Cit202 Applications of Computer in Business Nounelearn
Cit202 Applications of Computer in Business Nounelearn
A _____ is a fast operating machine that can be used for the home and
business to enhance productivity.
Computer
All computers perform the same basic functions they enable you to _____
and manipulate information.
Store
All computers perform the same basic functions they enable you to store
and _____ information.
Manipulate
_____ were small humble machines with 8-bit or 16-bit processors, 16Kb to
256Kb of RAM and 5 to 10 Mb of disk storage, used mainly for games and
basic word processing.
Microcomputers
_____ is the term used for the most powerful computer available at any time.
Supercomputer
Page 1
Supercomputers are typically tailored for very fast processing of what are
known as ______ applications.
number crunching
The _____ is the most well known supercomputer named after its designer,
Seymour Cray.
Cray
The term "ultra-mobile PC" (UMPC) is also frequently used to refer to such
machines, although this also refers to a small form-factor tablet PC
platform.
Page 2
Subnotebooks are smaller than laptops but larger than handheld computers
and UMPCs.
The term ______________ was coined at the time when most computers were
cabinet sized like Mainframe Computers.
Mini computer
______________ were much smaller, less powerful, and much less expensive
than Mainframe Computers.
Mini computers
Page 3
Large systems that are not based on the System/360 are referred to as
either "servers" or "supercomputers".
The first Web server running anywhere outside Switzerland ran on an IBM
mainframe at Stanford University as early as _____________
1990
_____________ are computers that are intended to serve one user and may
contain special hardware enhancements not found on a personal computer.
Workstations
Page 4
Software is another term for______________.
computer program
The more information being processed the more ______________ the computer
needs.
RAM
RAM memory chips come in many different sizes and speeds and can
usually be _____________
Expanded
Page 5
______________ are used to store information.
Disks
Every piece of software can be broken down into a series of on or off signals
or its ______________
Binary Code
_______________ have become less useful as file sizes increase and Compact
disks (CDs) and Digital Video Devices (DVDs) are becoming more popular.
Floppy disks
Page 6
Compact disks or CDs can store large amounts of information.
_____________ allow you to store large files, such as movies, on a single disk.
DVD recorders
Floppy disk or diskette comes in two basic sizes; 5.25 inch and 3.5 inch.
______________ are the computer hardware that accept data and instructions
from a user.
Input devices
The ______________ and mouse are the most widely used input devices
Keyboard
The keyboard and ______________are the most widely used input devices
Mouse
Page 7
The _______________is used to type information into the computer or input
information.
Keyboard
The QWERTY keyboard, so called because the keys 'q','w','e','r','t' and 'y' are
adjacent, is the commonest form of keyboard.
Page 8
______ are devices which scan an image (document, photograph) and
produce a digital version of the image i.e. the image is stored as a sequence
of binary numbers.
Image Scanners
The term _______ is used to describe the application of this technique and it
is becoming an important application in insurance and banking
organisations.
document image processing (DIP)
_______ return processed data that is information back to the user or allow
the computer to communicate with the user.
Output devices
The three basic types of printer are; dot matrix, inkjet, and_____________.
Laser
The term modem stands for modulate and demodulate which changes the
signal from digital, which computers use, to analog, which telephones use
and then back again.
Modems are measured by the speed that the information is transferred and
the measuring tool is called the _____________
baud rate
The amount of information that can travel through a line is limited is called
_____________
Bandwidth
Page 9
Scanners allow you to transfer pictures and photographs to your computer.
The older sound cards were 8 bit then 16 bit then 32 bit.
There are many terms used for the process of accessing software including
Running
Executing
Page 10
Starting up
Opening
______________ gives the user the right to use the software in the licensed
environment
Software license
Page 11
_______________displays a list of the programs that are installed through
Windows and available to use.
Program or Dock
_______________ displays help topics broken up into contents, index and find
components.
Help
______________ shuts down the computer, restarts the computer or logs you
off a network.
Shut down
Page 12
______________ automates updating software through the Internet.
Software Update
______________ list specific topics accessed by scroll bars or typing the topic.
Index
The initial code executing on the computer is loaded from firmware which is
stored in read only memory (ROM) is called the________________.
BIOS or boot ROM
Page 13
Multitasking
Windows comes with WordPad to edit and format documents and NotePad to
edit text.
Each person or item in a database has it's own Record. Each piece of
information about that person or record are stored in Fields.
Page 14
Sheet
The three main bitmapped format graphics used on the Internet are
.gif
.jpeg (.jpg)
.png
_______________ are anything that can be displayed on the screen except the
text and sometimes even text falls into the graphics category if it is saved in
a graphics format.
Computer graphics
DBMSs are complex set of software programs that control the organization,
storage, management, and retrieval of data in a database.
Page 15
A database management system (DBMS) is computer software designed for
the purpose of managing databases based on a variety of data models.
Page 16
Maintenance
Evaluation
PAN means______
Personal Area Network
Page 17
and that often uses transmission facilities provided by common carriers,
such as telephone companies.
WAN
Page 18
WAN means______
Wide Area Network
Page 19
_______________ Directly connect local area networks (LANs)
Local bridges
_____________ can be used to create a wide area network (WAN) link between
LANs.
Remote bridges
_____ are networking devices that forward data packets between networks
using headers and forwarding tables to determine the best path to forward
the packets.
Routers
Page 20
Exploit
Subnotebooks were seen as niche computing products and have rarely sold
in large numbers until the 2007 introduction of the Asus Eee PC and the
OLPC XO-1, known as_____
ultra low-cost PC (ULPC or ULCPC)
______ computer runs a program that is stored in read only memory (ROM)
and is only intended to operate a specific machine or device
Embedded
ICANN means____
Internet Corporation for Assigned Names and Numbers
Page 21
VoIP stands for______
Voice over IP
DDoS means______
Distributed denial of service
_____ are designed to detect network attacks in progress and assist in post-
attack forensics, while audit trails and logs serve a similar function for
individual systems.
Intrusion Detection Systems (IDS's)
______ type of virus infects the boot or master section of any disks that it
comes in contact with
Page 22
Boot sector viruses
______ infects other programs when the infected program is run or executed.
Program virus
____ is the size of the task relative to the overall purpose of the organization.
Installing a single door lock on an automobile assembly line is a task with
minimal scope.
Task scope
Work done using computers, rather than through direct physical contact
with the object of task, is often called _____
computer-mediated work
____is an umbrella term that includes all technologies for the manipulation
and communication of information
ICT
Page 23
Bandwidth, Language, Text/Voice Disruptive Software, Participation,
Security
A network that connects two or more LANs but which is limited to a specific
and contiguous geographical area such as a college campus, industrial
complex, or a military base is referred to as______
Campus area network
Page 24
The storage area used in storing data to compensate for the difference in
speed at which the different units handle data is called ______
Buffer
_______case is used to covert from upper case to lower case and vice versa.
Toggle
A character that is raised and smaller above the baseline is known as _____
Superscript
A digital computer did not score over an analog computer in terms of _____
Accuracy
Open ____ software are created by generous programmers and released into
the public domain for public use.
Source
_____ are smaller than laptops but larger than handheld computers and
UMPCs.
Subnotebooks
Page 25
Three
The term "____" computer was coined at the time when most computers were
cabinet sized like Mainframe Computers
Mini
Desktop publishing (dtp) uses both word processing and _____ to produce
publications and presentations
Graphics
______ bar is at the top of the window and it displays the name of the
application.
Title
The ______ tool is used to select any kind of object on the page.
Pointer
The ______ tool is used to change the magnification of the page view.
Zoom
Work done using computers, rather than through direct physical contact
with the object of task, is often called computer-______ work.
Mediated
Page 26
Edit
Computer system and ______ revolution are changing every area of our lives.
Technology
The tool used to move the entire page on the screen is called______ tool.
Hand
Presentation
_______ is the term used for the most powerful computer available at any
time
Supercomputer
Page 27
Small
_____ are computers that are intended to serve one user and may contain
special hardware enhancements not found on a personal computer.
Workstations
Portable data entry terminals are ____ devices that are used to record or
capture data away from the mainframe computer
Handheld
_____ computers are general purpose CPUs that are a part of a machine or
device
Embedded
Page 28
Data are organized in rows and _______ in a spreadsheet.
Columns
The computer power has been on the increase while ____ has been on the
decline
Size
Other hardware parts of the computer system aside the central processing
unit (CPU) are called _____ components or devices.
Peripheral
_____ is the memory that the computer uses to temporarily store the
information as it is being processed.
Random Access Memory
Which of the following statements is not true about Find and Replace in
Excel?
You can search by rows or columns or sheets
The Desktop offers many features that make using your computer easier.
Which of the following is not part of the features?
None of the options
Page 29
A bookmark is an item or location in document that you identify as a name
for future reference. Which of the following task is accomplished by using
bookmarks?
To quickly jump to specific location in document
Page 30
By default, in Excel 2007, there are______ worksheets in a workbook
3
Which of the following is not one of the main bitmap graphics format used
on the Internet
.tif
Page 31
Center
_____ are the most common way of interacting or controlling your software
Menus
______'s underlying operating system kernel was designed by the same team
as Digital Equipment Corporation's VMS.
Windows NT
The content of all formula cells in Excel begins with the symbol _____.
=
Page 32
______ interoperability was sought by establishing the POSIX standard
Unix
The initial code executing on the computer is usually loaded from _____.
firmware
Page 33
________ is a general term used to describe a collection of computer
programs, procedures and documentation that perform some tasks on a
computer system.
Software
The ______ Access Memory is the sort of memory that the computer uses to
temporarily store the information as it is being processed.
Random
Page 34
In a Spreadsheet program, the intersection of a row and a column is called a
_____
Cell
_______ graphics are images that are mapped to the tiny dots of the monitor
or screen called pixels.
Bitmapped
Page 35
data link
A ______ is a device that forwards and filters OSI layer 2 datagrams between
ports based on the MAC-Addresses in the packets.
Switch
________ are networking devices that forward data packets between networks
using headers and forwarding tables to determine the best path to forward
the packets.
Routers
The altering of data so that it is not usable unless the changes are undone is
called ______
Encryption
Page 36
The ______, is a board with series of electronic path ways and connections
allowing the CPU to communicate with the other components of the
computer.
Motherboard
There are _______ types of cable which may be used to connect a printer to a
computer.
Two
______ instructions are those operations that are performed one after
another.
Sequential
In Windows operating system, you hold down the ______key while deleting a
file to bypass the Recycle Bin and permanently delete files.
Shift
Normally, planning is the ______ step in the software development life cycle.
First
Page 37
Specialized program that allows user to utilize specific application is
classified as ______
Relative programs
Which of the following options is NOT a typical portable data entry terminal?
Barcode readers
The memory that the computer uses to temporarily store the information as
it is being processed is called ______
Random Access Memory
Page 38
The following options are all word processing programs ______
Microsoft Word
Which of the following options would you upgrade if you want to improve the
performance of your PC?
Printer
Typical phases in the software development life cycle (SDLC) include all the
following EXCEPT ______
Analysis Design
The first step in the software development life cycle (SDLC) is normally
_______
Analysis Design
Page 39
The outcomes of the first step in the software development life cycle (SDLC)
include all the following options EXCEPT ______
Term of Reference (TOR)
The following are all typical examples of resources that can be shared on a
network EXCEPT ______
Peripheral Devices
The various types of "attacks" that can be made against computer systems
(threats) can typically be classified into seven categories. Which of the
following options is NOT one of them
Page 40
Hardware failure
Page 41
______ is an umbrella term that includes all technologies for the
manipulation and communication of information.
Information and Communications Technology
______ are networking devices that forward data packets between networks
using headers and forwarding tables to determine the best path to forward
the packets.
Routers
______ bridges can be used to join LANs or connect remote stations to LANs.
Wireless
An intranet is a set of______ networks, using the Internet Protocol and uses
IP-based tools such as web browsers and ftp tools, that is under the control
of a single administrative entity.
Page 42
Interconnected
A______ is a network that connects two or more LANs but which is limited to
a specific and contiguous geographical area such as a college campus,
industrial complex, or a military base
Campus Area Network
______ is a network that covers a small geographic area, like a home, office,
or building.
Local Area Network
______ files are basically sound tracks which use a collection of sounds
contained in the .mid file to play a tune
Musical Instruments Digital Interface
Page 43
There are basically_____ types of computer graphics
2
MPEG means______
Moving Picture Experts Group
DBMS means_______
Database Management System
SDLC Means______
Software Development Life Cycle
Users may also interact with the operating system by typing commands or
using a______
Graphical user interface
______ windows make your desktop behave like a web site (Microsoft).
Active
Page 44
RTOS means______
Real-Time Operating System
The term "software" was first used in this sense by John W. Tukey in______
1958
Every piece of software can be broken down into a series of on or off signals
or its______
Binary code
Page 45
Supercomputer was name after its designer, called______
Seymour Cray
All computers perform the same basic functions; they enable you to store
and manipulate_____
Information
General purpose programs that do not return data but shared by different
users or applications are termed______
Subroutines
Page 46
Embedded computers are found today in devices such as_____
Electric toothbrushes
Computer system may increase _____ whenever the individual can control
the use of the tools.
Autonomy
Page 47
Page 48