CGS 2060 Midterm
If your debit card has been compromised U.S. Federal law says you are only liable for a maximum of _____ in fraudulent charges if you tell your bank within two business days of learning about them
$50
If your debit card has been compromised and you wait more than two days, but fewer than two months after you learn about the loss, you can be liable for up to _____.
$500
Select the technologies used by facial recognition software.
- 3D mapping - feature charting - skin texture analysis - capacitance analysis
Select the characteristics of a plotter.
- prints large graphic displays - mechanically moves a pen over a large sheet of paper - uses inexpensive toner rather than ink - paper turns black when heated
How can you attach a mouse or other pointing device to your computer?
- with a Bluetooth connection - with a wire through a USB port
Select what's true regarding uninstalling software
-Be cautious when uninstalling software from the computer manufacturer -Be cautious when uninstalling software from the OS manufacturer. -Uninstalling system software is not recommended.
Which of the following are considered storage media?
-DVDs -Blu-ray discs -external hard drives
Identify the characteristics of a desktop computer.
-Desktops are useful for those who need a computer they can walk around with. -Desktops are often used in offices since they don't need to be mobile. -Desktops allow for relatively easy upgrade and expansion.
Select the true statements regarding Instagram.
-Instagram is a photo sharing app that is available for download to a variety of digital devices.
Select the video file compression formats.
-MP4 -MP3
Select the advantages of using cloud storage.
-Redundancy - data is stored on multiple servers. -Availability - data can be retrieved by any Internet-connected device.
Select the characteristics of RFID.
-Select the characteristics of RFID. -RFID can be used to identify a variety of objects including objects, animals, and people implanted with an active RFID chip -High-frequency RFID can transmit signals further than 1500 feet. RFID doesn't require line of sight scanning.
Which of the following should you consider when buying a new computer?
-What is the cost? -Does it have HDMI ports? -Does it have an SD card slot? -Does it come with Windows XP?
Which of the following statements about Instagram are true?
-Your Profile section on Instagram must be accurate. -It is important to adjust your privacy settings so you can determine who follows you. -If you don't want to be tracked turn off geo-tagging in the settings under Location Services.
Which would be used to store a single bit of data?
-a transistor -a hole in a punch card -a program
When reporting a computer ethics violation of a co-worker to your employer, it's important to ______.
-be brief and direct -state only what you witnessed
Select appropriate LinkedIn contacts.
-business contacts -professional peers
Select the characteristics of a Blu-ray disc.
-holds approximately 25 GB of data -uses pits and lands to store data -a read/write head senses the magnetic charges
Select the characteristics of a CD
-holds approximately 700 MB of data -uses pits and lands to store data
Select the characteristics of a CD.
-holds approximately 700 MB of data -uses pits and lands to store data -a read/write head senses the magnetic charges
A digital identity is comprised of a variety of digital attributes including
-online search activities -the spreadsheet software you're using.
In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer use standards. This includes which of the following?
-periodically reviewing computer-use policies -enforcing standards by creating firewalls, monitoring protocols, and filters -instructing employees on standards
Select the reasons to compress a file.
-reduce storage space requirements -reduce bandwidth needed to transmit a file
Select the characteristics of computer storage.
-retains data when power is turned off -sometimes referred to as secondary storage
Select the factors that should be considered when purchasing external speakers for a digital device.
-sound quality -portability -price
Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should
-tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network. -tell your employer that visiting porn sites while using computer can hurt the company's business if potential customers see this activity. -tell you boss that others have told you that this co-worker frequently visits porn sites at work.
Important considerations when purchasing a new tablet computer include
-the amount of RAM it has. -the size of its screen. -the amount of storage it has.
Select the statements that refer to the term "dot pitch".
-the closer the spacing (the smaller the dot pitch) the sharper the image -the diagonal measurement of the visible display
Select the characteristics of a traditional hard drive.
-uses magnetic charges to store data -has a read/write head to detect magnetic charges -has physically moving platters
The text contained in about 4 books uses approximately ___ times more data than a short email.
1,000
1. MIDI 2. HDMI 3. Plug and Play
1. Capable of carrying digital music signals and are common in today's music scene 2. allows for the transmission of high-definition audio and video signals 3. a technology that enables the OS to detect and configure peripherals without downloading software or drivers
1. Input 2. Storage 3. Output
1. Entering text in a word 2. Putting a photo onto a USB drive (thumbdrive). 3. Playing a song from Spotify.
1. CTRL+V 2. CTRL+P 3. CTRL+Z 4. CTRL+S
1. Paste 2. print 3. undo 4. save
1. CTRL+B 2. CTRL+A 3. CTRL+X 4. CTRL+C
1. bold 2. select all 3. cut 4. copy
1. Input 2. Storage device 3. output
1. game controller, speaker 2.projector, external hard drive 3.hard drive, mouse
Snaps on Snapchat can be viewed for up to ___ seconds (depending on what the user chooses) and then disappear.
10
"Full HD" resolution is expressed as:
1920 x 1080
Twitter recommends using no more than ___ hashtags per Tweet.
2
Personal computer CPU clock speeds range between _______ .
2 to 4 gigahertz
Blu-rays provide approximately ___ of storage space.
25 GB
As of 2017, tweets can be a maximum of ___ characters.
280
Sometimes used to create prototype models for casting, ___ printing is also known as additive manufacturing
3D
Most new laptop computers come with how much storage?
4-8
When you buy a new laptop, how much RAM should it come with?
4-8 GB
A typical laptop has a storage capacity of approximately ____ .
500 GB - 1 TB
FireWire connectors were developed for ______ computers.
Apple
Select the popular video teleconferencing applications.
Apple Facetime microsoft skype google+ Hangouts
AJAX stands for ___ JavaScript and XML
Asynchronous
A short-range wireless transmission protocol is known as _____ .
Bluetooth
Most PC games have been written in either ___ or ___ .
C C++
Which optical drive media stores approximately 700 MBs of data?
CD
Printer manufacturers advertise the quality of their products by stating how many ___ they produce.
DPI
Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?
DSS
What technology allows for the electronic communication of business oriented transactions and information between people and organizations?
EDI
In the United States the federal _____ covers most consumer oriented electronic transactions.
EFT Act
Designed to display documents on the web, this version of the HTML set of protocols provides a smooth interface between natural language and machine language by wrapping data in "tags" for web display.
Extensible Markup Language
Today's computer keyboard was named after Sir Wesley Reginald Qwerty, inventor of the typewriter.
False
An application that navigates all of the files and folders on your Mac is the _____ .
Finder
All of the following are considered e-commerce transactions except
G2B
A separate processor (computer) in your computer that enhances your video is called the ___ .
Graphic processor (GPU)
A port that allows the transfer of high quality video and audio signals is called a(n) ___ port.
HDMI
The standard port for video and audio input into televisions today is the ______ port.
HDMI
All of the following are true about Instagram excep
Instagram charges a fee to download the app.
Which of these programs make data more readable to programmers by parsing XML files?
JSON
An object-oriented programming language that is popular for writing apps for Android phones and tablets is ___ .
Java
The abbreviation for megahertz is ___ .
MHz
All of the following are common ports that are included with laptop computers except
MIDI Ports
Which of the following might be risky to uninstall from a Windows PC laptop?
Microsoft Works 6-9 Converter
A commonly-used short range wireless technology used for data transfer and electronic payments is called ___ .
NFC
Apple Pay uses _____ for payment transfer.
NFC
Select the 3 main ways of detecting and recording fingerprints.
Optical - takes a photo of the fingerprint.
Printer speed is described using which acronym?
PPM
When you personally share an image on Pinterest it is known as a _____.
Pin
RFID stands for which of the following.
Radio Frequency Identification
Pictures or videos taken and shared on Snapchat are called _____.
Snaps
The titles in the DMCA that directly impact digital copyright issues include all of the following except
Title 5 - Copyright Protection Proviso.
The main governmental organization that oversees Internet privacy is the Federal ___ Commission.
Trade
One type of storage device is a ___ .
USB Drive
Television displays with resolutions of at least 3840 x 2160 pixels are referred to as ___ .
UltraHD
A 3rd generation programming language that allows BASIC to be used with the advantages of a graphical user interface is ___ Basic.
Visual
Select the audio file compression formats.
WAV MP4
Devices which house every component except the keyboard and mouse inside the same case as the monitor are called _____ computers.
all-in-one
A gigabyte equals approximately one _____ bytes.
billion
Represented as either a 0 or 1, a ____ is the smallest unit of data a computer can process.
bit
One character of information, for example, a letter or a number consists of one ___ of storage
byte
In addition to the RAM, modern processors temporarily keep frequently accessed data in a _____.
cache
The technology that allows any text, even handwritten scrawls, to be digitized is known as optical ___ recognition.
character
Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on ____ .
checks
The fact that data on servers is nearly always backed up onto other servers gives ___ storage a major advantage over other data storage methods.
cloud
A digital device that accepts input, processes and stores the input, and provides output is a ____ .
computer
A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the _____.
control panel
Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___.
corruption
A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is called _____ Commons.
creative
Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___ .
data analyst
One disadvantage of cloud storage is that
data is only available when you're online.
Stealing confidential materials such as copyrighted material, confidential information, or company emails from a network is called ___ . Most often, this crime is committed by employees inside the company rather than outside hackers.
data theft
After the code has been written there are nearly always mistakes. The 4th step in the PDLC involves finding and correcting these errors in a process called ___ .
debugging
How is Screen size messure?
diagonally from a top corner to a bottom corner of a visible display
How is the screensize of a laptop computer measured?
diagonally from left corner to right corner
Transferring a file from the Internet to your digital device is called _____.
downloading
Solid state drives store data using ___ .
electronic circuits
After the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a flowchart, and is in written in an ordinary language, such as ___ .
english
Software theft occurs when someone engages in all of the following except _______.
erasing a program you purchased then sold to a friend
All new laptop computers come with an optical drive installed.
false
In general, game controllers can be interchanged between different types of gaming consoles.
false
After the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a ___ and is written in an ordinary language, such as English.
flowchart
Number of times per second a frame in a video is advanced is the definition of ___ .
frame rate
This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery.
gait analysis
The level of complexity of the programming language, or the degree from which it is separated from machine language itself, is called the ___ of the programming language.
generation
Storage capacity for laptop hard drives is typically described in terabytes or ___ .
gigabytes
To allow hard disk drive platters to spin more smoothly and cooler, some manufacturers seal the platters in ___ instead of air.
helium
What is equal to one cycle per second?
hertz
what is equal to one cycle per second?
hertz
All of the following are true about RFID except
high-frequency RFID can transmit signals further than 1500 feet
Using refracted laser light to store data on a photoreceptive substrate is essentially how ___ storage works. Theoretically this could store gigabytes of data within a cubic millimeter
holographic
What are some commonly used names for USB drives?
humb drives flash drives
In the body of a professionally formatted business email, where should a request be placed?
in the first sentence of the body of your email
The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ___ .
information systems (information technology) technician
These facilitate getting data and information into your computer.
input devices
To protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products, there are ___ property laws.
intellectual
A short email uses about one ___ of data.
kilobyte
Which of the following represents the least amount of storage?
kilobyte
Another term for a programming code is a programming ___ .
language
Because a metal platter is physically spinning, hard drives have ___ access times than solid state hard drives
longer
Because a metal platter is physically spinning, hard drives have ___ access times than solid state hard drives.
longer
Most desktop computers use ___ to store data.
magnetic hard drives
An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___ .
memristor
Megahertz is equal to one _____ cycles (or instructions) per second.
million
Sometimes used in smaller business networks, employee ___ software is impractical for large networks because of the number of users and the potential for misuse.
monitoring
Which of the following is a strength of the Android platform?
most widely used OS for smartphones and tablets
The standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or _____.
netiquette
All of the following are part of an RFID system except _____.
network
Though legal, which of the following would likely be prohibited by a typical business computer-use policy?
online personal shopping
All of the following are protected against unauthorized use or distribution by intellectual property laws except
open educational resources
What manages hardware and software, supports the computer's basic functions, and runs programs?
operating system
In photography, there are 2 ways to focus on distant objects, digital zoom and ____ zoom.
optical
Select the storage devices.
optical drive external hard drives USB drives
Many manufacturers have made _____ optional equipment when purchasing a new laptop computer.
optical drives
BitTorrent utilizes no central server, instead opting to utilize a _____ structure where each device connected to a network has equal access to the shared files
peer-to-peer
Blu-ray stores data using ___ .
pits and lands that are read by a blue spectrum laser beam
All of the following are best practices when using LinkedIn except
post vacation photos to show your friends where you've travelled.
Converting a task into commands that a computer can use to perform the task is called ___ .
programing
Which type of touchscreen uses a single metallic-coated panel and uses electricity to calculate touch points?
projective capacitive
Written in natural language, but often including programming shorthand to assist in writing the program itself, ___ is the term that describes an intermediate step in creating an algorithm from a flowchart.
pseudocode
When referring to digital storage, RAID stands for ___ .
redundant array of independent discs
The term that describes how fast each pixel in a display is updated is ___ .
refresh rate
With optical zoom, resolution ____ when focusing on distant objects.
remains the same
The number of pixels in an image is called the image's ____ .
resolution
Two main factors concerning your digital identity are privacy and ___.
security
Increased data transfer will be less likely to have errors if you use a ___ USB cord.
shorter
Data from the hard drive reaches the CPU _____ than data from the RAM.
slower
When copyrighted software is illegally copied, distributed, modified or sold and is considered direct copyright infringement this is called_____ _____.
software piracy
Select activities that would be considered software theft.
stealing software programs -illegally copying a program
The component of a computer that allows data to be retained after power is turned off is referred to as _______.
storage
A computer that is highly mobile, has a smaller OS, and uses a touchscreen as the primary input method is called a ______.
tablet
Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should
tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.
A thousand gigabytes equals one ___ .
terabyte
Which of the following represent the highest amount of storage?
terabyte
HTML and it's 5th revision (HTML5) allow content to be displayed on ___ .
the World Wide Web
The most common printers for printing receipts are ___ printers.
thermal
A kilobyte is equal to approximately one _____ bytes.
thousand
Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?
top level managers
A programming design that breaks down a problem into a series of tasks is called ___ programming.
top-down
Used in a variety of devices including ATMs and point-of-sale terminals, ____ allow for the input of data with the use of a stylus or finger.
touchscreens
The main governmental organization that oversees Internet privacy is the Federal ___ Commission.
trade
A computer platform is commonly referred to as an operating system or OS
true
A computer platform is commonly referred to as an operating system or OS.
true
Applications are computer programs created to execute specific tasks.
true
The Android OS is owned and maintained by Google (Alphabet).
true
The platform or operating system of a computer controls all of the functions of a computer.
true
Tiffany has purchased a new laptop. She noticed many unwanted programs came pre-installed on her laptop. She wants to ___ the programs from her device so they do not take up storage space.
uninstall
WhatsApp users can create groups, and send _____ images, video and audio messages for free.
unlimited
A businesses brand is derived from all of the following except ______ .
what their competition perceived them to be
A form of Email fraud where criminals change the account where money is being transferred is called a ___ scam.
wire-wire
Personal branding can be accomplished digitally and in more traditional means including all of the following except _____ .
writing private journal entries
There are risks associated with downloading content from the Internet. It is important to consider all of the following when downloading from the Internet except
your anti-virus software will ensure your files are safe.
Which of the following refer to ultra-high-definition television displays?
-4K UHD -8K UHD -UltraHD -SuperHd
Select what's true requarding all-in-one computers.
-All-in-one computers house every component except the keyboard and mouse inside the same case as the monitor. -All-in-one computers are designed to be highly mobile so that they can be used by people on the go.
The 3 phases that should be accomplished in the investigation step of the SDLC include:
-Defining the problem. What should this system do? Who will by using this IT system? -Examining alternatives. Can available hardware and software perform the same task? -Reporting. Document your investigation's findings.
The fifth step in the SDLC process is the system implementation phase. During this phase the new system is brought online. Select methods of converting an organization from an older IT system to a newer IT system.
-Holiday conversion - placing the new system online while everyone is gone. -Pilot conversion - starting the new system in one sector of the organization to ensure that it works smoothly. -Parallel conversion - running both systems side-by-side for a while and then shutting the old system. -Direct conversion - shutting down the old system completely and starting the new one.
Select the qualities that make a trait useful for biometic recognition.
-The trait must be measurably different with each person. -The trait must not change over time.
Select the true statements regarding an LED display.
-can be extremely thin -extremely energy efficient -create a significant amount of heat
Select the characteristics of thermal printing.
-commonly used for printing receipts -paper turns black when heated -makes high quality photo prints -useful for printing multiple color copies
Which are true regarding a screen's resolution?
-equals the number of pixels in a display -described as distance between 2 pixels -equals the diagonal length of the screen
Select the traits that are currently used for biometric identification.
-fingerprint -irises
Select the features common in DSLR cameras.
-often allow for interchangeable lenses -are less expensive than point-and-shoot cameras
Select the features common in DSLR cameras.
-often allow for interchangeable lenses -usually have a mirror that allows the photographer to look directly through the lens -rarely include optical zoom -are less expensive than point-and-shoot cameras
Select the current uses for RFID tags.
-package tracking -inventory tracking -musical fidelity
1. L1 cache 2. L3 cache 3. Disk cache
1. memory located directly on the processor itself 2. memory located adjacent to the processor 3. memory used to increase a hard drive's efficiency
1.Command+A 2.Command+Shift+3 3.Command+S 4.Command+F
1. select all 2. screenshot 3. save 4.find (in most apps)
1. 5GL 2. 4GL 3. 2GL 4. 1GL 5. 3GL
1.Extremely advanced - uses statements (scripts) rather than algorithms. 2. Specifically designed for creating database management programs. 3. Assembly language - an assembler converts 2GL into machine language. 4.Machine language - represented by a series of 1s and 0s. 5.High-level programming language - uses a compiler to convert into machine language.
1. input 2. storage 3. output
1.entering text in a word doc 2.putting a photo onto a USB drive (thumbdrive) 3.playing a song from spotify
Relatively rugged, water-resistant video cameras that allow users to film high-definition video under harsh conditions, such as on ski mountains, in the ocean, or at high altitudes are called extreme-action video cameras or simply a ___ .
GoPro
A program that makes creating websites and webpages much faster is ___ .
JavaScript
the ______ cache is located directly on the processor itself.
L1
The process used to develop and maintain an IT system is referred to as the SDLC. SDLC stands for the System Development ___ Cycle.
Life
When discussing digital cameras or smartphone cameras with APS CMOS, APS stands for ___ .
active pixel sensor
Select the input devices often found at a point-of-sale station.
bar code or UPC reader receipt printer
Inkjet printers are often sold ____ their production cost.
below
If it can be answered as either yes or no, or true or false, the question is called ___ .
binary
Because its radio waves pass through walls or desktops, ___ - capable devices are becoming very popular.
bluetooth
The amount of data that defines each color in a pixel is called ____ .
color depth
The number of bits of data describing each pixel in a display is referred to as ___ .
color depth
A description of the difference in the luminance of a display's white pixels compared to the black pixels is called ___ .
contrast ratio
the two main components of a processor are the arithmetic logic unit (ALU) and the _____ unit.
control
The third step of the SDLC has 3 phases, specifically, developing several system proposals, selecting the most feasible proposal, and reporting on the selected system to be developed. This step is called the system ___ step.
design
The distance between two adjacent sub-pixels on a display is referred to as ___ .
dot pitch
The art and science of creating output that provides information in the most useful manner is called ___ .
ergonomics
The final step in the system development life cycle is maintaining the system. Select the two phases of this step.
evaluation phase training phase
Number of times per second a frame in a video is advanced is the definition of _____.
frame rate
MEMS chips are used in which of the following?
hearing aids, pet identification chips, poker chips
The first step in the SDLC involves defining the problems that the IT system should address, examining various alternatives, and reporting the findings. This is referred to as the ___ step.
investigation
Because of their compact size, touchpads are most often used with _____ computers.
laptop
A process that has an initial value, a process, and a test condition that can potentially return the program to the initial value is called a ___ .
loop
When a computer is shut down, the information in the memory (the RAM, the caches, the registers) is _____.
not saved
Using reflective material to store data that can be read using a laser is called ___ media storage.
optical
An input, output or storage device connected to a computer is known as a(an) _____ .
peripheral
The smallest controllable element of an image is called a(n)___ .
pixel
Select the peripherals.
printer monitor tablet
Select the output devices.
printers
An output device that uses light to display video or image output on a surface is called a ___ .
projector
Laser printers are popular in offices because they use relatively inexpensive ___ .
toner
3D mapping, feature charting, and skin texture are some of the methods facial recognition software uses to identify individuals.
true
Active Pixel Sensor (APS), Complementary Metal-Oxide Semiconductor (CMOS) technology is used in most digital cameras, smartphone cameras and webcams today.
true
As technology advances there are fewer keyboard options available for computer users.
true
Many DSLRs have full (35mm) sensor arrays enabling photographers to take extremely high resolution photos.
true
A camera that takes photos or steams video into a computer or over the Internet is called a ___ .
webcam