Professional Documents
Culture Documents
a) competency
b) aware
c) connectivity
d) networked
e) active
(2) The ___ consist(s) of the equipment: keyboard, mouse, monitor, system unit, and other devices.
a) people
b) procedures
c) hardware
d) system unit
e) information
a) word processor
c) operating system
d) application software
e) information system
a) special-purpose
b) general-purpose
c) advanced
d) artificial intelligence
e) multimedia
a) PDA
b) laptop
c) midrange
d) DVD
e) handheld
a) PDA
b) CD
c) RAM
d) DVD
e) Secondary storage
a) concentric
b) layered
c) hard
d) floppy
e) optical
(8) A ___ file might contain audience handouts, speaker notes, and electronic slides.
a) document
b) database
c) worksheet
d) presentation
e) floppy disk
(9) The term ___ refers to the widespread use of mobile communication devices.
a) IT
b) wireless revolution
c) PDA
d) RAM
e) WWW
a) Internet
b) WWW
d) Web
a) ARPANET
b) CERN
c) the Web
d) WWW
e) IRC
(2) ___ use telephone lines and service an area limited to several states.
e) Commercial ISPs
(3) ___ connect(s) to remote computers, open(s) and transfer(s) files, display(s) text and images, and provide(s) in one
tool an uncomplicated interface to the Internet and Web.
a) Bots
b) Browsers
c) Java
d) Web utilities
e) Wizards
(4) The computer that stores and shares Web page resources is called a ___.
a) Web Portal
b) Web Server
c) Telnet
d) ISP
e) Applet
a) Spam e-mails
b) Addresses
c) Web pages
d) Computer viruses
e) Applets
(6) ___ programs identify and elliminate unwanted and unsolicited email.
a) Media
b) Anti-spam
c) Search
d) DSL
e) Meta
(7) To participate in a chat group, select a ___ and communicate live with others.
a) signal
b) index
c) engine
d) list
e) channel
(8) In a directory or ___ search, you select a category that fits the information you want.
a) packet
b) keyword
c) index
d) specialized
e) subject
(9) In ___ commerce, individuals typically sell to other individuals without ever meeting face-to-face.
a) C2C
b) B2C
c) B2B
d) C2I
e) I2I
(10) ___ are programs that are automatically loaded and operate as part of a browser.
a) Plug-ins
b) Add-ons
c) Providers
d) Agents
e) Applets
Chapter 3
(1) General-purpose applications are also known as ___.
a) software suites
b) advanced applications
c) basic applications
d) special-purpose applications
e) integrated applications
(2) Graphics, multimedia, Web authoring, and virtual reality programs are examples of ___.
a) special-purpose applications
b) general-purpose applications
c) basic applications
d) occupational applications
e) system software
a) Functions
b) Macros
c) Templates
d) Calculators
a) fields
b) columns
c) records
d) tables
e) rows
(5) ___ is a DBMS tool that arranges records according to a selected field.
a) Align
b) Arrange
c) Report
d) Form
e) Sort
(6) Most presentation graphics programs have design ___ that provide color schemes, slide layout, and special effects.
a) layout files
b) templates
c) samples
d) records
e) formatting
a) destination file
b) origin file
c) layout file
d) support file
e) source file
(8) To have an object automatically updated in a destination file when a change is made to the source file, the object
must be ___.
a) embedded
b) linked
c) replaced
d) resolved
e) amended
(9) A(n) ___ is a single program that provides the functionality of a word processor, spreadsheet, database manager,
and more.
a) general-purpose application
b) software suite
c) integrated package
d) program manager
e) OLE
a) personal
b) utility
c) specialized
d) home
e) business
(1) A(n) ___ is typically organized as a series of related pages with links to related information.
a) graphical map
b) story board
c) multimedia presentation
d) image editor
e) virtual environment
(2) ___ allows you to reorganize, add effects, and more to your digital video footage.
c) Paint program
d) Browsers
e) Animation
(3) ___ focus on page design and layout and provide greater flexibility than word processors.
a) Desktop publishers
b) Graphics editors
e) PERT
a) VR
b) Graphics editors
c) Graphics suites
d) Animation
e) Vector images
(5) Expert systems use ___ that contain specific facts, rules to relate these facts, and user input to formulate
decisions.
a) robots
b) fuzzy logic
c) story boards
d) knowledge bases
e) interactivity
a) packets
b) fuzzy logic
c) robots
d) story boards
e) vector images
(7) Police and military use ___ to locate and disarm explosive devices.
a) mobile robots
b) OSI
c) industrial robots
d) perception systems
e) fuzzy logic
a) Robots
b) Links
c) Slides
d) Pixels
e) Vectors
a) structured problems
b) unstructured problems
c) knowledge bases
d) organization problems
e) complex circuits
(10) Draw programs are used to modify vector images, while image editors are used to modify ___.
a) bitmap images
b) buttons
c) links
d) HTML code
e) VRML
Chapter 5
(1) Service programs are another name for ___.
a) operating systems
b) utilities
c) device drivers
d) language translators
e) interfaces
a) booting
b) docking
c) embedding
d) fragmenting
e) tracking
a) machine language
b) UNIX
c) service programs
d) operating systems
e) EBCDIC
(4) Desktop operating systems are also called ___ operating systems.
a) network
b) embedded
c) server
d) Mac
e) stand-alone
a) Menu
b) The platform
c) Explorer
d) Utility
e) Help
(6) The ___ operating system was originally designed to run on minicomputers in network environments.
a) Windows
b) Mac OS
c) UNIX
d) Sherlock
e) Norton
(7) To remove unneeded programs and related files from a hard disk you would use a(n) ___ program.
a) backup
b) trouble-shooting
c) file compression
d) antivirus
e) uninstall
(8) Files that are broken into small parts and stored wherever space is available are said to be ___.
a) compressed
b) fragmented
c) lost
d) uninstalled
e) sectored
(9) ___ is a Windows program that locates and eliminates unnecessary fragments and rearranges files and unused disk
space to optimize operations.
a) Disk CleanUp
b) Active Desktop
c) Sherlock
d) Disk Defragmenter
e) Resource Locator
a) Web service
b) troubleshooting program
c) utility
d) utility suite
Chapter 6
(1) The system unit is also called the ___.
a) PDA
b) system board
c) MICR
e) mother board
a) RAMs
b) Notebooks
c) PDAs
d) CPUs
e) Tower units
a) analog system
b) integrated circuits
d) adapter cards
e) slots
(4) ___ connect special cards or circuit boards to the system board.
a) Slots
b) Carrier packages
c) Unicodes
d) PC cards
e) Ports
a) permanent
b) temporary
c) flash
d) smart
e) expansion
(6) ___ is a temporary high-speed holding area between memory and the CPU.
a) Flash
b) ALU
c) ASCII
d) Cache
e) CMOS
a) semiconductor
b) slot
c) adapter
d) network
e) firmware
(8) ___is a set of hardware and software standards that allows expansion boards and other devices to install
themselves.
b) Unicode
c) System Unit
e) EBCDIC
(9) A(n) ___, also called a bus, connects the parts of the CPU together.
a) adapter card
b) parallel port
c) serial port
d) ISA
e) bus line
(10) A(n) ___ chip provides flexibility and expandability for a computer system; it contains essential information that
is required every time the computer system is turned on.
a) ROM
b) RAM
c) TCP/IP
d) CMOS
e) ALU
Chapter 8
(1) ___ is permanent storage used to preserve data and programs.
a) Internal storage
b) Volatile storage
c) Nonvolatile storage
d) File compression
a) Reading
b) Writing
c) Printing
d) Spanning
e) Caching
(3) ___ measures the amount of time required by a storage device to retrieve data and programs.
a) Capacity
b) Media
c) Reading
d) Access time
e) Primary storage
a) diskettes
b) disks
c) flexible disks
d) floppies
a) Density
b) Pit
c) Multithread
d) Sector
e) Zip
(6) Files cannot be written onto a floppy disk when the write-protection notch is ___.
a) zipped
b) open
c) closed
d) sealed
e) crossed
(7) The internal hard disk is typically referred to as the ___ drive.
a) A
b) B
c) C
d) alternate
e) main
(8) An internal hard disk is also known as a ___ because it is located inside the system unit.
a) hard-disk pack
c) fixed disk
d) removable disk
(9) ___ can provide over two hours of high-quality video and sound comparable to that found in theaters.
a) CD-RW
b) CD
c) Photo CD
d) DVD-R
e) DVD-ROM
a) A floppy disk
b) A hard disk
c) Magnetic tape
d) CD-ROM
e) WORM
Chapter 9
(1) Modulation and demodulation are the processes of a(n) ___.
a) connection device
b) node
c) modulator
d) modem
e) OSI
(2) Standard telephone lines and conventional modems provide what is called ___.
a) network architecture
b) broadband
c) dial-up service
d) data transmission
e) channels
a) LANs
b) Microwaves
c) WLANs
d) MANs
e) Satellites
a) terminal
b) peer-to-peer
c) client-server
d) wireless
e) NIC
a) Protocol
b) Packet
c) Network architecture
d) IP address
e) Bandwidth
(6) Every computer on the Internet has a unique numeric address called a(n) ___.
a) packet
b) protocol
c) IP address
d) bandwidth
e) network bridge
a) TCP/IP
b) OSI
c) GPS
d) DSL
e) NOS
(8) ___ describes how the network is arranged and how the resources are coordinated and shared.
a) Topology
b) Communication channel
c) Sharing system
d) Network architecture
(9) ___ controls and coordinates the activities of all computers and devices on a network.
a) TCP/IP
b) NOS
c) DNS
d) OSI
e) DSL
(10) In a ___ network, each device in the network handles its own communications control.
a) host
b) client
c) bus
d) sharing
e) polling
Chapter 10
(1) The ethical issue that relates to the responsibility of those who collect data to ensure that the data is correct is
___.
a) privacy
b) accuracy
c) property
d) access
e) ethics
(2) The ethical issue that concerns the collection and use of data about individuals is ___.
a) privacy
b) accuracy
c) property
d) access
e) ethics
(3) ___ is a term used to describe a wide range of programs that secretly record and report an individual’s activities
on the Internet.
a) Worm
b) Utility
c) Virus
d) Spyware
e) Suite
a) crackers
b) hackers
c) agents
d) organized criminals
e) employees
(5) ___ is/are concerned with protecting information, hardware, and software.
a) Users
b) FBI agents
c) Security
d) The Department of Defense
e) Protection programs
(6) ___ is concerned with protecting hardware from possible human and natural disasters.
a) Physical security
b) Data security
c) The FBI
d) Encryption
e) Energy Star
(7) ___ is concerned with fitting the job to the worker rather than forcing the worker to contort to fit a job.
a) Human Resources
b) Ergonomics
c) Energy Star
d) RSI
e) An HMO
(8) ___ is also called repetitive motion injury and cumulative trauma disorder.
a) RSI
b) ARD
c) TVT
d) EMI
e) BRM
a) RSI
b) EMI
c) Technostress
e) Cumulative TechStress
(10) Environmentally friendly system units, display, and manufacturing are the basic elements of the ___.
a) Energy Star
b) Green PC
c) Standard System
d) Millennium Plan
e) EarthTech Program
Chapter 11
(1) A(n) ___ is a collection of people, procedures, software, hardware, and data.
a) corporation
b) information system
(2) A typical general ledger can produce income statements and ___.
a) balance sheets
b) accounts receivable
c) purchasing forms
d) payroll records
e) DSS
(3) People involved in distribution and communication of information are called ___.
a) knowledge workers
b) users
c) data workers
d) managers
e) secretaries
(4) Because it helps an organization keep track of routine operations and records these events in a database, some
firms call a TPS a(n) ___.
(5) Purchasing, accounts receivable, and inventory are examples of ___ activities.
a) executive
b) managerial
c) clerical
d) accounting
e) human resources
a) marketing
b) production
c) research
d) accounting
e) human resources
(7) ___ help lower-level managers accomplish the organization’s day-to-day activities, such as evaluating and
maintaining quality control.
a) Tactical models
b) Operational models
c) Strategic models
d) Exception reports
e) Periodic reports
c) CAD/CAM systems
a) supervisors
b) managers
c) data workers
d) knowledge workers
e) executives
(10) The level of manager whose information flow is primarily vertical is ___.
a) vice president
b) executive
d) supervisor
e) data worker
Chapter 12
(1) A ___ is a collection of related fields.
a) field
b) class
c) file
d) record
e) character
(2) In ___ processing data is collected over time and then processed later all at one time.
a) real-time
b) relational
c) batch
d) database
e) direct
a) Child nodes
b) Data redundancy
e) Security
(4) The person responsible for determining processing rights and which people have access to data is called a ___.
a) database manager
b) database administrator
c) database operator
d) pointer
e) hasher
a) one-to-one relationship
b) one-to-many relationship
c) many-to-many relationship
d) many-to-one relationship
a) field
b) transaction file
c) pointer
d) node
e) key field
(7) ___ are persons, places, things, or events that are to be described in an object-oriented database.
a) Methods
b) Fields
c) Classes
d) Entities
e) Attributes
(8) A collection of integrated records useful mainly to one person is a(n) ___.
b) individual database
c) company database
e) distributed database
(9) An enormous database an organization develops to cover certain objects is called a ___.
a) proprietary database
b) company database
d) distributed database
e) data warehouse
(10) ___ are special hardware and software designed to control access to internal networks.
a) Firewalls
b) Data models
c) DBMS
d) Relations
e) Pointers
Chapter 13
(1) Preliminary investigation, systems analysis, systems design, systems development, systems implementation, and
systems maintenance are elements of the ___.
a) systems checklist
d) parallel approach
e) pilot approach
(2) A ___ studies an organization’s systems to determine what actions to take and how to use technology to assist
them.
a) RAD
b) data worker
c) CASE
d) systems analyst
(3) A(n) ___ is usually requested by an end user or manager who wants something done.
a) prototype
b) systems audit
c) top-down analysis
d) organization chart
e) preliminary investigation
(4) Defining the problem, suggesting alternative systems, and preparing a report are part of the ___ phase.
a) preliminary investigation
b) analysis
c) design
d) development
e) implementation
(5) Checklists, grid charts, decision tables, and system flowcharts are part of the ___ phase.
a) preliminary investigation
b) analysis
c) design
d) development
e) implementation
b) decision tables
c) grid charts
d) CASE tools
e) system flowcharts
(7) The ___ describes the current information system, the requirements for a new system, and a possible
development schedule.
c) system flowchart
a) systems audit
b) organization chart
c) grid chart
d) decision table
e) RAD
(9) ___ determines whether or not reliable hardware, software, and training are available to make a new system
work.
a) Economic feasibility
b) Operational feasibility
c) Technical feasibility
d) Systems audit
e) Top-down analysis
(10) In the ___, conversion to a new system is done simply by abandoning the old and starting up the new.
a) parallel approach
b) direct approach
c) pilot approach
d) phased approach
Chapter 14
(1) Only the ___ step of software development involves keying statements into a computer.
a) program specification
b) program design
c) program code
d) program test
e) program documentation
(2) In the ___ step a solution is created using programming techniques such as top-down program design, pseudocode,
flowcharts, and logic structures.
a) program specification
b) program design
c) program code
d) program test
e) program documentation
a) program definition
b) program charting
c) program coding
d) program design
e) program modeling
(4) Under the rules of top-down design each module should have ___ function(s).
a) multiple
b) two
c) one
d) three
e) ten
(5) The two variations of loop structure are ___ and ___.
a) DO NOW, DO LATER
b) DO WHILE, DO PARALLEL
c) DO WHILE, DO UNTIL
d) DO NOW, DO DURING
e) DO LATER, DO UNTIL
a) top-down programs
b) structured programs
c) coded programs
(7) The omission of a semicolon at the end of a statement in C++ is an example of a ___ error.
a) loop
b) direct
c) calculation
d) design
e) syntax
a) Coding
b) Design
c) Beta testing
d) Documentation
e) Desk checking
(9) Languages that can run on more than one kind of computer are called ___.
a) machine languages
b) portable languages
c) assembly languages
d) problem-oriented languages
e) query languages
(10) A(n) ___ contains a number of modules that have been preprogrammed to accomplish various tasks.
a) application generator
c) translator
d) interpreter
e) compiler
Chapter 15
(1) The real issue with technology is ___.
b) making it better
d) teaching it to students
(2) The principal changes technology brings to business are ___, new enterprises, and new customer and supplier
relationships.
a) new computers
b) new problems
c) new agencies
d) new laws
e) new products
(3) The ___ user believes that learning and using computers take time away from their real jobs.
a) cynical
b) proactive
c) frustrated
d) confused
e) naive
(4) The ___ user believes all problems can be solved by computers.
a) proactive
b) optimistic
c) frustrated
d) naive
e) cynical
(5) The ___ user does not easily become frustrated and give up using technology.
a) proactive
b) cynical
c) naive
d) inexperienced
e) advanced
a) don’t do it
e) do so to some extent
b) Computer technicians
c) Computer trainers
d) Database administrators
(8) ___ oversee work of programmers, computer specialists, systems analysts and other computer professionals.
b) Desktop publishers
d) Network administrators
e) Programmers
(9) ___ prepare instruction manuals, technical reports, and other scientific or technical documents.
a) Programmers
b) Software engineers
c) Systems analysts
d) Technical writers
e) Webmasters
(10) ___ input customer information, lists, and other types of data.
b) Desktop publisher
d) Network administrators
e) Programmers create