CISC Exam
CISC Exam
1.
(p. 4) Which part of an information system consists of the rules or guidelines for people to follow?
B. Procedures
2.
(p. 4) The equipment that processes data in order to create information is called the _
C. hardware
3.
(p. 4) In most cases, the word "software" is interchangeable with the word _
C. program
4.
5.
(p. 8) Which of the following is a collection of programs rather than a single program?
B. System software
6.
(p. 7) "Background" software that helps the computer manage its own internal resources is called _
D. system software
7.
(p. 8) Identify the program that coordinates computer resources, provides an interface between users and the
B. Operating system
8.
(p. 8) Antivirus programs protect your computer system from viruses or malicious programs. This is an
D. Utilities
9.
D. Browsers
10.
(p. 10-11) Which of the following computers is also referred to as a server and is used to support end users for
things such as retrieving data from a database or providing access to application software?
A. Midrange
11.
(p. 11) Desktop, laptop, and tablet computers, and mobile devices are classified as _______.
D. personal computers
12.
(p. 11) The most widely used handheld computers are _______.
B. smartphones
13.
(p. 11) A microcomputer that is smaller, lighter, and less powerful than a notebook, and that has a touch
D. tablet
14.
(p. 11) This computer component holds the program and data that is currently being processed.
A. RAM
15.
(p. 11) Which of the following will not retain data after the computer is turned off?
B. RAM
16.
(p. 11-12) Identify the four basic categories of hardware in a personal computer system.
17.
(p. 11) This hardware houses most of the electronic components that make up a computer system.
A. System unit
18.
(p. 11) Which of the following are two important components of the system unit?
19.
(p. 12) Which one of the following is not considered a form of secondary storage?
C. RAM
20.
(p. 6) ______ are the most important part of any information system.
D. People
21.
(p. 12) The type of media that uses laser technology to store data and programs is _______.
D. optical disc
22.
(p. 13) Which of the following is not an example of a document file created by a word processor?
A. Spreadsheet
23.
(p. 13) A financial budget would be created in what type of data file?
B. Worksheet
24.
(p. 13) Employee records, including names, social security numbers, and related information, would typically
C. Database
25.
A. network
26.
(p. 15) Which technology allows users to shift their desktop computing activities to computers on the
Internet?
B. Cloud computing
1.
(p. 28) Launched in 1969 as a U.S. funded project that developed a national computer network, the Internet
D. ARPANET
2.
B. 1991
3.
(p. 28) The Internet is a _______ made up of wires, cables, satellites, and rules for exchanging information
A. physical network
4.
(p. 28) This version of the web evolved to support more dynamic content creation and social interaction.
B. Web 2.0
5.
(p. 32) The most common way to access the Internet is through _______.
A. an Internet service provider (ISP)
6.
B. Windows Explorer
AACSB: Technology
7.
(p. 33) A web page typically contains _______, which contains the formatting instructions for displaying the
web page.
8.
(p. 33) For browsers to connect to resources on the Internet, the location of the resources must be specified
9.
B. www.simnetonline.com
10.
11.
(p. 33) Which programming language is used within HTML documents to trigger interactive features?
B. JavaScript
12.
(p. 33) Which of the following are files inserted into an HTML document that control the appearance of web
D. CSS
13.
(p. 38) This type of e-mail account is more widely used because it frees the user from installing and
B. Web-based
14.
(p. 40) This social networking site is used for professional, business-oriented networking.
D. LinkedIn
15.
C. Microblog
16.
(p. 41) _______ typically broadcast live events and use streaming technology in which audio and video files
are continuously downloaded to your computer while you are listening to and/or viewing the content.
A. Webcasts
17.
(p. 42) _______ do not use streaming technology and are used to download media files to your computer.
B. Podcasts
18.
(p. 42) Which of the following is a website specially designed to allow visitors to use their browser to add,
A. Wiki
19.
(p. 43) These special programs continually look for new information and update the databases used by search
services.
A. Spiders
20.
(p. 43) When you enter a keyword or phrase into a search engine the results display as a list of these.
B. Hits
21.
(p. 44) This type of e-commerce often resembles the electronic version of the classified ads or an auction.
B. C2C
22.
A. B2C
23.
(p. 46) Which of the following is not one of the three basic components of cloud computing?
D. wireless connectivity
24.
(p. 34) Programs that automatically start and operate as a part of your browser are called _______.
A. plug-ins
25.
(p. 34-35) Parents can use this type of program to block access to selected Websites.
D. Filter
26.
(p. 35) This method of file transfer has been used for decades and is frequently used for uploading changes to a
B. FTP
27.
(p. 35) This method of file transfer distributes file transfers across many different computers.
C. BitTorrent
28.
(p. 47) The continuing development of the Internet that allows everyday objects imbedded with electronic
C. IoT
(p. 62) This type of software works with end users, application software, and computer hardware to handle
D. System
2.
(p. 62) This type of software can be described as end user software and is used to accomplish a variety of tasks.
B. Application
3.
(p. 62) _______ provide additional information and request user input.
A. Dialog boxes
4.
(p. 62) Most applications use aNo _______ that displays graphical elements called icons to represent familiar
objects.
5.
A. web authoring
6.
(p. 63) This GUI includes tabs, groups, and galleries.
B. Ribbon
7.
(p. 63) These organize commonly used commands into a set of tabs.
C. Ribbons
8.
To create documents that consist primarily of text, you need this software.
B. Word processor
9.
Which would be the most appropriate type of application to create, analyze, and forecast budgets?
C. Spreadsheet
10.
A. database
11.
(p. 69) Programs that combine a variety of visual objects to create attractive, visually interesting presentations
are called:
B. presentation graphics
s
12.
(p. 70) Programs that allow you to mix text and graphics and focus on flexible page design and layout.
B. Desktop publishing
13.
(p. 72) These are specialized graphics programs for editing or modifying digital photographs.
A. Image editors
14.
(p. 72 Image editors edit images consisting of thousands of pixels that form this type of image.
B. Bitmap
15.
C. Vector
16.
(p. 72) These programs are used to create and edit vector images.
A. Illustration programs
17.
(p. 72) _______ are used to edit videos to enhance quality and appearance.
D. Video editors
18.
(p. 73) Which of the following programs would be used to create a website?
D. Web authoring
19.
(p. 73) Specialized and powerful programs, called _______ are typically used to create specialized commercial
sites.
20.
(p. 73) Web authoring programs that allow you to build a page without interacting directly with HTML code
A. WYSIWYG editors
21.
(p. 74) Add-on programs for a variety of mobile devices including smartphones and tablets.
D. Mobile apps
22.
(p. 71) _______ make up the basic structure of a relational database with columns containing field data and
B. Tables
23.
(p. 75) This is a website that provides access to specific mobile apps that can be downloaded either for a
C. App store
24.
(p. 76) Which of the following is not a popular cloud suite or online office suite?
D. Lotus Symphony
1.
(p. 90) Which of the following is not a system software program type?
D. Sectors
2.
(p. 91) This system software is responsible for managing your computer's resources including memory,
B. Operating system
3.
(p. 91-92) Which of the following is not a function of the operating system?
4.
(p. 93) In many application programs, this feature is used to provide information or request input.
C. Dialog boxes
5.
(p. 92) This type of boot occurs when the computer is already on and you restart it without turning off the
power.
C. Warm boot
6.
(p. 92) Most operating systems support the ability to switch between different applications. This is called
_____.
A. multitasking
7.
(p. 93) In a network operating system, this computer coordinates all communication between computers.
B. Server
8.
(p. 93) The category of operating system used for handheld devices.
B. Embedded
9.
(p. 93) The operating system is often referred to as the software environment or software _____.
B. platform
10.
(p. 95) The most widely used personal computer operating system.
D. Windows
11.
(p. 96) This version of Mac OS X has improved power management and enhanced workflow options for
C. Mavericks
12.
(p. 96) This operating system is widely used by servers on the web, mainframe computers, and very powerful
personal computers.
D. UNIX
13.
(p. 95) This operating system is designed to run only with Apple computers.
C. Mac OS
14.
(p. 96) This version of UNIX is an open source operating system that is an alternative to Windows.
C. Linux
15.
B. Mobile
16.
(p. 97) In a virtualized environment, this operating system runs on the physical machine.
C. Host
17.
(p. 95-96) Which of the following is not a popular desktop operating system?
B. Android
18.
(p. 94) Which of the following is not a popular mobile operating system?
A. Mountain Lion
19.
(p. 97) When a single physical computer runs this type of software, it operates as though it were two or more
D. Virtualization
20.
(p. 101) The windows troubleshooting utility that identifies and eliminates nonessential files is called _____.
C. Disk Cleanup
21.
(p. 102) When a file is broken up into small parts that are stored wherever space is available, the hard disk is
A. fragmented
22.
(p. 97) Before sending a large file over the Internet, you might want to use one of these programs.
23.
(p. 103) A computer can become infected with viruses in all the following ways, except by _____.
24.
(p. 100) A utility program that makes a copy of all files or selected files that are in the libraries, contacts, and
B. File History
Chapter 05 The System Unit
1.
(p. 116) With these systems, input and output devices are located outside the system unit.
A. Desktop systems
2.
(p. 117) This type of computer is a thin slab that is almost all monitor with the system unit located behind the
monitor.
B. Tablet
3.
B. 8 bits
4.
C. CISC
5.
(p. 130) This character encoding scheme allows non-English characters and special characters to be
represented.
B. Unicode
6.
B. motherboard
7.
(p. 119) On the motherboard, the connection points for chips are referred to as _____.
B. sockets
8.
(p. 119) Tiny circuit boards etched onto squares of sandlike material, called silicon, are called _____.
D. chips
9.
(p. 119) Integrated circuits must be mounted on _____, which are then plugged into the system board.
D. chip carriers
10.
B. It directs the movement of electronic signals between memory and the arithmetic-logic unit.
11.
(p. 120) Pathways that support communication among the various electronic components on the system board
are called _____.
A. bus lines
12.
(p. 120) In most personal computer systems, the CPU is contained on a single chip called the _____.
C. microprocessor
13.
(p. 121) Term used to describe the number of bits that a CPU can access at one time.
B. Word
14.
C. 4 bytes at a time
15.
(p. 121) The processing speed of a microprocessor is typically represented by its _____.
C. clock speed
16.
(p. 121) Which of the following allows a computer to run two or more operations simultaneously?
C. Multicore processors
17.
(p. 121) For multicore processors to be used effectively, computers must understand how to divide tasks into
parts that can be distributed across each core—an operation called _____.
C. parallel processing
18.
(p. 121) A type of specialty processor devoted exclusively to protecting your privacy.
C. Cryptoprocessor
19.
(p. 121) These specialty chips are designed to improve specific computing operations such as displaying 3D
C. Coprocessors
20.
B. cache memory
21.
(p. 122) With this type of memory, large programs are divided into parts and the parts are stored on a
C. Virtual
22.
(p. 122) Which of the following offers a combination of the features of RAM and ROM?
C. Flash Memory
23.
(p. 122) All of the following are commonly used units of measurement to describe memory capacity, except
_____.
D. Nanobyte (NB)
24.
(p. 122) When you reboot your system, the computer follows start-up instructions stored in this type of
memory.
D. Flash
25.
(p. 123) Most personal computers allow users to expand their systems by providing these on the system board.
A. Expansion slots
26.
(p. 125) Which of the following can be used to connect several devices to the system unit and are widely used
to connect keyboards, mice, printers, storage devices, and a variety of specialty devices?
A. USB port
27.
(p. 126) These types of ports typically provide high-speed connections to specialized devices such as
A. FireWire
28.
(p. 126) Which of the following ports is used for connecting musical instruments to a sound card?
C. MIDI
29.
(p. 126) Which of the following ports provide high-speed connections for external hard-disk drives, optical
A. eSATA
30.
(p. 128) Laptops and tablets use _____ that are typically located outside the system unit.
A. AC adapters
1.
(p. 142) _______ is any data or instructions that are used by a computer.
D. Input
2.
(p. 142) The arrangement of keys on a keyboard, QWERTY reflects the keyboard layout by _______.
B. taking the letters of the first six alphabetic characters found on the top row of keys
3.
(p. 143) Keyboards that are widely used on various smartphones and other small portable devices, and that are
designed primarily for communicating via texting and connecting to the Web.
A. Thumb
4.
(p. 143) Type of keyboard that uses a touch screen as the input device.
D. Virtual
5.
(p. 143) A keyboard key, like Caps Lock, that turns a feature on or off is called a _______ key.
B. toggle
6.
(p. 144) This type of mouse emits and senses light to detect mouse movement.
D. Optical
7.
(p. 159) The study of human factors related to things people use.
D. Ergonomics
8.
(p. 144) These screens can be touched with more than one finger, which allows for interactions such as
rotating graphical objects on the screen with your hand or zooming in and out by pinching and stretching
your fingers.
C. Multitouch
9.
C. Stylus
10.
(p. 146) Bar code readers use _______ embedded in them to read bar codes.
D. photoelectric cells
11.
(p. 147) This reading device is used in banks to read the numbers on the bottom of checks and deposit slips.
A. MICR
12.
(p. 147) Which of the following types of character recognition systems is used for standardized multiple-
choice testing?
C. OMR
13.
(p. 147) OMR, OCR, and MICR are all types of _______.
14.
(p. 148) _______-input devices convert sounds into a form that can be processed by the system unit.
D. Audio
15.
(p. 148) The most widely used audio-input device is the _______.
C. microphone
16.
(p. 149) The series of dots that form the image on a monitor are called _______.
C. pixels
17.
(p. 149) This indicates the monitor's ability to display colors by comparing the light intensity of the brightest
A. Contrast ratio
18.
(p. 149) The distance between each pixel.
A. Dot pitch
19.
(p. 149) The size, or _______, is measured by the diagonal length of a monitor's viewing area.
20.
(p. 149) The proportional relationship between a display's width and height.
A. Aspect ratio
21.
(p. 150) A dedicated, mobile device for storing and displaying e-books and other electronic media including
A. E-book reader
22.
(p. 151) Specialized devices with a large display connected to a computer projector and are widely used in
23.
(p. 151) What kind of specialized monitor is especially useful for graphic artists, designers, and publishers?
24.
25.
26.
(p. 153) Which of the following printer features enables you to print on both sides of a sheet of paper?
B. Duplex
27.
(p. 154) Printers connected to the Internet that provide printing services to others on the Internet are called
_______.
D. cloud printers
28.
(p. 156) Which of the following allows the transmission of voice and often video communication over the
Internet?
D. Voice over IP
1.
(p. 175) Hard disks store and organize files using all of the following, except _______.
D. paths
2.
(p. 176) Which of the following is true about an internal hard disk?
3.
(p. 175) On a hard disk each track is divided into invisible wedge-shaped sections called _______.
D. sectors
4.
(p. 176) The hard disk's surface is scratched and some or all of the data is destroyed when there is a _______.
A. head crash
5.
C. RAM
6.
7.
(p. 174) Storage that retains its data after the power is turned off is referred to as _______.
D. nonvolatile storage
8.
(p. 174-175) The process of accessing information from secondary storage devices is referred to as _______.
D. reading
9.
(p. 175) The _______ of a secondary storage device indicates how much data the storage medium can hold.
B. capacity
10.
(p. 175) Which of the following measures the amount of time required by the storage device to retrieve data
and programs?
C. Access speed
11.
(p. 177) One way to improve the storage capacity of a hard disk is to _______.
12.
(p. 176) This process improves system performance by acting as a temporary high-speed holding area between
C. Disk caching
13.
14.
(p. 176) Three ways to improve the performance of a hard disk include _______.
15.
17.
18.
19.
(p. 180) All of the following are true of DVD-ROM drives except:
20.
(p. 180) The large capacity, high-definition optical discs designed to store hi-def video and video games are
_______.
C. Blu-ray
21.
(p. 180) These discs have a capacity of 50 gigabytes on one side.
D. Blu-Ray
22.
(p. 178) Solid-state storage devices are different than hard disks in that they _______.
23.
(p. 180-181) What is it called when servers on the Internet supply applications as a service, rather than a
product?
C. Cloud computing
24.
(p. 181) This allows you to upload and store documents on the Internet.
A. Cloud storage
25.
C. Optical disc
_______.
2.
(p. 197) In a communication system, which among the following originate and accept messages in the form of
3.
(p. 197) In a communication system, which among the following convert messages into packets that can travel
A. Connection devices
4.
C. Fiber-optic cable
5.
(p. 199) Which among the following is considered a line-of-sight communication medium?
D. Microwave
6.
(p. 199) WiMax stands for _______.
C. Worldwide Interoperability for Microwave Access
7.
A. radio waves
8.
A. Uplink
9.
(p. 199) The GPS device in an automobile uses which communication channel?
D. Satellite
10.
(p. 200) A service that uses existing phone lines to provide high-speed connections is called _______.
D. DSL
11.
(p. 201-202) Cellular services use _______ to provide wireless connectivity to the Internet.
12.
(p. 202) The capacity of a communication channel is measured in _______.
A. bandwidth
13.
(p. 202) Using this type of communications channel, several users can simultaneously use a single connection
C. Broadband
14.
(p. 204) Every computer on the Internet has a unique numeric address called aNo _______.
C. IP address
15.
(p. 204) _______ is the process of breaking down information sent or transmitted across the Internet into
small parts.
D. Packetization
16.
(p. 202, 204) The essential features of this include identifying, sending, and receiving devices and breaking
B. TCP/IP
17.
(p. 205) The _______ is the central node that coordinates the flow of data by sending messages directly
between the sender and receiver nodes.
C. switch
18.
(p. 205) In a computer network, this node that requests and uses resources available from other nodes.
A. Client
19.
(p. 206) This device enables connectivity between two LANS or a LAN and a larger network.
A. Network gateway
20.
(p. 207) A wireless access point that provides Internet access in a public place such as a coffee shop, library,
bookstore, or university.
A. Hotspot
21.
(p. 209 A network topology in which the central node is connected to two or more subordinate nodes that, in
D. Tree
22.
(p. 210) This type of network strategy uses central servers to coordinate and supply services to other nodes on
the network.
B. Client/server
23.
(p. 211) Organizations use the following to allow suppliers and others limited access to their networks.
B. Extranets
24.
(p. 211) All communications between a company's internal networks and the outside world pass through this
server.
D. Proxy
25.
(p. 211) Remote users can connect to an organization's network through this type of secure private
connection.
A. VPN
26.
(p. 209) This type of network topology does not use a specific physical layout.
C. Mesh
C. information resellers
2.
(p. 227) These programs record virtually everything you do on your computer and are used by employers to
C. Employee-monitoring software
3.
(p. 228) Small data files that are deposited on a user's hard disk when they visit a website are called _______.
A. cookies
4.
(p. 228) These are used by advertisers to keep track of your web activity as you move from one site to the
next.
D. Third-party cookies
5.
(p. 229) Programs used to secretly record an individual's activities on the Internet are called _______.
A. spyware
6.
(p. 229-230) Which type of program would likely be used by investigators to record a potential suspects'
Internet activities?
C. Keystroke logger
7.
(p. 231) This type of computer criminal creates and distributes malicious programs.
C. Cracker
8.
(p. 228) Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.
D. Privacy mode
9.
D. Ad-Aware
10.
(p. 232) A program that replicates itself and clogs computers and networks.
B. Worm
11.
(p. 232) Free computer games and free screen saver programs are typical carriers of _______.
D. Trojan horses
12.
(p. 233) Which among the following is a way to shut down an ISP or website?
13.
(p. 234) Which among the following is a fraudulent or deceptive act designed to trick individuals on the
B. Internet scam
14.
(p. 234) The use of the Internet, smartphones, or other devices to send or post content intended to hurt or
C. Cyberbullying
15.
(p. 224) The most significant concerns for implementation of computer technology involve _______, security,
and ethics.
C. privacy
16.
(p. 240) According to which law is it illegal for an owner of a commercial program to make backup copies for
18.
(p. 236) This uses software to try thousands of common words sequentially in an attempt to gain unauthorized
D. Dictionary attack
19.
(p. 233) This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as
D. Rogue
20.
(p. 236) The process of coding information to make it unreadable except to those who have a special piece of
D. Encryption
21.
(p. 236) A _______ acts as a security buffer between a corporation's private network and all external networks.
A. firewall
22.
(p. 237) Which of the following is the most widely used wireless network encryption for home wireless
networks?
D. WPA2
23.
(p. 235-236) Which of the following is not a measure to protect computer security?
24.
(p. 238) _______ is concerned with protecting software and data from unauthorized tampering or damage.
D. Data security
25.
(p. 240) This is a legal concept that gives content creators the right to control use and distribution of their
work.
C. Copyright
26.
(p. 227) This law gives you the right to look at your personal records held by government agencies.
27.
(p. 231) Computer criminals that create and spread viruses are punished under this law.
1.
(p. 255) Pricing, promoting, selling, and distributing the organization's goods and services pertains to which of
A. Marketing
2.
(p. 255) Creating finished goods and services using raw materials and personnel pertains to which of the
following functions?
C. Production
3.
(p. 256) Who is responsible for operational matters and monitoring day-to-day events?
A. Supervisors
4.
(p. 256) This level of management is concerned with long-range planning and uses information that will help
A. Top management
5.
(p. 256) This level of management is involved with tactical planning and implementing the long-term goals
within an organization.
B. Middle management
6.
(p. 258) _____ systems help supervisors by generating databases that act as the foundation for other
information systems.
C. Transaction processing
7.
(p. 258) Which of the following refers to a system that summarizes detailed data from the transaction
8.
C. Middle-level managers
9.
10.
(p. 259) A transaction processing system is also referred to as a _______.
B. data processing system
11.
(p. 260) The _______ activity records the customer requests for products or services.
12.
C. accounts receivable
13.
(p. 260) The _______ keeps records of the number of each kind of part or finished good in the warehouse.
14.
(p. 260) What documentation shows the income, expenses, and difference between them for a company
A. Income statements
15.
(p. 260) This lists the assets, liabilities, and the equity of an organization.
A. Balance sheet
16.
(p. 261) Regional managers can compare their regular sales reports with that of the other regional managers
by using _______.
B. periodic reports
17.
(p. 261) An example of this type of report would be a sales report that shows that certain items are selling
D. Exception
18.
(p. 262) This system is a flexible tool for data analysis, since its reports do not have a fixed format.
19.
C. group
20.
(p. 262) This typically consists of transactions from the transaction processing system.
D. Internal data
21.
(p. 263) This decision model helps middle-level managers control the work of the organization, such as
C. Tactical model
22.
(p. 263-264) Some of these systems have the ability to retrieve information from databases outside the
23.
(p. 265) These systems are used in managing documents, communicating, and scheduling.
24.
(p. 265) Project resources can be scheduled, planned, and controlled using _______.
A. project managers
25.
(p. 266) Which system is a type of artificial intelligence that uses a database, containing facts and rules, to
B. Expert system
Chapter 11 Databases
1.
(p. 278) Which view of data deals with how the data is actually formatted and located?
A. Physical view
2.
(p. 279) A data field that represents a description or characteristic of some entity.
B. Attribute
3.
(p. 279) A collection of related fields such as a person's name, address, and age.
B. Record
4.
B. Primary key
5.
(p. 280) In _______, data from transactions are collected over time and then processed all at once.
A. batch processing
6.
(p. 281) In _______, data is processed at the same time the transaction occurs.
C. real-time processing
7.
(p. 281) Having several instances of the same data is called data _______.
D. redundancy
8.
(p. 281-282) If Mr. Smith's bike has been sent to his new address, but the bill to his old one, it can most likely
A. integrity
9.
B. Reliability
10.
(p. 282) Analysis tools that support viewing all or selected parts of data, querying the database, and generating
A. SQL
11.
(p. 282) This subsystem defines the logical structure of the database by using a data dictionary or schema.
D. Data definition
12.
(p. 282-283) In this subsystem, a user can create data entry forms.
D. Application generation
13.
(p. 284) In this database model, the fields or records are structured in nodes.
B. Hierarchical
14.
(p. 285) A network database utilizes these special connections between parent nodes and child nodes that
D. Pointers
15.
(p. 285) This type of database is organized into many tables with common data items (key fields) linking the
C. Relational
16.
D. Conceptualization
17.
(p. 287) These databases store not only data but also instructions to manipulate the data.
C. Object-oriented
18.
(p. 287) In the object-oriented database model, this term is the equivalent to a field in a relational model.
D. Attribute
19.
(p. 288) In this type of database, the data and the DBMS are stored either on the user's hard-disk drive or on a
B. Individual
20.
(p. 289) These types of databases are also called information utilities or data banks.
D. Commercial
21.
(p. 288) The combined information presented on this type of database can be used to change the whole
C. Company
22.
(p. 289) If all the data in a database is not physically located in one place, it would be aNo _______ database.
D. distributed
23.
(p. 289) This commercial database offers news and information on legal, public records, and business issues.
D. LexisNexis
24.
(p. 290) Information collected by an organization from a variety of external and internal databases is stored in
A. Data warehouse
25.
(p. 289) Access to these databases is offered to the public or selected outside individuals, for a fee.
B. Commercial databases
1.
D. System
2.
(p. 305) In this phase of the systems life cycle, the new information system is installed, and people are trained
to use it.
A. Systems implementation
3.
(p. 305) In this phase of the systems life cycle, new or alternative information systems are designed.
C. Systems design
4.
(p. 305) This individual studies an organization's systems to determine what actions to take and how to use
C. Systems analyst
5.
(p. 306) In the preliminary investigation phase of the systems life cycle, which one of the following tasks
6.
(p. 307) In order to obtain financing to continue to Phase 2: Systems Analysis, the systems analyst does this.
7.
B. Systems analysis
8.
(p. 309) This shows the relationship between input and output documents.
A. Grid chart
9.
(p. 308) Which of the following is used to identify the components of a complex system and makes each
10.
(p. 309) Which of the following tools presents data or information flow within an information system?
11.
(p. 309) These tools, also called computer-aided software engineering (CASE) tools, are used in system analysis
12.
(p. 310) Which among the following would not be described in the systems analysis report?
13.
(p. 310) This is the first step in the systems design phase.
15.
(p. 311) In this activity, it is determined whether the system can be made secure against unauthorized use.
16.
(p. 311) This document presents the costs versus the benefits and outlines the effect of alternative designs on
the organization.
17.
(p. 313) During which phase of the systems life cycle are users trained to use the new system?
B. Systems implementation
18.
(p. 313) Selecting the _______ is the first step in implementing a new system.
C. conversion type
19.
(p. 313) This conversion type is not recommended because problems arising in this approach could be
catastrophic.
A. Direct approach
20.
(p. 314) This conversion approach is preferred when there are many people in an organization performing
similar operations.
D. Pilot approach
21.
(p. 314) This is the final step of the systems implementation phase of the systems life cycle.
B. Train users
22.
(p. 314) Identify the sixth phase of the systems life cycle.
A. Systems maintenance
23.
(p. 314) Which of the following phases of the systems life cycle is considered to be an ongoing activity?
D. Systems maintenance
24.
(p. 314) This is performed to determine whether the new procedures are actually furthering productivity.
D. Systems audit
25.
(p. 315) This is the process of building a model that can be modified before the actual system is installed.
B. Prototyping
1.
(p. 330) A _______ is a list of instructions for the computer to follow to accomplish the task of processing data
into information.
C. program
2.
(p. 330) The list of instructions for the computer to follow to process data into information.
B. Program
3.
(p. 331) The program's objectives, outputs, inputs, and processing requirements are determined during in this
step.
D. Program specification
4.
(p. 333) Program objectives, desired outputs, needed inputs, and processing requirements are all recorded in
this.
C. Program specifications document
5.
A. Modules
6.
(p. 335) This is an outline of the logic of the program you will write.
B. Pseudocode
7.
(p. 335) Identify the programming tool that uses symbols to show the sequence of steps needed to solve a
programming problem.
D. Program flowcharts
8.
(p. 337) In this logic structure, one program statement follows another.
A. Sequential
9.
(p. 337) In this logic structure, the outcome of the decision determines which of the two paths to follow?
A. IF-THEN-ELSE
10.
(p. 337) This logic structure involves repeating a sequence as long as a certain condition remains true.
A. Loop
11.
(p. 338) One of the best ways to code effective programs is to write so-called _______ programs, using the
B. structured
12.
(p. 340) This is the process of testing and eliminating errors in a program.
A. Debugging
13.
(p. 340) This type of error could be the result of the programmer making an incorrect calculation.
C. Logic
14.
D. Beta testing
15.
(p. 342) This consists of written descriptions and procedures about a program and how to use it.
C. Documentation
16.
(p. 343) As much as 75 percent of the total lifetime cost for an application program is spent on this.
D. Maintenance
17.
(p. 344) Which of the following refers to tools that are used to provide some assistance in designing, coding,
C. CASE
18.
(p. 344-345) This type of software development focuses less on the procedures and more on defining the
D. Object-oriented
19.
(p. 346) These first-generation languages are hard to use, with one of the reasons being that they are different
D. Machine
20.
(p. 346) These second-generation languages use abbreviations or mnemonics that are automatically converted
A. Assembly
21.
(p. 346-347) These third-generation languages are designed to express the logic that can solve general
problems.
B. Procedural
22.
23.
A. converts and runs the procedural language one statement at a time into machine code
24.
(p. 348) Fifth-generation languages (5GLs) incorporate the concepts of which of the following?
B. Artificial intelligence
25.
(p. 348) This type of language uses natural languages to allow humans to communicate more directly to a
computer.
D. Problem and constraint
6:50 PM
一
1. Consists of the step-by-step instructions that tell the computer how to do its work. → Program
包含告訴計算機如何完成其工作的分步說明
2.A container that houses most of the electronic components that make up a computer system. → System unit
容納大部分構成計算機系統的電子元件的容器。
5.Enables the application software to interact with the computer hardware. → System software
使應用程序軟件能夠與計算機硬件交互
6.Type of computer that is small enough to fit on top of or alongside a desk yet is too big to carry around. →
Desktop 計算機的類型小到足以放在桌子的頂部或旁邊但是太大而無法隨身攜帶。
7.Unlike hard disks, this type of storage does not have any moving parts, is more reliable, and requires less
power. → Solid-state 固體狀態 與硬盤不同,這種類型的存儲器沒有任何移動部件,更可靠,並且需要更
少的電力
8.Devices that translate the processed information from the computer into a form that humans can
understand. → Output
10.A type of a file that might contain, for example, audience handouts, speaker notes, and electronic slides. →
Presentation
12.Programs that coordinate computer resources, provide an interface, and run applications are known as:
operating systems 協調計算機資源,提供接口和運行應用程序的程序稱為
14.Although not as powerful as a supercomputer, this type of computer is capable of great processing speeds
and data storage mainframe 雖然沒有超級計算機那麼強大,但這種類型的計算機能夠提供出色的處理速度
和數據存儲
17.Unlike memory, this type of storage holds data and programs even after electric power to the computer
system has been turned off. secondary
18.The type of file created by word processors, for example, memos, term papers, and letters. document
19.Uses the Internet and the web to shift many computer activities from a user’s computer to computers on
1.The basic components of cloud computing are clients, service providers, and the _____. → Internet,
3.Publishes short sentences that take only a few seconds to write. → Microblog
4.A business-oriented social networking site. → LinkedIn 面向商業的社交網站
6.Maintain huge databases relating to information provided on the web and the Internet. → Search services
7.Two popular instant messaging services are Google Talk and Facebook _____. → Chat
10.The most common way to access the Internet is through a _____ → ISP
The network that connects computers all over the world. Internet
Using file transfer utility software, you can copy files to your computer from specially configured servers on
Communities of individuals who share a common interest typically create Facebook. groups
Type of e-mail account that does not require an e-mail program to be installed on a user’s computer is:
web-based
Using a keyword, a search engine returns a list of related sites known as: hits
Three basic components to cloud computing are clients, Internet, and _____. service providers
2.An ethical issue relating to using another person’s work and ideas as your own without giving credit to the
original source. → Plagiarism 抄襲
4.Wide range of programs that secretly record and report an individual’s activities on the Internet. → Spyware
間諜軟件
5.A type of scanning device such as fingerprint and iris (eye) scanner. → Biometric
一種掃描設備,如指紋和虹膜(眼)掃描儀。 →生物識別
6.Small data files deposited on your hard disk from websites you have visited. → Cookies
從您訪問過的網站上存放在硬盤上的小數據文件。 →餅乾
7.Privacy concern that relates to the responsibility to ensure correct data collection. → Accuracy
與確保正確數據收集的責任相關的隱私問題。 →準確性
8.Process of coding information to make it unreadable except to those who have a key. → Encryption
編碼信息的處理,除了擁有密鑰的人之外,使其不可讀。 →加密
The three primary privacy issues are accuracy, property, and: access
The browser mode that ensures your browsing activity is not recorded. Privacy
The information that people voluntarily post in social networking sites, blogs, and photo- and video-sharing
Programs that come into a computer system disguised as something else are called: Trojan horses
The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass
another person is known as: cyberbullying(網絡欺凌)
Special hardware and software used to control access to a corporation’s private network is known as a(an):
firewall
1. In an information system, the rules or guidelines for people to follow are called _______ [procedures].
在信息系統中,人們遵循的規則或指南稱為
2. The component of the information system that is described as raw, unprocessed facts, including text,
numbers, images, and sounds, is called _______ [data]. 應用軟件可以分為通用,專用或[移動] _______應用
程序
3. Application software can be categorized as either general-purpose, specialized, or [mobile] _______ apps.
4. The five types of personal computers are: desktops, laptops, tablets, smartphones, and _____ [wearables]
5. Increased use of mobile or wireless communication devices and cloud computing has been termed "the
6. Which part of an information system consists of the rules or guidelines for people to follow? Procedures
(程序)
.信息系統的哪個部分包含人們遵循的規則或準則?程序(程序)
7. The equipment that processes data in order to create information is called the _______. Hardware(硬件)
處理數據以創建信息的設備稱為_______。硬件(硬件)
8. In most cases, the word "software" is interchangeable with the word _______. Program
在大多數情況下,“軟件”一詞可與_______一詞互換。程序
9. Which of the following is a collection of programs rather than a single program? System software
以下哪一項是程序集合而不是單一程序?系統軟件
10. Identify the program that coordinates computer resources, provides an interface between users and the
11. Antivirus programs protect your computer system from viruses or malicious programs. This is an example
of which type of software? Utilities(公用事業)
防病毒程序可保護您的計算機系統免受病毒或惡意程序的侵害。這是哪種軟件的一個例子?公用事業
12. Which of the following computers is also referred to as a server and is used to support end users for things
such as retrieving data from a database or providing access to application software? Midrange(中檔)
以下哪台計算機也稱為服務器,用於支持最終用戶檢索數據庫中的數據或提供對應用程序軟件的訪問?中
13. Desktop, laptop, and tablet computers, and mobile devices are classified as ______.personal computers
14. The most widely used handheld computers are _______. Smartphones
15. A microcomputer that is smaller, lighter, and less powerful than a notebook, and that has a touch sensitive
screen, is called a _______ tablet (平板電腦)
16. This computer component holds the program and data that is currently being processed. RAM
該計算機組件保存當前正在處理的程序和數據。內存
17. Which of the following will not retain data after the computer is turned off? RAM
計算機關閉後,以下哪項不會保留數據?內存
18. Identify the four basic categories of hardware in a personal computer system.
確定個人計算機系統中的四種基本硬件類別
20. Employee records, including names, social security numbers, and related information, would typically be
1. Simplifies the process of making a selection from a list of alternatives by graphically displaying the effect of
2.A type of specialized suite that includes a variety of programs designed to make computing easier and safer.
→ Utility
一種專用套件,包括各種旨在使計算更容易和更安全的程序。 實用程序
2. Image editors create images made up of thousands of dots known as _____. → Pixels
Image 編輯創建的圖像由數千個點組成,稱為_____。 →像素
3. Toolbars typically appear below the menu bar and include small graphic elements called _____. → Buttons
Toolbars 通常出現在菜單欄下方,包含名為_____的小圖形元素。 →按鈕
5.A website that provides access to specific mobile apps is known as an app _____. → Store
9.Also known as a photo editor, this specialized graphics program edits or modifies digital photographs. →
Image editor
10.A type of suite that is stored at a server on the Internet and is available anywhere you can access the
Internet. → Cloud
This type of software works with end users, application software, and computer hardware to handle the
Programs that organize, analyze, and graph numerical data such as budgets and financial reports. Spreadsheets
(電子表格)
Program that allows you to mix text and graphics to create publications of professional quality.
desktop publishing
Programs that combine a variety of visual objects to create attractive, visually interesting presentations
presentation graphics
Programs typically used to create sophisticated commercial websites web authoring programs (網絡創作計劃)
1.Type of program that guards computer systems from viruses and other damaging programs. → Antivirus
3.Type of operating system that controls and coordinates networked computers. → NOS
4.Program that works with the operating system to allow communication between a device and the rest of a。
5.An operating system is often referred to as the software environment or software _______. → Platform
6.Mobile operating system that is owned by Google and is widely used in many smartphones. → Android,
7.Restarting a running computer without turning off the power. → Warm boot
9.A type of software that allows a single physical computer to operate as though it were two or more separate
10.Programs that perform specific tasks related to managing computer resources. → Utilities
The programs that convert programming instructions written by programmers into a language that computers
The ability to switch between different applications stored in memory is called: multitasking(多任務處理)
This operating system feature is controlled by a mouse and changes shape depending on its current function.
Pointer(指針)
The operating system based on Linux, designed for notebook computers that use cloud computing and cloud
storage: Chrome(鉻)
The mobile operating system developed by Apple and originally called iPhone OS: iOS
A utility program that copies all files in the libraries, contacts, favorites, and on the desktop: File History
A troubleshooting utility that identifies and eliminates nonessential files, frees up valuable disk space, and
improves system performance: Disk Cleanup(磁盤清理)
1.Type of worker who is involved with the distribution and communication of information. → Data
3.Computer-based information system that uses data from TPS to support middle-level managers. → MIS
5.Type of software that works behind the scenes to handle detailed operating procedures. → System
6.Computer system that allows people located at various geographic locations to communicate and have in-
8.The accounting activity that records the customer requests for the company’s products or services is sales
9.Function that plans, prices, promotes, sells, and distributes the organization’s goods and services. →.
Marketing
10.The accounting activity concerned with calculating employee paychecks. → Payroll
Which of the basic organizational functions records all financial activity from billing customers to paying
employees? accounting
What managerial level has information flow that is vertical, horizontal, and external? top
Which computer-based information system uses data from TPS and analytical tools to support middle
managers? DSS
Accounts payable refers to money the company owes its suppliers for materials and services it has: received
What accounting activity keeps track of all summaries of all transactions? general ledger
What accounting statement lists the overall financial condition of an organization? balance sheet
A DSS consists of four parts: user, system software, decision models, and: data
What type of worker is involved with the distribution, communication, and creation of information?
information
What type of program is designed to schedule, plan, and control project resources? project managers
1.The four approaches to conversion are parallel, pilot, phased, and _____. → Direct,
2.The approach in which the new system is implemented gradually over a period of time. → Phased,
3.The document that shows the levels of management and formal lines of authority is an _____. →.
Organization chart,
4.The last and ongoing phase of the systems life cycle is systems _____. → Maintenance,
6.The phase in which the old system is replaced and training begins. → Implementation,
7.Systems life cycle phase that studies the present system in depth. → Analysis,
9.Systems analysis and design is a six-phase problem solving procedure for examining and improving. an
information _____. → System,
10.Systems analysis involves suggesting alternative _____. → Solutions
An information system is a collection of hardware, software, people, procedures, the Internet, and: data
What is the first phase in the systems life cycle? preliminary investigation 初步調查
Which phase involves installing the new system and training people? systems implementation
This phase is concerned about determining system requirements not in design. systems analysis
Which systems analysis tool shows the relationship between input and output documents? grid chart
These tools relieve the systems analysts of many repetitive tasks, develop clear documentation, and, for larger
Which phase is concerned with economic, technical, and operational feasibility? systems design
What type of feasibility evaluates whether the people within the organization will embrace or resist a new
system? operational
Which approach to conversion begins by trying out a new system in only one part of an organization? pilot
An alternative to the systems life cycle approach using powerful development software, small specialized
九.
1.System board component that provides a connection point for specialized cards or circuit boards. 系統板組
件,為專用卡或電路板提供連接點 → Slots
2.A type of memory that provides a combination of features of RAM and ROM. → Flash,
3.A type of memory that is volatile or loses its contents when power is turned off. → RAM,
4.A type of memory that improves processing by acting as a temporary high-speed holding area between. the
5.This bus connects the CPU to memory on the system board. → System,
6.This port can be used to connect many USB devices to the system. → USB,
7.Provide connection points for chips. → Sockets 插座
8.A type of multiprocessor chip that provides two or more separate and independent CPUs. → Multicore,
9.A socket for external devices to connect to the system unit. → Port,
This container houses most of the electrical components for a computer system. system unit
In a personal computer system, the central processing unit is typically contained on a single: chip
This type of memory divides large programs into parts and stores the parts on a secondary storage device.
virtual
Also known as NIC, this adapter card is used to connect a computer to a(an): network
This provides a pathway to connect parts of the CPU to each other. bus
The specialized port that connects musical instruments like an electronic keyboard to a sound card. MIDI
Which one of the following coding systems can be used to represent the Thai language? Unicode
十.
1.Special-purpose printers for creating maps, images, and architectural and engineering drawings. → Plotters,
2.Input device that controls a pointer that is displayed on the monitor. → Mouse,
9.A pen like device commonly used with tablet PCs and PDAs. → Stylus,
The type of screen that can be touched with more than one finger and supports zooming in and out by
Unlike hard disks, this type of storage does not have any moving parts, is more reliable, and
requires less power. → Solid-state,
(與硬盤不同,這種類型的存儲器沒有任何移動部件,更可靠,並且需要更少的電力 固态硬盘)
Devices that translate the processed information from the computer into a form that humans
can understand. → Output,
(將處理過的信息從計算機轉換為人類可以理解的形式的設備。輸出)
Consists of the step-by-step instructions that tell the computer how to do its work. → Program,
(包含告訴計算機如何完成其工作的分步說明。程序)
A type of a file that might contain, for example, audience handouts, speaker notes, and
electronic slides. → Presentation,
(一種文件類型,可能包含,例如,觀眾講義,演講者備註和電子幻燈片。演示)
A container that houses most of the electronic components that make up a computer system. →
System unit,
(容納大部分構成計算機系統的電子元件的容器 系統單位)
Enables the application software to interact with the computer hardware. → System software, \
(使應用程序軟件能夠與計算機硬件交互 系統軟件)
Type of computer that is small enough to fit on top of or alongside a desk yet is too big to carry
around. → Desktop
(計算機的類型小到足以放在桌子的頂部或旁邊但是太大而無法隨身攜帶。桌面)
a. output devices(輸出設備)
b. storage devices(存儲設備)
c. hardware (硬件)
d. software (軟件)
CH0102 Programs that coordinate computer resources, provide an interface, and run applications
are known as:
(協調計算機資源,提供界面和運行應用程序的程序稱為)
a. storage systems(存儲設備)
b. utility programs(實用程序)
a. utility program(實用程序)
b. specialized program(專業計劃)
c. general-purpose application(应用程序接口)
d. system application(系統應用)
CH0104 Although not as powerful as a supercomputer, this type of computer is capable of great
processing speeds and data storage.
(雖然沒有超級計算機那麼強大,但這種類型的計算機能夠提供出色的處理速度和數據存儲。)
a. tablet(平板电脑)
b. midrange(小型计算机)
c. mainframe (大型計算機)
d. laptop(筆記本電腦)
a. tablet(平板电脑)
b. smartphone(智能電話)
c. laptop(筆記本電腦)
d. wearable(可穿戴计算机)
a. network
b. secondary storage(二級存儲)
c. memory(記憶)
d. computer
CH0107 Unlike memory, this type of storage holds data and programs even after electric power to
the computer system has been turned off.
(與存儲器不同,這種類型的存儲器即使在關閉計算機系統的電源後也能保存數據和程序。)
a. primary(主要)
b. RAM(內存)
c. secondary(二級)
d. ROM(只讀存儲器)
CH0108 The type of file created by word processors, for example, memos, term papers, and letters.
(由文字處理程序創建的文件類型,例如備忘錄,學期論文和字母。)
a. presentation(演示)
b. document(文檔)
c. database(數據庫)
d. worksheet(工作表)
CH0109 Uses the Internet and the web to shift many computer activities from a user’s computer to
computers on the Internet.
(使用 Internet 和 Web 將許多計算機活動從用戶的計算機轉移到 Internet 上的計算機。)
a. cloud computing(雲端運算)
b. solid-state storage(固态硬盘)
c. high definition(高清晰度)
d. network(網絡)
a. supercomputer(超級電腦)
b. web
c. Facebook
d. Internet(互聯網)
The basic components of cloud computing are clients, service providers, and the_____ → Internet,
(雲計算的基本組成部分是客戶,服務提供商和互聯網)
The most common way to access the Internet is through a _____ → ISP,
(訪問互聯網最常見的方式是通過服务提供商)
Publishes short sentences that take only a few seconds to writ. → Microblog,
(發表短句,只需幾秒鐘即可完成。 →微博)
Maintain huge databases relating to information provided on the web and the Internet.
→ Search services
(維護與網絡和互聯網上提供的信息相關的龐大數據庫。 →搜索服務)
Two popular instant messaging services are Google Talk and Facebook _____. → Chat,
(兩種流行的即時通訊服務是 Google Talk 和 Facebook _____。 →聊天,)
CH0201 The network that connects computers all over the world.
(連接世界各地計算機的網絡。)
a. Internet
b. LAN
c. web
d. ARPANET(高等研究計劃署網路)
CH0202 The rules for exchanging data between computers.
(計算機之間交換數據的規則。)
a. DSL
b. WWW
c. web
d. protocols(協議)
CH0203 Using file transfer utility software, you can copy files to your computer from specially
configured servers on the Internet. This is called:
(使用文件傳輸實用程序軟件,您可以從 Internet 上專門配置的服務器將文件複製到計算機。 這就是所
謂的:)
a. uploading
b. filtering (過濾)
c. downloading
d. blogging
CH0204 Communities of individuals who share a common interest typically create Facebook:
(擁有共同興趣的個人社區通常會創建 Facebook:)
a. clients
b. Pages
c. Profiles (簡介)
d. groups
CH0205 Type of e-mail account that does not require an e-mail program to be installed on a user’s
computer is:
(不需要在用戶的計算機上安裝電子郵件程序的電子郵件帳戶類型是:)
a. blog-based (博客為基礎的)
b. web-based ( 基於網絡的)
c. utility-based (實用為主)
d. client-based (基於客戶端)
a. LinkedIn
b. Wikipedia
c. Google+
d. Twitter
CH0207 Using a keyword, a search engine returns a list of related sites known as:
(搜索引擎使用關鍵字返回相關網站列表,稱為:)
a. strikes (打擊)
b. hits (點擊)
c. podcasts (播客)
d. blogs (博客)
a. ftp
c. e-commerce (電子商務)
CH0209 The continuing Internet development that allows objects to send and receive data over the
Internet.
(持續的 Internet 開發,允許對象通過 Internet 發送和接收數據。)
a. IoT (物聯網)
b. search engines
c. HTML
d. Web 2.0
!!!! CH0210 Three basic components to cloud computing are clients, Internet, and _____.
(雲計算的三個基本組件是客戶端,Internet 和_____。)
a. service providers
b. streaming
c. Web 3.0
d. CSS
An ethical issue relating to using another person’s work and ideas as your own without giving credit
to the original source. → Plagiarism
(一個道德問題,涉及使用他人的工作和想法作為您自己的工作和想法而不歸功於原始來源。 →剽竊)
Small data files deposited on your hard disk from websites you have visited. → Cookies,
(從您訪問過的網站上存放在硬盤上的小數據文件。 →小型文字檔案)
Wide range of programs that secretly record and report an individual’s activities on the Internet.
→ Spyware
(廣泛的程序秘密記錄和報告個人在互聯網上的活動。
→間諜軟件)
Process of coding information to make it unreadable except to those who have a key. → Encryption
(編碼信息的過程使其除了擁有密鑰的人之外不可讀。 →加密)
Privacy concern that relates to the responsibility to ensure correct data collection. → Accuracy
(與確保正確數據收集的責任相關的隱私問題。 →準確性)
a. access(訪問)
b. security(安全)
c. ownership(所有權)
d. ethics(倫理)
a. histories(歷史)
b. web bugs(網絡漏洞)
c. profiles(用户资料)
d. cookies
a. tool bar
b. history file
c. menu
d. firewall
CH0904 The browser mode that ensures your browsing activity is not recorded.
(確保您的瀏覽活動不被記錄的瀏覽器模式。)
a. sleep
b. privacy(隱私)
c. insert
d. detect
CH0905 The information that people voluntarily post in social networking sites, blogs, and photo-
and video-sharing sites is used to create their:
(人們自願在社交網站,博客,照片和視頻共享網站上發布的信息用於創建:)
a. access approval
b. firewall
c. online identity(在線身份)
d. phish
a. identity thieves(身份盜賊)
b. cyber traders(網絡交易員)
c. crackers(骇客)
d. antispies(反間諜)
CH0907 Programs that come into a computer system disguised as something else are called:
(進入計算機系統偽裝成其他東西的程序稱為:)
a. zombies
b. viruses(病毒)
c. Trojan horses(特洛伊木馬)
d. web bugs
CH0908 The use of the Internet, cell phones, or other devices to send or post content intended to
hurt or embarrass another person is known as:
(使用互聯網,手機或其他設備發送或發布旨在傷害或羞辱他人的內容稱為:)
a. unethical communication
b. social networking discrimination
c. online harassment
d. cyberbullying(網絡欺凌)
CH0909 Special hardware and software used to control access to a corporation’s private network is
known as a(an):
(用於控制對公司專用網絡的訪問的特殊硬件和軟件稱為:)
a. firewall(防火牆)
b. antivirus program
c. spyware removal program
d. communication gate
a. WPA2
b. ACT
c. VPN
d. DRM(数字版权管理)
In an information system, the rules or guidelines for people to follow are called procedures.
(在信息系統中,人們遵循的規則或指南稱為程序。)
The component of the information system that is described as raw, unprocessed facts, including
text, numbers, images, and sounds, is called data .
(被描述為原始的,未處理的事實(包括文本,數字,圖像和聲音)的信息系統的組件被稱為數
據。)
The five types of personal computers are: desktops, laptops, tablets, smartphones, and
wearables.
(五種類型的個人計算機是:台式機,筆記本電腦,平板電腦,智能手機和可穿戴設備。)
Increased use of mobile or wireless communication devices and cloud computing has been termed
"the wireless revolution."
(越來越多地使用移動或無線通信設備和雲計算被稱為“無線革命”。)
Which part of an information system consists of the rules or guidelines for people to follow?
(信息系統的哪一部分包含人們遵循的規則或指南?)
a. People
b. Internet
c. Procedures
d. Data
The equipment that processes data in order to create information is called the .
(處理數據以創建信息的設備稱為。)
a. typology
b. hardware
c. software
d. compiler(編譯器)
a. program
b. computer
c. procedure
d. application(應用)
a. Procedures
b. Microsoft Access
c. Hardware
d. System software
Identify the program that coordinates computer resources, provides an interface between users
and the computer, and runs applications.
(確定協調計算機資源的程序,提供用戶與計算機之間的接口,並運行應用程序。)
a. Operating system(操作系統)
b. Application software
c. System software
d. Device driver
Antivirus programs protect your computer system from viruses or malicious programs. This is an
example of which type of software?
(防病毒程序可保護您的計算機系統免受病毒或惡意程序的侵害。 這是哪種軟件的一個例子?)
a. Operating system
b. Browser software(瀏覽器軟件)
c. Application software
d. Utilities
Which of the following computers is also referred to as a server and is used to support end users for
things such as retrieving data from a database or providing access to application software?
(以下哪些計算機也稱為服務器,用於支持最終用戶檢索數據庫中的數據或提供對應用程序軟件的訪問?)
a. Mainframe
b. Midrange
c. Microcomputer
d. Supercomputer
Desktop, laptop, and tablet computers, and mobile devices are classified as .
(台式機,筆記本電腦,平板電腦和移動設備被歸類為。)
a. personal computers(個人電腦)
b. mainframe computers
c. supercomputers
d. midrange computers
b. tablets
c. laptops
d. smartphones
A microcomputer that is smaller, lighter, and less powerful than a notebook, and that has a touch
sensitive screen, is called a .
(微型計算機比筆記本電腦更小,更輕,功能更強,並且具有觸摸屏,被稱為。)
a. desktop
b. subnotebook
c. tablet(平板電腦)
d. laptop
This computer component holds the program and data that is currently being processed.
(此計算機組件保存當前正在處理的程序和數據。)
a. RAM(內存)
b. Bus
c. Ports
d. ROM
Which of the following will not retain data after the computer is turned off?
(關閉計算機後,以下哪項不會保留數據?)
a. RAM(內存)
b. ROM(只讀存儲器)
c. Hard drive(硬盤)
d. DVD
a. Presentation
b. Worksheet
c. Database
d. Document
Employee records, including names, social security numbers, and related information, would
typically be stored in what type of data file?
(員工記錄,包括姓名,社會安全號碼和相關信息,通常會存儲在什麼類型的數據文件中?)
a. Database(數據庫)
b. Document
c. Presentation
d. Worksheet
Image editors create images made up of thousands of dots known as _____. → Pixels,
(圖像編輯器創建的圖像由數千個點組成,稱為_____。 →像素)
A type of specialized suite that includes a variety of programs designed to make computing easier
and safer. → Utility,
(一種專用套件,包括各種旨在使計算更容易和更安全的程序。 →效用)
Toolbars typically appear below the menu bar and include small graphic elements called Buttons,
(工具欄通常出現在菜單欄下方,包含名為按鈕的小圖形元素)
A website that provides access to specific mobile apps is known as an app Store,
(提供對特定移動應用程序訪問的網站稱為應用程序商店)
A type of suite that is stored at a server on the Internet and is available anywhere you can
access the Internet. → Cloud,
(一種套件,存儲在 Internet 上的服務器上,可在任何可以訪問 Internet 的地方使用。 →雲端)
Also known as a photo editor, this specialized graphics program edits or modifies digital
photographs. → Image editor,
(這種專業的圖形程序也稱為照片編輯器,可以編輯或修改數碼照片。 →圖像編輯器)
Simplifies the process of making a selection from a list of alternatives by graphically displaying
the effect of alternatives before being selected. → Galleries
(通過在選擇之前以圖形方式顯示備選方案的效果,簡化從備選方案列表中進行選擇的過程。 →畫廊)
This type of software works with end users, application software, and computer hardware to
handle the majority of technical details.
(此類軟件可與最終用戶,應用程序軟件和計算機硬件配合使用,以處理大多數技術細節。)
a. specialized
b. application
c. utility
d. system
a. frame
b. dialog box
c. window
d. form
a. suites
b. spreadsheets
c. DBMS
d. word processors(文字處理器)
Programs that organize, analyze, and graph numerical data such as budgets and financial reports.
(組織,分析和繪製數字數據(如預算和財務報告)的程序。)
a. spreadsheets(電子表格)
b. word processors
c. DBMS
d. suites
Program that allows you to mix text and graphics to create publications of professional quality.
(程序,允許您混合文本和圖形,以創建專業質量的出版物。)
a. productivity
b. database
c. desktop publishing(桌面出版)
d. presentation
a. raster
b. ribbon
c. bitmap
d. vector(并行向量处理机)
a. bitmap
b. blog
c. HTML
d. vector
Programs that combine a variety of visual objects to create attractive, visually interesting
presentations.
(結合各種視覺對象的程序,以創建具有吸引力,視覺上有趣的演示文稿。)
a. DBMS
b. spreadsheet
c. word processor
d. presentation graphics(演示圖形)
b. illustration programs
a. office
b. integrated
c. utility
d. cloud
Mobile operating system that is owned by Google and is widely used in many smartphones.
→ Android
(移動操作系統由 Google 擁有,並在許多智能手機中廣泛使用。 →Android)
A type of software that allows a single physical computer to operate as though it were two or
more separate and independent computers. → Virtualization
(一種軟件,允許單個物理計算機像兩個或多個獨立且獨立的計算機一樣運行。 →虛擬化)
Program that works with the operating system to allow communication between a device and the
rest of a computer system is called a device Driver
(與操作系統一起工作以允許設備與計算機系統其餘部分通信的程序稱為設備驅動)
Programs that perform specific tasks related to managing computer resources. → Utilities
(執行與管理計算機資源相關的特定任務的程序。 →實用工具)
Type of program that guards computer systems from viruses and other damaging programs. →
Antivirus
(保護計算機系統免受病毒和其他破壞性程序攻擊的程序類型。 →防病毒)
Type of operating system that controls and coordinates networked computers. → NOS
(控制和協調聯網計算機的操作系統類型。 →NOS)
a. apps
b. application packages
c. operating systems
d. utility suites(实用软件)
What type of software works with users, application software, and computer hardware to handle
the majority of technical details?
(什麼類型的軟件可以與用戶,應用軟件和計算機硬件配合使用來處理大部分技術細節?)
a. system
b. Linux
c. application
d. desktop
The programs that convert programming instructions written by programmers into a language that
computers understand and process are language:
(將程序員編寫的編程指令轉換為計算機理解和處理的語言的程序是語言:)
a. converters
b. linguists
c. managers
d. translators(譯者)
a. programming
b. operational interference
c. multitasking(多任務處理)
d. diversion
a. icon
b. software
c. app
d. image
This operating system feature is controlled by a mouse and changes shape depending on its current
function.
(此操作系統功能由鼠標控制,並根據其當前功能更改形狀。)
a. menu
b. dialog box
c. mouse
d. pointer(指標)
The operating system based on Linux, designed for notebook computers that use cloud computing
and cloud storage:
(基於 Linux 的操作系統,專為使用雲計算和雲存儲的筆記本電腦而設計:)
a. Chrome
b. Windows
c. Mac
d. UNIX
The mobile operating system developed by Apple and originally called iPhone OS:
(由 Apple 開發的移動操作系統,最初稱為 iPhone OS:)
a. Mac OS
b. iOS
c. Android
d. Phone OS
A utility program that copies all files in the libraries, contacts, favorites, and on the desktop:
(一個實用程序,用於復制庫,聯繫人,收藏夾和桌面上的所有文件:)
a. File History
b. Optimize Drives
c. Compactor
d. Disk Cleanup
A troubleshooting utility that identifies and eliminates nonessential files, frees up valuable disk
space, and improves system performance:
(一個故障排除實用程序,可識別並刪除不重要的文件,釋放寶貴的磁盤空間並提高系統性能:)
a. Optimize Drives
b. Compactor
c. Disk Cleanup(磁盤清理)
d. File History
Computer-based information system that uses data from TPS to support middle-level managers. →
MIS,
(基於計算機的信息系統,使用 TPS 的數據來支持中層管理人員。 →MIS,)
The accounting activity that records the customer requests for the company’s products or services
is sales order _____. → Processing,
(記錄客戶對公司產品或服務的請求的會計活動是銷售訂單_____。 →處理,)
Type of worker who is involved with the distribution and communication of information. → Data,
(參與信息分發和傳播的工人類型。 →數據,)
Type of software that works behind the scenes tohandle detailed operating procedures. → System,
(在幕後工作以處理詳細操作過程的軟件類型。 →系統,)
Function that plans, prices, promotes, sells, and distributes the organization’s goods and services. →
Marketing,
(計劃,定價,促銷,銷售和分銷組織的商品和服務的功能。 →營銷,)
Computer system that allows people located at various geographic locations to communicate and
have in-person meetings. → Videoconferencing
(允許位於不同地理位置的人們進行通信並進行面對面會議的計算機系統。 →視頻會議)
CH1001 Which of the basic organizational functions records all financial activity from billing
customers to paying employees?
(哪些基本組織功能記錄了從計費客戶到付費員工的所有財務活動?)
a. research
b. marketing
c. accounting
d. production
CH1002 What managerial level has information flow that is vertical, horizontal, and external?
(什麼樣的管理層有垂直,水平和外部的信息流?)
a. supervisory
b. top
c. foreman
d. middle
CH1003 Which computer-based information system uses data from TPS and analytical tools to
support middle managers?
(哪個基於計算機的信息系統使用來自 TPS 和分析工具的數據來支持中層管理人員?)
a. MIS
b. ESS
c. DSS
d. TPS
CH1004 Accounts payable refers to money the company owes its suppliers for materials and
services it has:
(應付賬款是指公司欠其供應商所擁有的材料和服務的資金:)
a. created
b. exported
c. inventoried
d. received
CH1005 What accounting activity keeps track of all summaries of all transactions?
(哪些會計活動會跟踪所有交易的所有摘要?)
a. inventory control
b. balance sheet
c. general ledger(總分類帳)
d. income statement
CH1006 What accounting statement lists the overall financial condition of an organization?
(什麼會計報表列出了組織的整體財務狀況?)
a. general ledger
b. inventory control
c. balance sheet(資產負債表)
d. income statement
a. inventory
b. exception
c. periodic(定期)
d. demand
CH1008 A DSS consists of four parts: user, system software, decision models, and:
(DSS 由四部分組成:用戶,系統軟件,決策模型和:)
a. operating system
b. data
c. spreadsheets
d. application software
CH1009 What type of worker is involved with the distribution, communication, and creation of
information?
(什麼類型的工人參與信息的分發,交流和創建?)
a. knowledge
b. information
c. foreman
d. executive
CH1010 What type of program is designed to schedule, plan, and control project resources?
(什麼類型的計劃旨在安排,計劃和控制項目資源?)
a. project managers(項目經理)
b. auditing
c. schedulers
d. dtp
Systems life cycle phase that studies the present system in depth. → Analysis,
(系統生命週期階段深入研究現有系統。 →分析,)
The four approaches to conversion are parallel, pilot, phased, and _____. → Direct,
(轉換的四種方法是並行,試用,分階段和_____。 →直接,)
Systems analysis and design is a six-phase problem solving procedure for examining and improving
an information _____. → System,
(系統分析和設計是一個六階段問題解決程序,用於檢查和改進信息_____。 →系統,)
The document that shows the levels of management and formal lines of authority is an _____. →
Organization chart,
(顯示管理水平和正式權限的文件是_____。 →組織結構圖,)
The last and ongoing phase of the systems life cycle is systems _____. → Maintenance,
(系統生命週期的最後和持續階段是系統_____。 →維護,)
The phase in which the old system is replaced and training begins. → Implementation,
(舊系統更換和培訓開始的階段。 →實施,)
Another name for systems implementation. → Conversion,
(系統實現的另一個名稱。 →轉換,)
The approach in which the new system is implemented gradually over a period of time. → Phased
(新系統在一段時間內逐步實施的方法。 →分階段)
a. systems analysts
b. data
c. DBMS
d. specialists
a. systems design
b. preliminary investigation(初步調查)
c. systems analysis
d. needs analysis
CH1203 Which phase involves installing the new system and training people?
(哪個階段涉及安裝新系統和培訓人員?)
a. systems analysis
b. systems design
c. systems implementation(系統實施)
d. preliminary investigation
CH1204 This phase is concerned about determining system requirements not in design.
(該階段關注的是確定不在設計中的系統要求。)
a. preliminary investigation
b. systems analysis(系統分析)
c. systems design
d. systems implementation
CH1205 Which systems analysis tool shows the relationship between input and output documents?
(哪個系統分析工具顯示輸入和輸出文檔之間的關係?)
a. grid chart(網格圖)
b. data flow diagram
c. system flow chart
d. automated design tool
CH1206 These tools relieve the systems analysts of many repetitive tasks, develop clear
documentation, and, for larger projects, coordinate team member activities.
(這些工具可以減輕系統分析人員的許多重複性任務,開發清晰的文檔,對於大型項目,可以協調團隊成員的
活動。)
CH1207 Which phase is concerned with economic, technical, and operational feasibility?
(哪個階段涉及經濟,技術和運營可行性?)
a. systems analysis
b. preliminary investigation
c. systems design(系統設計)
d. systems implementation
CH1208 What type of feasibility evaluates whether the people within the organization will embrace
or resist a new system?
(什麼類型的可行性評估組織內的人是否會接受或抵制新系統?)
a. behavioral
b. economic
c. operational(操作)
d. technical
CH1209 Which approach to conversion begins by trying out a new system in only one part of an
organization?
(通過在組織的一個部分中嘗試新系統,開始採用哪種轉換方法?)
a. phased
b. direct
c. pilot(試驗性質的)
d. parallel
CH1210 An alternative to the systems life cycle approach using powerful development software,
small specialized teams, and highly trained personnel.
(使用強大的開發軟件,小型專業團隊和訓練有素的人員來替代系統生命週期方法。)
a. prototyping
b. CASE
c. RAD(快速應用程式開發)
d. AAD
A type of memory that improves processing by acting as a temporary high-speed holding
area between the memory and the CPU. → Cache,
(一種內存,通過充當內存和 CPU 之間的臨時高速保持區域來改善處理。 →緩存,)
A type of memory that provides a combination of features of RAM and ROM. → Flash,
(一種內存,提供 RAM 和 ROM 功能的組合。 →Flash,)
A type of memory that is volatile or loses its contents when power is turned off. → Flash,
(一種易失性或在電源關閉時丟失其內容的存儲器。 →Flash,)
A type of multiprocessor chip that provides two or more separate and independent CPUs.
→ Multicore,
(一種多處理器芯片,提供兩個或多個獨立且獨立的 CPU。→多核,)
System board component that provides a connection point for specialized cards or circuit boards.
→ Slots,
(系統板組件,為專用卡或電路板提供連接點。 →老虎機,)
This port can be used to connect many USB devices to the system. → USB,
(此端口可用於將許多 USB 設備連接到系統。 →USB,)
his bus connects the CPU to memory on the system board. → System
(他的總線將 CPU 連接到系統板上的內存。 →系統)
CH0501 This container houses most of the electrical components for a computer system.
(該容器容納用於計算機系統的大多數電氣部件。)
a. system board
b. Unicode
c. chip carrier
d. system unit(系統單位)
CH0502 The most popular mobile device.
(最受歡迎的移動設備。)
a. all-in-one
b. smartphone
c. ultrabook
d. desktop
a. system board(主機板)
b. board processor
c. mobile system
d. computer
CH0504 How many bytes can a 32-bit-word computer access at one time?
(32 位計算機一次可以訪問多少字節?)
a. 1
b. 8
c. 4
d. 16
CH0505 In a personal computer system, the central processing unit is typically contained on a single:
(在個人計算機系統中,中央處理單元通常包含在一個單獨的:)
a. RAM
b. chip
c. module
d. bus
CH0506 This type of memory divides large programs into parts and stores the parts on a secondary
storage device.
(這種類型的存儲器將大型程序劃分為多個部分並將這些部分存儲在輔助存儲設備上。)
a. direct
b. expanded
c. virtual(虛擬)
d. random-access
CH0507 Also known as NIC, this adapter card is used to connect a computer to a(an):
(也稱為 NIC,此適配卡用於將計算機連接到(an):)
a. expansion
b. network
c. AIA
d. graphics
CH0508 This provides a pathway to connect parts of the CPU to each other.
(這提供了將 CPU 的各部分彼此連接的途徑。)
a. cable
b. wireless
c. wired
d. bus
CH0509 The specialized port that connects musical instruments like an electronic keyboard to a
sound card.
(將電子鍵盤等樂器連接到聲卡的專用端口。)
a. MIDI
b. Thunderbolt
c. eSATA
d. HDMI
CH0510 Computers can only recognize this type of electronic signal.
(計算機只能識別這種類型的電子信號。)
a. bus
b. maximum
c. analog
d. digital(數字)
CH0511 Which one of the following coding systems can be used to represent the Thai language?
(以下哪種編碼系統可用於表示泰語?)
a. CJK
b. ASCII
c. EBCDIC
d. Unicode(統一)
Input device that controls a pointer that is displayed on the monitor. → Mouse,
(控制显示器上显示的指针的输入设备。 →鼠标,)
Special-purpose printers for creating maps, images, and architectural and engineering drawings.
→ Plotters,
(用于创建地图,图像以及建筑和工程图纸的专用打印机。 →绘图员,)
A pen like device commonly used with tablet PCs and PDAs. → Stylus,
(笔式设备,通常用于平板电脑和 PDA。 →手写笔,)
Bar code readers use either handheld wand readers or platform _____. → Scanners,
(条形码阅读器使用手持式阅读器或平台_____。 →扫描仪,)
A monitor feature that is measured by the diagonal length of the viewing area.
→Active display area,
(监视器功能,由观察区域的对角线长度测量。 →活动显示区域,)
a. QWERTY
b. Alpha
c. OptiKey
d. Daisy
a. scanner
b. cord
c. printer
d. mouse
CH0603 The type of screen that can be touched with more than one finger and supports zooming in
and out by pinching and stretching your fingers.
(可以用多个手指触摸的屏幕类型,通过捏住和伸展手指来支持放大和缩小。)
a. OLED
b. dynamic
c. multitouch
d. digital
a. scanners
b. monitors
c. headsets
d. MaxiCode
CH0605 Device used by banks to automatically read those unusual numbers on the bottom of
checks and deposit slips.
(银行用于自动读取支票和存款单底部的异常数字的设备。)
a. FDIC
b. MICR
c. UPC
d. OMR
a. RFID
b. mouse
c. VR
d. microphone
CH0607 The monitor feature that indicates the ability to display colors.
(显示器功能,指示显示颜色的能力。)
a. contrast ratio(对比度)
b. dot pitch
c. aspect ratio
d. resolution rate
a. e-book readers
b. lasers
c. HDTV
d. whiteboards
a. LCD
b. VoIP
c. immersive
d. electronic
CH0610 The study of human factors related to things people use is:
(与人们使用的事物相关的人为因素的研究是:)
a. telephony
b. RFID
c. ergonomics(人体工程学)
d. RSI
Similar to internal hard-disk drives except they use solid-state memory. → Solid-state drives,
(与内部硬盘驱动器类似,但它们使用固态内存。 →固态硬盘,)
Each track is divided into invisible wedge-shaped sections called _____ . → Sectors,
(每条轨道分为隐形楔形部分,称为_____。 →部门,)
Architecture to link remote storage devices to computers such that the devices are as available
as locally attached drives. → Storage area network,
(将远程存储设备链接到计算机的体系结构,使设备与本地连接的驱动器一样可用。 →存储区
域网络,)
Mass storage device widely used for home and small business storage. → Network attached storage,
(大容量存储设备广泛用于家庭和小型企业存储。 →网络附加存储,)
Hardware that reads data and programs from storage media. → Storage devices,
(从存储介质读取数据和程序的硬件。 →存储设备,)
Increases storage capacity by reducing the amount of space required to store data and programs
. → File compression,
(通过减少存储数据和程序所需的空间量来增加存储容量。 →文件压缩,)
Unlike hard disks, this type of storage does not have any moving parts, is more reliable, and
requires less power. → Solid-state,
(与硬盘不同,这种类型的存储器没有任何移动部件,更可靠,并且需要更少的电力。 →固態硬碟)
a. read-only memory
b. primary storage(主存储)
c. ratio active memory
d. secondary storage
CH0702 The actual physical material that holds the data and programs.
(保存数据和程序的实际物理材料。)
a. capacity
b. primary storage
c. access
d. media(媒体)
CH0703 Measures how tightly the magnetic charges can be packed next to one another on the disk.
(测量磁性电荷在磁盘上彼此相邻的紧密程度。)
a. sectors
b. tracks
c. cylinders
d. density(密度)
CH0704 When a read-write head makes contact with the hard disk’s surface, it causes a head:
(当读写磁头与硬盘表面接触时,会导致磁头:)
a. pit
b. scratch
c. crash
d. land
a. file decompression
b. file compression
c. RAID
d. disk caching(磁盘缓存)
CH0706 This type of storage uses pits and lands to represent 1s and 0s.
(这种类型的存储使用凹坑和平台来表示 1 和 0。)
a. solid state
b. cloud
c. optical(光纤)
d. hard disk
a. optical drives
b. flash drives(闪存驱动器)
c. ports
d. universal state bus
CH0709 An organizational strategy to promote efficient and safe use of data across the networks.
(促进跨网络有效和安全使用数据的组织战略。)
a. RAID
b. cloud dynamic
c. data mission statement
d. enterprise storage system(企业存储系统)
a. platters
b. CD devices
c. flash drives
d. mass storage devices(大容量存储设备)
This network, also known as a hierarchical network, is often used to share corporatewide data.
→ Tree,
(该网络也称为分层网络,通常用于共享公司范围的数据。 →树,)
Type of network topology in which each device is connected to a common cable called a backbone.
→ Bus,
(每个设备连接到称为主干的公共电缆的网络拓扑类型。 →bus,)
In this network, nodes have equal authority and can act as both clients and servers. → Peer-to-peer
(在此网络中,节点具有相同的权限,可以充当客户端和服务器。 →点对点)
CH0801 The concept related to using computer networks to link people and resources.
(该概念涉及使用计算机网络链接人员和资源。)
a. Wi-Fi
b. GPS
c. connectivity(连接)
d. TCP/IP
CH0802 A high-frequency transmission cable that delivers television signals as well as connects
computers in a network.
(一种高频传输电缆,可以传输电视信号并连接网络中的计算机。)
a. twisted pair
b. hi def
c. coaxial(同轴)
d. 3D
CH0803 A short-range radio communication standard that transmits data over short distances of up
to approximately 33 feet.
(短距离无线电通信标准,可在最远约 33 英尺的短距离内传输数据。)
a. Bluetooth(蓝牙)
b. TCP/IP
c. DSL
d. broadband
CH0804 The speed with which a modem transmits data is called its:
(调制解调器传输数据的速度称为:)
a. dynamic rate
b. transfer rate(转移率)
c. digital velocity
d. modular rating
CH0805 The bandwidth typically used for DSL, cable, and satellite connections to the Internet.
(带宽通常用于 DSL,有线和卫星连接到 Internet。)
a. voiceband
b. medium band
c. broadband(宽带)
d. baseband
CH0806 Every computer on the Internet has a unique numeric address called a(an):
(Internet 上的每台计算机都有一个名为 a(an)的唯一数字地址:)
a. broadcast
b. packet
c. DNS
d. IP address(IP 地址)
CH0807 Sometimes referred to as a LAN adapter, these expansion cards connect a computer to a
network.
(有时称为 LAN 适配器,这些扩展卡将计算机连接到网络。)
a. server
b. VPN
c. NIC
d. PCMCIA
CH0808 A device that allows one LAN to be linked to other LANs or to larger networks.
(允许一个 LAN 链接到其他 LAN 或更大网络的设备。)
a. IDS
b. network gateway(网络网关)
c. PAN
d. switch
CH0809 Typically using Wi-Fi technology, these wireless access points are available from public
places such as coffee shops, libraries, bookstores, colleges, and universities.
(通常使用 Wi-Fi 技术,这些无线接入点可从公共场所获得,例如咖啡店,图书馆,书店,学院和大学。)
a. LANs
b. extranets
c. hotspots(热点)
d. PANs
CH0810 Bus, ring, star, tree, and mesh are five types of network:
(总线,环,星形,树和网格是五种类型的网络:)
a. strategies
b. protocols
c. devices
d. topologies(拓扑)
The first-generation language consisting of 1s and 0s. → Machine,
(第一代语言由 1 和 0 组成。 →机器,)
5GL that allows more direct human communication with a program. → Natural language,
(5GL 允许与程序进行更直接的人工交流。 →自然语言,)
Generation of computer languages that allows a person to provide a system with a problem
and some constraints, and then request a solution. → 5GL,
(生成计算机语言,允许人们为系统提供问题和一些约束,然后请求解决方案。 →5GL,)
Logic structure, also known as IF-THEN-ELSE, that controls program flow based on a decision.
→ Selection,
(逻辑结构,也称为 IF-THEN-ELSE,根据决策控制程序流。 →选择,)
Program step that involves creating descriptions and procedures about a program and how to use it.
→ Documentation,
(程序步骤涉及创建有关程序的描述和过程以及如何使用它。 →文档,)
Programming languages that are closer to the language of humans. → Higher level,
(编程语言更接近人类语言。 →更高级别,)
Converts a procedural language one statement at a time into machine code just before it is to
be executed. → Interpreter
(将一个过程语言一次一个地转换为机器码,然后再执行它。 →口译员)
a. direct logic
b. software
c. hardware
d. data
CH1302 The major processing steps identified in a top-down program design are called:
(自上而下的程序设计中确定的主要处理步骤称为:)
a. instructions
b. logic
c. modules(模块)
d. assembly
CH1303 The programming logic structure in which one program statement follows another.
(编程逻辑结构,其中一个程序语句跟随另一个。)
a. selection
b. repetition
c. loop
d. sequential(顺序)
CH1304 One of the best ways to code effective programs is to use the three basic logic structures to
create:
(编写有效程序的最佳方法之一是使用三种基本逻辑结构来创建:)
a. structured programs(结构化程序)
b. pseudocode
c. code reviews
d. modular languages
CH1305 Which step in the six-step programming procedure involves desk checking and searching for
syntax and logic errors?
(六步编程过程中的哪一步涉及桌面检查和搜索语法和逻辑错误?)
a. program design
b. program documentation
c. program test(程序测试)
d. program maintenance
CH1306 Which step in the six-step programming procedure is the final step?
(六步编程程序中的哪一步是最后一步?)
a. program test
b. program documentation
c. program design
d. program maintenance(程序维护)
CH1307 Unlike traditional systems development, this software development approach focuses less
on the procedures and more on defining the relationships between previously defined procedures.
(与传统的系统开发不同,这种软件开发方法更少关注程序,而更多地关注于定义先前定义的过程之间的关
系。)
a. 2GL
b. object-oriented(面向对象)
c. module
d. context-markup
a. low-level language
b. midlevel language
c. procedural language
d. high-level language
CH1309 A compiler converts the programmer’s procedural language program, called the source
code, into a machine language code, called the:
(编译器将程序员的过程语言程序(称为源代码)转换为机器语言代码,称为:)
a. structured code
b. top-down code
c. object code(目标代码)
d. interpreter code
CH1310 The 4GL languages that enable nonprogrammers to use certain easily understood
commands to search and generate reports from a database.
(4GL 语言使非程序员能够使用某些易于理解的命令从数据库中搜索和生成报告。)
a. C++
b. COBOL
c. application generator
d. query(询问)
View that focuses on the actual format and location of the data. → Physical,
(视图侧重于数据的实际格式和位置。 →物理,)
Type of database structure where the data elements are stored in different tables. → Relational,
(数据结构的类型,其中数据元素存储在不同的表中。 →关系,)
Type of processing in which data is collected over several hours, days, or even weeks and then
processed all at once. → Batch,
(在几小时,几天甚至几周内收集数据然后一次处理所有数据的处理类型。 →批量,)
Another name for a data dictionary. → Schema,
(数据字典的另一个名称。 →架构,)
Object-oriented databases organize data by classes, objects, methods, and _____. → Attributes,
(面向对象的数据库按类,对象,方法和_____组织数据。 →属性,)
Type of database structure where fields or records are structured in nodes that are connected like
the branches of an upside-down tree. → Hierarchical,
(数据库结构的类型,其中字段或记录在连接的节点中构造,类似于倒置树的分支。 →分层,)
A data problem that often occurs when individual departments create and maintain their own data.
→ Redundancy,
(當各個部門創建和維護自己的數據時經常發生的數據問題。 →冗餘,)
Type of database that uses communication networks to link data stored in different locations.
→ Distributed
(使用通信網絡鏈接存儲在不同位置的數據的數據庫類型。→分佈式)
CH1101 Facts or observations about people, places, things, and events are:
(關於人,地點,事物和事件的事實或觀察是:)
a. tables
b. occurrences
c. data
d. records
CH1102 The most basic logical data element such as a single letter, number, or special character is
known as a(an):
:)
(最基本的邏輯數據元素(如單個字母,數字或特殊字符)稱為(an)
a. record
b. element
c. phrase
d. character
CH1103 Each record in a database has at least one distinctive field, called the:
(數據庫中的每條記錄至少有一個獨特的字段,稱為:)
a. type
b. view
c. key field
d. structure
CH1104 One element of database security is to provide only authorized users with:
(數據庫安全的一個要素是僅向授權用戶提供:)
a. passwords
b. classes
c. nodes
d. relations
CH1105 The bridge between the logical and physical views of the data is provided by:
(他在数据的逻辑和物理视图之间架起了桥梁:)
a. records
b. SQL
c. tables
d. DBMS
CH1106 Highly trained computer specialists who interact with the data administration subsystem
are known as:
(与数据管理子系统交互的训练有素的计算机专家称为:)
a. data modelers
b. DBMS
c. relational specialists
d. database administrators
CH1107 In a network database, each child node may have more than one parent node; this is known
as a:
(在网络数据库中,每个子节点可以具有多个父节点; 这被称为:)
a. parent relationship
b. many-to-many relationship
c. relational relationship
d. hierarchy
CH1108 Connections between parent nodes and child nodes are provided by:
(父节点和子节点之间的连接由以下提供:)
a. objects
b. DBA
c. characters
d. pointers
CH1109 Two of the most significant advantages of multidimensional databases over relational
databases are processing speed and:
(多维数据库相对于关系数据库的两个最重要的优点是处理速度和:)
a. objectification
b. conceptualization
c. control
d. format
a. relations
b. space
c. objects
d. time