exam 2 cgs
Decision Support Systems (DSS)
-typically gathers and organizes information such as inventories, customers, production levels. -provide mid-level and upper-level management with tools to assist them in managing their businesses and organizations.
A smartphone emits approximately ___ watts of microwaves.
0-1
Also known as additive manufacturing (AM), ___ printing sprays successive layers of material to create an object.
3D
Sometimes used to create prototype models for casting, ___ printing is also known as additive manufacturing.
3D
Most new cell phones today come with approximately ___ of RAM.
500 MB - 2 GB
After the code has been written there are nearly always mistakes. The 4th step in the PDLC involves finding and correcting these errors in a process called ___ .
???
If you plan to write software for PC games you should probably learn C or ___ .
C++
The coding step of the PDLC might use which of the following languages?
C++
Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?
DSS
What technology allows for the electronic communication of business oriented transactions and information between people and organizations?
EDI
A port that allows the transfer of high quality video and audio signals is called a(n) ___ port.
HDMI
Amazon offers 2 lines of tablet computers, the Amazon Fire and the Amazon Fire ___ .
HDX
Television displays with resolutions of at least 3840 x 2160 pixels are referred to as ___ .
UltraHD
The mouse was developed by which company?
apple
A program that takes an entire program, check the source code for errors, and converts it into machine language is a ___ .
complier
A description of the difference in the luminance of a display's white pixels compared to the black pixels is called ___ .
contrast ratio
Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___.
corruption
A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is called _____ Commons.
creative
Before you can start tethering, verify that it's included in your cell phone's ___ plan
data
The distance between two adjacent sub-pixels on a display is referred to as ___ .
dot pitch
The term that describes how fast each pixel in a display is updated is ___ .
refresh rate
With optical zoom, resolution ____ when focusing on distant objects.
remains the same
Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ___ software.
remote desktop
If you're in an area where your home network has no cell coverage, you may need to use the cellular network of a different provider. This is called ___ .
roaming
The accuracy of a digital recording is determined by the device's ___ rate.
sampling
The diagonal measure of the visible display is known as _____ .
screensize
Two main factors concerning your digital identity are privacy and ___.
security
Increased data transfer will be less likely to have errors if you use a ___ USB cord.
shorter
Ironically, the expenses for calling and ___ are among the smallest charges found on a cell phone bill.
texting
The most common printers for printing receipts are ___ printers.
thermal
Because of the popularity and bandwidth demands of video streaming, ___ data plans are not as common as they were in the past.
unlimited
WhatsApp users can create groups, and send _____ images, video and audio messages for free.
unlimited
Some apps that use a surprising amount of data are those that include embedded ___ .
video
The technology that uses cameras, microphones, displays, speakers and software to allow users to both see and hear each other is called ______.
video conferencing
In urban areas, the cell towers become more numerous and the cell signals transmitted by the cell towers are ___, than those in less populated areas.
weaker
A camera that takes photos or steams video into a computer or over the Internet is called a ___ .
webcam
If your debit card has been compromised U.S. Federal law says you are only liable for a maximum of _____ in fraudulent charges if you tell your bank within two business days of learning about them.
$50
If your debit card has been compromised and you wait more than two days, but fewer than two months after you learn about the loss, you can be liable for up to _____.
$500
Enterprise Resource Planning (ERP)
-The data collected, stored, and processed by ERP software typically includes supply purchasing and inventory, production levels or service delivery, marketing information, shipping and payment information, financing records, and human resource management records. -Business management software that encompasses nearly all business activities in a corporation is called ___ software.
Executive support systems (ESS) or Executive information systems (EIS)
-provide management information for senior managers such as company presidents and chief executive officers.
Business owners, copyright holders, and network administrators publish ___ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.
AUPs
The 3rd generation programming language that most students learned when most computers used MS DOS was ___ . It remains a safe programming language for using 3rd party code and provides a coding standard that integrates easily with other programming languages.
BASIC
Which of the following statements about Facebook is true?
Cyberstalking and online predators are a real problem on Facebook.
Printer manufacturers advertise the quality of their products by stating how many ___ they produce.
DPI
Which is true regarding the length of a USB cord?
In general, the more data being transmitted, the shorter the cord should be.
All of the following statements about Instagram are true except
Instagram is difficult to integrate with apps like Facebook and Foursquare.
An object-oriented programming language that is popular for writing apps for Android phones and tablets is ___ .
Java
The technology (chips) that allow cell phone microphones and hearing aids to be so small is the _____ chip.
MEMS
This technology allows musicians to create written sheet music simply by playing an instrument.
MIDI
One advantage that the Samsung tablets have over the iPads is that you can add ___ to the Note or Tab.
MicroSD storage
Apple Pay uses _____ for payment transfer.
NFC
The technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called.
OMR
Printer speed is described using which acronym?
PPM
When you personally share an image on Pinterest it is known as a _____.
Pin
RFID stands for which of the following.
Radio Frequency Identification
Since it comes with a full computer operating system, some consider the ___ a laptop computer rather than a tablet computer.
Surface Pro 4
Smartphone cameras work by focusing incoming light onto what type of array that captures images?
active pixel scanner
A test of new software conducted by the programmers themselves or by contracted evaluators working alongside the programmers is one of the first phases of the testing process in the PDLC. This is referred to as a(n) ___ test.
alpha
In order to change sound waves into digital signals, smartphones contain ___ - digital converter.
analog
The second step of the SDLC involves collecting data about existing hardware and software, analyzing this data, and preparing specifications for the system. What is this step called?
analysis
The second step of the SDLC process involves collecting data about existing hardware and software, analyzing this data, and preparing specifications for the system. This is called the system ___ step.
analysis
This technology provides short-distance wireless communication between electronic devices using extremely low power radio signals.
bluetooth
Most touchpads use _____ to sense when a finger has moved across the pad.
capacitance
The technology that allows any text, even handwritten scrawls, to be digitized is known as optical ___ recognition.
character
Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on ____ .
checks
The number of bits of data describing each pixel in a display is referred to as ___ .
color depth
Defining the problem is the ___ step in the Program Development Life Cycle.
first
A graphic representation of a process is called a ___ .
flowchart
After the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a ___ and is written in an ordinary language, such as English.
flowchart
Number of times per second a frame in a video is advanced is the definition of ___ .
frame rate
This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery.
gait analysis
All of the following are true about RFID except
high-frequency RFID can transmit signals further than 1500 feet.
Third party apps must be reviewed and approved by Apple before being available for the ___ .
iOS
While many 3rd party apps are available through its App Store, apps for ___ must first be tested and approved before they're made available for downloading.
iPhones
The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the ___ .
information systems (information technology) program manager
These facilitate getting data and information into your computer.
input devices
To protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products, there are ___ property laws.
intellectual
Lower range tones generally require ___ speakers.
larger
The standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or _____.
netiquette
All of the following are part of an RFID system except _____.
network
Though legal, which of the following would likely be prohibited by a typical business computer-use policy?
online personal shopping
All of the following are protected against unauthorized use or distribution by intellectual property laws except
open educational resources.
In photography, there are 2 ways to focus on distant objects, digital zoom and ____ zoom.
optical
Using reflective material to store data that can be read using a laser is called ___ media storage.
optical
A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a ___ .
plotter
All of the following are best practices when using LinkedIn except
post vacation photos to show your friends where you've traveled.
The number of pixels in an image is called the image's ____ .
resolution
Social networking is based on the six degrees of _____ concept which posits that you can connect with anyone through a chain of no more than six introductions or personal links.
separation
After verifying that your data plan includes tethering, the first step in creating a hotspot with your Android phone is to click on the ___ icon.
settings
Pseudocode is written in natural language, but often including programming ___ to assist in writing the program itself. Pseudocode is the term that describes an intermediate step in creating an algorithm from a flowchart.
shorthand
The small computer within your phone that enhances the sound quality of your call is called a digital ___ processor.
signal
Select the program you would use if you want to write apps for the iPhone.
swift
The cell tower's base transmission station is connected to a mobile ___ station.
switching
Connecting your phone to your laptop to transfer photos, videos, or music files is referred to as ___ .
syncing
Along with the From line, what is the most important factor in ensuring your business message is read?
the subject line
Select the smartphone input device.
touchscreen or keyboard
A 3rd generation programming language that allows BASIC to be used with the advantages of a graphical user interface is ___ Basic.
visual
A tablet is a highly-mobile computer with a mobile operating system and a touchscreen rather than a keyboard/touchpad. To differentiate a tablet from a smartphone, a tablet is generally understood to have a screensize of at least ___ inches.
7
A set of programs that allow data to be exchanged on a website without changing the website's display is ___ .
AJAX
Though currently expensive, curved and paper-thin displays are possible using ___ display technology.
OLED
A program that can be used to convert a single line of C# into machine language without having to compile the entire program is called a C# ___
interpreter
Another term for a programming code is a programming ___ .
language
The first step in the program development life cycle is "Defining the ____."
problem
Laser printers are popular in offices because they use relatively inexpensive ___ .
toner
Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?
top level managers
EDI (Electronic Data Interchange)
-allows for the electronic communication of business oriented transactions and information between people and organizations.
Supply chain management software (SCMS)
-combines the capability of transaction processing systems (TPS) software with the forecasting of decision support system (DSS) software to help businesses manage inventories efficiently.
An acceptable use policy (AUP)
-is a written document that provides a framework of rules to be followed by users of computers, networks, websites, and computer resources such as printers and scanners.
Transaction processing systems (TPS)
-track sales and inventories for an organization. -compiles the gathered information into a database where it can be analyzed or used for decision making or by decision support system software.
Twitter recommends using no more than ___ hashtags per Tweet.
2
In the United States the federal _____ covers most consumer oriented electronic transactions.
EFT Act
Business management software that encompasses nearly all business activities in a corporation is called ___ software.
ERP
The titles in the DMCA that directly impact digital copyright issues include all of the following except
Title 5 - Copyright Protection Proviso.
What type of port do most digital devices use to attach peripherals?
USB port
AJAX stands for ___ JavaScript and XML.
asynchronous
A device commonly used for checkout in stores, that measures the reflection of a laser beam, is called a ___ reader.
barcode
Cell towers are connected to ___ .
base transceiver stations
Inkjet printers are often sold ____ their production cost.
below
If it can be answered as either yes or no, or true or false, the question is called ___ .
binary
Using a stylus and touchpad to map the signature and also measure pressure, pen angle, pen up/down, speed, etc, is known as what type of signature recognition?
dynamic
The largest category of apps, both in terms of active downloads and in terms of revenue generated is ___ .
game apps
In order to sync your iPhone to your MacBook you must first open the ___ app.
iTunes
All of the following should be considered when using Twitter except
if a Twitter user has been blocked you can file a formal complaint through Twitter.
The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ___
information systems (information technology) technician
Sometimes used in smaller business networks, employee ___ software is impractical for large networks because of the number of users and the potential for misuse.
monitoring
JSON stands for JavaScript ___ Notation.
object
Which of the following is an email program?
outlook
A combination input and output device that allows users to interact with large computer displays that is sometimes found in classrooms is called an interactive whiteboard or a ___.
smartboard
Sharing an Internet connection between two digital devices, for example, using your smartphone to create a hotspot and then using the hotspot to connect your laptop to the Internet, is referred to as ___ .
tethering
Relatively rugged, water-resistant video cameras that allow users to film high-definition video under harsh conditions, such as on ski mountains, in the ocean, or at high altitudes are called extreme-action video cameras or simply a ___ .
GoPro
While not technically a programming language, ___ refers to the protocols that allow content to display on the web.
HTML
Transferring a file from the Internet to your digital device is called _____.
downloading
After the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a flowchart, and is in written in an ordinary language, such as ___ .
english
The art and science of creating output that provides information in the most useful manner is called ___ .
ergonomics
When referring to business information technology, MIS stands for ___ .
management information systems
Cell phones send and receive extremely weak ___ signals to and from cell towers.
microwave
An output device that uses light to display video or image output on a surface is called a ___ .
projector
When copyrighted software is illegally copied, distributed, modified or sold and is considered direct copyright infringement this is called_____ _____.
software piracy
To improve the sound quality of their smartphones, many users purchase larger external ___ to listen to music.
speakers
Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss.You observe a co-worker visiting porn sites at work and determine that you should report this activity.Other co-workers also noticed this violation. You should
tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.
A businesses brand is derived from all of the following except ______ .
what their competition perceived them to be
EDI stands for ___ .
Electronic Data Interchange
Designed to display documents on the web, this version of the HTML set of protocols provides a smooth interface between natural language and machine language by wrapping data in "tags" for web display.
Extensible Markup Language
All of the following are considered e-commerce transactions except
G2B
Because it locates cellular devices, assigns frequencies, transmits signals to the correct sites, the ___ is probably the most important part of any cellular network.
Mobile Switching Station (MSS)
Which category of management information systems (MIS) focuses on tracking sales and inventories?
TPS
HTML and it's 5th revision (HTML5) allow content to be displayed on ___ .
The World Wide Web
The final steps in the PDLC process include testing and documenting the software. When testing is conducted by potential customers of the software, it's referred to as a(n) ___ test.
beta
Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a(n) ___, which closes the access point used by the hacker.
block
Being able to surf the web, watch videos, and listen to steaming audio is why cell service with a ___ plan is extremely popular in the U.S.
data
Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___ .
data analyst
Stealing confidential materials such as copyrighted material, confidential information, or company emails from a network is called ___ . Most often, this crime is committed by employees inside the company rather than outside hackers.
data theft
Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ___ .
database administrator (DBA)
The devices inside your phone that convert analog waves (such as sound waves) into digital signals that your phone can process are called ___ .
digital - analog converters
The level of complexity of the programming language, or the degree from which it is separated from machine language itself, is called the ___ of the programming language.
generation
In the body of a professionally formatted business email, where should a request be placed?
in the first sentence of the body of your email
The third step of the SDLC has 3 phases, specifically, developing several system proposals, selecting the most feasible proposal, and reporting on the selected system to be developed. This step is called the system ___ step.
introduction or design ?????
Select the program that uses small programs called scripts to speed the programming process while creating dynamic Web pages.
javascript
Because of their compact size, touchpads are most often used with _____ computers.
laptop
Because of the large infrastructure cost of building antennae and mobile switching stations, as well as leasing the rights to use radio frequencies, only ___ companies can compete nationally as cell phone providers.
larger
A process that has an initial value, a process, and a test condition that can potentially return the program to the initial value is called a ___ .
loop
Even a small degree of programming skill can be beneficial. Many apps allow you to create mini-programs that reduce the number of routine steps required to complete a task. These mini-programs are called ___ .
macros
The final step in the SDLC has two phases, a system audit and an evaluation phase. This final step is referred to as ___ the system.
maintaining
Be careful to only open email from senders you know and trust. ___ may be contained in email messages.
malware
BitTorrent utilizes no central server, instead opting to utilize a _____ structure where each device connected to a network has equal access to the shared files.
peer to peer
An input, output or storage device connected to a computer is known as a(an) _____ .
peripheral
If you just need a phone for emergencies, you might consider a ___ phone.
prepaid
On Facebook your _____ is a collection of the photos and stories that tell people about you and your experiences.
profile
Converting a task into commands that a computer can use to perform the task is called ___ .
programming
Written in natural language, but often including programming shorthand to assist in writing the program itself, ___ is the term that describes an intermediate step in creating an algorithm from a flowchart.
pseudocode
Sometimes, particularly when travelling, you may find yourself in an area where your home network has no cell coverage, but another network does have service. Using a different network is referred to as ___ .
roaming
To create an image with a laser printer ___ is(are) drawn to the drum.
toner
The main governmental organization that oversees Internet privacy is the Federal ___ Commission.
trade
With ____ recognition technologies, frequency, pitch, speech rhythms and other characteristics are charted and compared to existing records.
voice
Most laptops, tablets, and smartphones use a(n) ___ display.
LCD
A form of Email fraud where criminals change the account where money is being transferred is called a ___ scam.
wire-wire
Personal branding can be accomplished digitally and in more traditional means including all of the following except _____ .
writing private journal entries
There are risks associated with downloading content from the Internet. It is important to consider all of the following when downloading from the Internet except
your anti-virus software will ensure your files are safe