CIS Exam 1
Apple Pay uses ________ for payment transfer.
(NFC) Near field communication
Sometimes used to create prototype models for casting, ________ printing is also known as additive manufacturing.
3-D
Business owners, copyright holders, and network administrators publish ________ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.
AUPs
Smartphone cameras work by focusing incoming light onto what type of array that captures images?
Active Pixel Scanner
The mouse was developed by which company?
Apple
Inkjet printers are often sold ________ their production cost.
Below
This technology provides short-distance wireless communication between electronic devices using extremely low power radio signals.
Bluetooth
Printer manufacturers advertise the quality of their products by stating how many ________ they produce.
DPI
Business management software that encompasses nearly all business activities in a corporation is called ________ software.
ERP
A port that allows the transfer of high quality video and audio signals is called a(n) ________ port.
HDMI
These facilitate getting data and information into your computer.
Input Devices
Because of their compact size, touch pads are most often used with ________ computers.
Laptop
The technology (chips) that allow cell phone microphones and hearing aids to be so small is the ________ chip.
MEMS
This technology allows musicians to create written sheet music simply by playing an instrument.
MIDI
Be careful to only open e-mail from senders you know and trust. ________ may be contained in e-mail messages.
Malware
Though currently expensive, curved and paper-thin displays are possible using ________ display technology.
OLED
The technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called
OMR Optical Mark Recognition
In photography, there are two ways to focus on distant objects, digital zoom and ________ zoom.
Optical
Using reflective material to store data that can be read using a laser is called ________ media storage.
Optical
Which of the following is an e-mail program?
Outlook
Printer speed is described using which acronym?
PPM
Using cells of ionized gas to create images, ________ displays are actually becoming less popular.
Plasma
A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a ________.
Plotter
RFID stands for which of the following?
Radio Frequency Identification
The number of pixels in an image is called the image's ________.
Resolution
While not a required step in sending an e-mail, it's wise to ________ any message before clicking Send.
Spell-check
Which category of management information systems (MIS) focuses on tracking sales and inventories?
TPS
Laser printers are popular in offices because they use relatively inexpensive ________.
Toner
Using information systems to help foresee corporate business opportunities and threats that might be done by all levels of management, but it is most important for which management level?
Top-level managers
Select the smartphone input device.
Touchscreen or Keyboard
What type of port do most digital devices use to attach peripherals?
USB Port
Television displays with resolutions of at least 3840 x 2160 pixels are referred to as ________.
UltraHD
The technology that uses cameras, microphones, displays, speakers, and software to allow users to both see and hear each other is called ________.
Video Conference
With ____ recognition technologies, frequency, pitch, speech rhythms, and other characteristics are charted and compared to existing records.
Voice
A camera that takes photos or streams video into a computer or over the Internet is called a ________.
Webcam
A form of E-mail fraud where criminals change the account where money is being transferred is called a(n) ________ scam.
Wire-wire
The width of a screen compared to the height of a screen is referred to as ________.
aspect ratio
Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a(n) ________, which closes the access point used by the hacker.
block
The technology that allows any text, even handwritten scrawls, to be digitized is known as optical ________ recognition.
character
Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on ________.
checks
Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ________.
corruption
Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a(n) ________.
data analyst
Stealing confidential materials such as copyrighted material, confidential information, or company e-mails from a network is called ________. Most often, this crime is committed by employees inside the company rather than outside hackers.
data theft
Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a(n) ________.
database administrator (DBA)
The number of times per second a frame in a video is advanced is the definition of ________.
frame rate
The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the ________.
information systems (information technology) program manager
The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ________.
information systems (information technology) technician
Sometimes used in smaller business networks, employee ________ software is impractical for large networks because of the number of users and the potential for misuse.
monitoring
Though legal, which of the following would likely be prohibited by a typical business computer-use policy?
online personal shopping
The smallest controllable element of an image is called a(n) ________.
pixel
The term that describes how fast each pixel in a display is updated is ________.
refresh rate
Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ________ software.
remote desktop
The number of pixels in a display is called the display's ________.
resolution
The diagonal measure of the visible display is known as ________.
screensize
To improve the sound quality of their smartphones, many users purchase larger external ________ to listen to music.
speakers
Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should
tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.
Computer Hardware
the physical equipment used for input, processing, and output activities in an information system
The most common printers for printing receipts are ________ printers.
thermal
Most smartphones and tablets produced today use a ________ keyboard.
virtual