IST Practice Cheat Sheet

Unlock all answers in this set

Unlock answers
question
In a worksheet, the intersection of a row and a column is called a ____.
answer
a.footer b.table c.pointer d.cell (!)
question
With bitmapped images, the color of each ____ is represented by bits; the more bits used, the better the image quality.
answer
a. vector b. map c. (!) pixel d. byte
question
Some ____ must be added in pairs for optimal performance.
answer
a. interfaces b. memory modules (!) c. USB ports d. hard drives
question
The ____ allows individuals to "placeshift" multimedia content from their home TVs and DVRs to their portable computer or mobile device.
answer
a. Singmedia b. Slingbox (!) c. Shiftmedia d. Singbox
question
____ programs are software programs that are distributed on the honor system.
answer
a. Commercial b. Shareware (!) c. Freeware d. Public domain
question
Case-Based Critical Thinking Questions Case 16-1 Jack is a computer programmer who spends most of the day at his desk. Recently, he visited the doctor to get advice about persistent eyestrain and an aching back. To combat his eyestrain, Jack's doctor advised him to ____.
answer
a. use a light touch on the keyboard b. use a lower screen resolution (!) c. use a footrest d. turn down the volume when using headphones
question
____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive.
answer
a. Remote access b. Identity theft (!) c. Spams d. Software theft
question
A ____ is equal to 1,024 bytes.
answer
a. kilobyte (KB) (!) b. megabyte (MB) c. gigabyte (GB) d. terabyte (TB)
question
External hard drives today typically connect to a computer via a USB or ____ port.
answer
a. IrDA b. Bluetooth c. Firewall d. FireWire
question
The ____ implements regulations for unsolicited e-mail messages and lays the groundwork for a federal Do Not E-Mail Registry.
answer
Selected Answer: USA Patriot Act Answers: a. Sarbanes-Oxley Act b. USA Patriot Act CAN-SPAM act (!) d. Junk Fax Prevention Act
question
In a typical client-server database application, the client is called the ____.
answer
Selected Answer: Correcta. front end Answers: front end (!) b. back end c. portal d. rear end
question
Case-Based Critical Thinking Questions Case 14-2 The JL Group is a political think tank that is incorporating new media into their analyses. The employees of JL Group who use the database of the company for their daily work, without having knowledge of how the underlying database is structured, interact with the database ____.
answer
Selected Answer: Correctc. using the user interface Answers: a. through the database designer b. through the database programmer Correctc. using the user interface (!) d. using the database script
question
Question 15 0 out of 1 points Case-Based Critical Thinking Questions Case 4-2 Lisa is a student who regularly uses the computers at her local Internet café to listen to music, talk to her friends and family through the Internet, and play computer games. The Internet café has recently enacted a new policy that says that all users must use the ____ attached to their computers when carrying out activities on the computer that will provide sound, so as to not disturb the other users.
answer
Selected Answer: Incorrect [None Given] Answers: a. scanners Correctb. headphones (!) c. iPod docks d. speakers
question
A computer that is controlled by a hacker or other computer criminal is referred to as a ____.
answer
Selected Answer: Correctd. bot Answers: a. client b. spider c. server Correctd. bot
question
A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.
answer
Selected Answer: Correctd. hot site Answers: a. buddy site b. white room c. alternate pad Correctd. hot site (!)
question
Most ____ programs are available to try free of charge, but typically a small fee is required to use the program regularly.
answer
Selected Answer: Incorrectb. freeware Answers: a. public domain b. freeware Correctc. shareware (!) d. commercial
question
Case-Based Critical Thinking Questions Case 2-2 Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit documents. Recently, he has come to realize that in order to keep the computer performing at its best, he needs to carry out regular system maintenance on the computer. Jack can use the ____ program to locate and delete temporary files, such as installation files, Web browsing history, and files in the Recycle Bin.
answer
Selected Answer: Incorrect [None Given] Answers: a. Windows Registry b. Disk Defragmenter c. Temporary Files Correctd. Windows Disk Cleanup (!)
question
The bus width and bus speed together determine the bus's ____ or bandwidth; that is, the amount of data that can be transferred via the bus in a given period of time.
answer
Selected Answer: Correctc. throughput Answers: a. machine cycle b. memory Correctc. throughput (!) d. clock speed
question
____ is a set of rules for exchanging data over the Web.
answer
Selected Answer: Incorrecta. MP3 Answers: a. MP3 Correctb. XML (!) c. PDF d. CGI
question
Case-Based Critical Thinking Questions Case 2-1 Jess is a musician who has just bought a new computer. Now she has to determine how to connect this computer to the devices that were connected to her old computer. To connect her external hard drive where her music files are stored to the computer, Jess needs to use the ____ port.
answer
Selected Answer: Incorrect [None Given] Answers: Correcta. USB (!) b. serial c. modem d. network
question
The ____ Web is a predicted evolution of the current Web in which all Web content is stored as if it were data in a database so that it can be retrieved easily when needed to fulfill user requests.
answer
Selected Answer: Incorrectc. Central Answers: Correcta. Semantic (!) b. Intelligent c. Central d. Knowledge
question
A company's ____ oversees routing transaction processing and information systems activities, as well as other computer-related areas.
answer
Selected Answer: Incorrectc. chief data officer (CDO) Answers: a. chief security officer (CSO) Correctb. chief information officer (CIO) (!) c. chief data officer (CDO) d. chief executive officer (CEO)
question
A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network.
answer
Selected Answer: Correctd. worm Answers: a. virus b. hacker c. software Correctd. worm (!)
question
The ____ contains all data definitions for a database, including table structures, security information, relationships between the tables in the database, and so on.
answer
Selected Answer: Correctb. data dictionary Answers: a. database book Correctb. data dictionary (!) c. data box d. data book
question
____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.
answer
Selected Answer: Correctb. Passwords Answers: a. Usernames Correctb. Passwords (!) c. PINs d. Codes
question
An inventory management system that goes beyond just inventory to act as a complete distribution system is referred to as a ____ management system (WMS).
answer
Selected Answer: Correctb. warehouse Answers: a. warranted Correctb. warehouse (!) c. wireless d. world
question
External hard drives today typically connect to a computer via a USB or ____ port.
answer
Selected Answer: Correctd. FireWire Answers: a. IrDA b. Bluetooth c. Firewall Correctd. FireWire (!)
question
The most common type of database used on PCs today is a(n) ____.
answer
Selected Answer: Incorrectc. two-way database Answers: Correcta. relational database (!) b. concurrent database c. two-way database d. one-dimensional database
question
With the ____, businesses sell goods or services to individual consumers.
answer
Selected Answer: Correctc. business-to-consumer (B2C) model Answers: a. business-to-business (B2B) model b. consumer-to-consumer (C2C) model Correctc. business-to-consumer (B2C) model (!) d. business-to-government (B2G) model
question
____ is a software development approach that continues the programming trend of breaking a software program into small and more manageable pieces that overlap in functionality as little as possible.
answer
Selected Answer: Incorrecta. Object-Oriented Programming (OOP) Answers: a. Object-Oriented Programming (OOP) Correctb. Aspect-oriented programming (AOP) (!) c. Structured programming d. Object Programming (OP)
question
Filenames typically include a ____ at the end of the filename.
answer
Selected Answer: Incorrectb. file subname Answers: a. file attachment b. file subname Correctc. file extension (!) d. file subscript
question
Charts are inserted into an Excel spreadsheet using the commands in the Charts group on the ____ tab on the Ribbon.
answer
Selected Answer: Incorrectd. Data Answers: a. Tools Correctb. Insert (!) c. Format d. Data
question
A ____ is a large screen computer either built into a table or designed to be used on a table and that allows multi-touch input from multiple users.
answer
Selected Answer: Correctc. table PC Answers: a. digitizing tablet b. touch coding system Correctc. table PC (!) d. tactile feedback screen
question
____ is a video format developed by Microsoft for use with Windows Media Player.
answer
Selected Answer: Correctd. .wmv Answers: a. .avi b. .mov c. .mp3 Correctd. .wmv (!)
question
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.
answer
Selected Answer: Correcta. threat definitions Answers: Correcta. threat definitions (!) b. fraud tips c. virus reports d. viruses
question
____ is the process of gathering, storing, accessing, and analyzing data about a company in order to make better business decisions.
answer
Selected Answer: Correctb. Business intelligence Answers: a. Business flowchart Correctb. Business intelligence (!) c. System architecture d. Enterprise architecture
question
A USB ____ is a device that plugs into your PC's USB port to convert one port into several USB ports.
answer
Selected Answer: Incorrectc. bus Answers: a. module Correctb. hub (!) c. bus d. connector
question
A personal computer (PC) or ____ is a small computer system designed to be used by one person at a time.
answer
Selected Answer: Correctc. microcomputer Answers: a. microchip b. small processor Correctc. microcomputer (!) d. processor
question
Smart cards and holographic drives are examples of ____ systems.
answer
Selected Answer: Incorrectd. artificial intelligence Answers: a. Wi-Fi Correctb. storage (!) c. satellite d. artificial intelligence
question
Although many of us may prefer not to think about it, ____—the complete malfunction of a computer system—and other types of computer-related disasters do happen.
answer
Selected Answer: Correctb. system failure Answers: a. interrupted power Correctb. system failure (!) c. spikes d. software piracy
question
Case-Based Critical Thinking Questions Case 1-1 Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties. Sarah needs to store digital photographs of houses she is previewing. She needs to be able to copy these to the computer at her office. What type of storage device should she use?
answer
Selected Answer: Incorrectd. firewire port Answers: a. data projector Correctb. USB flash drive (!) c. scanner d. firewire port
question
____ is a specialized agency of the United Nations and attempts to resolve international commercial disputes about intellectual property between private parties.
answer
Selected Answer: Correctb. WIPO Answers: a. OLPC Correctb. WIPO (!) c. USPTO d. DRM
question
____ are used for marketing purposes, such as sending advertisements that fit each individual's interests or trying to sign people up over the phone for some type of service.
answer
Selected Answer: Correctb. Marketing databases Answers: a. Government databases Correctb. Marketing databases (!) c. Educational databases d. Research databases
question
One type of nonvolatile RAM, called MRAM, uses ____ polarization rather than an electrical charge to store data.
answer
Selected Answer: Incorrectb. magnetocharged Answers: a. magnetobalanced b. magnetocharged Correctc. magnetic (!) d. magnetoselective
question
One factor affecting digital camera quality is the number of pixels, measured in ____, used to store the data for each image.
answer
Selected Answer: Correctb. megapixels Answers: a. kilopixels Correctb. megapixels (!) c. gigapixels d. terapixels
question
____ was originally developed as a programming language designed for processing text.
answer
Selected Answer: Incorrecta. JavaScript Answers: a. JavaScript Correctb. Perl (!) c. AJAX d. ActiveX
question
____ are useful for identifying procedures and summarizing the decision making process for one step of a system.
answer
Selected Answer: Incorrecta. Data dictionaries Answers: a. Data dictionaries b. Feasibility reports c. Entity-relationship diagrams Correctd. Decision tables (!)
question
The ____ enables up to 127 devices to be connected to a computer through a single port on the computer's system unit.
answer
Selected Answer: Correcta. USB standard Answers: Correcta. USB standard (!) b. HyperTransport bus c. AGP (Accelerated Graphics Port) bus d. PCI Express Bus
question
The file management program incorporated into Windows 8 is ____.
answer
Selected Answer: Incorrecta. Disk Cleanup Answers: a. Disk Cleanup b. StuffIt Correctc. File Explorer (!) d. WinZip
question
One of the properties that can be assigned to a field is a(n) ____ to specify the format (such as letters, numbers, or symbols) that must be entered into a field.
answer
Selected Answer: Incorrectd. format structure Answers: Correcta. input mask (!) b. data filter c. data mask d. format structure
question
____ have begun to replace ROM for storing system information, such as a PC's BIOS.
answer
Selected Answer: Correcta. Flash memory chips Answers: Correcta. Flash memory chips (!) b. Microprocessors c. Adapter cards d. Motherboards
question
Case-Based Critical Thinking Questions Case 13-2 Kelly is a college sophomore majoring in computer science. She is interested in gaining exposure to the most useful and current programming languages and techniques. One of the languages that Kelley is learning is ____ an object-oriented programming language that is commonly used to write Web applications.
answer
Selected Answer: Incorrectd. Visual Basic Answers: a. C b. COBOL Correctc. Java (!) d. Visual Basic
question
____ is the process of building the Web site, including developing all of the components to be used on the Web site, creating the actual Web pages, testing the site, and publishing the site.
answer
Selected Answer: Incorrecta. Web site design Answers: a. Web site design b. Web site planning Correctc. Web site development (!) d. Web site deployment
question
Plasma displays use a layered technology like LCD and ____ and look similar to LCD displays.
answer
Selected Answer: Correctc. OLED Answers: a. SED b. IMOD Correctc. OLED (!) d. PHOLED
question
Case-Based Critical Thinking Questions Case 3-2 Rodney owns a computer that he uses to work, keep in touch with friends and family, watch movies, listen to music, and use the Internet. If Rodney wants to be able to record, erase, and overwrite the files on a CD, he should get a ____.
answer
Selected Answer: Incorrectb. CD-BD Answers: a. CD-R b. CD-BD Correctc. CD-RW (!) d. CD-HD
question
The Windows ____ shown in the accompanying figure contains the following objects: Windows, Icons, Menus, Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.
answer
Selected Answer: Incorrectd. command Answers: a. general menu Correctb. desktop (!) c. toolbox d. command
question
For designing the layout of a Web page, ____ are commonly used when designing animated components.
answer
Selected Answer: Incorrecta. page layouts Answers: a. page layouts b. flowcharts Correctc. storyboards (!) d. plots
question
Conventional dial-up connects to the Internet at a maximum of ____.
answer
Selected Answer: Incorrectd. 128 Kbps Answers: a. 10.2 Kbps b. 28.8 Kbps Correctc. 56 Kbps (!) d. 128 Kbps
question
____ identify users by a particular unique biological characteristic.
answer
Selected Answer: Correcta. Biometric access systems Answers: Correcta. Biometric access systems (!) b. Possessed object access systems c. Possessed knowledge access systems d. Password access systems
question
A ____ is a group of values and other data organized into rows and columns, similar to the ruled paper worksheets traditionally used by bookkeepers and accountants.
answer
Selected Answer: Correctd. spreadsheet Answers: a. cell b. document c. block Correctd. spreadsheet (!)
question
A ____ holds a single category of data (such as customer names or employee telephone numbers) that will be stored in a database.
answer
Selected Answer: Incorrectb. record Answers: Correcta. field (!) b. record c. cell d. table
question
A ____ is the smallest unit of data that a binary computer can recognize.
answer
Selected Answer: Incorrectb. byte Answers: a. datum b. byte Correctc. bit (!) d. pixel
question
The earliest programming languages—machine language and assembly language—are referred to as ____.
answer
Selected Answer: Incorrectb. procedural programming languages Answers: a. third-generation programming languages (3GLs) b. procedural programming languages c. interpreted languages Correctd. low-level languages (!)
question
A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____.
answer
Selected Answer: Incorrectd. e-scams Answers: a. dot frauds Correctb. dot cons (!) c. e-cons d. e-scams
question
One of the most straightforward ways to improve the quality of the hits returned in a search is to use ____—essentially typing more than one keyword in a keyword search.
answer
Selected Answer: Incorrecta. character searching Answers: a. character searching b. index searching c. code searching Correctd. phrase searching (!)
question
Print speed is typically measured in ____.
answer
Selected Answer: Incorrectb. dots per second (dps) Answers: Correcta. pages per minute (ppm) (!) b. dots per second (dps) c. characters per second(cps) d. pixels per minute (ppm)
question
Popular drawing programs include ____ and CorelDRAW.
answer
Selected Answer: Correcta. Adobe Illustrator Answers: Correcta. Adobe Illustrator (!) b. Harvard Graphics c. Corel Paint Shop Pro d. IBM Storyboard
question
____ memory allows you to use more memory than is physically available on your computer.
answer
Selected Answer: Correctb. Virtual Answers: a. Multithreading Correctb. Virtual (!) c. Buffer d. Shared
question
____ refers to identifying the browser used by each visitor, typically via JavaScript code.
answer
Selected Answer: Incorrectb. Browser mapping Answers: a. Personalization b. Browser mapping c. Visitor identification Correctd. Browser sniffing (!)
question
Case-Based Critical Thinking Questions Case 7-2 Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network. Gabrielle is planning to connect selected devices to the network wirelessly with a wireless ____.
answer
Selected Answer: Incorrectb. hub Answers: a. hotspot b. hub c. data point Correctd. access point (!)
question
Adding to the problem of unethical ____ is the use of digital cameras today, which eliminate the photo negatives that could be used with film cameras to show what photographs actually looked like at the time they were taken.
answer
Selected Answer: Correctd. digital manipulation Answers: a. identity theft b. cybersquatting c. digital counterfeiting Correctd. digital manipulation (!)
question
Hollerith's machine was used to process the 1890 U.S. Census data and was able to complete the task in ____, instead of the decade it usually took to process the data by hand.
answer
Selected Answer: Incorrectb. four years Answers: a. two months b. four years Correctc. two and a half years (!) d. six years
question
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.
answer
Selected Answer: Correctd. threat definitions Answers: a. virus reports b. viruses c. fraud tips Correctd. threat definitions (!)
question
There are independent Web sites (such as the ____ Web site) that report on the validity of current online rumors and stories.
answer
Selected Answer: Incorrecta. Identifier Answers: a. Identifier b. Phisher Correctc. Snopes (!) d. Spammer
question
Case-Based Critical Thinking Questions Case 14-2 The JL Group is a political think tank that is incorporating new media into their analyses. The JL Group has gathered data on voting habits. In order to make sure that respondents cannot claim to have voted in more elections than is possible given their age, ____ rules can be assigned to the database tables.
answer
Selected Answer: Incorrectd. index validation Answers: a. dynamic b. DBA validation Correctc. record validation (!) d. index validation
question
In a 16.8-million-color (called photographic quality or ____) image, three bytes (24 bits) are used to store the color data for each pixel in the image.
answer
Selected Answer: Incorrectb. mega color Answers: a. real color b. mega color c. full color Correctd. true color (!)
question
Rearranging the data on the hard drive so all files are stored in contiguous locations is called ____.
answer
Selected Answer: Incorrectb. disk backup Answers: Correcta. disk defragmentation (!) b. disk backup c. file compression d. disk cleanup
question
____ bring buyers and sellers together to facilitate transactions between the two parties.
answer
Selected Answer: Correctb. Brokerage sites Answers: a. E-tailers Correctb. Brokerage sites (!) c. M-Brokers d. Shop carts
question
Some ____ must be added in pairs for optimal performance.
answer
Selected Answer: Incorrectb. interfaces Answers: Correcta. memory modules (!) b. interfaces c. hard drives d. USB ports
question
____ store checkout information in the customer's account for use with purchases on that site only.
answer
Selected Answer: Incorrectc. Site-specific online payment accounts Answers: a. Site-specific electronic check accounts b. Site-specific smart cards c. Site-specific online payment accounts Correctd. Site-specific digital wallets (!)
question
The most common flat-panel technologies include liquid crystal display (LCD), various types of light emitting diode (LED), and ____.
answer
Selected Answer: Incorrectb. HDTV Answers: Correcta. gas plasma (!) b. HDTV c. HD-integrated d. DVR
question
Case-Based Critical Thinking Questions Case 7-2 Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network. Gabrielle is planning to connect selected devices to the network wirelessly with a wireless ____.
answer
Selected Answer: Incorrectc. hotspot Answers: a. hub Correctb. access point (!) c. hotspot d. data point
question
Ultraportables conforming to Intel's standards can be marketed as ____.
answer
Selected Answer: Incorrecta. hybrids Answers: a. hybrids Correctb. Ultrabooks (!) c. smallframe computers d. IntelBooks
question
Data definition involves describing the properties of the data that go into each database table, specifically the ____ that make up the database.
answer
Selected Answer: Incorrecta. records Answers: a. records Correctb. fields (!) c. characters d. rows
question
Program ____ use graphic symbols and relational operators (such as < for "less than" and = for "equal to") to portray the sequence of steps needed to fulfill the logic in that program, module, or method.
answer
Selected Answer: Incorrectc. pseudocode Answers: Correcta. flowcharts (!) b. structure charts c. pseudocode d. models
question
Middleware for Web database applications is commonly written as ____—short sections of code written in a programming or scripting language that are executed by another program.
answer
Selected Answer: Incorrectb. JavaScripts Answers: Correcta. scripts (!) b. JavaScripts c. applets d. utilities
question
Case 8-2 Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports. Brenda also orders movies and television through the Internet via a(n) ____ provider, which allows users to download video for a small fee.
answer
Selected Answer: Incorrectc. RSS Answers: a. VoIP Correctb. VOD (!) c. RSS d. blog
question
One advantage of a dial-up connection is ____.
answer
Selected Answer: Incorrecta. connection speed Answers: a. connection speed Correctb. security (!) c. continuous availability d. sharing the connection
question
A(n) ____ is a form of protection available to the creator of an original artistic or literary work, such as a book, movie, software program, musical composition, or painting.
answer
Selected Answer: Incorrectb. patent Answers: a. intellectual ownership right b. patent Correctc. copyright (!) d. trademark
question
One of the most common painting programs is ____.
answer
Selected Answer: Incorrecta. Adobe's Acrobat Answers: a. Adobe's Acrobat b. IBM's Storyboard Correctc. Microsoft Paint (!) d. Macromedia's Dreamweaver
question
One measurement of the speed of a CPU is the ____, which is rated in megahertz (MHz) or gigahertz (GHz).
answer
Selected Answer: Incorrectb. CPU rpm Answers: a. system rpm b. CPU rpm Correctc. CPU clock speed (!) d. system speed
question
____ is increasingly being tied to crime and even death in some countries.
answer
Selected Answer: Incorrectc. OLPC Answers: a. CVS b. CAD c. OLPC Correctd. Internet addiction (!)
question
____ devices are designed to withstand much more physical abuse than conventional devices.
answer
Selected Answer: Correctd. Ruggedized Answers: a. Secured b. Malleable c. Flexible Correctd. Ruggedized (!)
question
Artificial intelligence systems that attempt to imitate the way a human brain works are called ____.
answer
Selected Answer: Incorrectb. robots Answers: a. biometric systems b. robots c. expert systems Correctd. neural networks (!)
question
RAID 0 uses disk ____, which spreads files over several disk drives.
answer
Selected Answer: Incorrecta. mirroring Answers: a. mirroring b. burning c. clustering Correctd. striping (!)
question
To record data, holographic storage systems split the light from a blue laser beam into ____ beams.
answer
Selected Answer: Correcta. two Answers: Correcta. two (!) b. four c. five d. ten
question
A ____ is a separate piece of hardware containing multiple high-speed hard drives.
answer
Selected Answer: Correctb. storage server Answers: a. storage drive Correctb. storage server (!) c. storage client d. storage base
question
In reaction to scandals, Congress passed the Sarbanes-Oxley Act of 2002, which includes provisions to require ____ to personally vouch for the truth and fairness of their company's disclosures.
answer
Selected Answer: Incorrecta. CEOs and CIOs Answers: a. CEOs and CIOs b. CCVs and DRMs Correctc. CEOs and CFOs (!) d. SOAs and DRMs
question
____ are utility programs that search for documents and other files on a user's hard drives.
answer
Selected Answer: Incorrectc. Search engines Answers: Correcta. Search tools (!) b. Tool boxes c. Search engines d. Tool programs
question
Like graphics data, ____—such as a song or the sound of someone speaking—must be in digital form in order to be stored on a storage medium or processed by a PC.
answer
Selected Answer: Incorrecta. pixel data Answers: a. pixel data Correctb. audio data (!) c. giga data d. audio programs
question
Digital still cameras most often use ____ cards for storage.
answer
Selected Answer: Incorrecta. RAM memory Answers: a. RAM memory b. ROM memory c. laser memory Correctd. flash memory (!)
question
____ have begun to replace ROM for storing system information, such as a PC's BIOS.
answer
Selected Answer: Incorrectb. Motherboards Answers: a. Microprocessors b. Motherboards Correctc. Flash memory chips (!) d. Adapter cards
question
Media that allow random access are sometimes referred to as ____ media.
answer
Selected Answer: Incorrectc. nonidentifiable Answers: a. optical Correctb. addressable (!) c. nonidentifiable d. identifiable
question
Java is currently one of the most popular programming languages and has replaced ____ as the programming language used for the computer science Advanced Placement exam taken by high school students to earn college credit.
answer
Selected Answer: Incorrectb. BASIC Answers: a. Visual Basic b. BASIC Correctc. C++ (!) d. C
question
Case-Based Critical Thinking Questions Case 6-2 Bryan has just started an internship in which he uses a database frequently. The database contains information about the company's employees. Bryan's supervisor senses that he is anxious about using the database and drops by to give him a short tutorial. Bryan's supervisor explains that to retrieve information from the database, Bryan needs to use a ____.
answer
Selected Answer: Incorrectd. formula Answers: a. form b. presentation Correctc. query (!) d. formula
question
Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ____ uniquely identifies a Web page.
answer
Selected Answer: Incorrecta. Web ID (WID) Answers: a. Web ID (WID) b. universal resource identifier (URI) Correctc. uniform resource locator (URL) (!) d. Web resource identifier (WRI)
question
Case-Based Critical Thinking Questions Case 12-2 Mother Goose Computing, Inc. provides computational biology consulting services. They are currently updating several of their systems. For the protein folding division, Mother Goose is planning to implement the new system module by module. This is called a ____ conversion.
answer
Selected Answer: Incorrectd. pilot Answers: a. direct b. parallel Correctc. phased (!) d. pilot
question
Copyrights apply to both published and unpublished works and remain in effect until ____.
answer
Selected Answer: Incorrecta. 10 years after the creation of the work Answers: a. 10 years after the creation of the work b. 70 years after the creation of the work c. 10 years after the creator's death Correctd. 70 years after the creator's death (!)
question
Case-Based Critical Thinking Questions Case 10-1 Smith Web Design is creating a secure Web site for a local doctor. In addition to providing basic information about her practice, she wants her patients to be able to log on and access their records, including images such as X-rays and MRIs. After patients log on, they should be able to download scanned versions of their X-rays and MRIs. These images should be provided in the ____ format.
answer
Selected Answer: Incorrectd. JPEG Answers: a. GIF b. BMP Correctc. TIF (!) d. JPEG
question
One of the simplest hashing algorithms involves dividing the primary key field by a particular ____.
answer
Selected Answer: Correctd. prime number Answers: a. irrational number b. power of two c. transcendental number Correctd. prime number (!)
question
The process of evaluating and correcting the structures of the tables in a database to minimize data redundancy is called ____.
answer
Selected Answer: Incorrectd. cyclic redundancy check Answers: a. zeroing Correctb. normalization (!) c. zonification d. cyclic redundancy check
question
____ keys on a keyboard are used for issuing commands in some programs.
answer
Selected Answer: Incorrectc. Alphanumeric Answers: a. Arrow Correctb. Function (!) c. Alphanumeric d. Number
question
____ account numbers are essentially disposable credit card numbers that can be used to buy goods and services that will be charged to the customer's regular credit card.
answer
Selected Answer: Incorrectb. Online Answers: Correcta. Virtual (!) b. Online c. Temporary d. Prepaid
question
When Mary started college, her parents bought her a new computer that came with minimal software. She is now looking into purchasing additional software. Mary needs word processing software for her classes, but she has to budget her resources carefully this semester. She might consider using ____, which is available as a free download via the Internet.
answer
Selected Answer: Correctb. OpenOffice Answers: a. WordPerfect Office Correctb. OpenOffice (!) c. Microsoft Office d. SmartSuite.org
question
In an expert system, the ____ is a software program that applies the rules to the data stored in the knowledge base in order to reach decisions.
answer
Selected Answer: Incorrectd. rules processor Answers: Correcta. inference engine (!) b. knowledge bus c. data authority d. rules processor
question
There are four basic categories of software: commercial software, shareware, freeware, and ____.
answer
Selected Answer: Incorrectc. licensed software Answers: Correcta. public domain software (!) b. publish software c. licensed software d. advertising software
question
To prevent individuals from making unauthorized copies of feature films purchased on DVDs or downloaded via the Internet, many of these items contain copy protection or some other form of ____.
answer
Selected Answer: Incorrectc. RSI Answers: Correcta. DRM (!) b. AACSB c. RSI d. patents
question
___ is a new alternative for homes and businesses today in areas where there is fiber optic cabling available all the way to the building. S
answer
elected Answer: Incorrectc. DSL Answers: Correcta. BoF (!) b. ISDN c. DSL d. T1
question
Some wireless ____ are created by cities or large organizations to provide free or low-cost Internet access to residents of a particular area.
answer
Selected Answer: Incorrectd. LANs Answers: a. WANs b. PANs Correctc. MANs (!) d. LANs
question
____ software can control which devices can be connected to an employee's computer.
answer
Selected Answer: Incorrecta. Device authentication Answers: a. Device authentication Correctb. Data-leakage prevention(!) c. Network quarantine d. Professional firewall
question
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.
answer
Selected Answer: Incorrectc. identity theft Answers: a. DoS attacks b. spamming c. identity theft Correctd. typosquatting (!)
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New