IST 110 Final
Put the following five steps in the order in which you would perform them to use the Paste Special function. 1. Select and copy a range. 2. Click the Paste button arrow in the Clipboard group on the HOME Tab. 3. Specify exactly what you want to paste. 4. Click Paste Special to open the dialog box. 5. Select the range where you want to paste the Clipboard contents.
1,5,2,4,3
Moore's law states that microprocessor complexity would double approximately every ________ months.
18
What is the result of the expression =50+20/10*5?
60
___________ is NOT a basic function of TCP/IP. A. Responsible for disassembling, delivering, and reassembling data during transmission. B.Manages the movement of data packets between computers by establishing a connection between the computers. C.Sequences the transfer of packets. D.Acknowledges the packets have been transmitted.
A
The formula used to multiply cell A1 by cell C1 is ____.
=A1*C1
What is the syntax for a SUM formula adding the values of cell F6 to F9?
=SUM(F6:F9)
A(n) _____________ is a software package that attempts to identify and eliminate viruses and worms.
Anit-malware system
________ software is a set of computer instructions that provides specific functionality to a user.
Application
The complexity of software has ________ over time; the potential for software bugs has ________. A. decreased; decreased B. increased; increased C. Increased; decreased D. decreased; increased
B
This IS Function has become _____ strategic within organizations, so a growing number of CIOs are coming from _____. A. Decreasingly; within the IS department B. Increasingly; other business units C. Increasingly; within the IS department D. Decreasingly; other business units
B
Which of the following cloud computing characteristics allows organizations to use a single physical server for multiple purposes? A. Encompasses the characteristics of utility computing B. Virtualization C. Scalability D. Providing on-demand self-service
B
Which of the following is the correct order of networks from largest to smallest? A. WAN, MAN, PAN, LAN B. WAN, MAN, LAN, PAN C. MAN, WAN, PAN, LAN D. MAN, WAN, LAN, PAN
B
_______ is designed to be embedded in mobile devices and can be used with mobile wallets. It is a _____-range wireless network technology. A. UWB; short B. NFC; short C. NFC; medium D. UWB; medium
B
_________ is a two-dimensional code that can store much more information than _____. A. A QR code; RFID B. A QR code; bare codes C. RFID; QR codes D. RFID; bar codes
B
RFID was developed to replace __________.
Bar codes
Which of the following cloud computing characteristics addresses the business need to increase or decrease capacity when necessary (for example, retailers frequently need much more computational capacity on Black Friday)? A. Virtualization B. Providing on-demand self-service C. Scalability D. Uses broad network access
C
________ does NOT have an important role in the Internet of Things. A. 5G B. Bluetooth C. IPv4 D. Wireless sensors
C
The top technology job is ____
CIO
Managing information systems in modern organizations is a difficult and complex task. Which of the following factors does NOT contribute to this? A. Both end users and IT employees have responsibility for systems. B. If technology is not working, many firms cannot function. C. Business people are customers of the IT department. D. Technology is getting cheaper to acquire, operate, and maintain.
D
The ________ is the "director" of your computer system's operations; it is ________ software. A. GUI; application B. GUI; systems C. OS; application D. OS; systems
D
________ is a type of secondary storage. A. A register B. Cache memory C. RAM D. Magnetic Tape
D
Hackers would use a botnet to perform a _________.
DDoS
_________ is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.
Encryption
________ is the most secure cable medium.
Fiber-optic
________ was developed because we have run out of IP addresses in the original IP addressing scheme.
IPv6
Ethernet is a technology associated with ________ s.
LAN
BI systems provide computer-based primarily support _________.
Middle managers
________ clouds are IT infrastructures that can be accessed only by a single entity or by an exclusive group of related entities that share the same purpose and requirements, such as all of the business units within a single organization.
Private
If a hacker takes control of equipment such as power grids or nuclear power plants, this is an example of a(n) ____________ attack.
SCADA
With the ________ delivery model, cloud computing vendors provide software that is specific to their customers' requirements.
SaaS
___________________ is a system in which any object, natural or manmade, has a unique identity and is able to send and receive information over a network without human interaction.
The IoT
True of False If your refrigerator is connected to the internet so that it can automatically re-order milk for you, this is an example of the IoT.
True
True or False A conditional format applies formatting to a cell when its value meets a specified condition.
True
True or False A conditional format can make negative numbers red and positive numbers black.
True
True or False An eight-bit string is known as a byte.
True
According to the textbook, ________ is the most widely available cable medium.
Twisted-pair
Biometrics is an example of something the user __________.
is
To change the order of operations, enclose part of the formula in ____.
parentheses
Which of the following is a characteristic of secondary storage? A. It is more expensive than primary storage B. It can use a variety of media C. It is volatile D. It takes less time to retrieve data from it than from RAM.
B.
Which of the following cloud computing characteristics gives customers elasticity and flexibility because it allows customers to access needed computing resources automatically? A. Scalability B. Encompasses the characteristics of grid computing C. Providing on-demand self-service D. Virtualization
C
Which of the following does NOT contribute to the increasing vulnerability of organizational information resources? A. Today's interconnected, interdependent, wirelessly networked business environment B. Smaller, faster, cheaper, computers and storage devices C. International organized crime taking over cybercrime D. Increasing skills necessary to be a computer hacker E. Lack of management support
C
Which of the following is in the current order starting with the most elementary? A. Data, knowledge, information B. Information, knowledge, data C. Data, information, knowledge D. Information, data, knowledge
C
The price of hardware has ________ over time; the price of software has ________ over time. A. decreased; decreased B. increased; increased C. Increased; decreased D. decreased; increased
D.
A(n) ______________ is located between two firewalls.
DMZ
__________ support all managers of the organization by providing rapid access to timely information and direct access to structured information in the form of reports.
Dashboards
______ refers to an elementary description of things, events, activities, and transaction that are recorded, classifies and stored but are not organised to convey any specific meaning.
Data
Cloud computing is the traditional way of purchasing and running your own IT infrastructure.
False
True or False An adjacent range is a collection of separate ranges.
False
True or False Application software serves as an intermediary between hardware and systems software.
False
True or False Satellite transmission systems are widely used but are being replaced by microwave data communications systems.
False
True or False The incredibly rapid rate of innovation in the computer industry simplifies hardware decisions because computer technologies so easily replace outdated legacy systems.
False
True or False The sheets in a workbook are identified in the sheet tabs at the top of the workbook window.
False
True or False Thin clients work better than fat clients when a network fails.
False
A(n) _____________ is a system that prevents a specific type of information from moving between untrusted networks and private networks.
Firewall
________ is an advantage of open source software.
Flexibility
A(n) ____________ is a company that provides internet connections for a fee.
ISP
IT services, IT personnel, and IT components make up the organization's _____.
IT infrastructure
The customer manages the most with ________.
IaaS
An/The ________ is a network that allows users to take advantage of familiar applications and work habits within an organization's network.
Intranet
________ remain popular because they are the cheapest secondary storage medium and can handle enormous amounts of data.
Magnetic tapes
To avoid splitting a worksheet in awkward places, you can insert a _____ to specify a specific breaking point.
Manual page break
In the Format Cells dialog box, the _____ tab allows you to format currency by choosing decimal places, comma separators, and regular number displays.
Number
________ software is available at no cost to both developers and users; it is distributed with license terms.
Open source
________ software is purchased software that has restrictions on its use, copying, and modification.
Proprietary
________ clouds are shared, easily accessible, multicustomer IT infrastructures that are available nonexclusively to any entity in the general public)
Public
Your computer crashes in the middle of you writing a term paper. You lose the paper because you had not saved a copy yet. You lost your paper because it was in ________.
RAM
____________ transmission systems have signals that pass through walls but they are susceptible to snooping unless encrypted.
Radio
A(n) ____ is a group of cells in a rectangular block.
Range
The main problem with _________ transmission systems is their signals experience propagation delay.
Satellite
____________________ is an attack in which the perpetrator uses social skills to trick or manipulate legitimate employees into providing confidential company information such as passwords.
Social engineering
A(n) ________ interfaces between users and programmers and determines information requirements and technical specifications for new applications.
Systems analyst
A(n) ___________ supports the monitoring, collection, storage, and processing of data from the organization's basic business transactions, each of which generates data.
TPS
True or False By default, Excel displays text in a black font color.
True
True or False Changing the number of decimal places displayed in a cell does not change the value stored in the cell.
True
True or False Cloud computing complicates privacy because sensitive data is in the hands of a third party.
True
True or False Conditional formats are dynamic, so a cell's appearance will change to reflect its current value.
True
True or False Every function follows a set of rules, or syntax, which specifies how the function should be written.
True
True or False Formatting changes only the appearance of data—it does not affect the data itself.
True
True or False Hardware can be used strategically if it is exploited successfully.
True
True or False If you want to print only part of a worksheet, you can set a print area, which is the region of the worksheet that is sent to the printer.
True
True or False In packet switching, packets travel independently across the network and can be routed through different paths in the network.
True
True or False Microsoft Office is an example of a software suite.
True
True or False SSDs do not have moving parts.
True
True or False Server farms are massive data centers with hundreds or thousands of network servers inside them.
True
True or False Throughput will always be less than the connection speed.
True
True or False To address the piracy problem, new firms have arisen to specialize in tracking software licenses for companies for a fee.
True
__________ is a cable medium.
Twisted-pair
___________ is a private network that uses a public network to connect users.
VPN
Each range is identified with a range reference that includes the cell reference of the upper-left cell of the rectangular block and the cell reference of the lower-right cell separated by a ____.
colon
In ____ orientation, a page is taller than it is wide.
portait