CPSC 1105 – Flashcard

Unlock all answers in this set

Unlock answers
question
Employers today rely on knowledge workers' _____ skills to keep them competitive.
answer
computer
question
A general-purpose computer relies on the _____ being used to perform an activity.
answer
software
question
A computer relies on the combination of _____ and _____ to operate.
answer
hardware, software
question
A computer that manages information uses a _____ to organize and deliver it.
answer
database
question
What two digits represent the binary number system?
answer
0 and 1
question
A _____ is an example of a computer assigned to a special task.
answer
kiosk
question
One thing to consider when choosing a mobile device is _____.
answer
battery life
question
The speed of the ____ dictates how fast the processor can process data.
answer
internal clock
question
Using Moore's Law, we can gauge how ____ processors might be in the coming years.
answer
fast
question
Integrated circuits are also known as ____.
answer
microchips
question
Most of today's PCs come equipped with at least 512 ____ of video memory.
answer
megabytes
question
An example of digital convergence is our smart phone which combines many digital functions into one device.
answer
True
question
A bit has two states, left or right.
answer
False
question
ASCII is the standard used to represent ____ in digital form—with 1s and 0s.
answer
keyboard characters
question
The ____ rate for a hard disk drive is much slower than that of solid-state storage.
answer
access
question
The task of video _____ is to serve as a buffer between the processor and the monitor.
answer
memory
question
Video cards have their own _____.
answer
memory
question
A mouse and a touch pad are examples of ____ devices.
answer
pointing
question
Display size is measured ____.
answer
diagonally
question
Large retail stores use _____ terminals to track purchases and inventory.
answer
POS
question
There are ____ stages to the software development life cycle.
answer
five
question
Which of the following is NOT an object-oriented programming language?
answer
UNIX
question
A PC comes with all of the following EXCEPT ____.
answer
custom software
question
Small businesses can take advantage of _____ software in the cloud to keep track of their customers and everyday transactions.
answer
CRM
question
A(n) ____ license defines the permissions, rights, and restrictions provided to the person who purchases a copy of a work.
answer
software
question
All of the following are examples of freeware EXCEPT ____.
answer
Microsoft Office
question
Many in the open-source movement are opposed to ____ software, like that developed by Microsoft.
answer
proprietary
question
The ____ license was designed to fill the gap between full copyright and public domain options for authors, artists, and educators.
answer
Creative Commons
question
If you create, develop, or pay to have a software program written, it becomes your intellectual property.
answer
True
question
Shareware is software that is made available to the public at no cost.
answer
False
question
A type of computer connection that provides Internet service through a phone line that services both the Interent and your phone is ____.
answer
DSL
question
One feature of Internet2 technology is ____.
answer
speed
question
The Internet has become an important part of daily life for only businesses and professionals.
answer
False
question
Using the Web as a primary user interface to access the Internet is also referred to as ____.
answer
cloud computing
question
A popular Web server software today is ____.
answer
Apache
question
A cookie file is stored on a user's computer.
answer
True
question
Google relies on ____ to relay information related to its mapped software.
answer
satellites
question
Playing online Scrabble with others on the Web at any given time is an example of a ____ gaming experience.
answer
multiplayer
question
Having a personal Web site that lists your accomplishments can help your job search.
answer
True
question
Facebook is a popular Web application.
answer
True
question
There is hope that WiMAX technology will help resolve the ____ problem.
answer
last mile
question
A ____ is considered a telecommunications device that sends and receives signals.
answer
all of the above
question
____ is a popular cable type used as network backbone by major telecommunications companies.
answer
Fiber-optic
question
With the advent of ____ generation technology, broadband Internet services over cellular networks were made available.
answer
fourth (4G)
question
A pager receives signals from ____.
answer
transmitters
question
Tagging a photo with geographic data is known as ____.
answer
geotagging
question
With Bluetooth, up to ____ devices can be paired simultaneously.
answer
seven
question
Items such as a credit cards are beginning to take advantage of RFID technology through the use of a(n) ____ reader.
answer
NFC
question
A ____ Area Network is the interconnection of personal information technology devices, typically wirelessly, within the range of an individual.
answer
Personal
question
Wide Area Networks use telecommunication devices such as ____ to transmit data.
answer
satellites
question
The ____ was the first eBook reading device to gain widespread acceptance.
answer
Kindle
question
Only slate devices such as the iPad are capable of supporting eBooks.
answer
False
question
An advantage of using a(n) ____ format is its ability to compress CD music files to one tenth their original size.
answer
MP3
question
When you digitize a sound wave, you measure and record its ____ at regular time intervals called the sampling rate.
answer
amplitude
question
Designers rely on ____ software to help them build prototypes for further research and testing.
answer
CAD
question
An example of a vector graphic image is ____.
answer
clip art
question
Digital photography captures, stores, and manipulates photographs digitally as a series of ____.
answer
1s and 0s
question
All of the following are photo-editing software applications EXCEPT ____.
answer
Adobe Illustrator
question
The editing tools provided on today's camcorders are as sophisticated and powerful as those provided by video-editing software.
answer
False
question
Social networks employ virtual reality to provide an environment in which individuals can interact through the use of ____.
answer
avatars
question
In a database, a collection of related fields that describes some object or activity is referred to as a ____.
answer
record
question
Relationships between tables can be illustrated through a(n) ____ relationship diagram.
answer
entity
question
When building a database, careful consideration must be given to ____.
answer
content
question
In a database, your first name would be categorized as a ____.
answer
field
question
____ usually involves breaking one table into two or more tables in order to correct a data problem or anomaly.
answer
Normalization
question
A database ____ is a graphical representation of the structure of a database.
answer
schema
question
A schema can stand alone or be part of a database.
answer
True
question
On Amazon.com, when the customer is ready to make a purchase, the database ____ manages the entire process.
answer
management system
question
Installation and ongoing function of software on a database system is the job of the database ____.
answer
administrator
question
A retail store may use the ____ approach to analyze data collected from checkout scanners.
answer
business-intelligence
question
In the ____ form of e-commerce, transactions between businesses across private networks, the Internet, and the Web are supported.
answer
B2B
question
The popularity of ____ e-commerce is a good example of how customers can successfully implement their own sales strategy on the Web.
answer
C2C
question
Companies take advantage of location-based advertising when you visit such sites as ____.
answer
foursquare.com
question
Many e-tail sites support ____ virtual imagery, so you can easily view what you want to purchase in full detail.
answer
three-dimensional
question
Online ____, such as uBid.com, provide a method for manufacturers to liquidate stock and for consumers to find a good deal.
answer
clearinghouses
question
____ supply management services have played an important role in building relationships between corporate buyers and sellers.
answer
Global
question
All of the following are technologies that play an important role in e-commerce EXCEPT ____.
answer
DHTML
question
Electronic data interchange uses private communications networks called ____ networks.
answer
value-added
question
Hosting companies provide all the necessary software tools to deliver e-commerce applications EXCEPT ____.
answer
shipping
question
Information transmitted from an online sales transaction uses a secure ____ connection where buyers enter their account information and submit it.
answer
encrypted
question
An MIS system uses a(n) ____ report when a request is made by a specific person for a specific purpose.
answer
demand
question
A corporation relies on its ____ statistics to provide insight into the state of the business and its overall health.
answer
key performance indicator
question
Management information systems are powered by ____.
answer
databases
question
The final stage of decision making and problem solving is known as the ____ stage, where the results of a decision are reviewed.
answer
monitoring
question
Which of the following is NOT a benefit of an ERP system?
answer
low expense in time and money
question
Solutions that deliver improved customer service and targeted marketing support all of the following areas of an enterprise EXCEPT ____.
answer
human resources
question
A(n) ____ system can help a business alleviate the need for multiple information system programs.
answer
enterprise
question
The first step in systems analysis is to ____ of the organization and how the computer system can help solve them.
answer
identify the overall goals
question
In a Gantt chart, each time a ____ is completed, a grid cell is marked to indicate its completion.
answer
task
question
In a(n) ____ analysis, the strengths and weaknesses of the existing business are uncovered.
answer
systems
question
Computerized expert systems use ____ to arrive at conclusions or make suggestions.
answer
heuristics
question
Communication and language are key elements in the ____.
answer
Turing Test
question
Singularity embraces the idea of ____ and other recent trends in technology.
answer
Moore's Law
question
AI systems typically include all of the following EXCEPT ____.
answer
concatenated methodologies
question
A(n) ____ system is software that is knowledgeable in a particular field or area.
answer
expert
question
Computational intelligence is directly related to ____.
answer
artificial intelligence
question
Medical robots are built with ____ machine capabilities and sophisticated AI controlling software.
answer
high-precision
question
AI expert ____ has created an AI program he calls the Cybernetic Poet that can create poetry in the style of human poets.
answer
Ray Kurzweil
question
Through ____, a computer can pick up movement in its environment.
answer
visual input
question
Facial recognition is used in ____ to verify a person's identity.
answer
authentication
question
____ permissions provide registered users with access to the files they need, while restricting access to private resources.
answer
User
question
A company may hire a ____ hacker to learn about vulnerabilities in their system.
answer
white-hat
question
All of the following are examples of malware EXCEPT for ____.
answer
updates
question
The process of examining computing equipment to determine if it has been used for illegal, unauthorized, or unusual activities is known as ____.
answer
computer forensics
question
A common form of authentication is a ____.
answer
password
question
Through the use of ____, data is secured when it is stored and transported over a network.
answer
encryption
question
In a Wi-Fi network, ____ provide several settings that can all but bulletproof a wireless network.
answer
access points
question
An Internet ____ can be found in the form of a chain letter, scam, and false alarm.
answer
hoax
question
An important function of a firewall is to protect all the ____ of a network or computer from undesirable data.
answer
ports
question
In a distributed denial-of-service (DDoS) attack, the services of a(n) ____ can be halted.
answer
Internet server
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New