CIS FINAL

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Select the cell phone manufacturers.

-Blackberry -Xiaomi -Huawei

Select what's true about passwords.

-Use a combination of letters, symbols, and numbers; the more characters you use, the more secure your password will be. -Regularly check your accounts to ensure they have not been tampered with.

Select the features common in DSLR cameras.

-often allow interchangeable lenses -usually have a mirror that allows the photographer to look directly through the lens -typically have larger active pixel sensor arrays

Select the reasons to compress a file.

-reduce storage space requirements -reduce bandwidth needed to transmit a file

Which devices use a virtual keyboard?

-tablet -smartphone

Select the common video file formats.

.mov .avi

As of 2017, tweets can be a maximum of ___ characters.

280

Two major catagories of cell phones are available. Smartphones with LTE or 4G capability and ___ phones.

3G

When you buy a new laptop, how much RAM should it come with?

4-8GB

A tablet is a highly-mobile computer with a mobile operating system and a touchscreen rather than a keyboard/touchpad. To differentiate a tablet from a smartphone, a tablet is generally understood to have a screensize of at least ___ inches.

7

Microsoft recommends when that you create passwords with upper and lower case letters, numbers, symbols, and use at least ___ characters.

8

A set of programs that allow data to be exchanged on a website without changing the website's display is ___ .

AJAX

Founded in 1969, this company's technology is featured inside every major next generation gaming console and home entertainment system: Microsoft's Xbox One, Sony's PS4™, and Nintendo's Wii.

AMD

designed to stay on a desk; provides a large monitor but takes up less space than a desktop computer

All-in-one computer

Select what's true regarding all-in-one computers.

All-in-one computers house every component except the keyboard and mouse inside the same case as the monitor. An all-in-one computer is a stationary device with a separate keyboard and mouse.

Select the statements that are true regarding a Wi-Fi's SSID.

An SSID is the Wi-Fi's name. Most routers transmit the SSID every few seconds so roaming devices can find the signal. In home networks, after all legitimate devices have connected to the SSID once, transmitting the SSID is unnecessary.

Lollipop

Android OS released in 2014

marshmallow

Android OS released in 2015

Select all the tablet computers.

Apple iPad Samsung Galaxy NotePRO Amazon Fire HD

2GL

Assembly language - an assembler converts 2GL into machine language.

All of the following are considered e-commerce transactions

B2C C2C B2B

Match the component of a business email with its characteristics.

Body- succinctly discusses the purpose of the message Close- professionally ends the message Salutaion- sets the tone of the message From and/or Subject lines- determines if the email will be opened

Place the following steps in order if you were downloading Pandora to your Windows 10 device. Place the first step at the top.

Click Install.4 Click the Windows Store icon. 1 Select the Pandora app. 3 Type Pandora in the search window. 2

Select the usual tasks of a data analyst.

Collects data Interprets information provided by the database Creates reports for senior management

Select the 3 true statements about Boolean operators.

Connect your search words with "AND" when you are searching for multiple items in the same page. Quotation marks make the search engine look for occurrences where the words are together rather than searching for individual occurrences. The tactful use of quotation marks can return more relevant search results.

Which of the following statements about Facebook is true?

Cyberstalking and online predators are a real problem on Facebook.

Printer manufacturers advertise the quality of their products by stating how many ___ they produce.

DPI

Which of the following are considered storage media?

DVD Blue-ray discs

What element of a database field specifies the data in a field such as text, numeric, or date/time?

Data Type

Because he wanted to be able to sort gifts according to continent and time zone, in 1984 Santa switched from using long lists to using ___ .

Databases

The 3 phases that should be accomplished in the investigation step of the SDLC include:

Defining the problem. What should this system do? Who will by using this IT system? Examining alternatives. Can available hardware and software perform the same task? Maintenance. Conduct any routine or unprogrammed maintenance on the system.

Rank the following in typical order of size with the largest on top.

Directory 1 Folder 2 subfolder 3 File 4

A database that stores data in different physical locations and that users access though client/server networks is called a ___ database.

Distributed

EDI stands for ___ .

Electronic Data Interchange

If you see the extension .xlsx, you know that you are looking at a(n) ___ file.

Excel

5GL

Extremely advanced - uses statements (scripts) rather than algorithms.

All of the following are considered e-commerce transactions except

G2B

allows for the transmission of high-definition audio and video signals

HDMI

What is equal to one cycle per second?

Hertz

3GL

High-level programming language - uses a compiler to convert into machine language.

Select the characteristics of a Blu-ray disc.

Holds approximately 25 GB of data Uses pits and lands to store data

Which 3 of the following should you consider when evaluating a website for research proposes?

If you are using a website for research purposes you should research the publisher's qualifications. You can find most of the information about a publisher by visiting the About Us, Corporate Profile, and Background sections of the site. Check to see the author's background, who published the authors work, and what is the relationship between the author and publisher.

Founded in 1968, this is the world's largest manufacturer of processors.

Intel

Most laptops, tablets, and smartphones use a(n) ___ display.

LCD

Select the examples of streaming.

Listening to Pandora. Watching a YouTube video. Watching a movie on Netflix.

The abbreviation for megahertz is ___ .

MHz

capable of carrying digital music signals and are common in today's music scene

MIDI

1GL

Machine language - represented by a series of 1s and 0s.

Broadband is measured in _____ .

Mbps

A complex database that organizes and stores information in a cube format and has measure attributes and feature attributes is called a ___ database.

Multidimensional

A commonly-used short range wireless technology used for data transfer and electronic payments is called ___ .

NFC

Network Operating System is abbreviated _____.

NOS

You've started a report and want to save it to your desktop. Place the following steps in order, with the first step on the top.

Name the file and click Save. 5 Click the File tab. 1 Select Desktop. 4 Select Save As. 2 Select Computer. 3

Founded in 1993, produces popular mobile device processors.

Nvidia

Put the following steps in order for creating a new email message in Microsoft Outlook.

Open Outlook (log in if necessary). 1 Click Send. 6 Enter the recipient's address in the To area.3 Type your message in the area beneath the formatting buttons.5 Click New.2 Type the subject in the Subject area.4

Using cells of ionized gas to create images, ___ displays are actually becoming less popular.

Plasma

a technology that enables the OS to detect and configure peripherals without downloading software or drivers

Plug and Play

Select the phases included in the system development step of the SDLC process.

Purchasing necessary software. Purchasing needed hardware. Setting up, installing, and testing system.

To search a database for information, create a ___ .

Query

The type of database that uses common fields to create links between tables is called a ___ database.

Relational

To display or distribute information from a database, programmers or database administrators create ___ .

Reports

Select the characteristics of a OneDrive account

Requires a Microsoft Email account Provides free cloud storage Can serve as extra storage space

Because they have no mechanically moving parts, ___ provide extremely fast, efficient storage.

SSDs

Which of the following refers to the distribution of computer applications over the Internet and is commonly referred to as web apps?

SaaS

Place the following steps in order to remove Twitter from your Windows 10 device with the first step on top.

Scroll to find the Twitter app. 3 Click the Microsoft icon. 1 Right-click on Twitter app. 4 Click All apps. 2

To adjust your Windows 10 desktop language settings first click Cortana or the _____

Search box

banana OR pudding

Search engine results will only show articles with the phrase: "banana pudding is wonderful"

banana AND pudding

Search engine will show all articles that contain the words banana, pudding.

"banana pudding is wonderful"

Search engine will show all articles with the word banana and all articles with the word pudding in them.

Most word processing software can be used for which 3 of the following tasks?

Simple desktop publishing Creating basic Web pages Creating documents

Which of the following are online nuisances?

Spam Spyware Spoofing

4GL

Specifically designed for creating database management programs.

Select the sites that offer Internet speed test services.

Speedtest.net TestMy.net

What group determines the standards for the World Wide Web?

The World Wide Web Consortium (W3C)

Select what's true about Search Engine Companies.

The information contained in a search engine database is determined by how each specific company records URL information. SEC stands for Search Engine Company. It is common practice for the web site owner to submit their URL and associated information to the search engine company (SEC).

The Android OS is owned and maintained by Google (Alphabet).

True

Windows OS is the most widely used platform in laptop and desktop computers?

True

Place the following steps in order to open an app using the search box in Windows 10 with the first step on top.

Type the name of the app. 2 Click the Search Box or the Cortana button. 1 Click on the app to open it. 4 Find the app you want to open. 3

What type of port do most digital devices use to attach peripherals?

USB port

iOS 9 series

Used on iPhones

Select the characteristics of cloud storage.

Users can download files to other devices on the Internet. Files are backed-up (stored on multiple servers). Servers act like giant hard drives.

Which are important considerations when purchasing a new computer?

What is its price? How much RAM comes with it? Does the device have USB ports?

A test of new software conducted by the programmers themselves or by contracted evaluators working alongside the programmers is one of the first phases of the testing process in the PDLC. This is referred to as a(n) ___ test.

alpha

Identify what's true about script kiddies.

amateur computer hackers with little programming expertise illegally gain access to computer systems using programs (scripts) that others have written

In order to change sound waves into digital signals, smartphones contain ___ - digital converter.

analog

The second step of the SDLC process involves collecting data about existing hardware and software, analyzing this data, and preparing specifications for the system. This is called the system ___ step

analysis

The width of a screen compared to the height of a screen is referred to as ___ .

aspect ratio

A device commonly used for checkout in stores, that measures the reflection of a laser beam, is called a ___ reader.

barcode reader

In order to download an app from the Microsoft Store will need to ___ .

be logged into a Microsoft account

The smallest unit of data storage is a ___ .

bit

There are a variety of cookie settings that can be adjusted in Google Chrome including

blocking/allowing cookies by default. deleting cookies. making exceptions for cookies from specific websites or domains.

Because its radio waves pass through walls or desktops, ___ - capable devices are becoming very popular.

bluetooth

Software applications that allow users to access and surf the World Wide Web are called ___ .

browsers

The amount of data that defines each color in a pixel is called ____ .

color depth

The number of bits of data describing each pixel in a display is referred to as ___ .

color depth

If you wish to email a file to a friend, but find that it's too big for your email server, you can always ___ the file.

compress

Select the characteristics of a Base Transceiver Station

connected to a cell tower broadcasts weak microwave signals to create "cells" of mobile coverage sends phone signals to the cellular provider's Mobile Switching Station (MSS)

Select the characteristics of a traditional hard drive.

contains platters contains read/write heads stores data magnetically

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.

cyberbullying

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.

cyberterrorist

Which of the following are considered cybercrimes?

data manipulation data corruption cyberbullying

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ___ .

database administrator (DBA)

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer use standards. Failure to set such policies can lead to which of the following?

decreased employee performance decreased network speed increased likelihood of security breaches

Select the characteristics of the IOS.

developed by Apple for Apple products used on iPhones and iPads comes with Siri, iTunes, iBooks, etc. c

When you ___ a file Windows should automatically open it. If it can't Windows will prompt you to select the correct app to open the file.

double-click

Using a stylus and touchpad to map the signature and also measure pressure, pen angle, pen up/down, speed, etc, is known as what type of signature recognition?

dynamic

The Linux OS is owned by IBM.

false

Today's computer keyboard was named after Sir Wesley Reginald Qwerty, inventor of the typewriter.

false

All of the following are true about RFID except

high-frequency RFID can transmit signals further than 1500 feet.

While many 3rd party apps are available through its App Store, apps for ___ must first be tested and approved before they're made available for downloading.

iPhones

In the body of a professionally formatted business email, where should a request be placed?

in the first sentence of the body of your email

Recording a song using MIDI

input

Josh is taking an Intro to Computers course and needs to use Microsoft Office to complete a variety of assignments. He has purchased the software, now he must _____ it so he can start his assignments.

install

Rootkits allow a remote user to do which of the following.

install rogue files create backdoor programs delete files

To protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products, there are ___ property laws.

intellectual

All of the following are true about RFID

it can be used to identify a variety of objects including objects, animals, and people implanted with an active RFID chip. RFID stands for Radio Frequency Identification. RFID doesn't require line of sight scanning.

A short email uses about one __________ of data

kilobyte

designed for those who need a mobile computer but need to enter a large amount of data

laptop computer

Graphics Interchange Format (GIF)

legacy (outdated) lossless format

The process used to develop and maintain an IT system is referred to as the SDLC. SDLC stands for the System Development ___ Cycle.

life

It's always a good idea to check the ___ before clicking Reply to All.

list of addressees

When you open the Windows 10 start menu, colorful boxes containing constantly updated (when you're online) information appears. Microsoft calls these boxes ___ .

live Tiles

Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create forms, reports, data dictionaries and other capabilities, it is often referred to as a Database ___ System.

management

Portable Network Graphics (PNG)

most popular lossless image compression format

Joint Photographic Experts Group (JPEG or JPG)

most popular lossy image compression format

Examples of input devices include

mouse keyboard camera

When choosing a cell phone provider, factors to consider include

network size/coverage. service/speed. pricing.

You should evaluate websites based on which 2 of the following criteria?

objectivity Bias

Two common categories of cybercrimes include single events and _____ series of events.

on-going

Many manufacturers have made _____ optional equipment when purchasing a new laptop computer.

optical drives

a printout of a spreadsheet

output

Select the current uses for RFID tags.

pet identification package tracking inventory tracking

A request for an electronic "echo" or response from another computer or server is called a ____.

ping

In the datasheet view of a relational database (such as Microsoft Access) a row of information is called a ___ .

record

The number of pixels in an image is called the image's ____ .

resolution

An easy way to rename a folder in Windows is to ___ -click on the folder and then click Rename.

right-click

The most common method of renaming files and folders is to simply __ on the item and select Rename.

right-click

To access an app's Jump List, just ___ on the app's icon in the taskbar.

right-click

Want to get rid of one of the app's on your Windows 10 taskbar? It's easy! First ___ the app's icon, then click "Unpin this app".

right-click

Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP networks have firewalls where they connect to the Internet.

router

Because they're both Apple products, the browser that works smoothest with Macintosh OS X is ___ .

safari

The diagonal measure of the visible display is known as _____ .

screen size

In general, the ___ the access time, the faster the hard drive.

shorter

When copyrighted software is illegally copied, distributed, modified or sold and is considered direct copyright infringement this is called_____ _____.

software piracy

To improve the sound quality of their smartphones, many users purchase larger external ___ to listen to music.

speakers

While not a required step in sending an email, it's wise to ___ any message before clicking Send.

spell check

An easy way to access your apps in Windows 10 is to click the _____.

start button

Devices that allow for the retention of data when your computer has been shut down are called ___ devices.

storage

Saving a file to the cloud

storage

The component of a computer that allows data to be retained after power is turned off is referred to as _______.

storage

Because Objective-C was difficult to write in, Apple developed ___ , a programming language for writing software for the Mac OS and the iOS.

swift

highly mobile device that can be used while standing or even walking

tablet computer

HTML and it's 5th revision (HTML5) allow content to be displayed on ___ .

the World Wide Web

There are risks associated with downloading content from the Internet. It is important to consider all of the following when downloading from the Internet

the source of the content. It is important to consider if the content came from a legitimate source. when sharing files via the Internet via file sharing programs you can unknowingly give outside users access to your computer. files downloaded from unknown sites and file sharing sites often contain a variety of malware including spyware and viruses.

Along with the From line, what is the most important factor in ensuring your business message is read?

the subject line

The most common printers for printing receipts are ___ printers.

thermal

Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?

top level managers

Select the smartphone input device.

touchscreen or keyboard

Used in a variety of devices including ATMs and point-of-sale terminals, ____ allow for the input of data with the use of a stylus or finger.

touchscreens

similar to a tablet but comes with a detachable keyboard/touchpad unit

two-in-one computer

A digital identity is comprised of a variety of digital attributes including

usernames and passwords. online search activities. personal data such as your social security number and birthdate.

Select the statements that are true regarding Satellite Internet service.

uses microwaves to deliver service, provides broadband service virtually anywhere, Customers usually purchase a data plan that limits uploading and downloading

A 3rd generation programming language that allows BASIC to be used with the advantages of a graphical user interface is ___ Basic.

visual

Personal branding can be accomplished digitally and in more traditional means including all of the following

web presence social media interpersonal skills

The data definition, as described in the data dictionary, tells users how each unit of data is defined in the database. Which of the following elements will be used to describe the data?

what field name the data will fall under what data type will be included

Personal branding can be accomplished digitally and in more traditional means including all of the following except _____ .

writing private journal entries

There are risks associated with downloading content from the Internet. It is important to consider all of the following when downloading from the Internet except

your anti-virus software will ensure your files are safe.

A computer controlled by a hacker is called a _____.

zombie


संबंधित स्टडी सेट्स

Professional Orientation & Ethical Practice

View Set

Intro to Sociology Chapter 3 Review Quiz

View Set

Unit 6- Prioritization and Delegation

View Set

NUR 3420 Pharmacology PrepU ch21

View Set

Implied Obligation of Good Faith

View Set