IST 110 Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

Put the following five steps in the order in which you would perform them to use the Paste Special function. 1. Select and copy a range. 2. Click the Paste button arrow in the Clipboard group on the HOME Tab. 3. Specify exactly what you want to paste. 4. Click Paste Special to open the dialog box. 5. Select the range where you want to paste the Clipboard contents.

1,5,2,4,3

Moore's law states that microprocessor complexity would double approximately every ________ months.

18

What is the result of the expression =50+20/10*5?

60

___________ is NOT a basic function of TCP/IP. A. Responsible for disassembling, delivering, and reassembling data during transmission. B.Manages the movement of data packets between computers by establishing a connection between the computers. C.Sequences the transfer of packets. D.Acknowledges the packets have been transmitted.

A

The formula used to multiply cell A1 by cell C1 is ____.

=A1*C1

What is the syntax for a SUM formula adding the values of cell F6 to F9?

=SUM(F6:F9)

A(n) _____________ is a software package that attempts to identify and eliminate viruses and worms.

Anit-malware system

________ software is a set of computer instructions that provides specific functionality to a user.

Application

The complexity of software has ________ over time; the potential for software bugs has ________. A. decreased; decreased B. increased; increased C. Increased; decreased D. decreased; increased

B

This IS Function has become _____ strategic within organizations, so a growing number of CIOs are coming from _____. A. Decreasingly; within the IS department B. Increasingly; other business units C. Increasingly; within the IS department D. Decreasingly; other business units

B

Which of the following cloud computing characteristics allows organizations to use a single physical server for multiple purposes? A. Encompasses the characteristics of utility computing B. Virtualization C. Scalability D. Providing on-demand self-service

B

Which of the following is the correct order of networks from largest to smallest? A. WAN, MAN, PAN, LAN B. WAN, MAN, LAN, PAN C. MAN, WAN, PAN, LAN D. MAN, WAN, LAN, PAN

B

_______ is designed to be embedded in mobile devices and can be used with mobile wallets. It is a _____-range wireless network technology. A. UWB; short B. NFC; short C. NFC; medium D. UWB; medium

B

_________ is a two-dimensional code that can store much more information than _____. A. A QR code; RFID B. A QR code; bare codes C. RFID; QR codes D. RFID; bar codes

B

RFID was developed to replace __________.

Bar codes

Which of the following cloud computing characteristics addresses the business need to increase or decrease capacity when necessary (for example, retailers frequently need much more computational capacity on Black Friday)? A. Virtualization B. Providing on-demand self-service C. Scalability D. Uses broad network access

C

________ does NOT have an important role in the Internet of Things. A. 5G B. Bluetooth C. IPv4 D. Wireless sensors

C

The top technology job is ____

CIO

Managing information systems in modern organizations is a difficult and complex task. Which of the following factors does NOT contribute to this? A. Both end users and IT employees have responsibility for systems. B. If technology is not working, many firms cannot function. C. Business people are customers of the IT department. D. Technology is getting cheaper to acquire, operate, and maintain.

D

The ________ is the "director" of your computer system's operations; it is ________ software. A. GUI; application B. GUI; systems C. OS; application D. OS; systems

D

________ is a type of secondary storage. A. A register B. Cache memory C. RAM D. Magnetic Tape

D

Hackers would use a botnet to perform a _________.

DDoS

_________ is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.

Encryption

________ is the most secure cable medium.

Fiber-optic

________ was developed because we have run out of IP addresses in the original IP addressing scheme.

IPv6

Ethernet is a technology associated with ________ s.

LAN

BI systems provide computer-based primarily support _________.

Middle managers

________ clouds are IT infrastructures that can be accessed only by a single entity or by an exclusive group of related entities that share the same purpose and requirements, such as all of the business units within a single organization.

Private

If a hacker takes control of equipment such as power grids or nuclear power plants, this is an example of a(n) ____________ attack.

SCADA

With the ________ delivery model, cloud computing vendors provide software that is specific to their customers' requirements.

SaaS

___________________ is a system in which any object, natural or manmade, has a unique identity and is able to send and receive information over a network without human interaction.

The IoT

True of False If your refrigerator is connected to the internet so that it can automatically re-order milk for you, this is an example of the IoT.

True

True or False A conditional format applies formatting to a cell when its value meets a specified condition.

True

True or False A conditional format can make negative numbers red and positive numbers black.

True

True or False An eight-bit string is known as a byte.

True

According to the textbook, ________ is the most widely available cable medium.

Twisted-pair

Biometrics is an example of something the user __________.

is

To change the order of operations, enclose part of the formula in ____.

parentheses

Which of the following is a characteristic of secondary storage? A. It is more expensive than primary storage B. It can use a variety of media C. It is volatile D. It takes less time to retrieve data from it than from RAM.

B.

Which of the following cloud computing characteristics gives customers elasticity and flexibility because it allows customers to access needed computing resources automatically? A. Scalability B. Encompasses the characteristics of grid computing C. Providing on-demand self-service D. Virtualization

C

Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? A. Today's interconnected, interdependent, wirelessly networked business environment B. Smaller, faster, cheaper, computers and storage devices C. International organized crime taking over cybercrime D. Increasing skills necessary to be a computer hacker E. Lack of management support

C

Which of the following is in the current order starting with the most elementary? A. Data, knowledge, information B. Information, knowledge, data C. Data, information, knowledge D. Information, data, knowledge

C

The price of hardware has ________ over time; the price of software has ________ over time. A. decreased; decreased B. increased; increased C. Increased; decreased D. decreased; increased

D.

A(n) ______________ is located between two firewalls.

DMZ

__________ support all managers of the organization by providing rapid access to timely information and direct access to structured information in the form of reports.

Dashboards

______ refers to an elementary description of things, events, activities, and transaction that are recorded, classifies and stored but are not organised to convey any specific meaning.

Data

Cloud computing is the traditional way of purchasing and running your own IT infrastructure.

False

True or False An adjacent range is a collection of separate ranges.

False

True or False Application software serves as an intermediary between hardware and systems software.

False

True or False Satellite transmission systems are widely used but are being replaced by microwave data communications systems.

False

True or False The incredibly rapid rate of innovation in the computer industry simplifies hardware decisions because computer technologies so easily replace outdated legacy systems.

False

True or False The sheets in a workbook are identified in the sheet tabs at the top of the workbook window.

False

True or False Thin clients work better than fat clients when a network fails.

False

A(n) _____________ is a system that prevents a specific type of information from moving between untrusted networks and private networks.

Firewall

________ is an advantage of open source software.

Flexibility

A(n) ____________ is a company that provides internet connections for a fee.

ISP

IT services, IT personnel, and IT components make up the organization's _____.

IT infrastructure

The customer manages the most with ________.

IaaS

An/The ________ is a network that allows users to take advantage of familiar applications and work habits within an organization's network.

Intranet

________ remain popular because they are the cheapest secondary storage medium and can handle enormous amounts of data.

Magnetic tapes

To avoid splitting a worksheet in awkward places, you can insert a _____ to specify a specific breaking point.

Manual page break

In the Format Cells dialog box, the _____ tab allows you to format currency by choosing decimal places, comma separators, and regular number displays.

Number

________ software is available at no cost to both developers and users; it is distributed with license terms.

Open source

________ software is purchased software that has restrictions on its use, copying, and modification.

Proprietary

________ clouds are shared, easily accessible, multicustomer IT infrastructures that are available nonexclusively to any entity in the general public)

Public

Your computer crashes in the middle of you writing a term paper. You lose the paper because you had not saved a copy yet. You lost your paper because it was in ________.

RAM

____________ transmission systems have signals that pass through walls but they are susceptible to snooping unless encrypted.

Radio

A(n) ____ is a group of cells in a rectangular block.

Range

The main problem with _________ transmission systems is their signals experience propagation delay.

Satellite

____________________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.

Social engineering

A(n) ________ interfaces between users and programmers and determines information requirements and technical specifications for new applications.

Systems analyst

A(n) ___________ supports the monitoring, collection, storage, and processing of data from the organization's basic business transactions, each of which generates data.

TPS

True or False By default, Excel displays text in a black font color.

True

True or False Changing the number of decimal places displayed in a cell does not change the value stored in the cell.

True

True or False Cloud computing complicates privacy because sensitive data is in the hands of a third party.

True

True or False Conditional formats are dynamic, so a cell's appearance will change to reflect its current value.

True

True or False Every function follows a set of rules, or syntax, which specifies how the function should be written.

True

True or False Formatting changes only the appearance of data—it does not affect the data itself.

True

True or False Hardware can be used strategically if it is exploited successfully.

True

True or False If you want to print only part of a worksheet, you can set a print area, which is the region of the worksheet that is sent to the printer.

True

True or False In packet switching, packets travel independently across the network and can be routed through different paths in the network.

True

True or False Microsoft Office is an example of a software suite.

True

True or False SSDs do not have moving parts.

True

True or False Server farms are massive data centers with hundreds or thousands of network servers inside them.

True

True or False Throughput will always be less than the connection speed.

True

True or False To address the piracy problem, new firms have arisen to specialize in tracking software licenses for companies for a fee.

True

__________ is a cable medium.

Twisted-pair

___________ is a private network that uses a public network to connect users.

VPN

Each range is identified with a range reference that includes the cell reference of the upper-left cell of the rectangular block and the cell reference of the lower-right cell separated by a ____.

colon

In ____ orientation, a page is taller than it is wide.

portait


Conjuntos de estudio relacionados

Ch. 48 Skin Integrity and Wound Care

View Set

264- Binary, HEX & ASCII Study Guide- Quiz Questions-Spiker.J

View Set

FIN 1115 01---Personal Finance Exam 1 Questions

View Set

Nursing Management of the Pregnancy at Risk: Selected Health Conditions and Vulnerable Populations: Chapter 20: PrepU

View Set

AP Government & Politics Unit III

View Set

Los apodos de la clase roja 2021-22

View Set

AP Gov Chapter 8 - Political Parties

View Set

Psychiatric-Mental Health Practice Exam HESI

View Set