CGS Exam 2
what their competition perceived them to be
A businesses brand is derived from all of the following except ______ .
webcam
A camera that takes photos or steams video into a computer or over the Internet is called a ___ .
contrast ratio
A description of the difference in the luminance of a display's white pixels compared to the black pixels is called ___ .
barcode
A device commonly used for checkout in stores, that measures the reflection of a laser beam, is called a ___ reader.
wire-wire
A form of Email fraud where criminals change the account where money is being transferred is called a ___ scam.
Creative
A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is called _____ Commons.
Instagram charges a fee to download the app.
All of the following are true about Instagram except
unlimited
Because of the popularity and bandwidth demands of video streaming, ___ data plans are not as common as they were in the past.
laptop
Because of their compact size, touchpads are most often used with _____ computers.
data
Before you can start tethering, verify that it's included in your cell phone's ___ plan
peer-to-peer
BitTorrent utilizes no central server, instead opting to utilize a _____ structure where each device connected to a network has equal access to the shared files.
the World Wide Web
HTML and it's 5th revision (HTML5) allow content to be displayed on ___ .
binary
If it can be answered as either yes or no, or true or false, the question is called ___ .
3G
If you just need a phone for calling and texting, a ___ phone can save you money.
prepaid
If you just need a phone for emergencies, you might consider a ___ phone.
toner
Laser printers are popular in offices because they use relatively inexpensive ___ .
Blackberry
Once so commonly used that people even called it the "Crackberry", the ___ popularity dropped significantly in the U.S. after 2007.
microSD storage
One advantage that the Samsung tablets have over the iPads is that you can add ___ to the Note or Tab.
Radio Frequency Identification
RFID stands for which of the following.
UltraHD
Television displays with resolutions of at least 3840 x 2160 pixels are referred to as ___ .
content is missing
content is missing
loop
A process that has an initial value, a process, and a test condition that can potentially return the program to the initial value is called a ___ .
interpreter
A program that can be used to convert a single line of C# into machine language without having to compile the entire program is called a C# ___ .
JavaScript
A program that makes creating websites and webpages much faster is ___ .
compiler
A program that takes an entire program, check the source code for errors, and converts it into machine language is a ___ .
top-down
A programming design that breaks down a problem into a series of tasks is called ___ programming.
plotter
A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a ___ .
Asynchronous
AJAX stands for ___ JavaScript and XML.
high-frequency RFID can transmit signals further than 1500 feet.
All of the following are true about RFID except
3D
Also known as additive manufacturing (AM), ___ printing sprays successive layers of material to create an object.
peripheral
An input, output or storage device connected to a computer is known as a(an) _____ .
projector
An output device that uses light to display video or image output on a surface is called a ___ .
280
As of 2017, tweets can be a maximum of ___ characters.
ERP
Business management software that encompasses nearly all business activities in a corporation is called ___ software.
microwave
Cell phones send and receive extremely weak ___ signals to and from cell towers.
$500.00
If your debit card has been compromised and you wait more than two days, but fewer than two months after you learn about the loss, you can be liable for up to _____.
language
Instructions (software) that allow a computer (hardware) to be used are written using specific symbols, letters and numbers known as a programming ___ or code.
virtual
Most smartphones and tablets produced today use a _____ keyboard.
touchscreen or keyboard
Select the smartphone input device.
Surface Pro 4
Since it comes with a full computer operating system, some consider the ___ a laptop computer rather than a tablet computer.
10
Snaps on Snapchat can be viewed for up to ___ seconds (depending on what the user chooses) and then disappear.
C++
The coding step of the PDLC might use which of the following languages?
screen size
The diagonal measure of the visible display is known as _____ .
maintaining
The final step in the SDLC has two phases, a system audit and an evaluation phase. This final step is referred to as ___ the system.
Apple
The mouse was developed by which company?
information systems (information technology) program manager
The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the ___ .
analysis
The second step of the SDLC process involves collecting data about existing hardware and software, analyzing this data, and preparing specifications for the system. This is called the system ___ step.
refresh rate
The term that describes how fast each pixel in a display is updated is ___ .
Title 5 - Copyright Protection Proviso.
The titles in the DMCA that directly impact digital copyright issues include all of the following except
aspect ratio
The width of a screen compared to the height of a screen is referred to as ___ .
input devices
These facilitate getting data and information into your computer.
iOS
Third party apps must be reviewed and approved by Apple before being available for the ___ .
MIDI
This technology allows musicians to create written sheet music simply by playing an instrument.
Bluetooth
This technology provides short-distance wireless communication between electronic devices using extremely low power radio signals.
gait analysis
This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery.
top level managers
Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?
active pixel sensor
When discussing digital cameras or smartphone cameras with APS CMOS, APS stands for ___ .
object
When inputs can easily be placed into different categories or classes, a(n) ___ -oriented analysis works well.
management information systems
When referring to business information technology, MIS stands for ___ .
Pin
When you personally share an image on Pinterest it is known as a _____.
DSS
Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?
TPS
Which category of management information systems (MIS) focuses on tracking sales and inventories?
Outlook
Which of the following is an email program?
Cyberstalking and online predators are a real problem on Facebook.
Which of the following statements about Facebook is true?
iOS
Which of these is found on iPhones and iPads?
spell check
While not a required step in sending an email, it's wise to ___ any message before clicking Send.
voice
With ____ recognition technologies, frequency, pitch, speech rhythms and other characteristics are charted and compared to existing records.
Apple
With its iPhone, ___ dominates the U.S. smartphone market.
remains the same
With optical zoom, resolution ____ when focusing on distant objects.
NFC
Apple Pay uses _____ for payment transfer.
C++
If you plan to write software for PC games you should probably learn C or ___ .
roaming
If you're in an area where your home network has no cell coverage, you may need to use the cellular network of a different provider. This is called ___ .
$50.00
If your debit card has been compromised U.S. Federal law says you are only liable for a maximum of _____ in fraudulent charges if you tell your bank within two business days of learning about them.
capacitance
Most touchpads use _____ to sense when a finger has moved across the pad.
video
Some apps that use a surprising amount of data are those that include embedded ___ .
OLED
Though currently expensive, curved and paper-thin displays are possible using ___ display technology.
3G
Two major catagories of cell phones are available. Smartphones with LTE or 4G capability and ___ phones.
plasma
Using cells of ionized gas to create images, ___ displays are actually becoming less popular.
AJAX
A set of programs that allow data to be exchanged on a website without changing the website's display is ___ .
settings
After verifying that your data plan includes tethering, the first step in creating a hotspot with your Android phone is to click on the ___ icon.
programming
Converting a task into commands that a computer can use to perform the task is called _______.
separation
Social networking is based on the six degrees of _____ concept which posits that you can connect with anyone through a chain of no more than six introductions or personal links.
remote desktop
Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ___ software.
3D
Sometimes used to create prototype models for casting, ___ printing is also known as additive manufacturing.
roaming
Sometimes, particularly when travelling, you may find yourself in an area where your home network has no cell coverage, but another network does have service. Using a different network is referred to as ___ .
0-1
A smartphone emits approximately ___ watts of microwaves.
alpha
A test of new software conducted by the programmers themselves or by contracted evaluators working alongside the programmers is one of the first phases of the testing process in the PDLC. This is referred to as a(n) ___ test.
data analyst
Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___ .
syncing
Connecting your phone to your laptop to transfer photos, videos, or music files is referred to as ___ .
analog
In order to change sound waves into digital signals, smartphones contain ______ - digital converter.
GoPro
Relatively rugged, water-resistant video cameras that allow users to film high-definition video under harsh conditions, such as on ski mountains, in the ocean, or at high altitudes are called extreme-action video cameras or simply a ___ .
tethering
Sharing an Internet connection between two digital devices, for example, using your smartphone to create a hotspot and then using the hotspot to connect your laptop to the Internet, is referred to as ___ .
switching
The cell tower's base transmission station is connected to a mobile ___ station.
open educational resources.
All of the following are protected against unauthorized use or distribution by intellectual property laws except
500 MB - 2 GB
Most new cell phones today come with approximately ___ of RAM.
resolution
The number of pixels in an image is called the image's ____ .
Mobile Switching Station (MSS)
Because it locates cellular devices, assigns frequencies, transmits signals to the correct sites, the ___ is probably the most important part of any cellular network.
large
Because of the large infrastructure cost of building antennae and mobile switching stations, as well as leasing the rights to use radio frequencies, only ___ companies can compete nationally as cell phone providers.
EFT Act
In the United States the federal _____ covers most consumer oriented electronic transactions.
weaker
In urban areas, the cell towers become more numerous and the cell signals transmitted by the cell towers are ___, than those in less populated areas.
texting
Ironically, the expenses for calling and ___ are among the smallest charges found on a cell phone bill.
BASIC
The 3rd generation programming language that most students learned when most computers used MS DOS was ___ . It remains a safe programming language for using 3rd party code and provides a coding standard that integrates easily with other programming languages.
beta
The final steps in the PDLC process include testing and documenting the software. When testing is conducted by potential customers of the software, it's referred to as a(n) ___ test.
game apps
The largest category of apps, both in terms of active downloads and in terms of revenue generated is ___ .
signal
The small computer within your phone that enhances the sound quality of your call is called a digital ___ processor.
pixel
The smallest controllable element of an image is called a(n)___ .
MEMS
The technology (chips) that allow cell phone microphones and hearing aids to be so small is the _____ chip.
character
The technology that allows any text, even handwritten scrawls, to be digitized is known as optical ___ recognition.
intellectual
To protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products, there are ___ property laws.
downloading
Transferring a file from the Internet to your digital device is called _____.
debugging
After the code has been written there are nearly always mistakes. The 4th step in the PDLC involves finding and correcting these errors in a process called ___ .
JavaScript
Select the program that uses small programs called scripts to speed the programming process while creating dynamic Web pages.
ergonomics
The art and science of creating output that provides information in the most useful manner is called ___ .
iPad Pro
Apple's mobile device with the largest display is the ___ .
Swift
Because Objective-C was difficult to write in, Apple developed ___ , a programming language for writing software for the Mac OS and the iOS.
below
Inkjet printers are often sold ____ their production cost.
frame rate
Number of times per second a frame in a video is advanced is the definition of ___ .
design
The third step of the SDLC has 3 phases, specifically, developing several system proposals, selecting the most feasible proposal, and reporting on the selected system to be developed. This step is called the system ___ step.
playing online games
Though legal, which of the following would likely be prohibited by a typical business computer-use policy?
toner
To create an image with a laser printer ___ is(are) drawn to the drum.