Enhanced Discovering Computers 201...

1st Edition
Misty E. Vermaat + 4 others
Publisher: Cengage Learning
ISBN: 9781305657458



Enhanced Discovering Computers 201...

1st Edition
Misty E. Vermaat + 4 others
Publisher: Cengage Learning
ISBN: 9781305657458
Chapter 11, Problem 4.1E
Textbook Problem

Have you ever created a file in a text editor? Why? If not, what types of files might you need to create in a text editor?

Explanation of Solution

Yes”, files can be created in a text editor.


Files can be created in text editor because,

  • A text editor is a computer program that edits the plain text. These programs are also known as notepad software.
  • These editors are provided with operating systems and packages which can be used to change files such as configuration, configuration files and so on.
  • Plain text is created by text editors such as notepad while rich text is created by word processor...

Explanation of Solution

No”, there are no types of files that need to be created in a text editor.


  • This is because text editor is enough for creating all types of files...

Still sussing out bartleby?

Check out a sample textbook solution.

See a sample solution

The Solution to Your Study Problems

Bartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!

Get Started

Chapter 11 Solutions

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)
Show all chapter solutions
Ch. 11 - Explain how you access data in a web database....Ch. 11 - Identify uses of web databases for government,...Ch. 11 - A(n) _____ defines how users view the organization...Ch. 11 - List possible uses of an object-oriented database.Ch. 11 - Explain the characteristics, sources, and uses of...Ch. 11 - Describe the role of the database administrator.Ch. 11 - Define the term, data dictionary. Explain how a...Ch. 11 - A(n) _____ is a request for specific information...Ch. 11 - List steps to import and export data between a...Ch. 11 - Define the terms query language, SQL, and QBE.Ch. 11 - Define the terms, form and report writer.Ch. 11 - Explain how access privileges contribute to data...Ch. 11 - Explain issues surrounding accidental access of...Ch. 11 - List methods to restore or backup a database....Ch. 11 - Identify the five phases in the SDLC. Name three...Ch. 11 - Identify who participates in system development....Ch. 11 - Define the term, project management. List elements...Ch. 11 - Define the function of project management...Ch. 11 - Describe how Gantt and PERT charts are used.Ch. 11 - Define the terms, scope creep and change...Ch. 11 - Identify tests used to evaluate feasibility of a...Ch. 11 - Describe ways that team members collaborate.Ch. 11 - Identify data and information gathering...Ch. 11 - Describe circumstances that can initiate system...Ch. 11 - List the four activities of the planning phase....Ch. 11 - Describe the activities of the analysis phase....Ch. 11 - Explain security issues surrounding outsourcing.Ch. 11 - List the two activities of the design phase....Ch. 11 - Differentiate among an RFQ, RFP, and RFI. Describe...Ch. 11 - Explain what occurs when vendor proposals are...Ch. 11 - Explain the activities and users involved in the...Ch. 11 - List the four activities of the implementation...Ch. 11 - List the three activities of the support and...Ch. 11 - Define the following terms: programming language,...Ch. 11 - Explain issues surrounding colleges teaching...Ch. 11 - Define the terms, procedural language, compiler,...Ch. 11 - Describe the following: 4GLs, classic programming...Ch. 11 - List steps to publish a webpage. Explain how web...Ch. 11 - Explain how the sports industry uses technology.Ch. 11 - In a data hierarchy, each higher level of data...Ch. 11 - A check digit often confirms the accuracy of a...Ch. 11 - In a typical database system, each department or...Ch. 11 - In a file processing system, duplicated data can...Ch. 11 - Many programs today use forms on a webpage as...Ch. 11 - File processing systems require more memory,...Ch. 11 - To retrieve or select data in a database, you...Ch. 11 - Unlike a form, you use a report writer only to...Ch. 11 - One way to secure a database is to allow only...Ch. 11 - In a rollforward, the DBMS uses the log to undo...Ch. 11 - Gantt charts are better suited than PERT charts...Ch. 11 - The planning phase begins when the steering...Ch. 11 - A(n) _____ check tests data in two or more...Ch. 11 - Which of the following is not an advantage of a...Ch. 11 - A _____ defines how users view the organization of...Ch. 11 - A(n) _____ database stores data in tables that...Ch. 11 - A _____ contains data about each file in the...Ch. 11 - Which of the following is not a phase in the SDLC?...Ch. 11 - _____ feasibility measures whether an organization...Ch. 11 - Systems analysts use a(n) _____ test to verify...Ch. 11 - Data type a. procedures that keep data current b....Ch. 11 - Primary key a. procedures that keep data current...Ch. 11 - file maintenance a. procedures that keep data...Ch. 11 - Validation a. procedures that keep data current b....Ch. 11 - check digit a. procedures that keep data current...Ch. 11 - Object a. procedures that keep data current b....Ch. 11 - Standards a. procedures that keep data current b....Ch. 11 - feature creep a. procedures that keep data current...Ch. 11 - object program a. procedures that keep data...Ch. 11 - source program a. procedures that keep data...Ch. 11 - What are common data types?Ch. 11 - What is included in file maintenance?Ch. 11 - What is function creep?Ch. 11 - How does a DBMS typically flag deleted records or...Ch. 11 - What are the different types of validity checks?...Ch. 11 - What are the different types of validity checks?Ch. 11 - What are two major weaknesses of file processing...Ch. 11 - What are the advantages of a database approach to...Ch. 11 - What are three popular data models used today?...Ch. 11 - What trends have contributed to Big Data?Ch. 11 - What is stored in the data dictionary?Ch. 11 - What steps can you take to recover from identity...Ch. 11 - What are the steps in the SDLC?Ch. 11 - Who should be included on a project team? (517)Ch. 11 - How do the responsibilities of a project manager...Ch. 11 - What four tests does a systems analyst use to...Ch. 11 - What techniques do systems analysts use to gather...Ch. 11 - What four major activities take place during the...Ch. 11 - Why is detailed analysis sometimes called logical...Ch. 11 - How do RFQs, RFPs, and RFIs differ? (523)Ch. 11 - What does a program specification package...Ch. 11 - What are the four major steps in the...Ch. 11 - Why might users work with a sandbox? (525)Ch. 11 - What tests might a systems analyst perform on test...Ch. 11 - How do direct, parallel, phased, and pilot...Ch. 11 - How does a compiler differ from an interpreter?...Ch. 11 - What are some popular object-oriented programming...Ch. 11 - No Search Results While searching a web database...Ch. 11 - Incorrect Price You are shopping for groceries...Ch. 11 - Webpage Not Readable You are attempting to view a...Ch. 11 - Inaccurate Credit Report You have obtained a free...Ch. 11 - Webpage Script You are viewing a webpage and have...Ch. 11 - Data Entry Issues You are in charge of adding...Ch. 11 - Incorrect Postal Codes Your companys database...Ch. 11 - Database Connection Error While interacting with a...Ch. 11 - Database Recovery Your boss has informed you that...Ch. 11 - Content Management System Updates You are...Ch. 11 - Technology in Sports You serve as an assistant...Ch. 11 - In addition to the reasons mentioned in this...Ch. 11 - What is a credit score? How can you obtain your...Ch. 11 - If you find erroneous information on your credit...Ch. 11 - What are some reasons why you might want or need...Ch. 11 - What research databases are available through your...Ch. 11 - Evaluate three research databases that you may...Ch. 11 - Have you ever lost or misplaced a device? If so,...Ch. 11 - Evaluate at least three apps that can locate and...Ch. 11 - Some devices offer a feature that allows you to...Ch. 11 - Have you ever created a file in a text editor?...

Additional Engineering Textbook Solutions

Find more solutions based on key concepts
Show solutions add
Do you think this attack was the result of a virus or a worm? Explain your answer.

Principles of Information Security (MindTap Course List)

Identify six major branches of artificial intelligence.

Principles of Information Systems (MindTap Course List)

Fins, or extended surfaces, commonly are used in a variety of engineering applications to enhance cooling. Comm...

Engineering Fundamentals: An Introduction to Engineering (MindTap Course List)

In your own words, describe a canned cycle.

Precision Machining Technology (MindTap Course List)

If your motherboard supports ECC DDR3 memory, can you substitute non-ECC DDR3 memory?

A+ Guide to Hardware (Standalone Book) (MindTap Course List)

How does a welding transformer work?

Welding: Principles and Applications (MindTap Course List)