(Hot Spot) D. A Web Conference
(Hot Spot) D. A Web Conference
a Web meeting
that provides Internet connections to mobile d. a Web conference
computers and devices.
2. GPS is a navigation system that consists of 16. With _____, users can view message details
one or more earth-based receivers that such as the length of calls and, in some
accept and analyze signals sent by satellites cases, read message contents instead of
in order to determine the receiver’s listening to them. (322)
geographic location. a. Web services
3. Receiving (Sending) devices initiate an b. Internet telephony
instruction to transmit data, instructions, or c. video messaging
information. d. visual voice mail
4. Users can send pictures and sound files, as
well as short text messages, with text (picture) 17. A _____ network is a third-party business that
messaging. provides networking services for a fee. (322)
5. A wireless LAN is a LAN that uses no physical a. value-added
wires. b. client/server
6. An intranet is an internal network that uses c. star
video conferencing Internet technologies. d. file sharing
7. Five types of digital dial-up dedicated lines
are ISDN lines, DSL, FTTP, T-carrier lines, 18. A _____ is a Web application that combines
and ATM. services from two or more sources, creating a
8. In a client/server network, servers clients on new application. (322)
the network access resources on the client a. document management system
server. b. peer-to-peer network
9. P2P describes an Internet network on which c. Web service
d. mashup
users access each other’s hard disks and
exchange files directly over the Internet. 19. _____ is a standard, specifically a protocol,
10. A cable (dial-up) modem converts a that defines how a network uses radio signals
computer’s digital signals to analog signals to communicate with a tag placed in or
before they are transmitted over standard attached to an object, an animal, or a person.
telephone lines. (330)
11. A network card is an adapter card, USB a. RFID
network adapter, ExpressCard module, PC b. WiMAX
Card, or flash card that enables the computer c. Bluetooth
or device to access a network. d. UWB
12. Analog (digital) signals consist of individual
electrical pulses that represent bits grouped 20. _____ is a newer network standard
together into bytes. developed by IEEE that specifies how
13. Physical (Wireless) transmission media send wireless devices communicate over the air in
communications signals through the air or a wide area. (330)
space using radio, microwave, and infrared a. Wi-Fi
signals. b. WiMAX
14. Most wireless home networks use powerline c. 802.16
cables Wi-Fi. d. Both b and c
15. When an online meeting takes place on the 21. DSL, cable television Internet service, and
Web, it is called _____. (321) satellites offer _____ transmission. (338)
a. video messaging a. baseband
b. a peer-to-peer network b. IrDA
c. microwave 36. Mac OS X is a multitasking operating system
d. broadband available only for computers manufactured by
Apple.
22. _____ consists of a single copper wire 37. Aero Flip 3D (Linux) is a UNIX-type operating
surrounded by at least three layers. (339) system that is open source software.
a. Fiber-optic cable 38. A pop-up blocker (file compression utility)
b. Twisted-pair cable shrinks the size of a file(s).
c. Coaxial cable 39. An anti-spam program (antivirus) protects a
d. Infrared computer against viruses.
40. A personal firewall is a utility that detects and
23. Collaborate - work online with other users protects a personal computer from
connected to a server unauthorized intrusions.
24. Bluetooth - a protocol that defines how two 41. You should uninstall (backup) files and disks
devices use short-range radio waves to regularly in the event your originals are lost,
transmit data damaged, or destroyed.
25. Dedicated line - a protocol that defines how 42. Web filtering software (Disc burning software)
two devices use short-range radio waves to writes text, graphics, audio, and video files to
transmit data a recordable or rewritable disc.
26. Dial-up modem - communications device that
can convert digital signals to analog signals 43. In the Windows 7 operating system, _____
and analog signals to digital signals, so that provides an enhanced visual look, additional
data can travel along an analog telephone navigation options, and animation. (273)
line a. Windows Aero
27. Noise - electrical disturbance that can b. Plug and Play
degrade communications c. Mac OS X
d. Windows 7 Starter
28. A buffer (driver) is a small program that tells
the operating system how to communicate 44. Windows users can increase the size of
with a specific device. memory through _____, which can allocate
29. A warm boot is the process of using the available storage space on removable flash
operating system to restart a computer. memory devices as additional memory cache.
30. A password is a public (private) combination (275)
of characters associated with the user name a. Windows Aero
that allows access to certain computer b. Plug and Play
resources. c. Windows ReadyBoost
31. The program you currently are using is in the d. a disk defragmenter
background (foreground), and the other
programs running but not in use are in the 45. A _____ is a small program that tells the
foreground (background). operating system how to communicate with a
32. Two types of system software are operating specific device. (276)
systems and application (utility) programs. a. buffer
33. BlackBerry Palm OS devices use Palm OS as b. driver
their operating system. c. performance monitor
34. Examples of embedded (server) operating d. device
systems include Windows Server 2008, UNIX,
Linux, Solaris, and NetWare. 46. Computer and network administrators
35. Windows 7 Starter uses Windows Aero (Vista typically have a(n) _____ that enables them
Basic). to access all files and programs on the
computer or network, install programs, and
specify settings that affect all users on a 53. Hibernate - saves any open documents and
computer or network. (278) programs to a hard disk before removing
a. file manager power from the computer
b. personal computer maintenance utility 54. Trojan horse - hides within or looks like a
c. administrator account legitimate program such as a screen saver
d. graphical user interface 55. Sleep mode - saves any open documents and
programs to RAM, turns off all unneeded
47. The operating system on most mobile devices functions, and then places the computer in a
and many consumer electronics, called a(n) low-power state
_____, resides on a ROM chip. (283) 56. Spam - an unsolicited e-mail message or
a. network operating system newsgroup posting sent to many recipients or
b. embedded operating system newsgroups at once.
c. stand-alone operating system
d. stand-alone utility program 57. A database (field) is a combination of one or
more related characters or bytes and is the
48. A _____ is a specific named location on a smallest unit of data a user accesses.
storage medium that contains related 58. A record (database) is a collection of data
documents. (285) organized in a manner that allows access,
a. file retrieval, and use of that data.
b. buffer 59. Data (Information) is processed information
c. utility (Data).
d. folder 60. Hierarchy of data (file maintenance)
procedures include adding records to,
49. A(n) _____ is a program that warns or blocks modifying records in, and deleting records
you from potentially fraudulent or suspicious from a file.
Web sites. 61. To be valuable, information should be
a. phishing filter accurate, verifiable, timely, organized,
b. adware remover accessible, useful, and cost-effective.
c. Web filter 62. A DBMS is hardware (software) that allows
d. Trojan horse you to create, access, and manage an
operating system.
50. A(n) _____ is a program that allows you to 63. A query (data dictionary) contains data about
view images and animation, listen to audio, each file in the database and each field in
and watch video files on your computer. those files.
a. file manager 64. Access privileges for data involve establishing
b. media player who can enter new data, modify existing data,
c. service pack delete unwanted data, and view data.
d. image viewer 65. Strengths of the database approach include
increased (reduce) data redundancy, reduced
51. Virus - a potentially damaging computer (improved) data integrity, shared data, easier
program that affects, or infects, a computer access, and increased (reduced)
negatively by altering the way the computer development time.
works without the user’s knowledge or 66. Object-oriented databases store data in
permission tables (object).
52. Worm - copies itself repeatedly using up 67. Relational database users refer to a file as a
system resources and possibly shutting the table, a field as a column, and a record as a
system down row.
68. SQL is a data modeling (query) language that c. reduced development time
allows users to manage, update, and retrieve d. easier access
data.
69. The database analyst (administrator) requires 76. Many organizations adopt the _____ policy,
a more technical inside view of the data than where users’ access privileges are limited to
does the database administrator (data the lowest level necessary to perform
analyst). required tasks. (367)
a. golden rule
70. A _____ is a field that uniquely identifies each b. principle of least privilege
record in a file. (356) c. principle of highest access
a. data type d. least order
b. data file
c. primary key 77. The database analyst (DA) _____.
d. data character a. monitors the performance of the database
b. creates and maintains the data dictionary
71. In some tables, the primary key consists of c. decides on the proper placement of fields
multiple fields, called a _____. d. checks backup and recovery procedures
a. composite key
b. secondary key 78. Query Language - consists of simple, English-
c. key field like statements that allow users to specify the
d. column data to display, print, or store
79. Object - item that contains data and the
72. _____ procedures include adding records to, actions that read or process the data
modifying records in, and deleting records 80. Field size - defines the maximum number of
from a file. characters a field can contain
a. Range check 81. Recovery utility - uses the logs and/or
b. File maintenance backups to restore a database when it
c. Backup becomes damaged or destroyed
d. Validation 82. Field name - uniquely identifies each field
83. Database administrator - creates and
73. A _____ verifies that a required field contains maintains the data dictionary, manages
data. security of the database, monitors the
a. completeness check performance of the database, and checks
b. range check backup and recovery procedures
c. consistency check
d. numeric check 84. A back door (denial of service) attack is an assault
whose purpose is to disrupt computer access to
74. When an organization uses _____, many an Internet service such as the Web or e-mail.
programs and users share the data in the
database. 85. All networked and online computer users should
a. a data model implement a firewall solution.
b. a file processing system
c. the database approach 86. Computer viruses, worms, Trojan horses, and
d. a check digit
rootkits are malware that acts without a user’s
knowledge.
75. All of the following are strengths of the
database approach, except _____.
87. Shorter (Longer) passwords provide greater
a. less complexity
security than longer (shorter) ones.
b. improved data integrity
88. Updating an antivirus program’s quarantine implementation, and recording operations,
(signature file) protects a computer against support and security.
viruses written since the antivirus program was
released. 1. The purpose of the design operations, support
and security phase is to provide ongoing
89. An end-user license agreement (EULA) does not assistance for an information system and its users
permit users to give copies to friends and after the system is implemented.
colleagues, while continuing to use the software.
2. Upon completion of the preliminary investigation,
90. Encryption is a process of converting ciphertext the systems analyst writes the system proposal
(plaintext) into plaintext (ciphertext) to prevent feasibility report.
unauthorized access.
3. Users should not be involved throughout system
91. Mobile users are not susceptible to hardware development.
theft.
4. C and COBOL are examples of assembly
92. Two wireless security standards are Wi-Fi procedural languages.
Protected Access and 802.11i.
5. Delphi Java is an object-oriented programming
93. To protect against data loss caused by a system language developed by Sun Microsystems.
failure, computer users should restore (back up)
files regularly. 6. Popular first-generation scripting languages
include JavaScript, Perl, PHP, Rexx, Tcl, and
94. Factors that cause CVS (RSI) include prolonged VBScript.
typing, prolonged mouse usage, or continual
shifting between the mouse and the keyboard. 7. Four popular markup languages WEB PAGE
AUTHORING PROGRAMS are Dreamweaver,
95. Phishing (Digital Forensics) is the discovery, Expression Web, Flash, and SharePoint Designer.
collection, and analysis of evidence found on
computers and networks. 8. Two types of low-level languages are machine
languages and source ASSEMBLY languages.
96. Spam is Internet junk mail.
9. Visual Studio is Microsoft’s suite of program
97. You can assume that information on the Web is development tools that assists programmers in
not always correct building programs for Windows, Windows Mobile,
or any operating system that supports .NET.
98. A computer security plan summarizes in writing
all of the safeguards that are in place to protect 10. Program development is an ongoing activity
an organization’s information assets. within system development.
99. Feasibility Project Management is the process of 11. The program development life cycle consists of
planning, scheduling, and then controlling the these six steps: analyze requirements, design
activities during system development. solution, validate design, implement design, test
solution, and hardcode DOCUMENT solution.
100. The five phases in most SDLCs are
programming planning, analysis, design, sampling 12. Three basic control structures are sequence,
selection, and maintenance REPETITION.
13.