logo image

IST Practice Cheat Sheet

In a worksheet, the intersection of a row and a column is called a ____.
a.footer

b.table

c.pointer

d.cell (!)

With bitmapped images, the color of each ____ is represented by bits; the more bits used, the better the image quality.
a.
vector

b.
map

c. (!)
pixel

d.
byte

Some ____ must be added in pairs for optimal performance.
a.
interfaces

b.
memory modules (!)

c.
USB ports

d.
hard drives

The ____ allows individuals to “placeshift” multimedia content from their home TVs and DVRs to their portable computer or mobile device.
a.
Singmedia

b.
Slingbox (!)

c.
Shiftmedia

d.
Singbox

____ programs are software programs that are distributed on the honor system.
a.
Commercial

b.
Shareware (!)

c.
Freeware

d.
Public domain

Case-Based Critical Thinking Questions

Case 16-1
Jack is a computer programmer who spends most of the day at his desk. Recently, he visited the doctor to get advice about persistent eyestrain and an aching back.

To combat his eyestrain, Jack’s doctor advised him to ____.

a.
use a light touch on the keyboard

b.
use a lower screen resolution (!)

c.
use a footrest

d.
turn down the volume when using headphones

____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive.
a.
Remote access

b.
Identity theft (!)

c.
Spams

d.
Software theft

A ____ is equal to 1,024 bytes.
a.
kilobyte (KB) (!)

b.
megabyte (MB)

c.
gigabyte (GB)

d.
terabyte (TB)

External hard drives today typically connect to a computer via a USB or ____ port.
a.
IrDA

b.
Bluetooth

c.
Firewall

d.
FireWire

The ____ implements regulations for unsolicited e-mail messages and lays the groundwork for a federal Do Not E-Mail Registry.
Selected Answer:

USA Patriot Act
Answers:
a.
Sarbanes-Oxley Act
b.
USA Patriot Act

CAN-SPAM act (!)
d.
Junk Fax Prevention Act

In a typical client-server database application, the client is called the ____.
Selected Answer:
Correcta.
front end
Answers:

front end (!)
b.
back end
c.
portal
d.
rear end

Case-Based Critical Thinking Questions

Case 14-2
The JL Group is a political think tank that is incorporating new media into their analyses.

The employees of JL Group who use the database of the company for their daily work, without having knowledge of how the underlying database is structured, interact with the database ____.

Selected Answer:
Correctc.
using the user interface
Answers:
a.
through the database designer
b.
through the database programmer
Correctc.
using the user interface (!)
d.
using the database script
Question 15
0 out of 1 points
Case-Based Critical Thinking Questions

Case 4-2
Lisa is a student who regularly uses the computers at her local Internet café to listen to music, talk to her friends and family through the Internet, and play computer games.

The Internet café has recently enacted a new policy that says that all users must use the ____ attached to their computers when carrying out activities on the computer that will provide sound, so as to not disturb the other users.

Selected Answer:
Incorrect [None Given]
Answers:
a.
scanners
Correctb.
headphones (!)
c.
iPod docks
d.
speakers
A computer that is controlled by a hacker or other computer criminal is referred to as a ____.
Selected Answer:
Correctd.
bot
Answers:
a.
client
b.
spider
c.
server
Correctd.
bot
A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business’s operations going.
Selected Answer:
Correctd.
hot site
Answers:
a.
buddy site
b.
white room
c.
alternate pad
Correctd.
hot site (!)
Most ____ programs are available to try free of charge, but typically a small fee is required to use the program regularly.
Selected Answer:
Incorrectb.
freeware
Answers:
a.
public domain
b.
freeware
Correctc.
shareware (!)
d.
commercial
Case-Based Critical Thinking Questions

Case 2-2
Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit documents. Recently, he has come to realize that in order to keep the computer performing at its best, he needs to carry out regular system maintenance on the computer.

Jack can use the ____ program to locate and delete temporary files, such as installation files, Web browsing history, and files in the Recycle Bin.

Selected Answer:
Incorrect [None Given]
Answers:
a.
Windows Registry
b.
Disk Defragmenter
c.
Temporary Files
Correctd.
Windows Disk Cleanup (!)
The bus width and bus speed together determine the bus’s ____ or bandwidth; that is, the amount of data that can be transferred via the bus in a given period of time.
Selected Answer:
Correctc.
throughput
Answers:
a.
machine cycle
b.
memory
Correctc.
throughput (!)
d.
clock speed
____ is a set of rules for exchanging data over the Web.
Selected Answer:
Incorrecta.
MP3
Answers:
a.
MP3
Correctb.
XML (!)
c.
PDF
d.
CGI
Case-Based Critical Thinking Questions

Case 2-1
Jess is a musician who has just bought a new computer. Now she has to determine how to connect this computer to the devices that were connected to her old computer.

To connect her external hard drive where her music files are stored to the computer, Jess needs to use the ____ port.

Selected Answer:
Incorrect [None Given]
Answers:
Correcta.
USB (!)
b.
serial
c.
modem
d.
network
The ____ Web is a predicted evolution of the current Web in which all Web content is stored as if it were data in a database so that it can be retrieved easily when needed to fulfill user requests.
Selected Answer:
Incorrectc.
Central
Answers:
Correcta.
Semantic (!)
b.
Intelligent
c.
Central
d.
Knowledge
A company’s ____ oversees routing transaction processing and information systems activities, as well as other computer-related areas.
Selected Answer:
Incorrectc.
chief data officer (CDO)
Answers:
a.
chief security officer (CSO)
Correctb.
chief information officer (CIO) (!)
c.
chief data officer (CDO)
d.
chief executive officer (CEO)
A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network.
Selected Answer:
Correctd.
worm
Answers:
a.
virus
b.
hacker
c.
software
Correctd.
worm (!)
The ____ contains all data definitions for a database, including table structures, security information, relationships between the tables in the database, and so on.
Selected Answer:
Correctb.
data dictionary
Answers:
a.
database book
Correctb.
data dictionary (!)
c.
data box
d.
data book
____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.
Selected Answer:
Correctb.
Passwords
Answers:
a.
Usernames
Correctb.
Passwords (!)
c.
PINs
d.
Codes
An inventory management system that goes beyond just inventory to act as a complete distribution system is referred to as a ____ management system (WMS).
Selected Answer:
Correctb.
warehouse
Answers:
a.
warranted
Correctb.
warehouse (!)
c.
wireless
d.
world
External hard drives today typically connect to a computer via a USB or ____ port.
Selected Answer:
Correctd.
FireWire
Answers:
a.
IrDA
b.
Bluetooth
c.
Firewall
Correctd.
FireWire (!)
The most common type of database used on PCs today is a(n) ____.
Selected Answer:
Incorrectc.
two-way database
Answers:
Correcta.
relational database (!)
b.
concurrent database
c.
two-way database
d.
one-dimensional database
With the ____, businesses sell goods or services to individual consumers.
Selected Answer:
Correctc.
business-to-consumer (B2C) model
Answers:
a.
business-to-business (B2B) model
b.
consumer-to-consumer (C2C) model
Correctc.
business-to-consumer (B2C) model (!)
d.
business-to-government (B2G) model
____ is a software development approach that continues the programming trend of breaking a software program into small and more manageable pieces that overlap in functionality as little as possible.
Selected Answer:
Incorrecta.
Object-Oriented Programming (OOP)
Answers:
a.
Object-Oriented Programming (OOP)
Correctb.
Aspect-oriented programming (AOP) (!)
c.
Structured programming
d.
Object Programming (OP)
Filenames typically include a ____ at the end of the filename.
Selected Answer:
Incorrectb.
file subname
Answers:
a.
file attachment
b.
file subname
Correctc.
file extension (!)
d.
file subscript
Charts are inserted into an Excel spreadsheet using the commands in the Charts group on the ____ tab on the Ribbon.
Selected Answer:
Incorrectd.
Data
Answers:
a.
Tools
Correctb.
Insert (!)
c.
Format
d.
Data
A ____ is a large screen computer either built into a table or designed to be used on a table and that allows multi-touch input from multiple users.
Selected Answer:
Correctc.
table PC
Answers:
a.
digitizing tablet
b.
touch coding system
Correctc.
table PC (!)
d.
tactile feedback screen
____ is a video format developed by Microsoft for use with Windows Media Player.
Selected Answer:
Correctd.
.wmv
Answers:
a.
.avi
b.
.mov
c.
.mp3
Correctd.
.wmv (!)
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.
Selected Answer:
Correcta.
threat definitions
Answers:
Correcta.
threat definitions (!)
b.
fraud tips
c.
virus reports
d.
viruses
____ is the process of gathering, storing, accessing, and analyzing data about a company in order to make better business decisions.
Selected Answer:
Correctb.
Business intelligence
Answers:
a.
Business flowchart
Correctb.
Business intelligence (!)
c.
System architecture
d.
Enterprise architecture
A USB ____ is a device that plugs into your PC’s USB port to convert one port into several USB ports.
Selected Answer:
Incorrectc.
bus
Answers:
a.
module
Correctb.
hub (!)
c.
bus
d.
connector
A personal computer (PC) or ____ is a small computer system designed to be used by one person at a time.
Selected Answer:
Correctc.
microcomputer
Answers:
a.
microchip
b.
small processor
Correctc.
microcomputer (!)
d.
processor
Smart cards and holographic drives are examples of ____ systems.
Selected Answer:
Incorrectd.
artificial intelligence
Answers:
a.
Wi-Fi
Correctb.
storage (!)
c.
satellite
d.
artificial intelligence
Although many of us may prefer not to think about it, ____—the complete malfunction of a computer system—and other types of computer-related disasters do happen.
Selected Answer:
Correctb.
system failure
Answers:
a.
interrupted power
Correctb.
system failure (!)
c.
spikes
d.
software piracy
Case-Based Critical Thinking Questions

Case 1-1
Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she can keep track of her client’s accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties.

Sarah needs to store digital photographs of houses she is previewing. She needs to be able to copy these to the computer at her office. What type of storage device should she use?

Selected Answer:
Incorrectd.
firewire port
Answers:
a.
data projector
Correctb.
USB flash drive (!)
c.
scanner
d.
firewire port
____ is a specialized agency of the United Nations and attempts to resolve international commercial disputes about intellectual property between private parties.
Selected Answer:
Correctb.
WIPO
Answers:
a.
OLPC
Correctb.
WIPO (!)
c.
USPTO
d.
DRM
____ are used for marketing purposes, such as sending advertisements that fit each individual’s interests or trying to sign people up over the phone for some type of service.
Selected Answer:
Correctb.
Marketing databases
Answers:
a.
Government databases
Correctb.
Marketing databases (!)
c.
Educational databases
d.
Research databases
One type of nonvolatile RAM, called MRAM, uses ____ polarization rather than an electrical charge to store data.
Selected Answer:
Incorrectb.
magnetocharged
Answers:
a.
magnetobalanced
b.
magnetocharged
Correctc.
magnetic (!)
d.
magnetoselective
One factor affecting digital camera quality is the number of pixels, measured in ____, used to store the data for each image.
Selected Answer:
Correctb.
megapixels
Answers:
a.
kilopixels
Correctb.
megapixels (!)
c.
gigapixels
d.
terapixels
____ was originally developed as a programming language designed for processing text.
Selected Answer:
Incorrecta.
JavaScript
Answers:
a.
JavaScript
Correctb.
Perl (!)
c.
AJAX
d.
ActiveX
____ are useful for identifying procedures and summarizing the decision making process for one step of a system.
Selected Answer:
Incorrecta.
Data dictionaries
Answers:
a.
Data dictionaries
b.
Feasibility reports
c.
Entity-relationship diagrams
Correctd.
Decision tables (!)
The ____ enables up to 127 devices to be connected to a computer through a single port on the computer’s system unit.
Selected Answer:
Correcta.
USB standard
Answers:
Correcta.
USB standard (!)
b.
HyperTransport bus
c.
AGP (Accelerated Graphics Port) bus
d.
PCI Express Bus
The file management program incorporated into Windows 8 is ____.
Selected Answer:
Incorrecta.
Disk Cleanup
Answers:
a.
Disk Cleanup
b.
StuffIt
Correctc.
File Explorer (!)
d.
WinZip
One of the properties that can be assigned to a field is a(n) ____ to specify the format (such as letters, numbers, or symbols) that must be entered into a field.
Selected Answer:
Incorrectd.
format structure
Answers:
Correcta.
input mask (!)
b.
data filter
c.
data mask
d.
format structure
____ have begun to replace ROM for storing system information, such as a PC’s BIOS.
Selected Answer:
Correcta.
Flash memory chips
Answers:
Correcta.
Flash memory chips (!)
b.
Microprocessors
c.
Adapter cards
d.
Motherboards
Case-Based Critical Thinking Questions

Case 13-2
Kelly is a college sophomore majoring in computer science. She is interested in gaining exposure to the most useful and current programming languages and techniques.

One of the languages that Kelley is learning is ____ an object-oriented programming language that is commonly used to write Web applications.

Selected Answer:
Incorrectd.
Visual Basic
Answers:
a.
C
b.
COBOL
Correctc.
Java (!)
d.
Visual Basic
____ is the process of building the Web site, including developing all of the components to be used on the Web site, creating the actual Web pages, testing the site, and publishing the site.
Selected Answer:
Incorrecta.
Web site design
Answers:
a.
Web site design
b.
Web site planning
Correctc.
Web site development (!)
d.
Web site deployment
Plasma displays use a layered technology like LCD and ____ and look
similar to LCD displays.
Selected Answer:
Correctc.
OLED
Answers:
a.
SED
b.
IMOD
Correctc.
OLED (!)
d.
PHOLED
Case-Based Critical Thinking Questions

Case 3-2
Rodney owns a computer that he uses to work, keep in touch with friends and family, watch movies, listen to music, and use the Internet.

If Rodney wants to be able to record, erase, and overwrite the files on a CD, he should get a ____.

Selected Answer:
Incorrectb.
CD-BD
Answers:
a.
CD-R
b.
CD-BD
Correctc.
CD-RW (!)
d.
CD-HD
The Windows ____ shown in the accompanying figure contains the following objects: Windows, Icons, Menus, Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.
Selected Answer:
Incorrectd.
command
Answers:
a.
general menu
Correctb.
desktop (!)
c.
toolbox
d.
command
For designing the layout of a Web page, ____ are commonly used when designing animated components.
Selected Answer:
Incorrecta.
page layouts
Answers:
a.
page layouts
b.
flowcharts
Correctc.
storyboards (!)
d.
plots
Conventional dial-up connects to the Internet at a maximum of ____.
Selected Answer:
Incorrectd.
128 Kbps
Answers:
a.
10.2 Kbps
b.
28.8 Kbps
Correctc.
56 Kbps (!)
d.
128 Kbps
____ identify users by a particular unique biological characteristic.
Selected Answer:
Correcta.
Biometric access systems
Answers:
Correcta.
Biometric access systems (!)
b.
Possessed object access systems
c.
Possessed knowledge access systems
d.
Password access systems
A ____ is a group of values and other data organized into rows and columns, similar to the ruled paper worksheets traditionally used by bookkeepers and accountants.
Selected Answer:
Correctd.
spreadsheet
Answers:
a.
cell
b.
document
c.
block
Correctd.
spreadsheet (!)
A ____ holds a single category of data (such as customer names or employee telephone numbers) that will be stored in a database.
Selected Answer:
Incorrectb.
record
Answers:
Correcta.
field (!)
b.
record
c.
cell
d.
table
A ____ is the smallest unit of data that a binary computer can recognize.
Selected Answer:
Incorrectb.
byte
Answers:
a.
datum
b.
byte
Correctc.
bit (!)
d.
pixel
The earliest programming languages—machine language and assembly language—are referred to as ____.
Selected Answer:
Incorrectb.
procedural programming languages
Answers:
a.
third-generation programming languages (3GLs)
b.
procedural programming languages
c.
interpreted languages
Correctd.
low-level languages (!)
A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____.
Selected Answer:
Incorrectd.
e-scams
Answers:
a.
dot frauds
Correctb.
dot cons (!)
c.
e-cons
d.
e-scams
One of the most straightforward ways to improve the quality of the hits returned in a search is to use ____—essentially typing more than one keyword in a keyword search.
Selected Answer:
Incorrecta.
character searching
Answers:
a.
character searching
b.
index searching
c.
code searching
Correctd.
phrase searching (!)
Print speed is typically measured in ____.
Selected Answer:
Incorrectb.
dots per second (dps)
Answers:
Correcta.
pages per minute (ppm) (!)
b.
dots per second (dps)
c.
characters per second(cps)
d.
pixels per minute (ppm)
Popular drawing programs include ____ and CorelDRAW.
Selected Answer:
Correcta.
Adobe Illustrator
Answers:
Correcta.
Adobe Illustrator (!)
b.
Harvard Graphics
c.
Corel Paint Shop Pro
d.
IBM Storyboard
____ memory allows you to use more memory than is physically available on your computer.
Selected Answer:
Correctb.
Virtual
Answers:
a.
Multithreading
Correctb.
Virtual (!)
c.
Buffer
d.
Shared
____ refers to identifying the browser used by each visitor, typically via JavaScript code.
Selected Answer:
Incorrectb.
Browser mapping
Answers:
a.
Personalization
b.
Browser mapping
c.
Visitor identification
Correctd.
Browser sniffing (!)
Case-Based Critical Thinking Questions

Case 7-2
Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network.

Gabrielle is planning to connect selected devices to the network wirelessly with a wireless ____.

Selected Answer:
Incorrectb.
hub
Answers:
a.
hotspot
b.
hub
c.
data point
Correctd.
access point (!)
Adding to the problem of unethical ____ is the use of digital cameras today, which eliminate the photo negatives that could be used with film cameras to show what photographs actually looked like at the time they were taken.
Selected Answer:
Correctd.
digital manipulation
Answers:
a.
identity theft
b.
cybersquatting
c.
digital counterfeiting
Correctd.
digital manipulation (!)
Hollerith’s machine was used to process the 1890 U.S. Census data and was able to complete the task in ____, instead of the decade it usually took to process the data by hand.
Selected Answer:
Incorrectb.
four years
Answers:
a.
two months
b.
four years
Correctc.
two and a half years (!)
d.
six years
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.
Selected Answer:
Correctd.
threat definitions
Answers:
a.
virus reports
b.
viruses
c.
fraud tips
Correctd.
threat definitions (!)
There are independent Web sites (such as the ____ Web site) that report on the validity of current online rumors and stories.
Selected Answer:
Incorrecta.
Identifier
Answers:
a.
Identifier
b.
Phisher
Correctc.
Snopes (!)
d.
Spammer
Case-Based Critical Thinking Questions

Case 14-2
The JL Group is a political think tank that is incorporating new media into their analyses.

The JL Group has gathered data on voting habits. In order to make sure that respondents cannot claim to have voted in more elections than is possible given their age, ____ rules can be assigned to the database tables.

Selected Answer:
Incorrectd.
index validation
Answers:
a.
dynamic
b.
DBA validation
Correctc.
record validation (!)
d.
index validation
In a 16.8-million-color (called photographic quality or ____) image, three bytes (24 bits) are used to store the color data for each pixel in the image.
Selected Answer:
Incorrectb.
mega color
Answers:
a.
real color
b.
mega color
c.
full color
Correctd.
true color (!)
Rearranging the data on the hard drive so all files are stored in contiguous locations is called ____.
Selected Answer:
Incorrectb.
disk backup
Answers:
Correcta.
disk defragmentation (!)
b.
disk backup
c.
file compression
d.
disk cleanup
____ bring buyers and sellers together to facilitate transactions between the two parties.
Selected Answer:
Correctb.
Brokerage sites
Answers:
a.
E-tailers
Correctb.
Brokerage sites (!)
c.
M-Brokers
d.
Shop carts
Some ____ must be added in pairs for optimal performance.
Selected Answer:
Incorrectb.
interfaces
Answers:
Correcta.
memory modules (!)
b.
interfaces
c.
hard drives
d.
USB ports
____ store checkout information in the customer’s account for use with purchases on that site only.
Selected Answer:
Incorrectc.
Site-specific online payment accounts
Answers:
a.
Site-specific electronic check accounts
b.
Site-specific smart cards
c.
Site-specific online payment accounts
Correctd.
Site-specific digital wallets (!)
The most common flat-panel technologies include liquid crystal display (LCD), various types of light emitting diode (LED), and ____.
Selected Answer:
Incorrectb.
HDTV
Answers:
Correcta.
gas plasma (!)
b.
HDTV
c.
HD-integrated
d.
DVR
Case-Based Critical Thinking Questions

Case 7-2
Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network.

Gabrielle is planning to connect selected devices to the network wirelessly with a wireless ____.

Selected Answer:
Incorrectc.
hotspot
Answers:
a.
hub
Correctb.
access point (!)
c.
hotspot
d.
data point
Ultraportables conforming to Intel’s standards can be marketed as ____.
Selected Answer:
Incorrecta.
hybrids
Answers:
a.
hybrids
Correctb.
Ultrabooks (!)
c.
smallframe computers
d.
IntelBooks
Data definition involves describing the properties of the data that go into each database table, specifically the ____ that make up the database.
Selected Answer:
Incorrecta.
records
Answers:
a.
records
Correctb.
fields (!)
c.
characters
d.
rows
Program ____ use graphic symbols and relational operators (such as < for "less than" and = for "equal to") to portray the sequence of steps needed to fulfill the logic in that program, module, or method.
Selected Answer:
Incorrectc.
pseudocode
Answers:
Correcta.
flowcharts (!)
b.
structure charts
c.
pseudocode
d.
models
Middleware for Web database applications is commonly written as ____—short sections of code written in a programming or scripting language that are executed by another program.
Selected Answer:
Incorrectb.
JavaScripts
Answers:
Correcta.
scripts (!)
b.
JavaScripts
c.
applets
d.
utilities
Case 8-2
Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports.

Brenda also orders movies and television through the Internet via a(n) ____ provider, which allows users to download video for a small fee.

Selected Answer:
Incorrectc.
RSS
Answers:
a.
VoIP
Correctb.
VOD (!)
c.
RSS
d.
blog
One advantage of a dial-up connection is ____.
Selected Answer:
Incorrecta.
connection speed
Answers:
a.
connection speed
Correctb.
security (!)
c.
continuous availability
d.
sharing the connection
A(n) ____ is a form of protection available to the creator of an original artistic or literary work, such as a book, movie, software program, musical composition, or painting.
Selected Answer:
Incorrectb.
patent
Answers:
a.
intellectual ownership right
b.
patent
Correctc.
copyright (!)
d.
trademark
One of the most common painting programs is ____.
Selected Answer:
Incorrecta.
Adobe’s Acrobat
Answers:
a.
Adobe’s Acrobat
b.
IBM’s Storyboard
Correctc.
Microsoft Paint (!)
d.
Macromedia’s Dreamweaver
One measurement of the speed of a CPU is the ____, which is rated in megahertz (MHz) or gigahertz (GHz).
Selected Answer:
Incorrectb.
CPU rpm
Answers:
a.
system rpm
b.
CPU rpm
Correctc.
CPU clock speed (!)
d.
system speed
____ is increasingly being tied to crime and even death in some countries.
Selected Answer:
Incorrectc.
OLPC
Answers:
a.
CVS
b.
CAD
c.
OLPC
Correctd.
Internet addiction (!)
____ devices are designed to withstand much more physical abuse than conventional devices.
Selected Answer:
Correctd.
Ruggedized
Answers:
a.
Secured
b.
Malleable
c.
Flexible
Correctd.
Ruggedized (!)
Artificial intelligence systems that attempt to imitate the way a human brain works are called ____.
Selected Answer:
Incorrectb.
robots
Answers:
a.
biometric systems
b.
robots
c.
expert systems
Correctd.
neural networks (!)
RAID 0 uses disk ____, which spreads files over several disk drives.
Selected Answer:
Incorrecta.
mirroring
Answers:
a.
mirroring
b.
burning
c.
clustering
Correctd.
striping (!)
To record data, holographic storage systems split the light from a blue laser beam into ____ beams.
Selected Answer:
Correcta.
two
Answers:
Correcta.
two (!)
b.
four
c.
five
d.
ten
A ____ is a separate piece of hardware containing multiple high-speed hard drives.
Selected Answer:
Correctb.
storage server
Answers:
a.
storage drive
Correctb.
storage server (!)
c.
storage client
d.
storage base
In reaction to scandals, Congress passed the Sarbanes-Oxley Act of 2002, which includes provisions to require ____ to personally vouch for the truth and fairness of their company’s disclosures.
Selected Answer:
Incorrecta.
CEOs and CIOs
Answers:
a.
CEOs and CIOs
b.
CCVs and DRMs
Correctc.
CEOs and CFOs (!)
d.
SOAs and DRMs
____ are utility programs that search for documents and other files on a user’s hard drives.
Selected Answer:
Incorrectc.
Search engines
Answers:
Correcta.
Search tools (!)
b.
Tool boxes
c.
Search engines
d.
Tool programs
Like graphics data, ____—such as a song or the sound of someone speaking—must be in digital form in order to be stored on a storage medium or processed by a PC.
Selected Answer:
Incorrecta.
pixel data
Answers:
a.
pixel data
Correctb.
audio data (!)
c.
giga data
d.
audio programs
Digital still cameras most often use ____ cards for storage.
Selected Answer:
Incorrecta.
RAM memory
Answers:
a.
RAM memory
b.
ROM memory
c.
laser memory
Correctd.
flash memory (!)
____ have begun to replace ROM for storing system information, such as a PC’s BIOS.
Selected Answer:
Incorrectb.
Motherboards
Answers:
a.
Microprocessors
b.
Motherboards
Correctc.
Flash memory chips (!)
d.
Adapter cards
Media that allow random access are sometimes referred to as ____ media.
Selected Answer:
Incorrectc.
nonidentifiable
Answers:
a.
optical
Correctb.
addressable (!)
c.
nonidentifiable
d.
identifiable
Java is currently one of the most popular programming languages and has replaced ____ as the programming language used for the computer science Advanced Placement exam taken by high school students to earn college credit.
Selected Answer:
Incorrectb.
BASIC
Answers:
a.
Visual Basic
b.
BASIC
Correctc.
C++ (!)
d.
C
Case-Based Critical Thinking Questions

Case 6-2
Bryan has just started an internship in which he uses a database frequently. The database contains information about the company’s employees. Bryan’s supervisor senses that he is anxious about using the database and drops by to give him a short tutorial.

Bryan’s supervisor explains that to retrieve information from the database, Bryan needs to use a ____.

Selected Answer:
Incorrectd.
formula
Answers:
a.
form
b.
presentation
Correctc.
query (!)
d.
formula
Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ____ uniquely identifies a Web page.
Selected Answer:
Incorrecta.
Web ID (WID)
Answers:
a.
Web ID (WID)
b.
universal resource identifier (URI)
Correctc.
uniform resource locator (URL) (!)
d.
Web resource identifier (WRI)
Case-Based Critical Thinking Questions

Case 12-2

Mother Goose Computing, Inc. provides computational biology consulting services. They are currently updating several of their systems.

For the protein folding division, Mother Goose is planning to implement the new system module by module. This is called a ____ conversion.

Selected Answer:
Incorrectd.
pilot
Answers:
a.
direct
b.
parallel
Correctc.
phased (!)
d.
pilot
Copyrights apply to both published and unpublished works and remain in effect until ____.
Selected Answer:
Incorrecta.
10 years after the creation of the work
Answers:
a.
10 years after the creation of the work
b.
70 years after the creation of the work
c.
10 years after the creator’s death
Correctd.
70 years after the creator’s death (!)
Case-Based Critical Thinking Questions

Case 10-1

Smith Web Design is creating a secure Web site for a local doctor. In addition to providing basic information about her practice, she wants her patients to be able to log on and access their records, including images such as X-rays and MRIs.

After patients log on, they should be able to download scanned versions of their X-rays and MRIs. These images should be provided in the ____ format.

Selected Answer:
Incorrectd.
JPEG
Answers:
a.
GIF
b.
BMP
Correctc.
TIF (!)
d.
JPEG
One of the simplest hashing algorithms involves dividing the primary key field by a particular ____.
Selected Answer:
Correctd.
prime number
Answers:
a.
irrational number
b.
power of two
c.
transcendental number
Correctd.
prime number (!)
The process of evaluating and correcting the structures of the tables in a database to minimize data redundancy is called ____.
Selected Answer:
Incorrectd.
cyclic redundancy check
Answers:
a.
zeroing
Correctb.
normalization (!)
c.
zonification
d.
cyclic redundancy check
____ keys on a keyboard are used for issuing commands in some programs.
Selected Answer:
Incorrectc.
Alphanumeric
Answers:
a.
Arrow
Correctb.
Function (!)
c.
Alphanumeric
d.
Number
____ account numbers are essentially disposable credit card numbers that can be used to buy goods and services that will be charged to the customer’s regular credit card.
Selected Answer:
Incorrectb.
Online
Answers:
Correcta.
Virtual (!)
b.
Online
c.
Temporary
d.
Prepaid
When Mary started college, her parents bought her a new computer that came with minimal software. She is now looking into purchasing additional software.

Mary needs word processing software for her classes, but she has to budget her resources carefully this semester. She might consider using ____, which is available as a free download via the Internet.

Selected Answer:
Correctb.
OpenOffice
Answers:
a.
WordPerfect Office
Correctb.
OpenOffice (!)
c.
Microsoft Office
d.
SmartSuite.org
In an expert system, the ____ is a software program that applies the rules to the data stored in the knowledge base in order to reach decisions.
Selected Answer:
Incorrectd.
rules processor
Answers:
Correcta.
inference engine (!)
b.
knowledge bus
c.
data authority
d.
rules processor
There are four basic categories of software: commercial software, shareware, freeware, and ____.
Selected Answer:
Incorrectc.
licensed software
Answers:
Correcta.
public domain software (!)
b.
publish software
c.
licensed software
d.
advertising software
To prevent individuals from making unauthorized copies of feature films purchased on DVDs or downloaded via the Internet, many of these items contain copy protection or some other form of ____.
Selected Answer:
Incorrectc.
RSI
Answers:
Correcta.
DRM (!)
b.
AACSB
c.
RSI
d.
patents
___ is a new alternative for homes and businesses today in areas where there is fiber optic cabling available all the way to the building.

S

elected Answer:
Incorrectc.
DSL
Answers:
Correcta.
BoF (!)
b.
ISDN
c.
DSL
d.
T1
Some wireless ____ are created by cities or large organizations to provide free or low-cost Internet access to residents of a particular area.
Selected Answer:
Incorrectd.
LANs
Answers:
a.
WANs
b.
PANs
Correctc.
MANs (!)
d.
LANs
____ software can control which devices can be connected to an employee’s computer.
Selected Answer:
Incorrecta.
Device authentication
Answers:
a.
Device authentication
Correctb.
Data-leakage prevention(!)
c.
Network quarantine
d.
Professional firewall
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.
Selected Answer:
Incorrectc.
identity theft
Answers:
a.
DoS attacks
b.
spamming
c.
identity theft
Correctd.
typosquatting (!)

Need essay sample on "IST Practice Cheat Sheet"? We will write a custom essay sample specifically for you for only .90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register
Signup & Access Essays

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy