CGS 2100 EXAM 1 FSU

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

When you buy a new laptop, how much RAM should it come with?

4-8 GB

Which of the following refer to ultra-high-definition television displays

4K UHD, 8K UHD, UltraHD

some computers use ___ to represent characters in a binary format

ASCII

Today the standard port for video and audio input on TV is the ___ port

HDMI

Put the SDLC steps in order.

Investigation, Analysis, Design, Develop

An object-oriented programming language used by Android phones and tablets to write apps is ___.

Java

Though currently expensive, curved and paper-thin displays are possible using ___ display technology.

OLED

Many manufacturers have made _____ optional equipment when purchasing a new laptop computer.

Optical drives

RFID stands for which of the following.

Radio Frequency Identification

Which of the following are designed as a network operating system

Windows NT, Windows Server, UNIX

A description of the difference in the luminance of a display's white pixels compared to the black pixels is called

contrast radio

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___.

corruption

The SSD cost is ___ than the traditional hard drive cost.

higher

Lose range tones generally require ___ speakers.

largwe

A megabyte equals approximately one _____ bytes?

million

Which of the following is a strength of the windows platform

most widely used OS in laptops, desktops, usually leading to lower prices

The actual pixel number in a monitor is called the ___ resolution.

native

A(n) ___-oriented assessment operates well when inputs can readily be put into distinct categories or classes

object

JSON stands for JavaScript ______________ Notation

object

The smallest image element is a(n) ________.

pixel

One of the main differences between free and fee-based antivirus software is ___.

the number of features

Megahertz abbreviation is ________.

MHz

Which of the following represents the least amount of storage

kilobyte

A processor that consists of one control unit and one ALU is called a ___.

single-core processor

common names for a USB drive include

thumb drive, flash drive, jump drive

Place the following steps in order for the process of uninstalling a program from a Chromebook

1. Click the Launcher (circle icon). 2. Right-click the unwanted app. 3. Select Uninstall or Remove from Chrome. 4. Click Remove.

Select what's true regarding all-in-one computers

All in one computers house every component except the keyboard and mouse inside the same case as the monitor, an all in one computer is a stationary device with a separate keyboard and mouse

AJAX stands for___JavaScripts and XML

Asynchronous

These facilitate getting data and information into your computer.

input devices

Uses for computer hard drives include ________ and ________.

keeps files for future use and data remains intact when computer is off

An Internet filter is firewall software used to block a user's access to specific Internet content. This software can reside on which 3 of the following

router or users computer, network, stand-alone filter attached to a server

Good password management include which three of the following

Changing your password often, Using strong passwords,Never use the same password twice

VPN (Virtual Private Network) is a very useful tool in protecting your online identity. A VPN hides your ___ to outside websites

IP address

Identify what is true about script kiddies

are amateur computer hackers with little programming expertise, illegally gain access to computer systems using programs (scripts) that others have written

The method used in the development and maintenance of an IT scheme is called the SDLC. SDLC stands for System Development ___ Cycle.

Life

Be careful to only open email for senders you know and trust. ___ may be contained in email messages

Malware

Common computer virus infection indicators include ___, ____, and ____.

OS doesn't launch properly, files get deleted or encrypted, strange error messages or pop up ads.

Select appropriate business email etiquette practices

Remember that potentially negative news is best given face-to-face. Keep attachments small.

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ___ software.

Remote Desktop

Select the factors that should be considers when purchasing external speakers for a digital device

Sound quality, portability, price,

Apple developed ___, a programming language for Mac OS and iOS writing software because Objective-C was hard to write.

Swift

Which are important considerations when purchasing a new computer?

What is its price? How much RAM comes with it? Does the device have USB ports?

Testing and documenting the software are the final steps in the PDLC process. When testing is carried out by the softwares potential customers, it is called a(n) ____ test.

beta

Factors that damage computer hardware include

power surges, overheating, humidity, magnetic fields

Pseudocode is written in natural language, but often including programming ___ to assist in writing the program itself.

shorthand

Devices allowing data to be retained when your computer is shut down are called ________ devices.

storage

What is the most powerful computer type?

supercomputer

Select the two phases of the final step in the system development life cycle

system audit, evaluation phase

Using IS to help for see corporate business opportunities and threats that might be done by all levels of management but it is most important for which management level

top level managers

What order of steps should you take to change your cookie preferences in Safari?

1. Choose Safari 2. Click Preferences 3. Click Privacy 4. Change cookie settings

Match the following description with the appropriate programming language generation.

1GL-Machine language-represented by a series of 1s and 0s, 2GL-Assembly language-An assembler converts 2GL into machine language, 3GL-High level programming language-uses a complied to convert into machine language, 4GL- Specifically designed for creating database management programs, 5GL- Extremely advanced-uses statements (scripts) rather than algorithms.

All of the following are common ports that are included with laptop computers

ethernet ports, hdmi ports, usb ports

The machine cycle consists of which four steps?

fetch, decode, execute, store

Breaking into a computer system (hacking) for political or social purposes is called

hacktivism

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ___.

information systems (information technology) technician

Josh is taking an Intro to Computers course and needs to use Microsoft Office to complete a variety of assignments. He has purchased the software, now he must ________ it so he can start his assignments.

install

A two-in-one computer combines a tablet with a (usually) detachable ___ to make it relatively powerful yet mobile computer

keyboard

Spyware collects your ____, ____, and ____ to gain information about your Internet habits and activities.

keystrokes, passwords, confidential info

Though legal, which of the following would likely be prohibited by a typical business computer-use policy?

online personal shopping

What manages hardware and software, supports the computer's basic functions, and runs programs?

operating system

The three most common types of e-mail viruses includes all except

password savers

In each browser's settings area you should consider ________, ________, and ________.

periodically deleting cookies, blocking/customizing your cookie settings, decide from which sites you want to allow cookies

Visiting pornography sites while using a company computer and or network violates your company's computer use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other coworkers also noticed this. You should

tell your boss that you've witnessed the coworker visiting porn sites while using the company computer or network, be brief and direct

Choose the two answers that define the term "resolution" in output devices.

the numbers of pixels in a display, the quality of the image

A kilobyte is equal to approximately one ________ bytes.

thousand

select what's true regarding uninstalling software

uninstalling system software is not recommended, be cautious when uninstalling software from the OS manufacturer, be cautious when uninstalling software from the computer manufacturer

If you purchase a new graphics computer game or a new photo or video editing software for your desktop computer, you may want to purchase a new ___ card.

video

The technology that uses cameras, microphones, displays, speakers, and software to allow users to both see and hear each other is called

video conferencing

Which of these should business owners do to help protect their data

Establish strong firewall protection for their business's network. Ensure antivirus software is installed and up-to-date. Create strong password protections and protocols.

Which is true regarding the length of a USB cord

In general, the more data being transmitted, the shorter the cord should be.

Trojan horse programs are used to find

bypassing firewalls, funding passwords, destroying data

Match the component of a business email with its characteristics

close:professionally ends the message, salutation:sets the tone of the message, body:succinctly discusses the purpose of the message, from and or subject lines:determines if the email will be opened

Place the following steps in order to attach a document from your documents folder to an email in Outlook

1. Go to Outlook (log in if necessary) and create your message 2. Click Attach (also indicated by a paper clip symbol) 3. Select computer 4. Select documents 5. Double click the desired file and select attach as a copy

The SDLC's system analysis phase includes three stages. Choose the three stages.

Data-collection-gathering info about needs and existing hardware and software, Analyze data-determine the system requirements, Prepare the system specifications

Which statements refer to a display's contrast radio

Describes the difference in brightness, Luminace of white pixels compared to black pixels

Select the usual roles of information systems (IS) technicians.

Installing IS hardware and software. Maintaining IS hardware and software. Repairing and replacing IS hardware and software.

In order to ensure that employees understand what's appropriate and what's inappropriate use of company's computer equipment software and networks employees must set ethical computer use standards. This includes which of the following

Instructing employees on standards, Enforcing standards by creating firewalls, monitoring protocols and filters, Periodically reviewing computer use policies

A digital device that accepts input, processes and stores the input, and provides output is a ____.

computer

A person who uses computers and the internet to launch attacks against computer systems for political or ideological reasons is called a

cyberterrorist

How is the screen size of a laptop computer measured?

diagonally from left corner to right corner

A___ is the hardware or software used to keep a computer secure from external threats such as hackers and viruses by allowing or blocking internet traffic

firewall

Match the business information systems (IS, sometimes called information technology or IT) activity with the appropriate management level

first level managers (supervisors, floor managers): Use IS for scheduling daily and weekly operations, Middle managers: Use IS for record keeping and reporting purposes, Top-level management (business executives and presidents): Use IS to monitor overall business performance

A process's graphical representation is called a___.

flowchart

After the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a ___, and is in written in an ordinary language, such as English.

flowchart

This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery

gait analysis

The visual image output created by the computer is called ____.

graphics

The software development process includes which of the following steps

planning, programming, debugging, beta review

Converting a task into commands that a computer can use to perform the task is called ________.

programming

An output device that uses light to display video or image output on a surface is called a

projector

What is the correct order of steps to use when uninstalling program in Windows 10 using the search feature

1. Open the start menu 2. Click settings 3. Click System on the Settings menu. 4. Select Apps & Features 5. Select a program you wish to uninstall

CPU clock speeds of a personal computer range between ____.

2 to 4 gigahertz

Choose what all in one computers actually mean

An all in one computer is a stationary device with a separate keyboard and mouse, an all in one computer houses every component except the keyboard and mouse inside the same case as the monitor

Settings in Firefox can be changed to allow you to complete which three tasks

Approve cookie storage requests, Deny cookie storage requests, Delete stored cookies automatically when you start Firefox

Since its radio waves pass through walls or desktops, ________-capable devices are very popular.

Bluetooth

The three stages to be completed in the SDLC's inquiry phase include

Defining the problem. What should this system do? Who will be using this IT system?, Examining alternatives. Can available hardware and software perform the same task?, Reporting. Document your investigations findings

Match the conversion methods with the correct description in the system implementation step of the SDLC

Direct-shuts down the old system and starts the new system, Parallel-old and new systems run side by side for a while, Pilot- starts in one area of the organization and then is deployed to the rest of the organization, Phased- implements new areas of the system in a predetermined period of time.

Which are true regarding a screen's resolution

Equals the number of pixels in a display, measures image quality

To speed up the programming process while producing dynamic web pages, select the program that utilizes tiny programs called scripts.

JavaScript

A commonly used short-range wireless technology used for data transfer and electronic payments is called ___.

NFC (Near Field Communication)

amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called _______________

Script kiddies

Match the Macintosh keyboard shortcut with the appropriate result.

Select All: Command+A, Save:Command+S, Find (in most apps):Command+F, Screenshot:Command+Shift+3

Select the unusual tasks of information systems program managers

Supervising IS technicians, Working with developers and senior management to procure and implement IS processes, Developing training plans and policies for IS.

Select the qualities that make a trait useful for biometric recognition

The trait must not change over time, Everyone must have the trait, The trait must be measurably different with each person

Choose what is true about cookie privacy risks

Websites using cookies can collect your info and sell it to third parties,Websites can track surfing behavior and create a profile, corporate and gov entities can track your web behavior

Smartphone cameras work by focusing incoming light onto what type of array that captures images?

active pixel scanner

Software that collects the web browsing history of the user and uses the collected data to create unwanted pop up ads is called

adware

Devices which house every component except the keyboard and mouse inside the same case as the monitor are called ________ computers.

all-in-one

One of the first stages of the PDLC testing method is a test of fresh software performed by the programmers themselves or contract evaluators working alongside the programmers. This is called the ___ test.

alpha

When reporting a computer ethics violation of a coworker to your employer, it's important to ___.

be brief and direct, state only what you witnessed

Select the tasks of a data analyst

collect data, interpret info provided by the database, creates reports for senior management,

A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the ________.

control panel

The most popular web browsers have a private browsing mode. While browsing in incognito mode your browser will not store ___.

cookies

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment software and networks, employers must set ethical computer use standards. Failure to set such policies can lead to which of the following

decreased employee performance, decreased network speed, increased likelihood of security breaches

Because of their compact size, touch pads are most often used with ____ computers.

laptop

It's always a good idea to check the ___ before clicking Reply to all

list of address

Ranks the storage capacities from highest to lowest. Start with the highest capacity first.

petabyte, terabyte, gigabyte, megabyte, kilobyte

The smallest controllable element of an image is called a(n) _____.

pixel

Though legal, which of the following would likely be prohibited by a typical business computer-use policy?

playing online games

Select the advantages of a point-and-shoot camera over a smartphone camera

point and shoot cameras often have larger pixel sensor arrays, providing higher resolution, point and shoot cameras being thicker often come with optical zoom capability

A point in a computer (a hole or a slot) that accepts a specific connector is called a ___.

port


Ensembles d'études connexes

practice question 141 exam 3 (2/2) chapters 26, 27, 28, 29, 30

View Set

Genetics Extensions of Mendelian Inheritance

View Set

CIC Surveillance & Epi Investigation Practice Questions

View Set

Chapter 7: The Outer Planets & Their Moons (Textbook Notes)

View Set

IS471 - Exam 2 (Chapter 4, 5, 6)

View Set

Physical Science B lesson 17 Properties of Sound

View Set

ECO 2023 Test 1 Study Guide Questions

View Set