporating new media into their analyses.

The JL Group has gathered data on voting habits. In order to make sure that respondents cannot claim to have voted in more elections than is possible given their age, ____ rules can be assigned to the database tables.

a). index validation
b). record validation
c). DBA validation
d). dynamic

b). record validation
The key characteristics for an OODBMS (including objects, attributes, methods, ____, and inheritance) are similar to object-oriented programming principles.

a). pages
b). scripting
c). conversion
d). classes

d). classes
Web-based database requests are received by the Web server, which then converts the request into a database query and passes it on to the database server with the help of software called ____.

a). middleware
b). capsules
c). macros
d). applets

a). middleware
The JL Group is a political think tank that is incorporating new media into their analyses.

The employees of JL Group who use the database of the company for their daily work, without having knowledge of how the underlying database is structured, interact with the database ____.

a). using the database script
b). through the database designer
c). through the database programmer
d). using the user interface

d). using the user interface
____ actually create the database, based on the design generated by the database designer, and get it ready for data entry.

a). Database developers
b). Database administrators (DBAs)
c). Database security officers
d). Database analysts

a). Database developers
The characteristics of an entity are called ____.

a). attributes
b). variables
c). traits
d). fields

a). attributes
A(n) ____ is a small table consisting only of a list of the primary key field for each record in a table along with location information for that record.

a). tablet
b). keyword
c). index
d). main table

c). index
To create a query, users can either type a query using SQL or, more commonly, use the query tools built into the DBMS (such as a query design screen or query ____) to create a query object.

a). command
b). line
c). wizard
d). key

c). wizard
The ____ is the most widely used database model today.

a). hierarchical database management system
b). relational database management system (RDBMS)
c). network database management system
d). database management system (DBMS)

b). relational database management system (RDBMS)
Middleware for Web database applications is commonly written as ____—short sections of code written in a programming or scripting language that are executed by another program.

a). scripts
b). JavaScripts
c). applets
d). utilities

a). scripts
One of the properties that can be assigned to a field is a(n) ____ to specify the format (such as letters, numbers, or symbols) that must be entered into a field.

a). format structure
b). input mask
c). data mask
d). data filter

b). input mask
The JL Group is a political think tank that is incorporating new media into their analyses.

The JL Group is in the process of creating dynamic Web pages to poll politically aware young adults. They are interested in creating scripts that are compatible with many types of databases, so they are using the ____ language.

a). CGI
b). API
c). COBOL
d). PHP

d). PHP
A ____ holds a single category of data (such as customer names or employee telephone numbers) that will be stored in a database.

a). cell
b). field
c). table
d). record

b). field
With a ____, a database is located in its entirety on a single computer, such as a server or mainframe computer.

a). distributed database system
b). star database system
c). centralized database system
d). ring database system

c). centralized database system
DBMSs available for use on personal computers include ____ and Corel Paradox.

a). IBM DB2
b). Microsoft Access
c). Adobe Acrobat
d). Adobe Fireworks

b). Microsoft Access
A ____ extracts specific information from a database by specifying particular conditions (called criteria) about the data you would like to retrieve.

a). form
b). query
c). macro
d). view

b). query
A ____ is a collection of related fields.

a). table
b). field
c). column
d). record

d). record
If a new database is to be used with existing data, the data needs to be transferred from its existing form into the new system—a process called ____.

a). migration
b). conversion
c). normalization
d). accommodation

a). migration
Data definition involves describing the properties of the data that go into each database table, specifically the ____ that make up the database.

a). records
b). rows
c). fields
d). characters

c). fields
The figure above illustrates a ____, created from data contained in a database.

a). report
b). query
c). form
d). table

a). report
The process of evaluating and correcting the structures of the tables in a database to minimize data redundancy is called ____.

a). normalization
b). cyclic redundancy check
c). zeroing
d). zonification

a). normalization
In ASPs, the code to tie the database to the Web site is typically written in JavaScript or ____.

a). VBScript
b). CGI
c). PHP
d). BasicScript

a). VBScript
The ____ contains all data definitions for a database, including table structures, security information,
relationships between the tables in the database, and so on.

a). database book
b). data dictionary
c). data box
d). data book

b). data dictionary
A record is also called a ____.

a). field
b). report
c). row
d). table

c). row
____ databases are designed to store a collection of summarized data for quick and easy data analysis.

a). Relational
b). Object-oriented
c). Analytical
d). Multidimensional

d). Multidimensional
____ refers to the ability of one computing device on a network (such as the Internet) to locate and identify another device on the same network and determine its status.

a). Presence technology
b). Computer monitoring
c). Digital surveillance
d). Detection technology

a). Presence technology
Creating a ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy.

a). mirror
b). hotspot
c). hot file
d). backup

d). backup
Collecting in-depth information about an individual is known as ____.

a). personal databasing
b). identity theft
c). information piracy
d). electronic profiling

d). electronic profiling
____ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes.

a). Computer monitoring
b). Computer surveillance
c). Multimedia surveillance
d). Video surveillance

d). Video surveillance
Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information.

Before providing any personal information on a shopping site, Samuel always reads the Web site’s ____.

a). protection history
b). consumer policy
c). privacy record
d). privacy policy

d). privacy policy
For monitoring the physical locations of employees, video cameras can be used, but another possibility is the use of ____.

a). proximity cards
b). presence technology
c). face recognition
d). video cards

a). proximity cards
____ cameras are also increasingly being installed in schools in the United States and other countries to enable administrators to monitor both teacher and student activities.

a). Computer monitoring
b). Computer surveillance
c). Multimedia surveillance
d). Video surveillance

d). Video surveillance
A marketing activity that can be considered a privacy risk is ____.

a). security threads
b). watermarking
c). electronic profiling
d). microprinting

c). electronic profiling
Users who want their desktop computers to remain powered up when the electricity goes off should use a(n) ____, as shown in the accompanying figure.

a). UPS
b). surge suppressor
c). voltage controller
d). voltage meter

a). UPS
Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information.

In order to lessen the chances of his main e-mail address getting spam, he uses a ____ e-mail address when shopping online.

a). kill switch
b). throw-away
c). permanent
d). keylogging

b). throw-away
Hardware loss, as well as other security issues, can result from hardware damage (both intentional and accidental) and ____.

a). spikes
b). interrupted power
c). system failure
d). all of the above

d). all of the above
____ programs can be used to detect and remove some types of illegal computer monitoring and spyware software.

a). Antivirus software
b). Antispyware software
c). Antispoof software
d). Antiphish software

b). Antispyware software
____ refers to companies recording or observing the actions of employees while on the job.

a). Computer monitoring
b). Video surveillance
c). Employee monitoring
d). Identity theft

c). Employee monitoring
Our networked society has raised a number of ____ concerns.

a). privacy
b). patent
c). hardware theft
d). software quality

a). privacy
____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object.

a). Surge suppressors
b). Password locks
c). Spike suppressors
d). Cable locks

d). Cable locks
IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions.

Another client owns a large number of expensive electronic devices and would like to be able to recover them in case of theft. IBF advises her to attach ____ to these devices.

a). kill switches
b). surge suppressors
c). asset tags
d). keyloggers

c). asset tags
Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.

a). piracy policy
b). security policy
c). identity policy
d). privacy policy

d). privacy policy
The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN.

a). encrypted
b). locked
c). registered
d). indexed

a). encrypted
The high level of concern regarding computer security and personal privacy has led state and federal legislators to pass a variety of laws since the ____.

a). 1950s
b). 1960s
c). 1970s
d). 1980s

c). 1970s
IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions.

One of their clients has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which of the following technologies would be useful in this case?

a). kill switch hard drives
b). surge suppressors
c). DataDots
d). keylogging software

a). kill switch hard drives
Although many of us may prefer not to think about it, ____—the complete malfunction of a computer system—and other types of computer-related disasters do happen.

a). software piracy
b). interrupted power
c). spikes
d). system failure

d). system failure
____ are used for marketing purposes, such as sending advertisements that fit each individual’s interests or trying to sign people up over the phone for some type of service.

a). Government databases
b). Marketing databases
c). Educational databases
d). Research databases

b). Marketing databases
Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information.

To further protect his privacy, Samuel has decided to ____ from certain companies by instructing those companies to not to share his personal information with third parties.

a). opt out
b). disengage
c). build filters
d). block contact

a). opt out
To prevent the counterfeiting of U.S. currency, the Treasury Department releases new currency designs every ____.

a). 7 to 10 years
b). 10 years
c). 10 to 12 years
d). 12 years

a). 7 to 10 years
For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.

a). junkie e-mail address
b). throw-away e-mail address
c). one-use e-mail address
d). second-hand e-mail address

b). throw-away e-mail address
____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone’s computer activity.

a). Surveillance software
b). Video software
c). Computer monitoring software
d). Audio software

c). Computer monitoring software
By ____, you instruct companies you do business with that they cannot share your personal data with third parties.

a). signing piracy agreements
b). opting out
c). contracting legal help
d). e-mailing them

b). opting out
To facilitate using a computer lock, nearly all computers today come with a ____—a small opening built into the system unit case designed for computer locks.

a). security slot
b). cable anchor
c). security opening
d). user lock

a). security slot
____ devices are designed to withstand much more physical abuse than conventional devices.

a). Secured
b). Ruggedized
c). Malleable
d). Flexible

b). Ruggedized
When spam is sent via IM it is called ____.

a). spoof
b). phish
c). spim
d). junk

c). spim
A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business’s operations going.

a). buddy site
b). alternate pad
c). hot site
d). white room

c). hot site
____ devices typically have a durable case and are spill-resistant, but may not withstand falls from three feet or more onto concrete.

a). Malleable
b). Rugged
c). Semirugged
d). Ultrarugged

c). Semirugged
One common way to deal with spam that makes it to your computer is to use a(n) ____.

a). e-mail filter
b). spam e-mail address
c). encryption scheme
d). hot site

a). e-mail filter
Laptop ____ protect portable computers from scratches and other damage when they are carried in a conventional briefcase or bag.

a). pads
b). sleeves
c). pillows
d). cushions

b). sleeves
Some software tools are not designed to prevent hardware from being stolen; instead, they are designed to aid in its ____.

a). recycle
b). recovery
c). repair
d). running

b). recovery
Expired toner cartridges and ink cartridges can sometimes be returned to the manufacturer or exchanged when ordering new cartridges; the cartridges are then ____ and resold.

a). reprogrammed

b). refurbished

c). recharged

d). recycled

c). recharged
An emotional health concern related to computer use is ____.

a). CTS

b). CVS

c). addiction to the Internet or another technology

d). sore or stiff neck

c). addiction to the Internet or another technology
A ____ is a policy, often for a school or business, that specifies allowable use of resources such as computers and other equipment.

a). code of security

b). code of conduct

c). privacy policy

d). piracy policy

b). code of conduct
In addition to being annoying and a waste of time, ____ bog(s) down e-mail systems and clog users’ Inboxes.

a). computer worms

b). Trojan horses

c). e-mail hoaxes

d). digital manipulation

c). e-mail hoaxes
Heavy use of computers, combined with information overload and 24/7 accessibility via technology, can lead to ____—a state of fatigue or frustration brought about by overwork.

a). burnout

b). CTS

c). CVS

d). RSI

a). burnout
While a keyboard, mouse, monitor, and printer can be connected to a portable computer directly, a ____ is a device designed to more easily connect a portable computer to peripheral devices.

a). notebook holder

b). laptop station

c).notebook stand

d). docking station

d). docking station
A ____ protects inventions by granting exclusive rights of an invention to its inventor for a period of 20 years.

a). trademark

b). watermark

c). patent

d). copyright

c). patent
____ is an example of assistive output devices.

a). One-handed keyboard

b). Head-pointing system with puff switch

c). Voice input system

d). Screen reader software

d). Screen reader software
The growth in assistive technology is due in part to demands by disabled individuals and disability organizations for equal access to computers and Web content, as well as the ____ (ADA).

a). American Data Act

b). Assistive Data Act

c). American Democracy Act

d). Americans with Disabilities Act

d). Americans with Disabilities Act
Jill is starting a fast food delivery company. She has designed a logo and plans to print flyers to advertise her services.

Jill plans on publishing a book based on her experiences in order to help young entrepreneurs. To help protect her publishing rights, she should register a ____.

a). patent

b). trademark

c). copyright

d). digital watermark

c). copyright
____ is a policy where manufacturers are responsible for the entire lifecycle of their products and packaging, including recycling.

a). Green Grid Alliance

b). Energy Star Alliance

c). Paperless Library

d). Extended producer responsibility

d). Extended producer responsibility
Adding to the problem of unethical ____ is the use of digital cameras today, which eliminate the photo negatives that could be used with film cameras to show what photographs actually looked like at the time they were taken.

a). cybersquatting

b). digital counterfeiting

c). identity theft

d). digital manipulation

d). digital manipulation
With more than 78% of its population online, ____ is the leading world region in Internet users.

a). Middle East

b). Europe

c). Africa

d). North America

d). North America
Jill is starting a fast food delivery company. She has designed a logo and plans to print flyers to advertise her services.

In order to prevent others from stealing her logo, Jill should get a ____.

a). patent

b). trademark

c). copyright

d). digital watermark

b). trademark
In addition to being a copyright concern, ____ can be used to misquote individuals, repeat comments out of context, retouch photographs—even create false or misleading photographs.

a). digital counterfeiting

b). identity theft

c). plagiarism

d). digital manipulation

d). digital manipulation
Repetitive stress injuries and other injuries related to the workplace environment are estimated to account for ____ of all serious workplace injuries.

a). one-fifth

b). one-fourth

c). one-third

d). one-half

c). one-third
Ethical decisions need to be made whenever a business practice or product is legal or socially acceptable in one country, but not another. One example is ____.

a). copyright law

b). religion

c). vaporware

d). corporate missions

a). copyright law
A(n) ____ is a form of protection available to the creator of an original artistic or literary work, such as a book, movie, software program, musical composition, or painting.

a). trademark

b). copyright

c). patent

d). intellectual ownership right

b). copyright
In reaction to scandals, Congress passed the Sarbanes-Oxley Act of 2002, which includes provisions to require ____ to personally vouch for the truth and fairness of their company’s disclosures.

a). CEOs and CIOs

b). CEOs and CFOs

c). SOAs and DRMs

d). CCVs and DRMs

b). CEOs and CFOs
Jack is a computer programmer who spends most of the day at his desk. Recently, he visited the doctor to get advice about persistent eyestrain and an aching back.

To combat his backache, Jack’s doctor advised him to ____.

a). use a footrest

b). use a lower screen resolution

c). turn down the volume when using headphones

d). use a light touch on the keyboard

a). use a footrest
Jill is starting a fast food delivery company. She has designed a logo and plans to print flyers to advertise her services.

Jill has poor eyesight. When proofreading her book, she can use a ____ that will read aloud whatever she has typed.

screen reader

Braille keyboard

head mouse

switch

screen reader
In 1992, the U.S. Environmental Protection Agency (EPA) introduced ____ as a voluntary labeling program designed to identify and promote energy-efficient products to reduce greenhouse gas emissions.

ENERGY STAR

Eco-Label

VeriChip

Quality Flower

ENERGY STAR
The goal of ____ is to ensure that every child in the world between the ages of 6 and 12 has immediate access to a personal laptop computer by 2015, in order to provide them with access to new channels of learning, sharing, and self-expression.

OX

Simputer

OLPC

InternetWorld

OLPC
A ____ is a subtle alteration of digital content that is not noticeable when the work is viewed or played but that identifies the copyright holder.

digital patent

digital trademark

digital watermark

digital copyright

digital watermark
Repetitive stress injuries and other injuries related to the workplace environment are estimated to account for ____ of all serious workplace injuries.

one-fifth

one-fourth

one-third

one-half

one-third
To prevent sore or stiff neck, ____.

use a footrest, if needed, to keep your feet flat on the floor

cover windows or adjust lighting to eliminate glare

rest and gently stretch your fingers and arms every 15 minutes or so

place the monitor directly in front of you

place the monitor directly in front of you
Antiglare screens are sometimes called ____.

privacy filters

eye protectors

monitor filters

protection goggles

privacy filters
The U.S. Anticybersquatting Act makes ____ cybersquatting illegal.

IP address

domain name

URL

Web site name

domain name
Jack is a computer programmer who spends most of the day at his desk. Recently, he visited the doctor to get advice about persistent eyestrain and an aching back.

To combat his eyestrain, Jack’s doctor advised him to ____.

use a lower screen resolution
turn down the volume when using headphones
use a light touch on the keyboard

use a lower screen resolution