CGS 2100 Midterm
Select the technologies used by facial recognition software.
1. 3-D mapping 2. Feature charting 3. Skin texture analysis
Match the following optical storage media.
1. DVD: capacity of up to 8.5 GB 2. Blu-ray: capacity of up to 50 GB (per side) 3. CD: capacity of up to 700 MB
The SDLC's system analysis phase includes three stages. Choose the three stages.
1. Data collection-gathering info about needs and existing hardware and software. 2. Analyze data-determine the system requirements. 3. Prepare the system specifications.
Select the peripherals.
1. Printer 2. Monitor
Choose the SSD characteristics.
1. no moving parts 2. extremely fast
Common names for a USB drive include?
1. thumb drive 2. flash drive 3. jump drive
Firewalls help protect against ________ and ________.
1. worms 2. hackers
The second step in the PDLC is to create the plan or algorithm. This plan is usually written as a flowchart, and is in written in ________.
English
System BIOS (Basic Input/Output System) is stored in ________.
ROM
Sometimes spam messages are referred to as ________.
UBE
________ Basic is a programming language of the third generation that enables BASIC to be used with the benefits of a graphical user interface.
Visual
A camera that takes photos or streams video into a computer or over the Internet is called a ________.
Webcam
Although not a programming language technically, ________ pertains to the protocols that enable content to be displayed on the Internet.
XML
Plug and Play
a technology that enables the OS to detect and configure peripherals without downloading software or drivers
The distance between two adjacent sub-pixels on a display is referred to as ________.
dot pitch
RAM
largest memory of a computer, connected to the processor via the front side bus
A laptop typically has ________ RAM than a smartphone.
more
Converting a task into commands that a computer can use to perform the task is called ________.
programming
Devices allowing data to be retained when your computer is shut down are called ________ devices.
storage
The most common printers for printing receipts are ________ printers.
thermal
Most of the PC games were written in ________ or ________.
1. C 2. C++
Select the characteristics of thermal printing.
1. Commonly used for printing receipts 2. Paper turns black when heated
Common symptoms of a computer virus include?
1. Documents won't save. 2. Computer runs extremely slow. 3. Programs launch on their own.
Smartphone features include
1. Internet capabilities 2. Touch screen 3. Front/ back facing cameras 4. Speaker
Select the acronyms that describe a type of computer monitor.
1. LED 2. LCD
Examples of input devices include
1. Mouse 2. Keyboard 3. Camera
Select the characteristics of a plotter.
1. Prints large graphic displays 2. Mechanically moves a pen over a large sheet of paper
Factors that damage computer hardware include?
1. power surges 2. overheating 3. humidity 4. magnetic fields
The boot process consists of how many steps.
4
When you buy a new laptop, how much RAM should it come with?
4-8 GB
What is the acronym for End-User Licensing Agreement?
EULA
An application that navigates all of the files and folders on your Mac is the ________.
Finder
Which of the following is an e-mail program?
Outlook
When discussing digital cameras or smartphone cameras with APS CMOS, APS stands for ________.
active pixel sensor
Which device carries a relatively large footprint and separate system unit?
desktop
These facilitate getting data and information into your computer.
input devices
Lower range tones generally require ________ speakers.
larger
The smallest image element is a(n) ________.
pixel
Select the input devices often found with a point-of-sale system.
1. MICR 2. touch screen
Select the usual tasks of database administrators (DBAs).
1. Monitors the database's performance. 2. Develops and maintains the database itself. 3. Establishes user privileges for the database to help protect the data.
Select the e-mail services.
Gmail Outlook iCloudiCloud
RAM is ________ and has no moving parts.
electronic (solid state)
Select appropriate business e-mail etiquette practices.
1. Remember that potentially negative news is best given face-to-face. 2. Keep attachments small.
Examples of management information systems (MIS) include ________.
1. TPS 2. DSS 3. ESS
Select the two phases of the final step in the system development life cycle.
1. system audits 2. evaluation phase
Select the statements that describe a computer programmer's algorithm.
1. written in a natural language, such as English 2. written in the form of a flowchart so that it will be more easily converted into a programming language
Which category of management information systems (MIS) focuses on tracking sales and inventories?
TPS
Which of the following is a strength of the Linux platform?
free to download and use
Increased data transfer will be less likely to have errors if you use a ________ USB cord.
shorter
Most smartphones and tablets produced today use a ________ keyboard.
virtual
A hacker-controlled computer is called a ________.
zombie
Place the following steps in order for the process of uninstalling a program from a Chromebook.
1. Click the Launcher (circle icon). 2. Right-click the unwanted app. 3. Select Uninstall or Remove from Chrome. 4. Click Remove.
Select the usual tasks of a data analyst.
1. Collects data 2. Interprets information provided by the database 3. Creates reports for senior management
Match the Macintosh keyboard shortcut with the appropriate result.
1. Command+F: Find (in most apps) 2. Command+A: Select all 3. Command+S: Save 4. Command+Shift+3: Screenshot
Match the following.
1. Connector: On a cable, the connector is the end that connects to a port. 2. USB: allows for data transfer between devices and for devices to be electrically charged 3. Port: a slot or hole that matches the cord or expansion card being connected to the port 4. FireWire: a type of Thunderbolt port, commonly found on older Apple computers
Which of these should business owners do to help protect their data.
1. Establish strong firewall protection for their business's network. 2. Ensure antivirus software is installed and up-to-date. 3. Create strong password protections and protocols.
Place the following steps in the correct order if you want to reply only to the sender of an Outlook message.
1. Go to Outlook (log in if necessary). 2. Click Inbox to see your messages. 3. Click the message you wish to reply to. 4. Click Reply or Reply to All. 5. Type your response and click Send.
Place the following in order if you were opening and reading a message in Outlook.
1. Go to Outlook (log in if necessary). 2. Click Inbox. 3. Click on the message you wish to open. 4. After reading the message, click X to close or Delete to remove the message from your Inbox.
Match the following computers with their characteristics.
1. Laptop computer: designed for those who need a mobile computer but need to enter a large amount of data 2. Tablet computer: highly mobile device that can be used while standing or even walking 3. 2-in-1 computer: similar to a tablet but comes with a detachable keyboard/touchpad unit 4. All-in-one computer: designed to stay on a desk; provides a large monitor but takes up less space than a desktop computer
Match the business information activity with the appropriate management level.
1. Middle managers: Use information systems for communicating policies and performance reports up and down the corporate ladder. 2. First level managers (supervisors, floor managers): Use information systems for recording line employee performance. 3. Top-level management (business executives and presidents): Use information systems to foresee corporate opportunities and threats.
Select the smartphone input devices.
1. Motion sensors 2. Buttons 3. Microphones
Common types of servers include
1. Network server 2. File server 3. Web server
In which order should you delete cookies in Internet Explorer (Microsoft Edge)?
1. On the Start screen, tap or click Internet Explorer to open Internet Explorer. 2. Swipe in from the right edge of the screen, and then tap Settings. (If you're using a mouse, point to the lower-right corner of the screen, move the mouse pointer up, and then click Settings). 3. Tap or click Options, and then, under History, tap or click Select. 4. Select the Cookies check box, then tap or click Delete.
Put the following steps in order for creating a new e-mail message in Microsoft Outlook.
1. Open Outlook (log in if necessary). 2. Click New. 3. Enter the recipient's address in the To area. 4. Type the subject in the Subject area. 5. Type your message in the area beneath the formatting buttons. 6. Click Send.
Select the usual tasks of information systems (IS) program managers.
1. Supervising IS technicians. 2. Working with developers and senior management to procure and implement IS processes. 3. Developing training plans and policies for IS.
Which of the following are designed as a network operating system?
1. Windows NT 2. Windows Server 3. UNIX
Reasons to purchase a tablet computer include
1. business workplace 2. families 3. gamers
You can minimize your risk of computer damage by using a ________ or a ________.
1. surge protector 2. UPS (Uninterruptible Power Supply)
"Full HD" resolution is expressed as
1920 x 1080.
How many bits equal a byte?
8
Adding software to a digital device, or adding hardware components to a digital device is called ________.
installing
The first step in the SDLC is to define the problems to be addressed by the IT system, examine different alternatives, and report the findings. This is called the ________ step.
investigation
Many apps allow you to create mini-programs that reduce the number of routine steps required to complete a task. These mini-programs are called ________.
macros
L1 cache
memory located directly on the processor itself
Using information systems to help foresee corporate business opportunities and threats that might be done by all levels of management, but it is most important for which management level?
top-level managers
Used in a variety of devices including ATMs and point-of-sale terminals, ________ allow for the input of data with the use of a stylus or finger.
touchscreens
A terabyte equals approximately one ________ bytes?
trillion
What order of steps should you take to change your cookie preferences in Safari?
1. Choose Safari. 2. Click Preferences. 3. Click Privacy. 4. Change cookie settings.
Which of these would be considered a cybercrime?
1. Internet scams 2. cyber espionage 3. information theft
Match the following.
1. Storage: Putting a photo onto a USB drive (thumb drive) 2. Output: Playing a song from Spotify 3. Input: Entering text in a word document
Identify what is true about script kiddies.
1. are amateur computer hackers with little programming expertise 2. illegally gain access to computer systems using programs (scripts) that others have written
Choose what is true about computer worms.
1. automatically reproduce 2. Replication exhausts network bandwidth or available storage. 3. often sent using e-mail attachments
In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer-use standards. Failure to set such policies can lead to which of the following?
1. decreased employee performance 2. decreased network speed 3. increased likelihood of security breaches
Select what is true about session cookies.
1. determine the start and end of a session 2. analyze and measure traffic on a web page 3. determine the web browser being used
Choose the colors to create pixels on most output devices.
1. red 2. blue 3. green
Also known as additive manufacturing (AM), ________ printing sprays successive layers of material to create an object.
3-D
Match the appropriate Windows keyboard shortcut with its result.
CTRL+S: Save CTRL+P: Print CTRL+V: Paste CTRL+Z: Undo
Digital music devices are connected to computers using ________ ports.
MIDI
MIDI is an acronym that stands for?
Musical Instrument Digital Interface
A gigabyte equals approximately one ________ bytes.
billion
Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ________.
data analyst
Which of these would be deemed a cybercrime?
data manipulation
Stealing confidential materials such as copyrighted material, confidential information, or company e-mails from a network is called ________. Most often, this crime is committed by employees inside the company rather than outside hackers.
data theft
Which of the following refer to ultra-high-definition television displays?
1. 4K UHD 2. 8K UHD 3. UltraHD
The technology (chips) that allow cell phone microphones and hearing aids to be so small is the ________ chip.
MEMS
All of the following are common ports that are included with laptop computers except ________.
MIDI
The technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called
OMR
To improve the sound quality of their smartphones, many users purchase larger external ________ to listen to music.
Speakers
AJAX stands for ________ JavaScript and XML.
asynchronous
Data flows between different computer parts via ________.
buses
Breaking into a computer system (hacking), for politically or socially purposes is called ________.
hacktivism
The SSD cost is ________ than the traditional hard drive cost.
higher
Malware is designed to do all the following except
improve data
In the body of a professionally formatted business e-mail, where should a request be placed?
in the first sentence of the body of your e-mail
The three most common types of e-mail viruses include all except
password savers
The initial phase in the program improvement life cycle is "Defining the ________."
problem
Cache
relatively small amount of memory (measured in kilobytes or megabytes)
The average tablet has a ________ hard drive compared to the average desktop.
smaller
Specialized hardware or software that capture packets transmitted over a network are called packet ________.
sniffers
While not a required step in sending an e-mail, it's wise to ________ any message before clicking Send.
spell-check
A computer that is highly mobile, has a smaller OS, and uses a touchscreen as the primary input method is called a ________.
tablet
Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should
tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.
To create an image with a laser printer ________ is(are) drawn to the drum.
toner
Tiffany has purchased a new laptop. She noticed many unwanted programs came pre installed on her laptop. She wants to ________ the programs from her device so they do not take up storage space.
uninstall
Choose what all-in-one computers actually mean.
1. All-in-one computers house every component except the keyboard and mouse inside the same case as the monitor. 2. An all-in-one computer is a stationary device with a separate keyboard and mouse.
Select what's true regarding all-in-one computers.
1. All-in-one computers house every component except the keyboard and mouse inside the same case as the monitor. 2. An all-in-one computer is a stationary device with a separate keyboard and mouse.
Popular Personal Media Players (PMP's) include which two of the following devices?
1. Amazon Kindle Fire 2. Apple iPod
Select the input devices often found at a point-of-sale station.
1. Bar code or UPC reader 2. Keypad 3. UPC scanning wand
Select the true statements regarding an LED display.
1. Can be extremely thin 2. Great for well-lit areas 3. Extremely energy efficient
Which of the following are the steps involved in programming?
1. Categorizing which parts of a task a digital device can perform. 2. Describing the task in a precise manner. 3. Translating the task into the language the computer's CPU can use.
Good password management include which three of the following?
1. Changing your password often. 2. Using strong passwords. 3. Never use the same password twice.
Select the characteristics of audio output.
1. Converts electrical impulses into air movement 2. Digital devices use digital-to-analog converters
Place the steps of the Program Development Life Cycle in the correct order.
1. Defining the problem. 2. Creating a plan. 3. Writing the code. 4. Debugging the code. 5. Testing the code.
The three stages to be completed in the SDLC's inquiry phase include
1. Defining the problem. What should this system do? Who will by using this IT system? 2. Examining alternatives. Can available hardware and software perform the same task? 3. Reporting. Document your investigation's findings.
Which statements refer to a display's contrast ratio?
1. Describes the difference in brightness 2. Luminance of white pixels compared to black pixels
Choose the desktop computer features.
1. Desktops allow for relatively easy upgrade and expansion. 2. Desktops are often used in offices since they do not need to be mobile. 3. Desktops use a full OS.
According to US-CERT, you should contact them using one of the following methods when you receive a phishing message.
1. In Outlook Express, you can create a new message and drag and drop the phishing e-mail into the new message. Address the message to [email protected] and send it. 2. In Outlook Express you can also open the e-mail message* and select File > Properties > Details. The e-mail headers will appear. You can copy these as you normally copy text and include it in a new message to [email protected]. 3. If you cannot forward the phishing message, at a minimum, send the URL of the phishing website to US-CERT.
Select the usual roles of information systems (IS) technicians.
1. Installing IS hardware and software. 2. Maintaining IS hardware and software. 3. Repairing and replacing IS hardware and software.
In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer-use standards. This includes which of the following?
1. Instructing employees on standards. 2. Enforcing standards by creating firewalls, monitoring protocols, and filters. 3. Periodically reviewing computer-use policies.
Match the processor manufacturer to the correct statement.
1. Intel: Founded in 1968, this is the world's largest manufacturer of processors. 2. Nvidia: Founded in 1993, this company produces popular mobile device processors. 3. AMD: Founded in 1969, this company's technology is featured inside every major next generation gaming console and home entertainment system: Microsoft's Xbox One, Sony's PS4™, and Nintendo's Wii.
Put the SDLC steps in order.
1. Investigation 2. Analysis 3. Design 4. Develop
If you own a small business, what can you do to ensure your computers and data is kept secure?
1. Keep software updated, particularly antivirus software. 2. Physically secure computers to minimize risk of theft. 3. Backup your data regularly.
Common computer virus infection indicators include ________, ________, and ________.
1. OS doesn't launch properly 2. files get deleted or encrypted 3. strange error messages or pop-up ads
What is the correct order of steps to use when uninstalling a program in Windows 10 using the search feature?
1. Open the Start menu. 2. Click Settings. 3. Click System on the Settings menu. 4. Select Apps & features. 5. Select a program you wish to uninstall.
Select the current uses for RFID tags.
1. Pet identification 2. Pacakge tracking 3. Inventory tracking
Rank the storage capacities from highest to lowest. Start with the highest capacity first.
1. Petabyte 2. Terabyte 3. Gigabtye 4. Megabyte 5. Kilobyte Optional 6. Byte 7. Bit
Select the advantages of a point-and-shoot camera over a smartphone camera.
1. Point-and-shoot cameras often have larger pixel sensor arrays, providing higher resolution. 2. Point-and-shoot cameras, being thicker, often come with optical zoom capability.
Choose the stages included in the SDLC process's system design phase.
1. Purchasing necessary software. 2. Purchasing needed hardware. 3. Setting up, installing, and testing the system.
Match the computer styles with its features.
1. Tablet computer: highly mobile—you can use it while standing or walking around 2. Desktop computer: not mobile, but allows for relatively easy upgrade and expansion 3. Laptop computer: clamshell (hinged) type computer 4. All-in-one computer: not mobile, but since most of it's components are housed behind the monitor it takes relatively little space on your desk
Select the statements that refer to the term "dot pitch."
1. The distance between two adjoining sub-pixels in a display 2. The closer the spacing (the smaller the dot pitch) the sharper the image
Select the qualities that make a trait useful for biometic recognition.
1. The trait must not change over time. 2. Everyone must have the trait. 3. The trait must be measurably different with each person.
Put the steps of a virus infection in the correct order.
1. The virus arrives via e-mail attachment, file download, or by visiting an infected site. 2. An action such as running or opening the file triggers the virus. 3. The infection is spread to other devices or a network. 4. The payload is activated and the virus starts its destructive actions.
Match the business information systems (IS, sometimes called information technology or IT) activity with the appropriate management level.
1. Top-level management (business executives and presidents): Use IS to monitor overall business performance. 2. Middle managers: Use IS for record keeping and reporting purposes. 3. First level managers (supervisors, floor managers): Use IS for scheduling daily and weekly operations.
Which of the following are true regarding high-definition displays?
1. Typically have aspect ratios of 16:9 2. Typically have 1080 horizontal lines of pixels
What is true about passwords?
1. Use a combination of letters, symbols, and numbers; the more characters you use, the more secure your password will be. 2. Regularly check your accounts to ensure they have not been tampered with.
Speech recognition software uses which of the following characteristics?
1. Voice frequency 2. Voice pitch 3. Speech rhythms
Which are important considerations when purchasing a new computer?
1. What is its price? 2. How much RAM comes with it? 3. Does the device have USB ports?
Which of the following should you consider when buying a new computer?
1. What is the cost? 2. Does it have HDMI ports? 3. Does it have an SD card slot?
How can you attach a mouse or other pointing device to your computer?
1. With a Bluetooth connection 2. With an IrDA connection 3. With a wire through a USB port
Select the reasons for purchasing a tablet computer.
1. You need a computer that you can use while walking. 2. You need a highly mobile computer that works well for reading ebooks or for online gaming.
Select the statements that refer to color depth.
1. also known as "bit depth" 2. a measure of the accuracy of the color of each pixel 3. specifically, the number of bits of data describing each pixel in a display
When reporting a computer ethics violation of a co-worker to your employer, it's important to ________.
1. be brief and direct 2. state only what you witnessed
A multi-core processor has two or more ________; and is capable of ________.
1. cores 2. hyperthreading
Which of the following are treated as cybercrimes?
1. data manipulation 2. data corruption 3. cyberbullying
What are some characteristics of a 2-in-1 computer?
1. full operating system 2. touch screen monitor
Rank the following from fastest to slowest. The fastest should be on top.
1. gigahertz 2. megahertz 3. kilohertz 4. hertz
Spyware collects your ________, ________, and ________ to gain information about your Internet habits and activities.
1. keystrokes 2. passwords 3. confidential information
What is true of the malware Trojan horse?
1. often found attached to free downloads and apps 2. often used to find passwords, destroy data, or to bypass firewalls
For which of the following activities would a typical marketing department need a strong information system?
1. online sales 2. online advertising 3. updating the business's social media sites
In each browser's settings area you should consider ________, ________, and ________.
1. periodically deleting cookies 2. blocking/customizing your cookie settings 3. decide from which sites you want to allow cookies
The software development process includes which of the following steps?
1. planning 2. programming 3. debugging 4. beta review
Select what's true about utility programs.
1. program that performs a specific maintenance type of task 2. included in both Windows and Mac OS 3. common examples include disk formatting, disk cleanup, and disk defragmenting
An Internet filter is firewall software used to block a user's access to specific Internet content. This software can reside on which three of the following?
1. router or user's computer 2. network 3. stand-alone filter attached to a server
Cyberattacks include the following
1. spyware. 2. pharming and phishing. 3. spamming and spoofing. 4. DoS and DDoS attacks.
Choose what all-in-one computers actually mean.
1. stationary device 2. have a large monitor 3. usually touch screen monitor
Choose what all-in-one computers actually mean.
1. stationary device 2. have a large monitor 3. usually touch screen monitor
Websites that use cookies can collect information about
1. surfing habits. 2. selling your collected information to third parties. 3. monitoring your web behavior.
Important considerations when purchasing a new tablet computer include which three items?
1. the amount of RAM it has. 2. the size of its screen. 3. the amount of storage it has.
Choose the two answers that define the term "resolution" in output devices.
1. the number of pixels in a display 2. quality of the image
Match the following description with the appropriate programming language generation.
1GL: Machine language-represented by a series of 1s and 0s. 2GL: Assembly language-An assembler converts 2GL into machine language. 3GL: High-level programming language-uses a compiler to convert into machine language. 4GL: Specifically designed for creating database management programs. 5GL: Extremely advanced-uses statements (scripts) rather than algorithms.
Most new laptop computers come with how much storage?
256 GB - 1 TB
A set of programs for exchanging data on a website without altering the display of the website is ________.
AJAX
Some computers use ________ to represent characters in a binary format.
ASCII
Business owners, copyright holders, and network administrators publish ________ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.
AUPs
The programming language of the third generation learned by most students when most computers used MS DOS was ________. It continues as a secure programming language to use 3rd party code and offers a standard for coding that readily integrates with other programming languages.
BASIC
If you are planning to write PC games software, you might need to know C or ________.
C++
The PDLC's coding phase uses which of the following languages?
C++
A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the ________.
Control panel
Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?
DDS
A ________ attack on a network is created to stop or interrupt traffic by saturating it with too many requests.
DDoS
Cyberattacks include ________ and ________.
DDoS attacks identity theft
This version of the HTML set of protocols designed to display documents on the web provides a smooth interface between natural language and machine language by wrapping data for web display in "tags".
Extensible Markup Language
This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery.
Gait analysis
Relatively rugged, water-resistant video cameras that allow users to film high-definition video under harsh conditions, such as on ski mountains, in the ocean, or at high altitudes are called extreme-action video cameras or simply a ________.
GoPro
The ________ is a separate processor (computer) on your computer that enhances your video.
Graphic processor (GPU)
A port that allows the transfer of high quality video and audio signals is called a(n) ________ port.
HDMI
VPN (Virtual Private Network) is a very useful tool in protecting your online identity. A VPN hides your ________ to outside websites.
IP address
Computer hardware and software used by an organization to improve its performance is called its ________.
IT system
Which is true regarding the length of a USB cord?
In general, the more data being transmitted, the shorter the cord should be.
Which chip and manufacturing company is the largest in the world?
Intel
Cyberattacks include all the following except
Internet browsing.
Which of these programs, by parsing XML documents, makes information more readable for programmers?
JSON
An object-oriented programming language used by Android phones and tablets to write apps is ________.
Java
The programming language ________ makes it much quicker to create websites and web pages.
JavaScript
To speed up the programming process while producing dynamic web pages, select the program that utilizes tiny programs called scripts.
JavaScript
Most laptops, tablets, and smartphones use a(n) ________ display.
LCD
Be careful to only open e-mail from senders you know and trust. ________ may be contained in e-mail messages.
Malware
When referring to business information technology, MIS stands for ________.
Management information systems
Which of the listed programs are used for creating documents, basic web pages, and desktop publishing?
Microsoft Word
Which of the following might be risky to uninstall from a Windows PC laptop?
Microsoft Works 6-9 Converter
Match the flowchart symbol with its meaning.
Oval: start point or finish point Parallelogram: input or output point Diamond: decision point Rectangle: process or procedure
The information in ________ is dumped when a computer is shut down.
RAM
RFID stands for which of the following?
Radio Frequency Identification
Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?
SCMS
Most tablets and phones use ________ as their main storage device.
SSD
Apple developed ________, a programming language for Mac OS and iOS writing software because Objective-C was hard to write.
Swift
What type of port do most digital devices use to attach peripherals?
USB port
Software that collects the web browsing history of the user and uses the collected data to create unwanted pop-up ads is called ________.
adware
Written in the English language and as a flowchart, a programmer uses a(n) ________ to describe the problem to be solved by the program.
algorithm
Combining a desktop's power with a clean look, ________ computers are popular with companies. However, their inability to expand makes them less popular with serious gamers.
all-in-one
Devices which house every component except the keyboard and mouse inside the same case as the monitor are called ________ computers.
all-in-one
HDMI
allows for the transmission of high-definition audio and video signals
One of the first stages of the PDLC testing method is a test of fresh software performed by the programmers themselves or contract evaluators working alongside the programmers. This is called the ________ test.
alpha
The second step of the SDLC phase is to collect information on current hardware and software, analyze this information, and prepare system requirements. This is called the phase of the ________ scheme.
analysis
A device commonly used for checkout in stores, that measures the reflection of a laser beam, is called a ________ reader.
bar code
Inkjet printers are often sold ________ their production cost.
below
A question that is answered as either yes or no, or true or false, is called ________.
binary
A ________ is the smallest unit of data that a computer can process.
bit
Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a ________, which closes the access point used by the hacker.
block
A collection of hacker-controlled computers is called a ________.
botnet
A channel over which information flows inside a digital device is called a ________.
bus
The two main factors that affect the speed of the processor are clock speed and ________.
bus width
Avoiding viruses include all the following except
bypass your browser's built-in security.
In ASCII 8 bits are combined to create a ________.
byte
One ________ represents a letter, symbol, or number (one character) of information.
byte
MIDI
capable of carrying digital music signals and are common in today's music scene
Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on ________.
checks
An alternative term for a programming language is programming ________.
code
The number of bits of data describing each pixel in a display is referred to as ________.
color depth
A digital device that accepts input, processes and stores the input, and provides output is a ________.
computer
A description of the difference in the luminance of a display's white pixels compared to the black pixels is called ________.
contrast ratio
A small text file of information created by websites that your web browser stores on your hard drive is called a ________.
cookie
The most popular web browsers have a private browsing mode (Incognito). While browsing in Incognito mode your browser will not store ________.
cookies
Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ________.
corruption
Repeated and deliberate harassment or harassment of a person or group of people through information technology and networks is called?
cyberbullying
A crime in which a computer is the object of a crime or in which a crime or offense is committed is called ________.
cybercrime
Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ________.
database administrator (DBA)
There are almost always errors after the code has been written. The PDLC's fourth step involves finding and correcting these errors in a process. This process is called ________.
debugging
The SDLC's third step consists of three phases, specifically developing multiple system proposals, selecting the most feasible proposal, and reporting on the system to be developed. This is called the system ________.
design
The fourth step in the life cycle of system growth is to get the required equipment and ensure that it operates properly. This is called the system development step.
developement
The correct way to measure the screen size of a computer monitor is?
diagonally from one corner to the other
The art and science of creating output that provides information in the most useful manner is called ________.
ergonomics
Register
extremely small amount of memory (measured in bits) located throughout the processor
The machine cycle consists of which four steps?
fetch, decode, execute, and store
Trojan horse programs are used to find all of the following except
finding free downloads.
A ________ is the hardware or software used to keep a computer secure from external threats such as hackers and viruses by allowing or blocking Internet traffic.
firewall
Defining the problem is the ________ step in the Program Development Life Cycle.
first
The ________ step in software development is: What should this program do?
first
A process's graphical representation is called a ________.
flowchart
Typical tablet computer or smartphone SSD capabilities are measured in ________.
gigabytes
The visual image output created by the computer is called ________.
graphics
A person with unlawful access to networks to steal and corrupt information and data is called a ________.
hacker
A zombie is a computer controlled by a ________.
hacker
The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ________.
information systems (information technology) technician
Peripherals
input, output, or storage devices connected to a computer.
Josh is taking an Intro to Computers course and needs to use Microsoft Office to complete a variety of assignments. He has purchased the software, now he must ________ it so he can start his assignments.
install
A program that can be used to turn a single line of C# into a machine language without the complete program being compiled is called a C# ________.
interpreter
A two-in-one computer combines a tablet with a detachable ________ to make a relatively powerful, yet mobile computer.
keyboard
A mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or a ________ computer.
laptop
An initial value process, a process and a test condition which can potentially return to the initial value is called a ________.
loop
What type of virus is written in a macro language and placed in a document or table?
macro virus
There are two stages of the final step in the SDLC, one system audit and one assessment stage. This final step is called ________ the system.
maintaining
Megahertz is the same as a ________ cycles (or instruction) per second.
million
Sometimes used in smaller business networks, employee ________ software is impractical for large networks because of the number of users and the potential for misuse.
monitoring
Which of the following is a strength of the Android platform?
most widely used OS for smartphones and tablets
Which of the following is a strength of the Windows platform?
most widely used OS in laptops, desktops, usually leading to lower prices
The actual pixel number in a monitor is called the ________ resolution.
native
A(n) ________-oriented assessment operates well when inputs can readily be put into distinct categories or classes.
object
Though legal, which of the following would likely be prohibited by a typical business computer-use policy?
online personal shopping
What manages hardware and software, supports the computer's basic functions, and runs programs?
operating system
In photography, there are two ways to focus on distant objects, digital zoom and ________ zoom.
optical
Many manufacturers have made ________ optional equipment when purchasing a new laptop computer.
optical drives
Cookies used to collect user information like passwords and stored on a computer hard drive until deleted or expired are called ________ cookies.
persistent
Unlike phishing that uses fake e-mails to gain personal information about a user, ________ uses fake websites to gain personal information.
pharming
Using cells of ionized gas to create images, ________ displays are actually becoming less popular.
plasma
Though legal, which of the following would likely be prohibited by a typical business computer-use policy?
playing online games
Converting a task into commands that a computer can use to perform the task is one definition of computer ________.
programming
Which type of touchscreen uses a single metallic-coated panel and uses electricity to calculate touch points?
projective capacitive
An output device that uses light to display video or image output on a surface is called a ________.
projector
Written in natural language, but often including shorthand programming to help write the program itself, ________ is the word that defines an intermediate step in generating a flowchart algorithm.
pseudocode
If antivirus software can not delete an infected file, it sends the file to a hard disk area called ________.
quarantine
The number of pixels in a display is called the display's ________.
resolution
Along with the From line, what is the most important factor in ensuring your business message is read?
the Subject line
One of the main differences between free and fee-based antivirus software is ________.
the number of features
A kilobyte is equal to approximately one ________ bytes.
thousand
Cookies stored on a computer store information about ________.
user preferences
If you purchase a new graphics computer game or a new photo/video editing software for your desktop computer, you may want to purchase a new ________ card.
video
The technology that uses cameras, microphones, displays, speakers, and software to allow users to both see and hear each other is called ________.
video conferencing
Software that infects a computer and is created by computer code is called a ________.
virus
With ____ recognition technologies, frequency, pitch, speech rhythms, and other characteristics are charted and compared to existing records.
voice
A form of E-mail fraud where criminals change the account where money is being transferred is called a ________ scam.
wire-wire