Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
100 Cards in this Set
- Front
- Back
A popular plug-in application that enables readers to view, navigate, and print files in Portable Document Format is __________.
|
Acrobat Reader
|
|
A ____ is a thin desktop monitor that detaches from the computer to function as a portable wireless touch screen, which can access the computer remotely.
|
smart display
|
|
A _____ has pins on opposite sides of the circuit board that connect together to form one set of contacts.
|
SIMM (single inline memory module)
|
|
An 8-bit video card (also called 8-bit color) uses 8 bits to store information about each pixel and thus can display _____ different colors.
|
256
|
|
A GPS receiver is a handheld, mountable, or embedded device that can contain all of the following except a(n) _____.
|
floppy disk
|
|
When a computer sends data over the Internet, the data is divided into small pieces called _____.
|
packets
|
|
With ISDN, the same telephone line that could carry only one computer signal now can carry three or more signals at once through the same line, using a technique called _____.
|
multiplexing
|
|
For small business and home networks, a ____ allows multiple computers to share a single high-speed Internet connection such as a cable modem or DSL modem.
|
router
|
|
_____ enables users to listen to music as it downloads to their computers.
|
Streaming audio
|
|
A _____ equals approximately 1 billion bytes.
|
gigabyte (GB)
|
|
_____ is used primarily on mainframe computers and high-end servers.
|
Extended Binary Coded Decimal Interchange Code (EBCDIC)
|
|
Manufacturers often use _____ to represent the sharpness of an image on a display screen.
|
pixels per inch (PPI)
|
|
A _____ is a high-speed network that connects networks in an area such as a city or town and handles the bulk of communications activity across that region.
|
metropolitan area network (MAN)
|
|
Client/server network architecture usually ___________.
|
provides several computers with data and resources from a single computer
|
|
A major shortcoming of a ring network is that __________.
|
if a computer on the network fails, all the devices after the failed device cannot function
|
|
Wireless transmission media used in communications include all of the following except _____.
|
fiber-optic cable
|
|
_____ is the process of a computer receiving information, such as a Web page, from a server on the Internet.
|
Downloading
|
|
A(n) _____ is a compiled program that runs on the client.
|
applet
|
|
The _____ standard defines how a Web server communicates with outside sources.
|
CGI (common gateway interface)
|
|
In a computer processor, the control unit __________.
|
directs and coordinates most of the operations in the computer
|
|
Spyware in a computer __________.
|
secretly collects information about the user, often related to the person’s Web-browsing habits
|
|
Bell Labs licensed _____ for a low fee to numerous colleges and universities, where the operating system obtained a wide following.
|
UNIX
|
|
Compressed files are also called __________ files.
|
zipped
|
|
In object-oriented (OO) design, the concept of packaging data and procedures into a single object is called _____.
|
encapsulation
|
|
A(n) _____ version is a test version of a system is not ready for release but is stable enough to be tested by end users
|
beta
|
|
_____ is a set of technologies from Microsoft that allows almost any type of program to run on the Internet or an internal business network.
|
NET
|
|
A program has its own documentation, called _____.
|
comments
|
|
The machine language version that results from compiling a 3GL is called the _____.
|
object code or object program
|
|
A(n) _____ is an action to which an object-oriented program responds.
|
event
|
|
Some users input music and other sound effects using external _____ devices such as an electronic piano keyboard.
|
MIDI
|
|
A _____ is a window on the screen that displays notes and drawings simultaneously on the screens of all participants in a video conference.
|
whiteboard
|
|
To add special multimedia effects and interactive capabilities to Web pages, programmers use all of the following scripting languages except __________.
|
Vista
|
|
_____ is free software that has been donated for public use and has no copyright restrictions.
|
Public-domain software
|
|
Microsoft ____ is an example of a personal DTP program.
|
Publisher
|
|
____ software allows users to track, control, and manage the events, resources, and costs of a project.
|
Project management
|
|
_____ is a common data type in databases that consists of Web addresses that link to a document or Web page.
|
Hyperlink
|
|
A(n) _____ verifies that a required field contains data.
|
completeness check
|
|
A multidimensional database uses the idea of a ____ to represent the dimensions of data available to a user.
|
data cube
|
|
A(n) _____ program interacts with a DBMS, which in turn interacts with the database.
|
front-end
|
|
_____ is a process designed to ensure the data within the relations (tables) in a relational database contains the least amount of duplication.
|
Normalization
|
|
All of the following are SQL keywords except ____.
|
OBJECT
|
|
A Web page has a unique address, called a ____.
|
URL
|
|
Popular database management systems include all of the following except __________.
|
Mac OS X
|
|
_____ software enables users to convert an image from a fax modem to text and then edit it.
|
Optical character recognition (OCR)
|
|
The banking industry almost exclusively uses ____ for check processing.
|
MICR
|
|
The _____ is the most important data and information gathering technique for the system developer.
|
interview
|
|
Tools that a systems analyst uses for process modeling include all of the following except _____.
|
class diagrams
|
|
A _____ identifies the product(s) a systems analyst wants from a vendor.
|
request for quotation (RFQ)
|
|
With a _____, only one location in the company uses a new system, so it can be tested.
|
pilot conversion
|
|
____ processing implies that there is no interaction with the user while the program is being executed.
|
Batch
|
|
All of the following are recommended defenses against botnets, DoS attacks, and spoofing except __________.
|
never opening e-mail attachments
|
|
In a grocery store, a(n) _____ is a combination of an electronic cash register, bar code reader, and printer.
|
point of sale (POS) terminal
|
|
A(n) ____ is a group of processing steps that are treated as a single activity to perform a desired result.
|
transaction
|
|
A(n) _____ allows the user to choose specific files to backup, regardless of whether or not the files have changed since the last incremental backup.
|
selective backup
|
|
The _____ is the destructive event or prank a malicious-logic program is intended to deliver.
|
payload
|
|
When a mobile user connects to a main office using a standard Internet connection, a _____ provides the mobile user with a secure connection to the company network server.
|
virtual private network (VPN)
|
|
A _____ is a mathematical formula that can be used to encrypt and decrypt sensitive data.
|
hash
|
|
A _____ installs, configures, and maintains LANs, WANs, intranets, and Internet systems.
|
network administrator
|
|
A _____ works with the analyst, programmer, and user to create documentation and user materials.
|
technical writer
|
|
Entry-level jobs for graduating _____ students include database analyst, software engineer, systems programmer, computer technician, and computer consultant.
|
computer science (CS)
|
|
_____ is a certification that tests advanced knowledge of installing, configuring, and operating LANs and WANs.
|
Cisco Certified Network Professional (CCNP)
|
|
Commonly used methods to retrieve and maintain data in a database include all of the following except _____.
|
validation rules
|
|
An integration test _____.
|
verifies that an application works with other applications
|
|
Integrated case products, sometimes called I-CASE or a CASE workbench, include which of these capabilities?
|
a. Project dictionary
b. Code generators c. Diagrams and prototyping d. Quality assurance e. All of the above |
|
A unit test _____.
|
verifies that each individual program works by itself
|
|
Using _____, engineers can test the design of a car or bridge before it is built.
|
CAE
|
|
CIM software _____.
|
assists support personnel in providing the best solutions for customers
|
|
A _____ is a program that assists in the management and tracking of all the activities in a business from start to finish.
|
workflow application
|
|
_____ software tracks leads and inquiries from customers, stores a history of all correspondence and sales to a customer, and allows for tracking of outstanding issues with customers.
|
CRM
|
|
_____ is the process of collecting data from the Internet as a source for a data warehouse.
|
Web farming
|
|
The two main components of an expert system are ____.
|
knowledge base and inference rules
|
|
A special kind of DSS, called a(n) ____, supports the strategic information needs of executive management.
|
EIS
|
|
A _____ is a special window that provides information, presents available options, or requests a response.
|
dialog box
|
|
To "cut" involves removing a portion of a document and storing it in a temporary storage location, sometimes called a _____.
|
clipboard
|
|
When computer users _____ a document, the computer transfers the document from memory to a storage medium.
|
save
|
|
_____ enables users to write and print checks, track checking account activity, and update and reconcile balances on demand.
|
Accounting software
|
|
Business software suites typically include all of the following programs except ____.
|
note taking
|
|
A Web browser program allows _____.
|
users to access and view Web pages on the Internet
|
|
_____ is the delivery of education at one location while the learning takes place at other locations.
|
Distance learning (DL)
|
|
Hyperstudio is a multimedia authoring software application that allows users to create presentations called ____.
|
stacks
|
|
_____ allows users to share documents with others in real time.
|
An online meeting
|
|
A _____ is a legal agreement that permits users to install software on multiple computers, usually at a volume discount.
|
site license
|
|
____ uses the Internet, instead of the public switched telephone network, to connect a calling party and one or more called parties.
|
Internet telephony
|
|
Examples of _____ are real estate agents, insurance agents, meter readers, package delivery people, journalists, consultants, and students.
|
mobile users
|
|
Many large businesses have _____ software, which allows the company to provide a personalized touch and customized service to its customers.
|
customer relationship management (CRM)
|
|
Which of the following is not required for video conferencing?
|
Webcam
|
|
Many large companies use the words, ____, to refer to the huge network of computers that meets their diverse computer needs.
|
enterprise computing
|
|
When a user specifies a domain name, a _____ translates the domain name into its associated IP address so data can route to the correct computer.
|
DNS server
|
|
When using a search engine, use a(n) ____ after the search word to find plurals or variations of that word.
|
asterisk
|
|
Many FTP sites require a(n) ____ to access files.
|
login name and password
|
|
On the Web, ____ involves the display of 3-D images that users explore and manipulate interactively.
|
VR
|
|
A wireless portal is a portal specifically designed for _____.
|
Web-enabled mobile devices
|
|
Some mailing lists are called _____, named after a popular mailing list software product.
|
LISTSERVs
|
|
A popular Web-based type of discussion group that does not require a newsreader is a ____.
|
message board
|
|
A ____ is an area with the capability of wireless Internet connectivity.
|
hot spot
|
|
The gap between those who have access to computers and those who do not is referred to as the ____.
|
digital divide
|
|
The computer that a hacker uses to execute a DoS or DDoS attack, known as a _____, is completely unaware that it is being used to attack other systems.
|
zombie
|
|
The 1986 _____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail.
|
Electronic Communications Privacy Act (ECPA)
|
|
To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the _____.
|
Business Software Alliance (BSA)
|
|
_____ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
|
Ergonomics
|