CS 101 Final – Flashcards
Unlock all answers in this set
Unlock answersquestion
A ____ is an element in an electronic document—a word, a phrase, or an image—that, when clicked, opens a related document
answer
Hyperlink
question
An advantage of using a(n) ____ format is its ability to compress CD music files to one tenth their original size.
answer
MP3
question
The system that translates the URL you type in a browser's address box into an IP address is the ______.
answer
Domain name system
question
Which of the following is NOT a network device?
answer
Workstation
question
In terms of an authentication protocol, the phrase "something you have" refers to a(n) _____.
answer
ID card
question
The process of transferring music from CD to MP3 or another digital audio format is called ____ a CD.
answer
Ripping
question
With the help of a _____, devices can send signals that allow them to connect to the Internet.
answer
Modem
question
All of the following are models for cloud computing EXCEPT ______.
answer
Shared
question
The Web supports job searches by providing all of the following EXCEPT ______.
answer
Automatically setting an interview day and time
question
Which of the following is NOT true?
answer
Web sites that provide a secure connection start with httpx instead of http
question
All of the following are examples of malware EXCEPT ______.
answer
Updates
question
Cookie files contain ____.
answer
Data
question
The introduction of ______ on cell phones was the first step towards realizing augmented reality.
answer
Global Positioning Device
question
In the URL http://www.cengage.com/index.html, http is the ____.
answer
Protocol
question
________ is the primary protocol responsible for message transmission on the Internet.
answer
TCP/IP
question
An email with a subject heading "Urgent Security Update" that requests a username and password followed by a link to "re-login and resolve the issue" is a good example of a ____ scam.
answer
Phishing
question
A basic example of ____ is the use of graphs and charts to illustrate numeric data.
answer
Visualization
question
You have just secured a job with a new firm that is very security conscious. You've been instructed to learn as much as possible about encryption to ensure the confidentiality of customer transactions as well as electronic communications about new research and development projects. After researching this topic, you find that encryption can be used in all of the following ways EXCEPT ______.
answer
Decrypting computer archives so the data they contain is unusable if the archive is lost or compromised
question
_____ provides tools specifically designed to enter and format Web page text, graphics, and links.
answer
Web authoring software
question
A typical setup for a ____ network would include a wireless router connected to an ISP.
answer
Home
question
Many cities have adopted ____ technology to provide faster Internet speed to its users.
answer
WiMAX
question
Animation uses successive ____ to create the impression of an object moving.
answer
Frames
question
Full transparency is a scenario in which surveillance and information are ____.
answer
easily available to every law-abiding member of a society.
question
After videotaping her sister's wedding with an analog video camera, Nancy decided to edit out some of the extra footage using her computer. Although she has connected her camera, with the videotape, to her computer, she finds that she cannot access the video footage. Why?
answer
The analog video footage must first be converted into a digital form.
question
Citizens of free and democratic nations expect, at the least, privacy ____.
answer
within the home
question
You enter the wrong GPS position for the start point on a trip you are about to take; this is an example of ____.
answer
a data-entry error
question
An ISP may provide _____ services.
answer
all of the above
question
Designers rely on ____ software to help them build prototypes for further research and testing
answer
CAD
question
The reason on-line content cannot always be trusted is the lack of ____ on the Web.
answer
quality control
question
A peer-to-peer network ______.
answer
allows computers to share resources such as files and applications
question
All of the following are safe and vigilant behavior to ensure Internet security EXCEPT ________.
answer
avoid client/server networks
question
Sites such as eBay are a popular target for ____.
answer
Internet fraud
question
A fourth-generation technology called _____ is competing to become the wireless network of choice for high-speed connectivity.
answer
Long Term Evolution
question
Bluetooth is an example of a _____ network.
answer
PAN
question
Which of the following is NOT a U.S. Privacy-Protective Law?
answer
PATRIOT ACT
question
Interactive media typically combine all of the following EXCEPT ____.
answer
blogs
question
____ is a popular cable type used as network backbone by major telecommunications companies
answer
Fiber-optic
question
Which of the following is true about Bluetooth?
answer
It forms networks automatically when two or more devices are within range
question
Data ____ travel over the Internet from router to router until reaching their destinations.
answer
packets
question
Playing online Scrabble with others on the Web at any given time is an example of a _____ gaming experience
answer
multiplayer
question
Digitized sound can be _____ for secure communications
answer
encrypted
question
All of the following are examples of graphic file formats EXCEPT for ____.
answer
.xls
question
Once uploaded to an online photo album site, which of the following is NOT true?
answer
users are guaranteed the safety of their photos if the server goes down
question
Digital photography captures, stores, and manipulates photographs digitally as a series of ____.
answer
1s and 0s
question
The use of ____ technology to identify items for inventory may someday replace today's bar code system
answer
RFID
question
An example of a vector graphic image is ____.
answer
clip art
question
A Web ____ is a Web page that combines useful information and links and acts as an entry point to the Web
answer
portal
question
A LAN would be used to _____.
answer
connect personal computers within a very limited geographical area, such as a single building.
question
Corporate network administrators have the right to do all of the following EXCEPT ____.
answer
install a Web cam in an employee's home.
question
____ permissions provide registered users with access to the files they need, while restricting access to private resources
answer
User
question
During the creation of a database, a data dictionary can be referenced by ____ to validate data item names, access dates, and access data types .
answer
all of the above
question
A ___ helps people make decisions by directly manipulating data, analyzing data from external sources, generating statistical projections, and creating data models of various scenarios.
answer
DSS
question
When deciding whether to update or build a new software program, one thing to consider is the cost of maintenance versus ____.
answer
the cost of development.
question
A(n) ______ MIS report is produced when there is a specific need identified by
answer
demand
question
Hosting companies provide all the necessary software tools to deliver e-commerce applications EXCEPT ____.
answer
shipping.
question
Each person's digital shadow ____.
answer
is the amount of digital information generated about a person every day.
question
Who proposed a test for intelligent behavior of machines that is considered to be the early work in artificial intelligence?
answer
Alan Turing
question
Database Administrators are responsible for all of the following areas EXCEPT ____
answer
hiring and training the users.
question
One important artificial intelligence characteristic is when a device modifies its own behavior based on its ability to learn, also known as ____.
answer
machine learning
question
Individual consumers use the ____ form of e-commerce in which individuals sell to other individuals on the Web.
answer
C2C
question
Artists use a branch of artificial intelligence called ____ to express themselves through computers.
answer
artificial creativity
question
Informatics is widely used in the combined disciplines of computer science and ____
answer
medical research.
question
In a database, your first name would be categorized as a ____
answer
field
question
Robots are best at performing all of the following tasks EXCEPT _________
answer
calculating pay for thousands of employees
question
Controlling the amount of _____ we receive in our email Inbox is one way to control information overload
answer
spam
question
Using ____, businesses can analyze inventory and costs for more efficiency
answer
data mining
question
____ computing has led us to an era where technology is so much a part of daily existence that it is no longer noticed.
answer
Ubiquitous
question
Using technology to organize a gathering at a specific time and place is an example of _____.
answer
a flash mob
question
_____ processing involves holding a group of transactions for processing until the end of a specified period of time.
answer
Batch
question
Which of the following is NOT a benefit of an ERP system?
answer
low expense in time and money
question
A goal of systems ______ is to produce a list of requirements to help solve the problem identified in systems investigation.
answer
analysis
question
Which stage of the SDLC lasts the longest?
answer
Maintenance
question
Which of the following is the best way to avoid health problems when working with computers?
answer
Take frequent breaks
question
A(n) ____ could be used to replicate how a specialist diagnoses lung cancer.
answer
ES
question
Data ____ refers to the quality and accuracy of the data.
answer
integrity
question
The B2B electronic exchange differs from global supply management in that it focuses on ____.
answer
a specific industry.
question
A good example of B2C e-commerce is ____.
answer
Amazon.
question
Some netiquette rules to consider when using social media include all of the following EXCEPT _____.
answer
freely tag friends in your photos.
question
All of the following are categorized Internet addictions EXCEPT ____.
answer
comment-trolling.
question
A feature of neural networks includes the ability to quickly ____ stored data when new information is identified.
answer
modify
question
Which of the following security measures can be used to protect a database?
answer
All of the above can be used
question
Using symbols, ____ show the logical relationships between system components.
answer
flowcharts
question
An address book is an example of a database _____.
answer
file
question
One goal of normalization is to minimize data _______
answer
redundancy
question
Which of the following is NOT an advantage to using a DBMS?
answer
Reduce data integrity
question
____ is the best-known e-cash provider
answer
PayPal
question
Businesses first used ____ for online transactions.
answer
EDI
question
Which of the following is NOT a true statement about e-commerce technologies?
answer
It has become easier to create a reliable online business yourself than to hire a company to do it.
question
Solutions that deliver improved customer service and targeted marketing support all of the following areas of an enterprise EXCEPT ____.
answer
human resources.
question
Which of the following is an example of a primary key for a database?
answer
Social security number
question
Which of the following is NOT a question posed during systems investigation?
answer
How should the RFP for the software application be written?
question
Distributed databases connect data at different locations via ___________.
answer
telecommunications.
question
A sensor is an example of a(n) _____ device for a robot
answer
input
question
A typical example of a geographic information system is a ____.
answer
map.
question
Using ____, employees can share their expertise in different areas of a company to build upon its success.
answer
KM
question
SQL allows users to _____ a database.
answer
all of the above
question
Buying movie tickets via cell phone is an example of ____.
answer
m-commerce.
question
Searching the Web for the best deal on an airline flight is a good example of ____ at work.
answer
an intelligent agent
question
One challenge with speech recognition software is its ability to ____ words that sound the same but have different meaning.
answer
recognize
question
All of the following are AI methodologies that rely on a human to give instructions for problem solving EXCEPT ____.
answer
neural networks.