Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1) A network that allows connected computers to share data, software application

ID: 3888620 • Letter: 1

Question

1)

A network that allows connected computers to share data, software applications, or other resources, typically within a limited geographic area, is called a ___________.            

                limited area network

                personal area network

                professional area network

                wide area network

                local area network

2)

Network protocols cover all of the following network issues EXCEPT:       

                data transmission format.

                packets routing from source to destination.

                error checking procedure.

                application programming language.

                data compression method.

3)

A large number of documents can be entered into a computer system separately and then manipulated at a single time using __________ processing.        

                simple

                application

                unit

                group

                batch

4)

The purpose of a(n) _____ is to connect other devices to a computer.     

                power supply

                portal

                tape

                element

                port

5)

Data is stored in a computer using patterns of ____________ defined by standard coding schemes.          

                bytes

                hertz

                bits

                programming statements

                characters

6)

Utility programs provide all of the following functions EXCEPT:   

                creating backups.

                formatting disks.

                converting file formats.

                detecting spyware.

                defragmenting files on hard drives.

7)

Which of the following is a large worldwide collection of networks that uses a common protocol to communicate?               

                The World Wide Web

                Domain Name System

                Local area network

                The Internet

                Wide area network

8)

Which of the following automates or supports activities throughout the systems development process to increase productivity and improve overall system quality?              

                Computer-aided biotechnology

                Computer-aided instructional technology

                Computer-aided software engineering tools

                Computer-aided development

                Computer-aided engineering

9)

Which of the following is NOT true regarding open source software?       

                Open source means the software is freely available to the general public.

                Users are free to suggest ideas for open source software but only a small group of carefully selected "committers" can implement the changes into the official releases of the software.

                The Internet has helped enable people around the world to contribute their time and expertise to develop or improve software.

                Mainstream computer companies have no involvement with the open source software movement.

                Open source software is available for many types of software, including operating systems, programming languages, database management systems, and applications.

10)

A(n) _____________ translates an entire computer program into machine language which is then executed by the CPU.     

                compiler

                foreign exchange

                executable

                server

                client device

11)

___________ is a programming platform that is used to develop applications that are highly interoperable across a variety of platforms and devices, such as desktop computers, mobile computers, or smartphones.            

                Microsoft .NET

                Java

                Flash

                HTML

                Javascript

12)

The technique of ____________ is necessary to refine the structure of a relational database model to optimize its efficiency and maintainability.   

                fine-tuning

                refinement

                renovation

                normalization

                enhancement

13)

In a client-server network environment, which of the following is NOT a common server type?    

                Print servers

                Application servers

                Telephone servers

                E-mail servers

                Database servers

14)

_______________ is an example of volatile memory.     

                An optical disk

                A solid-state drive

                Read-only memory

                Random access memory (RAM)

                A redundant array of independent drives (RAID)

15)

____________ is (are) used to process human body characteristics to identify and authenticate individuals for security and access control purposes.     

                Optical character recognition

                Biometric scanners

                Bar code readers

                Optical mark recognition

                Magnetic ink character recognition

16)

A(n) _____________ key, like StudentID in a STUDENT table, is used to uniquely identify each row or record in a database table.

                primary

                redundant

                foreign

                optional

                relationship

17)

___________________ computing involves incorporating two or more networked computers to increase computing power and accomplish a common processing task.           

                Supportive

                Collaborative

                Centralized

                Networked

                Cooperative

18)

Which of the following statements about the relational database model is NOT true?      

                Fields of data are in table columns.

                Data redundancy is completely eliminated.

                Records of data are in table rows.

                Tables can be related through the use of common fields.

                Tables contain all the facts about the objects of interest in the database.

19)

____________ are private, third-party-managed wide area networks commonly used for B2B communications.  

                Limited area networks

                Professional area networks

                Personal area networks

                Local area networks

                Value-added networks

20)

Which of the following is commonly used when designing a database for the purpose of showing associations between entities?          

                Computer clustering

                Batch processing

                Entity normalization technique

                Packet switching

                Entity-relationship diagram

21)

Which of the following devices helps avoid the problem of transmission collisions among computers, servers, and printers?             

                Router

                Wireless access point

                Switch

                Wireless controller

                Modem

22)

Which of the following is NOT a correct aspect of communication on the Internet?           

                TCP/IP is the protocol that governs Internet communication.

                TCP breaks data into small chunks and manages the transfer of those packets from computer to computer via packet switching.

                Routers connect networks and send packets along the route from source to destination.

                Ethernet is the protocol that governs Internet communication.

                IP defines how a packet is constructed.

23)

A biometric fingerprint is considered a(n) _____________ technology used for authentication purposes.

                bar code

                output

                input

                magnetic ink character recognition

                optical mark recognition

24)

Operating systems perform a variety of necessary functions for computers, including all of the following EXCEPT:

                maintaining the structure of storage directories and subdirectories.

                changing the font style and color in a Word document.

                managing secondary storage.

                managing the programs and data in main memory.

                booting (starting) the computer.

25)

In order for individuals to connect to the Internet, it is necessary to go through a(n) _____________.      

                Internet service provider

                personal area network

                Ethernet

                exchange service

                domain name

Explanation / Answer

CHEGG POLICY : ONLY ONE QUESTION PER POST IS ALLOWED OR A SINGLE QUESTION WITH ATMOST 4 SUBPARTS ,please ABIDE BY THE CHEGG POLICY

1. Local Area Network

2. Application Programming Language

3. Batch

4.Port