Shared Flashcard Set

Details

Information Systems & Computer Applications - Sample Test
from 2011 CLEP Official Study Guide
85
Computer Science
Undergraduate 1
07/19/2011

Additional Computer Science Flashcards

 


 

Cards

Term
File extensions such as .txt, .bmp, and .mp3 are used to identify a file's

A) output
B) creator
C) size
D) location
E) format
Definition
E) format
Term
Which of the following support tools is NOT provided with most word processing software?

A) a spelling checker
B) a thesaurus
C) an encyclopedia
D) mail-merge capability
E) a grammar checker
Definition
C) an encyclopedia
Term
Which of the following is designed for the purpose of having a team discuss a topic over an extended period of time while keeping the responses organized by topic?

A) data library
B) file sharing
C) push technology
D) internet telephony
E) threaded discussion group
Definition
E) threaded discussion group
Term
Which of the following would NOT be used as an input device for a computer system?

A) image scanner
B) CD-ROM drive
C) keyboard
D) mouse
E) PC speaker
Definition
E) PC speaker
Term
Which of the following is (are) legal for the purchaser of an audio CD?

I. Copying the CD for personal use.
II. Copying the CD and giving the copy to a friend for free.
III. Copying the CD and giving the copy for a friend for a fee.

A) none
B) I only
C) II only
D) I and II only
E) I, II, and III
Definition
B) I only

Copying the CD for personal use.
Term
Which of the following capabilities permits the simultaneous usage of multiple CPU's in a single computer system?

A) multimedia
B) multiplexing
C) multiprocessing
D) multiprogramming
E) multitasking
Definition
C) multiprocessing
Term
One responsibility that is NOT traditionally given to a beginning programmer is

A) coding
B) debugging
C) program testing
D) documentation
E) systems design
Definition
E) systems design
Term
A spreadsheet contains the values 9 and 12 in cells C4 and D4, respectively. What value will be displayed in cell F4 if F4 contains the formula (C4+D4/3)?

A) 7
B) 12
C) 13
D) 15
E) 21
Definition
C) 13

(Note: order of arithmetic operations)
Term
Which of the following is NOT part of input data controls in the context of information processing?

A) reasonableness checks
B) check digit verification
C) program debugging
D) syntax checks
E) batch totals
Definition
C) program debugging
Term
Applications software is designed to be compatible with the

A) internet browser
B) LAN configuration
C) operating system
D) programming language
E) hardware interface
Definition
C) operating system
Term
Which of the following types of systems development methods would be appropriate when a company does not have an expert IS department?

I. outsourcing
II. traditional SDLC
III. prototyping

A) I only
B) II only
C) III only
D) I and III only
E) I, II, and III
Definition
A) I only

Outsourcing.
Term
In the case of a power failure, the contents of RAM will be

A) automatically printed out
B) automatically saved on disk
C) displayed on the screen
D) lost
E) refreshed
Definition
D) lost
Term
Which of the following technologies does NOT facilitate knowledge management?

A) blogs
B) wikis
C) web conferencing
D) desktop sharing
E) biometrics
Definition
E) biometrics
Term
Which of the following has as its primary function locating Web sites that deal with particular subjects?

A) uniform resource locator
B) search engine
C) hypertext
D) outsourcer
E) browser
Definition
B) search engine
Term
Conversion of data files is part of which of the following phases of the information development process?

A) analysis
B) design
C) implementation
D) development
E) maintenance
Definition
C) implementation
Term
Which of the following is a database whose data are scattered across several physical servers?

A) data mine
B) data warehouse
C) relational database
D) distributed database
E) integrated database
Definition
D) distributed database
Term
Each of the following applications is typically available for a personal digital assistant EXCEPT

A) statistical analysis software
B) two-way wireless messaging
C) appointment calendar
D) address book
E) memo pad
Definition
A) statistical analysis software
Term
During preparation of a document using word processing software, a SAVE operation copies the document from

A) a disk to main memory
B) main memory to a printer
C) main memory to a disk
D) a hard disk to a floppy disk
E) one floppy disk to another
Definition
C) main memory to a disk
Term
Which of the following best describes how GPS units function?

A) The receiver sends out regular query pulses and waits to receive responses from a GPS satellite.
B) The receiver is passive and listens for the regular signals from GPS satellites, which are then processed to find the distance from the satellites.
C) The receiver sends out radio signals that are reflected back by satellites and detected by the unit
D) The receiver acts as a homing beacon that is tracked by the GPS satellites, which periodically send out position updates for each tracked receiver.
E) The receiver can detect an invisible electronic grid projected onto Earth's surface and compares the location on this grid to a stored map of Earth.
Definition
B) The receiver is passive and listens for the regular signals from GPS satellites, which are then processed to find the distance from the satellites.
Term
A disaster recovery plan to safeguard a company's computer system can be used for all of the following occurrences EXCEPT

A) a flood, fire, or other natural disaster
B) a massive long-term power outage
C) system upgrades and hardware maintenance
D) computer sabotage
E) a major viral infection of computer systems
Definition
C) system upgrades and hardware maintenance
Term
Using an enterprise resource planning system has which of the following advantages?

I. It is easier to install than a typical transaction processing system.
II. It provides a centralized database for organizational data.
III. It integrates processes over the organization.

A) I only
B) II only
C) I and II only
D) II and III only
E) I, II, and III
Definition
D) II and III only

It provides a centralized database for organizational data, and it integrates processes over the organization.
Term
In a relational database, each column represents

A) a record
B) an attribute
C) a key
D) an entity
E) a file
Definition
B) an attribute
Term
Which of the following is required to access the Internet from a home location?

A) Access to an Internet node or service provider
B) Access to a LAN
C) Access to a mainframe
D) An e-mail address
E) One's own home page
Definition
A) Access to an Internet node or service provider
Term
Assume that a file consists of the following records.

Product Number, Product, Model Year
BEC111, WIDGET, 2005
ABC123, GADGET, 2004
SBB003, WIDGET, 2003
XPL222, GADGET, 2004
MAS120, GADGET, 2000

The computer is instructed to sort this file in ascending order with Product as the primary sort key, Model Year as the secondary sort key, and Product Number as the tertiary sort key. If this file is printed in sorted order, which record will be the *third* printed?

A) BEC111, WIDGET, 2005
B) ABC123, GADGET, 2004
C) SBB003, WIDGET, 2003
D) XPL222, GADGET, 2004
E) MAS120, GADGET, 2000
Definition
D) XPL222, GADGET, 2004
Term
Which of the following is NOT a correct characterization of batch processing?

A) It allows immediate updating of master files.
B) It provides physical batch totals to be used in control procedures.
C) It provides efficient updating of master files.
D) It is most applicable for processing routine periodic activities.
E) It allows efficient scheduling of processing.
Definition
A) It allows immediate updating of master files.
Term
Which of the following pseudocode commands would most likely require a calculation step in an algorithm?

A) GET
B) SHOW
C) PRINT
D) SET
E) INCREMENT
Definition
E) INCREMENT
Term
Which of the following describes a Web site that provides access to multiple services such as news, weather, sports, and stock indexes?

A) host
B) portal
C) domain
D) hyperlink
E) home page
Definition
B) portal
Term
Which of the following is the minimum distance range of a class 2 Bluetooth device such as a hands-free cell phone headset?

A) 3 feet
B) 30 feet
C) 300 feet
D) 1,000 feet
E) 3,000 feet
Definition
B) 30 feet
Term
The process of planning, scheduling, and overseeing the development of a new information system is called

A) systems analysis
B) software engineering
C) feasibility assessments
D) project management
E) programming
Definition
D) project management
Term
The special formatting language used to create Web pages is called

A) HTML
B) XML
C) Perl
D) Java
E) Script
Definition
A) HTML
Term
Goals of a supply-chain management system include which of the following?

I. Facilitate up-selling of the product.
II. Deliver the product to the customer more rapidly.
III. Reduce the cost of the product.

A) I only
B) I and II only
C) I and III only
D) II and III only
E) I, II, and III
Definition
D) II and III only

Deliver the product to the customer more rapidly and reduce the cost of the product.
Term
The process through which a user is verified and validated to access a computer network / system is referred to as

A) encryption
B) password protection
C) authentication
D) account validation
E) certification
Definition
C) authentication
Term
A program written to access and update a master database that maintains sales of tickets to an upcoming concert is called

A) system software
B) networking software
C) a transaction processing system
D) an operating system
E) a knowledge management system
Definition
C) a transaction processing system
Term
In a spreadsheet formula, what type of cell address is fixed and does not change when the formula is copied?

A) relative address
B) constant address
C) fixed address
D) static address
E) absolute address
Definition
E) absolute address
Term
Which of the following is the term used when a Web site automatically downloads data or files to a computer whenever new data are available or at scheduled intervals?

A) web streaming
B) push technology
C) pipelining
D) spamming
E) web crawling
Definition
B) push technology
Term
Which of the following is (are) true of an object-oriented database in comparison to a relational database?

I. The object-oriented database is better for storing multimedia data.
II. The object-oriented database generally retrieves data more quickly.
III. The object-oriented database is more commonly used.

A) I only
B) I and II only
C) I and III only
D) II and III only
E) I, II, and III
Definition
A) I only

The object-oriented database is better for storing multimedia data.
Term
When applied to the development of computer systems, the term "ergonomics" means

A) designing computer systems to maximize the cost-benefit ratio
B) incorporating human comfort, efficiency, and safety into the design of the human-machine interface
C) following the systems development life cycle
D) fostering development team interaction through the use of computer-aided software engineering tools
E) optimizing the throughput rate by adjusting the operating system interrupts
Definition
B) incorporating human comfort, efficiency, and safety into the design of the human-machine interface
Term
Which of the following does NOT provide data security or access security?

A) data encryption
B) password protection
C) data encoding
D) biometric scan
E) digital certificate
Definition
C) data encoding
Term
A set of 8 bits can represent, at most, how many different characters?

A) 8
B) 16
C) 64
D) 128
E) 256
Definition
E) 256
Term
Which of the following is NOT a characteristic of a decision support system, as it is usually defined?

A) It can be used as an aid in solving ad hoc problems.
B) It is useful for what-if analysis.
C) It is intended to help managers make decisions.
D) It makes the one best or optimal decision.
E) It uses appropriate statistical and mathematical models.
Definition
D) It makes the one best or optimal decision.
Term
Meta data is best described as which of the following?

A) end-user data
B) data about data
C) data stored in a Web file format
D) data gathered by spyware
E) data returned by an Internet search engine
Definition
B) data about data
Term
Which of the following is NOT true about computer software documentation?

A) End-user documentation may be provided online through access to a help file or subsystem.
B) End-user documentation may be provided by means of a hard copy reference manual.
C) End-user documentation may be embedded in the programming code by use of comment statements.
D) Documentation should be an activity that takes place throughout the system development process.
E) Documentation that is designed for end-users will generally be less technical than documentation prepared for programmers.
Definition
C) End-user documentation may be embedded in the programming code by use of comment statements.
Term
For which of the following programming languages is there always a one-to-one correspondence between a line of code in that language and a line of code in machine language?

A) COBOL
B) Java
C) C++
D) Assembler
E) Visual BASIC
Definition
D) Assembler
Term
An online storefront developer should test the different versions of which of the following in order to ensure usability for all users?

A) database management systems
B) hypertext markup languages
C) compilers
D) web browsers
E) search engines
Definition
D) web browsers
Term
For which of the following conditions is it NEVER possible to recover a file from the disk to which it was written?

A) A different file with the same name is copied to the same location on the disk.
B) The file has been deleted.
C) The file becomes fragmented.
D) The disk drive malfunctions after the file is written.
E) The disk with the file on it contains some bad sectors.
Definition
A) A different file with the same name is copied to the same location on the disk.
Term
The American Charity Association, a nonprofit foundation, has a home page on the World Wide Web. Which of the following is the most likely address for its home page?

A) http://www.charity.gov
B) http://www.chartity.edu
C) http://www.charity.com
D) http://www.charity.org
E) http://www.charity.aca
Definition
D) http://www.charity.org
Term
A geographic information system must have which of the following characteristics?

I. Every record has an identified geographic location.
II. The system uses global positioning satellites.
III. The system provides results in a graphic format.

A) I only
B) I and II only
C) I and III only
D) II and III only
E) I, II, and III
Definition
C) I and III only

Every record has an identified geographic location, and the system provides results in a graphic format.
Term
What is the term that refers to the downloading of live video, audio, or animation in such a manner that the user can begin to access the content before the download is complete?

A) spooling
B) streaming
C) flaming
D) spamming
E) queuing
Definition
B) streaming
Term
Which of the following is a set of protocols used to link different types of computers over the Internet?

A) HTML
B) HTTP
C) ERP
D) TCP/IP
E) Ethernet
Definition
D) TCP/IP
Term
In considering the economic feasibility of a systems development project, which of the following would a project manager be LEAST likely to consider?

A) The cost of developing the system compared with the potential benefits of using the system.
B) The return on the initial investment on the system.
C) When the project will break even.
D) Whether the company can afford the project.
E) Whether the hardware can be acquired for the project.
Definition
E) Whether the hardware can be acquired for the project.
Term
A table called "Students" consists of the following records:

Name, Credits, GPA
Anderson, 10, 3.0
Chen, 9, 3.2
Gomez, 12, 3.1
Jones, 12, 3.0

A user entered the following SQL command:

Select Name; From Students; Where Credits > 9 and GPA > 3

How many names would be returned based on the criteria?

A) none
B) one
C) two
D) three
E) four
Definition
B) one
Term
Voice recognition can be included with which of the following systems?

I. Office automation systems
II. Security systems
III. Batch-processing systems

A) I only
B) II only
C) I and II only
D) I and III only
E) I, II, and III
Definition
C) I and II only

Office automation systems, and Security systems.
Term
Which of the following is a software agent used by some Internet search engines to generate search results?

A) web bot
B) TCP filter
C) auto responder
D) worm
E) indexer
Definition
A) web bot
Term
The type of network that would most likely be used to link a corporation's headquarters with it four branch offices located throughout the state is referred to as

A) a metropolitan area network
B) a local area network
C) an office area network
D) a wide area network
E) a broad area network
Definition
D) a wide area network
Term
Which of the following statements is (are) true concerning multiuser database management systems?

I. They increase the standardization of data.
II. They increase the need to store data in many different locations in the database.
III. They can increase access to and availability of information.

A) I only
B) II only
C) I and II only
D) I and III only
E) I, II, and III
Definition
D) I and III only

They increase the standardization of data, and they can increase access to and availability of information.
Term
A manager of a small business wants to use a computer to store information about clients, vendors, inventory (item, number, price), and orders. The manager needs to be able to sort and group data for various reports. Which of the following types of software packages would be best for this task?

A) word processor
B) spreadsheet
C) database management system
D) presentation software
E) system software
Definition
C) database management system
Term
A business often identifies that its software has been trademarked by using a unique symbol or attaching the letters TM to its name. What is the purpose of the trademark?

A) To eliminate unauthorized copying and distribution.
B) To identify the software as available for use, free of charge.
C) To identify and differentiate the product brand name.
D) To assure the user that the software is properly licensed and ready to use.
E) To assure the user that the software contains unique features not found in other products.
Definition
C) To identify and differentiate the product brand name.
Term
Which of the following is (are) reasons to select a virtual team as opposed to an on-site team?

I. It works better when team member have different physical locations.
II. It works better when the team is trying to reach consensus.
III. It works better when there are personality conflicts among team members.

A) I only
B) III only
C) I and II only
D) I and III only
E) I, II, and III
Definition
A) I only

It works better when team member have different physical locations.
Term
Which of the following is true about user passwords?

A) They should be changed only by the administrator.
B) They must be no more than eight characters in length.
C) They are requested by CAPTCHAs.
D) They are most secure when they consist of letters, numbers, and special characters.
E) They are required to be unique.
Definition
D) They are most secure when they consist of letters, numbers, and special characters.
Term
The maintenance phase of the system development process could include all of the following activities EXCEPT

A) correcting errors in the software that were detected after implementation
B) changing the heading on a printed report
C) updating entries in the tax table to reflect changes in the tax rates
D) adding a new function to an existing system
E) performing a complex rewrite for an existing system
Definition
E) performing a complex rewrite for an existing system
Term
Which of the following is a major benefit of object-oriented programming?

A) The development of logical steps to achieve the object of the program.
B) The use of subroutines that optimize the program's objective.
C) The creation of objects that can be used or modified for use in future applications.
D) The freedom for programmers to create objects unique to each program.
E) The defining of objects as static entities that do not relate to each other.
Definition
C) The creation of objects that can be used or modified for use in future applications.
Term
Which of the following is NOT true of fiber-optic cable when compared with twisted-pair cable?

A) Fiber-optic cables have less electrical interference.
B) Fiber-optic cables are less susceptible to corrosion.
C) Fiber-optic cable connections are easier to install.
D) Fiber-optic cables are less bulky.
E) Fiber-optic cables support a higher transmission rate.
Definition
C) Fiber-optic cable connections are easier to install.
Term
The ability of computerized systems to store and exchange information represents a potential threat to the individuals' right to

A) free speech
B) privacy
C) equal access to information
D) assembly
E) consumer protection
Definition
B) privacy
Term
http://www.mywebsite.com:8080/homepage/mine/index.html

Which part of the URL above is the domain name?

A) http
B) www.mywebsite.com
C) 8080
D) homepage/mine
E) index.html
Definition
B) www.mywebsite.com
Term
The required components for a LAN include each of the following EXCEPT a

A) networking protocol
B) cabling standard
C) media-sharing method
D) unique address for each node
E) print server
Definition
E) print server
Term
Which of the following statements concerning real-time processing is generally NOT true?

A) A real-time system uses online processing methods.
B) A real-time system uses sequential file access.
C) A real-time system uses online files.
D) A real-time processing operation processes all transactions as they occur.
E) Real-time processing uses direct access storage.
Definition
B) A real-time system uses sequential file access.
Term
The CEO of an employment agency is concerned about the imminent retirement of key associates and the resulting impact on the quality of service provided to the agency's customers as newer employees are brought into the firm. Which of the following types of systems is most likely to lessen the impact of changing demographics on the firm's performance?

A) workflow management system
B) groupware system
C) customer relationship management system
D) knowledge management system
E) data mining system
Definition
D) knowledge management system
Term
Data values A and B are stored in spreadsheet cells C1 and D2, respectively. After a cut operation on C1 followed by a paste operation on D2, which of the following will be true?

I. Data value B is overwritten.
II. Data value A is in cell C1.
III. Data value A is in cell D2.

A) I only
B) III only
C) I and III only
D) I and III only
E) I, II, and III
Definition
C) I and III only

Data value B is overwritten, and data value A is in cell D2.
Term
For which of the following consumer applications would there be the LEAST justification to access a national credit history database?

A) credit card
B) mortgage
C) student loan
D) savings account
E) automobile lease
Definition
D) savings account
Term
Which of the following statements is true regarding client/server architecture?

A) The server computer accepts commands from a number of computers that are its clients.
B) The server computer manages a number of computers that it services.
C) The server computer is connected to a number of computers that provide it with services.
D) The client computer is connected to a number of computers that provide it with clients.
E) The client computer manages a number of computers being served by it.
Definition
A) The server computer accepts commands from a number of computers that are its clients.
Term
Which of the following is true of C++?

A) It is an object-oriented, real-time, general purpose programming language.
B) It is a procedural programming language designed primarily for business applications.
C) It uses a non-complicated syntax for ease of programming.
D) It is used primarily to develop applications that work across the Internet.
E) It is designed to operate only on organized databases.
Definition
A) It is an object-oriented, real-time, general purpose programming language.
Term
Which of the following information technology positions would have the highest level of responsibility within a company?

A) Chief Information Officer (CIO)
B) Project Manager
C) Director of Information Technology
D) Information Systems Manager
E) Systems Administrator
Definition
A) Chief Information Officer (CIO)
Term
Which of the following is a protocol whose primary purpose is to route e-mail messages through the Internet?

A) TCP/IP
B) HTML
C) RISC
D) HTTP
E) SMTP
Definition
E) SMTP
Term
Which of the following is (are) true about customer relationship management systems?

I. They focus on the connection between suppliers, manufacturers, and customers.
II. They enable employees in all departments to have a consistent view of customers.
III. They focus on customer retention.

A) I only
B) I and II only
C) I and III only
D) II and III only
E) I, II, and III
Definition
D) II and III only

They enable employees in all departments to have a consistent view of customers, and they focus on customer retention.
Term
Which DBMS data model uses two-dimensional tables to display data structures?

A) relational
B) hierarchical
C) network
D) navigational
E) CODASYL
Definition
A) relational
Term
Which of the following network technologies allows secure transmission of data over an unsecured public network link between private networks?

A) local area network
B) wide area network
C) virtual private network
D) intranet
E) extranet
Definition
C) virtual private network
Term
Which of the following is NOT true of expert systems?

A) They are limited in scope to relatively narrow processes.
B) They can provide explanations of their reasoning process.
C) They can use common sense knowledge.
D) They can consider multiple hypothesis simultaneously.
E) They can perform the problem-solving work of humans.
Definition
C) They can use common sense knowledge.
Term
The sharing of a computer's resources by allowing the running of two or more programs concurrently on a computer with a single CPU is called

A) booting
B) paging
C) multitasking
D) multiprocessing
E) thrashing
Definition
C) multitasking
Term
Which of the following is NOT an advantage of having an entire department using the same office software suite?

A) Lower cost per application than if purchased individually.
B) Ease of moving data between suite applications.
C) Ease of moving data between users in the same department.
D) Ease of installation and maintenance.
E) Optimal functionality of individual application packages.
Definition
E) Optimal functionality of individual application packages.
Term
Developers quickly develop a version of a system and give it to the users for feedback. The developers then use the users' feedback to revise the system. This process repeats until the users approve the system. This method of developing a system is called

A) waterfall
B) prototyping
C) object-oriented
D) end-user development
E) joint application design
Definition
B) prototyping
Term
The following pseudocode depicts the logic in a section of a computer program.

SET A TO 1
SET B TO 3
SET A TO A + B
WHILE A < 20
SET A TO (A * A)/2
END WHILE

After execution of the program segment, what will be the value of variable A?

A) 16
B) 20
C) 21
D) 32
E) 64
Definition
D) 32
Term
How many 8-bit characters (ASCII) could be placed in the same amount of memory as 300 16-bit characters (Unicode)?

A) 150
B) 300
C) 600
D) 32,768
E) 76,800
Definition
C) 600
Term
A company is planning to automate the importation of data into its mainframe-based system. The data are to be received from several offices, each using PC's. This process will occur on a set schedule without any human intervention at either end. Which of the following is most likely to be used?

A) FTP
B) ANSI
C) WWW
D) VPN
E) DVD
Definition
A) FTP
Term
Which of the following is (are) true of HTML tags?

I. Tags are usually used in pairs.
II. Tags are visible when Web pages are displayed using browsers.
III. Tags are predefined.

A) I only
B) II only
C) I and III only
D) II and III only
E) I, II, and III
Definition
C) I and III only

Tags are usually used in pairs, and tags are predefined.
Term
Managers in an organization often use spreadsheets to assist with decision making. The process of using a spreadsheet to try out alternatives is called

A) what-if analysis
B) simulation
C) flow-charting
D) querying
E) data manipulation
Definition
A) what-if analysis
Supporting users have an ad free experience!