CIS Unit 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

address bus; data bus

A bus is a channel over which information flows. A bus has two parts: the ________ and the ________?

webcam

A camera that takes photos or streams video into a computer or over the Internet is called a ________.

bus

A channel over which information flows inside a digital device is called a ________.

gigabytes

A desktop computer's RAM is measured in ________ of data.

bar code

A device commonly used for checkout in stores, that measures the reflection of a laser beam, is called a ________ reader.

data is only available when you are online

A disadvantage of cloud storage is that ________.

wire-wire

A form of E-mail fraud where criminals change the account where money is being transferred is called a(n) ________Blank scam. Multiple Choice

more

A laptop typically has ________ RAM than a smartphone.

laptop

A mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or a ________ computer.

port

A point in a computer (a hole or a slot) that accepts a specific connector is called a ________.

higher

The SSD cost is ________ than the traditional hard drive cost.

graphic processor

The ________ is a separate processor (computer) on your computer that enhances your video.

fetch, decode, execute, and store

The machine cycle consists of which four steps?

tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.

Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should

4 GB

What is the minimum amount of RAM you should have on a laptop?

supercomputer

What is the most powerful computer type?

Management information systems

When referring to business information technology, MIS stands for ________Blank.

SCMS

Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?

In general, the more data being transmitted, the shorter the cord should be.

Which is true regarding the length of a USB cord?

Outlook

Which of the following is an e-mail program?

CD

Which optical drive media stores approximately 700 MBs of data?

spell-check

While not a required step in sending an e-mail, it's wise to ________Blank any message before clicking Send.

voice

With ____ recognition technologies, frequency, pitch, speech rhythms, and other characteristics are charted and compared to existing records.

HDMI

A port that allows the transfer of high quality video and audio signals is called a(n) ________ port.

optical drive

A storage device that uses lasers to read CDs, DVDs, or Blu-ray discs is referred to as a(n) ________.

plotter

A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a ________.

the Subject line

Along with the From line, what is the most important factor in ensuring your business message is read?

peripheral

An input, output or storage device connected to a computer is known as a(an) ________.

malware

Be careful to only open e-mail from senders you know and trust. ________Blank may be contained in e-mail messages.

longer

Because a metal platter is physically spinning, hard drives have ________ access times than solid state hard drives.

RAID

Because of its capability of storing data in multiple hard drives, data warehouses use ________ technology to ensure redundant data storage.

0; 1

Binary language consists of two digits, ________ and ________.

64

Bus width is the amount of data that can be transmitted at a given time. A 64-bit bus can transmit ________ bits of data.

ERP

Business management software that encompasses nearly all business activities in a corporation is called ________Blank software.

AUPs

Business owners, copyright holders, and network administrators publish ________Blank so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.

a reflective coating that has pits and lands

CDs store data using ________.

clock rate

Clock speed, also known as ________, is the speed at which the processor performs the operations required to run a digital device and the digital device's instructions.

data analyst

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a(n) ________Blank.

all-in-one

Combining a desktop's power with a clean look, ________ computers are popular with companies. However, their inability to expand makes them less popular with serious gamers.

a reflective coating that has pits and lands

DVDs store data using ________.

storage

Devices allowing data to be retained when your computer is shut down are called ________ devices.

Diagonally from a top corner to a bottom corner of a visible display

How is screen size measured?

video

If you purchase a new graphics computer game or a new photo/video editing software for your desktop computer, you may want to purchase a new ________ card.

shorter

In general, the ________ the access time, the faster the hard drive.

optical

In photography, there are two ways to focus on distant objects, digital zoom and ________ zoom.

cache

Including RAM, modern processors keep frequent and temporary accessed data in ________.

below

Inkjet printers are often sold ________ their production cost.

block

Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a(n) ________Blank, which closes the access point used by the hacker.

toner

Laser printers are popular in offices because they use relatively inexpensive ________.

Apple

Lightning ports and connectors were developed for ________ devices.

larger

Lower range tones generally require ________ speakers.

checks

Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on ________.

database administrator (DBA)

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a(n) ________Blank.

virtual

Most smartphones and tablets produced today use a ________ keyboard.

capacitance

Most touch pads use ________ to sense when a finger has moved across the pad.

byte

One character of information, for example, a letter or a number comprises of one ________ of storage.

pits and lands that are read by a blue spectrum laser beam

One character of information, for example, a letter or a number comprises of one ________ of storage.

YouTube

One emerging data storage challenge is the incredible amount of video being uploaded to ________.

USB drive

One type of storage device is a ________.

cloud

One type of storage device is a ________.

PPM

Printer speed is described using which acronym?

electronic (solid state)

RAM is ________ and has no moving parts.

radio frequency identification

RFID stands for which of the following?

touch screen or keyboard

Select the smartphone input device.

petabytes

Server banks have capacities measured in ________.

thumb drives (USB or flash drives)

Since they are low-priced and reliable, ________ storage devices are extremely popular.

active pixel scanner

Smartphone cameras work by focusing incoming light onto what type of array that captures images?

remote desktop

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ________Blank software.

data theft

Stealing confidential materials such as copyrighted material, confidential information, or company e-mails from a network is called ________Blank. Most often, this crime is committed by employees inside the company rather than outside hackers.

gigabytes

Storage capacity for laptop hard drives is typically described in terabytes or ________.

UltraHD

Television displays with resolutions of at least 3840 x 2160 pixels are referred to as ________.

ergonomics

The art and science of creating output that provides information in the most useful manner is called ________.

storage

The component of a computer that allows data to be retained after power is turned off is referred to as ________.

cloud

The fact that data on servers is nearly always backed up onto other servers gives ________ storage a major advantage over other data storage methods.

word size

The maximum number of bits per CPU instruction during one machine cycle is ________.

thermal

The most common printers for printing receipts are ________ printers.

Apple

The mouse was developed by which company?

color depth

The number of bits of data describing each pixel in a display is referred to as ________.

resolution

The number of pixels in a display is called the display's ________.

resolution

The number of pixels in an image is called the image's ________.

information systems (information technology) technician

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ________Blank.

information systems (information technology) program manager

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the ________Blank.

pixel

The smallest controllable element of an image is called a(n) ________.

MEMS

The technology (chips) that allow cell phone microphones and hearing aids to be so small is the ________ chip.

video conferencing

The technology that uses cameras, microphones, displays, speakers, and software to allow users to both see and hear each other is called ________.

OMR

The technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called

refresh rate

The term that describes how fast each pixel in a display is updated is ________.

MP4

The two most common audio file formats are WAV and ________.

aspect ratio

The width of a screen compared to the height of a screen is referred to as ________.

input devices

These facilitate getting data and information into your computer.

Bluetooth

This technology provides short-distance wireless communication between electronic devices using extremely low power radio signals.

gait analysis

This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery.

OLED

Though currently expensive, curved and paper-thin displays are possible using ________ display technology.

DNA

Though it could theoretically hold terabytes of data for thousands of years in a microscopic space, ________ storage, using genetic material, is a distant storage option.

online personal shopping

Though legal, which of the following would likely be prohibited by a typical business computer-use policy?

playing online games

Though legal, which of the following would likely be prohibited by a typical business computer-use policy?

toner

To create an image with a laser printer ________ is(are) drawn to the drum.

speakers

To improve the sound quality of their smartphones, many users purchase larger external ________ to listen to music.

top-level managers

Using information systems to help foresee corporate business opportunities and threats that might be done by all levels of management, but it is most important for which management level?


Conjuntos de estudio relacionados

Computer Organization and Architecture: Chapter 1 - Introduction

View Set

Hematologic & Immunologic Disorders in Children

View Set

Chapter 60: Assessment of Integumentary Function

View Set

Principles of Economics "Course 111" Chapter 1

View Set

Chapter 26: Soft-Tissue Issues Notes

View Set