Introduction to Information Systems Final Exam

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Wi-Fi radio signals operate on either the 2.4 GHz or _______________ GHz bands.

5

___________________ systems can include anything from sophisticated programs that answer questions to futuristic robots that can think and act like humans.

AI

A ___________________ is a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.

AUP (acceptable use policy)

A wireless _________________ is the device that all nodes connect to in order to communicate wirelessly.

Access point

_________________ printers combine either inkjet or laser printing capabilities with scanning, photocopying, and faxing capabilities.

All-in-one

Which types of computers have all of the hardware integrated with the monitor?

All-in-one computers

Although Google owns _________________ and manages the Google Play Store for apps, they allow any manufacturer to use and modify this operating system for their devices.

Android

____________________ software, which is made for the user, allows individuals to complete a variety of work and school-related tasks.

Application

Some licenses require that the user provide _______________________, or credit, to the author wherever the work is used.

Attribution

The security principle known as _________________ requires that individuals must confirm their identity.

Authentication

The security principle known as __________________ gives individuals a certain level of access based on who they are.

Authorization

A __________________ is a copy of one or more files (or entire storage devices) that is made in case the originals become lost or damaged.

Backup

Very few countermeasures are as effective as _________________, which can help you recover data that was lost to almost any type of threat.

Backups

For modern networks, _________________ is measured in either megabits per second (Mbps) or gigabits per second (Gbps)

Bandwidth

NOT a web browser

Bing

The piracy of music and movies is often evident on file-sharing services that use the ____________________ protocol.

BitTorrent

___________________, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.

Botnets

To view web pages, you need special software known as a web _______________.

Browser

As the main processor of a computer, the _________________ is responsible for organizing and carrying out instructions in order to produce a desired output.

CPU (central processing unit)

________________ cable consists of a single copper wire that is surrounded by insulation and a wire mesh shield.

Coaxial cable

Superficially, ____________________ can be defined as the processes used in learning, problem-solving, and communication.

Cognition

A ___________________ excels when it comes to installing, configuring, and supporting computer systems.

Computer support specialist

___________________ are small data files that are created by websites in order to remember users and their preferences the next time they visit the site.

Cookies

The ___________________ is a legal concept that grants rights and control to the owner of any published work.

Copyright

A ________________ license allows an author to set conditions for the free use and distribution of their work.

Creative Commons

A ____________________ is responsible for configuring, maintaining, and securing an organization's database.

DBA (database administrator)

Software is sometimes illegally modified in order to disable _________________ technologies such as copy protection and authenticity checks.

DRM (digital rights management)

Often associated with the field of _______________________, a data analyst is skilled at analyzing large volumes of data in order to discover useful information for an organization.

Data analytics

A ____________________ is a central repository that contains stored or archived data gathered from multiple databases.

Data warehouse

Operating systems typically contain a disk _____________________ or optimization utility, which will reorganize files and fragments to place related ones nearer to each other.

Defragmentation

_________________ means doing business online, such as when a consumer buys a product over the Web instead of going to a store to buy it.

E-commerce

____________________ allows messages to be sent to electronic mailboxes in an instant.

Email

The ability to recognize, understand, and share the feelings of others is known as:

Empathy

Which of the following is an example of spreadsheet software?

Excel

Many websites have a __________________ area that should be checked for common questions and their responses.

FAQ (frequently asked questions)

Copyright law contains an exception known as _________________, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission.

Fair use

Certain types of systems are called ___________________ because they must run without failure or with nearly instant recovery from failure.

Fault-tolerant

___________________ computers are able to continue their operation even when problems are absent.

Fault-tolerant

A __________________ examines and blocks Internet traffic in order to protect your private network.

Firewall

A software-based ____________ is. dedicated to examining and blocking internet traffic.

Firewall

Online social interactions that exhibit anger and/or insults are known as:

Flaming

A process known as ___________________ allows users to install system updates from their computer's manufacturer or even install a customized operating system on Android mobile devices.

Flashing

Today, a _________________ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.

Hacker

The ___________________ is the primary storage device of a personal computer.

Hard drive

Today's web browsers include a feature that will delete all of your browsing ________________ with a single click.

History

The starting page for your web browser is known as the ___________________ page.

Home

A ____________________ provides multiple ports for connecting nodes.

Hub

Every type of internet service requires a connection to an __________________.

ISP (internet service provider)

Most companies have the need for a ________________ department that can quickly repair and troubleshoot systems, as well as provide technical support to employees.

IT helpdesk

_______________________ printers create an image directly on the paper by spraying ink through tiny nozzles.

Inkjet

______________________ is the act of having an online, text-based conversation with one or more individuals that occurs in real-time.

Instant messaging

__________________, which are products of the mind, can be valuable even though they may not always take on a physical form.

Intellectual property

_______________________ is the ability of each organization's information system to work with the other, sharing both data and services.

Interoperability

A type of spyware known as _________________ can record the individual keystrokes of a user.

Keyloggers

In an office environment, many organizations set up a ______________________ to perform various operations such as word processing, accounting, document management, or communications.

LAN (local area network)

Because of their sharp quality text output and fast printing speeds, ________________ printers are often preferred by businesses.

Laser

You are most likely to find professionals who seek to make business-related connections on this social networking site.

LinkedIn

A _____________________ is a set of software tools that enables managers to gather, organize, and evaluate information.

MIS (management information system)

The term _________________ encompasses several types of malicious computer programs that are created to harm computer systems and their users.

Malware

Many government agencies, such as the _______________________, monitor the Internet and mobile activities of individuals all over the world.

NSA (national security agency)

The term _____________________ refers to the set of online behaviors that are considered polite and proper.

Netiquette

A ____________________ is responsible for configuring and maintaining networks and communication systems.

Network administrator

A _____________________ is a connection point in a network.

Node

When companies outsource functions to another country it is referred to as:

Offshoring

_________________, such as Windows or Mac OS, exist primarily to help the computer run and manage its resources.

Operating Systems

Data moves through networks in structures known as _____________________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

Packets

_________________ computers are ones that have multiple hardware systems performing the same task at the same time.

Parallel

___________________ is gaining someone's rust by pretending you are someone else.

Phishing

A monitor's screen is divided up into millions of tiny dots, called _________________.

Pixels

Operating systems use __________________ utilities to place computers and devices in low-power states when they are not being used.

Power management

Online companies typically have a _________________ on their websites that clearly states what information is collected from users and what is done with that information.

Privacy policy

_________________ works may be downloaded and used without obtaining permission from anyone.

Public domain

A _________________ computer can represent data in states beyond the two bits (0's and 1's) of today

Quantum

A ____________________ is a storage system that links any number of disk drives (a disk array) so that they act as a single disk.

RAID

A ___________________ is used to prevent attenuation when packets are traveling long distances.

Repeater

The ___________________ of a monitor refers to the number of pixels that it can display on the screen.

Resolution

NASA's ____________________ robot can work alongside astronauts or perform tasks that are too dangerous for humans.

Robonaut 2

Hackers often set up __________________ in areas such as airports where users are expecting to find a free, wireless access point.

Rogue hotspots

A _______________ looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination

Router

___________________ is the capacity to provide increasing amounts of computing power, storage, and/or software.

Scalability

The scam known as _______________ typically comes in the form of an alert message that claims to be from the FBI or your security software.

Scare-ware

_______________________ are sophisticated services that store the URL of millions of web pages and most of the content on those pages.

Search engines

NOT a cloud storage service.

Skype

A ___________________ is a combination of a mobile phone and a handheld computer.

Smartphone

___________________ networking services make it easy for friends and family to share updates and special events with each other.

Social

A __________________ is responsible for the development of computer software

Software engineer

Posting a message to a discussion forum that is completely off-topic or appears to be promoting something may be considered ______________________ by the user community.

Spam

NOT one of the typical navigation buttons/features of a web browser?

Start

While storms could be a cause, power ____________________ are more likely to be caused by disturbances from high-demand equipment in a home or building.

Swells

A _________________ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it.

Switch

A __________________________ specializes in developing plans and recommendations that meet the software and system needs of an organization

Systems Analyst

A ___________________ is a mobile device that typically ranges from seven to ten inches in size.

Tablet

NOT one of the factors that we normally use to gauge the danger of a threat.

The likelihood of user compliance

Which technology has become the primary way in which we interact with our tablets and smartphones?

Touchscreen

____________________ cable normally consists of four pairs of wires that are twisted around each other.

Twisted-pair

__________________ is a feature that requires two forms of identification, such as a password and possession of your phone, to log into an account.

Two-factor authentication

When the power fails completely, the battery in a _________________ contains enough power to run a computer system for a given amount of time.

UPS (uninterruptible power supply)

Web pages have a standard addressing system known as a _________________, which allows them to be located on the Internet.

URL (uniform resource locator)

The most popular plug on a computer is the small, rectangular ________________________ port, which is used to connect almost all of today's external devices.

USB (universal serial bus)

If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a ____________________ to connect the systems in these two locations.

WAN (wide area network)

NOT one of the three general strategies that are used to authenticate individuals?

Who you know

___________________ can run mobile-style apps in the area known as the Start-Screen, while running traditional software in the more familiar desktop.

Windows 8 or Windows 10

Which of the following is an example of word processing software?

Word

The most popular video sharing site, offering millions of different videos that have been uploaded by users?

YouTube

Computers which are under the external control of a hacker are known as:

Zombies


Kaugnay na mga set ng pag-aaral

CHAPTER 21 STUDY GUIDE ENLIGHTENMENT AND REVOLUTION TEST REVIEW

View Set

Week 14 - PrepU Transplant & Burn Questions

View Set

Business Law Final - Old Quizzes

View Set