CGS 2060 Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Business owners, copyright holders, and network administrators publish ___ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.

AUPs

Select the characteristics of fiber optic lines.

made of 1 or thousands of fibers high-speed transmission

The word modem stands for ____.

modulator-demodulator

Fiber optic cable is _____ expensive than coaxial cable to install.

more

The BitTorrent protocol is often called ___ file sharing.

peer-to-peer

A request for an electronic "echo" or response from another computer or server is called a ____.

ping

Software that can be added to a browser to increase its functionality are called ___ .

plug-ins

Select the statements that are true regarding a Wi-Fi's SSID.

An SSID is the Wi-Fi's name. Most routers transmit the SSID every few seconds so roaming devices can find the signal. In home networks, after all legitimate devices have connected to the SSID once, transmitting the SSID is unnecessary.

Sage was developed during the _____ war.

Cold

What was the major question that ARPAnet wanted to solve?

Could a network be built that would continue to work even if multiple parts collapsed?

The Internet service that tends to provide the most consistent speeds is _____.

DSL

SAGE was developed by the US Department of ___ .

Defense

The protocol used for transmitting large files from one server to another over the Internet is known as the ___ Protocol (FTP).

File Transfer

A protocol commonly used to transfer large files from one server to another on the Internet is the ___ .

File Transfer Protocol

Letting computer users drag images and documents across their computers' monitors made the ___ User Interface very popular.

Graphical

Broadband is measured in _____ .

Mbps

An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ___ signal.

broadband

Select the characteristics of a router.

connects networks provides hardware firewall protection usually incorporates a switch

A ___ name identifies a server site on the Internet.

domain

Select the statements that are true regarding DSL Internet service.

uses telephone wires as transmission wires Internet signals tend to be very consistent

Select the statements that are true regarding cable Internet service.

uses the same coaxial cable that brings the cable television signal usually has more bandwidth than DSL lines Internet service can often be bundled with television service

Select the characteristics of a modem.

usually provided by the ISP converts analog signals into digital signals converts digital signals into analog signals

Select the domain name.

www.cnet.com

Which of the following file extensions is commonly used for term papers and other word processing tasks?

.docx

Which of these extensions, if you open it, will probably install software onto your computer? Be careful!

.exe

Most new cell phones today come with approximately ___ of RAM.

500 MB - 2 GB

A tablet is a highly-mobile computer with a mobile operating system and a touchscreen rather than a keyboard/touchpad. To differentiate a tablet from a smartphone, a tablet is generally understood to have a screensize of at least ___ inches.

7

CDs provide approximately ___ of data storage space.

700 MB

Select what's true about database fields

A group of related characters in a database Represents a characteristic of someone or something Primary key is a field designation

Which of these operating systems is based on Linux and used on smartphones

Android

When you make an online purchase and enter your shipping or billing information, you're actually filling out a form that was generated by a database management system. The DBMS subsystem that allows for form creation is the ___ generation subsystem.

Application

Select the cell phone manufacturers.

Blackberry Xiaomi Huawei

If you have 2 folders open on your desktop and you want to copy a file from one folder to the other, hold down ___ and drag the file.

CTRL

Though it could theoretically hold terabytes of data for thousands of years in a microscopic space, ___ storage, using genetic material, is a distant storage option.

DNA

Which of the following are considered storage media?

DVDs Blu-ray discs

What element of a database field specifies the data in a field such as text, numeric, or date/time?

Data Type

An integral part of a databases management system (DBMS) is the Data Definition subsection. This subsection uses a data schema, also called a data ___ .

Dictionary

To control how information is entered into a database, programmers and database administrators create ___ to help ensure data integrity.

Forms

Which of these devices are manufactured by Samsung?

Galaxy Note

Select the email services.

Gmail Outlook iCloud

The 2 most common audio file formats are WAV and ___ .

MP4

Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create forms, reports, data dictionaries and other capabilities, it is often referred to as a Database ___ System.

Management

To search a database for information, create a ___ .

Query

The type of database that uses common fields to create links between tables is called a ___ database.

Relational

To display or distribute information from a database, programmers or database administrators create ___ .

Reports

Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?

SCMS

Because they have no mechanically moving parts, ___ provide extremely fast, efficient storage.

SSDs

To look for a file or folder in Windows 10, just type the file name in the __ box.

Search

Examples of management information systems (MIS) include _____ .

TPS DSS ESS

Select the audio file compression formats.

WAV MP4

The data definition, as described in the data dictionary, tells users how each unit of data is defined in the database. Which of the following elements will be used to describe the data?

What field name will the data fall under What data type will be included

Though not yet commercially successful, the ___ was developed by one of the world's largest software manufacturers.

Windows Phone

Select the reasons why you might want to add a microSD card to your smartphone.

You want to save more music files. You want to save more image files (photos).

Which would be used to store a single bit of data?

a transistor a hole in a punch card

What 3 items are needed to install a home WiFi network?

an Internet signal a modem a router

In order to change sound waves into digital signals, smartphones contain ___ - digital converter.

analog

Select the functions of a Digital Signal Processor

analyzes signals received from the analog-digital converter to enhance audio quality reduces unwanted noise moderates call volume

Cell towers are connected to ___ .

base transceiver stations

The smallest unit of data storage is a ___ .

bit

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___.

corruption

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___ .

data analyst

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ___ .

database administrator (DBA)

The devices inside your phone that convert analog waves (such as sound waves) into digital signals that your phone can process are called ___ .

digital - analog converters

Select the storage devices.

external hard drives USB drives

Software that limits the material that a browser fetches or that a search engine displays are called ___ .

filters

The largest category of apps, both in terms of active downloads and in terms of revenue generated is ___ .

game apps

Select the characteristics of a Blu-ray disc.

holds approximately 25 GB of data uses pits and lands to store data

A refracted laser beam striking a photoreceptor from many different angles allows ___ storage to retain many bits of data in the same location.

holographic

Apple's mobile device with the largest display is the ___ .

iPad Pro

Because of the large infrastructure cost of building antennae and mobile switching stations, as well as leasing the rights to use radio frequencies, only ___ companies can compete nationally as cell phone providers.

large

One advantage that the Samsung tablets have over the iPads is that you can add ___ to the Note or Tab.

microSD storage

Cell phones send and receive extremely weak ___ signals to and from cell towers.

microwave

Select the usual tasks of database administrators (DBAs).

monitors the database's performance develops and maintains the database itself establishes user privileges for the database to help protect the data

Though legal, which of the following would likely be prohibited by a typical business computer-use policy?

online personal shopping

A storage device that uses lasers to read CDs, DVDs, or Blu-ray discs is referred to as a(n) ___ .

optical drive

Server banks have capacities measured in ___ .

petabytes

When referring to digital storage, RAID stands for ___ .

redundant array of independent discs

Select the characteristics of a OneDrive account

requires a Microsoft Email account provides free cloud storage can serve as extra storage space

Select the characteristics of computer storage.

retains data when power is turned off sometimes referred to as secondary storage

Sometimes, particularly when travelling, you may find yourself in an area where your home network has no cell coverage, but another network does have service. Using a different network is referred to as ___ .

roaming

The component of a computer that allows data to be retained after power is turned off is referred to as _______.

storage

What are some commonly used names for USB drives?

thumb drives flash drives

Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?

top level managers

Some apps that use a surprising amount of data are those that include embedded ___ .

video

A form of Email fraud where criminals change the account where money is being transferred is called a ___ scam.

wire-wire

A database that stores data in different physical locations and that users access though client/server networks is called a ___ database.

Distributed

Business management software that encompasses nearly all business activities in a corporation is called ___ software.

ERP

Amazon offers 2 lines of tablet computers, the Amazon Fire and the Amazon Fire ___ .

HDX

Databases are built by starting with single characters of data, organizing the data into fields, organizing the related fields into records, the records then make up a table. This organization is referred to as a data ___ .

Hierarchy

The DBMS engine provides an interface for the end user of the database. This interface is called the ___ view.

Logical

When you receive a utility bill, you're actually getting a report that was generated by a database management system. The DBMS subsystem that provides for data maintenance, analysis, and the generation of reports is called the data ___ subsystem.

Manipulation

You own a pet care center. what fields might you enter when you create a table for dogs that you care for?

Owner's last name Pet's name Owner's address

A collection of related records in a database is referred to as a _____.

Table

When reporting a computer ethics violation of a co-worker to your employer, it's important to ______.

be brief and direct state only what you witnessed

Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a(n) ___, which closes the access point used by the hacker.

block

Select the common Internet transmission media.

coaxial cable telephone wire cell phone radio waves

Select the characteristics of a Base Transceiver Station

connected to a cell tower broadcasts weak microwave signals to create "cells" of mobile coverage sends phone signals to the cellular provider's Mobile Switching Station (MSS)

Match the operating system with it's characteristic: iOS 9 series Marshmallow Lollipop

iOS 9 series- Used on iPhones Marshmallow- Android OS released in 2015 Lollipop- Android OS released in 2014

In order to sync your iPhone to your MacBook you must first open the ___ app.

iTunes

In the body of a professionally formatted business email, where should a request be placed?

in the first sentence of the body of your email

Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should

tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.

Because of the popularity and bandwidth demands of video streaming, ___ data plans are not as common as they were in the past.

unlimited

Select the characteristics of a traditional hard drive.

uses magnetic charges to store data has a read/write head to detect magnetic charges has physically moving platters

Select the characteristics of a traditional hard drive.

uses magnetically charged plates to store data commonly found in desktop computers

Because it locates cellular devices, assigns frequencies, transmits signals to the correct sites, the ___ is probably the most important part of any cellular network.

Mobile Switching Station (MSS)

Which of these should business owners do to help protect their data.

Establish strong firewall protection for their business's network. Ensure antivirus software is installed and up-to-date. Create strong password protections and protocols.

When you need to link 2 tables in a database that don't have a field in common, one solution is to create a _____ in one table that links to the primary key in the other table.

Foreign key

Select the usual roles of information systems (IS) technicians.

Installing IS hardware and software. Maintaining IS hardware and software. Repairing and replacing IS hardware and software.

Adam was in the fifth grade when he was adopted by the Smith's. Because his school used a centralized database, all of his teachers had his correct name on their grade reports. This is an example of how a centralized database can help improve data ___ .

Integrity

A complex database that organizes and stores information in a cube format and has measure attributes and feature attributes is called a ___ database.

Multidimensional

There are several ways to rename a folder in Windows. Which of these would work?

On the command bar, click Organize and then click Rename. Click the folder icon and press F2 to activate the edit mode. Right-click a folder and click Rename.

Select what's true about object-oriented databases.

Store instructions for how to compute the data as well as the data to be processed Equipped to handle unstructured data such as MP4 files, video, images, and extremely large files Use Object Query Language to construct queries that extract data from the database

Select the usual tasks of information systems (IS) program managers.

Supervising IS technicians. Working with developers and senior management to procure and implement IS processes. Developing training plans and policies for IS.

The mobile switching station can connect calls to mobile switching stations belonging to other cellular networks.

TRUE

The DBMS subsystem that allows for data recovery, support, and maintaining and securing the database is called the ___ subsystem.

Data Administration

Because he wanted to be able to sort gifts according to continent and time zone, in 1984 Santa switched from using long lists to using ___ .

Databases

What group determines the standards for the World Wide Web?

The World Wide Web Consortium (W3C)

The World Wide Web was created through a collaboration led by ___ .

Tim Berners-Lee

The original wireless network privacy and protection standard for Wi-Fi was known as ___ .

WEP

The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as ___ .

WPA

The standard for wireless network privacy and protection is known as ___ .

WPA2

The volume of data that can be carried on an Internet transmission media in an amount of time is called _____.

bandwidth


Ensembles d'études connexes

Mobility, Clotting, and Transfusion EAQ

View Set

Financial Accounting Cornett Exam 5

View Set

College Biology Chapter 20 Smartbook

View Set

Ch. 31 Open-Economy Macroeconomics: Basic Concepts

View Set