CS202 EXAM1 Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

According to Juniper Research, the financial impact of cybercrime is estimated to reach _____ by 2019.

$2 Trillion

The high-level program instruction a = b + c is most likely to be translated to which assembly instruction?

Add M[4], M[5], M[6]

Cheng is starting a new website that will provide payroll and legal services to small companies. What type of e-commerce website is Cheng building?

Business-to-business (B2B)

Jorge is starting a new website that provides home loans to first-time homebuyers. What type of ecommerce website is Jorge building?

Business-to-consumer (B2C)

Early _____ monitors were large and heavy, but are not commonly used anymore.

CRT

MS Word software falls under what form of intellectual property protection?

Copyright

A(n) _____ compression algorithm creates dictionary entries for patterns that are repeated in the file.

LZ

The Yahoo! Logo falls under what form of intellectual property protection?

Trademark

A person's digital _____ consists of the information about him / her that can be found on the Internet. a. â ¨footprint b. â ¨bootstrap c. â ¨metainfo d. â ¨fingerprint

a

Integer (decimal) values such as 52 are stored within a computer as _____ numbers. a. binary b. hexadecimal c. octal d. decimal

a

One effect cyberbullying can have on a victim is a decrease in academic performance. a. True b. False

a

The QWERTY keyboard was originally designed to _____. a. empower people to type as fast as possible b. provide maximum exercise to a person's fingers c. slow down a person's typing, so simultaneously-pressed typewriter keys wouldn't jam d. fit onto a tablet's screen

a

The speed of a CPU is governed by a _____ that synchronizes all of its components. a. clock signal b. system alarm c. system timer d. flash signal

a

A touchpad replaces a mouse, enabling a user to "move the mouse" by: a. speaking into the pad b. sliding a finger across the pad c. tapping on a virtual keyboard on the pad d. tapping out morse code on the pad

b

An Internet scam may trick a user into downloading an executable file, such as a supposed package delivery label, which then installs _____ . a. spam b. malware c. a 419 file d. phishing

b

Decimal number 7 is represented as a 4-bit binary number is _____. a. 1110 b. 0111 c. 1000 d. 0001

b

Good passwords _____ . a. are short and easy to remember b. mix letters, numbers, and special characters c. are dictionary words with more than 8 characters d. require special hardware

b

The ____ era was characterized by the emergence of desktop computers, client-server architecture, and ERP systems. a. mainframe b. PC c. Internet and e-commerce d. post-PC

b

Which of the following information systems components does "business manager" belong to? a. Technology b. People c. Method d. Networks

b

Which of the following is NOT an example of a security breach? a. A hidden program that sends emails without the computer owner's knowledge b. A user posting an inappropriate message c. An organization's servers being maliciously shut down

b

"Bit" is short for _____. a. Bitomy b. Bitolography c. Binary digit d. Biiiit

c

A _____ is a large, expensive, and fast centralized computer that can be shared by hundreds of users. a. smartphone b. tablet c. mainframe d. desktop computer

c

A keystroke logger may record all keys pressed by a user without the user's knowledge. A keystroke logger is an example of what type of malware? a. â ¨Virus b. â ¨Worm c. â ¨Spyware d. â ¨Adware

c

A particular computer X has a clock frequency of 2 GHz. Another computer Y is nearly identical but has a clock frequency of 2.3 GHz. Which describes the most likely relevant difference? a. Y is larger than X b. Y is smaller than X c. Y is faster than X d. Y is slower than X

c

Accessing _____ is faster than accessing a storage device, but more expensive. a. keyboards b. monitors c. memory d. printers

c

Assuming all other features are the same, which computer is probably faster than a computer with a 2 million byte cache, 2 billion byte memory, and 2 trillion byte drive? a. 2 million byte cache, 1 billion byte memory, 2 trillion byte drive b. 1 million byte cache, 2 billion byte memory, 2 trillion byte drive c. 2 million byte cache, 4 billion byte memory, 2 trillion byte drive d. 2 million byte cache, 2 billion byte memory, 4 trillion byte drive

c

Binary number 100000 represents what decimal number? a. 1 b. 2 c. 32 d. 128 million

c

If a user wants to store large numbers of videos on a computer, he/she should increase the size of the: a. memory b. cache c. drive d. All of these

c

In _____ the sender and receiver use the same key for encryption and decryption. a. two-step verification b. public-key cryptography c. symmetric-key cryptography d. phishing

c

The phases of the system development life cycle are analysis, design, _____, and testing. a. determining b. cooperating c. implementation d. guessing

c

What does the assembly instruction "Input M[99]" most likely do? a. Add M plus 99 b. Add 9 + 9 c. Save a typed key into memory location 99 d. Add two numbers are store the result in memory location 99

c

What electronic device leads to the 0's and 1's (bits) in a computer? a. An atom b. A molecule c. A switch d. A generator

c

When you request a web page from a server, your computer's _____ is sent to the server. a. â ¨MAC address b. â ¨EXIF address c. â ¨IP address d. â ¨TCP address

c

Which of the following is NOT a way of improving online account security? a. â ¨Immediately changing passwords if a computer is stolen. b. â ¨For a personal device, enabling a device's screen lock mechanism. c. â ¨Choosing a password like a pet's name or a birthday. d. â ¨Signing out whenever leaving a computer unattended.

c

_____ is the business practice where company A uses company B to do work that company A's employees might otherwise do. a. Crowdsourcing b. Crowdfunding c. Outsourcing d. Merger

c

_____ searching is a technique that infers the context of a term from other items in a search to better understand the user's intended query. a. Heavy b. Decrypted c. Semantic d. Anonymous

c

Many companies outsource work to areas where labor is _____.

cheaper

A _____ breaks into computer systems for malicious purposes, such as to steal or destroy data. a. slacker b. quaker c. flacker d. hacker

d

A _____ is a portable PC, smaller/lighter than a desktop PC, and operable from battery power. a. smartphone b. mainframe c. tablet d. laptop

d

A computer designer notes that a chip's circuits would run properly at 2 GHz, but the designer chooses to run that chip's clock at only 1 GHz. The most likely reason is: a. to reduce the computer's total size b. to reduce the computer's memory c. to increase the computer's speed d. to reduce the computer's electrical consumption

d

For years 2010 to 2015, the computers produced and shipped in highest quantity were _____. (Note: All the choices represent a kind of computer). a. desktop computers b. laptop computers c. tablets d. smartphones

d

From 2010 to 2015, the number of desktop computers shipped annually _____. a. increased by 10x b. increased by 5x c. increased by 2x d. decreased

d

If a child is being cyberbullied by a classmate, what should the child do? a. Get rid of the technology used for cyberbullying b. Retaliate c. Keep the matter quiet d. Tell a parent

d

In what device might one expect to find an embedded computer? a. A robot b. A medical device c. A car d. All of the above

d

The advantages of crowdsourcing may include _____ . a. lower cost b. scale c. quality d. All of the above

d

Unlawfully distributing copyrighted work is called _____. a. file sharing b. peer-to-peer sharing c. file syncing d. piracy

d

Speech recognition is becoming:

more common for input

A _____ license indicates a work is freely available.

public domain

A computer systems analyst mostly:

recommends hardware, software, or security setups

A computer's drive _____ data when power is turned off.

stores


Conjuntos de estudio relacionados

Ch. 54: Mgmt of Pts w/ Kidney Disorders

View Set

Chapter 11 Practice Problems - FINC

View Set

Prep U Questions Chapter 32: Skin Integrity and Wound Care

View Set

Computer Science Chapter 3 Exercise

View Set

Health Information Technology (HIT)

View Set

SEC 210 - Intrusion Detection - 2016FA FTCC

View Set