CIS Exam 1
The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ________. database administrator (DBA) information systems (information technology) technician information systems (information technology) program manager data analyst
information systems (information technology) technician
These facilitate getting data and information into your computer. output devices display devices processing devices input devices
input devices
Josh is taking an Intro to Computers course and needs to use Microsoft Office to complete a variety of assignments. He has purchased the software, now he must ________ it so he can start his assignments. uninstall install program boot
install
Adding software to a digital device, or adding hardware components to a digital device is called ________. uninstalling booting installing importing
installing
Which of the following represents the least amount of storage? gigahertz megabyte kilobyte gigabyte
kilobyte
A mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or a ________ computer. phablet desktop laptop server
laptop
Because of their compact size, touch pads are most often used with ________ computers. desktop smartphone laptop tablet
laptop
Lower range tones generally require ________ speakers. more compact smaller slimmer larger
larger
It's always a good idea to check the ________ before clicking Reply to All. Subject line list of addressees date and time word count
list of addressees
Because a metal platter is physically spinning, hard drives have ________ access times than solid state hard drives. wider shorter longer faster
longer
Most desktop computers use ________ to store data. RAM storage magnetic hard drives CD drives flash storage
magnetic hard drives
A million bytes of data equals one ________. gigabyte kilobyte petabyte megabyte
megabyte
One thousand kilobytes (KB) equals one ________. megabyte gigabyte terabyte byte
megabyte
A megabyte equals approximately one ________ bytes? trillion billion million thousand
million
A laptop typically has ________ RAM than a smartphone. more far less less roughly the same
more
Which of the following is a strength of the Android platform? owned by Microsoft corporation most widely used OS for laptops and desktops used on most iPhones most widely used OS for smartphones and tablets
most widely used OS for smartphones and tablets
The actual pixel number in a monitor is called the ________ resolution. pixel actual native content
native
Though legal, which of the following would likely be prohibited by a typical business computer-use policy? setting up a pyramid-type computer scam making a bomb threat over the network online personal shopping intentionally installing a computer virus
online personal shopping
What manages hardware and software, supports the computer's basic functions, and runs programs? ROM RAM BIOS operating system
operating system
In photography, there are two ways to focus on distant objects, digital zoom and ________ zoom. distant focal computerized optical
optical
Using reflective material to store data that can be read using a laser is called ________ media storage. reflective magnetic optical cloud
optical
Many manufacturers have made ________ optional equipment when purchasing a new laptop computer. RAM optical drives hard drives CPU
optical drives
Blu-ray technology stores data using ________. a magnetic coating that is sensed by a read/write head pits and lands that are read by a blue spectrum laser beam electronic circuits a metal platter with a reflective coating
pits and lands that are read by a blue spectrum laser beam
The smallest controllable element of an image is called a(n) ________. monitor pixel element LCD
pixel
Using cells of ionized gas to create images, ________ displays are actually becoming less popular. LED plasma high-definition LCD
plasma
A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a ________. laser printer inkjet printer plotter thermal printer
plotter
With regard to digital storage, RAID stands for ________. redundant array of independent discs readily accessible identified data relative access to incremental data rational access to instant data
redundant array of independent discs
CDs store data using ________ reflective coating that has pits and lands a magnetic coating that is sensed by a read/write head a blue spectrum laser beam electronic circuits (transistors and capacitors) that store data
reflective coating that has pits and lands
The term that describes how fast each pixel in a display is updated is ________. refresh rate aspect ratio frame rate contrast ratio
refresh rate
The number of pixels in an image is called the image's ________. contrast clarity matrix resolution
resolution
The diagonal measure of the visible display is known as ________. screen size resolution aspect ratio refresh rate
screen size
In general, the ________ the access time, the faster the hard drive. slower longer wider shorter
shorter
Increased data transfer will be less likely to have errors if you use a ________ USB cord. shorter slimmer longer downstream
shorter
A processor that consists of one control unit and one ALU is called a ________. multi-core processor single-core processor dynamic processor AMD processor
single-core processor
The average tablet has a ________ hard drive compared to the average desktop. smaller same sized much larger larger
smaller
To improve the sound quality of their smartphones, many users purchase larger external ________ to listen to music. printers monitors speakers keyboards
speakers
While not a required step in sending an e-mail, it's wise to ________ any message before clicking Send. add images to add emoticons to word count spell-check
spell-check
What is the most powerful computer type? supercomputer mainframe server
supercomputer
Binary language consists of two digits, ________ and ________. 1; 2 0; 1 0; 2 0; 0
0; 1
"Full HD" resolution is expressed as 1600 x 900. 1680 x 1050. 2180 x 1260. 1920 x 1080.
1920 x 1080.
Most new laptop computers come with how much storage? 256 GB - 1 TB 123 - 206 TB 256 - 512 MB 123 MB - 206 G
256 GB - 1 TB
Also known as additive manufacturing (AM), ________ printing sprays successive layers of material to create an object. inkjet 3-D thermal laser
3-D
Sometimes used to create prototype models for casting, ________ printing is also known as additive manufacturing. inkjet 3-D laser thermal
3-D
When you buy a new laptop, how much RAM should it come with? 4-8 GB 15-20 GB 2-4 MB 1-2 GB
4-8 GB
Blu-rays provide approximately ________ of storage space. 50 GB 300 MB 4.5 GB 700 MB
50 GB
A typical laptop has a storage capacity of approximately ________. 4-16 GB 25-50 TB 500 GB-1 TB 100-300 GB
500 GB-1 TB
Business owners, copyright holders, and network administrators publish ________ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software. SOPs bps AUPs BTUs
AUPs
Smartphone cameras work by focusing incoming light onto what type of array that captures images? Active pixel scanner Digital scanner Pixel scanner Sonar
Active pixel scanner
Smartphone cameras work by focusing incoming light onto what type of array that captures images? Active pixel scanner Pixel scanner Digital scanner Sonar
Active pixel scanner
The mouse was developed by which company? Dell Microsoft Apple HP
Apple
Which optical drive media stores approximately 700 MBs of data? DVD Blu-ray Thumb drive CD
CD
Though it could theoretically hold terabytes of data for thousands of years in a microscopic space, ________ storage, using genetic material, is a distant storage option. aser cloud DNA optical
DNA
Printer manufacturers advertise the quality of their products by stating how many ________ they produce. color bits pixels DPI lines per inch
DPI
Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production? EIS ESS TPS DSS
DSS
How is screen size measured? Ratio of width : height Diagonally from a top corner to a bottom corner of a visible display The number of vertical lines of resolution Number of pixels horizontally x number of pixels vertically
Diagonally from a top corner to a bottom corner of a visible display
Business management software that encompasses nearly all business activities in a corporation is called ________ software. DSS GPS ERP TPS
ERP
An application that navigates all of the files and folders on your Mac is the ________. Utility Finder Launch Pad Navigator
Finder
This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery. Gait analysis Walking analysis Running analysis Retinal analysis
Gait analysis
Relatively rugged, water-resistant video cameras that allow users to film high-definition video under harsh conditions, such as on ski mountains, in the ocean, or at high altitudes are called extreme-action video cameras or simply a(n) ________. FunCam Instamatic camera DSLR camera GoPro
GoPro
A port that allows the transfer of high quality video and audio signals is called a(n) ________ port. SVGI S parallel HDMI
HDMI
Which is true regarding the length of a USB cord? In general, the more data being transmitted, the shorter the cord should be. A USB 1.0 cord has more bandwidth than a USB 2.0 cord. In general, the more data being transmitted, the longer the cord should be. Cord length has nothing to do with data transmission amounts.
In general, the more data being transmitted, the shorter the cord should be.
A TV remote usually uses ________ waves. microwave fiber-optic Infrared (IR) Bluetooth
Infrared (IR)
The processor directly houses the ________ cache. L3 disk L1 petty
L1
Megahertz abbreviation is ________. mez MB mb MHz
MHz
This technology allows musicians to create written sheet music simply by playing an instrument. MIDI USB HDMI CMOS
MIDI
All of the following are common ports that are included with laptop computers except ________. MIDI ports. USB ports. Ethernet ports. HDMI ports.
MIDI ports.
When referring to business information technology, MIS stands for ________. Marketing investment systems Management information systems Marketing intelligence systems Motivational, inspiring, spiritual
Management information systems
Which of the listed programs are used for creating documents, basic web pages, and desktop publishing? Microsoft Publisher Microsoft Notepad Microsoft Excel Microsoft Word
Microsoft Word
Apple Pay uses ________ for payment transfer. Bluetooth OMR IrDA NFC
NFC
Though currently expensive, curved and paper-thin displays are possible using ________ display technology. ultraHD LCD CRT OLED
OLED
Printer speed is described using which acronym? 1080p PPM DPI CPU
PPM
Because of its capability of storing data in multiple hard drives, data warehouses use ________ technology to ensure redundant data storage. optical CPU Blu-ray RAID
RAID
The type of storage that retains data and information when the power is turned off is called ________. L3 cache register ROM (Read Only Memory) RAM (Random Access Memory)
ROM (Read Only Memory)
RFID stands for which of the following? Radio Frequency Identification Relational Formula Income Database Regional Functioning Internet Distribution Relative Functioning Internet Distribution
Radio Frequency Identification
Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently? EIS SCMS ERP ESS
SCMS
A combination input and output device that allows users to interact with large computer displays that is sometimes found in classrooms is called an interactive whiteboard or a(n) ________. textboard SMART board touch panel interactive Chalk Talk
SMART board
Because they have no mechanically moving parts, ________ provide extremely fast, efficient storage. DVD drives Blu-ray drives SSDs magnetic hard discs
SSDs
Which of the following is not a presentation software term? Slide Master Speaker Notes Slide Speaker Image
Speaker Image
Which category of management information systems (MIS) focuses on tracking sales and inventories? DSS TPS ESS EIS
TPS
A channel over which information flows inside a digital device is called a ________. processor RAM hard drive bus
bus
Data flows between different computer parts via ________. buses Random Access Memory (RAM) hard drive Graphics Processing Unit (GPU)
buses
In ASCII 8 bits are combined to create a ________. bite bit byte pixel
byte
One ________ represents a letter, symbol, or number (one character) of information. byte register bit pixel
byte
Most touch pads use ________ to sense when a finger has moved across the pad. pressure capacitance lasers heat
capacitance
The technology that allows any text, even handwritten scrawls, to be digitized is known as optical ________ recognition. code capacitor character charge
character
Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on ________. receipts printouts checks book pages
checks
Because it allows their files to be accessed from any device on the Internet, many users like to back up their files using ________ storage. cloud solid state microSD optical
cloud
E-mailing a file to yourself is an example of using ________ storage. cloud internal external optical
cloud
The number of bits of data describing each pixel in a display is referred to as ________. resolution color depth aspect ratio contrast ratio
color depth
A digital device that accepts input, processes and stores the input, and provides output is a ________. router modem computer switch
computer
A description of the difference in the luminance of a display's white pixels compared to the black pixels is called ________. resolution frame rate aspect ratio contrast ratio
contrast ratio
Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ________. corruption hacking theft fraud
corruption
A disadvantage of cloud storage is that ________. over time, data stored on the cloud deteriorates when a DVD gets scratched, data can be irretrievably lost data is only available when you are online because of their small size, thumb drives can easily be lost
data is only available when you are online
Stealing confidential materials such as copyrighted material, confidential information, or company e-mails from a network is called ________. Most often, this crime is committed by employees inside the company rather than outside hackers. data theft libel fraud perjury
data theft
Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a(n) ________. database administrator (DBA) data analyst information systems (information technology) technician information systems (information technology) program manager
database administrator (DBA)
How is the screen size of a laptop computer measured? Width of the screen multiplied by length of the screen. diagonally from left corner to right corner left to right across the center of the screen top to bottom across the center of the screen
diagonally from left corner to right corner
Which of the following is a strength of the Linux platform? most widely used OS in desktops and laptops free to download and use most widely used OS in smartphones and tablets less susceptible to viruses than Mac OS
free to download and use
Typical tablet computer or smartphone SSD capabilities are measured in ________ megabytes gigabytes trilobites kilobytes
gigabytes
What is equal to one cycle per second? megahertz hertz byte bit
hertz
The SSD cost is ________ than the traditional hard drive cost. about the same significantly lower higher lower
higher
In the body of a professionally formatted business e-mail, where should a request be placed? immediately following the reasons for your request at the end of the body, for emphasis in the first sentence of the body of your e-mail as part of a professional closing of an e-mail
in the first sentence of the body of your e-mail
The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the ________. database administrator (DBA) data analyst information systems (information technology) technician information systems (information technology) program manager
information systems (information technology) program manager
Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network. tell your boss that other co-workers have been complaining about this activity. tell your employer that visiting porn sites while using computer can hurt the company's business if potential customers see this activity. tell you boss that others have told you that this co-worker frequently visits porn sites at work.
tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.
A thousand gigabytes (GB) equals one ________. petabyte megabyte yottabyte terabyte
terabyte
Which has the most storage capacity? terabyte gigabyte megabyte kilobyte
terabyte
Along with the From line, what is the most important factor in ensuring your business message is read? your e-mail's closing the Subject line the Salutation the Body of the e-mail
the Subject line
The term "native resolution" refers to? the number of lines in a display the number of colors in a display the number of squares in a display the number of pixels in a display
the number of pixels in a display
Using information systems to help foresee corporate business opportunities and threats that might be done by all levels of management, but it is most important for which management level? first level managers middle managers top-level managers supervisors
top-level managers
Used in a variety of devices including ATMs and point-of-sale terminals, ________ allow for the input of data with the use of a stylus or finger. mice microphones touchscreens webcams
touchscreens
A terabyte equals approximately one ________ bytes? trillion million billion thousand
trillion
The technology that uses cameras, microphones, displays, speakers, and software to allow users to both see and hear each other is called ________. video conferencing teleconferencing parallel processing IM
video conferencing
Most smartphones and tablets produced today use a ________ keyboard. laser folding virtual physical (tactile)
virtual
A form of E-mail fraud where criminals change the account where money is being transferred is called a(n) ________ scam. wire-wire routing-flipping account-flopping hacking
wire-wire
This type of connector is the most common type of connection to a computer for peripherals (printers, monitors, storage devices, etc.). Lightning MIDI USB Thunderbolt
USB
One emerging data storage challenge is the incredible amount of video being uploaded to ________. YouTube LinkedIn FaceTime Microsoft Word
YouTube
When discussing digital cameras or smartphone cameras with APS CMOS, APS stands for ________. auto picture sourcing active pixel sensor approximate pixel source active picture source
active pixel sensor
A device commonly used for checkout in stores, that measures the reflection of a laser beam, is called a ________ reader. bar code code pricing merchandise
bar code
Inkjet printers are often sold ________ their production cost. below well above at double or even triple above
below
The smallest unit of data storage is a ________ pixel bit byte dot
bit
Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a(n) ________, which closes the access point used by the hacker. denial execution stop block
block