CGS 2060 Final
Business owners, copyright holders, and network administrators publish ___ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.
AUPs
Select the characteristics of fiber optic lines.
made of 1 or thousands of fibers high-speed transmission
The word modem stands for ____.
modulator-demodulator
Fiber optic cable is _____ expensive than coaxial cable to install.
more
The BitTorrent protocol is often called ___ file sharing.
peer-to-peer
A request for an electronic "echo" or response from another computer or server is called a ____.
ping
Software that can be added to a browser to increase its functionality are called ___ .
plug-ins
Select the statements that are true regarding a Wi-Fi's SSID.
An SSID is the Wi-Fi's name. Most routers transmit the SSID every few seconds so roaming devices can find the signal. In home networks, after all legitimate devices have connected to the SSID once, transmitting the SSID is unnecessary.
Sage was developed during the _____ war.
Cold
What was the major question that ARPAnet wanted to solve?
Could a network be built that would continue to work even if multiple parts collapsed?
The Internet service that tends to provide the most consistent speeds is _____.
DSL
SAGE was developed by the US Department of ___ .
Defense
The protocol used for transmitting large files from one server to another over the Internet is known as the ___ Protocol (FTP).
File Transfer
A protocol commonly used to transfer large files from one server to another on the Internet is the ___ .
File Transfer Protocol
Letting computer users drag images and documents across their computers' monitors made the ___ User Interface very popular.
Graphical
Broadband is measured in _____ .
Mbps
An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ___ signal.
broadband
Select the characteristics of a router.
connects networks provides hardware firewall protection usually incorporates a switch
A ___ name identifies a server site on the Internet.
domain
Select the statements that are true regarding DSL Internet service.
uses telephone wires as transmission wires Internet signals tend to be very consistent
Select the statements that are true regarding cable Internet service.
uses the same coaxial cable that brings the cable television signal usually has more bandwidth than DSL lines Internet service can often be bundled with television service
Select the characteristics of a modem.
usually provided by the ISP converts analog signals into digital signals converts digital signals into analog signals
Select the domain name.
www.cnet.com
Which of the following file extensions is commonly used for term papers and other word processing tasks?
.docx
Which of these extensions, if you open it, will probably install software onto your computer? Be careful!
.exe
Most new cell phones today come with approximately ___ of RAM.
500 MB - 2 GB
A tablet is a highly-mobile computer with a mobile operating system and a touchscreen rather than a keyboard/touchpad. To differentiate a tablet from a smartphone, a tablet is generally understood to have a screensize of at least ___ inches.
7
CDs provide approximately ___ of data storage space.
700 MB
Select what's true about database fields
A group of related characters in a database Represents a characteristic of someone or something Primary key is a field designation
Which of these operating systems is based on Linux and used on smartphones
Android
When you make an online purchase and enter your shipping or billing information, you're actually filling out a form that was generated by a database management system. The DBMS subsystem that allows for form creation is the ___ generation subsystem.
Application
Select the cell phone manufacturers.
Blackberry Xiaomi Huawei
If you have 2 folders open on your desktop and you want to copy a file from one folder to the other, hold down ___ and drag the file.
CTRL
Though it could theoretically hold terabytes of data for thousands of years in a microscopic space, ___ storage, using genetic material, is a distant storage option.
DNA
Which of the following are considered storage media?
DVDs Blu-ray discs
What element of a database field specifies the data in a field such as text, numeric, or date/time?
Data Type
An integral part of a databases management system (DBMS) is the Data Definition subsection. This subsection uses a data schema, also called a data ___ .
Dictionary
To control how information is entered into a database, programmers and database administrators create ___ to help ensure data integrity.
Forms
Which of these devices are manufactured by Samsung?
Galaxy Note
Select the email services.
Gmail Outlook iCloud
The 2 most common audio file formats are WAV and ___ .
MP4
Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create forms, reports, data dictionaries and other capabilities, it is often referred to as a Database ___ System.
Management
To search a database for information, create a ___ .
Query
The type of database that uses common fields to create links between tables is called a ___ database.
Relational
To display or distribute information from a database, programmers or database administrators create ___ .
Reports
Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?
SCMS
Because they have no mechanically moving parts, ___ provide extremely fast, efficient storage.
SSDs
To look for a file or folder in Windows 10, just type the file name in the __ box.
Search
Examples of management information systems (MIS) include _____ .
TPS DSS ESS
Select the audio file compression formats.
WAV MP4
The data definition, as described in the data dictionary, tells users how each unit of data is defined in the database. Which of the following elements will be used to describe the data?
What field name will the data fall under What data type will be included
Though not yet commercially successful, the ___ was developed by one of the world's largest software manufacturers.
Windows Phone
Select the reasons why you might want to add a microSD card to your smartphone.
You want to save more music files. You want to save more image files (photos).
Which would be used to store a single bit of data?
a transistor a hole in a punch card
What 3 items are needed to install a home WiFi network?
an Internet signal a modem a router
In order to change sound waves into digital signals, smartphones contain ___ - digital converter.
analog
Select the functions of a Digital Signal Processor
analyzes signals received from the analog-digital converter to enhance audio quality reduces unwanted noise moderates call volume
Cell towers are connected to ___ .
base transceiver stations
The smallest unit of data storage is a ___ .
bit
Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___.
corruption
Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___ .
data analyst
Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ___ .
database administrator (DBA)
The devices inside your phone that convert analog waves (such as sound waves) into digital signals that your phone can process are called ___ .
digital - analog converters
Select the storage devices.
external hard drives USB drives
Software that limits the material that a browser fetches or that a search engine displays are called ___ .
filters
The largest category of apps, both in terms of active downloads and in terms of revenue generated is ___ .
game apps
Select the characteristics of a Blu-ray disc.
holds approximately 25 GB of data uses pits and lands to store data
A refracted laser beam striking a photoreceptor from many different angles allows ___ storage to retain many bits of data in the same location.
holographic
Apple's mobile device with the largest display is the ___ .
iPad Pro
Because of the large infrastructure cost of building antennae and mobile switching stations, as well as leasing the rights to use radio frequencies, only ___ companies can compete nationally as cell phone providers.
large
One advantage that the Samsung tablets have over the iPads is that you can add ___ to the Note or Tab.
microSD storage
Cell phones send and receive extremely weak ___ signals to and from cell towers.
microwave
Select the usual tasks of database administrators (DBAs).
monitors the database's performance develops and maintains the database itself establishes user privileges for the database to help protect the data
Though legal, which of the following would likely be prohibited by a typical business computer-use policy?
online personal shopping
A storage device that uses lasers to read CDs, DVDs, or Blu-ray discs is referred to as a(n) ___ .
optical drive
Server banks have capacities measured in ___ .
petabytes
When referring to digital storage, RAID stands for ___ .
redundant array of independent discs
Select the characteristics of a OneDrive account
requires a Microsoft Email account provides free cloud storage can serve as extra storage space
Select the characteristics of computer storage.
retains data when power is turned off sometimes referred to as secondary storage
Sometimes, particularly when travelling, you may find yourself in an area where your home network has no cell coverage, but another network does have service. Using a different network is referred to as ___ .
roaming
The component of a computer that allows data to be retained after power is turned off is referred to as _______.
storage
What are some commonly used names for USB drives?
thumb drives flash drives
Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?
top level managers
Some apps that use a surprising amount of data are those that include embedded ___ .
video
A form of Email fraud where criminals change the account where money is being transferred is called a ___ scam.
wire-wire
A database that stores data in different physical locations and that users access though client/server networks is called a ___ database.
Distributed
Business management software that encompasses nearly all business activities in a corporation is called ___ software.
ERP
Amazon offers 2 lines of tablet computers, the Amazon Fire and the Amazon Fire ___ .
HDX
Databases are built by starting with single characters of data, organizing the data into fields, organizing the related fields into records, the records then make up a table. This organization is referred to as a data ___ .
Hierarchy
The DBMS engine provides an interface for the end user of the database. This interface is called the ___ view.
Logical
When you receive a utility bill, you're actually getting a report that was generated by a database management system. The DBMS subsystem that provides for data maintenance, analysis, and the generation of reports is called the data ___ subsystem.
Manipulation
You own a pet care center. what fields might you enter when you create a table for dogs that you care for?
Owner's last name Pet's name Owner's address
A collection of related records in a database is referred to as a _____.
Table
When reporting a computer ethics violation of a co-worker to your employer, it's important to ______.
be brief and direct state only what you witnessed
Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a(n) ___, which closes the access point used by the hacker.
block
Select the common Internet transmission media.
coaxial cable telephone wire cell phone radio waves
Select the characteristics of a Base Transceiver Station
connected to a cell tower broadcasts weak microwave signals to create "cells" of mobile coverage sends phone signals to the cellular provider's Mobile Switching Station (MSS)
Match the operating system with it's characteristic: iOS 9 series Marshmallow Lollipop
iOS 9 series- Used on iPhones Marshmallow- Android OS released in 2015 Lollipop- Android OS released in 2014
In order to sync your iPhone to your MacBook you must first open the ___ app.
iTunes
In the body of a professionally formatted business email, where should a request be placed?
in the first sentence of the body of your email
Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should
tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.
Because of the popularity and bandwidth demands of video streaming, ___ data plans are not as common as they were in the past.
unlimited
Select the characteristics of a traditional hard drive.
uses magnetic charges to store data has a read/write head to detect magnetic charges has physically moving platters
Select the characteristics of a traditional hard drive.
uses magnetically charged plates to store data commonly found in desktop computers
Because it locates cellular devices, assigns frequencies, transmits signals to the correct sites, the ___ is probably the most important part of any cellular network.
Mobile Switching Station (MSS)
Which of these should business owners do to help protect their data.
Establish strong firewall protection for their business's network. Ensure antivirus software is installed and up-to-date. Create strong password protections and protocols.
When you need to link 2 tables in a database that don't have a field in common, one solution is to create a _____ in one table that links to the primary key in the other table.
Foreign key
Select the usual roles of information systems (IS) technicians.
Installing IS hardware and software. Maintaining IS hardware and software. Repairing and replacing IS hardware and software.
Adam was in the fifth grade when he was adopted by the Smith's. Because his school used a centralized database, all of his teachers had his correct name on their grade reports. This is an example of how a centralized database can help improve data ___ .
Integrity
A complex database that organizes and stores information in a cube format and has measure attributes and feature attributes is called a ___ database.
Multidimensional
There are several ways to rename a folder in Windows. Which of these would work?
On the command bar, click Organize and then click Rename. Click the folder icon and press F2 to activate the edit mode. Right-click a folder and click Rename.
Select what's true about object-oriented databases.
Store instructions for how to compute the data as well as the data to be processed Equipped to handle unstructured data such as MP4 files, video, images, and extremely large files Use Object Query Language to construct queries that extract data from the database
Select the usual tasks of information systems (IS) program managers.
Supervising IS technicians. Working with developers and senior management to procure and implement IS processes. Developing training plans and policies for IS.
The mobile switching station can connect calls to mobile switching stations belonging to other cellular networks.
TRUE
The DBMS subsystem that allows for data recovery, support, and maintaining and securing the database is called the ___ subsystem.
Data Administration
Because he wanted to be able to sort gifts according to continent and time zone, in 1984 Santa switched from using long lists to using ___ .
Databases
What group determines the standards for the World Wide Web?
The World Wide Web Consortium (W3C)
The World Wide Web was created through a collaboration led by ___ .
Tim Berners-Lee
The original wireless network privacy and protection standard for Wi-Fi was known as ___ .
WEP
The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as ___ .
WPA
The standard for wireless network privacy and protection is known as ___ .
WPA2
The volume of data that can be carried on an Internet transmission media in an amount of time is called _____.
bandwidth