CIS Final Review
Compact Discs (CDs) are capable of storing up to _________ of data.
700MB
The series of steps that describe exactly what each portion of a program is supposed to do is known as a(n)
Algorithm
Many individuals are using TV tuners as _________ to record television shows for future playback.
DVR's
In some cases, _________ can be used to convey emotions in casual email messages.
Emoticons
Laws such as the Patriot Act and _________ give the U.S. government broad surveillance powers.
FISA
Although NSFNET offered connectivity to academic researches, it was much slower than the newer CSNET.
False
Friends, family, and co-workers often connect with each other and share thoughts by using cloud computing
False
The ability for UPS's website to remember your country/language selection is the result of its use of third-party cookies.
False
Many companies and specialty websites offer _________, or discussion boards, where individuals can ask questions and reply to each other.
Forums
The newest connector for displays is _________, which carries both digital video and sound
HDMI
In which of the following social networking sites are you most likely to find professionals who seek to make business-related connections?
Many government agencies, such as the _________, monitor the Internet and mobile activities of individuals all over the world
NSA
Instead of delivering songs that you are likely to enjoy, services such as _________ offer you the ability to play practically any song you want on your mobile device.
Spotify
If you visit a website or page that you would like to remember for the future, you can add it to your browser's bookmarks or favorites.
True
Job search sites, such as indeed.com and monster.com, help users find jobs and allow them to upload their resume.
True
Search engines continuously index, or crawl, the Web's contents, finding new sites and revisiting existing ones in order to update their database of sites.
True
The "sports" in the address sports.yahoo.com refers to the subdomain.
True
Computers that have the same operating system are said to be _________ with each other because they can support the same software
compatible
The _________ is a program that translates a specific programming language into a machine language that can be processed by the CPU
compiler
Most of today's microprocessors have several processors, or _________, inside a single chip
cores
Although cloud backups are convenient, they have historically been more vulnerable to theft and damage than the backups kept in your home or business.
false
Although e-books are affordable, their adoption has been limited by the lack of photo support and the fact that they can be opened only by e-book readers.
false
Although unethical, there are currently no laws in the U.S. for actions such as hacking and sharing copyrighted material
false
An active DSS collects and displays data in the format requested, while a passive DSS makes recommendations as to the best decision.
false
Copyright protection lasts 20 years after the date of publication or release.
false
Employers generally restrict or monitor the Internet activity of their employees because the increased use raises the company's ISP rates significantly.
false
For monitors, a higher value for the response time is ideal for the smooth display of fast-moving images, such as those in video games
false
In Windows, files are managed with a tool known as Finder. On a Mac, that tool is known as Explorer
false
In expert systems, the information gathered from human experts is entered into a highly detailed database known as an inference engine.
false
Keyboard covers for tablets generally plug into the headphone jack in order to communicate with the tablet.
false
MMS allows you to send text messages of 160 characters to any other cell phone user, while the more versatile SMS allows you to attach a variety of media such as photos and short videos.
false
Mac OS has the largest market share for personal computers
false
Monitors should be cleaned routinely using regular glass cleaners and paper towels
false
Most experts recommend that companies monitor their employees secretly in order to prevent workers from circumventing the technologies used to track them
false
Many new devices support the use of various _________, or finger movements, to accomplish various tasks.
gestures
The _________ is the primary storage device of a personal computer.
hard drive
A(n) _________ is a graphical representation of a file, folder, or drive
icon
A software _________ is a contract from the software creator that specifies the rules for using this software.
license
The ability to run multiple programs at the same time is known as:
multitasking
A(n) _________ allows users to communicate and share information between computers
network
One of the most famous _________ licenses is GPL, which ensures that a particular program remains free to distribute and allows its code to be examined and modified by anyone.
open source
Many companies and individuals are going _________, which means they are using technology to lower their consumption and reliance on pape
paperless
Mobile devices allow us to access _________ information such as current traffic conditions for our city and live radar images on a weather app.
real time
A(n) _________ is a combination of mobile phone and handheld computer.
smartphone
A _________ is responsible for the development of computer software
software engineer
Often times, several office programs are bundled as a unit known as an office
suite
NASA uses _________ to conduct complex modeling and simulations for upcoming missions.
supercomputers
A _________ is a mobile device that typically ranges from seven to ten inches in size
tablet
he _________ is a stationary, rectangular pointing surface that is typically found on laptop computers.
touchpad
A VPN employs a method called "tunneling" in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet
true
A network allows users to communicate and share information between computers and various devices.
true
A practical and accurate risk assessment, where you identify and examine possible threats, is critical to being able to safeguard a system
true
A threat is anything that can cause harm while a vulnerability is a weakness that has not been protected against threats.
true
A web developer creates and maintains websites for organizations.
true
An MIS system can provide different types of information or summaries to managers at different levels
true
Creative works such as books, songs, and photographs are protected by copyright law.
true
Laptop computers possess a folding monitor that can rest flat against an area containing the keyboard and other hardware components.
true
Most desktop computers require an internal or external wireless adapter to connect to a wireless access point.
true
Businesses often use more sophisticated versions of webcams to engage in _________, where multiple individuals hold meetings and converse using internal networks or the Internet.
videoconferencing
Several related web pages that connect to each other are referred to as a(n):
website