MIS2223 Exam 1 Chp. 1,3,7

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A retailer who needs to increase bandwidth and other capabilities during the holiday shopping season might rely on ______ to temporarily increase their capabilities and then reduce them after the busy season. -IaaS -STaaS -DaaS -PaaS

-IaaS

What is the primary difference between a desktop and an all-in-one computer? Group of answer choices -In an all-in-one, the monitor and system unit are housed together. -Desktops typically are harder to service or upgrade. -A desktop is easier to transport -All-in-ones come with an operating system, but desktops do not.

-In an all-in-one, the monitor and system unit are housed together.

Why is cryptocurrency more vulnerable than a national currency? Group of answer choices -It is only valuable if many people use it. -Users can forget they have it since there is no card or statement. -It is illegal in most countries. -It isn't backed or secured by a government.

-It isn't backed or secured by a government.

Which of the following is true about SSDs? -SSDs are slower and less durable than magnetic drives. -SSD stands for standard-state drive. -An SSD is a hard drive with moving parts. -SSDs often are used on mobile devices.

-SSDs often are used on mobile devices.

Which of the following is not true about the machine cycle? ​ -Storing means writing the result to a storage medium (not to memory). -Fetching is the process of obtaining a program, instruction, or data from memory. -Decoding refers to the process of translating instruction into signals the computer can execute. -Executing is the process of carrying out the commands.

-Storing means writing the result to a storage medium (not to memory).

Netiquette rules only apply to social media. Group of answer choices -True -False

-False

One advantage of uploading files to the cloud is that you don't need to keep an additional backup of those files. -True -False

-False

Touchpads and trackballs are examples of keyboard types. Group of answer choices -True -False

-False

When using a computer, the most common storage medium is optical media. Group of answer choices -True -False

-False

Wi-Fi is short for wired fidelity. Group of answer choices -True -False

-False

You should always back up programs and apps even if you have access to the installation media or files. Group of answer choices -True -False

-False

Willow works for an architectural firm. She needs to print out blueprints for a project. She should use a/n ______ printer. -laser -plotter -3-D -MFD

-plotter

A slot on a computer where you can attach a peripheral device is called a/n ______. Group of answer choices -port -niche -window -dock

-port

Some users choose cloud service because of its scalability, which means that it ______. -doesn't require the user to use floor space for servers and storage devices -provides the flexibility to increase or decrease computing requirements as needed -relies on expensive servers that the user doesn't have to invest in -has faster upstream and downstream times than an external hard drive

-provides the flexibility to increase or decrease computing requirements as needed

Kyla is helping her roommate set up her home office to reduce the risk of RSI. Which of the following is not a recommended guideline? Group of answer choices -A chair should have 4 or 5 legs and adjustable height. -Arms and hands should be perpendicular to the floor. -The viewing distance should be 18 to 28 inches. -Feet should be flat on the floor.

-Arms and hands should be perpendicular to the floor.

Which of the following are not recommended practices for protecting your privacy? (choose 2) Group of answer choices -Shred financial documents before discarding them. -Be cautious about what information is posted on social networking sites. -Carry your Social Security number in your wallet. -Only provide personal information over the phone or through an email message.

-Carry your Social Security number in your wallet. -Only provide personal information over the phone or through an email message.

Which of the following is not true about how computers represent data? Group of answer choices -The binary system has two digits, 0 and 1. -ASCII and Unicode are two examples of text coding schemes. -Each 0 or 1 is called a byte. -As you type, the computer translates characters into bits and bytes.

-Each 0 or 1 is called a byte.

Because the device will be taken apart and reassembled, it is not necessary to remove your data before you recycle a device. Group of answer choices -True -False

-False

If a hard disk uses perpendicular recording, magnetic particles align horizontally, parallel to the surface of the disk. Group of answer choices -True -False

-False

Notebook is another term for tablet. Group of answer choices -True -False

-False

Secure websites often require you enter extra personal information, such as a username and password to another account. Group of answer choices -True -False

-False

Steve Wozniak was one of the founders of IBM. Group of answer choices -True -False

-False

The most complicated RAID storage design is called mirroring. Group of answer choices -True -False

-False

Which of the following is not true about an NIC? Group of answer choices -NIC stands for network interface card. -NICs only are used to connect a computer to a wireless network. -NICs often are internal to a device. -NICs connect a computer to a network.

-NICs only are used to connect a computer to a wireless network.

Why is it important to understand whether or not your cloud storage provider can collect data about what you upload, download, or create? Group of answer choices -Some providers create data profiles and sell them to marketers. -If they don't collect this data, they cannot encrypt your data. -If they collect this data, they can make it easier to you to find important files. -Your activities can be used to infect you with malware.

-Some providers create data profiles and sell them to marketers.

Which of the following is not true about read/write heads? Group of answer choices -A head actuator on the hard disk attaches to arms that move it. -The mechanism presses down hard on the disk's recording surface. -Each platter has two read/write heads, one for each side. -The platter spins to create a cushion of air between it and the read/write head.

-The mechanism presses down hard on the disk's recording surface.

A processor cache stores data next to the processor so that it can easily and quickly be retrieved. Group of answer choices -True -False

-True

Accessibility is the practice of removing barriers that may prevent individuals with disabilities from interacting with data, a website, or an app. Group of answer choices -True -False

-True

An integrated circuit contains many microscopic pathways capable of carrying electrical current. Group of answer choices -True -False

-True

Computer parts contain toxic metals, such as lead and mercury. Group of answer choices -True -False

-True

Malware is malicious software, such as viruses and spyware. Group of answer choices -True -False

-True

Saving files to optical media requires special software or capabilities within the operating system. Group of answer choices -True -False

-True

Storage refers to long-term, permanent access of data and information. Group of answer choices -True -False

-True

An external hard drive typically connects to your computer using a/n ______. Group of answer choices -wireless signal -USB cable -optical disc -infrared light

-USB cable

Which of the following is not a type of optical media? Group of answer choices -CD -DVD -USB drive -Blu-ray disc

-USB drive

Which of the following would be unlikely to be included in an AUP? Group of answer choices -guidelines for Internet use -a code of conduct -coverage of actions that waste company resources -a list of network passwords

-a list of network passwords

What happens when you restore an operating system? Group of answer choices -the system syncs back to its last data backup -all settings revert back to their default or migrate back to a previous version -new updates and security patches are installed -the operating system repairs itself from damage

-all settings revert back to their default or migrate back to a previous version

Processors today typically are superscalar, which means that they ______. Group of answer choices -are optimized for broadband connections -provide global access to the Internet -can operate at extreme temperatures -can execute more than one instruction per clock cycle

-can execute more than one instruction per clock cycle

Kari uses a modem in her home network in order to ______. Group of answer choices -connect her network to her ISP -hide her network's IP address -authorize users of the network -boost the network's signal

-connect her network to her ISP

"Hands-free" laws are designed to prevent ______. Group of answer choices -distracted driving -cyberbullying -workplace harassment -corporate espionage

-distracted driving

Flash is type of nonvolatile memory that can be ______. Group of answer choices -converted to ROM as needed -removed and transferred to another device -erased electronically and rewritten -automatically encrypted

-erased electronically and rewritten

A chip is a small piece of semiconducting material on which ______ are etched. Group of answer choices -network nodes -integrated circuits -IP addresses -encryption codes

-integrated circuits

Retailers sometimes use beacons, which are devices that send ______ signals to nearby smartphones. Group of answer choice -low-energy Bluetooth -high-frequency RFI -Decrypted infrared -push/pull notification

-low-energy Bluetooth

The RAID striping technique improves access times but does not ______. Group of answer choices -provide secure backups -require encryption -offer data duplication -outperform mirroring

-offer data duplication

Oleksandra wants a community to share her photos and videos with others. She should use a/n ______. Group of answer choices -wireless network -digital database -online social network -chatbot

-online social network

Zach is a new driver, and has been reading about how to avoid distracted driving. Which of the following should Zach not do? -ask his passengers to call or text for him -secure his dog -set up his GPS while driving -turn off or silence his phone

-set up his GPS while driving

Linh has replaced her desktop monitor with a new touchscreen monitor. For what purpose would she need a device driver? Group of answer choices -to attach the monitor cord to the desktop's system unit -to train the monitor's touch capabilities to recognize her gestures to register the monitor in order to receive automatic updates -to allow her computer to issue controls to the monitor

-to allow her computer to issue controls to the monitor

Some productivity apps prompt users to add alt text and sometimes provide suggested alt text content. Group of answer choices -True -False

Some productivity apps prompt users to add alt text and sometimes provide suggested alt text content.

Which of the following best defines the term network? -Two or more computers connected together to share resources. -A powerful, high-capacity computer you access using the Internet. -A global collection of millions of computers linked together to share information. -A group of collaborative tools used to create apps.

Two or more computers connected together to share resources.

Mina is doing research before buying her first car. She lives in an area with a lot of snow and ice during the winter, so she wants one that has electronic stability control. During her research, she finds that this technology is included in many cars using a/n ______ computer. Group of answer choices -Bluetooth -remote-controlled -adaptive -embedded

embedded

Nico is creating a website. Why should Nico make sure to add alt text to his website objects? -for a screen reader to read the text out loud so that the user can understand the image and its purpose -so a user whose first language is not English can read the content -in case he forgets what the object's purpose is when he goes back to make edits -in order to provide scrolling captions for any videos he includes

for a screen reader to read the text out loud so that the user can understand the image and its purpose

Daniele uses CAM in her workplace. What activity might Daniele do with this technology? -use a monitoring device to collect a patient's vital signs -instruct a robot to paint a car's body -find the most efficient route for a delivery truck -post assignments and lectures for her students

instruct a robot to paint a car's body

Interactive white boards and social networking tools are examples of technology used to create a/n ______ classroom. ​ -intelligent -digital -global -virtual

intelligent

To whom does the IDEA apply? -individual consumers -website creators -public schools -companies with 15 or more employees

public schools

Which of the following best defines convergence as it relates to technology? Group of answer choices -the increasing integration of technological capabilities on a growing number of previously unrelated devices -the tendency of apps to become more functional as usage increases -the relative importance of a platform as it gains more users -the narrowing scope of function of standalone devices

the increasing integration of technological capabilities on a growing number of previously unrelated devices

Examples of volatile memory include flash memory and CMOS. Group of answer choices -True -False

-False

M2M communications refer to communications between mobile users. Group of answer choices -True -False

-False

Most RAM is nonvolatile. Group of answer choices -True -False

-False

Evernote is an example of a tool you can use to synchronize your notes with popular cloud storage providers. -True -False

-False

Data brokers use illegal tactics to gather your personal information for misuse. -True -False

-False

Which of the following best defines doxxing? Group of answer choices -A virus infects a user's files, making them inaccessible to the user. -A user's online activities are tracked and used to send phishing messages. -A form of cyberbullying in which private or personal information about a person is shared digitally. -A user's posture while using devices results in numbness to the arms and fingers.

-A form of cyberbullying in which private or personal information about a person is shared digitally.

Thea recently was a victim of pretexting. Which of the following best describes what might have happened to Thea? -An attacker called her pretending to be from a legitimate research firm and asked her for personal information. -Using a change-of-address form, an attacker diverted her mail to a post office box so that she didn't see the changes made. -Her wallet was stolen and the thief used information in the documents it contained to commit identity theft. -She answered a query on an online social media site that revealed information that enabled an attacker to determine her passwords.

-An attacker called her pretending to be from a legitimate research firm and asked her for personal information.

Which of the following is true about game consoles and handheld gaming devices? -Both are Internet capable and allow you to listen to music and watch TV or movies. -Both are small enough to fit in one hand. -Game consoles typically include a small screen used to play the game. -Game consoles are more portable.

-Both are Internet capable and allow you to listen to music and watch TV or movies.

A government agency that wants to make data available to developers to incorporate into applications might rely on ______ to provide access. -IaaS -STaaS -DaaS -PaaS

-DaaS

Which two government agencies developed the ENERGY STAR program? -Department of Energy -State Department -Green partyEnvironmental -Protection Agency

-Department of Energy -Environmental Protection Agency

Which of the following are examples of first generation computers? -ENIAC -UNIVAC -Apple II -IBM PC

-ENIAC -UNIVAC

A processor's clock speed is also referred to as the word size. Group of answer choices -True -False

-False

A sector is one of the series of concentric circles on one of the surfaces of a magnetic hard disk platter. -True -False

-False

A slate tablet has a screen in its lid and a keyboard in its base. -True -False

-False

An SSD typically has higher storage capacity than a hard disk. Group of answer choices -True -False

-False

Being digitally literate is the the same as being a responsible digital citizen. -True -False

-False

Cyberbullying is considered less harmful than other types of bullying. -True -False

-False

Which of the following best describes Plug-and-Play devices? -They require an external battery source and are used to display digital media. -They are complex hardware devices that require a professional to install before use. -They begin functioning properly as soon as you connect them to your computer. -They include safety precautions such as parental controls.

-They begin functioning properly as soon as you connect them to your computer.

A surge suppressor is a device that prevents power fluctuations from damaging electronic components. Group of answer choices -True -False

-True

An all-in-one computer is a type of desktop that does not contain a tower and instead uses the same case to house the display and processing circuitry. Group of answer choices -True -False

-True

Automated vehicles increase transportation options for people with disabilities. Group of answer choices -True -False

-True

Desktop as a Service also is known as a virtual desktop. Group of answer choices -True -False

-True

Digital distraction is the practice of using and relying on technology so much that you do not pay enough attention to normal, everyday activities. Group of answer choices -True -False

-True

Information is data that has been processed to become meaningful. Group of answer choices -True -False

-True

It is a good idea to fully charge the battery before using a device for the first time. -True -False

-True

Items stored in memory have faster transfer rates than items in storage. -True -False

-True

LinkedIn is a social networking site designed to provide business and employment-oriented opportunities. -True -False

-True

Managing your passwords using an app is a recommended security practice. -True -False

-True

Missouri's cyberbullying law requires schools to report any instances of cyberbullying, and states that perpetrators can be convicted of a felony. -True -False

-True

Most ISPs offer broadband connectivity capable of transmitting large amounts of data at high speeds. ​ Group of answer choices -True -False

-True

No federal law specifically addresses doxxing. -True -False

-True

RSI most often impacts the upper parts of the body. -True -False

-True

Researchers predict billions of devices will be part of the IoT in the next few years. -True -False

-True

Some cloud storage providers allow you only to back up a certain type of file, such as photos. Group of answer choices -True -False

-True

Technology-related inattentional blindness is also called digital distraction. Group of answer choices -True -False

-True

Venmo is an example of a payment app. Group of answer choices -True -False

-True

When you are finished using an application, the operating system removes it from RAM, but it remains on the storage medium. Group of answer choices -True -False

-True

With a personal cloud, you maintain the storage device on which the files are located. -True -False

-True

With cloud storage, you might not require as much storage on your computer. ​ Group of answer choices -True -False

-True

Depending on how the magnetic particles on a hard disk are aligned, they represent either ______. -RAM or ROM -data or information -a 0 bit or a 1 bit -a GB or a TB

-a 0 bit or a 1 bit

Which of the following best defines the role of a node on a network? Group of answer choices -the wired connection between a device and a server -a device on the network -it provides a method to communicate between devices -a cloud-based server

-a device on the network

Who might use a LMS to set up a site for their users? -a teacher -a doctor -a manufacturer's representative -a transportation worker

-a teacher

PaaS might be used to ______. Group of answer choices -provide a portal for content publishers to serve up customizable content to users -optimize a large company's enterprise systems by partnering with a cloud service -allow a developer to create and test a solution without having to purchase the underlying hardware or software. -enable small business and individual users to access productivity apps available to larger organizations

-allow a developer to create and test a solution without having to purchase the underlying hardware or software.

Apple's AirTag is an IoT devices that enables you to ______. Group of answer choices -remotely access your smart home devices -attach a tracker to your phone or other item -ping your friends when they are nearby -save your personal passwords

-attach a tracker to your phone or other item

CMOS technology retains information using ______. Group of answer choices -battery power -semiconducting chips -cloud memory -the operating system

-battery power

Carson started a new job where he will be telecommuting. Which of the following is not a recommended practice for telecommuting? Group of answer choices -use noise cancelling headphones -use a filtered background provided by a conferencing app -turn the desk to face the wall if in a shared space with others -be available at all times

-be available at all times

Danillo is hearing impaired. He uses a/n ______ app in order to display text for dialogue in videos. Group of answer choices -captioning -scrolling -inscription -alt text

-captioning

The ethical, legal, and productive use of technology are aspects of being a digital ______. Group of answer choices -expert -native -denizen -citizen

-citizen

To whom does the ADA apply? -individual consumers -website creators -public schools -companies with 15 or more employees

-companies with 15 or more employees

Ergonomics is an applied science that specifies the ______. Group of answer choices -guidelines for companies regarding telecommuting, offshoring, and outsourcing -design and arrangement of items that you use so that you and the items interact efficiently and safely -behavior rules and etiquette online users should follow -methods and benefits for proper disposal of e-waste to reduce the impact on the environment

-design and arrangement of items that you use so that you and the items interact efficiently and safely

In the workplace, BYOD stands for bring your own ______. Group of answer choices -data -desktop -document -device

-device

Avi is helping his neighbor set up his business network system, which includes offices in three locations. He installs a router in order to ______. Group of answer choices -increase the speed of data flowing upstream -provide encryption to ensure security -direct the flow of information along the networks -identify devices on the network

-direct the flow of information along the networks

Erykah is formatting the hard disk on her computer, which ______. Group of answer choices -divides it into tracks and sectors -gives it a name and unique identifier -erases the factory default files and folders -defines its form factor

-divides it into tracks and sectors

Luke had his personal information stolen after his bank statement was taken out of the trash by an attacker. Luke was a victim of a ______ attack. -phishing -data mining -dumpster diving -garbage troll

-dumpster diving

Memory consists of the following three elements. Group of answer choices -electric components that store instructions waiting to be executed by the processor -data needed by instructions -results of processing data into information -high-speed data connections

-electric components that store instructions waiting to be executed by the processor -data needed by instructions -results of processing data into information

A transistor can act as an electronic switch that opens or closes the circuit for ______. Group of answer choices -network traffic -communications between a device and an ISP -electrical charges -enhancing the capabilities of an integrated circuit

-electrical charges

Memory stores three basic categories of items. Which of the following is not one of these categories? -files that have been created previously -the operating system -applications that carry out a specific task -data being processed and the resulting information

-files that have been created previously

The front end of cloud computing includes the ______. -network connections that interact with the servers -customer service tools with which users can report and resolve issues -data stored on the user's local hard disk or other storage media -hardware and software with which the users interacts to access the cloud

-hardware and software with which the users interacts to access the cloud

Access time measures which two of the following? Group of answer choices -how much time it takes a storage device to locate an item on a storage medium -how much time it takes to upload data to a cloud server -how much time is required to deliver an item from memory to the processor -how much time is required to create an index of a storage medium's contents

-how much time it takes a storage device to locate an item on a storage medium -how much time is required to deliver an item from memory to the processor

A RAID is a group of two or more ______. Group of answer choices -integrated hard drives -local servers -backup generations -wireless hotspots

-integrated hard drives

The defragmentation process is used to address ______. Group of answer choices -scratches on the platter -compressing and uncompressing data files -incompatible program files -issues causes by data being saved to nonconsecutive segments

-issues causes by data being saved to nonconsecutive segments

Which of the following is not a example of an output device? Group of answer choices -keyboard -printer -speaker -headphones

-keyboard

Flash memory storage is more durable than a magnetic hard disk because of its ______. Group of answer choices -reliance on ROM -ceramic platters -lack of moving parts -optical technology

-lack of moving parts

Which of the following best defines Big Data? ​ Group of answer choices -an online community where users share their interests, stories, and more -large and complex data sources that defy easy management with traditional data processing methods -a global collection of millions of computers linked together to share information -the study of technology that helps one become an educated and productive member of the digital world

-large and complex data sources that defy easy management with traditional data processing methods

Today, businesses most often use tape for ______. Group of answer choices -long-term storage and backup -logs of network activity -securing internal hard drive data -syncing data between network devices

-long-term storage and backup

Businesses often use cloud storage for backup, but might also use a tape drive, which is a storage device that stores data on ______ tapes. -optical -CRT -magnetic -USB

-magnetic

The primary purpose of the control unit is to ______. Group of answer choices -create a map of a device's hardware components -manage the flow of instructions within the processor -store an app's output until it is needed -control communication devices

-manage the flow of instructions within the processor

A storage medium's capacity refers to the ______ . Group of answer choices -maximum transfer rate it can tolerate -number of bytes it can hold -ability it has to access virtual memory -access it has to cloud and other external media

-number of bytes it can hold

Which of the following are names of the area of the hard drive temporarily used to store data that cannot fit in RAM? -paging file -swap file -provisional file -interim

-paging file -swap file

A benchmark test determines a computer's _______ factors. -performance -storage -adaptability -compatibility

-performance

NAS is a server that is placed on a network with the sole purpose of ______. Group of answer choices -directing uploads and downloads from a cloud server to the local server -delivering apps over the network to save on local hard drive storage -assigning each node on a network an IP address -providing storage to users, computers, and devices on a network

-providing storage to users, computers, and devices on a network

A very short duration of voltage increase is called a/n ______. -spike -blowout -burst -overflow

-spike

A DSL modem uses ______ to send and receive data. Group of answer choices -standard copper telephone wiring -a cable TV connection -=a virtual server -expensive fiber-optic wiring

-standard copper telephone wiring

Which of the following is not a recommended strategy for green computing? Group of answer choices -store obsolete technology instead of disposing of it -return unusable devices to the manufacturer -encourage employees to telecommute -use power management features for devices

-store obsolete technology instead of disposing of it

For what purpose might you use the website turnitin.com? -submitting an assignment -finding your company's AUP -learning about green computing -reporting distracted driving incidents

-submitting an assignment

A processor contain small, high-speed storage locations, called registers, that ______. -control the temperature to avoid overheating -monitor traffic to and from a network -temporarily hold data and instructions -enhance the device's clock speed

-temporarily hold data and instructions

Eduardo is setting up his online profile and wants to appear professional to potential employers. Which of the following should he not do? -include links to videos he created -enable privacy settings on his personal social media accounts -upload a PDF of his resume -use a humorous nickname for his account profile

-use a humorous nickname for his account profile

The first generation of computers used cylindrical glass tubes that controlled the flow of electrons, called ______ tubes. -flux -distribution -vacuum -circulation

-vacuum

A computer's form factor is ______. -the operating system it uses -the amount of storage it holds -its size and shape -how fast it processes data

its size and shape


Ensembles d'études connexes

A&P 2 Chapter 27 The Male Reproductive System

View Set

Állatrendszertan szigorlati beugró

View Set

Introduction to Pharmacology (Speed Pharmacology)

View Set

Maternal & Child Practice Exam 4

View Set