Transistors are simply small electronic switches that can be in either an on or an off state
A capacitor consists of three parts: an emitter, a collector, and a base
A truth table with two inputs would have two rows
The Boolean OR operator returns a 1 only when either or both of the inputs are 1
The AND operator has an output of 1 (true) only if both inputs are 0
The combinations of gates enables the computer to do all the things that it does
Each gate in a circuit reacts in a completely unpredictable way
The OR gate allows two inputs and one output
The NOR gate is a combination of an OR gate and a(n) NAND gate
In the adder, the bits are added according to the rules of the hexadecimal numbering system
Decoder circuits perform functions such as addressing memory and selecting I/O devices
The flip-flop circuit latches onto a bit and maintains the output state until it’s changed
Boolean expressions cannot be used to accurately predict what a circuit will do
The computer has a crystal clock called a control clock that times, or synchronizes, each of the steps in the fetch-execute cycle
Control wires contain the binary data that is being read from or written to memory and I/0
Bus wires are divided into six separate signal groups
The bus signal group data contains a clock-timing signal for the bus as well as other wires pertaining to timing and the bus protocol
ROM isn’t erased when the computer power goes off
RAM is volatile, meaning that when the power goes off, RAM is cleared
The most commonly used form of mass storage is the floppy disk drive
Flash memory is nonvolatile
There are seven levels of RAID
The mouse serves as a primary input device
CRT displays are much thinner and run at a much cooler temperature than LCD monitors
Interrupt handling is a much more efficient method for processing I/0 than polling
By switching on and off, the ____ can be used to represent the 1s and 0s that are the foundation of all that goes on in the computer
____ algebra is concerned with the logic of the operators AND, OR, and NOT
The ____ operator works with a single input, and its purpose is to reverse the input
A transistor-based circuit in the computer that implements Boolean logic by creating a single output value for a given set of input values is known as a ____
The ____ gates are the basic building blocks of the CPU
The NAND gate takes the output of the AND gate and then ____ it with the NOT gate
The truth table for the ____ gate indicates that the output is 1 only when the inputs are different
A gate’s output for any set of inputs follows the specifications given in the ____ table
One of the main functions of the ____ of the computer’s CPU is to add numbers.
The high-speed cache memory in your computer is made of many thousands of ____ circuits
Vacuum tubes were replaced with ____
Very Large-Scale Integration (VLSI) chips contain ____ of circuits.
Most computers today are still based on the ____ architecture
The portion of the CPU responsible for mathematical operations is the ____
One of the basics of Von Neumann architecture is the ____ cycle
The term “____” refers to the family of components used to store programs and dat
RAM is called “____” because it doesn’t have to be read sequentiall
Hard disks are made up of one or more metal platters with a coating consisting of ____ particles
A 120-mm disc used to store data, music, and video in a computer system by using laser technology is known as a(n) ___
eyboards, and most other I/O devices, connect to the main board through a(n) ____
The process of painting an image on the screen of a monitor is called ____ scanning
Printer ____ ranges from 300 dpi to 2400 dpi for both inkjet and laser printers
The sound card fits into the ____ bus expansion slot on the main board
When an I/O device places a voltage signal on a(n) ____ line, the associated chip checks its priority before passing it on to the CPU
Factors such as memory type, bus speed, and even hard drive speed can affect overall speed far more than the ____ clock.
The signal-to-noise ratio measures the quality of a communications channel
The bit error rate usually increases as the transfer rate decreases
The most common guided medium has been silicon
Unguided media cannot transmit or carry infrared light signals
Impedance makes the electrical signals weaken as they travel along the wire
Twisted pair cable has been a popular medium in the past, but it’s being replaced in most instances by coaxial cables that are less expensive to produce and have even higher bandwidths
Inductance doesn’t apply to fiber-optic cables at all
Fiber-optic cables are much more susceptible to attenuation than copper cables
Wireless networking uses the same technology as the radio in your car and the cell phone in your pocke
Without protocols, computers would not function
Without protocols, there would be no Internet
The Data Link layer of the OSI model uses routing protocols to select optimal paths between two end system
Layers in the OSI model are defined and designed to provide services for the process of communicating between computers.
The distinction between LANs and WANs is clear and well defined
The computers attached to a network are often referred to as nodes
There are six basic LAN topologies
Fast Ethernet speeds do not exceed 10 Mbps.
Each physical device connected to a network must have a network interface card (NIC).
Repeaters alter the content of the data in the signals that they boost
Gateways can be used to connect networks of different types or to connect mainframe computers to PCs
Shifting the starting point of an audio waveform is known as frequency modulatio
You can compress information by replacing repeating patterns with a code
The normal copper wire used in your home is capable is actually capable of speeds faster than to 1.5 Mbps
DSL (digital subscriber line) technologies do not allow the upload speed to differ from the download speed
Cable modems provide for differing upload and download speed
The PCI system bus consists of ____ wires
____ measures how much information can be carried in a given time period over a wired or wireless communication medium, usually measured in bits per second
The tendency of a signal to become weaker over distance is known as ____
____ media are physical media such as copper wire or fiber-optic cable.
Twisting copper wires nearly eliminates the electromagnetic effect known as ____.
Fiber-optic cables use ____ fibers to guide light pulses along a cable
____ transmissions are capable of transmission rates up to 4 Mbps
A(n) ____ is a set of rules designed to facilitate communication
A(n) ____ diagram shows the protocol interactions between two entities
The OSI conceptual model for the communication process has ____ discrete layers
The Transport layer of the OSI model uses data units called ____.
The ____ layer of the OSI model is responsible for formatting data so that it’s ready for presentation to an application
Each layer in the OSI model is defined in terms of a(n) ____ and a protocol data unit
A ____ is a small number of computers connected together in close proximity, usually in a building or complex.
Network configurations are often referred to as network ____
In a ____ topology, a computers or a network device serves as a central point, or hub, for all message
A widely used technology that has become an industry standard for LANs is ____
____ are small, special-purpose devices or computers used to connect two or more networks.
A ____ is a device designed to protect an internal network or node from intentional or unintentional damage from an external network
____ convert binary digits into sounds by modulating or modifying a tone
Normal copper wire is capable of carrying ____ voice channels
A digital transmission link with a capacity of 1.544 Mbps is known as a ____ line
Normal telephone voice-grade lines use ____-division multiplexing to divide up the bandwidth among the subscribers.
Because of attenuation, a DSL subscriber is required to be no more than ____ feet away from the nearest telephone company switching station.
Cable modems are capable of speeds up to ____.
Without a database most applications would be useless
A database management system (DBMS) provides an end-user interface with the database
A DBMS delegates the task of ensuring data integrity to the operating system
A DBMS manages multiple users’ access to the database
An attribute is also called a relation
A collection of columns referring to one item is called a row or tuple
Indexes do not require additional storage space in the database
The information stored in a database is kept in natural or sequential order.
From a database design point of view, first normal form is better than second normal form
You could define a database table based on unnormalized tables, but redundancies and dependencies can cause problems when the table is in use.
A determinant is also called a composite key
A column is functionally dependent on another column if for each value of the first column, there is only one value for the second column
The third normal form creates columns that are independent of the primary key
The main rules in database design are the second and third normal forms
A one-to-many relationship is the most common relationship
One-to-one relationships are very common
The RETURN BY clause enables you to change how data is returned from the SELECT statement
There are many SQL commands for maintaining, defining, and administering the data in a database
SQL deals with only the data you want to see.
SQL commands may not be lowercase
Every column must be initialized with data
The order of the fields in the SELECT statement doesn’t have to match that of the defined table structure
The MORE clause in a SQL SELECT statement specifies additional criteria for retrieving data from a table
In relation to refining searches, the keyword AND indicates that all criteria must be met
By default, the SELECT statement returns data in no particular order
Data that has been organized and logically related to allow access, retrieval, and use of that data is called a ____
A special language known as ____ is used to query or extract information from databases
____ was one of the computer scientists at IBM creating a theoretical model for designing data structures
A DBMS helps manage data and extract information from a database by using a(n) ____ language.
A ____ or entity is arranged into rows or columns much like a spreadsheet
The set of possible values for each column is called the ____ of that column
A(n) ____ is a special type of file that occupies its own space and specifies one or more columns that determine how information stored in a table can be accessed more efficiently
When the columns are used to determine the sort order of information, they are called sort ____.
The set of rules that dictates how databases are designed is called ____
To put the table into the ____ normal form, any columns containing two values need to be separated into two rows.
A ____ key is simply a column or combination of columns that uniquely identifies a row within a table.
A(n) ____ key is a primary key made up of more than one column.
Placing a table into second normal form eliminates ____ of data.
A(n) ____ dependency exists when one column is dependent on another column that isn’t the primary key
A(n) ____ defines how one table (entity) works with or relates to another
A(n) ____ key is a column in one table that relates to the primary key in another.
A visual representation of how all the tables or entities interact and relate to each other in a database is called a(n) ____ relationship model.
____ shows the numeric occurrences between entities in an ER model
Which of following is a valid SQL command for constructing a table?
The keyword ____ indicates that data is not required for a specified column
SQL statements are closed with a(n) ____.
The ____ statement is used to add new rows of data to a table.
The ____ statement is the most commonly used SQL statement
If you want to arrange the data more meaningfully when using the SELECT statement, you can specify the ____ column names.
If you want data returned in descending order, you simply place the keyword ____ next to the column in the ORDER BY clause
Every computer game, program, picture, or sound is stored in the computer as a series of decimal digits
Negative powers are used to represent the fractional portion of numbers
The hexadecimal numbering system has seventeen unique digits
The hexadecimal numbering system uses letters to represent digits beyond nine
The term radix is synonymous with positional value.
For any quantity, there’s a number in any base to represent it.
A counting table can be used to convert numbers from one base to another.
Adding numbers in other bases follows nearly the same steps as in decimal numbers.
The difference between adding numbers in base 10 and any other base lies in the carry process.
You cannot multiply or divide any base.
Half of a byte is sometimes referred to as a nibble
Computer scientists sometimes use hexadecimal as a shorthand method for representing binary values
Whole numbers, or integer numbers, can be represented internally in a computer as hexadecimal numbers.
Signed and unsigned numbers in a computer are designed to always take up a different number of bits.
Negative fractional numbers cannot be internally represented in a computer.
The Unicode character standard is compatible with the extended ASCII standard.
The Unicode method of character representation is fast becoming obsolete.
The number of pixels in each row and column defines a display device’s resolution.
A common resolution on a PC monitor is 1024 x 768, which means the monitor is displaying 1024 rows with 768 dots, or pixels, in each row.
As the resolution numbers get larger for a monitor, the size of each pixel gets larger.
Sounds are stored in the computer in a manner very similar to images.
The number of words used for each sound sample determines how many unique amplitude levels can be represented.
Raw audio samples are often stored in uncompressed file formats, such as WAV files.
It is not possible to learn to program or to manage a database without understanding binary and hexadecimal number systems.
Displays containing the contents of a computer’s memory or the hard disk are often referred to as ____ memory dumps.
The number 10-4 evaluates to ____.
A ____ is identified by the number of digits a numbering system has, including the digit 0.
The concept of ____ value exists in all numbering bases.
According to positional value, the binary number 10012 represents ____ things.
____ values are used to calculate how many of something a number represents.
A ____ value is calculated by raising the base to the power indicated by the position.
The letters ____ are used in hexadecimal to represent numeric values above 9.
To use the Windows calculator to convert between hex, binary, and decimal make sure the calculator is in the ____ view.
A group of 8 bits considered as one unit is known as a ____.
Each 1 and 0 (on and off ) in a computer is referred to as a ____.
Larger groups of bits (more than 8) are referred to as ____.
When separating these binary digits into groups of four, you must begin grouping on the ____.
When converting from hex to binary, each hexadecimal digit corresponds to a(n) ____-bit binary pattern.
____ complement is a method of representing negative numbers in a computer system.
To find the ____ of a given bit, flip it to the opposite state.
In scientific notation, the method of displaying numbers uses a(n) ____ and an exponent.
The eight bit extended ASCII (American Standard Code for Information Interchange) character set can be used to represent ____ characters.
A ____ is the smallest unit that can be displayed on a computer monitor.
Each pixel is stored in the computer as a(n) ____ pattern containing information about its color and brightness.
Unicode character representation uses a(n) ____-bit standard.
JPG and GIF are examples of ____ image formats.
A sound consists of a waveform with amplitude (volume) and ____ (pitch).
The computer samples sounds at fixed intervals and each sample is assigned a binary value according to its ____.
Which of the following is an example of a video compression format?
The MCP is the software “control center” of modern computer systems.
The operating system is the first program loaded into memory when the computer starts (boots).
The operating system is the first program loaded into memory when the computer starts (boots).
When power is turned on, the CPU begins executing the instructions stored in the CMOS chip.
An OS can reside on a ROM chip.
Applications cannot be designed to run on multiple platforms.
Clients are computers that are used to service many different users.
Every multipurpose device with a CPU must also have an OS.
DOS and Linux use a graphical user interface.
The Windows operating system no longer provides a command-line interface.
In Windows you can view running processes by pressing Ctrl+Alt+Delete to open Task Manager and then clicking the Processes tab to display information on all running processes.
Von Neumann architecture supports the parallel execution of instructions.
The parts of a computer system, such as the CPU, memory, keyboard, monitor, and network adapter, function at different speeds.
I/O devices will always work correctly from the basic installation in the environment in which they’re installed.
Plug and Play was intended to create a computer with hardware and software that worked together to configure devices and assign resources automatically, making hardware changes and additions easier.
Deadlock issues are always resolved without the intervention of the operating system.
Operating systems are responsible for protecting memory and other resources.
Files can be viewed as leaves (nodes) on a tree structure.
You can practice DOS commands by opening a DOS command window in Windows.
Linux commands have what are called command-line switches (sometimes called parameters or flags), used in the format: ls -lrt
Windows and Linux use the fdisk command to partition hard drives.
Formatting can be used to place a copy of the OS on the disk so that it can be used as a boot disk.
You cannot create child folders inside user-created folders.
The parent-child structure has nearly unlimited depth.
In general, folder names must start with a letter and can include additional numbers or letters and some special characters, up to a maximum length of 255 characters.
Command-line OSs such as Linux allow recovering folders and files after they have been deleted.
Command-line OSs such as Linux allow recovering folders and files after they have been deleted.
Interface programs that allow a computer to interact with peripheral devices are called ____.
The ____ is the core of the OS.
The OS running on a computer is often called its ____ and is typically tied to a particular CPU.
Coordinated execution of a process, using two or more CPUs at the same time is known as ____.
A ____ operating system is an OS designed to provide strong network services.
____ is a primary function of an operating system.
DOS and Linux use a(n) ____-line interface and are sometimes called console operating systems.
A small program running on a computer is known as a ____.
____ was designed to accommodate multiple users and multiple tasks.
Time ____ is a method of allocating fixed time units to running processes so that it appears to users that all processes are running simultaneously.
When an interrupt occurs, the CPU stops what it’s doing and goes to a program in memory called a(n) ____ handler.
When an interrupt occurs, the CPU stops what it’s doing and goes to a program in memory called a(n) ____ handler.
A rare situation in which processes are waiting for each other for use of resources is known as ____.
All programs and processes running on a computer are stored in ____.
OSs allow you to organize files into structures called folders or ____.
____ are an area of a hard disk reserved to hold files of a particular OS type.
In Linux, entering ____command gives you the manual pages with information on the command you specify.
In Linus, to exit manual pages, simply type “____.”
The process of ____ arranges the disk surface into addressable areas and sets up the basic directory tree structure on the disk.
The ____ command enables Linux to partition a disk drive.
In Windows ____, you can browse the tree structures of your drives.
In Windows, deleted files and folders reside in the ____ Bin folder until it is emptied.
____ are symbols that are used to match any character and are used in selecting files or directories.
Wildcard specifications are case sensitive in ____.
Partitioning, ____, and creating folders are done to prepare the drive to receive files.
Moving files is similar to ____ files.
B2C e-commerce is a useful tool for connecting business partners in a virtual supply chain to cut resupply times and reduce costs.
Producers or providers of consumer products using B2C e-commerce must use middlemen, or intermediaries, between them and the consumer.
G2B applications are designed to improve communications among the various levels of government.
E-commerce relies on the use of wireless devices, such as personal digital assistants, cell phones, and smartphones, to place orders and conduct business.
Each e-commerce Web site must have Web server software to perform fundamental services, including security and identification, retrieval and sending of Web pages, Web site tracking, Web site development, and Web-page development.
A server that handles dynamic content must be able to access information from a variety of databases.
The use of open database connectivity enables the Web server to assemble information from different database management systems, such as SQL Server, Oracle, and Informix.
Product configuration software tools were originally developed in the 1960s to assist B2C salespeople to match their company’s products to customer needs.
E-commerce software must support five core tasks: catalog management, product configuration, shopping cart facilities, e-commerce transaction processing, and Web traffic data analysis.
For m-commerce to work effectively, the interface between the wireless device and its user must improve to the point that it is nearly as easy to purchase an item on a wireless device as it is to purchase it on a PC.
A user with a WAP-compliant device uses the built-in microbrowser to make a WML request.
A CA is responsible for guaranteeing that the people or organizations that are granted unique digital certificates are, in fact, who they claim to be.
The DSL communications protocol includes a handshake stage, which authenticates the server (and the client, if needed), determines the encryption and hashing algorithms to be used, and exchanges encryption keys.
Credit cards are better protected from misuse than conventional smart, charge, and debit cards because the credit-card information is encrypted.
A smart card makes credit theft practically impossible because a key to unlock the encrypted information is required, and there is no external number that a thief can identify and no physical signature a thief can forge.
Enterprise systems employ a database of key operational and planning data that can be shared by all.
Web services can combine software and services from different companies to provide an integrated way to communicate.
A characteristic of an online transaction processing system is that there is some delay between an event and the eventual processing of the related transaction to update the organization’s records.
Often, results from one TPS flow downstream to become input to other systems.
Systems design attempts to answer the questions “What is the problem, and is it worth solving?”
Systems investigation attempts to answer the question “What must the information system do to solve the problem?”
Systems design seeks to answer the question “How will the information system do what it must do to obtain the problem solution?”
Systems analysis details system outputs, inputs, and user interfaces; specifies hardware, software, database, telecommunications, personnel, and procedure components; and shows how these components are related.
Systems design results in an installed, operational information system that meets the business needs for which it was developed.
Prototyping begins with creating a preliminary model of a major subsystem or a scaled- down version of the entire system.
Agile development requires frequent face-to-face meetings with the systems developers and users as they modify, refine, and test how the system meets users’ needs and what its capabilities are.
XP uses pairs of programmers who work together to design, test, and code parts of the systems they develop.
JAD often uses group support systems (GSSs) software to foster positive group interactions, while suppressing negative group behavior.
Legal feasibility can include logistical and motivational (acceptance of change) considerations.
Legal feasibility involves an analysis of existing and future laws to determine the likelihood of legal action against the systems development project and the possible consequences.
The object-oriented approach can be used during all phases of systems development, from investigation to maintenance and review.
The primary outcome of systems analysis is a prioritized list of systems requirements.
Data modeling is most often accomplished through the use of entity-relationship (ER) diagrams.
Activity modeling is often accomplished through the use of data-flow diagrams.
DFDs work on the premise that every activity involves some communication, transference, or flow that can be described as a data element.
The primary result of the systems maintenance phase is a technical design that details system outputs, inputs, and user interfaces; specifies hardware, software, databases, telecommunications, personnel, and procedures; and shows how these components are related.
A sequence of events is often called an interface, and can be diagrammed in a sequence diagram.
Parallel start-up involves running the new system for one group of users rather than all users.
Pilot start-up involves running both the old and new systems for a period of time.
A ____ is a professional who specializes in analyzing and designing business systems.
In systems development, the ____ is responsible for modifying or developing programs to satisfy user requirements.
In the ____ phase of the SDLC, potential problems and opportunities are identified and considered in light of the goals of the business.
The ____ phase of the SDLC involves studying existing systems and work processes to identify strengths, weaknesses, and opportunities for improvement.
The primary result of the ____ phase is a technical design that either describes the new system or describes how existing systems will be modified.
____ involves creating or acquiring the various system components detailed in the systems design, assembling them, and placing the new or modified system into operation.
____ takes an iterative approach to the systems development process. During each iteration, requirements and alternative solutions to the problem are identified and analyzed, new solutions are designed, and a portion of the system is implemented.
____ employs tools, techniques, and methodologies designed to speed application development.
RAD makes extensive use of the ____ process for data collection and requirements analysis.
____ combine(s) the logic of the systems development life cycle with the power of object-oriented modeling and programming.
The ____ is a document that is filled out by someone who wants the IS department to initiate systems investigation.
____ feasibility is concerned with whether the hardware, software, and other system components can be acquired or developed to solve the problem.
____ feasibility determines whether the project makes financial sense and whether predicted benefits offset the cost and time needed to obtain them.
____ feasibility determines whether laws or regulations can prevent or limit a systems development project.
____ feasibility is a measure of whether the project can be put into action or operation.
The ____ report summarizes the results of systems investigation and the process of feasibility analysis and recommends a course of action: continue on into systems analysis, modify the project in some manner, or drop it.
With ____, one or more members of the analysis team directly observe the existing system in action.
When many data sources are spread over a wide geographic area, ____ might be the best approach to data collection.
____ is the manipulation of the collected data so that the development team members who are participating in systems analysis can use the data.
____ is a commonly accepted approach to modeling organizational objects and associations that employ both text and graphics.
A(n) ____ models objects, associations, and activities by describing how data can flow between and around various objects.
The purpose of ____ is to answer the question “How will the information system solve a problem?”
____ is a description of the functional requirements of a system.
____ is the specification of the characteristics of the system components necessary to put the logical design into action.
A(n) ____ is the primary result of systems design, reflecting the decisions made and preparing the way for systems implementation.
____ includes hardware acquisition, programming and software acquisition or development, user preparation, hiring and training of personnel, site and data preparation, installation, testing, start-up, and user acceptance.
The preparation of the location of a new system is called ____.
____ involves making sure that all files and databases are ready to be used with new computer software and systems.
____ is the final step of systems development, involving the analysis of systems to make sure that they are operating as intended.
Hide known cards