CGS 2060 Midterm

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

If your debit card has been compromised U.S. Federal law says you are only liable for a maximum of _____ in fraudulent charges if you tell your bank within two business days of learning about them

$50

If your debit card has been compromised and you wait more than two days, but fewer than two months after you learn about the loss, you can be liable for up to _____.

$500

Select the technologies used by facial recognition software.

- 3D mapping - feature charting - skin texture analysis - capacitance analysis

Select the characteristics of a plotter.

- prints large graphic displays - mechanically moves a pen over a large sheet of paper - uses inexpensive toner rather than ink - paper turns black when heated

How can you attach a mouse or other pointing device to your computer?

- with a Bluetooth connection - with a wire through a USB port

Select what's true regarding uninstalling software

-Be cautious when uninstalling software from the computer manufacturer -Be cautious when uninstalling software from the OS manufacturer. -Uninstalling system software is not recommended.

Which of the following are considered storage media?

-DVDs -Blu-ray discs -external hard drives

Identify the characteristics of a desktop computer.

-Desktops are useful for those who need a computer they can walk around with. -Desktops are often used in offices since they don't need to be mobile. -Desktops allow for relatively easy upgrade and expansion.

Select the true statements regarding Instagram.

-Instagram is a photo sharing app that is available for download to a variety of digital devices.

Select the video file compression formats.

-MP4 -MP3

Select the advantages of using cloud storage.

-Redundancy - data is stored on multiple servers. -Availability - data can be retrieved by any Internet-connected device.

Select the characteristics of RFID.

-Select the characteristics of RFID. -RFID can be used to identify a variety of objects including objects, animals, and people implanted with an active RFID chip -High-frequency RFID can transmit signals further than 1500 feet. RFID doesn't require line of sight scanning.

Which of the following should you consider when buying a new computer?

-What is the cost? -Does it have HDMI ports? -Does it have an SD card slot? -Does it come with Windows XP?

Which of the following statements about Instagram are true?

-Your Profile section on Instagram must be accurate. -It is important to adjust your privacy settings so you can determine who follows you. -If you don't want to be tracked turn off geo-tagging in the settings under Location Services.

Which would be used to store a single bit of data?

-a transistor -a hole in a punch card -a program

When reporting a computer ethics violation of a co-worker to your employer, it's important to ______.

-be brief and direct -state only what you witnessed

Select appropriate LinkedIn contacts.

-business contacts -professional peers

Select the characteristics of a Blu-ray disc.

-holds approximately 25 GB of data -uses pits and lands to store data -a read/write head senses the magnetic charges

Select the characteristics of a CD

-holds approximately 700 MB of data -uses pits and lands to store data

Select the characteristics of a CD.

-holds approximately 700 MB of data -uses pits and lands to store data -a read/write head senses the magnetic charges

A digital identity is comprised of a variety of digital attributes including

-online search activities -the spreadsheet software you're using.

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer use standards. This includes which of the following?

-periodically reviewing computer-use policies -enforcing standards by creating firewalls, monitoring protocols, and filters -instructing employees on standards

Select the reasons to compress a file.

-reduce storage space requirements -reduce bandwidth needed to transmit a file

Select the characteristics of computer storage.

-retains data when power is turned off -sometimes referred to as secondary storage

Select the factors that should be considered when purchasing external speakers for a digital device.

-sound quality -portability -price

Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should

-tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network. -tell your employer that visiting porn sites while using computer can hurt the company's business if potential customers see this activity. -tell you boss that others have told you that this co-worker frequently visits porn sites at work.

Important considerations when purchasing a new tablet computer include

-the amount of RAM it has. -the size of its screen. -the amount of storage it has.

Select the statements that refer to the term "dot pitch".

-the closer the spacing (the smaller the dot pitch) the sharper the image -the diagonal measurement of the visible display

Select the characteristics of a traditional hard drive.

-uses magnetic charges to store data -has a read/write head to detect magnetic charges -has physically moving platters

The text contained in about 4 books uses approximately ___ times more data than a short email.

1,000

1. MIDI 2. HDMI 3. Plug and Play

1. Capable of carrying digital music signals and are common in today's music scene 2. allows for the transmission of high-definition audio and video signals 3. a technology that enables the OS to detect and configure peripherals without downloading software or drivers

1. Input 2. Storage 3. Output

1. Entering text in a word 2. Putting a photo onto a USB drive (thumbdrive). 3. Playing a song from Spotify.

1. CTRL+V 2. CTRL+P 3. CTRL+Z 4. CTRL+S

1. Paste 2. print 3. undo 4. save

1. CTRL+B 2. CTRL+A 3. CTRL+X 4. CTRL+C

1. bold 2. select all 3. cut 4. copy

1. Input 2. Storage device 3. output

1. game controller, speaker 2.projector, external hard drive 3.hard drive, mouse

Snaps on Snapchat can be viewed for up to ___ seconds (depending on what the user chooses) and then disappear.

10

"Full HD" resolution is expressed as:

1920 x 1080

Twitter recommends using no more than ___ hashtags per Tweet.

2

Personal computer CPU clock speeds range between _______ .

2 to 4 gigahertz

Blu-rays provide approximately ___ of storage space.

25 GB

As of 2017, tweets can be a maximum of ___ characters.

280

Sometimes used to create prototype models for casting, ___ printing is also known as additive manufacturing

3D

Most new laptop computers come with how much storage?

4-8

When you buy a new laptop, how much RAM should it come with?

4-8 GB

A typical laptop has a storage capacity of approximately ____ .

500 GB - 1 TB

FireWire connectors were developed for ______ computers.

Apple

Select the popular video teleconferencing applications.

Apple Facetime microsoft skype google+ Hangouts

AJAX stands for ___ JavaScript and XML

Asynchronous

A short-range wireless transmission protocol is known as _____ .

Bluetooth

Most PC games have been written in either ___ or ___ .

C C++

Which optical drive media stores approximately 700 MBs of data?

CD

Printer manufacturers advertise the quality of their products by stating how many ___ they produce.

DPI

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?

DSS

What technology allows for the electronic communication of business oriented transactions and information between people and organizations?

EDI

In the United States the federal _____ covers most consumer oriented electronic transactions.

EFT Act

Designed to display documents on the web, this version of the HTML set of protocols provides a smooth interface between natural language and machine language by wrapping data in "tags" for web display.

Extensible Markup Language

Today's computer keyboard was named after Sir Wesley Reginald Qwerty, inventor of the typewriter.

False

An application that navigates all of the files and folders on your Mac is the _____ .

Finder

All of the following are considered e-commerce transactions except

G2B

A separate processor (computer) in your computer that enhances your video is called the ___ .

Graphic processor (GPU)

A port that allows the transfer of high quality video and audio signals is called a(n) ___ port.

HDMI

The standard port for video and audio input into televisions today is the ______ port.

HDMI

All of the following are true about Instagram excep

Instagram charges a fee to download the app.

Which of these programs make data more readable to programmers by parsing XML files?

JSON

An object-oriented programming language that is popular for writing apps for Android phones and tablets is ___ .

Java

The abbreviation for megahertz is ___ .

MHz

All of the following are common ports that are included with laptop computers except

MIDI Ports

Which of the following might be risky to uninstall from a Windows PC laptop?

Microsoft Works 6-9 Converter

A commonly-used short range wireless technology used for data transfer and electronic payments is called ___ .

NFC

Apple Pay uses _____ for payment transfer.

NFC

Select the 3 main ways of detecting and recording fingerprints.

Optical - takes a photo of the fingerprint.

Printer speed is described using which acronym?

PPM

When you personally share an image on Pinterest it is known as a _____.

Pin

RFID stands for which of the following.

Radio Frequency Identification

Pictures or videos taken and shared on Snapchat are called _____.

Snaps

The titles in the DMCA that directly impact digital copyright issues include all of the following except

Title 5 - Copyright Protection Proviso.

The main governmental organization that oversees Internet privacy is the Federal ___ Commission.

Trade

One type of storage device is a ___ .

USB Drive

Television displays with resolutions of at least 3840 x 2160 pixels are referred to as ___ .

UltraHD

A 3rd generation programming language that allows BASIC to be used with the advantages of a graphical user interface is ___ Basic.

Visual

Select the audio file compression formats.

WAV MP4

Devices which house every component except the keyboard and mouse inside the same case as the monitor are called _____ computers.

all-in-one

A gigabyte equals approximately one _____ bytes.

billion

Represented as either a 0 or 1, a ____ is the smallest unit of data a computer can process.

bit

One character of information, for example, a letter or a number consists of one ___ of storage

byte

In addition to the RAM, modern processors temporarily keep frequently accessed data in a _____.

cache

The technology that allows any text, even handwritten scrawls, to be digitized is known as optical ___ recognition.

character

Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on ____ .

checks

The fact that data on servers is nearly always backed up onto other servers gives ___ storage a major advantage over other data storage methods.

cloud

A digital device that accepts input, processes and stores the input, and provides output is a ____ .

computer

A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the _____.

control panel

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___.

corruption

A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is called _____ Commons.

creative

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___ .

data analyst

One disadvantage of cloud storage is that

data is only available when you're online.

Stealing confidential materials such as copyrighted material, confidential information, or company emails from a network is called ___ . Most often, this crime is committed by employees inside the company rather than outside hackers.

data theft

After the code has been written there are nearly always mistakes. The 4th step in the PDLC involves finding and correcting these errors in a process called ___ .

debugging

How is Screen size messure?

diagonally from a top corner to a bottom corner of a visible display

How is the screensize of a laptop computer measured?

diagonally from left corner to right corner

Transferring a file from the Internet to your digital device is called _____.

downloading

Solid state drives store data using ___ .

electronic circuits

After the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a flowchart, and is in written in an ordinary language, such as ___ .

english

Software theft occurs when someone engages in all of the following except _______.

erasing a program you purchased then sold to a friend

All new laptop computers come with an optical drive installed.

false

In general, game controllers can be interchanged between different types of gaming consoles.

false

After the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a ___ and is written in an ordinary language, such as English.

flowchart

Number of times per second a frame in a video is advanced is the definition of ___ .

frame rate

This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery.

gait analysis

The level of complexity of the programming language, or the degree from which it is separated from machine language itself, is called the ___ of the programming language.

generation

Storage capacity for laptop hard drives is typically described in terabytes or ___ .

gigabytes

To allow hard disk drive platters to spin more smoothly and cooler, some manufacturers seal the platters in ___ instead of air.

helium

What is equal to one cycle per second?

hertz

what is equal to one cycle per second?

hertz

All of the following are true about RFID except

high-frequency RFID can transmit signals further than 1500 feet

Using refracted laser light to store data on a photoreceptive substrate is essentially how ___ storage works. Theoretically this could store gigabytes of data within a cubic millimeter

holographic

What are some commonly used names for USB drives?

humb drives flash drives

In the body of a professionally formatted business email, where should a request be placed?

in the first sentence of the body of your email

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ___ .

information systems (information technology) technician

These facilitate getting data and information into your computer.

input devices

To protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products, there are ___ property laws.

intellectual

A short email uses about one ___ of data.

kilobyte

Which of the following represents the least amount of storage?

kilobyte

Another term for a programming code is a programming ___ .

language

Because a metal platter is physically spinning, hard drives have ___ access times than solid state hard drives

longer

Because a metal platter is physically spinning, hard drives have ___ access times than solid state hard drives.

longer

Most desktop computers use ___ to store data.

magnetic hard drives

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___ .

memristor

Megahertz is equal to one _____ cycles (or instructions) per second.

million

Sometimes used in smaller business networks, employee ___ software is impractical for large networks because of the number of users and the potential for misuse.

monitoring

Which of the following is a strength of the Android platform?

most widely used OS for smartphones and tablets

The standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or _____.

netiquette

All of the following are part of an RFID system except _____.

network

Though legal, which of the following would likely be prohibited by a typical business computer-use policy?

online personal shopping

All of the following are protected against unauthorized use or distribution by intellectual property laws except

open educational resources

What manages hardware and software, supports the computer's basic functions, and runs programs?

operating system

In photography, there are 2 ways to focus on distant objects, digital zoom and ____ zoom.

optical

Select the storage devices.

optical drive external hard drives USB drives

Many manufacturers have made _____ optional equipment when purchasing a new laptop computer.

optical drives

BitTorrent utilizes no central server, instead opting to utilize a _____ structure where each device connected to a network has equal access to the shared files

peer-to-peer

Blu-ray stores data using ___ .

pits and lands that are read by a blue spectrum laser beam

All of the following are best practices when using LinkedIn except

post vacation photos to show your friends where you've travelled.

Converting a task into commands that a computer can use to perform the task is called ___ .

programing

Which type of touchscreen uses a single metallic-coated panel and uses electricity to calculate touch points?

projective capacitive

Written in natural language, but often including programming shorthand to assist in writing the program itself, ___ is the term that describes an intermediate step in creating an algorithm from a flowchart.

pseudocode

When referring to digital storage, RAID stands for ___ .

redundant array of independent discs

The term that describes how fast each pixel in a display is updated is ___ .

refresh rate

With optical zoom, resolution ____ when focusing on distant objects.

remains the same

The number of pixels in an image is called the image's ____ .

resolution

Two main factors concerning your digital identity are privacy and ___.

security

Increased data transfer will be less likely to have errors if you use a ___ USB cord.

shorter

Data from the hard drive reaches the CPU _____ than data from the RAM.

slower

When copyrighted software is illegally copied, distributed, modified or sold and is considered direct copyright infringement this is called_____ _____.

software piracy

Select activities that would be considered software theft.

stealing software programs -illegally copying a program

The component of a computer that allows data to be retained after power is turned off is referred to as _______.

storage

A computer that is highly mobile, has a smaller OS, and uses a touchscreen as the primary input method is called a ______.

tablet

Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should

tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.

A thousand gigabytes equals one ___ .

terabyte

Which of the following represent the highest amount of storage?

terabyte

HTML and it's 5th revision (HTML5) allow content to be displayed on ___ .

the World Wide Web

The most common printers for printing receipts are ___ printers.

thermal

A kilobyte is equal to approximately one _____ bytes.

thousand

Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?

top level managers

A programming design that breaks down a problem into a series of tasks is called ___ programming.

top-down

Used in a variety of devices including ATMs and point-of-sale terminals, ____ allow for the input of data with the use of a stylus or finger.

touchscreens

The main governmental organization that oversees Internet privacy is the Federal ___ Commission.

trade

A computer platform is commonly referred to as an operating system or OS

true

A computer platform is commonly referred to as an operating system or OS.

true

Applications are computer programs created to execute specific tasks.

true

The Android OS is owned and maintained by Google (Alphabet).

true

The platform or operating system of a computer controls all of the functions of a computer.

true

Tiffany has purchased a new laptop. She noticed many unwanted programs came pre-installed on her laptop. She wants to ___ the programs from her device so they do not take up storage space.

uninstall

WhatsApp users can create groups, and send _____ images, video and audio messages for free.

unlimited

A businesses brand is derived from all of the following except ______ .

what their competition perceived them to be

A form of Email fraud where criminals change the account where money is being transferred is called a ___ scam.

wire-wire

Personal branding can be accomplished digitally and in more traditional means including all of the following except _____ .

writing private journal entries

There are risks associated with downloading content from the Internet. It is important to consider all of the following when downloading from the Internet except

your anti-virus software will ensure your files are safe.

Which of the following refer to ultra-high-definition television displays?

-4K UHD -8K UHD -UltraHD -SuperHd

Select what's true requarding all-in-one computers.

-All-in-one computers house every component except the keyboard and mouse inside the same case as the monitor. -All-in-one computers are designed to be highly mobile so that they can be used by people on the go.

The 3 phases that should be accomplished in the investigation step of the SDLC include:

-Defining the problem. What should this system do? Who will by using this IT system? -Examining alternatives. Can available hardware and software perform the same task? -Reporting. Document your investigation's findings.

The fifth step in the SDLC process is the system implementation phase. During this phase the new system is brought online. Select methods of converting an organization from an older IT system to a newer IT system.

-Holiday conversion - placing the new system online while everyone is gone. -Pilot conversion - starting the new system in one sector of the organization to ensure that it works smoothly. -Parallel conversion - running both systems side-by-side for a while and then shutting the old system. -Direct conversion - shutting down the old system completely and starting the new one.

Select the qualities that make a trait useful for biometic recognition.

-The trait must be measurably different with each person. -The trait must not change over time.

Select the true statements regarding an LED display.

-can be extremely thin -extremely energy efficient -create a significant amount of heat

Select the characteristics of thermal printing.

-commonly used for printing receipts -paper turns black when heated -makes high quality photo prints -useful for printing multiple color copies

Which are true regarding a screen's resolution?

-equals the number of pixels in a display -described as distance between 2 pixels -equals the diagonal length of the screen

Select the traits that are currently used for biometric identification.

-fingerprint -irises

Select the features common in DSLR cameras.

-often allow for interchangeable lenses -are less expensive than point-and-shoot cameras

Select the features common in DSLR cameras.

-often allow for interchangeable lenses -usually have a mirror that allows the photographer to look directly through the lens -rarely include optical zoom -are less expensive than point-and-shoot cameras

Select the current uses for RFID tags.

-package tracking -inventory tracking -musical fidelity

1. L1 cache 2. L3 cache 3. Disk cache

1. memory located directly on the processor itself 2. memory located adjacent to the processor 3. memory used to increase a hard drive's efficiency

1.Command+A 2.Command+Shift+3 3.Command+S 4.Command+F

1. select all 2. screenshot 3. save 4.find (in most apps)

1. 5GL 2. 4GL 3. 2GL 4. 1GL 5. 3GL

1.Extremely advanced - uses statements (scripts) rather than algorithms. 2. Specifically designed for creating database management programs. 3. Assembly language - an assembler converts 2GL into machine language. 4.Machine language - represented by a series of 1s and 0s. 5.High-level programming language - uses a compiler to convert into machine language.

1. input 2. storage 3. output

1.entering text in a word doc 2.putting a photo onto a USB drive (thumbdrive) 3.playing a song from spotify

Relatively rugged, water-resistant video cameras that allow users to film high-definition video under harsh conditions, such as on ski mountains, in the ocean, or at high altitudes are called extreme-action video cameras or simply a ___ .

GoPro

A program that makes creating websites and webpages much faster is ___ .

JavaScript

the ______ cache is located directly on the processor itself.

L1

The process used to develop and maintain an IT system is referred to as the SDLC. SDLC stands for the System Development ___ Cycle.

Life

When discussing digital cameras or smartphone cameras with APS CMOS, APS stands for ___ .

active pixel sensor

Select the input devices often found at a point-of-sale station.

bar code or UPC reader receipt printer

Inkjet printers are often sold ____ their production cost.

below

If it can be answered as either yes or no, or true or false, the question is called ___ .

binary

Because its radio waves pass through walls or desktops, ___ - capable devices are becoming very popular.

bluetooth

The amount of data that defines each color in a pixel is called ____ .

color depth

The number of bits of data describing each pixel in a display is referred to as ___ .

color depth

A description of the difference in the luminance of a display's white pixels compared to the black pixels is called ___ .

contrast ratio

the two main components of a processor are the arithmetic logic unit (ALU) and the _____ unit.

control

The third step of the SDLC has 3 phases, specifically, developing several system proposals, selecting the most feasible proposal, and reporting on the selected system to be developed. This step is called the system ___ step.

design

The distance between two adjacent sub-pixels on a display is referred to as ___ .

dot pitch

The art and science of creating output that provides information in the most useful manner is called ___ .

ergonomics

The final step in the system development life cycle is maintaining the system. Select the two phases of this step.

evaluation phase training phase

Number of times per second a frame in a video is advanced is the definition of _____.

frame rate

MEMS chips are used in which of the following?

hearing aids, pet identification chips, poker chips

The first step in the SDLC involves defining the problems that the IT system should address, examining various alternatives, and reporting the findings. This is referred to as the ___ step.

investigation

Because of their compact size, touchpads are most often used with _____ computers.

laptop

A process that has an initial value, a process, and a test condition that can potentially return the program to the initial value is called a ___ .

loop

When a computer is shut down, the information in the memory (the RAM, the caches, the registers) is _____.

not saved

Using reflective material to store data that can be read using a laser is called ___ media storage.

optical

An input, output or storage device connected to a computer is known as a(an) _____ .

peripheral

The smallest controllable element of an image is called a(n)___ .

pixel

Select the peripherals.

printer monitor tablet

Select the output devices.

printers

An output device that uses light to display video or image output on a surface is called a ___ .

projector

Laser printers are popular in offices because they use relatively inexpensive ___ .

toner

3D mapping, feature charting, and skin texture are some of the methods facial recognition software uses to identify individuals.

true

Active Pixel Sensor (APS), Complementary Metal-Oxide Semiconductor (CMOS) technology is used in most digital cameras, smartphone cameras and webcams today.

true

As technology advances there are fewer keyboard options available for computer users.

true

Many DSLRs have full (35mm) sensor arrays enabling photographers to take extremely high resolution photos.

true

A camera that takes photos or steams video into a computer or over the Internet is called a ___ .

webcam


Ensembles d'études connexes

Chapter 21: Poverty, Inequality, and Discrimination

View Set

HIS 101 - Western Civilization to 1689 - Final Exam

View Set

Transcription (making mRNA from DNA)

View Set

Chemistry - Mr Larry - Final Notes

View Set

Chapter 20 Warm-up exercise Macro-ECON

View Set