MISY160 Final Exam Practice – Flashcards
Unlock all answers in this set
Unlock answersquestion
            MAN
answer
        A large network designed to provide access to a specific geographic area, such as a large city is a _____
question
            Network Operating System (NOS)
answer
        Client/server networks are controlled by a central server that runs a specialized piece of software called ____
question
            Central
answer
        A client/server network is an example of _____ administration
question
            Enable nodes in a network to communicate with each other
answer
        Network adapters _________
question
            Unix
answer
        All of the following operating systems support P2P networking, EXCEPT ______
question
            HAN
answer
        A ______ is a network located in your home that connects to all your digital devices
question
            Twisted-pair cable
answer
        Normal telephone cable is a type of ______
question
            Piggybacking
answer
        Using a network without the network owner's permission is known as ______
question
            Purchasing initial equipment for the network
answer
        All of the following involve tasks for network administration, EXCEPT ______
question
            Packets
answer
        Data are sent through a network on bundles called _____
question
            A time bomb
answer
        Which type of virus was the famous Michelangelo virus?
question
            A DDoS attack
answer
        ______ floods a computer with requests until it shuts down and refuses to answer any requests for information
question
            People pretending to represent official organizations
answer
        FBI-related scams involve _____
question
            Placing a found virus in a secure area on the hard drive
answer
        With regard to computer protection, quarantining is defined as ________
question
            Cybercrime
answer
        Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
question
            Theft of a cell phone
answer
        All of the following are considered cybercrimes, EXCEPT _____
question
            Grayware
answer
        Adware and spyware are referred to collectively as ______
question
            Time bomb
answer
        A _____ is a virus that is triggered on a certain date
question
            Pharming
answer
        When malicious code is planted on your computer and alters your browser's ability to find Web addresses it is known as _____
question
            Worm
answer
        A _____ takes advantage of file transport methods to spread their own
question
            JavaScript
answer
        _____ is a scripting language that's often used to add interactivity to Web pages
question
            Visual
answer
        Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a process called _____ programming
question
            Shipped with OS X
answer
        Where will you find Xcode?
question
            Design
answer
        During which phase of the system development life cycle are flowcharts and data-flow diagrams developed?
question
            Beta
answer
        Before its final commercial release, software is often provided free or at a reduced costs in a _____ version to certain test sites or to interested users
question
            Compilation
answer
        The process by which program code is converted into machine language is called ______
question
            Fourth
answer
        SQL is an example of a ____-generation language
question
            Describing the problem
answer
        Which of the following is the first stage of the program development life cycle (PDLC)?
question
            Tool that helps programmers write and test their programs
answer
        An integrated development environment (IDE) is a _____
question
            Visual Basic
answer
        _______ is a powerful programming language used to build a wide range of windows applications
question
            Normalization
answer
        ______ is the process of reducing data redundancy by recording data only once
question
            Unstructured
answer
        Nontraditional data such as audio clips, video clips, pictures and very large documents are called _____ data
question
            Numeric
answer
        In a database, _____ fields store numbers used to perform calculations
question
            Exporting
answer
        ______ involves putting data into an electronic file in a format that another application can understand
question
            Administrator
answer
        An individual trained in the design and building of databases is called a database ______
question
            Data mine
answer
        Which of the following is NOT a data source for a data warehouse?
question
            Primary key
answer
        Each record must have a unique field called a _____ field
question
            Access
answer
        Microsoft ____ is a database management system
question
            Real-time
answer
        In a transaction-processing system (TPS), if the TPS database is queried and updated while the transaction is taking place, this is called _____ processing
question
            Consistency
answer
        A _____ check compares the values of data in two or more fields to see whether those values are reasonable
question
            EMI
answer
        Which of the following causes interference when a cable is exposed to strong electromagnetic fields?
question
            Ring
answer
        If fair allocation of network access is a major requirement of the network, choose a _____ topology
question
            Network
answer
        A _____ allows multiple users to connect to the Internet through one connection
question
            Protocol
answer
        A _____ is a set of rules for how information and communication are exchanged
question
            Client/server
answer
        ______ networks contain servers as well as computers that individual users access and use
question
            Duplex
answer
        For business networks, which of the following is NOT a main cable type?
question
            10
answer
        P2P networks become difficult to manage when they are expanded beyond _____ users
question
            HyperText Transfer Protocol (HTTP)
answer
        Which is NOT a networking protocol?
question
            Jam
answer
        In a network that uses the star topology, the signal that is sent to indicate a signal collision is called a _____ signal
question
            Electromagnetic
answer
        _______ interference is a type of signal interference in wired transmission media that can be caused by fluorescent lights or machinery with motors or transformers
question
            Control (Ctrl) key
answer
        The _____ is used in combination with other keys to perform shortcuts and special tasks
question
            DVI
answer
        The computer port that is used to connect televisions and DVD players is the ____
question
            Network Interface Card (NIC)
answer
        A _____ enables your computer to connect to other computers or to the Internet
question
            Flexible
answer
        _____ keyboards can be rolled up and put in your backpack
question
            Webcam
answer
        A _____ sits on your computer monitor or is built into a laptop and is used primarily for transmitting live video
question
            RAM
answer
        All of the following are examples of permanent storage, EXCEPT ______
question
            Port
answer
        A ______ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system
question
            Supercomputer
answer
        A _______ is a specially designed computer that can perform complex calculations extremely fast
question
            URL
answer
        The unique address for a particular Web site is the _____
question
            Dotted period
answer
        The unique identification number assigned to your computer when you connect to the Internet is known by all of the following, EXCEPT ______
question
            Google Goggles
answer
        A visual search engine that uses pictures from our smartphone to search the Web for more information is know as _____
question
            Buddy list
answer
        You can keep track of IM contacts by using a _____
question
            Breadcrumb trail
answer
        A list of pages within a Web site that you have visited an that usually appears at the top of a page is referred to as a ________
question
            Firefox
answer
        The name of the free Internet browser from Mozilla is ____
question
            C2B
answer
        All of the following are a type of e-commerce business, EXCEPT ______
question
            Really Simply Syndication
answer
        Podcasts deliver their content using _____
question
            Client
answer
        A computer connected to the Internet that asks for data is a _____
question
            Microsoft OneNote
answer
        All of the following are examples of software suites, EXCEPT _____
question
            Word processing software
answer
        The appropriate software to use for creating research papers is ______
question
            Image-editing
answer
        Adobe Photoshop and Corel PaintShop Photo Pro are examples of ______ software
question
            is at column C, row 5 of the worksheet
answer
        The cell address C5 indicates that the cell _____
question
            Custom
answer
        A _____ software installation enables you to decide which features you want to install on the hard drive
question
            Productivity software
answer
        All of the following are types of multimedia and entertainment software, EXCEPT _____
question
            EverQuest
answer
        All of the following are examples of educational and reference software EXCEPT _____
question
            Wizard
answer
        A _____ is a Microsoft Office feature that walks you through steps to complete a complicated task
question
            Tables, records, fields
answer
        In databases, information is organized in _____
question
            Operating system
answer
        The ______ is the group of programs that controls how your computer functions
question
            *
answer
        All of the following can be used in a Windows file name, EXCEPT _____
question
            Google
answer
        More than 50% of smartphones use an operating system developed by _____
question
            Device driver
answer
        Each device attached to your computer comes with a special program called a _____ that facilitates communication between the device and the OS
question
            MS-DOS
answer
        Which of the following was the first widely used operating system installed in personal computers?
question
            They require significant user interaction
answer
        All of the following are true about real-time operating systems (RTOS), EXCEPT ______
question
            User interface
answer
        The _____ of the operating system enables the user to communicate with the computer system
question
            One Laptop per Child
answer
        XO is the name of the computer provided by the _____ initiative
question
            ExpressCard
answer
        Laptops are often equipped with an ______ slot that allows you to read flash memory cards such as CompactFlash, memory sticks, and secure digital cards
question
            Volatile
answer
        RAM is an example of _____
question
            A desktop computer is more expensive
answer
        Which of the following is NOT a main characteristic associated with desktop computers as compared to notebooks?
question
            An accumulation of temporary Internet files has no effect on your computer's overall performance
answer
        Which statement pertaining to system reliability is FALSE?
question
            Solid-state disc
answer
        All of the following are examples of optical drives, EXCEPT _____
question
            Video card
answer
        A _____ is an expansion card that's installed inside that system unit to translate data into images
question
            ShredIt X
answer
        Which program provides a seven-layer overwrite for the Mac operating system?
question
            Run key utilities only when you can observe the process
answer
        All of the following are procedures you can follow to ensure your system performs reliably, EXCEPT _____
question
            Client/server
answer
        The majority of Internet communications follow the ____ model of network communications
question
            Commerce
answer
        computers that typically use special security protocols to protect personal, sensitive buyer information are known as ____ servers
question
            Applet
answer
        An _____ is a small program that resides on a server designed to be downloaded and urn on a client computer
question
            Proprietary
answer
        Open system Internet protocols replaced _____ system Internet protocols
question
            Dynamic addressing is normally handled by DHCP
answer
        Which of the following statements concerning IP addresses is TRUE?
question
            SMTP
answer
        Which protocol is used to transmit e-mail over the Internet?
question
            The size (in bytes) of the packet
answer
        Which of the following information is NOT contained in a packet?
question
            256
answer
        Strong encryption now calls for ____-bit keys
question
            Analyzing the data or information
answer
        Which of the following is NOT one of the four major data processing functions of a computer?
question
            Motherboard
answer
        The ____ contains the central electronic components of the computer
question
            Hard drive
answer
        All of the following are names for a flash drive, EXCEPT ____
question
            Screen resolution
answer
        The number of pixels displayed on the screen is known as _____
question
            Hardware
answer
        Any part of the computer that you can touch is called _____
question
            Input
answer
        A keyboard and mouse are examples of ____ devices
question
            Petabyte
answer
        Which of the following is the largest unit of measure for the size of a computer file?
question
            Robert Kahn
answer
        The "fathers" of the Internet are Vinton Cerf and _____
question
            A large network of networks
answer
        The Internet is ____
question
            Web browser
answer
        Software that enables you to display and interact with text and other media on the Web is a _____
question
            Webcasts
answer
        _____ uses continuous audio and video feeds
question
            Picaso
answer
        Google _____ is a popular application that lets you edit images and helps to organize and share your digital images
question
            Encoding CDs to MP3 format
answer
        CD ripping refers to _____
question
            Formulas
answer
        In a spreadsheet, equations you build yourself using values and cell references are called ____
question
            Chromebooks
answer
        What is Google's first attempt at a netbook where all applications and files are stored on the Web?
question
            USB
answer
        All of the following are terms related to part of the boot process, EXCEPT _____
question
            Virtual memory
answer
        The process of optimizing RAM storage by borrowing hard drive space is called _____
question
            Linux
answer
        Which of the following is an open source operating system for personal computers?
question
            SuperFetch
answer
        Windows uses a memory-management technique known as ____ to monitor which applications you use the most and preloads them into your system memory
question
            Overclocking
answer
        Running the CPU at faster speed than the manufacturer recommends is called _____
question
            Clear out unnecessary files
answer
        Running the Disk Cleanup utility is a quick way to _____
question
            Mechanical hard drive
answer
        The ____ has the largest capacity of any storage device
question
            Moore's Law
answer
        The rule of thumb that predicts that CPU capacity will double every two years is called _____
question
            Hyperthreading
answer
        _____ provides high-speed information processing by enabling a new set of instructions to start before the previous set is finished
question
            TCP/IP
answer
        _____ is the main suite of protocols used on the Internet
question
            Static address
answer
        An IP address that does not change and is usually assigned manually by a network administrator is called a ____
question
            A computer protocol
answer
        A set of rules for exchanging electronic information is called ____
question
            IP
answer
        An _____ address is a unique number that identifies a computer, server, or device connected to the Internet
question
            Internet Society
answer
        The _____ provides leadership for the orderly growth and development of the Internet
question
            IPv6
answer
        ______ is an IP addressing scheme that uses 128-bit addressing