Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
99 Cards in this Set
- Front
- Back
Some computer and chip manufacturers use the term _____ to refer to the personal computer processor chip that interprets and carries out the basic instructions that operate the computer.
|
microprocessor
|
|
Input devices vary depending on the application and personal requirements, but all of the following are widely used input devices except the _____.
|
monitor
|
|
A hard disk, also called a fixed disk, contains one or more inflexible circular platters and provides _____.
|
much greater storage capacity than a floppy disk or Zip disk
|
|
Most monitors support a variety of screen resolutions. Setting a monitor to display a higher resolution uses _____.
|
a greater number of pixels, and thus provides a smoother image
|
|
Two examples of _____ are cable television lines, which use digital signals, and telephone lines, which sometimes use analog signals.
|
communications channels
|
|
A(n) _____ is a type of communications device that connects a communications channel, such as a cable television line or a telephone line, to a sending or receiving device such as a computer.
|
modem
|
|
Fiber-optic cables, which consist of thin strands of glass or plastic that use light to transmit signals, have all of the following advantages over cables that use wire except _____.
|
lower costs and easier installation and modification
|
|
In a communications system, data and information travel over a communications channel. For best performance, a communications channel's _____.
|
bandwidth should be high and latency low
|
|
Although human speech uses continuous signals that vary in strength and quality, most computers are _____ and recognize only two discrete states, on and off.
|
digital
|
|
A bit (binary digit) is the smallest unit of data a computer can process. When 8 bits are grouped together as a unit, they form a _____, which can represent 256 individual characters.
|
byte
|
|
_____ is a coding scheme implemented in several operating systems and is capable of representing almost all of the world's current written languages, as well as classic and historical languages.
|
Unicode
|
|
Graphics and audio files exist in a variety of formats. The _____ format compresses audio files to reduce their file sizes.
|
MP3
|
|
A _____ is a network that covers a large geographical area, such as a country or the world, using a communications channel that combines many types of media.
|
wide area network (WAN)
|
|
The design of computers, devices, and media in a network, sometimes called the _____, can be categorized as either client/server or peer-to-peer.
|
network architecture
|
|
On a bus network, a single central cable connects all computers and devices. The risk to a bus network is that _____.
|
the bus itself might become inoperable
|
|
On a star network, all computers and devices (nodes) attach to a central device that provides a common connection point, called the _____, thus forming a star.
|
hub
|
|
On a network, the major difference between the server and client computers is that the server ordinarily has _____.
|
more power, more storage space, and is more reliable
|
|
In a client/server network, a network server is a dedicated server that _____.
|
manages network traffic (activity)
|
|
In addition to making traditional telephone calls, a Smart Phone allows the user to do all of the following except __________.
|
process more than 135 trillion instructions a second
|
|
On a peer-to-peer network, which is ideal for very small businesses and home users, each computer _____.
|
a. has equal responsibilities and capabilities
b. stores files on its own storage devices c. contains both the network operating system and application software d. can access hardware, data, or information on other computers e. All of the above |
|
The operating system on a computer sometimes is called the platform. A cross-platform application program is one that _____.
|
runs the same on multiple operating systems
|
|
Some stand-alone operating systems are called _____ because they also work in conjunction with a network operating system.
|
client operating systems
|
|
Examples of network operating systems, which are designed to support a network, include all of the following except _____.
|
DOS
|
|
The _____ step of the programming development cycle consists of three major tasks: (1) review the requirements, (2) meet with the systems analysts and users, and (3) identify input, output, processing, and data components.
|
analysis
|
|
Structured design breaks down a program's original set of requirements into smaller, more manageable sections. In structured design, a section of a program that performs a single function is a _____.
|
module
|
|
_____, which is a design tool that programmers use to help document a solution algorithm, graphically shows a program's logic.
|
A flowchart
|
|
_____ language instructions use a series of binary digits (1s and 0s) or a combination of numbers and letters that represent binary digits.
|
Machine
|
|
Programmers typically use either a compiler or interpreter to translate a program into machine language instructions that a computer can execute. An advantage of an interpreter is that _____.
|
when it finds errors, it displays feedback immediately
|
|
_____ are complete object-oriented programming (OOP) languages that programmers can use to implement an object-oriented design.
|
C++ and Java
|
|
To configure devices and troubleshoot network connections, network administrators and other advanced users work with a _____, in which they type commands or press special keys on the keyboard (such as function keys or key combinations) to enter data and instructions.
|
command-line interface
|
|
Software today often has a _____, in which users interact with menus and visual images, such as icons, buttons, and other objects to issue commands.
|
graphical user interface (GUI)
|
|
In a graphical user interface (GUI), a(n) _____ is a small image displayed on the computer screen that represents a program, an instruction, or some other object.
|
icon
|
|
Sometimes a company cannot find software that meets its unique requirements. In this case, the company may develop _____ to perform functions specific to its business or industry.
|
custom software
|
|
_____ is copyrighted software that is distributed free for a trial period, after which a payment should be sent to the person or company who developed the program.
|
Shareware
|
|
__________ are the three basic categories of operating systems that exist today.
|
Stand-alone, network, and embedded
|
|
Data integrity identifies the quality of data. _____ is a computer phrase that means users cannot create correct information from data that is incorrect.
|
Garbage in, garbage out (GIGO)
|
|
A database uses a variety of characteristics to define each field. An important consideration is the data type, which _____.
|
specifies the kind of data a field can contain and how the data is used
|
|
If the lowest monthly fee at a fitness center is $20.25 and the highest is $55.50, a(n) _____ on the data file's Monthly Fee field ensures it is a value between $20.25 and $55.50.
|
range check
|
|
Most companies use either a file processing system or a database management system. When compared with a file processing system, a database offers all of the following except _____.
|
less data vulnerability
|
|
More complex data management systems maintain a log, which is a listing of activities that change the database. In the log, a DBMS might place _____.
|
a. copy of a record prior to a change
b. the actual change to a record c. a copy of a record after a change d. who made a change, when it was made, and from which computer it was made e. All of the above |
|
An object-oriented database (OODB) stores data in objects, which contain data as well as the actions that read or process the data. Compared with relational databases, object-oriented databases _____.
|
a. can store more types of data
b. access data faster c. allow programmers to reuse objects d. store data more efficiently e. All of the above |
|
An example of an application appropriate for an object-oriented database is a hypertext database, which _____.
|
contains text links to other types of documents
|
|
Document _____ is the process of converting paper documents into electronic form and storing the converted document graphically in a database on a computer.
|
imaging
|
|
Document imaging reduces the costs associated with storing paper-based documents. Other advantages of document imaging include all of the following except _____.
|
file sizes are small when compared to word processing documents
|
|
A systems analyst is responsible for designing and developing an information system. During the system development cycle, the systems analyst is the liaison between the _____.
|
users and the IT professionals
|
|
Most project-planning software can produce a Gantt chart, developed by Henry Gantt, which is a popular _____.
|
bar chart that uses horizontal bars to show project phases or activities
|
|
Systems analysts frequently reevaluate feasibility during the system development cycle. _____ measures whether the lifetime benefits of a proposed system will be greater than its lifetime costs.
|
Economic feasibility
|
|
Change to a new information system can take place using one or more conversion strategies. With _____, a user stops using the old system and begins using the new system on a certain date.
|
direct conversion
|
|
A script kiddie is __________.
|
a person with relatively little technical skill with and knowledge of computers who accesses a computer illegally
|
|
Transaction processing systems can use either batch processing or real-time (online transaction) processing. In class registration at a local college, batch process would be best used for _____.
|
printing and mailing all student invoices
|
|
Management information systems, which generate accurate, organized, and timely information for managers, evolved from _____.
|
transaction processing systems
|
|
A management information system (MIS) can create several types of reports. A(n) _____ identifies data outside of a normal condition.
|
exception report
|
|
_____ is a measure of how well a computer system, software applications, or information system can grow to meet increasing performance demands.
|
Scalability
|
|
A _____ is a security system consisting of hardware and/or software that prevents unauthorized access to data, information, and storage media on a network.
|
firewall
|
|
A _____ is a security system consisting of hardware and/or software that prevents unauthorized access to data, information, and storage media on a network.
|
partition
|
|
Businesses and home computer users can perform several types of backup. A(n) _____, sometimes called an archival backup, copies all of the files in a computer.
|
full backup
|
|
A disaster recovery plan describes what will be done to restore computer operations in the event of a disaster. In a disaster recovery plan, the emergency plan specifies _____.
|
the steps to be taken immediately after a disaster strikes
|
|
Job titles for careers related to _____ include project developer, programmer, software engineer, and computer scientist.
|
the computer software industry
|
|
Job titles in the system development and programming area of an information technology (IT) department include all of the following except _____.
|
help desk specialist
|
|
_____, which is a main area in an information technology (IT) department, evaluates and integrates new technologies, administers an organization's data resources, and supports the centralized computer operating system or servers.
|
Operations
|
|
Besides being trusted with the physical security of a company's property and people, the _____ is trusted with securing computing resources.
|
chief security officer (CSO)
|
|
Developers follow established guidelines during the entire system development process. System development should follow all of these general guidelines except _____.
|
have different activities
|
|
Uptime is a measure of _____; critical business systems demand uptime from 99 to 99.99 percent.
|
availability
|
|
To assist with decision making, and information system should produce information that is accurate, verifiable, timely, organized, accessible, useful, and cost-effective. Timely information _____.
|
has an age suited to its use
|
|
_____ allows an engineer to modify a design more easily than before, as well as dynamically change the size of some or the entire product and view the design from different angles.
|
CAD
|
|
Formal manufacturing methods help guide enterprises in their manufacturing process. MRP _____.
|
focuses on issues related to inventory of parts and forecasting future demand
|
|
Because it enables employees to perform tasks using computers and other electronic devices instead of manually, some people describe a(n) _____ as office automation.
|
OIS
|
|
A decision support system (DSS) helps users analyze data and make decisions. Internal sources of data might include _____.
|
sales orders
|
|
A special type of DSS, called a(n) _____, supports the strategic information needs of the highest management positions in a company.
|
executive information system (EIS)
|
|
A(n) _____ is an information system that captures and stores the knowledge of human specialists and then imitates human reasoning and decision making.
|
expert system
|
|
Expert systems are one aspect of an exciting branch of computer science called _____, which is the application of human intelligence to computers.
|
AI
|
|
A feature of word processing software called _____ allows users to type words in a paragraph continually without pressing the enter key at the end of each line.
|
wordwrap
|
|
Instead of performing the same procedure over and over again, users can create and execute a macro, which is a _____.
|
sequence of keystrokes and instructions that a user records and saves
|
|
To assist with creating documents, word processing software provides templates. A template is a _____.
|
document that contains the formatting necessary for a specific document type
|
|
_____ a document can involve changing the font, font size, or font style to change the document's appearance.
|
Formatting
|
|
A spreadsheet file is similar to a notebook with up to 255 related individual worksheets. Each worksheet typically has _____.
|
256 columns and 65,536 rows
|
|
Using the _____ =SUM(B10:B14) totals the contents of cells B10 through B14 in a worksheet.
|
function
|
|
A standard spreadsheet feature called _____ depicts data in graphical form, often making it easier for users to see relationships among numbers.
|
charting
|
|
When using presentation graphics software, a(n) _____ shows an image of a slide along with any additional remarks a presenter wants to see while discussing a topic or slide.
|
notes page
|
|
_____ was one of the original services on the Internet, and today is a primary communications method for both personal and business users.
|
E-mail
|
|
An Internet e-mail address is a combination of a user name and a domain name. In an e-mail address, a(n) _____ symbol separates the user name from the domain name.
|
@ (at)
|
|
According to netiquette (Internet etiquette), e-mail users should avoid sending _____, which is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once.
|
spam
|
|
According to netiquette (Internet etiquette), use _____, such as :-) or :-( , to express emotion in an e-mail message or newsgroup posting.
|
emoticons
|
|
Netiquette, which is short for Internet etiquette, includes all of the following rules except _____.
|
use all capital letters
|
|
_____ is a real-time Internet communications service that notifies users when one or more people are online and then allows them to exchange messages or files.
|
Instant messaging
|
|
For _____ to work, both parties must be online at the same time and the receiver of a message must be willing to accept messages.
|
instant messaging
|
|
A Web page has a unique Web address. In a Web address, the _____, is a set of rules that defines how pages transfer on the Web.
|
http, which stands for Hypertext Transfer Protocol
|
|
Each link on a Web page corresponds to another Web address. To activate a link on a Web page, a user clicks it, that is, points to the link and then _____.
|
presses the left mouse button
|
|
A portal is a Web site that offers a variety of Internet services. Many portals have a _____, which is a Web site that joins a specific group of people with similar interests or relationships.
|
Web community
|
|
Seven types of Web sites are new, informational, business/marketing, educational, advocacy, and personal. A business/marketing Web site _____.
|
contains content that promotes or sells products or services
|
|
An outgoing e-mail server determines how to route sent messages. _____ is a communications technology used by some outgoing mail servers.
|
SMTP (simple mail transfer protocol)
|
|
_____ is the process of transferring documents, graphics, and other objects from a computer to a server on the Internet.
|
Uploading
|
|
An FTP site is a collection of files that reside on an FTP server. Many FTP sites have _____, whereby anyone can transfer some, if not all, available files.
|
anonymous FTP
|
|
_____ is a set of standards that controls the transfer of business data and information among computers both within and among enterprises.
|
EDI (electronic data interchange)
|
|
To evaluate the value of a Web site, users should consider all of the following criteria except __________.
|
the Internet overseer
|
|
As technology continues to advance and computers become more a part of daily living, many people believe that _____ is/are vital to success.
|
computer literacy
|
|
Some companies and individuals collect and use personal information without authorization. To make personal data more private, users should do all of the following except _____.
|
purchase goods with credit cards or checks, rather than cash
|
|
When users purchase software, a single-user license agreement does not permit users to do any of the following except _____.
|
make one copy of the software as backup
|
|
Repetitive strain injuries are a major problem in the United States today. To prevent repetitive strain injury, computer users should take all of the following precautions except _____.
|
use the heel of the hand as a pivot point while typing or using the mouse
|