MISY Final: a Filtering Programs, Control the Timing of Computer, System Software – Flashcards

Unlock all answers in this set

Unlock answers
question
A ___ is a program that extends the capability of a browser.`
answer
plug-in
question
___ is data that has been processed into a useful form.
answer
Output
question
Advantages of portable hard disks and removable hard disks
answer
Transports large number files, add storage space to notebook computer, easily store large audio/video files
question
A reasonable quality ink-jet printer costs ____.
answer
less than $100
question
To write on a CDRW disc, users must has software and ____.
answer
drive
question
Broadcast radio is ___ susceptible to mouse then physical transmission media but provides flexibility and portability.
answer
slower and more
question
A ___ is a program that removes or blocks certain items from being displayed
answer
filter
question
A ____ provides a mobile user with secure connection to connection to company network server
answer
virtual private network
question
In a relational database, each row has a ____ and each column has a _____.
answer
primary key and unique name
question
A comm ____ is a transmission media on which date, interactions, and info travel
answer
channel
question
___ refers to core activities of a business, involving creation, selling, and support of products
answer
Operations
question
Planning, performed by managers, involves _____.
answer
establishing goals and objectives
question
___ cable consists of a single copper wire surrounded by at least three layers: insulation, woven metal, plastic coating
answer
Coaxial
question
A ____ is a small text file that a web servers stores on a users computer.
answer
cookie
question
____ occurs when someone steals personal or confidential information.
answer
Information theft
question
High-availability system may include ___ components that allow for a functioning component to take over automatically of one that fails.
answer
redundant
question
A ____ is someone who tries to access a computer or network illegally.
answer
hacker
question
A ____, also called program logic, is a graphical or written description of step by step procedures to solve problem.
answer
solution algorithm
question
A ___ stationary pointing device with a ball on its top or side (similar to mechanical mouse)
answer
trackball
question
_____ commonly describes a business or venture of any size.
answer
Enterprise
question
A ___ source is a company or person a user believes will not knowingly send a virus-infected file
answer
trusted
question
The ___ interprets and carries out basic instructions that operate a computer
answer
CPU (Central Processing Unit)
question
An _____ allows users to share documents with others in real time.
answer
online meeting
question
Devices including ____, ____, _____, often have internal miniature hard disks.
answer
Media players, digital cameras, smart phones, not laptops
question
An ______ program is filtering program that attempts to remove spam before it reaches a users inbox
answer
anti-spam
question
E-commerce that actually takes place between businesses is called _____
answer
B2B e-commerce
question
A ____ drive is the drive from which a personal comp starts
answer
boot
question
____ is a program placed on computer without users knowledge that secretly collects info about the user
answer
Spyware
question
____ uses a modem that sends digital data and info from a computer to a DSL line
answer
DSL
question
A _____ is a duplicate of a file, program, or disk that can be used if the original is lost
answer
backup
question
The advantage of custom software is that it _________.
answer
matches a company's requirements exactly
question
______ use is the use of a computer or its data for unapproved or illegal activities.
answer
Unauthorized
question
The _____ is the core of an operating system that maintains computers clock, starts application, and assigns resources (devices, programs, data, and info)
answer
kernel
question
____ is the process of planning, scheduling, and then controlling the activities during system development cycle.
answer
Project management
question
A ____ is an opening inside the system unit in which additional equip can be installed.
answer
bay
question
A ____ is malware that copies itself repeatedly
answer
worm
question
The machine language version that results from compiling a 3GL is called the ______
answer
object code or program
question
A ___ player is a program that allows you to view images and animation, listen to audio, and watch videos
answer
media
question
___ is an unsolicited email sent to many recipients at once
answer
Spam
question
In Windows 7, Windows ____ feature protects your comp from external threats
answer
Defender
question
Info ____ refers to the right to deny or restrict the collect and use of info about users
answer
privacy
question
A programming language's ___ is a set of grammar and rules that specifies how to write instructions for a solution algorithm.
answer
syntax
question
_____ info is gathered in the ongoing operations of an enterprise-sized organization
answer
Enterprise
question
A ____ program is a utility that protects a comp against viruses by identifying and removing any viruses.
answer
antivirus
question
Organized set of program development activities is known as the program life development ______.
answer
cycle
question
A ____ is a wireless network that provides Internet connection to mobile devices
answer
hot spot
question
_____ is the process of comparing data with a set of rule to find out if data is correct
answer
Validation
question
With _______ memory, the operating system allocates a portion of a storage medium, the hard ski, to function as additional RAM.
answer
Virtual
question
_____ is a network standard that specifies no central device on the network should control when data can be transmitted
answer
Ethernet
question
The location in a retail store where a consumer pays for goods or services is ____.
answer
POS
question
Syntax errors will be cause by _____, ______, _______.
answer
misspelling a command, leaving out punctuation, typing words out of order, NOT using wrong control structure
question
An ______ system is an info system that captures and stores knowledge of human experts then imitates reasoning and decision making.
answer
expert
question
A _____ is a working model of a proposed system.
answer
Prototype
question
Scope ____ occurs when one activity in a project has led to another that was not originally planned, thus scope has grown`
answer
creep
question
Many companies use OCR character on a ____ document, which is returned to company that creates and sends it.
answer
turnaround
question
A _____ is a comm device that connects multiple comps together and transmits data to its correct destination on a network
answer
router
question
In doc management system, a central library or ______ stores all documents within a company
answer
repository
question
An alt to maintaining an alt computer facility is to enter into a _______ backup relationship with another firm, where one firm provides space to other in case of disaster.
answer
reciprocal
question
______ computing involves the use of computers in networks (LAN and WAN) that encompass a variety of diff operating systems, protocols, and network architectures.
answer
Enterprise
question
_____ storage is an internet service that provides storage to computer users
answer
Cloud
question
____ is a collection of unprocessed items which can include text, numbers, images, audio and video.
answer
Data
question
Google Docs is a cloud storage provide for ____, ____, ____.
answer
spreadsheets, presentations, documents but NOT emails
question
If back file is used, a ____ program reverses the process and returns backed up files to original form
answer
restore
question
Programs that act without users knowledge to alter computer operations (virus, worm, trojan horse, root kit)
answer
Malware
question
A ____ info system generates accurate and organized info so managers can make decisions, solutions, supervise, and track progress
answer
management
question
Video ____ is the process of capturing full motion images into a computer and storing them on a storage medium
answer
input
question
_____ systems continue running and performing tasks for at least 99% of the time.
answer
High-Availability
question
Most retail stores use ____ terminal to record purchases, credit, debit, and inventory
answer
POS
question
____ includes information about files and data called metadata
answer
CMS (Content management system)
question
In operating system, ____ can fix bugs, enhance security, and modify device drivers.
answer
automatic updates
question
Windows ____ is an upgrade to Windows 2003 Server.
answer
Server 2008
question
___ software tracks leads and inquiries from customers, store history of all sales to customer, and allows for tracking of outstanding issues with customers
answer
CRM (Customer relationship management)
question
An ____ disc is a storage media type that consists of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
answer
optical
question
____ software is application software developed by user or at users request
answer
custom
question
An _____ reader is a device that uses light source to read characters, marks, and codes then coverts them into digital data that comp can process
answer
optical
question
To convert an assembly language source program into machine language, programmers use an ______.
answer
assembler
question
Two types of system software are _____.
answer
operating systems and utility programs
question
Internet ad firms often use ____ to collect info about users web habits
answer
spyware
question
A _____ is a system that manages one or more human resource function
answer
HRIS (human resource info system)
question
With _____, users invest in stocks, options, bonds, treasuries, and so on without using a broker
answer
online trading
question
a _____ backup copies all of the files in a computer
answer
full backup
question
Tape storage requires ___ access, which refers to reading or writing data consecutively
answer
sequential
question
A spyware ____ is a program that detects and deletes spyware and similar programs.
answer
remover
question
Content ____ is the process of restricting access to certain material on the web.
answer
filtering
question
Comp ___ occurs when a computer consumes someones entire social life
answer
addiction
question
Two examples of ______ are cable television lines and telephone lines.
answer
comm channels
question
____ is a technology that reads hand draw marks such as small circles or rectangles
answer
OMR (optical mark recognition)
question
A ____ does not replicate itself to other computers
answer
trojan horse
question
___ computing provides computing needs to computer users via Internet
answer
Cloud
question
____ systems manage info about costumers, interactions, past purchase, and interests.
answer
CRM (customer relationship management)
question
An _____ network, most recent net standard, conforms to the gov security standards and uses more sophisticated encryption than WPA
answer
802.11i
question
A UPS connects between a computer and a _____
answer
power source
question
A ____ backup (partial) allows user to choose specific files to backup
answer
selective
question
Some external peripherals have an AC ______, which is an external power supply.
answer
adapter
question
Software ____ occurs when someone steals software media, intentionally erase programs, or illegally copies.
answer
theft
question
Digital ____ is the discovery, collection, and analysis of evidence found on comps and networks.
answer
forensics
question
An ____ system is a collection of hardware, software, data, people, and procedures that work to produce quality information.
answer
information
question
A _____ system automates and manages much of the communications between employees and businesses
answer
ERM (Employee Relationship Mgt)
question
___ occurs when retailers use web to sell their products or services
answer
E-tail
question
A ____ identifier is a physiological or behavioral characteristic such as fingerprints and eye patterns.
answer
biometric
question
____ is the transmission of messages and files via computer network
answer
Email
question
____ high speed internet connections use antenna on a house or business to communicate with a tower location via radio signals
answer
Fixed wireless
question
A cable ___ allows access to high sped internet service through cable television network
answer
modem
question
The BIOS executes a series of test, called ____, which check various system components including buses, clock, adapter cards, RAM chips and drives.
answer
POST (power on self test)
question
Many businesses use __ to limit employees web access
answer
content filtering
question
In the latest Windows conversion, the __ consists of several files that contain system configuration info.
answer
registry
question
Many cloud storage providers offer _____
answer
encryption, web apps, passwords
question
____ holds data, instructions, and info for future use.
answer
Storage
question
The core of a _____ cable consists of dozens/hundreds of thin strands of glass or plastic that use light to transmit signals
answer
fiber-optic
question
____ is a combo of an electric cash register, bar code reader, and printer.
answer
POS
question
Software ___ is an unauthorized and illegal duplication of copyrighted software.
answer
piracy
question
A hardcopy is also called a ____
answer
printout
question
The process of locating and correcting syntax and logic errors in a program is known as ____ the program.
answer
debugging
question
People connect wirelessly to the internet through a ____ using their mobile devices
answer
hot spot
question
On larger computers, tape cartridges are mounted in a separate cabinet called a tape ______
answer
library
question
A certificate ____ is an authorized person or company that issues and verifies digital certificates.
answer
Authority
question
The 1988 ____ regulates the use of government data to determine the eligibility of individuals for federal benefits.
answer
Computer Matching and Privacy Protection Act
question
A ____ line is a type of always-on connection that is established between two communications devices.
answer
dedicated
question
A major weakness of a lot of file processing systems is that they ____.
answer
have redundant data and isolate data
question
A(n) ____ modem sends and receives data and information to and from a digital line.
answer
digital
question
A wireless ____ point is a central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.
answer
access
question
Windows ___ is Microsofts fastest, most efficient operating system to date
answer
7
question
An IT code of conduct is a written guideline that helps determine whether a specific computer action is ______.
answer
ethical
question
A ____ overcomes the major disadvantage of CD-R disks, which is being able to write on them only once.
answer
CDRW
question
Often users ____, or transfer a copy of, the images from a digital camera to a computer's hard disk.
answer
download
question
A typical enterprise consists of hundreds of operating entities, called ____ including departments, centers, and divisions.
answer
functional units
question
Some cloud storage services charge an additional per ____ fee for data transferred to and from the cloud storage service.
answer
gigabyte
question
A(n) ____ is the intersection of a column and row in a worksheet.
answer
call
question
____ are two of the more widely accessed Internet services.
answer
WWW and email
question
An image ____ is a graphical image that points to one or more Web addresses.
answer
map
question
A unit test ____.
answer
verifies that each individual program works by itself
question
A(n) ____ is a display device that is packaged as a separate peripheral.
answer
monitor
question
____ enables users to speak to other users over the Internet.
answer
VoIP
question
A network ____ refers to the layout of the computers and devices in a communications network.
answer
topology
question
____ means the operating system automatically configures new devices as users install them.
answer
Plug and Play
question
A(n) ____ tests a condition at the beginning of the loop and repeats one or more times as long as the condition is true.
answer
do-while control structure
question
A(n) ____ interface controls how users enter data and instructions into a computer and how information is displayed on the screen.
answer
interface
question
A(n) ____ is a window on the screen that provides areas for entering or changing data in a database.
answer
form
question
A tape ____ is a small, rectangular, plastic housing for tape.
answer
cartridge
question
A(n) ____ performs calculations on the data in a worksheet and displays the resulting value in a cell.
answer
formula
question
A(n) ____ utility assists programmers with identifying syntax errors and finding logic errors in a program.
answer
debug
question
A(n) ____ display is a lightweight display device with a shallow depth, such as an LCD monitor or plasma monitor, that does not use CRT technology.
answer
flat panel
question
____ is a magnetically coated ribbon of plastic capable of storing large amounts of data and information at a low cost.
answer
Tape
question
Sometimes a company uses a(n) ____, which allows customers or suppliers to access part of its intranet.
answer
extranet
question
A(n) ____ hard disk is a hard disk that you insert and take out of a drive, and it may either be built into the system unit or external and connected via a USB or FireWire port.
answer
removable
question
____ are employees who are responsible for coordinating and controlling an organization's resources.
answer
Managers
question
The kernel is memory ____, which means it remains in memory while the computer is running.
answer
resident
question
Linux is ____ software, which means its code is provided for use, modification, and redistribution.
answer
open source
question
The USB (universal serial bus) and FireWire bus are ____.
answer
buses that eliminate the need to install cards in expansion slots
question
A card ____ is a device that reads data, instructions, and information stored on flash memory cards.
answer
reader/writer
question
To prevent repetitive strain injury, take all of the following precautions except ____.
answer
use heel of hand as pivot point
question
____, which provides encryption of all data that passes between a client and an Internet server, requires only that the client has a digital certificate.
answer
Transport Layer Security TLS
question
A(n) ____ viewer is a utility that allows users to display, copy, and print the contents of a graphics file.
answer
image
question
A(n) ____ is a touch-sensitive display device that users interact with by touching the screen with a finger.
answer
touch screen
question
A(n) ____ suppressor uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching a computer and other electronic equipment.
answer
surge suppressor
question
In sequence, most SYStem development life cycles contain five phases: ____.
answer
planning analysis design implementation support
question
A(n) ____ database is an application appropriate for an object-oriented database that contains text, graphics, video, and sound.
answer
hypermedia
question
In the ____ phase, system developers perform four major activities: (1) develop programs, (2) install and test the new system, (3) train users, and (4) convert to the new system.
answer
implementation
question
With ____, the processor begins fetching a second instruction before it completes the machine cycle for the first instruction.
answer
pipelining
question
____ privileges for data involve establishing who can enter new data, change existing data, delete unwanted data, and view data.
answer
Access
question
____ cable consists of one or more twisted-pair wires bundled together.
answer
Twisted pair
question
____ is the process of dividing a disk into tracks and sectors, so the operating system can store and locate data and information on the disk.
answer
Formatting
question
Data ____ identifies the quality of data in a database.
answer
integrity
question
A processor contains small high-speed storage locations, called ____, that temporarily hold data and instructions.
answer
registers
question
Project leaders can use project ____ software to assist them in planning, scheduling, and controlling development projects.
answer
management
question
____ is the process by which an enterprise collects, archives, indexes, and retrieves its knowledge or resources.
answer
KM (Knowledge management)
question
A command is ____.
answer
an instruction that causes a program to perform a specific action
question
In Windows, the ____ contains a list of programs that open automatically when users boot the computer.
answer
startup folder
question
The processor relies on a small quartz crystal circuit called the ____ clock to control the timing of all computer operations.
answer
system clock
question
____ report usually list just transactions.
answer
detailed
question
____ is/are not considered spyware because a user knows it/they exist(s).
answer
cookies
question
One popular use of ____ is to store a prepaid amount of money, such as for student purchases on campus.
answer
smart cards
question
Some ____ printers spray ink, while others use heat or pressure to create images.
answer
nonimpact
question
____ systems provide forecasting for inventory control, manage and track shipping of products, and provide information and analysis on inventory in warehouses.
answer
distribution
question
The amount of data, instructions, and information that can travel over a communications channel sometimes is called the ____.
answer
bandwidth
question
The area of the hard disk used for virtual memory is called a(n) ____ file because it exchanges data, information, and instructions between memory and storage.
answer
swap file
question
The case of the system unit, sometimes called the ____, is made of metal or plastic and protects the internal electronic components from damage.
answer
chassis
question
A(n) ____ is a utility that removes a program, as well as any associated entries in the system files.
answer
uninstaller
question
A(n) ____ card, which is similar in size to a credit card or ATM card, stores data on a thin microprocessor embedded in the card.
answer
smart
question
The ____ enables a program to perform one or more actions repeatedly as a loop as long as a certain condition is met.
answer
repetition
question
A(n) ____ gives authors and artists the exclusive rights to duplicate, publish, and sell their materials.
answer
copyright
question
Types of wired home networks include all of the following EXCEPT ____.
answer
Wi Fi (Ethernet, powerline, phoneline)
question
A ____ port was formerly referred to as an IEEE 1394 port.
answer
FireWire
question
A momentary overvoltage, called a ____, occurs when the increase in power lasts for less than one millisecond (one thousandth of a second).
answer
spike
question
A(n) ____ is an information system that enables employees to perform tasks using computers and other electronic devices, instead of manually.
answer
OIS (operational info system)
question
The speed of a dot-matrix printer is measured by the number of ____ it can print.
answer
characters per second (cps)
question
A personal ____ is a utility program that detects and protects a personal computer and its data from unauthorized access.
answer
firewall
question
One purpose of using test data is to try to cause a ____, which is an error that causes a program to stop running.
answer
run-time error
question
A(n) ____ is an output device that visually conveys text, graphics, and video information.
answer
display
question
Some computers improve hard disk access time by using a disk ____, which consists of memory chips that store frequently accessed items.
answer
cache
question
Together, the four basic operations of a processor (fetching, decoding, executing, and storing) comprise a(n) ____ cycle.
answer
machine
question
____ a program involves translating the solution algorithm into a programming language (usually on paper) and then typing the programming language code into the computer.
answer
coding
question
With a three-generation backup policy, the parent is the ____.
answer
second oldest copy
question
____ is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct expected of individuals while online.
answer
netiquette
question
Programs that analyze data, such as those in a DSS (decision support system), sometimes are called ____ programs.
answer
OLAP (online analytical processing)
question
Leading, sometimes referred to as directing, is an activity performed by managers that involves ____.
answer
instructing and authorizing others to perform the necessary work
question
All of the following are characteristics of hard disks EXCEPT ____.
answer
write-protect notch (read/write head, sectors and tracks, capacity)
question
Dead code is _____.
answer
any program instructions that a program never executes
question
A(n) ____ is an information system that helps users analyze data and make decisions.
answer
DSS
question
____ is the most common type of volatile memory.
answer
RAM
question
A(n) ____ information system is a system that serves as a central repository for the tasks of the marketing functional unit.
answer
marketing
question
The ____ follows these six steps: (1) analyze the requirements, (2) design the solution, (3) validate the design, (4) implement the design, (5) test the solution, and (6) document the solution.
answer
program development life cycle
question
____ is the application of human intelligence to computers.
answer
AI (artificial intelligence)
question
An ERM system ______.
answer
facilitates communication between employees and the business
question
A(n) ____ drive like that in the accompanying figure fits into a port that is itself an interface that can connect up to 127 different peripherals together with a single connector.
answer
USB
question
____ devices are servers connected to a network with the sole purpose of providing storage.
answer
NAS (network area storage)
question
Windows ____ is an operating system that includes functionality, applications, and a user interface designed for specific types of smart phones.
answer
Phone 7
question
A(n) ____ is a collection of every action that users make as they move through a Web site.
answer
click stream
question
A form that sends entered data across a network or the Internet is called a(n) ____.
answer
e-form
question
The latest version of the Macintosh operating system, Mac ____, is a multitasking operating system available only for computers manufactured by Apple.
answer
OS X
question
A single user/single ____ operating system allows only one user to run one program at a time.
answer
tasking
question
____ clients are small, terminal-like computers that mostly rely on a server for data storage and processing.
answer
thin
question
One of the more common causes of ____ is an electrical power variation.
answer
system failure
question
A USB ____ is a device that plugs in a USB port on the system unit like the one in the accompanying figure and contains multiple USB ports in which users plug cables from USB devices.
answer
hub
question
Many people initially referred to the functions of a TPS (transaction processing system) as ____.
answer
data processing
question
The purpose of memory ____ is to optimize the use of random access memory (RAM).
answer
management
question
A(n) ____ identifies data outside of a normal condition.
answer
exception report
question
Fiber-optic cables have all of the following advantages over cables that use wire except ____.
answer
lower costs and easier installation/modification (faster data transmission and smaller size, less susceptible to noise, better security for signals)
question
Windows ____ is a scaled-down Windows operating system designed for use on communications, entertainment, and computing devices with limited functionality.
answer
Embedded CE
question
Windows ____ is a scaled-down Windows operating system designed for use on communications, entertainment, and computing devices with limited functionality.
answer
FTP (File transfer protocol)
question
Web sites use a ____ to keep track of items in a user's shopping cart.
answer
session cookie
question
A file is _________.
answer
a named collection of stored data, instructions, or info
question
During a cold boot on a personal computer, the POST (power-on self test) results are compared with data in a ____ chip.
answer
CMOS (complementary metal oxide semiconductor)
question
An enterprise storage system may use ____.
answer
RAID and a tape player, optical disc jukeboxes, Internet backup and NAS devices
question
An FTP ____ is a computer that allows users to upload and/or download files using FTP.
answer
server
question
A(n) ____ operating system is an operating system that organizes and coordinates how multiple users access and share resources on a network.
answer
server
question
An operational manager makes a(n) ____ decision, which is a decision that involves day-to-day activities within a company.
answer
operational
question
A disaster ____ plan is a written plan describing the steps a company would take to restore computer operations in the event of a disaster.
answer
recovery
question
A(n) ____ is a window that provides information, presents available options, or requests a response.
answer
dialog box
question
All of the following use direct access EXCEPT ____.
answer
tape (CDs, DVDs, Hard disks)
question
Instead of using CD-R, many users opt for ____, which is an erasable multisession disc users can write on multiple times.
answer
CD-RW
question
____ is the number of bytes (characters) a storage medium can hold.
answer
capacity
question
Digital forensics is used by ____.
answer
military intelligence, insurance agencies, law enforcement
question
____ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system breaches.
answer
intrusion
question
A cross-platform program is one that runs ____.
answer
the same on multiple operating systems
question
A(n) ____ flash memory card has a storage capacity of 512 MB to 8 GB.
answer
Secure Digital
question
A(n) ____ is a small metal or plastic device that looks like a tiny ink pen but uses pressure instead of ink.
answer
stylus
question
A(n) ____ occurs when the incoming electrical power increases significantly above the normal 120 volts.
answer
overvoltage
question
One type of spyware, called a(n) ____, is hidden on Web pages or in e-mail messages in the form of graphical images.
answer
Web bug
question
Users can purchase a software program that selectively ____ cookies.
answer
blocks
question
A _____ is a series of instructions that tells a computer what to do and how to do it.
answer
program
question
____ is a conversation that takes place over the Internet using a telephone connected to a computer, mobile device, or telephone adapter.
answer
VoIP
question
____, which allows users to choose an encryption scheme that passes between a client and a server, requires that both the client and server have digital certificates.
answer
Secure HTTP
question
Many scanners include ____ software, which can read and convert text documents into electronic files.
answer
OCR
question
With ____, the broadcast signals are digitized when they are sent via over-the-air broadcasts from local television networks, satellite, or cable.
answer
HDTV
question
A(n) ____ is a small, flat, rectangular pointing device that is sensitive to pressure and motion.
answer
touchpad
question
A(n) ____ copies the files that have changed since the last full backup or last incremental backup.
answer
incremental
question
____ allows users to pay bills from their computer, that is, transfer money electronically from their account to a payee's account such as the electric company or telephone company.
answer
online banking
question
A(n) ____ is a high-speed network with the sole purpose of providing storage to other servers to which it is attached.
answer
SAN (storage attached network)
question
With a three-generation backup policy, the grandparent is the ____.
answer
oldest copy of the file
question
Novell's ____ is a server operating system designed for client/server networks.
answer
NetWare
question
____ is any data and instructions entered into the memory of a computer.
answer
input
question
During ____, a systems analyst builds upon the data dictionary developed during the analysis phase.
answer
database design
question
According to netiquette, Internet users should assume ____.
answer
the use of all capital letters is the equivalent of shouting
question
Audio ____ is the process of entering any sound into the computer such as speech, music, and sound effects.
answer
input
question
The components of a domain name are separated by ____.
answer
periods
question
A(n) ____ operating system supports two or more processors running programs at the same time.
answer
multiprocessing
question
High-availability systems often include a feature called ____, which allows components, such as a RAID hard disk or power supplies, to be replaced while the rest of the system continues to perform its tasks.
answer
hot-swapping
question
A ____ is a device that provides a central point for cables in a network.
answer
hub
question
____ is a technology that provides high-speed Internet connection using regular copper telephone lines.
answer
DSL
question
FTP sites can be ____, whereby anyone can transfer some, if not all, available files.
answer
anonymous
question
A group of two or more integrated hard disks is called a(n) ____.
answer
RAID
question
Smart phones and other small computing devices often use a ____ operating system.
answer
single user/single tasking
question
A(n) ____ circuit, which is etched on a computer chip, contains many microscopic pathways capable of carrying electrical current.
answer
integrated
question
A(n) ____ is an identification code that consists of a set of vertical lines and spaces of different widths.
answer
barcode
question
A(n) ____ device is any hardware component that conveys information to one or more people.
answer
output
question
____ means in a location separate from the computer site.
answer
offsite
question
____ is the technology of authenticating a person's identity by verifying a personal characteristic.
answer
biometrics
question
Personal computers, display devices, and printers should comply with guidelines of the ____ program.
answer
energy star
question
For smaller business and home networks, a ____ allows multiple computers to share a single high-speed Internet connection such as through a cable modem or DSL modem.
answer
router
question
Networks, servers, mainframes, and supercomputers allow hundreds to thousands of users to connect at the same time, and thus are ____.
answer
multiuser
question
____ software, such as operating systems and utility programs, consists of the programs that control or maintain the operations of a computer and its devices.
answer
system
question
Middle managers make ____ decisions, which are short-range decisions that apply the specific programs and plans necessary to meet stated objectives.
answer
tactical
question
Common types of flash memory cards include ____.
answer
CompactFlash, Secure Digital and Memory Stick, xD Picture Card
question
A(n) ____ operating system enables two or more users to run programs simultaneously.
answer
multiuser
question
Controlling is an activity performed by managers that involves ____.
answer
measuring performance and if necessary, taking corrective action
question
Executive managers primarily are responsible for ____ decisions, which are decisions that center on a company's overall goals and objectives.
answer
strategic
question
A(n) ____, such as a keyboard or printer, is a device that connects to the system unit and is controlled by the processor in the computer.
answer
peripheral
question
General purpose, or ____ systems cross the boundaries of functional units and are used by one or more functional units in an enterprise.
answer
enterprise-wide
question
Compressed files, sometimes called ____.
answer
zipped files
question
____, such as POS terminals and automated teller machines, perform specific tasks and contain features uniquely designed for use in a particular industry.
answer
special purpose terminals
question
The operating system that a computer uses sometimes is called the ____.
answer
platform
question
____, such as accountants, engineers, and other professionals, include individuals whose jobs center on the collection, processing, and application of information.
answer
knowledge workers
question
The purpose of the system ____ is to assess the feasibility of each alternative solution and then recommend the most feasible solution for a project.
answer
proposal
question
____ is a multitasking operating system developed in the early 1970s by scientists at Bell Laboratories.
answer
UNIX
question
____ servers pack a complete computer server, such as a Web server or network server, on a single card.
answer
blade
question
____ is the most advanced form of digital television.
answer
HDTV
question
A ____ is an instruction, or set of instructions, a user follows to accomplish an activity.
answer
procedure
question
In a disaster recovery plan, the recovery plan specifies ____.
answer
the actions to be taken to restore full information processing operations
question
____ software is privately owned software and limited to a specific vendor or computer model.
answer
proprietary
question
A(n) ____ computer is a computer that continues to operate when one of its components fails, ensuring that no data is lost.
answer
fault-tolerant
question
Users are turning to ____ for crisper, higher-quality output than they can achieve with analog television.
answer
DTV
question
Users may have ____ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image.
answer
CVS (comp vision syndrome)
question
____ radio is a wireless transmission medium that distributes radio signals through the air over long distances.
answer
broadcast
question
A virus ____ is an e-mail message that warns users of a nonexistent virus, worm, or Trojan horse.
answer
hoax
question
____ refers to unique and original works such as ideas, inventions, writings, art, processes, company and product names, and logos.
answer
IP (internet protocol)
question
____ is a special formatting language that programmers use to format documents for display on the Web.
answer
HTML
question
With a ____, users interact with menus and visual images such as icons, buttons, and other objects to issue commands.
answer
graphical user interface (GUI)
question
Commonly used nonimpact printers include all of the following EXCEPT ____.
answer
inkjet printers, photo printers, laser printers, thermal printers, mobile, printers, label and postage printers (EXCEPT line printers and dot matrix printers)
question
____ storage is the physical material on which a computer keeps data, instructions, and information.
answer
secondary
question
If a hard disk is damaged, a computer can be booted from a(n) ____ disk, which is usually a CD that contains a few system files that will start the computer.
answer
recovery
question
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
answer
RSI (repetitive strain injury)
question
The purpose of the ____ phase is to construct, or build, a new or modified system and then deliver it to the users.
answer
implentation
question
Organizations implement ____ to assist in the task of knowledge management.
answer
KMS (knowledge management system)
question
A(n) ____ flash memory card has a storage capacity of 1 GB to 16 GB.
answer
Memory Stick PRO Duo
question
Organizing is an activity performed by managers that includes ____.
answer
identifying and combining resources so that company can reach goals and objectives
question
Uptime is a measure of ____.
answer
availability
question
____ computing combines many servers and/or personal computers on a network to act as one large computer.
answer
grid
question
Although it is an inexpensive way for users to connect to the Internet, ____ is slower-speed technology.
answer
dial up connection
question
A(n) ____ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.
answer
UPS uninterruptible power supply
question
A storage technique that a DVD-ROM can use to achieve a higher storage capacity than a CD-ROM is to ____.
answer
make disc denser by packing pits closer, use two layers of pits, be double sided
question
____ is a technology that involves reading typewritten, computer-printed, or hand-printed characters from ordinary documents and translating the images into a form that the computer can process.
answer
OCR (optical character recognition)
question
____ services include a relatively new set of software technologies that allows businesses to create products and B2B (business-to-business) interactions over the Internet.
answer
web
question
A(n) ____ operating system is a complete operating system that works on a desktop computer, notebook computer, or mobile computing device.
answer
stand alone
question
A(n) ____ system is a set of programs containing instructions that coordinate all the activities among computer hardware resources.
answer
operating
question
A competing operating system to Windows Phone is Palm ____, which runs on Palm-powered PDAs and smart phones.
answer
OS
question
When using spreadsheet software, the rows and columns collectively are called a(n) ____.
answer
worksheet
question
In a disaster recovery plan, the backup plan specifies ____.
answer
how a company uses backup files and equipment to resume information processing
question
A(n) ____ is a defined process that identifies the specific set of steps involved in completing a particular project or business process.
answer
workflow
question
Each tick of the system clock equates to a ____.
answer
clock cycle
question
With Windows, a warm boot can be performed by ____.
answer
clicking a button on the task bar, then a Start menu button, then a Lock menu button
question
A(n) ____ consolidates data usually with totals, tables, or graphs, so managers can review it quickly and easily.
answer
summary report
question
Voice ____ is the process of entering data by speaking into a microphone.
answer
input
question
A file server is a dedicated server that ____.
answer
stores and manages files
question
With a three-generation backup policy, the child is the ____.
answer
most recent copy of the file
question
Comparable to a tape recorder, a tape ____ reads and writes data and information on a tape.
answer
drive
question
The ____ is firmware that contains a computer's startup instructions.
answer
BIOS
question
Many worksheet cells contain a number that can be used in a calculation, called a(n) ____.
answer
value
question
____ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer.
answer
noise
question
The communications device that connects a communications channel to a sending or receiving device such as a computer is a(n) ____.
answer
modem
question
A(n) ____ certificate is a notice that guarantees a user or Web site is legitimate.
answer
digital
question
The ____ is the component of the processor that performs arithmetic, comparison, and other operations.
answer
ALU (arithmetic logic unit)
question
A(n) ____ copies only the files that have changed since the full backup.
answer
differential backup
question
A(n) ____, sometimes called an archival backup, copies all of the files in a computer.
answer
full backup
question
The overall technology strategy often is referred to as the information ____ of a company.
answer
architecture
question
The data ____ stores a data item's name, description, and other details about each data item.
answer
dictionary
question
A(n) ____ is made of aluminum, glass, or ceramic and is coated with an alloy material that allows items to be recorded magnetically on its surface.
answer
platter
question
____ uses a condensed form of English to convey program logic.
answer
pseudocode
question
In sequence, the program development life cycle consists of six steps: ____.
answer
analyze requirements, design solution, validate design, implement design, test solution, and document solution
question
The ____ phase consists of two major activities: (1) if necessary, acquire hardware and software and (2) develop all of the details of the new or modified information system.
answer
design
question
____ is a measure of how suitable the development of a system will be to a company.
answer
feasibility
question
A(n) ____ card is a removable device that allows users to transfer data and information conveniently from mobile devices to their desktop computers.
answer
memory
question
A ____ is a numeric password either assigned by a company or selected by a user.
answer
pin
question
Most ____ devices include a small optical scanner for reading characters and sophisticated software to analyze what is read.
answer
OCR
question
A(n) ____ modem is a digital modem that sends and receives digital data over the cable television (CATV) network.
answer
broadband
question
A NAS (network attached storage) server often is called a storage ____ because it is a piece of equipment with only one function — to provide additional storage.
answer
appliance
question
The power ____ is the component of the system unit that converts the wall outlet AC power into the DC power a computer requires.
answer
supply
question
Naval officer ____, a pioneer in computer programming, was a prime developer of COBOL.
answer
Grace Hopper
question
____ is the practice of sharing or pooling computing resources, such as servers and storage devices.
answer
virtualization
question
With ____ multitasking, the operating system interrupts a program that is executing and passes control to another program waiting to be executed.
answer
preemptive
question
The ____ unit is the component of the processor that directs and coordinates most of the operations in the computer.
answer
control
question
The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.
answer
electronic communications privacy act
question
A pop-up ____ is a filtering program that stops pop-up ads from displaying on Web pages.
answer
blocker
question
A(n) ____ has the same intent as a cracker, but does not have the technical skills and knowledge.
answer
script kiddie
question
The ____ unit is a case that contains electronic components of the computer used to process data.
answer
system
question
A particularly devastating type of DoS attack is the ____ DoS attack, in which multiple unsuspecting computers are used to attack multiple computer networks.
answer
distributed
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New