CGS Exam 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

what their competition perceived them to be

A businesses brand is derived from all of the following except ______ .

webcam

A camera that takes photos or steams video into a computer or over the Internet is called a ___ .

contrast ratio

A description of the difference in the luminance of a display's white pixels compared to the black pixels is called ___ .

barcode

A device commonly used for checkout in stores, that measures the reflection of a laser beam, is called a ___ reader.

wire-wire

A form of Email fraud where criminals change the account where money is being transferred is called a ___ scam.

Creative

A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is called _____ Commons.

Instagram charges a fee to download the app.

All of the following are true about Instagram except

unlimited

Because of the popularity and bandwidth demands of video streaming, ___ data plans are not as common as they were in the past.

laptop

Because of their compact size, touchpads are most often used with _____ computers.

data

Before you can start tethering, verify that it's included in your cell phone's ___ plan

peer-to-peer

BitTorrent utilizes no central server, instead opting to utilize a _____ structure where each device connected to a network has equal access to the shared files.

the World Wide Web

HTML and it's 5th revision (HTML5) allow content to be displayed on ___ .

binary

If it can be answered as either yes or no, or true or false, the question is called ___ .

3G

If you just need a phone for calling and texting, a ___ phone can save you money.

prepaid

If you just need a phone for emergencies, you might consider a ___ phone.

toner

Laser printers are popular in offices because they use relatively inexpensive ___ .

Blackberry

Once so commonly used that people even called it the "Crackberry", the ___ popularity dropped significantly in the U.S. after 2007.

microSD storage

One advantage that the Samsung tablets have over the iPads is that you can add ___ to the Note or Tab.

Radio Frequency Identification

RFID stands for which of the following.

UltraHD

Television displays with resolutions of at least 3840 x 2160 pixels are referred to as ___ .

content is missing

content is missing

loop

A process that has an initial value, a process, and a test condition that can potentially return the program to the initial value is called a ___ .

interpreter

A program that can be used to convert a single line of C# into machine language without having to compile the entire program is called a C# ___ .

JavaScript

A program that makes creating websites and webpages much faster is ___ .

compiler

A program that takes an entire program, check the source code for errors, and converts it into machine language is a ___ .

top-down

A programming design that breaks down a problem into a series of tasks is called ___ programming.

plotter

A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a ___ .

Asynchronous

AJAX stands for ___ JavaScript and XML.

high-frequency RFID can transmit signals further than 1500 feet.

All of the following are true about RFID except

3D

Also known as additive manufacturing (AM), ___ printing sprays successive layers of material to create an object.

peripheral

An input, output or storage device connected to a computer is known as a(an) _____ .

projector

An output device that uses light to display video or image output on a surface is called a ___ .

280

As of 2017, tweets can be a maximum of ___ characters.

ERP

Business management software that encompasses nearly all business activities in a corporation is called ___ software.

microwave

Cell phones send and receive extremely weak ___ signals to and from cell towers.

$500.00

If your debit card has been compromised and you wait more than two days, but fewer than two months after you learn about the loss, you can be liable for up to _____.

language

Instructions (software) that allow a computer (hardware) to be used are written using specific symbols, letters and numbers known as a programming ___ or code.

virtual

Most smartphones and tablets produced today use a _____ keyboard.

touchscreen or keyboard

Select the smartphone input device.

Surface Pro 4

Since it comes with a full computer operating system, some consider the ___ a laptop computer rather than a tablet computer.

10

Snaps on Snapchat can be viewed for up to ___ seconds (depending on what the user chooses) and then disappear.

C++

The coding step of the PDLC might use which of the following languages?

screen size

The diagonal measure of the visible display is known as _____ .

maintaining

The final step in the SDLC has two phases, a system audit and an evaluation phase. This final step is referred to as ___ the system.

Apple

The mouse was developed by which company?

information systems (information technology) program manager

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the ___ .

analysis

The second step of the SDLC process involves collecting data about existing hardware and software, analyzing this data, and preparing specifications for the system. This is called the system ___ step.

refresh rate

The term that describes how fast each pixel in a display is updated is ___ .

Title 5 - Copyright Protection Proviso.

The titles in the DMCA that directly impact digital copyright issues include all of the following except

aspect ratio

The width of a screen compared to the height of a screen is referred to as ___ .

input devices

These facilitate getting data and information into your computer.

iOS

Third party apps must be reviewed and approved by Apple before being available for the ___ .

MIDI

This technology allows musicians to create written sheet music simply by playing an instrument.

Bluetooth

This technology provides short-distance wireless communication between electronic devices using extremely low power radio signals.

gait analysis

This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery.

top level managers

Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?

active pixel sensor

When discussing digital cameras or smartphone cameras with APS CMOS, APS stands for ___ .

object

When inputs can easily be placed into different categories or classes, a(n) ___ -oriented analysis works well.

management information systems

When referring to business information technology, MIS stands for ___ .

Pin

When you personally share an image on Pinterest it is known as a _____.

DSS

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?

TPS

Which category of management information systems (MIS) focuses on tracking sales and inventories?

Outlook

Which of the following is an email program?

Cyberstalking and online predators are a real problem on Facebook.

Which of the following statements about Facebook is true?

iOS

Which of these is found on iPhones and iPads?

spell check

While not a required step in sending an email, it's wise to ___ any message before clicking Send.

voice

With ____ recognition technologies, frequency, pitch, speech rhythms and other characteristics are charted and compared to existing records.

Apple

With its iPhone, ___ dominates the U.S. smartphone market.

remains the same

With optical zoom, resolution ____ when focusing on distant objects.

NFC

Apple Pay uses _____ for payment transfer.

C++

If you plan to write software for PC games you should probably learn C or ___ .

roaming

If you're in an area where your home network has no cell coverage, you may need to use the cellular network of a different provider. This is called ___ .

$50.00

If your debit card has been compromised U.S. Federal law says you are only liable for a maximum of _____ in fraudulent charges if you tell your bank within two business days of learning about them.

capacitance

Most touchpads use _____ to sense when a finger has moved across the pad.

video

Some apps that use a surprising amount of data are those that include embedded ___ .

OLED

Though currently expensive, curved and paper-thin displays are possible using ___ display technology.

3G

Two major catagories of cell phones are available. Smartphones with LTE or 4G capability and ___ phones.

plasma

Using cells of ionized gas to create images, ___ displays are actually becoming less popular.

AJAX

A set of programs that allow data to be exchanged on a website without changing the website's display is ___ .

settings

After verifying that your data plan includes tethering, the first step in creating a hotspot with your Android phone is to click on the ___ icon.

programming

Converting a task into commands that a computer can use to perform the task is called _______.

separation

Social networking is based on the six degrees of _____ concept which posits that you can connect with anyone through a chain of no more than six introductions or personal links.

remote desktop

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ___ software.

3D

Sometimes used to create prototype models for casting, ___ printing is also known as additive manufacturing.

roaming

Sometimes, particularly when travelling, you may find yourself in an area where your home network has no cell coverage, but another network does have service. Using a different network is referred to as ___ .

0-1

A smartphone emits approximately ___ watts of microwaves.

alpha

A test of new software conducted by the programmers themselves or by contracted evaluators working alongside the programmers is one of the first phases of the testing process in the PDLC. This is referred to as a(n) ___ test.

data analyst

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___ .

syncing

Connecting your phone to your laptop to transfer photos, videos, or music files is referred to as ___ .

analog

In order to change sound waves into digital signals, smartphones contain ______ - digital converter.

GoPro

Relatively rugged, water-resistant video cameras that allow users to film high-definition video under harsh conditions, such as on ski mountains, in the ocean, or at high altitudes are called extreme-action video cameras or simply a ___ .

tethering

Sharing an Internet connection between two digital devices, for example, using your smartphone to create a hotspot and then using the hotspot to connect your laptop to the Internet, is referred to as ___ .

switching

The cell tower's base transmission station is connected to a mobile ___ station.

open educational resources.

All of the following are protected against unauthorized use or distribution by intellectual property laws except

500 MB - 2 GB

Most new cell phones today come with approximately ___ of RAM.

resolution

The number of pixels in an image is called the image's ____ .

Mobile Switching Station (MSS)

Because it locates cellular devices, assigns frequencies, transmits signals to the correct sites, the ___ is probably the most important part of any cellular network.

large

Because of the large infrastructure cost of building antennae and mobile switching stations, as well as leasing the rights to use radio frequencies, only ___ companies can compete nationally as cell phone providers.

EFT Act

In the United States the federal _____ covers most consumer oriented electronic transactions.

weaker

In urban areas, the cell towers become more numerous and the cell signals transmitted by the cell towers are ___, than those in less populated areas.

texting

Ironically, the expenses for calling and ___ are among the smallest charges found on a cell phone bill.

BASIC

The 3rd generation programming language that most students learned when most computers used MS DOS was ___ . It remains a safe programming language for using 3rd party code and provides a coding standard that integrates easily with other programming languages.

beta

The final steps in the PDLC process include testing and documenting the software. When testing is conducted by potential customers of the software, it's referred to as a(n) ___ test.

game apps

The largest category of apps, both in terms of active downloads and in terms of revenue generated is ___ .

signal

The small computer within your phone that enhances the sound quality of your call is called a digital ___ processor.

pixel

The smallest controllable element of an image is called a(n)___ .

MEMS

The technology (chips) that allow cell phone microphones and hearing aids to be so small is the _____ chip.

character

The technology that allows any text, even handwritten scrawls, to be digitized is known as optical ___ recognition.

intellectual

To protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products, there are ___ property laws.

downloading

Transferring a file from the Internet to your digital device is called _____.

debugging

After the code has been written there are nearly always mistakes. The 4th step in the PDLC involves finding and correcting these errors in a process called ___ .

JavaScript

Select the program that uses small programs called scripts to speed the programming process while creating dynamic Web pages.

ergonomics

The art and science of creating output that provides information in the most useful manner is called ___ .

iPad Pro

Apple's mobile device with the largest display is the ___ .

Swift

Because Objective-C was difficult to write in, Apple developed ___ , a programming language for writing software for the Mac OS and the iOS.

below

Inkjet printers are often sold ____ their production cost.

frame rate

Number of times per second a frame in a video is advanced is the definition of ___ .

design

The third step of the SDLC has 3 phases, specifically, developing several system proposals, selecting the most feasible proposal, and reporting on the selected system to be developed. This step is called the system ___ step.

playing online games

Though legal, which of the following would likely be prohibited by a typical business computer-use policy?

toner

To create an image with a laser printer ___ is(are) drawn to the drum.


Ensembles d'études connexes

NUR 204 ATI Health Assessment Chap. 26-31

View Set

Critical Thinking Homework & Quizzes

View Set

NCEA Level 3 Biology - Plant and Animal Responses

View Set

BIOL 2083 Tophat questions Quiz 1

View Set

Lecture Exam 4 Ch 17, 18, 22, 23, 24

View Set