BADM 2301: Quiz #1 Questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

More than ________ percent of all online content is written in English. 25 50 75 90

50

A(n) ________ string is known as a _______. 4-bit; byte 4-byte; bit 8-bit; byte 8-byte; bit

8-bit; byte

________ uses rows and columns to manipulate primarily numerical data. A spreadsheet Data management Desktop publishing Word processing

A spreadsheet

_________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed. Accessibility Accuracy Privacy Propert

Accuracy

_________ causes pop-up advertisements to appear on your screen. Adware Marketware Spamware Spyware

Adware

________ software is a set of computer instructions that provides specific functionality to a user. Application Operating system Systems Programming

Application

_________ is an example of efficiency. Automating order entry Increasing customer satisfaction Improving product quality Reducing employee turnover

Automating order entry

XYZ Inc. scanned the fingerprints of all of their employees and now uses these fingerprints to authenticate their employees and grant them access to different areas of the company's facilities. XYZ Inc. is utilizing which type of technology? Cookies Intellectual Property Biometrics Malware

Biometrics

_________ is an access control. A company gate Encryption A firewall Biometrics

Biometrics

Registers are part of the ________ and are a type of ________ storage. ALU; primary ALU; secondary CPU; primary CPU; secondary

CPU; primary

________ is/are a type of high-speed memory that enable(s) the computer to temporarily store blocks of data that are used more often. Cache memory RAM Registers ROM

Cache memory

________ is a cable medium. Coaxial Microwave Radio Satellite

Coaxial

________ refers to efforts by two or more entities who work together to accomplish certain tasks. Collaboration A virtual team A workgroup Workflow

Collaboration

________ provide(s) for the flow of data from external computer networks to ________ and then to computer networks. Communication technologies; output technologies Communication technologies; the CPU Output technologies; communication technologies The CPU; communication technologies

Communication technologies; the CPU

_________ controls secure the movement of data across networks. Access Communications Physical Useful

Communications

_________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda. A SCADA attack Cyberterrorism Espionage Identity theft

Cyberterrorism

_________ is the result of optimizing the manufacturing and logistics processes. Cost reduction Cycle and fulfillment time reduction Productivity Quality

Cycle and fulfillment time reduction

A(n) _________ is located between two firewalls. anti-malware system DMZ ERP spamware detector

DMZ

__________ fiber is basic fiber infrastructure without service. Dark Large Light Small

Dark

________ extends word processing software to allow production of finished, camera-ready documents, which may contain photographs, diagrams, and other images combined with text in different fonts. A spreadsheet Data management Desktop publishing Word processing

Desktop publishing

________ refers to learning supported by the web; ________ refers to any learning situation in which teachers and students do not meet face to face. Distance learning; e-learning Distance learning; long-distance learning E-learning; distance learning E-learning; long-distance learning

E-learning; distance learning

________ is the largest-volume application running over the Internet. Chat E-mail FTP Voice communication

E-mail

________ is a common LAN protocol. Ethernet Fiber Internet Twisted-pair

Ethernet

________ offer limited accessibility to the ________ of participating companies. Extranets; internets Extranets; intranets Intranets; extranets Intranets; internets

Extranets; internets

Which of the following Internet services is typically NOT available in rural areas? Dial-up Fiber-optic Satellite Wireless

Fiber-optic

________ cables are made of glass. Coaxial Fiber-optic Microwave Twisted-pair

Fiber-optic

The ________ allows users to directly control the hardware by manipulating visible objects and actions that replace complex commands. AS GUI ERP OS

GUI

________ defines how messages are formulated and how their receivers interpret them. DSL HTTP SMTP TCI/IP

HTTP

________ is NOT an advantage of twisted-pair wire. Availability Cost Easy to work with High bandwidth

High bandwidth

135.62.128.91 is an example of an ________ address. IPv2 IPv4 IPv6 IPv8

IPv4

A(n) ________ is a company that provides Internet connections for a fee. ISP IXP NAP NSP

ISP

_________ occur(s) when an attacker either threatens to steal, or actually steals, information from a company and then demands payment for not carrying out a particular act. Alien software Espionage Information extortion SCADA attacks

Information extortion

________ accept(s) data and instructions and convert(s) them to a form that the computer can understand. Input technologies Primary storage Output technologies The CPU

Input technologies

The ________ functions as a transport mechanism; the ________ is an application. Internet; intranet Internet; World Wide Web World Wide Web; internet World Wide Web; intranet

Internet; World Wide Web

A network that is restricted to a single building is a ________. LAN MAN PAN WAN

LAN

NICs allow devices to physically connect to the _______'s communications medium. LAN MAN PAN WAN

LAN

_________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. Accountability Answerability Liability Responsibility

Liability

________ are relatively large computers used in large enterprises for extensive computing applications that are accessed by thousands of users. Mainframes Microcomputers Microprocessors Supercomputers

Mainframes

________ are the smallest and least expensive category or general-purpose computers. Mainframes Microcomputers Microprocessors Supercomputers

Microcomputers

Which of the following is NOT a trend in hardware? Faster More expensive More powerful Smaller

More expensive

Which of the following is NOT an OS? Google Chrome Linux Mozilla Firefox Apple Mac OS X

Mozilla Firefox

________ is an operating model under which ISPs must allow customers equal access to content and applications, regardless of the source or nature of the content. Internet access equality Internet access neutrality Network equality Network neutrality

Network neutrality

The ________ provides an interface between the user and the hardware. ERP NUI OS AS

OS

________ present(s) data and information in a form people can understand. Communication technologies Input technologies Primary storage Output technologies

Output technologies

________ allows users to maintain checkbooks, track investments, monitor credit cards, and bank and pay bills electronically. Communications Personal finance Personal information management Web authoring

Personal finance

Suppose your university automatically logs you off of a university computer after 15 minutes of disuse. This is an example of a(n) _________ control. Access Communications Physical Useful

Physical

________ temporarily store(s) data and program instructions during processing. Input technologies Primary storage Secondary storage The CPU

Primary storage

_________ issues involve collecting, storing, and disseminating information about individuals. Accessibility Accuracy Privacy Property

Privacy

________ is an advantage of telecommuting. Connection Productivity Promotion time Visibility

Productivity

_________ issues involve the ownership and value of information. Accessibility Accuracy Privacy Property

Property

Fulfillment processes are NOT completed by __________. Accounting Purchasing Sales Warehouse

Purchasing

Your computer crashes in the middle of you writing a term paper. You lose the paper because you had not saved a copy yet. You lost your paper because it was in ________. binary form RAM ROM The CPU

RAM

Suppose you only study two hours for your next test. If you understand that means you may not do well on that test and you are willing to accept the lower grade, it means you are taking _________ for your actions. Accountability Answerability Liability Responsibility

Responsibility

_________ means that you accept the consequences of your decisions and actions. Accountability Answerability Liability Responsibility

Responsibility

Procurement processes are NOT completed by _________. Accounting Purchasing Sales Warehouse

Sales

________ store(s) data and program instructions for future use. Primary storage Output technologies Secondary storage The CPU

Secondary storage

_________ is an attach in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords. Social engineering Espionage Malware Profiling

Social engineering

_________ is pestware that uses your computer as a launch pad for unsolicited e-mail, usually advertising for products and services. Adware Marketware Spamware Spyware

Spamware

_________ collects personal information about users without their consent. Adware Marketware Spamware Spyware

Spyware

Which of the following is the correct order for the class of computers from most powerful to least powerful? Supercomputers, mainframe computers, microcomputers, laptop/notebook computers, tablet computers, wearable computers Supercomputers, mainframe computers, microcomputers, tablet computers, laptop/notebook computers, wearable computers Supercomputers, microcomputers, mainframe computers, laptop/notebook computers, tablet computers, wearable computers Supercomputers, microcomputers, mainframe computers, tablet computers, laptop/notebook computers, wearable computers

Supercomputers, mainframe computers, microcomputers, laptop/notebook computers, tablet computers, wearable computers

_________ manipulate(s) the data and control(s) the tasks performed by the other components. Communication technologies Input technologies Output technologies The CPU

The CPU

_________ performs the actual computation or "number crunching" inside any computer. A bit The ALU The control unit The CPU

The CPU

________ cables are made of copper. Fiber-optic Microwave Radio Twisted-pair

Twisted-pair

_________ is a private network that uses a public network to connect users. DoS ERP RFID VPN

VPN

_______ reality is a term that refers to information technologies that use software to provide a realistic, three-dimensional, computer-generated environment that replicates sight, touch, hearing, and in some cases, smell. Augmented Computer Virtual Wearable

Virtual

_________ is a remote attack requiring user action. A logic bomb DoS A Trojan Horse Virus

Virus

________ is an example of a human data-entry technology. A barcode scanner An optical mark reader A point-of-sale terminal Voice recognition

Voice recognition

A network between Mars and the Earth would be a ________. LAN MAN PAN WAN

WAN

________ allows users to design websites and publish them on the web. Communications Personal finance Personal information management Web authoring

Web authoring

Which of the following is an accessibility issue? How can we ensure that the information will be processed properly and presented accurately to users? How should we handle illegally copying copyrighted software? What information about oneself should an individual be required to reveal to others? What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?

What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?

________ allows users to manipulate primarily text with many writing and editing features. A spreadsheet Data management Desktop publishing Word processing

Word processing

________ is the movement of information as it progresses through the sequence of steps that make up an organization's work procedures. Collaboration A virtual team A workgroup Workflow

Workflow

You open an e-mail from your friend that looks a little odd, but you figure your friend would never send you anything bad. This is _________ and is an _________ mistake. a human error; intentional a human error; unintentional social engineering; intentional social engineering; unintentional

a human error; unintentional

The ________ layer of TCP/IP enables client application programs to access the other layers. application internet network interface transport

application

Bandwidth is stated in ________ per second. beeps bits blips bytes

bits

Users access the web primarily through ________. browsers hyperlinks hypertext URLs

browsers

A _________ is a statutory grant that provides the creators or owners of intellectual property with ownership of the property for a designated period. copyright patent trade secret trademark

copyright

The price of hardware has ________ over time; the price of software has ________ over time. decreased; decreased increased; decreased increased; increased decreased; increased

decreased; increased

If you have to speak into your phone to unlock it, this is an example of something the user _________. does has is knows

does

Moore's law states that microprocessor complexity would ________ approximately every 18 months. double triple quadruple quintuple

double

You have to offer online banking if you want to operate a bank. This is a(n) ________. buyer power entry barrier substitute product supplier power

entry barrier

A(n) _________ is a system that prevents a specific type of information from moving between untrusted networks and private networks. anti-malware system DMZ ERP firewall

firewall

Your student ID is an example of something the user _________. does has is knows

has

If there are many alternatives to an organization's products or services, then the threat of substitutes is _________; if there are few alternatives, then the threat is ______. high; high high; low low; high low; low

high; low

The threat of new competitors will enter your market is _________ when entry is easy and _________ when there are significant barriers to entry. high; high high; low low; high low; low

high; low

Suppose you have a primary location in New York City where you main corporate servers are located. Just in case something happens in New York City, you have backup servers that are updated every minute in Chicago. This is an example of a _________ site. cold hot medium warm

hot

The complexity of software has ________ over time; the potential for software bugs has ________. increased; increased decreased; increased decreased; decreased increased; decreased

increased; increased

Speech-recognition software is a(n) ________ technology. input GUI OS output

input

An/The _______ is a network of networks. externet extranet internet intranet

internet

Typing in your password to access a system is an example of something the user _________. does has is knows

knows

The ________ concept refers to a group of computing products that work together. open source piracy block anti-bug open systems

open systems

A(n) ________ is a group of programs with integrated functions that has been developed by a vendor and is available for purchase in a prepackaged form. GUI open system package OS

package

Sarah received an email that claimed to be from her bank. The email asked her to provide her password. Sarah later found out that the email was not from her bank and that she had given sensitive information to someone who gained access to her accounts. This is an example of a ____________. worm trojan horse phishing attack denial of service attack

phishing attack

You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is _________ and is _________. piracy; legal piracy; illegal social engineering; legal social engineering; illegal

piracy; illegal

Intellectual property is NOT protected under _________ laws. copyright patent privacy trade secret

privacy

The developer keeps the source code private with ________ software. open open source pirated proprietary

proprietary

A(n) ________ guides the user through computer applications by using cartoon-like characters, graphics, animation, and voice commands. application interface social interface OS GUI

social interface

A(n) _________ to an information resource is any danger to which a system may be exposed. exposure risk threat vulnerability

threat

If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy. acceptance avoidance limitation transference

transference

The issues that came up in the Quizlet/Texas Christian University cheating scandal in 2018 highlighted the need for ____________. more Web-based study tools to be available to students of all socioeconomic backgrounds universities to adapt to the changing nature of technology as it pertains to the ways in which students are learning widespread reform in terms of internet access on college campuses colleges to revise their Codes of Conduct to eliminate the ambiguity in students using open source study tools

universities to adapt to the changing nature of technology as it pertains to the ways in which students are learning


Conjuntos de estudio relacionados

PrepU Questions: Week 7-- Nursing Process

View Set

Exercise Prescription / METs (SB-BP)

View Set

Evaluating exponential functions, Common and natural logarithms

View Set

Discovering Design With Chemistry

View Set

Management Information System Chapter 7

View Set