MIS Exam 2
How many pages per second of animation would someone need to draw to create a more natural appearance of movement?
24 frames per second
Ernesto is interested in playing AR games. Which of the following devices should he use for game play?
???
Which phase of the SDLC is the feasibility study done to determine if the project is worth pursuing?
Analysis phase
_____ programs and features are often integrated into video editing software
Audio-editing
Which of the following tools translates the source code of a procedural program into binary code?
Compilers
Jenson needs to update his address. Which of the following applications can he open on his computer so he can make these changes?
DBMS
which of the following is the most secure password
Elephantatarburstrubikseattle (longer password is more secure than a shorter one, regardless of complexity)
Students who complete an online are not allowed to change their test grades. What aspect of the CIA triad is at work here?
Integrity
Which type of bitmap graphic loses some of its data during compression?
JPEG
Darcy plugged her guitar into her windows laptop to record her music for a video. After she's finished, what kind of file should she look for on her computer?
MIDI- musical instrument digital interface
Darcie has hired a programmer to make some custom changes to a DBMS she plans to move her business database to. What kind of DBMS is she using?
Open source
Casey is looking for a free, open-source RDBMS for his company. Which of the following meets the requirements?
PostgreSQL
What type of software accepts text ad input and produces speech as output?
Read aloud software
Sean lost his phone. What security feature would ensure that no one who might have taken it can access Sean's email while he looks for his phone?
Remote lockout
You need a(n) ______ to play an MP3 audio file on a desktop or laptop computer
Stand-alone player
Contact info for all the people taking a class at a school are stored in a ____ called students
Table
Jamie recently downloaded a photo editing app that some of her friends use. Two days later, she found out her email account had been hacked. What kind of malware infected Jamie's computer?
Trojan- malware hidden inside another program
Which of the following audio formats does not use any compression technique?
WAV files
Ergonomics
an applied science that specifies the design and arrangement of items that you use so that you and the items interact efficiently and safely.
Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone except
can use remote tracking to retrace the thiefs step
These are various risks from attacks on WIFI networks except
creating malware
Jackson just saved his research paper on his USB flash drive so he can take it to school. What kind of date is the file on his flash drive?
data at rest
A digital video that uses the MPEG-4 codec is often used by online streaming services.
false
When Russ opened a website on his browser, he saw an error that the site was not compatible with the browser version he was running. What tools could Russ use to troubleshoot this issue?
patch finder
The volume of big data generated over time is typically measured in terms of_______.
terabytes
What characteristic makes the following password insecure?
uses characters in sequence
In which of the following situations is a digital certificate useful?
you are signing a rental lease