Multiple Choice Identify the letter of the choice that best completes the statement or answers the question.  | ||||||||||||||||
1.  | Two types of system software are ____. 
 
  | |||||||||||||||
2.  | A cross-platform program is one that has ____ on multiple operating systems. 
 
  | |||||||||||||||
3.  | With Windows XP, a warm boot can be performed by ____. 
 
  | |||||||||||||||
4.  | In Windows XP, the ____ consists of several files that contain the system configuration information. 
 
  | |||||||||||||||
5.  | In Windows XP, the ____ contains a list of programs that open automatically when users boot the computer. 
 
  | |||||||||||||||
6.  | A ____ provides lists of options as a means of entering commands. 
 
  | |||||||||||||||
7.  | With virtual memory, which is illustrated in the accompanying figure, a ____ is the amount of data and program instructions that can swap at a given time. 
 
  | |||||||||||||||
8.  | With virtual memory, which is illustrated in the accompanying figure, when an operating system spends much of its time paging, instead of executing application software, it is said to be ____. 
 
  | |||||||||||||||
9.  | If a new device, such as a printer or scanner, is attached to a computer, its ____ must be installed before the device can be used. 
 
  | |||||||||||||||
10.  | The person overseeing network operations, called the ____, uses the network OS to add and remove users, computers, and other devices to and from a network. 
 
  | |||||||||||||||
11.  | While entering a ____, most computers hide the actual characters by displaying some other characters, such as asterisks (*) or dots. 
 
  | |||||||||||||||
12.  | ____ is the process of encoding data and information into an unreadable form. 
 
  | |||||||||||||||
13.  | Utility programs included with most operating systems provide all of the following functions except ____. 
 
  | |||||||||||||||
14.  | Windows XP includes a file manager called ____. 
 
  | |||||||||||||||
15.  | Windows XP includes an image viewer called ____. 
 
  | |||||||||||||||
16.  | In Windows XP, the uninstaller is available through the ____ command in the Control Panel. 
 
  | |||||||||||||||
17.  | ____ a disk, or reorganizing it so the files are stored in contiguous sectors, speeds up disk access and thus the performance of the entire computer. 
 
  | |||||||||||||||
18.  | Windows XP includes the diagnostic utility, ____, which diagnoses problems as well as suggests courses of action. 
 
  | |||||||||||||||
19.  | Many backup programs ____, or shrink the size of, files during the backup process. 
 
  | |||||||||||||||
20.  | Screen savers originally were developed to prevent a problem called ____, in which images could be permanently etched on a monitor’s screen. 
 
  | |||||||||||||||
21.  | Examples of stand-alone operating systems include all of the following except ____. 
 
  | |||||||||||||||
22.  | When first developed by Microsoft, ____ used a command-line interface, but later versions included both command-line and menu driven user interfaces. 
 
  | |||||||||||||||
23.  | ____ is available in three editions: Home Edition, Professional, and Tablet PC Edition. 
 
  | |||||||||||||||
24.  | ____ includes features from previous Apple computer operating systems, such as large photo-quality icons, built-in networking support, and enhanced speech recognition. 
 
  | |||||||||||||||
25.  | ____ has been used by businesses because of IBM’s long association with business computing and the operating system’s strong networking support. 
 
  | |||||||||||||||
26.  | Examples of network operating systems include all of the following except ____. 
 
  | |||||||||||||||
27.  | Like Linux, ____ is a multipurpose operating system because it is both a stand-alone and network operating system. 
 
  | |||||||||||||||
28.  | Popular embedded operating systems include all of the following except ____. 
 
  | |||||||||||||||
29.  | ____, which is used on PDAs such as the Sony CLIE, supports handwriting recognition software called Graffiti. 
 
  | |||||||||||||||
30.  | A ____ is a program that acts without a user’s knowledge and deliberately alters a computer’s operations. 
 
  | |||||||||||||||
31.  | A ____ does not replicate itself to other computers. 
 
  | |||||||||||||||
32.  | Compressing files ____ system performance. 
 
  | |||||||||||||||
33.  | Compress files, sometimes called ____. 
 
  | |||||||||||||||
34.  | Two examples of ____ are cable television lines and telephone lines. 
 
  | |||||||||||||||
35.  | A type of communications device that connects a communications channel to a sending or receiving device is a ____. 
 
  | |||||||||||||||
36.  | ____ can serve as sending and receiving devices in a communications system. 
 
  | |||||||||||||||
37.  | ____ allows users to share documents with others in real time. 
 
  | |||||||||||||||
38.  | Groupware is a component of a broad concept called ____, which includes network hardware and software that enables group members to communicate, manage projects, schedule meetings, and make decisions. 
 
  | |||||||||||||||
39.  | A GPS receiver is a handheld, mountable, or embedded device that contains all of the following except a(n) ____. 
 
  | |||||||||||||||
40.  | A voice mailbox is a(n) ____ in a voice mail system. 
 
  | |||||||||||||||
41.  | A ____ is a legal agreement that permits users to install software on multiple computers, usually at a volume discount. 
 
  | |||||||||||||||
42.  | A ____ is a network that connects computers and devices in a limited geographical area, such as a home, school computer laboratory, or office building. 
 
  | |||||||||||||||
43.  | A ____ is a high-speed network that connects networks in an area such as a city or town and handles the bulk of communications activity across that region. 
 
  | |||||||||||||||
44.  | A ____ is a network that covers a large geographical area, such as a country or the world, using a communications channel that combines many types of media. 
 
  | |||||||||||||||
45.  | A file server is a dedicated server that ____. 
 
  | |||||||||||||||
46.  | A print server is a dedicated server that ____. 
 
  | |||||||||||||||
47.  | A database server is a dedicated server that ____. 
 
  | |||||||||||||||
48.  | A network server is a dedicated server that ____. 
 
  | |||||||||||||||
49.  | On a ____, such as that illustrated in the accompanying figure, all of the computers and devices (nodes) on the network connect to a central device. 
 
  | |||||||||||||||
50.  | On a star network, such as that illustrated in the accompanying figure, the central device that provides a common connection point for nodes on the network is called the ____. 
 
  | |||||||||||||||
51.  | On a star network, such as that illustrated in the accompanying figure, if one node fails ____. 
 
  | |||||||||||||||
52.  | Today, ____ is the most popular LAN technology because it is relatively inexpensive and easy to install and maintain. 
 
  | |||||||||||||||
53.  | Internet transmissions commonly use ____. 
 
  | |||||||||||||||
54.  | When a computer sends data over the Internet, the data is divided into small pieces, or ____. 
 
  | |||||||||||||||
55.  | The technique of breaking a message into individual packets, sending the packets along the best route available, and then reassembling the data is called ____. 
 
  | |||||||||||||||
56.  | One popular use of the ____ standard is in public Internet access points that offer mobile users the ability to connect to the Internet with their wireless computers and devices. 
 
  | |||||||||||||||
57.  | Communications software consists of programs that ____. 
 
  | |||||||||||||||
58.  | Although ____ are not a type of standard telephone line, they are a very popular type of dedicated line that allows a home user to connect to the Internet. 
 
  | |||||||||||||||
59.  | With ISDN, the same telephone line that could carry only one computer signal now can carry three or more signals at once through the same line, using a technique called ____. 
 
  | |||||||||||||||
60.  | DSL is much ____ data transfer rates. 
 
  | |||||||||||||||
61.  | The most popular T-carrier line is the ____. 
 
  | |||||||||||||||
62.  | A T3 line is ____. 
 
  | |||||||||||||||
63.  | A ____ is a device that provides a central point for cables in a network. 
 
  | |||||||||||||||
64.  | A networked computer in a house can ____. 
 
  | |||||||||||||||
65.  | A(n) ____ extends the basic home network to include features such as lighting control, thermostat adjustment, and a security system. 
 
  | |||||||||||||||
66.  | Physical transmission media used in communications include all of the following except ____. 
 
  | |||||||||||||||
67.  | Fiber-optic cables have all of the following advantages over cables that use wire except ____. 
 
  | |||||||||||||||
68.  | ____ is a computer phrase that means users cannot create correct information from data that is incorrect. 
 
  | |||||||||||||||
69.  | Accurate information ____. 
 
  | |||||||||||||||
70.  | Organized information ____. 
 
  | |||||||||||||||
71.  | Useful information ____. 
 
  | |||||||||||||||
72.  | A database contains files, a file contains ____. 
 
  | |||||||||||||||
73.  | ____ is a common data type that consists of dollar and cent amounts or numbers containing decimal values. 
 
  | |||||||||||||||
74.  | ____ is a common data type that consists of Web addresses that link to a document or Web page. 
 
  | |||||||||||||||
75.  | Users add new records to a file ____. 
 
  | |||||||||||||||
76.  | ____, a user deletes it from a file. 
 
  | |||||||||||||||
77.  | When a program flags a deleted record, the record ____ process it. 
 
  | |||||||||||||||
78.  | Deleting unneeded files ____ storage space. 
 
  | |||||||||||||||
79.  | If the lowest monthly fee at a fitness center is $20.25 and the highest is $55.50, a(n) ____ on the Monthly Fee field ensures it is a value between $20.25 and $55.50. 
 
  | |||||||||||||||
80.  | A(n) ____ tests the data in two or more associated fields to ensure that the relationship is logical. 
 
  | |||||||||||||||
81.  | A program determines the ____ by applying a formula to the numbers in the primary key. 
 
  | |||||||||||||||
82.  | A major weakness of a lot of file processing systems is that ____. 
 
  | |||||||||||||||
83.  | A(n) ____ program interacts with a DBMS, which in turn interacts with the database. 
 
  | |||||||||||||||
84.  | When compared with a file processing system, a database offers all of the following except ____. 
 
  | |||||||||||||||
85.  | A DBMS uses the ____ to perform validation checks. 
 
  | |||||||||||||||
86.  | Commonly used methods to retrieve and maintain data include all of the following except ____. 
 
  | |||||||||||||||
87.  | Although a query language can be used for other purposes, most users only ____ data with a query language. 
 
  | |||||||||||||||
88.  | A personal trainer with ____ privileges to the e-mail addresses in a fitness club database could view the addresses but not change them. 
 
  | |||||||||||||||
89.  | To ensure privacy, members would have ____ privileges to the data in a fitness club database. 
 
  | |||||||||||||||
90.  | In a relational database, each row ____. 
 
  | |||||||||||||||
91.  | A user of a relational database, such as that pictured in the accompanying figure, refers to a file as a ____. 
 
  | |||||||||||||||
92.  | A user of a relational database, such as that pictured in the accompanying figure, refers to a record as a ____. 
 
  | |||||||||||||||
93.  | A user of a relational database, such as that pictured in the accompanying figure, refers to a field as a ____. 
 
  | |||||||||||||||
94.  | In a relational database, such as that pictured in the accompanying figure, a ____ is a connection within the data. 
 
  | |||||||||||||||
95.  | Compared with relational databases, object-oriented databases ____. 
 
  | |||||||||||||||
96.  | A ____ stores images, audio clips, and/or video clips. 
 
  | |||||||||||||||
97.  | A ____ stores data about engineering, architectural, and scientific designs. 
 
  | |||||||||||||||
98.  | Many e-commerce sites use ____ to determine customer preferences. 
 
  | |||||||||||||||
99.  | To access data in a ____, users fill in a form on a Web page. 
 
  | |||||||||||||||
100.  | Many search engines use databases to store Web site descriptions; thus, the search engine’s home page is the ____ to the database. 
 
  | |||||||||||||||
Thursday, May 5, 2011
Network Security Plus Questions and Answers Test 3
Test 3 Study Guide
Labels:
Answers,
Network security,
Questions,
security,
security plus
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment