BADM 2301: Quiz #1 Questions
More than ________ percent of all online content is written in English. 25 50 75 90
50
A(n) ________ string is known as a _______. 4-bit; byte 4-byte; bit 8-bit; byte 8-byte; bit
8-bit; byte
________ uses rows and columns to manipulate primarily numerical data. A spreadsheet Data management Desktop publishing Word processing
A spreadsheet
_________ issues involve the authenticity, fidelity, and correctness of information that is collected and processed. Accessibility Accuracy Privacy Propert
Accuracy
_________ causes pop-up advertisements to appear on your screen. Adware Marketware Spamware Spyware
Adware
________ software is a set of computer instructions that provides specific functionality to a user. Application Operating system Systems Programming
Application
_________ is an example of efficiency. Automating order entry Increasing customer satisfaction Improving product quality Reducing employee turnover
Automating order entry
XYZ Inc. scanned the fingerprints of all of their employees and now uses these fingerprints to authenticate their employees and grant them access to different areas of the company's facilities. XYZ Inc. is utilizing which type of technology? Cookies Intellectual Property Biometrics Malware
Biometrics
_________ is an access control. A company gate Encryption A firewall Biometrics
Biometrics
Registers are part of the ________ and are a type of ________ storage. ALU; primary ALU; secondary CPU; primary CPU; secondary
CPU; primary
________ is/are a type of high-speed memory that enable(s) the computer to temporarily store blocks of data that are used more often. Cache memory RAM Registers ROM
Cache memory
________ is a cable medium. Coaxial Microwave Radio Satellite
Coaxial
________ refers to efforts by two or more entities who work together to accomplish certain tasks. Collaboration A virtual team A workgroup Workflow
Collaboration
________ provide(s) for the flow of data from external computer networks to ________ and then to computer networks. Communication technologies; output technologies Communication technologies; the CPU Output technologies; communication technologies The CPU; communication technologies
Communication technologies; the CPU
_________ controls secure the movement of data across networks. Access Communications Physical Useful
Communications
_________ refers to malicious acts in which attackers use a target's computer systems to cause physical, real-world harm or severe disruption, often to carry out a political agenda. A SCADA attack Cyberterrorism Espionage Identity theft
Cyberterrorism
_________ is the result of optimizing the manufacturing and logistics processes. Cost reduction Cycle and fulfillment time reduction Productivity Quality
Cycle and fulfillment time reduction
A(n) _________ is located between two firewalls. anti-malware system DMZ ERP spamware detector
DMZ
__________ fiber is basic fiber infrastructure without service. Dark Large Light Small
Dark
________ extends word processing software to allow production of finished, camera-ready documents, which may contain photographs, diagrams, and other images combined with text in different fonts. A spreadsheet Data management Desktop publishing Word processing
Desktop publishing
________ refers to learning supported by the web; ________ refers to any learning situation in which teachers and students do not meet face to face. Distance learning; e-learning Distance learning; long-distance learning E-learning; distance learning E-learning; long-distance learning
E-learning; distance learning
________ is the largest-volume application running over the Internet. Chat E-mail FTP Voice communication
________ is a common LAN protocol. Ethernet Fiber Internet Twisted-pair
Ethernet
________ offer limited accessibility to the ________ of participating companies. Extranets; internets Extranets; intranets Intranets; extranets Intranets; internets
Extranets; internets
Which of the following Internet services is typically NOT available in rural areas? Dial-up Fiber-optic Satellite Wireless
Fiber-optic
________ cables are made of glass. Coaxial Fiber-optic Microwave Twisted-pair
Fiber-optic
The ________ allows users to directly control the hardware by manipulating visible objects and actions that replace complex commands. AS GUI ERP OS
GUI
________ defines how messages are formulated and how their receivers interpret them. DSL HTTP SMTP TCI/IP
HTTP
________ is NOT an advantage of twisted-pair wire. Availability Cost Easy to work with High bandwidth
High bandwidth
135.62.128.91 is an example of an ________ address. IPv2 IPv4 IPv6 IPv8
IPv4
A(n) ________ is a company that provides Internet connections for a fee. ISP IXP NAP NSP
ISP
_________ occur(s) when an attacker either threatens to steal, or actually steals, information from a company and then demands payment for not carrying out a particular act. Alien software Espionage Information extortion SCADA attacks
Information extortion
________ accept(s) data and instructions and convert(s) them to a form that the computer can understand. Input technologies Primary storage Output technologies The CPU
Input technologies
The ________ functions as a transport mechanism; the ________ is an application. Internet; intranet Internet; World Wide Web World Wide Web; internet World Wide Web; intranet
Internet; World Wide Web
A network that is restricted to a single building is a ________. LAN MAN PAN WAN
LAN
NICs allow devices to physically connect to the _______'s communications medium. LAN MAN PAN WAN
LAN
_________ is a legal concept that gives individuals the right to recover the damages done to them by other individuals, organizations, or systems. Accountability Answerability Liability Responsibility
Liability
________ are relatively large computers used in large enterprises for extensive computing applications that are accessed by thousands of users. Mainframes Microcomputers Microprocessors Supercomputers
Mainframes
________ are the smallest and least expensive category or general-purpose computers. Mainframes Microcomputers Microprocessors Supercomputers
Microcomputers
Which of the following is NOT a trend in hardware? Faster More expensive More powerful Smaller
More expensive
Which of the following is NOT an OS? Google Chrome Linux Mozilla Firefox Apple Mac OS X
Mozilla Firefox
________ is an operating model under which ISPs must allow customers equal access to content and applications, regardless of the source or nature of the content. Internet access equality Internet access neutrality Network equality Network neutrality
Network neutrality
The ________ provides an interface between the user and the hardware. ERP NUI OS AS
OS
________ present(s) data and information in a form people can understand. Communication technologies Input technologies Primary storage Output technologies
Output technologies
________ allows users to maintain checkbooks, track investments, monitor credit cards, and bank and pay bills electronically. Communications Personal finance Personal information management Web authoring
Personal finance
Suppose your university automatically logs you off of a university computer after 15 minutes of disuse. This is an example of a(n) _________ control. Access Communications Physical Useful
Physical
________ temporarily store(s) data and program instructions during processing. Input technologies Primary storage Secondary storage The CPU
Primary storage
_________ issues involve collecting, storing, and disseminating information about individuals. Accessibility Accuracy Privacy Property
Privacy
________ is an advantage of telecommuting. Connection Productivity Promotion time Visibility
Productivity
_________ issues involve the ownership and value of information. Accessibility Accuracy Privacy Property
Property
Fulfillment processes are NOT completed by __________. Accounting Purchasing Sales Warehouse
Purchasing
Your computer crashes in the middle of you writing a term paper. You lose the paper because you had not saved a copy yet. You lost your paper because it was in ________. binary form RAM ROM The CPU
RAM
Suppose you only study two hours for your next test. If you understand that means you may not do well on that test and you are willing to accept the lower grade, it means you are taking _________ for your actions. Accountability Answerability Liability Responsibility
Responsibility
_________ means that you accept the consequences of your decisions and actions. Accountability Answerability Liability Responsibility
Responsibility
Procurement processes are NOT completed by _________. Accounting Purchasing Sales Warehouse
Sales
________ store(s) data and program instructions for future use. Primary storage Output technologies Secondary storage The CPU
Secondary storage
_________ is an attach in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords. Social engineering Espionage Malware Profiling
Social engineering
_________ is pestware that uses your computer as a launch pad for unsolicited e-mail, usually advertising for products and services. Adware Marketware Spamware Spyware
Spamware
_________ collects personal information about users without their consent. Adware Marketware Spamware Spyware
Spyware
Which of the following is the correct order for the class of computers from most powerful to least powerful? Supercomputers, mainframe computers, microcomputers, laptop/notebook computers, tablet computers, wearable computers Supercomputers, mainframe computers, microcomputers, tablet computers, laptop/notebook computers, wearable computers Supercomputers, microcomputers, mainframe computers, laptop/notebook computers, tablet computers, wearable computers Supercomputers, microcomputers, mainframe computers, tablet computers, laptop/notebook computers, wearable computers
Supercomputers, mainframe computers, microcomputers, laptop/notebook computers, tablet computers, wearable computers
_________ manipulate(s) the data and control(s) the tasks performed by the other components. Communication technologies Input technologies Output technologies The CPU
The CPU
_________ performs the actual computation or "number crunching" inside any computer. A bit The ALU The control unit The CPU
The CPU
________ cables are made of copper. Fiber-optic Microwave Radio Twisted-pair
Twisted-pair
_________ is a private network that uses a public network to connect users. DoS ERP RFID VPN
VPN
_______ reality is a term that refers to information technologies that use software to provide a realistic, three-dimensional, computer-generated environment that replicates sight, touch, hearing, and in some cases, smell. Augmented Computer Virtual Wearable
Virtual
_________ is a remote attack requiring user action. A logic bomb DoS A Trojan Horse Virus
Virus
________ is an example of a human data-entry technology. A barcode scanner An optical mark reader A point-of-sale terminal Voice recognition
Voice recognition
A network between Mars and the Earth would be a ________. LAN MAN PAN WAN
WAN
________ allows users to design websites and publish them on the web. Communications Personal finance Personal information management Web authoring
Web authoring
Which of the following is an accessibility issue? How can we ensure that the information will be processed properly and presented accurately to users? How should we handle illegally copying copyrighted software? What information about oneself should an individual be required to reveal to others? What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?
What information does a person or an organization have a right to obtain, under what conditions, and with what safeguards?
________ allows users to manipulate primarily text with many writing and editing features. A spreadsheet Data management Desktop publishing Word processing
Word processing
________ is the movement of information as it progresses through the sequence of steps that make up an organization's work procedures. Collaboration A virtual team A workgroup Workflow
Workflow
You open an e-mail from your friend that looks a little odd, but you figure your friend would never send you anything bad. This is _________ and is an _________ mistake. a human error; intentional a human error; unintentional social engineering; intentional social engineering; unintentional
a human error; unintentional
The ________ layer of TCP/IP enables client application programs to access the other layers. application internet network interface transport
application
Bandwidth is stated in ________ per second. beeps bits blips bytes
bits
Users access the web primarily through ________. browsers hyperlinks hypertext URLs
browsers
A _________ is a statutory grant that provides the creators or owners of intellectual property with ownership of the property for a designated period. copyright patent trade secret trademark
copyright
The price of hardware has ________ over time; the price of software has ________ over time. decreased; decreased increased; decreased increased; increased decreased; increased
decreased; increased
If you have to speak into your phone to unlock it, this is an example of something the user _________. does has is knows
does
Moore's law states that microprocessor complexity would ________ approximately every 18 months. double triple quadruple quintuple
double
You have to offer online banking if you want to operate a bank. This is a(n) ________. buyer power entry barrier substitute product supplier power
entry barrier
A(n) _________ is a system that prevents a specific type of information from moving between untrusted networks and private networks. anti-malware system DMZ ERP firewall
firewall
Your student ID is an example of something the user _________. does has is knows
has
If there are many alternatives to an organization's products or services, then the threat of substitutes is _________; if there are few alternatives, then the threat is ______. high; high high; low low; high low; low
high; low
The threat of new competitors will enter your market is _________ when entry is easy and _________ when there are significant barriers to entry. high; high high; low low; high low; low
high; low
Suppose you have a primary location in New York City where you main corporate servers are located. Just in case something happens in New York City, you have backup servers that are updated every minute in Chicago. This is an example of a _________ site. cold hot medium warm
hot
The complexity of software has ________ over time; the potential for software bugs has ________. increased; increased decreased; increased decreased; decreased increased; decreased
increased; increased
Speech-recognition software is a(n) ________ technology. input GUI OS output
input
An/The _______ is a network of networks. externet extranet internet intranet
internet
Typing in your password to access a system is an example of something the user _________. does has is knows
knows
The ________ concept refers to a group of computing products that work together. open source piracy block anti-bug open systems
open systems
A(n) ________ is a group of programs with integrated functions that has been developed by a vendor and is available for purchase in a prepackaged form. GUI open system package OS
package
Sarah received an email that claimed to be from her bank. The email asked her to provide her password. Sarah later found out that the email was not from her bank and that she had given sensitive information to someone who gained access to her accounts. This is an example of a ____________. worm trojan horse phishing attack denial of service attack
phishing attack
You purchased a copy of Microsoft Office and give a copy to a friend so he/she doesn't have to buy it too. This is _________ and is _________. piracy; legal piracy; illegal social engineering; legal social engineering; illegal
piracy; illegal
Intellectual property is NOT protected under _________ laws. copyright patent privacy trade secret
privacy
The developer keeps the source code private with ________ software. open open source pirated proprietary
proprietary
A(n) ________ guides the user through computer applications by using cartoon-like characters, graphics, animation, and voice commands. application interface social interface OS GUI
social interface
A(n) _________ to an information resource is any danger to which a system may be exposed. exposure risk threat vulnerability
threat
If you shift your risk by using other means to compensate for the loss like purchasing insurance, you have implemented a risk _________ strategy. acceptance avoidance limitation transference
transference
The issues that came up in the Quizlet/Texas Christian University cheating scandal in 2018 highlighted the need for ____________. more Web-based study tools to be available to students of all socioeconomic backgrounds universities to adapt to the changing nature of technology as it pertains to the ways in which students are learning widespread reform in terms of internet access on college campuses colleges to revise their Codes of Conduct to eliminate the ambiguity in students using open source study tools
universities to adapt to the changing nature of technology as it pertains to the ways in which students are learning