Franz S. 37- 63 – Flashcards

Unlock all answers in this set

Unlock answers
question
Which of the following is required to connect two or more computers in a network?
answer
router
question
What must be installed in a PC to connect it to a network?
answer
Network adapter
question
Which of the following steps must you complete before you start the Network Setup Wizard in Windows 7?
answer
Install modems, cables, and network cards in each computer
question
Which of the following must each individual computer on a network have to function on the network?
answer
A unique name
question
For a wireless network, what does each computer in the network need?
answer
A wireless interface card
question
If you use Windows 7 to setup a home network, which option is used to access the Network Setup Wizard?
answer
Set up a new connection or network
question
Which of the following is NOT a good reason to install a wireless network in your home?
answer
All computers need to share one copy of Windows 7
question
Which of the following is TRUE about a wireless network?
answer
Cables are not required
question
What is the connection speed for the most commonly installed cable in home networks?
answer
100 Mbps
question
Which statement about wireless networks is TRUE?
answer
Wireless networks encounter more signal interference that wired networks
question
Who are war drivers?
answer
People who gain access to unprotected wireless networks
question
Which of the following statements about war drivers is NOT true?
answer
They want to protect access to government systems
question
A(n) ______ address is a unique number for a wireless access card.
answer
MAC
question
Which of the following is NOT true?
answer
You have to purchase a new wireless card to improve your wireless signal strength
question
Which of the following is NOT a reason you might want to prevent war drivers from accessing your wireless network?
answer
They might try to steal your computer
question
Which of the following prevents war drivers from accessing your wireless network?
answer
Allowing only specific devices to access your router
question
What is an important safety precaution for preventing unauthorized access to your router?
answer
Changing the default password
question
What makes it more difficult for a hacker to read your personal information?
answer
Encryption
question
Which of the following is NOT true?
answer
You can connect to any wireless network your computer detects
question
Which of the following statements is TRUE?
answer
Wireless signals sometimes can carry long distances
question
Which of the following connections does NOT require a modem?
answer
Satellite
question
Which is the slowest method of connecting to the internet?
answer
dial-up
question
Which connection method uses a phone line shared between voice and data transfers?
answer
DSL
question
Which of the following is NOT a broadband connection to the internet?
answer
Dial-up
question
What makes FION a unique broadband option?
answer
It uses fiber optic lines
question
Which of the following is an advantage of a satellite connection to the internet?
answer
It is available in rural areas, even when other broadband connections are not
question
Which of the following statements about a cable internet connection is TRUE?
answer
It requires a NIC
question
How does a satellite dish connect to a computer?
answer
Via a coaxial cable
question
Which connection provides the fastest transfer speeds when you connect to the internet?
answer
FIOS
question
What is an important consideration with regard to e-mail provided by your ISP?
answer
Web access
question
A network that has 10 or more nodes is usually configured as a _____.
answer
Client/server network
question
A network in which the nodes are located within a small geographic area.
answer
Local area network (LAN)
question
Network adapters _____.
answer
Enable nodes in a network to communicate with one another
question
The most common type of home network is ____.
answer
a peer-to-peer (P2P) network
question
Which of the following is made up of plastic or glass fibers that transmit data at extremely fast speeds?
answer
fiber-optic cable
question
Which of the following devices is needed to share an internet connection on a wireless network?
answer
A wireless router
question
The maximum speed at which data can be transmitted between two nodes on a network is called the ______.
answer
data transfer rate
question
A navigation device that transfers packets of data between two or more networks is called a _____.
answer
Router
question
The actual speed of data transfers that is achieved is called a ____.
answer
Throughput
question
When determining the best internet connection option to use, one of the most important things to know is _____.
answer
the type of internet connections available in your area
question
Most ____ allow you to connect wireless and wires computers to the same network.
answer
Wireless routers
question
____ internet connections are high-speed connections that include DSL, cable, and fiber-optic
answer
Broadband
question
DSL and cable modems are both connected to a ______.
answer
Network interface card
question
Which transmission medium is able to transmit data the fastest?
answer
fiber-optic cable
question
To connect to the internet wirelessly, you must _____.
answer
Be in a wireless fidelity hot spot and have the right equipment.
question
_____ services use special strands of optically pure glass or plastic that are as thin as a human hair to transmit data.
answer
Fiber-optic
question
You can purchase a(n) ____, which enables you to have wireless internet access with mobile devices.
answer
aircard
question
The term ____ is used to refer to the measurement of how fast data travels between computers.
answer
data transfer rate
question
The most common type of home network is _____.
answer
A peer-to-peer (P2P) network
question
A computer network is defined as two or more computers connected with ____ so that they can communicate with each other.
answer
software and hardware
question
Normal telephone wire is ____.
answer
Twisted-pair cable
question
Each device connected to a network is called a ____.
answer
Node
question
When setting up a network, you should set up any computers running the Microsoft Windows 7 operating system ____.
answer
First
question
Which of the following is NOT an example of a WAN?
answer
LANs connected in a single building
question
A network that has 10 or more nodes is usually configured as a ____.
answer
Client/server network.
question
Network architectures are classified according to ____.
answer
The way they are controlled and the distance between their nodes.
question
Client/server networks are controlled by a central server that runs a specialized piece of software called ____.
answer
A network operating system (NOS)
question
WPA stands for ____.
answer
WiFi Protected Access
question
Which of these is not a wireless device?
answer
Connectivity
question
Which of the following statements is true about Bluetooth?
answer
For Bluetooth 2 protocol, devices must be less than 60 feet apart to be able to communicate
question
Bluetooth was named after ____.
answer
King Harald Blatand
question
Bluetooth is a wireless protocol for ____.
answer
Short distance voice-data transmissions
question
Your bluetooth-2 enabled headset can be a maximum of ____ away from your cell phone.
answer
60 feet
question
All of the following would be likely candidates for Bluetooth connectivity EXCEPT a(n):
answer
Internal hard drive
question
Most bluetooth-enabled gaming controllers alow groups of up to ___ players to take part in a game at once.
answer
(30, 7, 2, 10)
question
____ wireless technology has the lowest level of power consumption.
answer
Bluetooth, Zigbee, AirPort, Infrared
question
Which of the following is not a wireless technology?
answer
Zigblue
question
Infrared, a wireless connection used in the past prior to Bluetooth, was limited because it ____.
answer
Required a direct line of site between devices
question
All of the following are mobile operating systems except:
answer
Windows 7
question
Popular smartphone CPUs include all of the following except:
answer
HP Pre 3
question
Smartphones store their operating system in ____ and their applications in ____.
answer
ROM; RAM
question
Smartphones include all of the following except:
answer
a mouse
question
The speed of a smartphone's processor is measured in ____, which is the number of operations or cycles the processor completes per second.
answer
hertz (Hz)
question
Most smartphones come with a standard collection of software that includes all of the following except:
answer
a spreadsheet
question
Smartphones support additional memory through ____.
answer
SD and micro SD Flash cards
question
The easiest way to transfer data from your smartphone to a desktop or laptop PC involves using a ____.
answer
Cradle
question
The process of making sure that your smartphone and your computer have the same exact data is called ____.
answer
Synchronizing
question
GPS is not likely to be used in which of the following?
answer
Water skiing
question
Global Positioning System (GPS) devices were built and operated by the ____.
answer
U.S. Department of Defense
question
The main input device of a smartphone is ____.
answer
A touch-sensitive screen
question
The storage capacity of portable media devices is measured in ____.
answer
Gigabytes
question
Which of the following specifies the number of times the analog wave is measured each second?
answer
Sampling rate
question
One factor that determines how much music a player can hold is the ____ of the MP3 music files.
answer
Quality
question
A microphone feeds the sound waves into a chip inside the recording device, called a(n) ____.
answer
Analog-to-digital converter
question
Most portable media players use built-in-flash memory, at type of ____ memory, to store files.
answer
Nonvolatile
question
Which of the following file formats is used to compress digital images?
answer
JPEG
question
Newer portable media players (PMPs) use a ____ port to transfer files from your computer.
answer
USB
question
The number of songs a portable media player (PMP) can hold depends on all of the following except ____.
answer
Volatile memory
question
The letters at the end of a file name that indicates how the data in the file is organized is called the ____.
answer
File extension
question
The process of users sharing files between computers is called ____.
answer
Peer-to-peer sharing
question
All of the following file formats are compatible for porable media players (PMPs) except:
answer
JPEG
question
You need a software application called a(n) ____ to access to the internet from a smartphone.
answer
Microbrowser
question
Ensuring that two devices, for example, a PC and a cell phone or smartphone, have the same files is the process of ____.
answer
Synchronizing
question
The most full-featured and powerful cell phones are put in the category of ____.
answer
Smartphones
question
Which of the following uses radio waves to transmit data signals over short distances?
answer
Bluetooth
question
The newest cell/smartphone displays are ____, which allow bright, sharp imaging and draw less power.
answer
OLED
question
Which of the following allows you to send messages that include text, sound, images, and video clips to the other phones or e-mail addresses?
answer
Multimedia message service (MMS)
question
Which of the following is specialized software made to display Web pages on a cell phone?
answer
Microbrowser
question
The Apple iPhone uses a version of ___ as an operating system.
answer
Mac OS X
question
The operating system of a cell phone is stored in ____.
answer
ROM
question
MPEG-4, H.264, and DivX are all examples of ____.
answer
Codecs
question
SMS delivers messages to the appropriate mobile device using ____ technology.
answer
Store-and-forward
question
The Apple iPhone uses a version of ____ as an operating system.
answer
Mac OS X
question
A ____ runs a full-featured operating system and weighs less than two pounds.
answer
Netbook
question
An iPod is an example of a ____.
answer
Portable media player (PMP)
question
____ is a single cable that carries all audio and video information from devices connected to a TV to the TV itself.
answer
HDMI
question
Web content specially designed for viewing via a cell phone or smartphone is written in a format called ____.
answer
WML (Wireless Markup language)
question
LogMeIn is an example of a ____.
answer
Remote access service for mobile devices
question
Flash memory, used by most MP3 players, is a type of ____.
answer
Nonvolatile memory
question
An internet connectivity plan is also known as a ____.
answer
Data plan
question
All the following represents intrusions on your computer's privacy EXCEPT:
answer
Maintenance
question
Backing up and updating your system is a function of the ____.
answer
Maintenance section of Windows tools
question
The following are basic functions that adware and spyware generally perform, EXCEPT:
answer
Keystroke logging
question
All of the following are included in the Security category of the Windows Action Center, EXCEPT:
answer
System backup
question
An unusual advertisement on your computer screen that pops up is usually caused by ____.
answer
Adware or spyware
question
The practice of advertisers using software that tracks personal information about you is called ____.
answer
Data mining
question
The Windows Defender program ____.
answer
Protects you from things that you would consider a violation of your personal property probably happening without your knowledge.
question
The purpose of a firewall is to ____.
answer
Stop computers that are connected to the internet from being attractive to hackers
question
All of the following are unwanted software a hacker could install on your computer EXCEPT:
answer
Ghosts
question
____ are hardware components that often contain firewalls.
answer
Routers
question
Norton Internet Security ____.
answer
Monitors programs that request internet access
question
The ____ features of a personal firewall enable you to designate responses to threats and set connection rules for specific programs.
answer
Program control
question
If you do not know how to configure your firewall protection settings, you might want to ____.
answer
Set the program control features to Auto
question
Windows Firewall ____.
answer
Logs successful and unsuccessful attempts to connect to your computer
question
All of the following can protect you from hackers EXCEPT:
answer
Antispam software
question
All of the following are true of virus protection software packages EXCEPT:
answer
You can only scan the entire computer each time you do a scan
question
Which is NOT a feature of antivirus software?
answer
Script kiddies
question
You can configure Windows 7 to automatically update, back up, and set restore points through the Windows Update menu choices available in the ____.
answer
System and Security menu of the Control Panel
question
Outsiders might try to infect your system through all of the following EXCEPT"
answer
Deleting a file
question
You deleted a file from your computer's documents folder that you jsut realized you need. In Windows 7, you can ____.
answer
Undelete it by going into the Recycle bin
question
Which of the following applications is a different type than the other three?
answer
Microsoft Office
question
Emptying the Recycle Bin should be done ____.
answer
Only after you have determined that you no longer need any of the files that you have deleted.
question
Setting a system restore point should be done ____.
answer
Prior to installing new hardware of software
question
Each of these tools is bundled with the McAfee Internet Security software suite, EXCEPT:
answer
Disk check
question
All of the following pose a threat to your computer EXCEPT:
answer
A firewall
question
Which device does NOT benefit from a surge protector?
answer
MP3 player
question
How does a surge protector protect against low-level surges?
answer
It passes excess current through to the ground wire
question
Which of the following is not a possible source of surges?
answer
Light switches
question
What is the difference between a surge and a spike?
answer
The length of time of the increase in the flow of electricity differs
question
Which of the following is not true about whole house surge protection?
answer
It is installed on each outlet in your home
question
What is the advantage of a UPS over a surge protector?
answer
It provides a limited time to save files.
question
Which of the following is NOT a way that surge protectors prevent damage from severe surges?
answer
Trip an alarm
question
How can you prevent information from being lost when you are working on an important document?
answer
Use Autosave
question
What is the state that a computer enters when it goes into standby mode as a result of power management settings?
answer
Hibernation
question
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ____.
answer
Keystroke loggers
question
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ____.
answer
Logical port blocking
question
The most likely method of a hacker would use to access a computer is ____.
answer
Entering through its internet connection
question
____ floods a computer with requests until it shuts down and refuses to answer any requests for information.
answer
A DDoS attack
question
Hacker who break into systems just for the challenge of it (and who don't wish to steal or wreak havoc on the systems) are called ____.
answer
White-hat hackers
question
Virtual, not physical, communications gateways that allow a computer to organize requests for information from other networks or computers are called ____.
answer
Logical ports
question
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?
answer
A Trojan horse
question
A large group of software programs that run autonomously on zombie computers is called ____.
answer
A botnet
question
Amateur hackers who use tools created by skilled hackers that enable unskilled novices to wreak the same havoc as professional hackers are called ____.
answer
Script kiddies
question
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ____ authentication devices.
answer
Biometric
question
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ____.
answer
A firewall
question
When a hardware firewall is designed specifically for home networks, it is called a ____.
answer
Personal Firewall
question
Assigning IP addresses out of an available pool is called ____.
answer
Dynamic addressing
question
A ____ is a virus that is attached to documents such as Word or Excel files.
answer
Macro virus
question
Most savvy hackers use attacks called ____ that are launched from more than one zombie computer at the same time.
answer
Distributed denial-of-service attacks (DDoS)
question
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?
answer
A Trojan horse
question
A computer program that attaches itself to another computer program and attempts to spread itself to other computers when files are exchanged is called a ____.
answer
Virus
question
A virus that is triggered when certain logical conditions are met, such as opening a file or starting a program a certain number of times is called a ____.
answer
Logic bomb
question
Which of the following could be detected by antivirus software?
answer
Worms
question
A virus that replicates itself into a hard drive's master boot record is called a ____.
answer
Boot-sector virus
question
The most likely method a hacker would use to access a computer is ____.
answer
Entering through its internet connection
question
A program that executes whenever a computer boots up, ensuring that the virus will be loaded into memory immediately, even before some virus protection programs can load is called a ____.
answer
Master boot record
question
Which of the following virus types uses the address book in the victim's email system for distribution?
answer
Email virus
question
Which of the following are considered slightly different from viruses as they can run independently of host file execution?
answer
Worms
question
Which of the following virus types infects your computer by running a program that searches for common types of data files (such as Microsoft Word and Excel files) and compresses them using a complex encryption key that renders your files unusable?
answer
Encryption
question
The most likely method a hacker would use to access a computer is ____.
answer
Entering through its internet connection
question
All of the following can be used for backing up data files EXCEPT:
answer
RAM
question
A computer virus normally attaches itself to another computer program known as a ____.
answer
Host program
question
____ floods a computer with requests until it shuts down and refuses to answer any requests for information.
answer
A DDoS attack
question
A(n) ____ virus runs a program that searches for common data files, compresses them, and makes them unusable.
answer
Encryption
question
A ____ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times.
answer
Logic bomb
question
All of the following approaches can be taken to protect your notebook computer from theft EXCEPT:
answer
Installing an external hard drive
question
A ____ is a virus that is attached to documents such as Word of Excel files.
answer
Macro virus
question
The purpose of network address translation (NAT) is ____.
answer
Hide user IP addresses from the Internet
question
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ____.
answer
Logical port blocking
question
Macros enable users to ____.
answer
Automate repetitive tasks
question
In VBA a macro is called a ____.
answer
Procedure
question
You start recording a macro by clicking the ____.
answer
Record Macro button in the Code group of the Developer tab
question
All of the following is true about a macro in Word EXCEPT:
answer
It can only be used once
question
You run (execute) a macro by clicking the ____.
answer
Macros button in the Code group pf the Developer tab
question
You can give a macro any descriptive name you want as long as it does not have ____.
answer
Blank spaces
question
A macro is created using the ____.
answer
Macro Recorder
question
Altering an existing macro involves ____ it.
answer
Editing
question
Integrated developed environments or IDEs ____.
answer
Provide a lot of help in working through programs, making sure that you do not have errors
question
One widely used IDE is ____.
answer
Microsoft Visual Studio
question
When you add a breakpoint in a program a little red ____ is inserted to the left of the line of code.
answer
Stop sign
question
The if statement is referred to as all of the following EXCEPT:
answer
A loop decision
question
You want any grade of 65 or higher to display a value of "Pass" and any grade of 64 or lower to display "Fail". You would accomplish this on the Microsoft Visual Studio IDE using ____.
answer
If...else
question
Any sales amount that is greater than $1,000 gets a salesperson a bonus of $200. A sales amount of $978 would cause a bonus amount of $0 to result because it would trigger the ____ command to execute.
answer
Else
question
This type of control structure is used when you are going to do the same piece of work with just small differences again and again.
answer
For loop
question
Which is NOT a comparison operator used in While or If statements?
answer
^
question
If...Else, While, and For are control statements used to implement ____ decisions in the Visual C++ IDE.
answer
Binary
question
Alice enables you to ____ programming commands.
answer
Drag and drop
question
Which is not true regarding Alice?
answer
It had no help screens whatsoever
question
Carnegie Mellon has worked with Sun Microsystems and Electronic Arts to make Alice all of the following EXCEPT:
answer
Expensive to use
question
Each object in Object Oriented Programming (OOP) has its own ____.
answer
Properties
question
Alice can be used for all of the following EXCEPT:
answer
To write C++ programs
question
A9n) ____ enables Alice to evaluate something and either perform one set of actions or another.
answer
Binary decision
question
Alice enables you to learn programming by creating ____.
answer
Animations
question
The ____ programming language is running behind the scenes in Alice.
answer
Java
question
What is the first step of the system development life cycle?
answer
Problem and opportunity identification
question
Before they decide which programming language to use or start writing code, programmers first develop a complete description of the task the program needs to accomplish, called the ____.
answer
Problem statement
question
Which phase of the system development life cycle explores the problem in depth and develops program specifications?
answer
Analysis
question
Which of these is NOT one of the three features in a loop?
answer
Binary decision
question
Which is the final step of the system development life cycle?
answer
Maintenance and evaluation
question
Programmers today use the ____ languages most often.
answer
Third-, fourth-, and fifth-
question
A9n) ____ is a set of specific, sequential steps that describe in natural language exactly what the computer must do to complete its task.
answer
Algorithm
question
____ is a text-based approach to documenting an algorithm.
answer
Pseudocode
question
A ____ is a visual diagram of a process, including the decisions that need to be made along the way.
answer
Flowchart
question
Which of the following is NOT an important factor to consider in choosing a programming language?
answer
The popularity of the language?
question
____ supports visual programming and allows programmers to write substantial amounts of code simply by dragging and dropping controls.
answer
Microsoft Visual Basic
question
Which programming language can be compiled once and then run on any computer, regardless of the operating system?
answer
Java
question
Which of the following languages is a subset of Visual Basic used to introduce interactivity to a Web page?
answer
VBScript
question
Which of the following is NOT actually either a programming or a scripting language?
answer
HTML/XHTML
question
Which of the following languages facilitates exchange of information between Web sites and allows users to define their own tags?
answer
XML
question
Which of the following statements about C++ is FALSE?
answer
It has less security than C does
question
Java is a(n) ____ language.
answer
Object-oriented
question
For Web page interactivity, programmers would use:
answer
JavaScript
question
If a programmer wnats a user to be able to request information from a company's Web site, he or she would use:
answer
ASP or PHP
question
____ is a language that is similar to JavaScript but customized for the Flash animation environment.
answer
ActionScript
question
Which of the following is NOT a language used to create Windows applications?
answer
JavaScript
question
Which of the following languages is often used to create graphical user interfaces for Windows?
answer
Visual Basic
question
Which of the following is often used to develop Web-based multimedia and animation effects?
answer
Adobe Flash
question
Which of the following development environments enables Web sites to talk to each other easily by introducing a standard way for software to interact through Web services?
answer
The .NET framework
question
The process by which program code is converted into machine language is called ____.
answer
Compilation
question
____ is the instructions programmers have written in a higher-level language.
answer
Source code
question
Which of the following statements about pseudocode is TRUE?
answer
It is a text-based approach to documenting an algorithm
question
Information is most closely related to which of the following?
answer
Output
question
One of the earliest languages is ____.
answer
Machine language
question
Which of the following is the final stage of the program development life cycle (PDLC)?
answer
Finish the project
question
SQL is an ecample of a ____-generation language.
answer
Fourth
question
Which language do programmers use if the problem requires a lot of number crunching?
answer
C++
question
Decision points consist of binary decisions and ____.
answer
Repeating loops
question
Which of the following is not part of the design plan for the database?
answer
Develop the reports
question
The two types of objects responsible for collecting and recording databases are ____.
answer
Tables and forms
question
Which is NOT a Microsoft Access database object?
answer
Slides
question
Which database object enables you to ask questions of the database?
answer
Queries
question
When creating a table in Design view, you will be prompted for each of the following EXCEPT:
answer
Report Names
question
A form enables you to see the same information you would see on a table ____.
answer
One record at a time
question
Unless you specify otherwise, the default location for saving Microsoft Access database files is ____.
answer
My Documents
question
All of the following are listed when you click the View button arrow EXCEPT:
answer
PivotForm View
question
Which data type enables you to store numeric values that need to be calculated?
answer
Number
question
The ____ key enables you to advance from one field to another.
answer
Tab
question
What effect does clicking the ;; button in a Microsoft Access wizard have?
answer
It selects all the fields to be added
question
You can use any of these methods to find records or filter a table EXCEPT:
answer
Help Menu
question
All of the following is true about a query EXCEPT:
answer
It is a professional printed presentation
question
Which database object filters out what you don't want to see?
answer
Queries
question
Queries can be used to generate ____.
answer
Reports
question
If you change the field name type from Number to Text, you could end up ____..
answer
Losing data
question
You want to find the addresses that begin with the number 16 on Pennsylvania Avenue. What do you type into the search criteria?
answer
16* Pennsylvania Avenue
question
You can add fields to the query by ____.
answer
Dragging or double clicking
question
Reports can be made form all of the following EXCEPT:
answer
Multiple forms
question
The simplest way to create a query is to ____.
answer
Click the query wizard button
question
Reports are better than queries because ____.
answer
Reports present query results or table data in a more professional format
question
Which of the following is NOT a main operation of a DBMS?
answer
Analyzing data
question
A description of the data you capture in a database is contained in the database's file and is referred to as the:
answer
Data dictionary
question
____ are the values a database will use for a field unless the user enters another value.
answer
Default values
question
Which of the following choices provides a view of the data fields to be entered, with appropriate labels to assist database users in populating a database?
answer
Input form
question
____ checks are set up in a database to alert the user to an incorrect entry.
answer
Validation
question
The data dictionary defines all of the following EXCEPT:
answer
The query language to be used
question
Properties that must be satisfied for an entry to be accepted into a field are called:
answer
Field constraints
question
A(n) ____ check confirms that only textual characters are entered into a field.
answer
Alphabetic
question
____ a database involves organizing it in a new manner, such as in alphabetic order.
answer
Sorting
question
Looking through all the records in a database to find data that matches one specific criterion is referred to as:
answer
Browsing
question
A database ____ is something you ask of the database so that it provides you with only the records you wish to view.
answer
Query
question
Businesses routinely summarize the data within their databases and compile a(n):
answer
Summary data report
question
IN a database, a text field capable of holding complete paragraphs is referred to as a ___ field.
answer
Memo
question
To ensure that there are no duplicate records in a database table, you need to establish a(n) ____.
answer
Primary key
question
Which of the following is a reason for creating a list instead of creating a database?
answer
To organize data for simple tasks
question
What is the Access object that organizes data into fields and records?
answer
Table
question
Most small businesses use ____ databases as they are reliable and less costly.
answer
Relational
question
In a database, a video clip would be stored in a(n) ____ field.
answer
Object
question
____ databases can easily be customized to provide information to a variety of users (based on their need) and can process data much faster than pure relational databases.
answer
Multidimensional
question
Which of the is NOT a database component?
answer
List
question
Which database object is used to view individual records one at a time?
answer
Input form
question
A group of related fields is called a(n) ____.
answer
Record
question
All information systems perform all of the following functions, EXCEPT:
answer
Storing programs
question
A(n) ____ assists employees in accomplishing their day-to-day tasks and improving communications.
answer
Office support system
question
____ are used to keep track of everyday business activities.
answer
Transaction processing systems
question
If your sales transactions are collected one day and processed at a later time, you are using:
answer
Batch processing
question
In ____, a transaction processing system database is queried and updated while the transaction is taking place.
answer
Real-time processing
question
A(n) ____ report displays conditions that are unusual or that fall outside of a typical range and might need attention from the user.
answer
Exception
question
The original transaction processing systems were designed to output:
answer
Exception reports
question
A(n) ____ helps managers develop solutions for specific problems using data from databases and data warehouses, and enables users to add their own insights and experiences.
answer
Decision support system
question
A ____ provides intelligence that supplements the user's own intellect.
answer
Knowledge-based system
question
A(n) ____ enables users to communicate with computers using natural spoken or written language.
answer
Natural language processing system
question
A ____ is a large-scale electronic repository of data that contains and organizes in one place all the data related to one or more organizations.
answer
Data warehouse
question
Which of the following is NOT a typical main source of data in data warehouses?
answer
Financial sources
question
____ typically contain financial and statistical analysis tools used to analyze the data provide by examples.
answer
Model management systems
question
In an organization, a data mart pertains to:
answer
A single department
question
Information gathered from Web pages by compiling information about things such as user habits and demographics is referred to as ____ data.
answer
Clickstream
question
When managers analyze large amounts of data on which to base sound decisions, they are using the process of:
answer
Data mining
question
A ____ displays a subset of data from a table (or tables) based on the criteria specified.
answer
Select query
question
SQL uses ____ to extract records from a database by using English-like expressions that have variables and operations.
answer
Relational algebra
question
Which type of database excels in the storage of structured, analytical data?
answer
Relational
question
In a database, a ____ is synonymous with a category of information.
answer
Field, record, row
question
The speech-recognition feature of Microsoft Windows is an example of a ____.
answer
Natural language processing (NLP) system
question
____ databases have the largest market share among the primary types of electronic databases.
answer
Relational
question
Microsoft ____ is a database management system.
answer
Access
question
____ helps to ensure data integrity by maintaining information in only one place.
answer
Data centralization
question
The type of information system that uses model management systems is a(n) ____.
answer
decision support system, transaction-processing system, management information system
question
Classification, affinity grouping, and estimation are ____ methods used by managers to make their data more meaningful.
answer
Data mining
question
The different array of computers, peripherals, and media (cable) is called network ________.
answer
Topology
question
In a ________, all devices are connected together through a central switch.
answer
Star topology
question
The main advantage of a bus topology is that ________.
answer
It is inexpensive
question
The purpose of a token ring is to ________.
answer
prevent data collisions from occurring
question
All of the following are network topologies EXCEPT:
answer
Bridge
question
All of the following are problems with the bus topology, EXCEPT:
answer
It is expensive
question
In a ________ topology, all computers are connected in a line on a single cable.
answer
Bus
question
All of the following are names for the topology where computers and peripherals are attached in a circle EXCEPT:
answer
Token circle
question
All of the following are navigation devices to move data around the network EXCEPT:
answer
Star
question
You need to know your computer's IP (Internet Protocol) address for ________.
answer
gaming and remote access usage
question
An Internet service provider provides you with a different IP address every time you connect with them because ________.
answer
it enables them to assign you a random IP address from a pool of unused IP addresses when not all of their customers are connected to their system at any given time
question
If you have a router connected to your computer, you can find your IP address by finding your way to the ________.
answer
http://www.whatismyIP.com Web site
question
Besides the IP address, in Windows 7 at the Local Area Connection status box you can also find the ________.
answer
speed of that connection
question
The Web site www.WhatisMyIP.com provides you with ________.
answer
your router's IP address
question
All of the following would require you to know your IP address EXCEPT:
answer
downloading new software.
question
If you are using a cable modem, the speed of your Internet connection will depend on ________.
answer
how many other users are on the same neighborhood connection
question
In Windows 7, when you double-click Local Area Connection you can find all of the following information, EXCEPT:
answer
who else is connected.
question
When you are using a router, Windows 7 Local Area Connection cannot show the IP address because ________.
answer
the router assigns the IP address
question
All of the following factors make the life of a network technician different than studying networking, EXCEPT:
answer
the need to work outdoors all of the time.
question
Network Technicians often hold the professional certifications _________.
answer
MCSE and A+
question
Problems are logged in by users into a database and ranked by importance according to _________.
answer
how many people they affect
question
All of the following are important for a network technician, EXCEPT:
answer
getting a 4-year degree.
question
The first place we can often find replacement parts for current computers is _________.
answer
in the computer graveyard
question
l of the following are examples of tasks that occur in a typical network technician's day, EXCEPT:
answer
keep everyone happy.
question
At the end of the day, network technicians _________.
answer
check off the problems in the database that were resolved and make a list of unresolved problems to be addressed the following day
question
Which is NOT part of the personal profile of a network technician?
answer
They have an ability to read people emotionally and predict how they will act.
question
All of the following are typical problems that a network technician would handle EXCEPT:
answer
repairing telephone line malfunctions
question
It is sometimes difficult to solve wireless connectivity problems because _________.
answer
users expect wireless connectivity to be equivalent to wired connectivity
question
Which type of server is designed to keep track of who is logging on to the network and which network services are available?
answer
Authentication
question
A school network might use a(n) ________ server to store software such as Microsoft Office.
answer
Application
question
All of the following are considered dedicated servers EXCEPT:
answer
Internal servers
question
________ allows multiple users to connect to the Internet through one connection.
answer
Network
question
A ________ is a group of two or more computers (or nodes) that are configured to share information and resources.
answer
Network
question
A ________ server provides client computers with access to information stored in databases.
answer
Database
question
Not every large network has a Web server. Instead, many companies use a(n) ________ to host their corporate Web sites.
answer
Microsoft Internet Information Server (IIS)
question
________ networks do not require a dedicated server.
answer
Peer-to-peer
question
As users are added to a network, what type of server is added to take the load off of the main server?
answer
Dedicated
question
A ________ is a group of two or more computers (or nodes) that are configured to share information and resources.
answer
Network
question
A ________ server provides client computers with access to archived data.
answer
Database
question
Which type of network can only support up to 10 users efficiently?
answer
peer-to-peer
question
Which of the following is NOT a characteristic of a client/server network?
answer
not centralized
question
Networks are classified according to their size and the:
answer
distance between their physical parts.
question
The inclusion of a ________ is the one component that makes a client/server network different from a peer-to-peer network.
answer
Server
question
________ connect wireless devices (such as Bluetooth-enabled PDAs) within 30 feet of each other.
answer
PANs
question
Which of the following is the primary difference between a LAN and a WAN?
answer
geography
question
The ________ topology is the easiest to repair and maintain.
answer
Star
question
In a star topology, the nodes connect to a central communications device called a ________.
answer
Switch
question
Which of the following is an advantage of using a ring topology?
answer
fair allocation of network access
question
In a ________ topology, all computers are connected with a single cable.
answer
Bus
question
When selecting cable for your network, which of the following would NOT be a consideration?
answer
Cable width
question
Which of the following is FALSE about a star topology?
answer
When one computer goes down, other computers on the network also go down
question
When using ________ cable, data travels through glass or plastic strands.
answer
fiber-optic
question
Which of the following is NOT a characteristic of coaxial cable?
answer
glass fiber strands
question
Which of the following 802.11 standards offers the fastest throughput?
answer
802.11n
question
WiFi enables devices to communicate using:
answer
Radio waves
question
A ________ is a device that routes signals through a network.
answer
Switch
question
To amplify a network signal and connect multiple ports to a network, use a(n):
answer
Repeater
question
A ________ is also referred to as a "smart" hub because it is able to send data to only those devices that are the intended recipients.
answer
Switch
question
ich of the following statements about switches on a network is FALSE?
answer
Data is sent to all computers on the network when using a switch.
question
________ are used to send data between different collision domains on a network.
answer
Bridges
question
Network adapters installed inside a computer are referred to as:
answer
network interface cards.
question
External entities communicate with a network using a(n):
answer
IP address.
question
Which of the following statements about network adapters is FALSE?
answer
They have a physical address referred to as an IP address.
question
________ are devices that perform specific tasks to allow computers to connect to and communicate on a network.
answer
Network adapters
question
Which of the following is TRUE about MAC addresses?
answer
No two computers have the same MAC address.
question
Which of the following would be a valid MAC address?
answer
01:40:87:44:79:A5
question
A(n) ________ server provides client computers with access to information stored in databases.
answer
Database
question
Cable television, as well as some networks, uses ________ cable.
answer
Coaxial
question
Which of the following is NOT a common network topology?
answer
Cluster
question
Which of the following is something a network adapter does NOT do?
answer
It uses high-powered signals so data can move easily over network transmission media.
question
A(n) ________ needs to be installed on each client computer and server connected to the network to provide the services necessary for them to communicate.
answer
network operating system
question
What is CSMA/CD?
answer
Method used to avoid data collisions
question
Which of the following networks is most known for data collisions?
answer
Bus
question
What is the name for a group of data packets that are sent together?
answer
Frame
question
A(n) ________ server is a server that stores and manages files for network users.
answer
File
question
Which of the following is something you would NOT consider when choosing a cable type?
answer
cable radius
question
s a working knowledge of HTML, creating codes requires ________.
answer
a text editor such as Microsoft Notepad or WordPad
question
A good Web site for learning about HTML code is ________.
answer
htmlgoodies.earthweb.com
question
A section of text that conforms to HTML standards is called a(n) ________.
answer
element
question
Complete the following sentence: ________ are to opening as ________ are to closing.
answer
;
question
All of the following are sections of a Web page EXCEPT:
answer
Foot
question
If you want your name to appear in the title bar of the browser window when the Web page displays, you should put in the ________ section.
answer
TITLE
question
You have a handwritten essay that you would like to make into a Web page. The next step would be to ________.
answer
type the essay into your text editor
question
The basic HTML document contains ________ sections.
answer
3
question
Each element in HTML documents are marked with ________.
answer
Tags
question
All of the following is true about Hypertext Markup Language, EXCEPT:
answer
it is a programming language.
question
________ addressing means that your ISP assigns your computer a temporary IP address from an available pool of IP addresses each time you log on to the Internet.
answer
Dynamic
question
How does the computer know the IP addresses of other computers?
answer
Your computer consults a database maintained on something called a domain name server to determine other users' IP addresses.
question
________ is the main suite of protocols used on the Internet.
answer
TCP/IP
question
A set of rules for exchanging electronic information is called a ________.
answer
computer protocol
question
The communications methodology that computers use to transfer data is called ________.
answer
Packet switching
question
IPv6 uses what number system to create IP addresses?
answer
Hexadecimal
question
At a minimum, what content must all data packets contain?
answer
recipient's address, sender's address, reassembling instructions, and data
question
The Internet protocol responsible only for sending packets on their way is called ________.
answer
user datagram protocol (UDP)
question
All IP addresses must be registered with the ________, which is responsible for allocating IP addresses to network administrators, just as the U.S. Postal Service is responsible for assigning zip codes to geographic areas.
answer
ICANN
question
An IP address that does not change and is usually assigned manually by a network administrator is called a ________.
answer
static address
question
________ uses a dedicated connection between two points that remains active for the duration of transmission.
answer
Circuit switching
question
Which protocol is used to transmit e-mail over the Internet?
answer
SMTP
question
A unique number that identifies a computer, server, or device connected to the Internet is called a(n) ________.
answer
IP address
question
A good way to protect your e-mails is ________.
answer
to use encryption
question
________ is the ability of two or more people to communicate in text over the Internet in real time.
answer
Instant messaging
question
Which of the following specifications is used to simplify attachments to e-mail messages?
answer
MIME
question
When only the two parties involved in sending a message have the code, this is called ________.
answer
private-key encryption
question
A(n) ________, possessed only by you, is highly secure and is used to decode received messages.
answer
private key
question
Which protocol uses standard Internet connections to make phone calls over the Internet?
answer
VoIP
question
Which of the following is an example of an e-mail client?
answer
Microsoft Outlook
question
A ________ protocol requires two computers to exchange control packets before sending data.
answer
connection-oriented
question
A(n) ________ server takes a pool of IP addresses and shares them with hosts on the network on an as-needed basis.
answer
DHCP
question
An IP address that does not change and is usually assigned manually by a network administrator is called a(n) ________.
answer
Static address
question
________ is the communications methodology where data is broken into smaller chunks to be sent over various routes at the same time.
answer
Packet switching
question
________ lines are high-speed, fiber-optic communications lines.
answer
OC
question
If you regularly download and upload files, chances are that you are using ________.
answer
FTP
question
Transport Layer Security (TLS) and ________ are two protocols that provide data integrity and security for Internet transmission.
answer
Secure Sockets Layer (SSL)
question
Individual Internet users enter an ISP through a(n) ________.
answer
point of presence
question
Which of the following statements concerning IPv4 addresses is FALSE?
answer
The addresses are 16-bit numbers.
question
Which of the following statements concerning IP addresses is TRUE?
answer
Dynamic addressing is normally handled by DHCP.
question
la famille
answer
die Familie
question
familial,e, familiaux
answer
familiÀr, Familien-
question
la grande famille
answer
die Grossfamilie
question
les parents
answer
die Eltern
question
le pĂšre
answer
der Vater
question
le papa
answer
der Papa
question
la mĂšre
answer
die Mutter
question
la maman
answer
die Mama
question
le fils
answer
der Sohn
question
la fille
answer
die Tochter
question
le frĂšre
answer
der Bruder
question
la sƓur
answer
die Schwester
question
les frùres et sƓurs
answer
die Geschwister
question
les enfants
answer
die Kinder
question
l'oncle m.
answer
der Onkel
question
la tante
answer
die Tante
question
le cousin, la cousine
answer
der Cousin, die Cousine
question
les grands-parents
answer
die Grosseltern
question
le grand-pĂšre, grands-pĂšres
answer
der Grossvater
question
la grand-mĂšre, grands-mĂšres
answer
die Grossmutter
question
le papi
answer
der Opa
question
la mamie
answer
die Oma
question
vivre ensemble
answer
zusammenleben
question
s'occuper de
answer
sich kĂŒmmern um
question
l'amour m.
answer
die Liebe
question
aimer
answer
lieben
question
s'aimer
answer
sich lieben
question
la haine
answer
der Hass
question
haĂŻr
answer
hassen
question
amoureux, euse
answer
verliebt
question
tomber amoureux
answer
sich verlieben
question
le baiser
answer
der Kuss
question
embrasser
answer
kĂŒssen
question
s'embrasser
answer
sich kĂŒssen
question
prendre dans ses bras
answer
umarmen
question
le mariage
answer
die Hochzeit, Trauung, Ehe
question
se marier
answer
heiraten
question
le mari
answer
der Ehemann, Mann
question
la femme
answer
die Ehefrau, Frau
question
ménage
answer
das Ehepaar
question
fidĂšle
answer
treu
question
infidĂšle
answer
untreu
question
les fiançailles
answer
die Verlobung
question
fiancé,e
answer
verlobt
question
la séparation
answer
die Trennung
question
se séparer
answer
sich trennen
question
l'amitié f
answer
die Freundschaft
question
l'ami, l'amie
answer
der Freund, die Freundin
question
amical,e, amicaux
answer
freundschaftlich
question
le copain, la copine
answer
der Freund, die Freundin
question
personnel, le
answer
persönlich
question
les gens
answer
die Leute, Menschen
question
commun,e
answer
gemeinsam
question
le membre
answer
das Mitglied
question
le voisin, la voisine
answer
der Nachbar, die Nachbarin
question
le type
answer
der Typ, Kerl
question
la rencontre
answer
die Begegnung, das Treffen
question
rencontrer
answer
treffen
question
la réunion
answer
die Versammlung
question
le rendez-vous
answer
die Verabredung
question
prendre rendez-vous
answer
sich verabreden
question
participer
answer
teilnehmen
question
l'invité,e
answer
der Gast
question
inviter
answer
einladen
question
aller voir
answer
besuchen
question
rendre visite (Ă )
answer
besuchen
question
passer
answer
vorbeikommen
question
la connaissance
answer
der/die Bekannte, die Bekanntschaft
question
le contact
answer
der Kontakt
question
contacter qn
answer
Kontakt aufnehmen mit jem.
question
le groupe d'amis
answer
der Freundeskreis
question
ĂȘtre ami avec, ĂȘtre amie avec
answer
befreundet sein mit
question
voir du monde
answer
unter Leuten sein, unter Leute gehen
question
l'homme m
answer
der Mensch
question
la vie
answer
das Leben
question
vivant,e
answer
lebend, am Leben
question
vivre
answer
leben
question
la naissance
answer
die Geburt
question
naĂźtre
answer
geboren werden, zur Welt kommen
question
l'enfance f
answer
die Kindheit
question
la jeunesse
answer
die Jugend
question
jeune
answer
jung, jugendlich
question
l'adulte
answer
der/die Erwachsene
question
adulte
answer
erwachsen
question
la vieillesse
answer
das Alter
question
vieux, vieil, vieille
answer
alt
question
l'Ăąge m.
answer
das Alter
question
ùgé,e
answer
alt
question
avoir ... ans
answer
... Jahre (alt) sein
question
grandir
answer
wachsen, aufwachsen
question
la mort
answer
der Tod
question
mort,e
answer
tot
question
mortel, le
answer
tödlich
question
mourir
answer
sterben
question
trouver la mort
answer
ums Leben kommen
question
la tombe
answer
das Grab
question
l'enterrement m.
answer
die Beerdigung
question
enterrer
answer
beerdigen
question
le veuf, la veuve
answer
der Witwer, die Witwe
question
la pensée
answer
der Gedanke
question
penser Ă 
answer
denken an
question
penser de
answer
halten von
question
réfléchir
answer
nachdenken, ĂŒberlegen
question
le souvenir
answer
die Erinnerung
question
rappeler
answer
erinnern
question
se rappeler
answer
sich erinnern an
question
oublier
answer
vergessen
question
sembler
answer
scheinen
question
croire
answer
glauben
question
l'espoir m.
answer
die Hoffnung
question
espérer
answer
hoffen
question
supposer
answer
vermuten, annehmen
question
probable
answer
wahrscheinlich
question
probablement
answer
wahrscheinlich
question
sans doute
answer
wahrscheinlich
question
peut-ĂȘtre
answer
vielleicht
question
possible
answer
möglich
question
impossible
answer
unmöglich
question
se demander
answer
sich fragen
question
le sens
answer
der Sinn
question
le sentiment
answer
das GefĂŒhl
question
la joie
answer
die Freude
question
le plaisir
answer
das VergnĂŒgen
question
agréable
answer
angenehm
question
désagréable
answer
unangenehm
question
le bonheur
answer
das GlĂŒck
question
heureux, euse
answer
glĂŒcklich, froh
question
malheureux, euse
answer
unglĂŒcklich
question
malheureusement
answer
leider
question
Ă©trange
answer
seltsam, sonderbar, eigenartig
question
le rire
answer
das Lachen
question
rire
answer
lachen
question
le sourire
answer
das LĂ€cheln
question
sourire
answer
lÀcheln
question
aimer
answer
mögen
question
aimer faire qc
answer
gern etw. tun
question
adorer
answer
sehr gern haben
question
préféré,e
answer
Lieblings-
question
la surprise
answer
die Überraschung
question
surprendre
answer
ĂŒberraschen
question
content,e
answer
zufrieden
question
la peur
answer
die Angst
question
faire peur Ă 
answer
erschrecken
question
inquiet, inquiĂšte
answer
beunruhigt, besorgt
question
la tristesse
answer
die Traurigkeit
question
triste
answer
traurig
question
seul,e
answer
allein, einsam
question
terrible
answer
schrecklich
question
le doute
answer
der Zweifel
question
sans aucun doute
answer
zweifellos
question
pleurer
answer
weinen
question
la larme
answer
die TrÀne
question
voir
answer
sehen
question
le regard
answer
der Blick
question
regarder
answer
ansehen, hinsehen
question
entendre
answer
hören
question
Ă©couter
answer
hören, zuhören
question
le bruit
answer
das GerÀusch, der Krach, der LÀrm
question
toucher
answer
berĂŒhren
question
l'odeur f.
answer
der Geruch
question
le parfum
answer
der Duft
question
puer
answer
stinken
question
le sens
answer
der Sinn
question
la sensation
answer
das GefĂŒhl, die Empfindung
question
sentir
answer
fĂŒhlen, riechen
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New