CGS1060 Exam 2 review
Twitter recommends using no more than ___ hashtags per Tweet.
2
Sometimes used to create prototype models for casting, ___ printing is also known as additive manufacturing.
3D
Two major catagories of cell phones are available. Smartphones with LTE or 4G capability and ___ phones.
3G
The mouse was developed by which company?
Apple
This technology provides short-distance wireless communication between electronic devices using extremely low power radio signals.
Bluetooth
Which of the following statements about Facebook is true?
Cyberstalking and online predators are a real problem on Facebook.
Writing software follows a 5-step process called the PDLC. PDLC stands for the Program ___ Life Cycle.
Development
EDI stands for ___ .
Electronic Data Interchange
While not technically a programming language, ___ refers to the protocols that allow content to display on the web.
HTML
All of the following are true about Instagram except
Instagram charges a fee to download the app.
A program that makes creating websites and webpages much faster is ___ .
JavaScript
The technology (chips) that allow cell phone microphones and hearing aids to be so small is the _____ chip.
MEMS
This technology allows musicians to create written sheet music simply by playing an instrument.
MIDI
Be careful to only open email from senders you know and trust. ___ may be contained in email messages.
Malware
Because it locates cellular devices, assigns frequencies, transmits signals to the correct sites, the ___ is probably the most important part of any cellular network.
Mobile Switching Station (MSS)
A commonly-used short range wireless technology used for data transfer and electronic payments is called ___ .
NFC
The technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called.
OMR
Printer speed is described using which acronym?
PPM
Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?
SCMS supply Chain Management Software
A 3rd generation programming language that allows BASIC to be used with the advantages of a graphical user interface is ___ Basic.
VIsual
Written in natural language and in the form of a flowchart, a programmer uses a(n) ___ to describe the problem the program will solve.
algorithm
Most touchpads use _____ to sense when a finger has moved across the pad.
capacitance
The number of bits of data describing each pixel in a display is referred to as ___ .
color depth
A program that takes an entire program, check the source code for errors, and converts it into machine language is a ___ .
compiler
Before you can start tethering, verify that it's included in your cell phone's ___ plan
data
Stealing confidential materials such as copyrighted material, confidential information, or company emails from a network is called ___ . Most often, this crime is committed by employees inside the company rather than outside hackers.
data theft
After the code has been written there are nearly always mistakes. The 4th step in the PDLC involves finding and correcting these errors in a process called ___ .
debugging
Purchasing the necessary software for the system is part of the system ___ step in the SDLC process.
development
How is screen size measured?
diagonally from a top corner to a bottom corner of a visible display
The devices inside your phone that convert analog waves (such as sound waves) into digital signals that your phone can process are called ___ .
digital - analog converters
The distance between two adjacent sub-pixels on a display is referred to as ___ .
dot pitch
The level of complexity of the programming language, or the degree from which it is separated from machine language itself, is called the ___ of the programming language.
generation
Which of these is found on iPhones and iPads?
iOS
While many 3rd party apps are available through its App Store, apps for ___ must first be tested and approved before they're made available for downloading.
iPhones
In order to sync your iPhone to your MacBook you must first open the ___ app.
iTunes
All of the following should be considered when using Twitter except
if a Twitter user has been blocked you can file a formal complaint through Twitter.
Instructions (software) that allow a computer (hardware) to be used are written using specific symbols, letters and numbers known as a programming ___ or code.
language
It's always a good idea to check the ___ before clicking Reply to All.
list of addressees
Even a small degree of programming skill can be beneficial. Many apps allow you to create mini-programs that reduce the number of routine steps required to complete a task. These mini-programs are called ___ .
macros
Sometimes used in smaller business networks, employee ___ software is impractical for large networks because of the number of users and the potential for misuse.
monitoring
Though legal, which of the following would likely be prohibited by a typical business computer-use policy?
online personal shopping
Using reflective material to store data that can be read using a laser is called ___ media storage.
optical
Using cells of ionized gas to create images, ___ displays are actually becoming less popular.
plasma
Though legal, which of the following would likely be prohibited by a typical business computer-use policy?
playing online games
If you just need a phone for emergencies, you might consider a ___ phone.
prepaid
With optical zoom, resolution ____ when focusing on distant objects.
remains the same
If you're in an area where your home network has no cell coverage, you may need to use the cellular network of a different provider. This is called ___ .
roaming
Increased data transfer will be less likely to have errors if you use a ___ USB cord.
shorter
Pictures or videos taken and shared on Snapchat are called _____.
snaps
When copyrighted software is illegally copied, distributed, modified or sold and is considered direct copyright infringement this is called_____ _____.
software piracy
Connecting your phone to your laptop to transfer photos, videos, or music files is referred to as ___ .
syncing
Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should
tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.
HTML and it's 5th revision (HTML5) allow content to be displayed on ___ .
the World Wide Web
Laser printers are popular in offices because they use relatively inexpensive ___ .
toner
To create an image with a laser printer ___ is(are) drawn to the drum.
toner
Select the smartphone input device.
touchscreen or keyboard
The technology that uses cameras, microphones, displays, speakers and software to allow users to both see and hear each other is called ______.
video conferencing
Most smartphones and tablets produced today use a _____ keyboard.
virtual
With ____ recognition technologies, frequency, pitch, speech rhythms and other characteristics are charted and compared to existing records.
voice
In urban areas, the cell towers become more numerous and the cell signals transmitted by the cell towers are ___, than those in less populated areas.
weaker
Most laptops, tablets, and smartphones use a(n) ___ display.
LCD
A test of new software conducted by the programmers themselves or by contracted evaluators working alongside the programmers is one of the first phases of the testing process in the PDLC. This is referred to as a(n) ___ test.
alpha
The second step of the SDLC process involves collecting data about existing hardware and software, analyzing this data, and preparing specifications for the system. This is called the system ___ step.
analysis
The width of a screen compared to the height of a screen is referred to as ___ .
aspect ratio
Cell towers are connected to ___ .
base transceiver stations
Inkjet printers are often sold ____ their production cost.
below
Along with the From line, what is the most important factor in ensuring your business message is read?
the subject line
If your debit card has been compromised and you wait more than two days, but fewer than two months after you learn about the loss, you can be liable for up to _____.
$500.00
A tablet is a highly-mobile computer with a mobile operating system and a touchscreen rather than a keyboard/touchpad. To differentiate a tablet from a smartphone, a tablet is generally understood to have a screensize of at least ___ inches.
7
Once so commonly used that people even called it the "Crackberry", the ___ popularity dropped significantly in the U.S. after 2007.
Blackberry
What technology allows for the electronic communication of business oriented transactions and information between people and organizations?
EDI
Relatively rugged, water-resistant video cameras that allow users to film high-definition video under harsh conditions, such as on ski mountains, in the ocean, or at high altitudes are called extreme-action video cameras or simply a ___ .
GoPro
The number of pixels in a display is called the display's ___ .
resolution
Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?
top level managers