CGS Exam 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

Gigabyte

1 billion bytes

Megabyte

1 million bytes

Kilobyte

1 thousand bytes

terabyte

1 trillion bytes

petabyte

1000 terabytes

gigabytes

A desktop computers RAM is measured in ____ of data

True

Active pixel sensor (APS), complementary Metal-oxide semiconductor (CMOS) technology is used in most digital cameras, smartphone cameras and webcams today

false

All new laptop computers come with an optical drive installed

MIDI ports

All of the following are common ports that are included with laptop computers except

HDMI

Allows for the transmission of high-definition audio audio and video signals

peer-to-peer

BitTorrent utilizes no central server, instead opting to utilize a ______ structure where each device connected to a network has equal access to the shared files

Electronic Data interchange

EDI stands for

diagonally from left corner to right corner

How is the screen size of a laptop computer measured

L1

The ______ cache is located directly on the processor itself

MHz

The abbreviation for megahertz is

logical

The dbms engine provides an interface for the end user of the database. This interface is called the _____ view

RAM

The place in a digital device where the data and programs that device is currently using are accessible by the processor is called the ____

True

The platform or operating system of a computer controls all of the functions of a computer

in general the more data being transmitted, the shorter the cord should be

Which is true regarding the length of a USB cord

tablet

a computer that is highly mobile, has a smaller OS, and uses a touchscreen as the primary input method is called a

thousand

a kilobyte is equal to approximately one ______ bytes

megabyte

a million bytes of data equals approximately one ______

F2

a quick way to rename files or folders in windows is to select the item and then press the ______ key

Bluetooth

a short range wireless transmission protocol is known as

plug and play

a technology that enables the OS to detect and configure peripherals without downloading software or drivers

flowchart

after the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a ______ and is written in an ordinary language, such as English

network

all of the following are part of an RFID system except

instagram charges a fee to download the app

all of the following are true about instagram except

if a twitter user has been blocked you can file a formal complaint through twitter

all of the following should be considered when using twitter except

database

amazon.com allows you to search for thousands and thousands of items using images and information that are organized logically. this much storage and management requires a complex_________

peripheral

an input, output, or storage device connected to a computer is known as a ______

280

as of 2017, tweets can be a maximum of _____ characters

databases

because he wanted to be able to sort gifts according to continent and time zone., in 1984 Santa switched from using long lists to to using

Swift

because objective-c was difficult to write in, apple developed _______, a programming language for writing software for the mac OS and the IOS

RAID

because of their capability of storing data in multiple hard drives, data warehouses use ______ technology to ensure redundant data storage

25 gb

blue rays provide approximately_______ of storage space

ERP

business management software that encompasses nearly all business activities in a corporation is called _______ software

true

by default windows hides files extensions for known file types but you can unhide them if you wish

MDI

capable of carrying digital music signals and are common in todays music scence

IT system

computer hardware and software that an organization uses to increase its performance is referred to as its

MIDI

connecting digital musical devices to computers is accomplished by using ____ ports

cloud

emailing a file to yourself is an example of using______ storage

TPS, DSS, ESS

examples of management information systems include

desktops allows for relatively easy upgrade and expansion desktops are often used in offices since they don't need to be mobile desktops use a full OS

identify the characteristics of a desktop computer

the amount of RAM it has the size of its screen the amount of storage it has

important considerations when purchasing a new tablet computer include

byte

in ASCII, eight bits are combined together to create one _______

cache

in addition to the RAM, modern processors temporarily keep frequently accessed data in a _______

record

in the data sheet view of a relational database a row of information is called a ______

shorter

increased data transfer will be less likely to have errors if you use a ______ USB cord

game controller

input device

True

instagram images can easily be posted to facebook or pinterest

block

intrusion detection system (DIS) uses several techniques to protect networks. one is called a "halt" which stops the hacker from progressing into the network. Another is called an ______ which closes the access point used by the hacker

list of addressees

its always a good idea to check the ______ before clicking reply to all

graphics interchange format (GIF)

legacy (outdated) lossless format

portable network graphics (PNG)

most popular lossless image compression format

JPEG or JPG

most popular lossy image compression format

frame rate

number of times per second a frame in a video is advanced is the definition of

though legal, which of the following would likely be prohibited by a typical business computer-use policy

online personal shopping

projector

output device

development

purchasing the necessary software for the system is part of the system _______ step in the SDLC process

Blu-ray player, dvd drive

select all the optical drives

remember that potentially negative news is best given face to face keep attachments small

select appropriate business email etiquette practices

instagram is a photo sharing app that is available for download on a variety of digital devices if you specify a location with your photo, you can opt to have instagram check you in on foursquare

select the correct statements regarding instagram

emailing a file to yourself, saving a photo on Flickr, purchasing online storage space

select the methods of using cloud storage

Installing IS hardware and software Maintaining IS hardware and software Repairing and replacing IS hardware and software.

select the usual roles of information systems (IS) technicians

collects data, interprets information provided by the database, creates reports for senior management

select the usual tasks of data analyst

AVI, MP4, quicktime

select the video file compressions format

store instructions for how to compute the data as well as the data to be processed, equipped to handle unstructured data as MP4 files, videos, images, and extremely large files, use object query language to construct queries that extract data from the database

select what is true about object oriented databases

uninstalling system software is not recommended be cautious when uninstalling software from the OS manufacturer Be cautious when uninstalling software from the computer manufacturer

select what is true regarding uninstalling software

a group of related characters in a database, represents a characteristic of someone or something, primary key is a field designation

select what's true about database fields

petabytes

server banks have capacities measured in

separation

social networking is based on the six degrees of concept which posits that you can connect with anyone through a chain of no more than six introductions or personal links

hard drive

storage device

Defining the problem Examining alternatives Reporting. document your investigations findings.

the 3 phases that should be accomplished in the investigation step of the SDLC include

BASIC

the 3rd generation programming language that most students learned when most computers used MS DOS was _____ it remains a safe programming language for using 3rd party code and provides a coding standard that integrates easily with other programming languages.

what field name will the data fall under, what data type will be included

the data definition, as described in the data dictionary, tells users how each unit of data is defined in the database. which of the following elements will be used to describe the data

Investigation

the first step in the SDLC involves defining the problems that the IT system should address, examining various alternatives, and reporting the findings. The is referred to as the _____ step

right click

the most common method of renaming files and folders is to simply ______ on the item and select rename

color depth

the number of bits of data describing each pixel in a display is referred to as

security

the two major concerns regarding cloud storage are reliability and _______

relational

the type of database that uses common fields to create links between tables is called a ___ database

OLED

though currently expensive, curved and paper thin displays are possible using ________ display technology

DNA

though it could theoretically hold terabytes of data for thousands of years in a microscopic space, _______ storage, using genetic material, is a distant, storage option

Forms

to control how information is entered into a database, programmers and database administrators create _____ to help ensure data integrity

downloading

transferring a file from the internet to your digital device is called

touchscreens

used in a variety of devices including ATM and point of sale terminals _______ allow for the input of data with the use of a stylus or finger

optical

using reflective material to store data that can be read using a laser is called _______ media storage

hertz

what is equal to one cycle per second

USB port

what type of port do most digital devices use to attach to peripherals

double click

when you _____ a file windows should automatically open it. if it cant windows will prompt you to select the correct app to open the file

False

when you drag a file into the recycle bin it cannot be recovered

foreign key

when you need to link 2 tables in a database that don't have a field in common, one solution is to create a _______ in one table that links to the primary key in the other table

SCMS

which category of management information systems combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently

outlook

which of the following is an email program

saaS

which of the following refers to the distribution of computer applications over the internet and is commonly referred to as web apps

.exe

which of these extensions, if you open it, will probably install software onto your computer?

JSON

which of these programs make data more readable to programmers by parsing XML files

HTML

while not technically a programming language ________ refers to the protocols that allow content to display on the web

XML

while not technically a programming language,________ refers to the protocols that allow content to displayed on the web

save as

you're tired of losing documents so you've decided to save your research paper to your desktop where you know you'll be able to locate it quickly. To save it to the desktop, you first click the file tab to open the file menu. Next, you select


Conjuntos de estudio relacionados

Biology 2 Test 1 Sample Questions

View Set

Marriage and Family Chapters 5, 6, 7 quiz

View Set

Fundamentals Of Real Estate - Unit 2 (17% - 25Q)

View Set

Cardio Practice questions, Neuro NCLEX, NCLEX Neuro disorders, Lewis Chapter 48, Endocrine, Liver Failure, Hepatitis, cholecystitis, pancreatitis, NCLEX, Urinary NCLEX Questions, Med-surg Test #3, Urinary NCLEX QUESTIONS, Fluids and Electrolytes_Test...

View Set

Chapter 15 fill in the blank part a+b

View Set

GW B1 Unit 2- phrasal verbs connected with investigating and finding

View Set