CGS Summer C Midterm

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Select the usual tasks of a data analyst.

- Collects data. - Interprets information provided by the database. - Creates reports for senior management.

Which are important considerations when purchasing a new computer?

-What is its price? -How much RAM comes with it? -Does the device have USB ports?

Which of the following should you consider when buying a new computer?

-What is the cost? -Does it have HDMI ports? -Does it have an SD card slot?

WiFi

-Wireless local area network -Transmission site is called a Hotspot -Most computers, tablets, smartphones, and gaming platforms are wifi capable -2.4 GHz and 5.0 GHz radio waves

A gigabyte equals approximately one ________ bytes.

Billion

What is the acronym for End-User Licensing Agreement?

EULA

Josh is taking an Intro to Computers course and needs to use Microsoft Office to complete a variety of assignments. He has purchased the software, now he must ________ it so he can start his assignments.

Install

A two-in-one computer combines a tablet with a detachable ________ to make a relatively powerful, yet mobile computer.

Keyboard

Which of the following represents the least amount of storage?

Kilobyte

All of the following are common ports that are included with laptop computers except ________.

MIDI Ports

Be careful to only open e-mail from senders you know and trust. ________ may be contained in e-mail messages.

Malware

Which of the listed programs are used for creating documents, basic web pages, and desktop publishing?

Microsoft Word

Which of the following might be risky to uninstall from a Windows PC laptop?

Microsoft Works 6-9 Converter

Sometimes used in smaller business networks, employee ________ software is impractical for large networks because of the number of users and the potential for misuse.

Monitoring

Which of the following is not a presentation software term?

Speaker Image

A kilobyte is equal to approximately one ______ bytes.

Thousand

Using information systems to help foresee corporate business opportunities and threats that might be done by all levels of management, but it is most important for which management level?

Top-Level Management

Burning

Write data onto a CD, DVD, or Blu-ray disc

In the body of a professionally formatted business e-mail, where should a request be placed?

in the first sentence of the body of your e-mail

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the ________.

information systems (information technology) program manager

It's always a good idea to check the ________ before clicking Reply to All.

list of addressees

Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should

- tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network. - be brief and direct.

Single Core Processor

-A CPU with one processor on the chip. -One ALU and one control unit

Protocol

-A set of rules governing the exchange or transmission of data between devices that determines how data is transmitted and received -WiFi uses the 802.11 protocol which ensure that devices enabled with WiFi can connect to any WiFi network

Bluetooth

-A short distance wireless communication technology that uses relatively short-wavelength radio waves to transfer data -Signal easily passes through walls, furniture, etc

FireWire

-A type of Thunderbolt port -Allow for up to 6 different peripherals to be connected to one device -Commonly found on Apple computers and devices

Wireless Ports

-Allow for the transmission of data between fixed and mobile devices using short-range radio waves or light waves -Most Bluetooth transmissions remain strong up to 10 feet away and then start to reduce signal strength -Infrared requires line-of-sight transmission

Memory

-Computer memory (RAM) is found in microchips that are located on the motherboard -Comprised of solid state electronics which make it fast and energy efficient since there are no mechanical moving parts

Select appropriate business e-mail etiquette practices.

-Maintain high levels of formality, especially with initial contacts. -Consider if e-mail is the appropriate means of communication.

How much RAM?

-Smartphones: At least 2 gigabytes -Laptops: At least 4 gigabytes

Most new laptop computers come with how much storage?

256 GB- 1 TB

When you buy a new laptop, how much RAM should it come with?

4-8 GB

ALU

Arithmetic Logic Unit

A digital device that accepts input, processes and stores the input, and provides output is a ________.

Computer

Used in a variety of devices including ATMs and point-of-sale terminals, ________ allow for the input of data with the use of a stylus or finger.

Touchscreens

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ________.

corruption

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ________.

data analyst

Machine Cycle

-Fetch -Decode -Execute -Store

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer-use standards. Failure to set such policies can lead to which of the following?

-decreased employee performance -decreased network speed -increased likelihood of security breaches

Which of the following is a strength of the Windows platform?

-most widely used OS in laptops, desktops, usually leading to lower prices

Select what's true about utility programs.

-program that performs a specific maintenance type of task -included in both Windows and Mac OS -common examples include disk formatting, disk cleanup, and disk defragmenting

"Full HD" resolution is expressed as

1920 x 1080

Ports

A slot or hole that matches the cord or expansion card being connected to the port

Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a ________, which closes the access point used by the hacker.

Block

Ripping

Copy the data from the disk and writing it onto your computer's hard drive

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?

DSS

Stealing confidential materials such as copyrighted material, confidential information, or company e-mails from a network is called ________. Most often, this crime is committed by employees inside the company rather than outside hackers.

Data Theft

Business management software that encompasses nearly all business activities in a corporation is called ________ software.

ERP

When referring to business information technology, MIS stands for ________.

Management information systems

Tiffany has purchased a new laptop. She noticed many unwanted programs came pre installed on her laptop. She wants to ________ the programs from her device so they do not take up storage space.

Uninstall

Match the business information systems (IS, sometimes called information technology or IT) activity with the appropriate management level.

Use IS to monitor overall business performance. :Top-Level Management Use IS for record keeping and reporting purposes.: Middle Management Use IS for scheduling daily and weekly operations.: First-Level Management

Stealing confidential materials such as copyrighted material, confidential information, or company e-mails from a network is called ________. Most often, this crime is committed by employees inside the company rather than outside hackers.

data theft

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ________.

database administrator (DBA)

How is the screen size of a laptop computer measured?

diagonally from left corner to right corner

Though legal, which of the following would likely be prohibited by a typical business computer-use policy?

online personal shopping

What manages hardware and software, supports the computer's basic functions, and runs programs?

operating system

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ________ software.

remote desktop

MIDI (Musical Instrument Digital Interface)

-Allows for the interfaces and connectivity of digital musical devices to computers -Capable of carrying digital music signals and are common in today's music scene -Allows the computer to be turned into a sound studio -Includes the protocols for translating music into digital signals -Included 16 channel inputs, allowing for 16 different instruments or voice inputs

Identify the characteristics of a desktop computer.

-Desktops allow for relatively easy upgrade and expansion. -Desktops are often used in offices since they don't need to be mobile. -Desktops use a full OS.

USB (Universal Serial Bus)

-Enables communications between digital devices -Allows for data transfer between devices and for devices to be electrically charged -Sometimes referred to as thumb drives, flash drives, or jump drives -Use solid-state flash memory to store information on an internal memory chip -Allow for fast data transfer, are inexpensive, and durable

Intel Corporation

-Founded in 1968 -World's largest manufacturer of processors

AMD

-Founded in 1969 -Featured inside every major next generation gaming console and home entertainment system

Select the e-mail services.

-Gmail -Outlook -iCloud

Why buy a laptop?

-Great for people who need a portable digital device -Has more computing power than a tablet or phone -Come with the capability of having more memory added

Memory Cache

-High Speed memory used by CPU to store frequently accessed data and instructions :L1 cache is small and integrated into the CPU :L3 cache

Cache

-High-speed storage usually located on the CPU -Smaller but faster than RAM -Used to quickly access repeated instructions

Tablet Characteristics

-Highly mobile -Use touchscreen technology as main input method -Cannot be upgraded -Smaller OS than laptops, making them less powerful

Select the usual roles of information systems (IS) technicians.

-Installing IS hardware and software. -Maintaining IS hardware and software. -Repairing and replacing IS hardware and software.

Why buy a tablet?

-Light yet powerful -Good for reading emails, gaming, and travel -Often used by doctors or by servers -Can add a keyboard

Control Unit

-Locates, analyzes, and executes each program instruction residing in memory -Tells the computer's memory, ALU, and input and output devices how to respond to a program's instructions

Laptop Characteristics

-Mobile hinged and folding -Integrated keyboard -Come with a full operating system

Select the usual tasks of database administrators (DBAs).

-Monitors the database's performance. -Develops and maintains the database itself. -Establishes user privileges for the database to help protect the data.

RAM

-Random Access Memory -The memory available to programs to execute tasks -Temporary storage area and is cleared when a device is powered off

Select appropriate business e-mail etiquette practices.

-Remember that potentially negative news is best given face-to-face. -Keep attachments small.

Overclocking

-Running a processor at a higher frequency than is recommended by the manufacturer -Can result in an unstable system -A popular thing to do when a computer is used for gaming -Can increase performance and speed -Can void manufacturer warranty

HDMI (High-Definition Multimedia Interface)

-Standard interface for audio-video connectivity -Allows for transmission of high-definition audio and video signals

Desktop Characteristics

-Stationary devices that consist of a separate case called the system unit -Monitor, keyboard, and mouse are connected to the system unit -The system unit houses the main components of the computer (sometimes called the computer's chassis) -Allow for relatively easy hardware upgrades

ROM (Read Only Memory)

-Storage area in a digital device that is installed by the digital manufacturer -Most can't be altered or removed -Stores a digital device's boot instructions

Downward Compatibility

-The ability of hardware or software to work with data and information produced by older product or software -Most DVD and Blu-ray drives are downward compatible

CPU (Central Processing Unit)

-The brains of the computer where most calculations take place -The most important component of a digital device

Connector

-The specialized end of a cord, plug, or expansion card that connects into a port

Clock Speed

-The speed, or frequency, expressed in MHz, that controls activity on the motherboard and is generated by a crystal or oscillator located somewhere on the motherboard. - Also called clock rate -The speed at which the processor performs the operations required to run a digital device and instructions executed by the digital device

Multicore Processor

-Two or more cores that are responsible for processing -Has the ability to execute two or more sets of instructions at the same time (hyperthreading)

Blu-ray

-Type of optical media -Can store up to 50 GB of data

DVD (Digital Versatile Disc)

-Type of optical media -Can store up to 8.5 GB -Most DVD drives are capable of reading CDs and DVDs

Optical Drive

-Writes and reads data using lasers -Works by rating an inserted disc -The disc is then read with a laser beam within the optical drive's read/write head

When reporting a computer ethics violation of a co-worker to your employer, it's important to ________.

-be brief and direct -state only what you witnessed

Important considerations when purchasing a new tablet computer include which 3 items

-the amount of RAM it has -the size of the screen -the amount of storage it has

Place the following steps in order for the process of uninstalling a program from a Chromebook.

1. Click the launcher (circle icon). 2. Right-click the unwanted app 3. Select uninstall or remove from Chrome. 4. Click Remove.

Place the following steps in order to attach a Document from your documents folder to an e-mail in Outlook.

1. Go to Outlook (log in if necessary) and create your message. 2.Click Attach (also indicated by a paper clip symbol). 3. Select Computer. 4.Select Documents. 5. Double-click the desired file and select Attach as a copy.

Put the following steps in order for creating a new e-mail message in Microsoft Outlook.

1. Open Outlook (log in if necessary). 2. Click New. 3. Enter the recipient's address in the To area. 4. Type the subject in the Subject area. 5. Type your message in the area beneath the formatting buttons. 6. Click Send.

Match the business information activity with the appropriate management level.

1.Use information systems to foresee corporate opportunities and threats.(Top-Level Management). 2.Use information systems for communicating policies and performance reports up and down the corporate ladder.(Middle Management). 3.Use information systems for recording line employee performance.(First Level Managers).

An application that navigates all of the files and folders on your Mac is the ________.

Finder

Which of the following is a strength of the Linux platform?

Free to download and use

Disk Cache

High speed memory used by the hard drive to store frequently accessed data

Most tablets and phones use ________ as their main storage device.

SSD


Ensembles d'études connexes

Our Communities: Where Communities are Located, Three Types of Communities

View Set

Diabetes Insipidus AND SIADH MY NOTES

View Set

psyc 101 exam 3, ch6 (online test)

View Set

Drivers training segment 2 made by me

View Set

§ 15. Цивільна правоздатність і цивільна дієздатність. Обсяг цивільної правосуб'єктності неповнолітніх.

View Set