exam 2 cgs

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Decision Support Systems (DSS)

-typically gathers and organizes information such as inventories, customers, production levels. -provide mid-level and upper-level management with tools to assist them in managing their businesses and organizations.

A smartphone emits approximately ___ watts of microwaves.

0-1

Also known as additive manufacturing (AM), ___ printing sprays successive layers of material to create an object.

3D

Sometimes used to create prototype models for casting, ___ printing is also known as additive manufacturing.

3D

Most new cell phones today come with approximately ___ of RAM.

500 MB - 2 GB

After the code has been written there are nearly always mistakes. The 4th step in the PDLC involves finding and correcting these errors in a process called ___ .

???

If you plan to write software for PC games you should probably learn C or ___ .

C++

The coding step of the PDLC might use which of the following languages?

C++

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?

DSS

What technology allows for the electronic communication of business oriented transactions and information between people and organizations?

EDI

A port that allows the transfer of high quality video and audio signals is called a(n) ___ port.

HDMI

Amazon offers 2 lines of tablet computers, the Amazon Fire and the Amazon Fire ___ .

HDX

Television displays with resolutions of at least 3840 x 2160 pixels are referred to as ___ .

UltraHD

The mouse was developed by which company?

apple

A program that takes an entire program, check the source code for errors, and converts it into machine language is a ___ .

complier

A description of the difference in the luminance of a display's white pixels compared to the black pixels is called ___ .

contrast ratio

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___.

corruption

A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is called _____ Commons.

creative

Before you can start tethering, verify that it's included in your cell phone's ___ plan

data

The distance between two adjacent sub-pixels on a display is referred to as ___ .

dot pitch

The term that describes how fast each pixel in a display is updated is ___ .

refresh rate

With optical zoom, resolution ____ when focusing on distant objects.

remains the same

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ___ software.

remote desktop

If you're in an area where your home network has no cell coverage, you may need to use the cellular network of a different provider. This is called ___ .

roaming

The accuracy of a digital recording is determined by the device's ___ rate.

sampling

The diagonal measure of the visible display is known as _____ .

screensize

Two main factors concerning your digital identity are privacy and ___.

security

Increased data transfer will be less likely to have errors if you use a ___ USB cord.

shorter

Ironically, the expenses for calling and ___ are among the smallest charges found on a cell phone bill.

texting

The most common printers for printing receipts are ___ printers.

thermal

Because of the popularity and bandwidth demands of video streaming, ___ data plans are not as common as they were in the past.

unlimited

WhatsApp users can create groups, and send _____ images, video and audio messages for free.

unlimited

Some apps that use a surprising amount of data are those that include embedded ___ .

video

The technology that uses cameras, microphones, displays, speakers and software to allow users to both see and hear each other is called ______.

video conferencing

In urban areas, the cell towers become more numerous and the cell signals transmitted by the cell towers are ___, than those in less populated areas.

weaker

A camera that takes photos or steams video into a computer or over the Internet is called a ___ .

webcam

If your debit card has been compromised U.S. Federal law says you are only liable for a maximum of _____ in fraudulent charges if you tell your bank within two business days of learning about them.

$50

If your debit card has been compromised and you wait more than two days, but fewer than two months after you learn about the loss, you can be liable for up to _____.

$500

Enterprise Resource Planning (ERP)

-The data collected, stored, and processed by ERP software typically includes supply purchasing and inventory, production levels or service delivery, marketing information, shipping and payment information, financing records, and human resource management records. -Business management software that encompasses nearly all business activities in a corporation is called ___ software.

Executive support systems (ESS) or Executive information systems (EIS)

-provide management information for senior managers such as company presidents and chief executive officers.

Business owners, copyright holders, and network administrators publish ___ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.

AUPs

The 3rd generation programming language that most students learned when most computers used MS DOS was ___ . It remains a safe programming language for using 3rd party code and provides a coding standard that integrates easily with other programming languages.

BASIC

Which of the following statements about Facebook is true?

Cyberstalking and online predators are a real problem on Facebook.

Printer manufacturers advertise the quality of their products by stating how many ___ they produce.

DPI

Which is true regarding the length of a USB cord?

In general, the more data being transmitted, the shorter the cord should be.

All of the following statements about Instagram are true except

Instagram is difficult to integrate with apps like Facebook and Foursquare.

An object-oriented programming language that is popular for writing apps for Android phones and tablets is ___ .

Java

The technology (chips) that allow cell phone microphones and hearing aids to be so small is the _____ chip.

MEMS

This technology allows musicians to create written sheet music simply by playing an instrument.

MIDI

One advantage that the Samsung tablets have over the iPads is that you can add ___ to the Note or Tab.

MicroSD storage

Apple Pay uses _____ for payment transfer.

NFC

The technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called.

OMR

Printer speed is described using which acronym?

PPM

When you personally share an image on Pinterest it is known as a _____.

Pin

RFID stands for which of the following.

Radio Frequency Identification

Since it comes with a full computer operating system, some consider the ___ a laptop computer rather than a tablet computer.

Surface Pro 4

Smartphone cameras work by focusing incoming light onto what type of array that captures images?

active pixel scanner

A test of new software conducted by the programmers themselves or by contracted evaluators working alongside the programmers is one of the first phases of the testing process in the PDLC. This is referred to as a(n) ___ test.

alpha

In order to change sound waves into digital signals, smartphones contain ___ - digital converter.

analog

The second step of the SDLC involves collecting data about existing hardware and software, analyzing this data, and preparing specifications for the system. What is this step called?

analysis

The second step of the SDLC process involves collecting data about existing hardware and software, analyzing this data, and preparing specifications for the system. This is called the system ___ step.

analysis

This technology provides short-distance wireless communication between electronic devices using extremely low power radio signals.

bluetooth

Most touchpads use _____ to sense when a finger has moved across the pad.

capacitance

The technology that allows any text, even handwritten scrawls, to be digitized is known as optical ___ recognition.

character

Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on ____ .

checks

The number of bits of data describing each pixel in a display is referred to as ___ .

color depth

Defining the problem is the ___ step in the Program Development Life Cycle.

first

A graphic representation of a process is called a ___ .

flowchart

After the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a ___ and is written in an ordinary language, such as English.

flowchart

Number of times per second a frame in a video is advanced is the definition of ___ .

frame rate

This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery.

gait analysis

All of the following are true about RFID except

high-frequency RFID can transmit signals further than 1500 feet.

Third party apps must be reviewed and approved by Apple before being available for the ___ .

iOS

While many 3rd party apps are available through its App Store, apps for ___ must first be tested and approved before they're made available for downloading.

iPhones

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the ___ .

information systems (information technology) program manager

These facilitate getting data and information into your computer.

input devices

To protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products, there are ___ property laws.

intellectual

Lower range tones generally require ___ speakers.

larger

The standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or _____.

netiquette

All of the following are part of an RFID system except _____.

network

Though legal, which of the following would likely be prohibited by a typical business computer-use policy?

online personal shopping

All of the following are protected against unauthorized use or distribution by intellectual property laws except

open educational resources.

In photography, there are 2 ways to focus on distant objects, digital zoom and ____ zoom.

optical

Using reflective material to store data that can be read using a laser is called ___ media storage.

optical

A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a ___ .

plotter

All of the following are best practices when using LinkedIn except

post vacation photos to show your friends where you've traveled.

The number of pixels in an image is called the image's ____ .

resolution

Social networking is based on the six degrees of _____ concept which posits that you can connect with anyone through a chain of no more than six introductions or personal links.

separation

After verifying that your data plan includes tethering, the first step in creating a hotspot with your Android phone is to click on the ___ icon.

settings

Pseudocode is written in natural language, but often including programming ___ to assist in writing the program itself. Pseudocode is the term that describes an intermediate step in creating an algorithm from a flowchart.

shorthand

The small computer within your phone that enhances the sound quality of your call is called a digital ___ processor.

signal

Select the program you would use if you want to write apps for the iPhone.

swift

The cell tower's base transmission station is connected to a mobile ___ station.

switching

Connecting your phone to your laptop to transfer photos, videos, or music files is referred to as ___ .

syncing

Along with the From line, what is the most important factor in ensuring your business message is read?

the subject line

Select the smartphone input device.

touchscreen or keyboard

A 3rd generation programming language that allows BASIC to be used with the advantages of a graphical user interface is ___ Basic.

visual

A tablet is a highly-mobile computer with a mobile operating system and a touchscreen rather than a keyboard/touchpad. To differentiate a tablet from a smartphone, a tablet is generally understood to have a screensize of at least ___ inches.

7

A set of programs that allow data to be exchanged on a website without changing the website's display is ___ .

AJAX

Though currently expensive, curved and paper-thin displays are possible using ___ display technology.

OLED

A program that can be used to convert a single line of C# into machine language without having to compile the entire program is called a C# ___

interpreter

Another term for a programming code is a programming ___ .

language

The first step in the program development life cycle is "Defining the ____."

problem

Laser printers are popular in offices because they use relatively inexpensive ___ .

toner

Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?

top level managers

EDI (Electronic Data Interchange)

-allows for the electronic communication of business oriented transactions and information between people and organizations.

Supply chain management software (SCMS)

-combines the capability of transaction processing systems (TPS) software with the forecasting of decision support system (DSS) software to help businesses manage inventories efficiently.

An acceptable use policy (AUP)

-is a written document that provides a framework of rules to be followed by users of computers, networks, websites, and computer resources such as printers and scanners.

Transaction processing systems (TPS)

-track sales and inventories for an organization. -compiles the gathered information into a database where it can be analyzed or used for decision making or by decision support system software.

Twitter recommends using no more than ___ hashtags per Tweet.

2

In the United States the federal _____ covers most consumer oriented electronic transactions.

EFT Act

Business management software that encompasses nearly all business activities in a corporation is called ___ software.

ERP

The titles in the DMCA that directly impact digital copyright issues include all of the following except

Title 5 - Copyright Protection Proviso.

What type of port do most digital devices use to attach peripherals?

USB port

AJAX stands for ___ JavaScript and XML.

asynchronous

A device commonly used for checkout in stores, that measures the reflection of a laser beam, is called a ___ reader.

barcode

Cell towers are connected to ___ .

base transceiver stations

Inkjet printers are often sold ____ their production cost.

below

If it can be answered as either yes or no, or true or false, the question is called ___ .

binary

Using a stylus and touchpad to map the signature and also measure pressure, pen angle, pen up/down, speed, etc, is known as what type of signature recognition?

dynamic

The largest category of apps, both in terms of active downloads and in terms of revenue generated is ___ .

game apps

In order to sync your iPhone to your MacBook you must first open the ___ app.

iTunes

All of the following should be considered when using Twitter except

if a Twitter user has been blocked you can file a formal complaint through Twitter.

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ___

information systems (information technology) technician

Sometimes used in smaller business networks, employee ___ software is impractical for large networks because of the number of users and the potential for misuse.

monitoring

JSON stands for JavaScript ___ Notation.

object

Which of the following is an email program?

outlook

A combination input and output device that allows users to interact with large computer displays that is sometimes found in classrooms is called an interactive whiteboard or a ___.

smartboard

Sharing an Internet connection between two digital devices, for example, using your smartphone to create a hotspot and then using the hotspot to connect your laptop to the Internet, is referred to as ___ .

tethering

Relatively rugged, water-resistant video cameras that allow users to film high-definition video under harsh conditions, such as on ski mountains, in the ocean, or at high altitudes are called extreme-action video cameras or simply a ___ .

GoPro

While not technically a programming language, ___ refers to the protocols that allow content to display on the web.

HTML

Transferring a file from the Internet to your digital device is called _____.

downloading

After the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a flowchart, and is in written in an ordinary language, such as ___ .

english

The art and science of creating output that provides information in the most useful manner is called ___ .

ergonomics

When referring to business information technology, MIS stands for ___ .

management information systems

Cell phones send and receive extremely weak ___ signals to and from cell towers.

microwave

An output device that uses light to display video or image output on a surface is called a ___ .

projector

When copyrighted software is illegally copied, distributed, modified or sold and is considered direct copyright infringement this is called_____ _____.

software piracy

To improve the sound quality of their smartphones, many users purchase larger external ___ to listen to music.

speakers

Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss.You observe a co-worker visiting porn sites at work and determine that you should report this activity.Other co-workers also noticed this violation. You should

tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.

A businesses brand is derived from all of the following except ______ .

what their competition perceived them to be

EDI stands for ___ .

Electronic Data Interchange

Designed to display documents on the web, this version of the HTML set of protocols provides a smooth interface between natural language and machine language by wrapping data in "tags" for web display.

Extensible Markup Language

All of the following are considered e-commerce transactions except

G2B

Because it locates cellular devices, assigns frequencies, transmits signals to the correct sites, the ___ is probably the most important part of any cellular network.

Mobile Switching Station (MSS)

Which category of management information systems (MIS) focuses on tracking sales and inventories?

TPS

HTML and it's 5th revision (HTML5) allow content to be displayed on ___ .

The World Wide Web

The final steps in the PDLC process include testing and documenting the software. When testing is conducted by potential customers of the software, it's referred to as a(n) ___ test.

beta

Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a(n) ___, which closes the access point used by the hacker.

block

Being able to surf the web, watch videos, and listen to steaming audio is why cell service with a ___ plan is extremely popular in the U.S.

data

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___ .

data analyst

Stealing confidential materials such as copyrighted material, confidential information, or company emails from a network is called ___ . Most often, this crime is committed by employees inside the company rather than outside hackers.

data theft

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ___ .

database administrator (DBA)

The devices inside your phone that convert analog waves (such as sound waves) into digital signals that your phone can process are called ___ .

digital - analog converters

The level of complexity of the programming language, or the degree from which it is separated from machine language itself, is called the ___ of the programming language.

generation

In the body of a professionally formatted business email, where should a request be placed?

in the first sentence of the body of your email

The third step of the SDLC has 3 phases, specifically, developing several system proposals, selecting the most feasible proposal, and reporting on the selected system to be developed. This step is called the system ___ step.

introduction or design ?????

Select the program that uses small programs called scripts to speed the programming process while creating dynamic Web pages.

javascript

Because of their compact size, touchpads are most often used with _____ computers.

laptop

Because of the large infrastructure cost of building antennae and mobile switching stations, as well as leasing the rights to use radio frequencies, only ___ companies can compete nationally as cell phone providers.

larger

A process that has an initial value, a process, and a test condition that can potentially return the program to the initial value is called a ___ .

loop

Even a small degree of programming skill can be beneficial. Many apps allow you to create mini-programs that reduce the number of routine steps required to complete a task. These mini-programs are called ___ .

macros

The final step in the SDLC has two phases, a system audit and an evaluation phase. This final step is referred to as ___ the system.

maintaining

Be careful to only open email from senders you know and trust. ___ may be contained in email messages.

malware

BitTorrent utilizes no central server, instead opting to utilize a _____ structure where each device connected to a network has equal access to the shared files.

peer to peer

An input, output or storage device connected to a computer is known as a(an) _____ .

peripheral

If you just need a phone for emergencies, you might consider a ___ phone.

prepaid

On Facebook your _____ is a collection of the photos and stories that tell people about you and your experiences.

profile

Converting a task into commands that a computer can use to perform the task is called ___ .

programming

Written in natural language, but often including programming shorthand to assist in writing the program itself, ___ is the term that describes an intermediate step in creating an algorithm from a flowchart.

pseudocode

Sometimes, particularly when travelling, you may find yourself in an area where your home network has no cell coverage, but another network does have service. Using a different network is referred to as ___ .

roaming

To create an image with a laser printer ___ is(are) drawn to the drum.

toner

The main governmental organization that oversees Internet privacy is the Federal ___ Commission.

trade

With ____ recognition technologies, frequency, pitch, speech rhythms and other characteristics are charted and compared to existing records.

voice

Most laptops, tablets, and smartphones use a(n) ___ display.

LCD

A form of Email fraud where criminals change the account where money is being transferred is called a ___ scam.

wire-wire

Personal branding can be accomplished digitally and in more traditional means including all of the following except _____ .

writing private journal entries

There are risks associated with downloading content from the Internet. It is important to consider all of the following when downloading from the Internet except

your anti-virus software will ensure your files are safe


Ensembles d'études connexes

Most Missed Questions (Guarantee Exam)

View Set

Chapter 7: Mapping to Identify Possible Factors

View Set