Exam 1 - Computer Information Systems
Binary language consists of two digits, ________ and ________
0; 1
Most new laptop computers come with how much storage?
256 GB - 1 TB
Also known as additive manufacturing (AM), ________ printing sprays successive layers of material to create an object.
3D
When you buy a new laptop, how much RAM should it come with?
4-8gb
A form of E-mail fraud where criminals change the account where money is being transferred is called a(n) ________ scam.
A form of E-mail fraud where criminals change the account where money is being transferred is called a(n) ________ scam.
Along with the From line, what is the most important factor in ensuring your business message is read?
Along with the From line, what is the most important factor in ensuring your business message is read
The two main components of a processor are the control and the ________.
Arithmetic Logic Unit (ALU)
Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?
DSS
Business management software that encompasses nearly all business activities in a corporation is called ________ software.
ERP
What is the acronym for End-User Licensing Agreement?
EULA
n application that navigates all of the files and folders on your Mac is the _______
Finder
The ________ computer creates images on your computer.
GPU
The ________ is a separate processor (computer) on your computer that enhances your video.
GPU
This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery.
Gait analysis
The processor directly houses the ________ cache.
L1
Most laptops, tablets, and smartphones use a(n) ________ display.
LCD
The technology (chips) that allow cell phone microphones and hearing aids to be so small is the ________ chip.
MEMS
All of the following are common ports that are included with laptop computers except ______
MIDI ports
Be careful to only open e-mail from senders you know and trust. ________ may be contained in e-mail messages.
Malware
A commonly used short-range wireless technology used for data transfer and electronic payments is called ________.
NFC
Apple Pay uses ________ for payment transfer.
NFC
Though currently expensive, curved and paper-thin displays are possible using ________ display technology.
OLED
The technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called
OMR
Printer speed is described using which acronym?
PPM
System BIOS (Basic Input/Output System) is stored in ________.
ROM
RFID stands for which of the following?
Radio Frequency Identification
Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?
SCMS
A combination input and output device that allows users to interact with large computer displays that is sometimes found in classrooms is called an interactive whiteboard or a(n) ________.
SMART board
Which of the following is not a presentation software term?
Speaker image
Which category of management information systems (MIS) focuses on tracking sales and inventories?
TPS
Laser printers are popular in offices because they use relatively inexpensive ________.
Toner
Television displays with resolutions of at least 3840 x 2160 pixels are referred to as ________.
Ultra HD
When referring to business information technology, MIS stands for ________.
When referring to business information technology, MIS stands for ________.
Smartphone cameras work by focusing incoming light onto what type of array that captures images?
active pixel scanner
A bus is a channel over which information flows. A bus has two parts: the ________ and the ________?
address bus; data bus
The mouse was developed by which company?
apple
The width of a screen compared to the height of a screen is referred to as ________.
aspect ratio
Inkjet printers are often sold ________ their production cost.
below
Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a(n) ________, which closes the access point used by the hacker.
block
Since its radio waves pass through walls or desktops, ________-capable devices are very popular.
bluetooth
Data flows between different computer parts via ________.
buses
In ASCII 8 bits are combined to create a ________.
byte
One ________ represents a letter, symbol, or number (one character) of information.
byte
Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on ________.
checks
What manages hardware and software, supports the computer's basic functions, and runs programs?
computer
Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ________.
corruption
Stealing confidential materials such as copyrighted material, confidential information, or company e-mails from a network is called ________. Most often, this crime is committed by employees inside the company rather than outside hackers.
data theft
Which device carries a relatively large footprint and separate system unit?
desktop
How is the screen size of a laptop computer measured?
diagonally from left corner to right corner
RAM is ________ and has no moving parts.
electronic
The art and science of creating output that provides information in the most useful manner is called ________.
ergonomics
The number of times per second a frame in a video is advanced is the definition of _______
frame rate
What is equal to one cycle per second?
hertz
he SSD cost is ________ than the traditional hard drive cost.
higher
In the body of a professionally formatted business e-mail, where should a request be placed?
in the first sentence of the body of your e-mail
The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ________.
information systems (information technology) technician
Josh is taking an Intro to Computers course and needs to use Microsoft Office to complete a variety of assignments. He has purchased the software, now he must ________ it so he can start his assignments.
install
Adding software to a digital device, or adding hardware components to a digital device is called ________.
installing
mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or a ________ computer.
laptop
It's always a good idea to check the ________ before clicking Reply to All.
list of addressees
A laptop typically has ________ RAM than a smartphone.
more
Which of the following is a strength of the Android platform?
most widely used OS for smartphones and tablets
The information in the memory (the RAM, the caches, the registers) is ________ when a computer is shut down.
not saved
In photography, there are two ways to focus on distant objects, digital zoom and ________ zoom.
optical
An input, output or storage device connected to a computer is known as a(an) ________.
peripheral
Using cells of ionized gas to create images, ________ displays are actually becoming less popular.
plasma
Though legal, which of the following would likely be prohibited by a typical business computer-use policy?
playing online games
The term that describes how fast each pixel in a display is updated is ________.
refresh rate
Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ________ software.
remote desktop
The number of pixels in an image is called the image's ________.
resolution
Increased data transfer will be less likely to have errors if you use a ________ USB cord.
shorter
The average tablet has a ________ hard drive compared to the average desktop.
smaller
While not a required step in sending an e-mail, it's wise to ________ any message before clicking Send.
spell-check
Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You shoul
tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.
The most common printers for printing receipts are ________ printers.
thermal
To create an image with a laser printer ________ is(are) drawn to the drum.
toner
Using information systems to help foresee corporate business opportunities and threats that might be done by all levels of management, but it is most important for which management level?
top-level managers
Used in a variety of devices including ATMs and point-of-sale terminals, ________ allow for the input of data with the use of a stylus or finger.
touchscreens
Today, many computers use ________, a coding scheme that uses at least 16 bits to represent a character.
unicode
Tiffany has purchased a new laptop. She noticed many unwanted programs came pre installed on her laptop. She wants to ________ the programs from her device so they do not take up storage space.
uninstall
The technology that uses cameras, microphones, displays, speakers, and software to allow users to both see and hear each other is called
video conferencing
ith ____ recognition technologies, frequency, pitch, speech rhythms, and other characteristics are charted and compared to existing records.
voice