MISY160 Final Exam Practice – Flashcards
130 test answers
Unlock all answers in this set
Unlock answers 130question
Unix
answer
All of the following operating systems support P2P networking, EXCEPT ______
Unlock the answer
question
HAN
answer
A ______ is a network located in your home that connects to all your digital devices
Unlock the answer
question
Twisted-pair cable
answer
Normal telephone cable is a type of ______
Unlock the answer
question
Piggybacking
answer
Using a network without the network owner's permission is known as ______
Unlock the answer
question
Purchasing initial equipment for the network
answer
All of the following involve tasks for network administration, EXCEPT ______
Unlock the answer
question
Packets
answer
Data are sent through a network on bundles called _____
Unlock the answer
question
A time bomb
answer
Which type of virus was the famous Michelangelo virus?
Unlock the answer
question
A DDoS attack
answer
______ floods a computer with requests until it shuts down and refuses to answer any requests for information
Unlock the answer
question
People pretending to represent official organizations
answer
FBI-related scams involve _____
Unlock the answer
question
Placing a found virus in a secure area on the hard drive
answer
With regard to computer protection, quarantining is defined as ________
Unlock the answer
question
Cybercrime
answer
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
Unlock the answer
question
Theft of a cell phone
answer
All of the following are considered cybercrimes, EXCEPT _____
Unlock the answer
question
Grayware
answer
Adware and spyware are referred to collectively as ______
Unlock the answer
question
Time bomb
answer
A _____ is a virus that is triggered on a certain date
Unlock the answer
question
Pharming
answer
When malicious code is planted on your computer and alters your browser's ability to find Web addresses it is known as _____
Unlock the answer
question
Worm
answer
A _____ takes advantage of file transport methods to spread their own
Unlock the answer
question
JavaScript
answer
_____ is a scripting language that's often used to add interactivity to Web pages
Unlock the answer
question
Visual
answer
Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a process called _____ programming
Unlock the answer
question
Shipped with OS X
answer
Where will you find Xcode?
Unlock the answer
question
Design
answer
During which phase of the system development life cycle are flowcharts and data-flow diagrams developed?
Unlock the answer
question
Beta
answer
Before its final commercial release, software is often provided free or at a reduced costs in a _____ version to certain test sites or to interested users
Unlock the answer
question
Compilation
answer
The process by which program code is converted into machine language is called ______
Unlock the answer
question
Fourth
answer
SQL is an example of a ____-generation language
Unlock the answer
question
Describing the problem
answer
Which of the following is the first stage of the program development life cycle (PDLC)?
Unlock the answer
question
Tool that helps programmers write and test their programs
answer
An integrated development environment (IDE) is a _____
Unlock the answer
question
Visual Basic
answer
_______ is a powerful programming language used to build a wide range of windows applications
Unlock the answer
question
Normalization
answer
______ is the process of reducing data redundancy by recording data only once
Unlock the answer
question
Unstructured
answer
Nontraditional data such as audio clips, video clips, pictures and very large documents are called _____ data
Unlock the answer
question
Numeric
answer
In a database, _____ fields store numbers used to perform calculations
Unlock the answer
question
Exporting
answer
______ involves putting data into an electronic file in a format that another application can understand
Unlock the answer
question
Administrator
answer
An individual trained in the design and building of databases is called a database ______
Unlock the answer
question
Data mine
answer
Which of the following is NOT a data source for a data warehouse?
Unlock the answer
question
Primary key
answer
Each record must have a unique field called a _____ field
Unlock the answer
question
Access
answer
Microsoft ____ is a database management system
Unlock the answer
question
Real-time
answer
In a transaction-processing system (TPS), if the TPS database is queried and updated while the transaction is taking place, this is called _____ processing
Unlock the answer
question
Consistency
answer
A _____ check compares the values of data in two or more fields to see whether those values are reasonable
Unlock the answer
question
EMI
answer
Which of the following causes interference when a cable is exposed to strong electromagnetic fields?
Unlock the answer
question
Ring
answer
If fair allocation of network access is a major requirement of the network, choose a _____ topology
Unlock the answer
question
Network
answer
A _____ allows multiple users to connect to the Internet through one connection
Unlock the answer
question
Protocol
answer
A _____ is a set of rules for how information and communication are exchanged
Unlock the answer
question
Client/server
answer
______ networks contain servers as well as computers that individual users access and use
Unlock the answer
question
Duplex
answer
For business networks, which of the following is NOT a main cable type?
Unlock the answer
question
10
answer
P2P networks become difficult to manage when they are expanded beyond _____ users
Unlock the answer
question
HyperText Transfer Protocol (HTTP)
answer
Which is NOT a networking protocol?
Unlock the answer
question
Jam
answer
In a network that uses the star topology, the signal that is sent to indicate a signal collision is called a _____ signal
Unlock the answer
question
Electromagnetic
answer
_______ interference is a type of signal interference in wired transmission media that can be caused by fluorescent lights or machinery with motors or transformers
Unlock the answer
question
Control (Ctrl) key
answer
The _____ is used in combination with other keys to perform shortcuts and special tasks
Unlock the answer
question
DVI
answer
The computer port that is used to connect televisions and DVD players is the ____
Unlock the answer
question
Network Interface Card (NIC)
answer
A _____ enables your computer to connect to other computers or to the Internet
Unlock the answer
question
Flexible
answer
_____ keyboards can be rolled up and put in your backpack
Unlock the answer
question
Webcam
answer
A _____ sits on your computer monitor or is built into a laptop and is used primarily for transmitting live video
Unlock the answer
question
RAM
answer
All of the following are examples of permanent storage, EXCEPT ______
Unlock the answer
question
Port
answer
A ______ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system
Unlock the answer
question
Supercomputer
answer
A _______ is a specially designed computer that can perform complex calculations extremely fast
Unlock the answer
question
URL
answer
The unique address for a particular Web site is the _____
Unlock the answer
question
Dotted period
answer
The unique identification number assigned to your computer when you connect to the Internet is known by all of the following, EXCEPT ______
Unlock the answer
question
Google Goggles
answer
A visual search engine that uses pictures from our smartphone to search the Web for more information is know as _____
Unlock the answer
question
Buddy list
answer
You can keep track of IM contacts by using a _____
Unlock the answer
question
Breadcrumb trail
answer
A list of pages within a Web site that you have visited an that usually appears at the top of a page is referred to as a ________
Unlock the answer
question
Firefox
answer
The name of the free Internet browser from Mozilla is ____
Unlock the answer
question
C2B
answer
All of the following are a type of e-commerce business, EXCEPT ______
Unlock the answer
question
Really Simply Syndication
answer
Podcasts deliver their content using _____
Unlock the answer
question
Client
answer
A computer connected to the Internet that asks for data is a _____
Unlock the answer
question
Microsoft OneNote
answer
All of the following are examples of software suites, EXCEPT _____
Unlock the answer
question
Word processing software
answer
The appropriate software to use for creating research papers is ______
Unlock the answer
question
Image-editing
answer
Adobe Photoshop and Corel PaintShop Photo Pro are examples of ______ software
Unlock the answer
question
is at column C, row 5 of the worksheet
answer
The cell address C5 indicates that the cell _____
Unlock the answer
question
Custom
answer
A _____ software installation enables you to decide which features you want to install on the hard drive
Unlock the answer
question
Productivity software
answer
All of the following are types of multimedia and entertainment software, EXCEPT _____
Unlock the answer
question
EverQuest
answer
All of the following are examples of educational and reference software EXCEPT _____
Unlock the answer
question
Wizard
answer
A _____ is a Microsoft Office feature that walks you through steps to complete a complicated task
Unlock the answer
question
Tables, records, fields
answer
In databases, information is organized in _____
Unlock the answer
question
Operating system
answer
The ______ is the group of programs that controls how your computer functions
Unlock the answer
question
*
answer
All of the following can be used in a Windows file name, EXCEPT _____
Unlock the answer
question
Google
answer
More than 50% of smartphones use an operating system developed by _____
Unlock the answer
question
Device driver
answer
Each device attached to your computer comes with a special program called a _____ that facilitates communication between the device and the OS
Unlock the answer
question
MS-DOS
answer
Which of the following was the first widely used operating system installed in personal computers?
Unlock the answer
question
They require significant user interaction
answer
All of the following are true about real-time operating systems (RTOS), EXCEPT ______
Unlock the answer
question
User interface
answer
The _____ of the operating system enables the user to communicate with the computer system
Unlock the answer
question
One Laptop per Child
answer
XO is the name of the computer provided by the _____ initiative
Unlock the answer
question
ExpressCard
answer
Laptops are often equipped with an ______ slot that allows you to read flash memory cards such as CompactFlash, memory sticks, and secure digital cards
Unlock the answer
question
Volatile
answer
RAM is an example of _____
Unlock the answer
question
A desktop computer is more expensive
answer
Which of the following is NOT a main characteristic associated with desktop computers as compared to notebooks?
Unlock the answer
question
An accumulation of temporary Internet files has no effect on your computer's overall performance
answer
Which statement pertaining to system reliability is FALSE?
Unlock the answer
question
Solid-state disc
answer
All of the following are examples of optical drives, EXCEPT _____
Unlock the answer
question
Video card
answer
A _____ is an expansion card that's installed inside that system unit to translate data into images
Unlock the answer
question
ShredIt X
answer
Which program provides a seven-layer overwrite for the Mac operating system?
Unlock the answer
question
Run key utilities only when you can observe the process
answer
All of the following are procedures you can follow to ensure your system performs reliably, EXCEPT _____
Unlock the answer
question
Client/server
answer
The majority of Internet communications follow the ____ model of network communications
Unlock the answer
question
Commerce
answer
computers that typically use special security protocols to protect personal, sensitive buyer information are known as ____ servers
Unlock the answer
question
Applet
answer
An _____ is a small program that resides on a server designed to be downloaded and urn on a client computer
Unlock the answer
question
Proprietary
answer
Open system Internet protocols replaced _____ system Internet protocols
Unlock the answer
question
Dynamic addressing is normally handled by DHCP
answer
Which of the following statements concerning IP addresses is TRUE?
Unlock the answer
question
SMTP
answer
Which protocol is used to transmit e-mail over the Internet?
Unlock the answer
question
The size (in bytes) of the packet
answer
Which of the following information is NOT contained in a packet?
Unlock the answer
question
256
answer
Strong encryption now calls for ____-bit keys
Unlock the answer
question
Analyzing the data or information
answer
Which of the following is NOT one of the four major data processing functions of a computer?
Unlock the answer
question
Motherboard
answer
The ____ contains the central electronic components of the computer
Unlock the answer
question
Hard drive
answer
All of the following are names for a flash drive, EXCEPT ____
Unlock the answer
question
Screen resolution
answer
The number of pixels displayed on the screen is known as _____
Unlock the answer
question
Hardware
answer
Any part of the computer that you can touch is called _____
Unlock the answer
question
Input
answer
A keyboard and mouse are examples of ____ devices
Unlock the answer
question
Petabyte
answer
Which of the following is the largest unit of measure for the size of a computer file?
Unlock the answer
question
Robert Kahn
answer
The "fathers" of the Internet are Vinton Cerf and _____
Unlock the answer
question
A large network of networks
answer
The Internet is ____
Unlock the answer
question
Web browser
answer
Software that enables you to display and interact with text and other media on the Web is a _____
Unlock the answer
question
Webcasts
answer
_____ uses continuous audio and video feeds
Unlock the answer
question
Picaso
answer
Google _____ is a popular application that lets you edit images and helps to organize and share your digital images
Unlock the answer
question
Encoding CDs to MP3 format
answer
CD ripping refers to _____
Unlock the answer
question
Formulas
answer
In a spreadsheet, equations you build yourself using values and cell references are called ____
Unlock the answer
question
Chromebooks
answer
What is Google's first attempt at a netbook where all applications and files are stored on the Web?
Unlock the answer
question
USB
answer
All of the following are terms related to part of the boot process, EXCEPT _____
Unlock the answer
question
Virtual memory
answer
The process of optimizing RAM storage by borrowing hard drive space is called _____
Unlock the answer
question
Linux
answer
Which of the following is an open source operating system for personal computers?
Unlock the answer
question
SuperFetch
answer
Windows uses a memory-management technique known as ____ to monitor which applications you use the most and preloads them into your system memory
Unlock the answer
question
Overclocking
answer
Running the CPU at faster speed than the manufacturer recommends is called _____
Unlock the answer
question
Clear out unnecessary files
answer
Running the Disk Cleanup utility is a quick way to _____
Unlock the answer
question
Mechanical hard drive
answer
The ____ has the largest capacity of any storage device
Unlock the answer
question
Moore's Law
answer
The rule of thumb that predicts that CPU capacity will double every two years is called _____
Unlock the answer
question
Hyperthreading
answer
_____ provides high-speed information processing by enabling a new set of instructions to start before the previous set is finished
Unlock the answer
question
TCP/IP
answer
_____ is the main suite of protocols used on the Internet
Unlock the answer
question
Static address
answer
An IP address that does not change and is usually assigned manually by a network administrator is called a ____
Unlock the answer
question
A computer protocol
answer
A set of rules for exchanging electronic information is called ____
Unlock the answer
question
IP
answer
An _____ address is a unique number that identifies a computer, server, or device connected to the Internet
Unlock the answer
question
Internet Society
answer
The _____ provides leadership for the orderly growth and development of the Internet
Unlock the answer
question
IPv6
answer
______ is an IP addressing scheme that uses 128-bit addressing
Unlock the answer