CGS2100 Midterm

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

identify the Flowchart Symbols Using the drop-down menu, identify the flowchart symbols. 1. The oval represents the 2. The rectangle represents the 3. The diamond represents the 4. The parallelogram represents the A. start and end of a program B. decision or branching point C. process to be carried out D. input or output operation

1. A 2. C 3. B 4. D

Match the conversion methods with the correct description in the system implementation step of the SDLC. 1. Direct 2. Parallel 3. Pilot 4. Phased Match each of the options above to the items below. A. shuts down the old system and starts the new system B. Old and new systems run side-by-side for a while. C. starts in one area of the organization and then is deployed to the rest of the organization D. implements new areas of the system in a predetermined period of time

1. A 2. B 3. C 4. D

Match the term to the correct amount of data. 1. Terabyte 2. Gigabyte 3. Megabyte 4. Petabyte 5. Kilobyte Match each of the options above to the items below. A. 1000 terabytes B. 1 trillion bytes C. 1 billion bytes D. 1 million bytes E. 1 thousand bytes

1. B 2. C 3. D 4. A 5. E

Match the business information systems (IS, sometimes called information technology or IT) activity with the appropriate management level. 1. First level managers (supervisors, floor managers) 2. Top-level management (business executives and presidents) 3. Middle managers Match each of the options above to the items below. A. Use IS to monitor overall business performance. B. Use IS for record keeping and reporting purposes. C. Use IS for scheduling daily and weekly operations.

1. C 2. A 3. B

Match the following. 1. RAM 2. Cache 3. Register 4. L1 cache Match each of the options above to the items below. A. relatively small amount of memory (measured in kilobytes or megabytes) B. memory located directly on the processor itself C. largest memory of a computer, connected to the processor via the front side bus D. extremely small amount of memory (measured in bits) located throughout the processor

1. C 2. A 3. D 4. B

Match the following regarding printers. 1. Thermal printer 2. Plotter 3. Laser printer 4. Inkjet printer Match each of the options above to the items below. A. Uses toner cartridges B. Uses ink cartridges C. Commonly used for receipts D. Used for drafting or blueprints

1. C 2. D 3. A 4. B

Match computer systems w its features: 1. Tablet computer 2. Laptop computer 3. All-in-one computer 4. Desktop computer A. not mobile but allows for relatively easy upgrade and expansion B. clamshell (hinged) type computer C. not mobile but since most of it's components are housed behind the monitor it takes relatively little space on your desk D. highly mobile- you can use it standing or walking around

1. D 2. B 3. C 4. A

List the steps taken as a laser printer prints an image Paper is fed between the drum and the toner Toner is melted onto the paper Laser removes electrons from the drum Charged toner is attracted to the drum4

1.Laser removes electrons from the drum 2.Paper is fed between the drum and the toner 3.Charged toner is attracted to the drum 4.Toner is melted onto the paper

Place the steps of the Program Development Life Cycle in the correct order. Rank the options below. 1. Creating a plan. 2. Defining the problem. 3. Writing the code. 4. Debugging the code. 5. Testing the code.

2 1 3 4 5

A program that checks the source code for errors and converts it into machine language is a ________. A. compiler B. JavaScript C. translator D. C++

A

Cookies used to collect user information like passwords and stored on a computer hard drive until deleted or expired are called ________ cookies. A. persistent B. session C. data D. database

A

Devices allowing data to be retained when your computer is shut down are called ________ devices. Multiple Choice A. storage B. cache C. register D. memory

A

In the body of a professionally formatted business e-mail, where should a request be placed? Multiple Choice A. in the first sentence of the body of your e-mail B. immediately following the reasons for your request C.at the end of the body, for emphasis D. as part of a professional closing of an e-mail

A

Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a(n) ________, which closes the access point used by the hacker. Multiple Choice A. block B. execution C. stop D. denial

A

MIDI is an acronym that stands for? Multiple Choice A. Musical Instrument Digital Interface B. Musical Instrument Digital Interlace C. Music Instrument Digital Interface D. Many Instrument Download Interface

A

RFID stands for which of the following? Multiple Choice A. Radio Frequency Identification B. Relative Functioning Internet Distribution C. Relational Formula Income Database D. Regional Functioning Internet Distribution

A

The machine cycle consists of which four steps? Multiple Choice A. fetch, decode, execute, and store B. decode, calculate, store, and print C. fetch, decode, execute, and calculate D. fetch, decode, execute, and print

A

The programming language of the third generation learned by most students when most computers used MS DOS was ________. It continues as a secure programming language to use 3rd party code and offers a standard for coding that readily integrates with other programming languages. A. BASIC B. C C. LION D. EZ

A

The second step in the PDLC is to create the plan or algorithm. This plan is usually written as a flowchart and is written in ________. Multiple Choice A. English B. Java C. C++ D. Javascript

A

The technology (chips) that allow cell phone microphones and hearing aids to be so small is the ________ chip. Multiple Choice A. MEMS B. RFID C. SMES D. CMOS

A

The term that describes how fast each pixel in a display is updated is ________. Multiple Choice A. refresh rate B. aspect ratio C. frame rate D. contrast ratio

A

Though currently expensive, curved and paper-thin displays are possible using ________ display technology. Multiple Choice A. OLED B. ultraHD C. CRT D. LCD

A

Using cells of ionized gas to create images, ________ displays are actually becoming less popular. Multiple Choice A. plasma B. high-definition C. LED D. LCD

A

Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently? Multiple Choice A. SCMS B. ERP C. ESS D. EIS

A

Which of the following is a strength of the Linux platform? Multiple Choice A. free to download and use B. most widely used OS in desktops and laptops C. less susceptible to viruses than Mac OS D. most widely used OS in smartphones and tablets

A

________ Basic is a programming language of the third generation that enables BASIC to be used with the benefits of a graphical user interface. Multiple Choice A. Visual B. Measured C. Scripted D. Graphical

A

The software development process includes which of the following steps? Check All That Apply A. planning B. programming C. debugging D. beta review E. thinking

A B C and D

After creating the algorithm or schedule, the next stage in the PDLC is to compose the program coding. What languages can be used to complete this extremely organized process? Check All That Apply A. Java B. JavaScript C. C++ D. English

A B and C

Choose the features of a traditional hard drive A. contains platters B. contains read/write heads C. stores data magnetically D. uses lasers to read data

A B and C

Choose the stages included in the SDLC process's system design phase. Check All That Apply A. Purchasing necessary software. B. Purchasing needed hardware. C. Setting up, installing, and testing the system. D. Training the users of the new system.

A B and C

Common types of servers include Check All That Apply A. Network server. B. File server. C. Web server. D. graphic server.

A B and C

How can you attach a mouse or other pointing device to your computer? Check All That Apply A. With a Bluetooth connection B. With an IrDA connection C. With a wire through a USB port D. With a Wi-Fi connection

A B and C

If you own a small business, what can you do to ensure your computers and data is kept secure? Check All That Apply A. Keep software updated, particularly antivirus software. B. Physically secure computers to minimize risk of theft. C. Backup your data regularly. D. Require that all passwords be written down.

A B and C

Important considerations when purchasing a new tablet computer include which three items? Check All That Apply A. the amount of RAM it has. t B. the size of its screen. the size of its screen. C. the amount of storage it has. D. whether the tablet has an optical drive installed.

A B and C

In each browser's settings area you should consider ________, ________, and ________. Check All That Apply A. periodically deleting cookies B. blocking/customizing your cookie settings C. decide from which sites you want to allow cookies D. adjusting your firewall settings

A B and C

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer-use standards. This includes which of the following? Check All That Apply A. Instructing employees on standards. B. Enforcing standards by creating firewalls, monitoring protocols, and filters. C. Periodically reviewing computer-use policies. D. Assigning passwords for each employee.

A B and C

Select the qualities that make a trait useful for biometric recognition. Check All That Apply A. The trait must not change over time. B. Everyone must have the trait. C. The trait must be measurably different with each person. D. The trait must be obvious from a distance.

A B and C

Select the smartphone input devices. Check All That Apply A. Motion sensors B. Buttons C. Microphones D. LED flashlights

A B and C

Select the three main ways of detecting and recording fingerprints. Check All That Apply A. Ultra sonic—uses sound waves to detect ridges and whorls. B. Optical—takes a photo of the fingerprint. C. Capacitance—uses electron movement, similar to a touch screen or touch pad. D. Microwave—uses microwaves to heat fingertips and detect and measure ridges and whorls.

A B and C

Select the traits that are currently used for biometric identification. Check All That Apply A. Fingerprints B. Irises C. Stride D. Hair color

A B and C

The SDLC's system analysis phase includes three stages. Choose the three stages. Check All That Apply A. Data collection-gathering info about needs and existing hardware and software. B. Analyze data-determine the system requirements. C. Prepare the system specifications. D. Procure any necessary hardware.

A B and C

The fifth step in the SDLC process is the system implementation phase. During this phase the new system is brought online. Select methods of converting an organization from an older IT system to a newer IT system. Check All That Apply A. Direct conversion-shutting down the old system completely and starting the new one. B. Parallel conversion-running both systems side-by-side for a while and then shutting the old system. C. Pilot conversion-starting the new system in one sector of the organization to ensure that it works smoothly. D. Holiday conversion-placing the new system online while everyone is gone.

A B and C

The three stages to be completed in the SDLC's inquiry phase include Check All That Apply A. Defining the problem. What should this system do? Who will by using this IT system? B. Examining alternatives. Can available hardware and software perform the same task? C. Reporting. Document your investigation's findings. D. Maintenance. Conduct any routine or unprogrammed maintenance on the system.

A B and C

What all-in-one computers actually mean? A. stationary device B. large monitor C. usually touch screen monitor D. scaled-down operating system

A B and C

Which are true regarding a display's refresh rate? Check All That Apply A. Describes how fast each pixel in a display is updated B. The higher the refresh rate, the smoother the video. C. Videos play best with refresh rates at even multiples of the frame rate. D. Describes the number of times per second a frame is advanced in a video

A B and C

Which of the following are the steps involved in programming? Check All That Apply A. Categorizing which parts of a task a digital device can perform. B. Describing the task in a precise manner. C. Translating the task into the language the computer's CPU can use. D. Printing out the code for review.

A B and C

Which of these would be considered a cybercrime? Check All That Apply A. Internet scams B. cyber espionage C. information theft D. cyber monitoring

A B and C

Who are the three biggest computer processor manufacturers? Check All That Apply A. Intel B. AMD C. Nvidia D. Microsoft

A B and C

Select the usual tasks of information systems (IS) program managers. Check All That Apply A. Supervising IS technicians. B. Working with developers and senior management to procure and implement IS processes. C. Developing training plans and policies for IS. D. Maintaining a corporate database. Select the usual roles of information systems (IS) technicians. Check All That Apply A. Installing IS hardware and software. B. Maintaining IS hardware and software. Maintaining IS hardware and software. C. Repairing and replacing IS hardware and software. D. Researching databases to create reports.

A B and C A B and C (NO DATABASES)

An Internet filter is firewall software used to block a user's access to specific Internet content. This software can reside on which three of the following? Check All That Apply A. router or user's computer B.network C. keyboard tracker D. stand-alone filter attached to a server

A B and D

Choose the desktop computer features. Check All That Apply A. Desktops allow for relatively easy upgrade and expansion. B. Desktops are often used in offices since they do not need to be mobile. C. Desktops are useful for those who need a computer they can walk around with. D. Desktops use a full OS.

A B and D

In Internet Explorer (Microsoft Edge), you can set which cookie settings? Check All That Apply A. Allow cookies. B. Delete cookies. C. Create cookies. D. Block cookies.

A B and D

MEMS chips are used in which of the following? Check All That Apply A. Hearing aids B. Smartphones C. Pet Identification chips D. Poker chips

A and B

Select appropriate business e-mail etiquette practices. Check All That Apply A. Maintain high levels of formality, especially with initial contacts. B. Consider if e-mail is the appropriate means of communication. C. To minimize space in the body of the e-mail, use text-style shortcuts. D. Because e-mails don't convey nonverbal clues, add emoticons for emphasis and clarity.

A and B

Select reasons for purchasing a tablet computer Select all that apply A. you need a computer you can use while walking B. need a highly mobile computer that works well for reading ebooks or for online gaming C. need a computer you can upgrade with additional memory (RAM) D. need a computer with a large amount of storage (hard drive)

A and B

Select the advantages of a point-and-shoot camera over a smartphone camera. Check All That Apply A. Point-and-shoot cameras often have larger pixel sensor arrays, providing higher resolution. B. Point-and-shoot cameras, being thicker, often come with optical zoom capability. C. Point-and-shoot cameras use a more highly developed photo technology. D. Point-and-shoot cameras include front- and rear-facing facing cameras.

A and B

Select the characteristics of a plotter. Check All That Apply A. Prints large graphic displays B. Mechanically moves a pen over a large sheet of paper C. Uses inexpensive toner rather than ink D. Paper turns black when heated.

A and B

Select the input devices often found with a point-of-sale system. Check All That Apply A. MICR B. QR code reader C. webcam D. speaker

A and B

Select the peripherals. Check All That Apply A. Printer B. Monitor C. Tablet D. Smartphone

A and B

Select the statements that describe a computer programmer's algorithm. A. written in natural language, English B. written in the form of a flowchart so it will be more easily converted into a programming language C. usually written in Javascript D. used to train the program's users

A and B

Select the two phrases of the final step in the SDLC A. system audit B. Evaluation phase C. training phase D. system analysis

A and B

What is true about packet sniffers? Check All That Apply A. Legitimate sniffers are used for routine examination and problem detection. B. Unauthorized sniffers are used to steal information. C. Packet sniffers are relatively easy to detect. D. Packet sniffers use viruses to capture data packets.

A and B

What is true of the malware Trojan horse? Check All That Apply A. often found attached to free downloads and apps often found attached to free downloads and apps B. often used to find passwords, destroy data, or to bypass firewalls C. similar to adware similar to adware D. Trojan malware is the same as a macro virus.

A and B

When reporting a computer ethics violation of a co-worker to your employer, it's important to ________. Check All That Apply A. be brief and direct B. state only what you witnessed C. forward any concerns from other co-workers D. state why the violation hurts the business

A and B

You can minimize your risk of computer damage by using a ________ or a ________. Check All That Apply A. surge protector B. UPS (Uninterruptible Power Supply) C. protector keyboard D. mouse pad

A and B

Cyberattacks include ________ and ________. Check All That Apply A. DDoS attacks B. e-mail spam C. identity theft D. hardware theft

A and C

What are some characteristics of a 2-in-1 computer? Check All That Apply A. full operating system B. more storage than a traditional laptop C. touch screen monitor D. short battery life

A and C

What all-in-one computers actually mean? A. house every component except the keyboard and mouse inside the same case as the monitor B. designed to be highly mobile so that they can be used by people on the go C. hinged computers D. a stationary device w a separate keyboard and mouse

A and D

Match the following description with the appropriate programming language generation. 1GL 3GL 2GL 5GL 4GL Match each of the options above to the items below. A. Machine language-represented by a series of 1s and 0s. B. Assembly language-An assembler converts 2GL into machine language. C. High-level programming language-uses a compiler to convert into machine language. D. Specifically designed for creating database management programs. E. Extremely advanced-uses statements (scripts) rather than algorithms.

A. 1GL B. 2GL C. 3GL D. 4GL E. 5GL

A set of programs for exchanging data on a website without altering the display of the website is ________. A. HTML B. AJAX C. Swift D. Java

AJAX

Factors that damage computer hardware include? Check All That Apply A. power surges B. overheating C. humidity D. magnetic fields

All of them are correct

Identify Characteristics of Flowchart Symbols Which statements correctly describe flowchart symbols? Look at image (Oval, parallelogram, rectangle, diamond, line)

An oval represents the start of end of a program. A parallelogram represents an input or output operation. A rectangle represents a process to be carried out. A diamond represents a decision or branching point. A line connects the symbols and indicates the direction of logic flow.

A TV remote usually uses ________ waves. Multiple Choice A. microwave B. Infrared (IR) C. Bluetooth D. fiber-optic

B

A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the ________. Multiple Choice A. Device manager B. Control panel C. Memory management D. Download manager

B

All of the following are common ports that are included with laptop computers except ________. Multiple Choice A. HDMI ports. B. MIDI ports. C. Ethernet ports. D. USB ports.

B

Although not a programming language technically, ________ pertains to the protocols that enable content to be displayed on the Internet. A. C# B. XML C. C++ D. Java

B

Laser printers are popular in offices because they use relatively inexpensive ________. Multiple Choice A. pixels B. toner C. thermal paper D. ink

B

Lightning ports and connectors were developed for ________ devices. Multiple Choice A. Dell B. Apple C. Hewlett-Packard D. Compaq

B

Television displays with resolutions of at least 3840 x 2160 pixels are referred to as ________. Multiple Choice A. 12K UHD B. UltraHD C. SuperHD D. HDTV

B

The distance between two adjacent sub-pixels on a display is referred to as ________. Multiple Choice A. bit depth B. dot pitch C. color depth D. contrast ratio

B

This version of the HTML set of protocols designed to display documents on the web provides a smooth interface between natural language and machine language by wrapping data for web display in "tags". Multiple Choice A. C++ B. Extensible Markup Language C. JavaScript (Js) D. Swift

B

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production? A. ESS B. DSS C. TPS D. EIS

B

Written in natural language, but often including programming shorthand to assist in writing the program itself, ___ is the term that describes an intermediate step in creating an algorithm from a flowchart. A. JavaScript B. pseudocode C. Macro D. Morse code

B

Printer manufacturers advertise the quality of their products by stating how many ________ they produce. Multiple Choice A. color bits B. DPI C. lines per inch D. pixels

B (dots per inch)

Common names for a USB drive include? A. nail drive B. thumb drive C. flash drive D. jump drive

B C and D

Firewalls help protect against ________ and ________. Check All That Apply A. pharming B. worms C. phishing D. hackers

B and D

A program that can be used to turn a single line of C# into a machine language without the complete program being compiled is called a C# ________. Multiple Choice A. executor B. translator C. interpreter D. compiler

C

AJAX stands for ________ JavaScript and XML. Multiple Choice A. Actionable B. Animation C. Asynchronous D. Automated

C

An initial value process, a process and a test condition which can potentially return to the initial value is called a ________. A. circle decision B. summation C. loop D. twist

C

Even a small degree of programming skill can be beneficial. Many apps allow you to create mini-programs that reduce the number of routine steps required to complete a task. These mini-programs are called ________. Multiple Choice A. fun-sized B. subprograms C. macros D. minapps

C

Including RAM, modern processors keep frequent and temporary accessed data in ________. Multiple Choice A. hard drive B. flash drive C. cache D. DVD

C

Most laptops, tablets, and smartphones use a(n) ________ display. Multiple Choice A. CRT B. HDMI C. LCD D. ultraHD

C

One of the first stages of the PDLC testing method is a test of fresh software performed by the programmers themselves or contract evaluators working alongside the programmers. This is called the ________ test. A. beta B. midterm C. alpha D. sampling

C

The two main components of a processor are the control and the ________. Multiple Choice A. intelligence B. RAM C. Arithmetic Logic Unit (ALU) D. router

C

This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery. A. Walking analysis B. Retinal analysis C. Gait analysis D. Running analysis

C

Using information systems to help foresee corporate business opportunities and threats that might be done by all levels of management, but it is most important for which management level? Multiple Choice A. supervisors B. first level managers C. top-level managers D. middle managers

C

Which category of management information systems (MIS) focuses on tracking sales and inventories? A.DSS B. EIS C. TPS D. ESS

C

Which of the following is a strength of the Windows platform? Check All That Apply A. less susceptible to viruses than the Mac OS B. most widely used OS in smartphones C. most widely used OS in laptops, desktops, usually leading to lower prices D. is fully compatible with Mac OS X

C

Which of the following is not a presentation software term? Multiple Choice A. Slide B. Speaker Notes C. Speaker Image D. Slide Master

C

A form of E-mail fraud where criminals change the account where money is being transferred is called a(n) ________ scam. Multiple Choice A. account-flopping B. hacking C. routing-flipping D. wire-wire

D

After the problem has been clearly defined, the third step in the PDLC is to create the plan or algorithm. This plan is usually written as a ________ and is written in an ordinary language, such as English. Multiple Choice A. question B. program C. simple statement D. flowchart

D

Computer hardware and software used by an organization to improve its performance is called its ________. A. application B. program C. network D. IT system

D

Devices which house every component except the keyboard and mouse inside the same case as the monitor are called ________ computers. Check All That Apply A. laptop B. desktop C. mainframe D. all-in-one

D

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ________. Multiple Choice A. theft B. fraud C. hacking D. corruption

D

Most touch pads use ________ to sense when a finger has moved across the pad. Multiple Choice A. pressure B. heat C. lasers D. capacitance

D

Software that collects the web browsing history of the user and uses the collected data to create unwanted pop-up ads is called ________. A. worming B. spoofing C. e-mail D. adware

D

Sometimes used in smaller business networks, employee ________ software is impractical for large networks because of the number of users and the potential for misuse. Multiple Choice A. managing B. security C. services D. monitoring

D

The PDLC's coding phase uses which of the following languages? A. English B. Spanish C. Russian D. C++

D

The maximum number of bits per CPU instruction during one machine cycle is ________. Multiple Choice A. pipelining B. access time C. processing D. word size

D

The most common printers for printing receipts are ________ printers. Multiple Choice A. inkjet B. plasma C. laser D. thermal

D

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ________. Multiple Choice A. data analyst B. database administrator (DBA) C. information systems (information technology) program manager D. information systems (information technology) technician

D

What is equal to one cycle per second? Multiple Choice A. byte B. megahertz C. bit D. hertz

D

What is the primary purpose of fragmenting your hard drive? Multiple Choice A. slows down your computer boot process B. eliminates old files on your computer C. empties your computer trash can D. reduces the time it takes to find files on a hard drive

D

When you buy a new laptop, how much RAM should it come with? Multiple Choice A. 2-4 MB B. 1-2 GB C. 15-20 GB D. 4-8 GB

D

Put the steps of a virus infection in the correct order. Rank the options below. A. An action such as running or opening the file triggers the virus. B. The payload is activated and the virus starts its destructive actions. C. The infection is spread to other devices or a network. D. The virus arrives via e-mail attachment, file download, or by visiting an infected site.

D A C B

What order of steps should you take to always block cookies in Safari? Rank the options below. A. Click Preferences. B. Select Block all cookies. C. Click Privacy. D. Choose Safari.

D A C B

The technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called Multiple Choice A. assessment software. B. barcode scanning. C. MICR. D. OMR.

D Optical Mark Recognition

Firewall software used to block Internet-specific content of a user is called an ________ filter. A. Internet B. safety C. content D. malware

Internet

SDLC steps in order Analysis, Design, Develop, Investigation

Investigation, analysis, design, develop

Which of these programs, by parsing XML documents, makes info more readable for programmers? A. JavaScript B. Dreamweaver C. C# D. JSON

JSON

Because of their compact size, touch pads are most often used with ______ computers A. desktop B. smartphone C. Tablet D. laptop

Laptop

Match the following regarding printers Laser printer: Inkjet printer: Low cost; Uses ink High cost; Uses cartridges

Laser printer: High cost; Uses cartridges Inkjet printer: Low cost; Uses ink

Most tablets and phones use ________ as their main storage device. Multiple Choice A. optical storage B. hard drives C. USB D. SSD

SSD

Choose the program you would be using if you would like to write iPhone applications A. JavaScript B. Swift C. C# D. HTML5

Swift

A two-in-one computer combines a tablet with a detachable ________ to make a relatively powerful, yet mobile computer. Check All That Apply A. printer B. keyboard C. motherboard D. mouse

keyboard


संबंधित स्टडी सेट्स

Art since 1945 (Midterm Images Study) (Last Names Only)

View Set

Mastering Biology CH 8 Core Content

View Set