ISYS 363 Ch. (TB) Flashcards

1
Q

A large number of documents can be entered into a computer system separately and then manipulated at a single time using __________ processing.

simple

application

unit

group

batch

A

batch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A biometric fingerprint is considered a(n) _____________ technology used for authentication purposes.

bar code

output

input

magnetic ink character recognition

optical mark recognition

A

input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

____________ is (are) used to process human body characteristics to identify and authenticate individuals for security and access control purposes.

Optical character recognition

Biometric scanners

Bar code readers

Optical mark recognition

Magnetic ink character recognition

A

Biometric scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data is stored in a computer using patterns of ____________ defined by standard coding schemes.

bytes

hertz

bits

programming statements

characters

A

bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_______________ is an example of volatile memory.

An optical disk

A solid-state drive

Read-only memory

Random access memory (RAM)

A redundant array of independent drives (RAID)

A

Random access memory (RAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The purpose of a(n) _____ is to connect other devices to a computer.

power supply

portal

tape

element

port

A

port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Operating systems perform a variety of necessary functions for computers, including all of the following EXCEPT:

maintaining the structure of storage directories and subdirectories.

changing the font style and color in a Word document.

managing secondary storage.

managing the programs and data in main memory.

booting (starting) the computer.

A

changing the font style and color in a Word document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Utility programs provide all of the following functions EXCEPT:

creating backups.

formatting disks.

converting file formats.

detecting spyware.

defragmenting files on hard drives.

A

formatting disks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A(n) _____________ translates an entire computer program into machine language which is then executed by the CPU.

compiler

foreign exchange

executable

server

client device

A

compiler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___________ is a programming platform that is used to develop applications that are highly interoperable across a variety of platforms and devices, such as desktop computers, mobile computers, or smartphones.

Microsoft .NET

Java

Flash

HTML

Javascript

A

Microsoft .NET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following automates or supports activities throughout the systems development process to increase productivity and improve overall system quality?

Computer-aided biotechnology

Computer-aided instructional technology

Computer-aided software engineering tools

Computer-aided development

Computer-aided engineering

A

Computer-aided software engineering tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is NOT true regarding open source software?

Open source means the software is freely available to the general public.

Users are free to suggest ideas for open source software but only a small group of carefully selected “committers” can implement the changes into the official releases of the software.

The Internet has helped enable people around the world to contribute their time and expertise to develop or improve software.

Mainstream computer companies have no involvement with the open source software movement.

Open source software is available for many types of software, including operating systems, programming languages, database management systems, and applications.

A

Mainstream computer companies have no involvement with the open source software movement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

___________________ computing involves incorporating two or more networked computers to increase computing power and accomplish a common processing task.

Supportive

Collaborative

Centralized

Networked

Cooperative

A

Collaborative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In a client-server network environment, which of the following is NOT a common server type?

Print servers

Application servers

Telephone servers

E-mail servers

Database servers

A

Telephone servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A network that allows connected computers to share data, software applications, or other resources, typically within a limited geographic area, is called a ___________.

limited area network

personal area network

professional area network

wide area network

local area network

A

local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is a large worldwide collection of networks that uses a common protocol to communicate?

The World Wide Web

Domain Name System

Local area network

The Internet

Wide area network

A

The Internet

17
Q

____________ are private, third-party-managed wide area networks commonly used for B2B communications.

Limited area networks

Professional area networks

Personal area networks

Local area networks

Value-added networks

A

Value-added networks

18
Q

Network protocols cover all of the following network issues EXCEPT:

data transmission format.

packets routing from source to destination.

error checking procedure.

application programming language.

data compression method.

A

application programming language.

19
Q

Which of the following is NOT a correct aspect of communication on the Internet?

TCP/IP is the protocol that governs Internet communication.

TCP breaks data into small chunks and manages the transfer of those packets from computer to computer via packet switching.

Routers connect networks and send packets along the route from source to destination.

Ethernet is the protocol that governs Internet communication.

IP defines how a packet is constructed.

A

Ethernet is the protocol that governs Internet communication.

20
Q

Which of the following devices helps avoid the problem of transmission collisions among computers, servers, and printers?

Router

Wireless access point

Switch

Wireless controller

Modem

A

Switch

21
Q

In order for individuals to connect to the Internet, it is necessary to go through a(n) _____________.

Internet service provider

personal area network

Ethernet

exchange service

domain name

A

Internet service provider

22
Q

A(n) _____________ key, like StudentID in a STUDENT table, is used to uniquely identify each row or record in a database table.

primary

redundant

foreign

optional

relationship

A

primary

23
Q

Which of the following is commonly used when designing a database for the purpose of showing associations between entities?

Computer clustering

Batch processing

Entity normalization technique

Packet switching

Entity-relationship diagram

A

Entity-relationship diagram

24
Q

Which of the following statements about the relational database model is NOT true?

Fields of data are in table columns.

Data redundancy is completely eliminated.

Records of data are in table rows.

Tables can be related through the use of common fields.

Tables contain all the facts about the objects of interest in the database.

A

Data redundancy is completely eliminated.

25
Q

The technique of ____________ is necessary to refine the structure of a relational database model to optimize its efficiency and maintainability.

fine-tuning

refinement

renovation

normalization

enhancement

A

normalization