cgs 2060 final
select the usual tasks for Info systems program managers
-supervise IS technicians -working with developers and senior management to procure and implement IS processes -developing training plans and policies for IS
Which of these extensions, if you open it, will probably install software onto your computer? Be careful!
.exe
Which of the following file extensions is commonly used for drawings?
.gif
The 3 phases that should be accomplished in the investigation step of the SDLC include:
1. Defining the problem. What should this system do? Who will by using this IT system? 2. Examining alternatives. Can available hardware and software perform the same task? 3. Reporting. Document your investigation's findings.
The fifth step in the SDLC process is the system implementation phase. During this phase the new system is brought online. Select methods of converting an organization from an older IT system to a newer IT system.
1. Direct conversion - shutting down the old system completely and starting the new one. 2. Parallel conversion - running both systems side-by-side for a while and then shutting the old system. 3. Pilot conversion - starting the new system in one sector of the organization to ensure that it works smoothly.
Select what's true about packet Specialized hardware or software that capture packets transmitted over a network
1. Legitimate sniffers are used for routine examination and problem detection. 2. Unauthorized sniffers are used to steal information.
Select the Android operating systems.
1. Lollipop 2. marshmallow
Select the anti-virus software options.
1. Mcafee 2. Norton 3. AVG
There are several ways to rename a folder in Windows. Which of these would work?
1. On the command bar, click Organize and then click Rename. 2. Click the folder icon and press F2 to activate the edit mode. 3. Right-click a folder and click Rename.
Select the phases included in the system development step of the SDLC process.
1. Purchasing necessary software. 2. Purchasing needed hardware. 3. Setting up, installing, and testing system.
Select the qualities that make a trait useful for biometic recognition.
1. The trait must not change over time. 2. cannot change over time 3. must be measurably different
select the characteristics of a CD
1. holds approx 700 MB of data 2. uses pits and lands to store data
Select the characteristics of a OneDrive account
1. microsoft email account 2. provides free cloud storage 3. can serve as extra storage space
Select the features common in DSLR cameras.
1. often allow for interchangeable lenses 2. usually have a mirror that allows the photographer to look directly through the lens
Select the reasons for compressing a file.
1. reduce the bandwidth needed to transmit a file 2. reduce storage space requirements
a typical laptop has a strong capacity of approx
500 GB - 1 TB
2GL
Assembly language - an assembler converts 2GL into machine language.
To remove a file from one folder and place it in another, click on the item and press ___, then move your cursor to the new location and press CTRL + V.
CTRL + X
which of the following are considered storage media?
DVDs blu ray discs
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .
Distributed Denial of Service
5GL
Extremely advanced - uses statements (scripts) rather than algorithms.
a quick way to rename files or folders in Windows is to select the item and then press the ____ key
F2
While not technically a programming language, ___ refers to the protocols that allow content to display on the web.
HTML
3GL
High-level programming language - uses a compiler to convert into machine language.
a switch distinguishes between various devices within a network by their ______ addresses
MAC
which category of MIS combines the forecasting capacity of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?
SCMS
4GL
Specifically designed for creating database management programs.
which category of management info systems (MIS) focuses on tracking sales and inventories
TPS
examples of management info systems (MIS) include
TPS ESS DSS
PaaS (distribution)
The distribution of computer applications over the Internet. Commonly referred to as web apps.
spam messages are sometimes referred to as _________
UBE
What type of port do most digital devices use to attach peripherals?
USB port
URL stands for ___ Resource Locator.
Uniform
While not technically a programming language, ___ refers to the protocols that allow content to displayed on the web.
XML
select the advantages of using a database instead of a traditional filing system
a database can hold larger amounts of data a database can provide better data integrity
zip
a lossless compression format
Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called
adware
which of these operating systems is based on the Linux and used on smartphones
android
if you believe you have fallen victim to a phishing scam you should
contact the institution the message was allegedly sent from contact US CERT
The first commercially available computer with a graphical user interface was NeXT's ___ computer.
cube
An integral part of a databases management system (DBMS) is the Data Definition subsection. This subsection uses a data schema, also called a data ___ .
dictionary
A database that stores data in different physical locations and that users access though client/server networks is called a ___ database.
distributed
a database that stores data in different physical locations and that users access thru client/server networks is called a ________ database
distributed
DDoS stands for?
distributed denial of service
A ___ name identifies a server site on the Internet.
domain
The distance between two adjacent sub-pixels on a display is referred to as ___ .
dot pitch
When you drag a file into the Recycle Bin it cannot be recovered. T/F
false
a refracted laser beam striking a photo reactor from many different angles allows _______ storage to retain many bits of data in the same location
holographic
Which of these is found on iPhones and iPads?
iOS
select apple tablet offerings
iPad pro series ipad air series iPad mini series
phased
implements new areas of the system in a predetermined period of time
the role of installing, maintaining, repairing, and replacing info system hardware and software typically falls to the __________
info systems (info technology) technician
Rout kits allow a remote user to do which of the following
install rogue kits create backdoor programs delete files
Adam was in the fifth grade when he was adopted by the Smith's. Because his school used a centralized database, all of his teachers had his correct name on their grade reports. This is an example of how a centralized database can help improve data ___ .
integrity
which of these browsers was developed by microsoft
internet explorer
what 3 items are needed to install a wifi network
internet signal modem router
A process that has an initial value, a process, and a test condition that can potentially return the program to the initial value is called a ___ .
loop
select the characteristics of fiber optic lines
made of 1 or thousands of fiber high speed transmission
The final step in the SDLC has two phases, a system audit and an evaluation phase. This final step is referred to as ___ the system.
maintaining
be careful to only open emails from senders you know and trust. __________ may be contained
malware
Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create forms, reports, data dictionaries and other capabilities, it is often referred to as a Database ___ System.
management
When you receive a utility bill, you're actually getting a report that was generated by a database management system. The DBMS subsystem that provides for data maintenance, analysis, and the generation of reports is called the data ___ subsystem.
manipulation
L3 cache
memory located adjacent to the processor
L1 cache
memory located directly on the processor itself
Disk Cache
memory used to increase a hard drive's efficiency
One advantage that the Samsung tablets have over the iPads is that you can add ___ to the Note or Tab.
microSD storage
By upgrading to it's maximum capacity of 16 GB of RAM and 1 TB of storage, the ___ tablet could be an extremely powerful computer!
microsoft surface pro 4
Megahertz is equal to one _____ cycles (or instructions) per second.
million
Because it locates cellular devices, assigns frequencies, transmits signals to the correct sites, the ___ is probably the most important part of any cellular network.
mobile switching station (MSS)
A complex database that organizes and stores information in a cube format and has measure attributes and feature attributes is called a ___ database.
multidimensional
a storage device that uses lasers to read CDs, DVDs, or blu ray discs is referred to as an
optical drive
The BitTorrent protocol is often called ___ file sharing.
peer to peer
Using cells of ionized gas to create images, ___ displays are actually becoming less popular.
plasma
RFID stands for which of the following.
radio frequency identification
In the datasheet view of a relational database (such as Microsoft Access) a row of information is called a ___ .
record
which of the following are internet service options
satellite cable router
since it comes with a full computer operating system, some consider the ______ a laptop computer rather than a tablet computer
surface pro 4
Because Objective-C was difficult to write in, Apple developed ___ , a programming language for writing software for the Mac OS and the iOS.
swift
Connecting your phone to your laptop to transfer photos, videos, or music files is referred to as ___ .
syncing
A collection of related records in a database is referred to as a _____.
table
Which devices use a virtual keyboard?
tablet smartphone
HTML and it's 5th revision (HTML5) allow content to be displayed on ___ .
the world wide web
select the reasons you might add a microSD card to your smartphone
you want to save more music files you want to save more image files
Select the common video file formats.
.mov .avi
Select the common audio file formats.
.mp3 .mp4 .wav
Select the common word processing file extensions.
.odf .docx
Select what's true about database fields
1. A group of related characters in a database 2. Represents a characteristic of someone or something 3. Primary key is a field designation
Select what's true regarding all-in-one computers.
1. All-in-one computers house every component except the keyboard and mouse inside the same case as the monitor. 2. An all-in-one computer is a stationary device with a separate keyboard and mouse.
The system analysis step of the SDLC involves 3 phases. Select these three phases.
1. Data collection - gathering info about needs and existing hardware and software. 2. Analyze data - determine the system requirements. 3. Prepare the system specifications.
There are several ways to create a new folder in Windows. Which of these would work?
1. Right-click any blank area in the Contents pane. Click New and then click Folder. 2. Right-click a folder in the folders list. Click New and then click Folder. 3. On the command bar, click New folder.
The data definition, as described in the data dictionary, tells users how each unit of data is defined in the database. Which of the following elements will be used to describe the data?
1. What field name will the data fall under 2. What data type will be included
Which of the following are output?
1. a YouTube video displayed on a screen 2. an anti-lock brake system applying brakes
Select the methods of using cloud storage.
1. emailing a file to yourself 2. saving a photo on Flickr 3. purchasing online storage space
select the characteristics of a bluray disc
1. holds approx 25 gb of data 2. uses pits and lands to store data
Your college has a database with a Students table. Which of the following could be a primary key in the table?
1. student number 2. social security number
The final step in the system development life cycle is maintaining the system. Select the two phases of this step.
1. system audit 2. evaluation phase
Select the characteristics of a projector.
1. usually requires a darkened environment 2. allows large audiences to view digital output 3. usually used with a screen
How can you attach a mouse or other pointing device to your computer?
1. with a Bluetooth connection 2. with a wire through a USB port 3. with a WiFi connection
You can change your Firefox settings to allow you to
1.approve cookie storage requests. 2.deny cookie storage requests. 3.delete stored cookies automatically when you start Firefox.
SaaS (testing)
A programming environment used to develop, test, and disseminate web apps via the Internet.
A set of programs that allow data to be exchanged on a website without changing the website's display is ___ .
AJAX
business managers, copyright holders, and network administrators publish ________ so that users understand what is expected and permissible when they use the network computer equipment and/or software
AOPS
IaaS (business)
An organization uses servers in the cloud instead of buying and maintaining storage servers for their day-to-day business operations.
The 3rd generation programming language that most students learned when most computers used MS DOS was ___ . It remains a safe programming language for using 3rd party code and provides a coding standard that integrates easily with other programming languages.
BASIC
The coding step of the PDLC might use which of the following languages?
C++
which optical drive stores approx 700 mb of data
CD
If you have 2 folders open on your desktop and you want to copy a file from one folder to the other, hold down ___ and drag the file.
CTRL
One way to copy a file to a new location is to click on the file and press CTRL + C, then move your cursor to the new site and press ___ .
CTRL + V
Which of these programs make data more readable to programmers by parsing XML files?
JSON
A program that makes creating websites and webpages much faster is ___ .
Javascript
1GL
Machine language - represented by a series of 1s and 0s.
Broadband is measured in _____ .
Mbps
When you make an online purchase and enter your shipping or billing information, you're actually filling out a form that was generated by a database management system. The DBMS subsystem that allows for form creation is the ___ generation subsystem.
application
AJAX stands for ___ JavaScript and XML.
asynchronous
select the video compression formats
avi mp4 quicktime
The volume of data that can be carried on an Internet transmission media in an amount of time is called _____.
bandwidth
the capacity of a particular transmission medium is called its ___________
bandwidth
The final steps in the PDLC process include testing and documenting the software. When testing is conducted by potential customers of the software, it's referred to as a(n) ___ test.
beta
server banks have capacities measured in _____
betabytes
If it can be answered as either yes or no, or true or false, the question is called ___ .
binary
Once so commonly used that people even called it the "Crackberry", the ___ popularity dropped significantly in the U.S. after 2007.
blackberry
intrusion detections systems (IDS) are several techniques to protect networks. One is called "halt" which stops the hacker from progressing into the network. Another is called a __________ which closes the access point used by the hacker.
block
This technology provides short-distance wireless communication between electronic devices using extremely low power radio signals.
bluetooth
The two major factors that impact processor speed are clock speed and _____
bus width
In addition to the RAM, modern processors temporarily keep frequently accessed data in a _____.
cache
the first commercially available computer with a graphical user interface was NeXT's ___________
cube
Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.
cyberbullying
The DBMS subsystem that allows for data recovery, support, and maintaining and securing the database is called the ___ subsystem.
data administration
What element of a database field specifies the data in a field such as text, numeric, or date/time?
data type
what element of a database field specifies the data in a field such as text, numeric, or data/time
data type
Amazon.com allows you to search for thousands and thousands of items using images and information that are organized logically. This much storage and management requires a complex ___ .
database
The third step of the SDLC has 3 phases, specifically, developing several system proposals, selecting the most feasible proposal, and reporting on the selected system to be developed. This step is called the system ___ step.
design
When you ___ a file Windows should automatically open it. If it can't Windows will prompt you to select the correct app to open the file.
double click
routers than can send internet signals over 2 distinct frequencies are called _______ routers
dual band
which transmission has the lightest bandwidth
fiber optic
Defining the problem is the ___ step in the Program Development Life Cycle.
first
in the body of a professionally formatted business email, where should a request be placed?
first sentence of the body in email
A graphic representation of a process is called a ___ .
flowchart
In order to keep your files organized, it's a good idea to create ___ and place your files in them.
folders
when you need to link 2 tables in a database that don't have a field in common, one solution is to create a ________ in one table that links to the primary key in another table
foreign key
To control how information is entered into a database, programmers and database administrators create ___ to help ensure data integrity.
forms
which of these devices are manufactured by samsung?
galaxy note
The level of complexity of the programming language, or the degree from which it is separated from machine language itself, is called the ___ of the programming language.
generation
The visual image output that a computer creates is known as ____ .
graphics
A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.
hacker
the act of hacking or breaking into a computer system for a politically or socially motivated purpose is called ______
hacktivism
Databases are built by starting with single characters of data, organizing the data into fields, organizing the related fields into records, the records then make up a table. This organization is referred to as a data ___ .
hierarchy
The first step in the SDLC involves defining the problems that the IT system should address, examining various alternatives, and reporting the findings. This is referred to as the ___ step.
investigation
Once the algorithm or plan has been created, the next step in the PDLC is to write the coding for the program. This highly structured process may be completed using which languages?
java C++ english
Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of
keystrokes passwords confidential info
Another term for a programming code is a programming ___ .
language
Instructions (software) that allow a computer (hardware) to be used are written using specific symbols, letters and numbers known as a programming ___ or code.
language
select whats true about packet sniffers
legit sniffers are used for routine examinations and problem detection unauthorized sniffers are used to steal info
The process used to develop and maintain an IT system is referred to as the SDLC. SDLC stands for the System Development ___ Cycle.
life
The DBMS engine provides an interface for the end user of the database, Mis interface is called the ________ view
logical
The DBMS engine provides an interface for the end user of the database. This interface is called the ___ view.
logical
select whats true about trojan malware
often found attached to free downloads and apps often used to find passwords, destroy data, and to bypass firewalls
parallel
old and new systems run side-by-side for a while
Changing the appearance of your can make it easier to keep your information organized. To change your folder's appearance, first click on the folder, and then go to the command bar and click ___ .
organize
Paul Baran developed the technology called _____ switching that made the internet possible and reliable
packet
A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .
pharming
A request for an electronic "echo" or response from another computer or server is called a ____.
ping
a request for an electronic echo or response from another computer or server is called a _______
ping
Written in natural language, but often including programming shorthand to assist in writing the program itself, ___ is the term that describes an intermediate step in creating an algorithm from a flowchart.
pseudocode
lossy
reduces space required by reducing redundancy within files
lossless
reduces space required by removing less valuable data
The type of database that uses common fields to create links between tables is called a ___ database.
relational
to display or distribute info from a database, programmers or database admins create _________
reports
the device that connects 2 networks is a ______
router
Because they're both Apple products, the browser that works smoothest with Macintosh OS X is ___ .
safari
You're tired of losing documents so you've decided to save your research paper to your desktop where you know you'll be able to locate it quickly. To save it to the desktop, you first click the File tab to open the file menu. Next you select ___ .
save as
The diagonal measure of the visible display is known as _____ .
screen size
To look for a file or folder in Windows 10, just type the file name in the __ box.
search
The two major concerns regarding cloud storage are reliability and ___ .
security
Pseudocode is written in natural language, but often including programming ___ to assist in writing the program itself. Pseudocode is the term that describes an intermediate step in creating an algorithm from a flowchart.
shorthand
direct
shuts down the old system and starts the new system
amateur computer hackers w/ little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called ________
skript kiddies
A combination input and output device that allows users to interact with large computer displays that is sometimes found in classrooms is called an interactive whiteboard or a ___.
smartboard
Specialized hardware or software that capture packets transmitted over a network are called packet _____.
sniffers
Which of the following are online nuisances?
spam spyware spoofing
pilot
starts in one area of the organization and then is deployed to the rest of the organization
the component of a computer that allows data to be retained after power is turned off is referred to as
storage
select whats true about object oriented databases
store instructions for how to compute data as well as the data to be processed equipped to handle unstructured data such as MP4 files use object query languages to construct queries that extract data from the database
what group determines the standards for world wide web
the world wide web consortium (W3C)
The most common printers for printing receipts are ___ printers.
thermal
A programming design that breaks down a problem into a series of tasks is called ___ programming.
top down
match the business info systems (IT) activity with the appropriate management level
top level management - business executives and presidents(use it to monitor overall business performance) middle managers - use is for record keeping and reporting purposes first level managers(supervisors, floor managers) - use is for scheduling daily and weekly
Select the smartphone input device.
touchscreen or keyboard
one of the largest data requirements of the future will be
tracking patient's genomes
Often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a _____.
trojan horse
By default Windows hides file extensions for known file types but you can unhide them if you wish.
true
whats true about passwords
use combo of letters, symbols, and numbers; the more characters you use, the more secure your password will be regularly check your accounts to ensure they haven't been tampered with
common types of malware are
viruses worms trojan horses
Select the functions of a Digital Signal Processor
1. analyzes signals received from the analog-digital converter to enhance audio quality 2. reduces unwanted noise 3. moderates call volume
Select the statements that are true regarding IP addresses.
1. assigned to your home network by your ISP 2. means by which your network is identified by other servers and computers on the Internet 3. ISPs often have blocks of IP addresses that they assign as demanded
Select the characteristics of a modem.
1. converts analog signals into digital signals 2. converts digital signals into analog signals 3. usually provided by the ISP
Select the statements that are true regarding Fiber Optic Internet service.
1. fastest home network option when available 2. not available in all areas 3. signal is carried by light waves so it's less subject to electromagnetic interference
Select the statements that are true regarding Cellular Internet service.
1. uses cell phone radio waves to transmit and receive Internet signals 2. Many providers offer data packages that may place limits on uploading and downloading. 3. Many smartphones can send and receive WiFi signal, allowing them to become hotspots.
Select the statements that are true regarding cable Internet service.
1. uses the same coaxial cable that brings the cable television signal 2. usually has more bandwidth than DSL lines 3. Internet service can often be bundled with television service
According to US-CERT if you receive a phishing message you should contact them using which of the following methods.
1.In Outlook Express, you can create a new message and drag and drop the phishing email into the new message. Address the message to [email protected] and send it. 2.In Outlook Express you can also open the email message* and select File > Properties > Details. The email headers will appear. You can copy these as you normally copy text and include it in a new message to [email protected]. 3.If you cannot forward the phishing message, at a minimum, send the URL of the phishing website to US-CERT.
Most touchpads use _____ to sense when a finger has moved across the pad.
capacitance
Clockspeed, also referred to as _________, is the speed at which the processor performs the operations required to run a digital device and instructions executed by the digital device.
clock rate
The malicious use of computer code to modify the normal operations of a computer or network is called a
cyberattack
Because he wanted to be able to sort gifts according to continent and time zone, in 1984 Santa switched from using long lists to using ___ .
databases
Screensize is measured by the ___ across the monitor.
diagonal
Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a
firewall
Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.
quarantine
To search a database for information, create a ___ .
query
Which colors make up a typical monitor's pixels?
red green blue
To display or distribute information from a database, programmers or database administrators create ___ .
reports
The number of pixels in a display is called the display's ___ .
resolution
Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP networks have firewalls where they connect to the Internet.
router
3D mapping, feature charting, and skin texture are some of the methods facial recognition software uses to identify individuals. T/F
true
Some cell phone carriers promising "unlimited data" will actually limit your high-speed, 4G LTE data to a couple of gigabytes per month. T/F
true
You must individually adjust cookie settings in every browser you use. T/F
true
Match the extension with the type of document.
webpage - .html spreadsheet - .accdb database - .xlsx presentation - .pez
Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.
white hat hackers
After the code has been written there are nearly always mistakes. The 4th step in the PDLC involves finding and correcting these errors in a process called ___ .
debugging
If you have 2 folders open on your desktop and you want to move a file from one folder to the other, simply ___ the file.
drag
After the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a flowchart, and is in written in an ordinary language, such as ___ .
english
The machine cycle consists of which four steps?
fetch, decode, execute, and store
Which transmission media has the largest bandwidth?
fiber optic
In a database a _____ is a group of related characters in a database table that represents a characteristic of someone or something.
field
A URL identifies a particular __ address on the World Wide Web.
file
You created a flyer and saved it in your Documents folder. To find this file you could open Cortana (in Windows 10) and type the flyer's name in the search window, or you could click on the ___ icon (all Windows versions, on your toolbar) and access the Documents folder from there.
file explorer