CIS Exam 1

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Apple Pay uses ________ for payment transfer.

(NFC) Near field communication

Sometimes used to create prototype models for casting, ________ printing is also known as additive manufacturing.

3-D

Business owners, copyright holders, and network administrators publish ________ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.

AUPs

Smartphone cameras work by focusing incoming light onto what type of array that captures images?

Active Pixel Scanner

The mouse was developed by which company?

Apple

Inkjet printers are often sold ________ their production cost.

Below

This technology provides short-distance wireless communication between electronic devices using extremely low power radio signals.

Bluetooth

Printer manufacturers advertise the quality of their products by stating how many ________ they produce.

DPI

Business management software that encompasses nearly all business activities in a corporation is called ________ software.

ERP

A port that allows the transfer of high quality video and audio signals is called a(n) ________ port.

HDMI

These facilitate getting data and information into your computer.

Input Devices

Because of their compact size, touch pads are most often used with ________ computers.

Laptop

The technology (chips) that allow cell phone microphones and hearing aids to be so small is the ________ chip.

MEMS

This technology allows musicians to create written sheet music simply by playing an instrument.

MIDI

Be careful to only open e-mail from senders you know and trust. ________ may be contained in e-mail messages.

Malware

Though currently expensive, curved and paper-thin displays are possible using ________ display technology.

OLED

The technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called

OMR Optical Mark Recognition

In photography, there are two ways to focus on distant objects, digital zoom and ________ zoom.

Optical

Using reflective material to store data that can be read using a laser is called ________ media storage.

Optical

Which of the following is an e-mail program?

Outlook

Printer speed is described using which acronym?

PPM

Using cells of ionized gas to create images, ________ displays are actually becoming less popular.

Plasma

A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a ________.

Plotter

RFID stands for which of the following?

Radio Frequency Identification

The number of pixels in an image is called the image's ________.

Resolution

While not a required step in sending an e-mail, it's wise to ________ any message before clicking Send.

Spell-check

Which category of management information systems (MIS) focuses on tracking sales and inventories?

TPS

Laser printers are popular in offices because they use relatively inexpensive ________.

Toner

Using information systems to help foresee corporate business opportunities and threats that might be done by all levels of management, but it is most important for which management level?

Top-level managers

Select the smartphone input device.

Touchscreen or Keyboard

What type of port do most digital devices use to attach peripherals?

USB Port

Television displays with resolutions of at least 3840 x 2160 pixels are referred to as ________.

UltraHD

The technology that uses cameras, microphones, displays, speakers, and software to allow users to both see and hear each other is called ________.

Video Conference

With ____ recognition technologies, frequency, pitch, speech rhythms, and other characteristics are charted and compared to existing records.

Voice

A camera that takes photos or streams video into a computer or over the Internet is called a ________.

Webcam

A form of E-mail fraud where criminals change the account where money is being transferred is called a(n) ________ scam.

Wire-wire

The width of a screen compared to the height of a screen is referred to as ________.

aspect ratio

Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a(n) ________, which closes the access point used by the hacker.

block

The technology that allows any text, even handwritten scrawls, to be digitized is known as optical ________ recognition.

character

Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on ________.

checks

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ________.

corruption

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a(n) ________.

data analyst

Stealing confidential materials such as copyrighted material, confidential information, or company e-mails from a network is called ________. Most often, this crime is committed by employees inside the company rather than outside hackers.

data theft

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a(n) ________.

database administrator (DBA)

The number of times per second a frame in a video is advanced is the definition of ________.

frame rate

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the ________.

information systems (information technology) program manager

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ________.

information systems (information technology) technician

Sometimes used in smaller business networks, employee ________ software is impractical for large networks because of the number of users and the potential for misuse.

monitoring

Though legal, which of the following would likely be prohibited by a typical business computer-use policy?

online personal shopping

The smallest controllable element of an image is called a(n) ________.

pixel

The term that describes how fast each pixel in a display is updated is ________.

refresh rate

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ________ software.

remote desktop

The number of pixels in a display is called the display's ________.

resolution

The diagonal measure of the visible display is known as ________.

screensize

To improve the sound quality of their smartphones, many users purchase larger external ________ to listen to music.

speakers

Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should

tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.

Computer Hardware

the physical equipment used for input, processing, and output activities in an information system

The most common printers for printing receipts are ________ printers.

thermal

Most smartphones and tablets produced today use a ________ keyboard.

virtual


संबंधित स्टडी सेट्स

Unintentional Torts (Negligence), Defenses, and Strict Liability

View Set

Hubspot Digital Marketing Certification Exam

View Set

Abdominal Overview (CH 2 - no pics)

View Set