CGS 2100 EXAM 1 FSU
When you buy a new laptop, how much RAM should it come with?
4-8 GB
Which of the following refer to ultra-high-definition television displays
4K UHD, 8K UHD, UltraHD
some computers use ___ to represent characters in a binary format
ASCII
Today the standard port for video and audio input on TV is the ___ port
HDMI
Put the SDLC steps in order.
Investigation, Analysis, Design, Develop
An object-oriented programming language used by Android phones and tablets to write apps is ___.
Java
Though currently expensive, curved and paper-thin displays are possible using ___ display technology.
OLED
Many manufacturers have made _____ optional equipment when purchasing a new laptop computer.
Optical drives
RFID stands for which of the following.
Radio Frequency Identification
Which of the following are designed as a network operating system
Windows NT, Windows Server, UNIX
A description of the difference in the luminance of a display's white pixels compared to the black pixels is called
contrast radio
Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___.
corruption
The SSD cost is ___ than the traditional hard drive cost.
higher
Lose range tones generally require ___ speakers.
largwe
A megabyte equals approximately one _____ bytes?
million
Which of the following is a strength of the windows platform
most widely used OS in laptops, desktops, usually leading to lower prices
The actual pixel number in a monitor is called the ___ resolution.
native
A(n) ___-oriented assessment operates well when inputs can readily be put into distinct categories or classes
object
JSON stands for JavaScript ______________ Notation
object
The smallest image element is a(n) ________.
pixel
One of the main differences between free and fee-based antivirus software is ___.
the number of features
Megahertz abbreviation is ________.
MHz
Which of the following represents the least amount of storage
kilobyte
A processor that consists of one control unit and one ALU is called a ___.
single-core processor
common names for a USB drive include
thumb drive, flash drive, jump drive
Place the following steps in order for the process of uninstalling a program from a Chromebook
1. Click the Launcher (circle icon). 2. Right-click the unwanted app. 3. Select Uninstall or Remove from Chrome. 4. Click Remove.
Select what's true regarding all-in-one computers
All in one computers house every component except the keyboard and mouse inside the same case as the monitor, an all in one computer is a stationary device with a separate keyboard and mouse
AJAX stands for___JavaScripts and XML
Asynchronous
These facilitate getting data and information into your computer.
input devices
Uses for computer hard drives include ________ and ________.
keeps files for future use and data remains intact when computer is off
An Internet filter is firewall software used to block a user's access to specific Internet content. This software can reside on which 3 of the following
router or users computer, network, stand-alone filter attached to a server
Good password management include which three of the following
Changing your password often, Using strong passwords,Never use the same password twice
VPN (Virtual Private Network) is a very useful tool in protecting your online identity. A VPN hides your ___ to outside websites
IP address
Identify what is true about script kiddies
are amateur computer hackers with little programming expertise, illegally gain access to computer systems using programs (scripts) that others have written
The method used in the development and maintenance of an IT scheme is called the SDLC. SDLC stands for System Development ___ Cycle.
Life
Be careful to only open email for senders you know and trust. ___ may be contained in email messages
Malware
Common computer virus infection indicators include ___, ____, and ____.
OS doesn't launch properly, files get deleted or encrypted, strange error messages or pop up ads.
Select appropriate business email etiquette practices
Remember that potentially negative news is best given face-to-face. Keep attachments small.
Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ___ software.
Remote Desktop
Select the factors that should be considers when purchasing external speakers for a digital device
Sound quality, portability, price,
Apple developed ___, a programming language for Mac OS and iOS writing software because Objective-C was hard to write.
Swift
Which are important considerations when purchasing a new computer?
What is its price? How much RAM comes with it? Does the device have USB ports?
Testing and documenting the software are the final steps in the PDLC process. When testing is carried out by the softwares potential customers, it is called a(n) ____ test.
beta
Factors that damage computer hardware include
power surges, overheating, humidity, magnetic fields
Pseudocode is written in natural language, but often including programming ___ to assist in writing the program itself.
shorthand
Devices allowing data to be retained when your computer is shut down are called ________ devices.
storage
What is the most powerful computer type?
supercomputer
Select the two phases of the final step in the system development life cycle
system audit, evaluation phase
Using IS to help for see corporate business opportunities and threats that might be done by all levels of management but it is most important for which management level
top level managers
What order of steps should you take to change your cookie preferences in Safari?
1. Choose Safari 2. Click Preferences 3. Click Privacy 4. Change cookie settings
Match the following description with the appropriate programming language generation.
1GL-Machine language-represented by a series of 1s and 0s, 2GL-Assembly language-An assembler converts 2GL into machine language, 3GL-High level programming language-uses a complied to convert into machine language, 4GL- Specifically designed for creating database management programs, 5GL- Extremely advanced-uses statements (scripts) rather than algorithms.
All of the following are common ports that are included with laptop computers
ethernet ports, hdmi ports, usb ports
The machine cycle consists of which four steps?
fetch, decode, execute, store
Breaking into a computer system (hacking) for political or social purposes is called
hacktivism
The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ___.
information systems (information technology) technician
Josh is taking an Intro to Computers course and needs to use Microsoft Office to complete a variety of assignments. He has purchased the software, now he must ________ it so he can start his assignments.
install
A two-in-one computer combines a tablet with a (usually) detachable ___ to make it relatively powerful yet mobile computer
keyboard
Spyware collects your ____, ____, and ____ to gain information about your Internet habits and activities.
keystrokes, passwords, confidential info
Though legal, which of the following would likely be prohibited by a typical business computer-use policy?
online personal shopping
What manages hardware and software, supports the computer's basic functions, and runs programs?
operating system
The three most common types of e-mail viruses includes all except
password savers
In each browser's settings area you should consider ________, ________, and ________.
periodically deleting cookies, blocking/customizing your cookie settings, decide from which sites you want to allow cookies
Visiting pornography sites while using a company computer and or network violates your company's computer use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other coworkers also noticed this. You should
tell your boss that you've witnessed the coworker visiting porn sites while using the company computer or network, be brief and direct
Choose the two answers that define the term "resolution" in output devices.
the numbers of pixels in a display, the quality of the image
A kilobyte is equal to approximately one ________ bytes.
thousand
select what's true regarding uninstalling software
uninstalling system software is not recommended, be cautious when uninstalling software from the OS manufacturer, be cautious when uninstalling software from the computer manufacturer
If you purchase a new graphics computer game or a new photo or video editing software for your desktop computer, you may want to purchase a new ___ card.
video
The technology that uses cameras, microphones, displays, speakers, and software to allow users to both see and hear each other is called
video conferencing
Which of these should business owners do to help protect their data
Establish strong firewall protection for their business's network. Ensure antivirus software is installed and up-to-date. Create strong password protections and protocols.
Which is true regarding the length of a USB cord
In general, the more data being transmitted, the shorter the cord should be.
Trojan horse programs are used to find
bypassing firewalls, funding passwords, destroying data
Match the component of a business email with its characteristics
close:professionally ends the message, salutation:sets the tone of the message, body:succinctly discusses the purpose of the message, from and or subject lines:determines if the email will be opened
Place the following steps in order to attach a document from your documents folder to an email in Outlook
1. Go to Outlook (log in if necessary) and create your message 2. Click Attach (also indicated by a paper clip symbol) 3. Select computer 4. Select documents 5. Double click the desired file and select attach as a copy
The SDLC's system analysis phase includes three stages. Choose the three stages.
Data-collection-gathering info about needs and existing hardware and software, Analyze data-determine the system requirements, Prepare the system specifications
Which statements refer to a display's contrast radio
Describes the difference in brightness, Luminace of white pixels compared to black pixels
Select the usual roles of information systems (IS) technicians.
Installing IS hardware and software. Maintaining IS hardware and software. Repairing and replacing IS hardware and software.
In order to ensure that employees understand what's appropriate and what's inappropriate use of company's computer equipment software and networks employees must set ethical computer use standards. This includes which of the following
Instructing employees on standards, Enforcing standards by creating firewalls, monitoring protocols and filters, Periodically reviewing computer use policies
A digital device that accepts input, processes and stores the input, and provides output is a ____.
computer
A person who uses computers and the internet to launch attacks against computer systems for political or ideological reasons is called a
cyberterrorist
How is the screen size of a laptop computer measured?
diagonally from left corner to right corner
A___ is the hardware or software used to keep a computer secure from external threats such as hackers and viruses by allowing or blocking internet traffic
firewall
Match the business information systems (IS, sometimes called information technology or IT) activity with the appropriate management level
first level managers (supervisors, floor managers): Use IS for scheduling daily and weekly operations, Middle managers: Use IS for record keeping and reporting purposes, Top-level management (business executives and presidents): Use IS to monitor overall business performance
A process's graphical representation is called a___.
flowchart
After the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a ___, and is in written in an ordinary language, such as English.
flowchart
This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery
gait analysis
The visual image output created by the computer is called ____.
graphics
The software development process includes which of the following steps
planning, programming, debugging, beta review
Converting a task into commands that a computer can use to perform the task is called ________.
programming
An output device that uses light to display video or image output on a surface is called a
projector
What is the correct order of steps to use when uninstalling program in Windows 10 using the search feature
1. Open the start menu 2. Click settings 3. Click System on the Settings menu. 4. Select Apps & Features 5. Select a program you wish to uninstall
CPU clock speeds of a personal computer range between ____.
2 to 4 gigahertz
Choose what all in one computers actually mean
An all in one computer is a stationary device with a separate keyboard and mouse, an all in one computer houses every component except the keyboard and mouse inside the same case as the monitor
Settings in Firefox can be changed to allow you to complete which three tasks
Approve cookie storage requests, Deny cookie storage requests, Delete stored cookies automatically when you start Firefox
Since its radio waves pass through walls or desktops, ________-capable devices are very popular.
Bluetooth
The three stages to be completed in the SDLC's inquiry phase include
Defining the problem. What should this system do? Who will be using this IT system?, Examining alternatives. Can available hardware and software perform the same task?, Reporting. Document your investigations findings
Match the conversion methods with the correct description in the system implementation step of the SDLC
Direct-shuts down the old system and starts the new system, Parallel-old and new systems run side by side for a while, Pilot- starts in one area of the organization and then is deployed to the rest of the organization, Phased- implements new areas of the system in a predetermined period of time.
Which are true regarding a screen's resolution
Equals the number of pixels in a display, measures image quality
To speed up the programming process while producing dynamic web pages, select the program that utilizes tiny programs called scripts.
JavaScript
A commonly used short-range wireless technology used for data transfer and electronic payments is called ___.
NFC (Near Field Communication)
amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called _______________
Script kiddies
Match the Macintosh keyboard shortcut with the appropriate result.
Select All: Command+A, Save:Command+S, Find (in most apps):Command+F, Screenshot:Command+Shift+3
Select the unusual tasks of information systems program managers
Supervising IS technicians, Working with developers and senior management to procure and implement IS processes, Developing training plans and policies for IS.
Select the qualities that make a trait useful for biometric recognition
The trait must not change over time, Everyone must have the trait, The trait must be measurably different with each person
Choose what is true about cookie privacy risks
Websites using cookies can collect your info and sell it to third parties,Websites can track surfing behavior and create a profile, corporate and gov entities can track your web behavior
Smartphone cameras work by focusing incoming light onto what type of array that captures images?
active pixel scanner
Software that collects the web browsing history of the user and uses the collected data to create unwanted pop up ads is called
adware
Devices which house every component except the keyboard and mouse inside the same case as the monitor are called ________ computers.
all-in-one
One of the first stages of the PDLC testing method is a test of fresh software performed by the programmers themselves or contract evaluators working alongside the programmers. This is called the ___ test.
alpha
When reporting a computer ethics violation of a coworker to your employer, it's important to ___.
be brief and direct, state only what you witnessed
Select the tasks of a data analyst
collect data, interpret info provided by the database, creates reports for senior management,
A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the ________.
control panel
The most popular web browsers have a private browsing mode. While browsing in incognito mode your browser will not store ___.
cookies
In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment software and networks, employers must set ethical computer use standards. Failure to set such policies can lead to which of the following
decreased employee performance, decreased network speed, increased likelihood of security breaches
Because of their compact size, touch pads are most often used with ____ computers.
laptop
It's always a good idea to check the ___ before clicking Reply to all
list of address
Ranks the storage capacities from highest to lowest. Start with the highest capacity first.
petabyte, terabyte, gigabyte, megabyte, kilobyte
The smallest controllable element of an image is called a(n) _____.
pixel
Though legal, which of the following would likely be prohibited by a typical business computer-use policy?
playing online games
Select the advantages of a point-and-shoot camera over a smartphone camera
point and shoot cameras often have larger pixel sensor arrays, providing higher resolution, point and shoot cameras being thicker often come with optical zoom capability
A point in a computer (a hole or a slot) that accepts a specific connector is called a ___.
port