CIS Final Exam, CIS 110 Exam 3 Manhattan College, CIS 110-02 EXAM 1, CIS 110 Exam 2
What is Wisdom? How does it relate to Data, Information, and Knowledge?
- The actions that are taken based on the input from the knowledge.
What is Big Data? How is it characterized?
- The words "Big Data" refer to the area that deals with handling huge amount of data being generated due to latest advances in information and communications technologies and ubiquitoes availability and use of the Internet and worldwide web. - It is characterized by "3Vs": o Volume: Unprecedented amount of large data o Velocity: Data being generated in almost real time o Variety: So many different types of data
• PMT - To calculate the amount of a monthly payment when you borrow money
- To calculate the amount of a monthly payment when you borrow money
• OR
- To check whether at least one of the two conditions being tested return true
• AND
- To check whether the two conditions being tested are true
• AVERAGE
- To find the average value of its arguments
• MAX
- To find the largest number in a range
• NPV
- To find the net present value of an investment
• COUNT
- To find the number of cells in a range
• MIN
- To find the smallest number in a range
• SUM
- To find the sum of the numbers in a range
You are asked to write a formula in Cell I4 to display the text VERY GOOD if the number of products sold is 80% or greater than the number of products bought. If the number of products sold is less than 80% or greater than the formula displays nothing.
= IF(E4/D4>=0.80, "VERY GOOD", "")
33)Applications, especially those from the same vendor such as Microsoft, Google, or Apple, are normally consistent. A) True B) False ANSWER:
A) True
35)When an operation is processing a series of inputs, the completion count gives the tally of the completed instances or, equivalently, the number of instances remaining. A) True B) False ANSWER:
A) True
40)The Internet supports point-to-point asynchronous communication. A) True B) False ANSWER:
A) True
41)A relative path can be just the file name if the referenced file is in the same folder as the page that links to it. A) True B) False ANSWER:
A) True
42)When using tag pairs, all tags between a starting tag and an ending tag should be matched. A) True B) False ANSWER:
A) True
45)Most interactions over the Internet use a protocol known as client/server interaction. A) True B) False ANSWER:
A) True
48)Finding errors in software is much easier than diagnosing the cause of those errors. A) True B) False ANSWER:
A) True
50)Mozilla's Firefox is an example of an open source browser. A) True B) False ANSWER
A) True
51)Google's Advanced Search allows you to filter a search by specifying a site or a domain. A) True B) False ANSWER:
A) True
52)The placeholder technique is used to protect part of the text that you don't want to tamper with when using Find/ReplaceAll (F/RA). A) True B) False
A) True
53)To describe how a web page should look, many pages use Hypertext Markup Language (HTML). A) True B) False ANSWER:
A) True
6) In relation to Copy/Paste/Edit, which of the following terms refers to the intended result of transforming or editing information? 6) _______ A) original value B) source value C) target value D) final value
C) target value
Computer experts call spaces, tabs, and blanks that have been inserted for readability A) alignment B) embedded space C) white space D) tags
C) white space
If you have a printer attached to your computer and then add a new pair of speakers, you will not need a new device driver since you already have a device driver for the printer.
False
Lower level managers make tactical decisions, which generally deal with activities such as short-term planning, organizing, and control.
False
Place value representation is associated with decimal numbers in the base 10 but it does not apply to the binary numbers.
False
Run-length encoding is a lossy compression scheme.
False
The ADD instruction adds the address numbers of the memory locations associated with the two values to be added.
False
The term bit is a contraction of bite digit.
False
The way you make the color yellow using paints is similar to the process of creating the yellow color on a computer screen.
False
Transaction processing systems tightly integrate the functional area information systems via a common database.
False
Which of the following is NOT TRUE about extended ASCII code? A. It was developed in the United States B. Its is now known as ISO-8859-1 C. It replaced Unicode in 2010 D. It was adopted by IBM as the standard for character representation
C. It replaced Unicode in 2010
Digitizing sound A. Is compressed using MPEG B. Requires lossless compression techniques C. Uses bits to represent both positive and negative values D. Achieves perfection using an unlimited number of bits
C. Uses bits to represent both positive and negative values
The type of information stored in a field in a database is described by the: A. tuple B. field_name C. data_format D. record
C. data_format
Which of the following fields could not be a primary key field? A. Driver License number B. student ID number C. last name D. Web address
C. last name
A student's decision to drop one course and add another would be considered a transaction to the university's information system but not to its accounting system.
True
A university registrar who uses her experience with university admissions along with your high school grades, application essays, letters of recommendation, and Scholastic Aptitude Test (SAT) scores, would be applying her knowledge in your application process.
True
All colors with equal intensities of RGB subpixels are always some shade of gray or white or black.
True
An organization's supply chain describes the flow of materials, information, money, and services from raw material suppliers through factories and warehouses to the end customers.
True
An organization's supply chain starts at the supplier and ends at the customer.
True
Digitizing a sound wave requires that the analog wave be converted to bits.
True
Every bit can exist in one of two states: 0 or 1.
True
Information systems tend to follow the structure of organizations and they are based on the needs of employees.
True
Information technology makes managers more productive
True
Information technology refers to computer-based tools used to support the needs of an organization
True
The 7-bit ASCII codes are part of UTF-8.
True
The PandA unit is known as a bit.
True
The byte is the standard unit for computer memory.
True
The process of converting code written in a high-level language to something a computer can understand is known as compiling.
True
The tag characters included with the content characters of the digitized Oxford English Dictionary increases the size of the file compared with plain text.
True
The term bit was originally adopted because early computer designers interpreted the two patters as 1 and 0, the digits of the binary number system.
True
To play a digitized sound, the numbers are read from memory into a digital-to-analog converter (DAC), which creates an electrical wave that is then input to a speaker.
True
Transaction processing systems provide the input for the organization's databases.
True
When an object vibrates, the vibrations push air which causes pressure waves that vibrate our eardrums and, by doing this, create sound.
True
You do not have to work in the IT department to benefit from learning about IT
True
_____ is a way to represent Unicode using variable-length codes.
UTF-8
A logical table can be created with information from no more than two physical tables.
false
Information technology and information systems are the same thing.
false
The logical database is the permanent repository of the data.
false
To successfully use a database, a user must be able to write SQL.
false
Column headings for a database table are called ______.
fields
If we want Excel to perform a calculation, we need to enter a _________ into a cell.
formula
Title, Platform, Unit Cost, etc. are called column names, column labels or column __________.
headings
The ______ operation combines two tables and removes the duplicate rows from the resulting table.
join
The ________, or view of the database, is the form of the database the users see and is created on demand from existing information.
logical database
5. Rows are _______ and columns have _ _______
numbered ; letters
Database ________ allow us to ask questions of a database in a way that lets the software find the answer for us.
operations
The design of a(n) ________ database is guided by technical considerations, while the design of a(n) ________ database is guided by personal considerations of the users.
physical; logical
A(n) ______ is a unique identifier for any row in a database table.
primary key
A(n) ________ is a database command defining a table expressed using the five database operators.
query
The cell name A1 in the formula =A1+20 is called a cell _________
reference
A(n) ______ makes use of the multiple tables of related information.
relational database
A(n) ________ is a correspondence between two tables of a database.
relationship
The reason that Excel modified the formula cell reference, when the formula was copied, was because the formula contained ________ cell references.
relative
An SQL ________ query can perform any or all of the operations on tables.
select
The ______ operation takes rows from a table to create a new table.
select rows
The default name for the first worksheet is ______
sheet1
The default name for the second worksheet is ______
sheet2
We can avoid explicitly naming all the cells to add (from question 14), by the _______ function on the range of cells.
sum
Databases are based on information organized in ______.
tables
A database table may not contain multiple identical rows; all its rows must differ.
true
In relational databases, think of an attribute as a "column of a table," where the "attribute names" are column headings and "attribute values" are the entries.
true
Inconsistency is the main reason to avoid redundancy of information in a database.
true
Information is data that have been organized to provide value.
true
Queries are used to create logical tables (aka, views).
true
Queries are used to create views.
true
Relationships are specified by the designer of a database.
true
The logical database shows users the view of the information that they need and want.
true
The ______ operation is used to combine information from two tables.
union
One or more worksheets saved (on disk) together under the same file are called a _______
workbook
To prevent the column, of a cell reference, from being changed when a formula is copied, we prefix the cell reference column name with a ______.
$
To prevent the row number, of a cell reference, from being changed when a formula is copied we prefix the cell reference row number with a ______.
$
• IF
- To check whether a condition id true or false
• ROUNDUP
-To round a number up
8. When a formula is copied, relative cell references within a formula are modified as follows: 1. When a formula is copied one cell to the right (across a row) the ------ of the cell reference is advanced by one. 2. When a formula is copied one cell down (down a column) the ---- of the cell reference is incremented by one.
1. column 2. row
A Nyquist rule requires that, to capture frequencies up to 17,000 Hz, you must sample at a rate of at least _____ Hz.
34,000
All formulas in Excel begin with a ___
=
The original version of ASCII used A) 7-bit code B) 16-bit code C) 4-bit code D) 8-bit code
A) 7-bit code
Which of the following tags is NOT required on a web page? A) <br/> B) </html> C) <body> D) <head>
A) <br/>
Placeholders can be inserted throughout your work for long, commonly occurring phrases, and the placeholders can later be changed easily by using A) Find/ReplaceAll (F/RA) B) Copy/Paste (C/P) C) metaphors D) Copy/Paste/Edit (C/P/E)
A) Find/ReplaceAll (F/RA)
Which of the following would NOT be considered a typical processor instruction? A) Search through a list of names to find the first entry equal to a particular value. B) Compute the logical AND of two values. C) Shift the bits of a word to the right, putting 0s on the left and discarding bits on the right. D) Test if a bit is 0 and jump to a specific set of instructions, based on the outcome.
A) Search through a list of names to find the first entry equal to a particular value.
55)The AND operator is one of the Boolean operators. A) True B) False ANSWER:
A) True
Which of the following is(are) NOT TRUE about applying the placeholder technique? A) You must use the hashtag symbol (#) to mark all text that you want to correct. B) You replace the placeholder with the original text. C) You replace all correct text sequences with a placeholder. D) You use F/RA to make corrections.
A) You must use the hashtag symbol (#) to mark all text that you want to correct.
A Google search result includes a snippet for each web page in the returned list. In this context, what is a snippet? A) a preview of what might be on the page B) the site's URL C) the text between the page's <title></title> tags D) None of these
A) a preview of what might be on the page
Which of the following might be a single machine instruction? A) add two numbers together B) convert a decimal number to binary C) request a new web page from a browser D) send a file to the printer
A) add two numbers together
11) Folders may contain 11) ______ A) both files and folders B) only other folders C) only web pages D) only files
A) both files and folders
Which of the following might be a single machine instruction? A. Add two numbers together B. Request new web page from browser C. Send a file to the printer D. Convert a decimal number to binary
A. Add two numbers together
The NATO broadcast alphabet A. Encodes letters as words B. Makes it difficult to distinguish between different letters C. Is efficient in minimizing the amount of memory needed to store each letter D. Encodes all digits using unusual names
A. Encodes letters as words
A digitization guideline which states that the sapling frequency should exceed the signal frequency by at least a multiple of two is the A. Nyquist rule B. Sample rate rule C. Leibniz rule D. Analog-Digital rule
A. Nyquist rule
The familiar UPC bar code uses more than the minimum number of bits to code symbols A. So the reader can tell whether or not the product is upside down B. To allow for expansion in the future C. So the code will fill up the required amount of space on the package D. So additional information can be coded
A. So the reader can tell whether or not the product is upside down
The columns of data in a database are often known as: A. fields B. records C. tables D. tuples
A. fields
GIF encoding A. is a lossless encoding scheme B. can display 1024 different colors C. is used for photographs D. was invented by the Joint Photographic Experts Group of the ISO
A. is a lossless encoding scheme
The definition of a database includes all of the following except: A. tuples B. name C. field specifiers D. primary key
A. tuples
Memory locations are identified by numbers called _____.
Addresses
Which of the following would be used to display an ampersand (&) on a web page? A) \& B) & C) && D) <&>
B) &
The HTML tag pair for bold text is A) <bld></bld> B) <b></b> C) <i></i> D) <bb></bb>
B) <b></b>
Which of the following will display an image named rocket.jpg on a web page if the image file is stored in the same folder as the web page? A) <img src rocket.jpg/> B) <img src = "rocket.jpg"/> C) <img src "rocket.jpg"/> D) <img "rocket.jpg">
B) <img src = "rocket.jpg"/>
14) The tags used to specify table headings and column headings are 14) ______ A) <cd></cd> B) <th></th> C) <hd></hd> D) <ch></ch>
B) <th></th>
Which is true about a row in a table? A) A technical term for a row is a couple. B) A row is often called a record. C) A row is an entity, defining one particular object. D) All of the above
B) A row is often called a record.
21) The mouse was invented by 21) ______ A) Steve Jobs and Steve Wozniak at Apple B) Douglas Engelbart and others at the Stanford Research Institute C) Aung San Suu Kyi in Burma D) Bill Gates at Microsoft
B) Douglas Engelbart and others at the Stanford Research Institute
34)Relying on 0s and 1s in representing digital information results in a great disadvantage in creating reproductions. A) True B) False ANSWER:
B) False
36)Mobile devices have abandoned the desktop metaphor in favor of the contact metaphor. A) True B) False ANSWER:
B) False
46)A hit on a page always means the search terms were found on that page. A) True B) False ANSWER:
B) False
47)Perfect reproduction is a property of analog information. A) True B) False ANSWER:
B) False
49)Internet communications are sent strictly through telephone line. A) True B) False ANSWER:
B) False
54)All HTML tags come in pairs. A) True B) False ANSWER:
B) False
The primary key field for the student database on a campus is probably the student: A) address B) ID C) phone D) last name
B) ID
If we want a subpixel to be of half intensity, we use A) 1100 0000 B) 1111 0000 C) 1000 0000 D) 0000 1111
C) 1000 0000
How many digits are in the hexadecimal system? A) 15 B) 8 C) 16 D) 4
C) 16
The main technology for local area networks is A) TCP/IP B) ISP C) Ethernet D) DNS
C) Ethernet
Assume you have a scanned black and white photo and the subpixels had values of 195 each. You want the image's pixels to all be nearer intense white while keeping their relative relationships. Which of the following could the subpixels be changed to? A) 179, 179, 179 B) 0, 0, 0 C) 0, 179, 212 D) 212, 212, 212
D) 212, 212, 212
The binary number 101 right to the left 2^0 represents the decimal number A) 9 B) 7 C) 3 D) 5 An example: Binary Places: 8 4 2 1 Binary number: 1 1 0 1 Decimal number: 8 +4+1= 13
D) 5
28) The preferred way to specify a break that continues text on the next line in a web page is to use the ________ tag. 28) ______ A) <enter> B) <linebreak> C) </br> D) <br/>
D) <br/>
_____ is the property of binary numbers in which the number of 1-bits is even.
Even parity
A client computer remains connected to a web server while the page is displayed on the screen.
FALSE
A bit is larger than a byte.
False
The brightness of the lights of a subpixel in an LCD display is its _____.
Intensity
A horizontal line is created using the <hr/> tag.
TRUE
Computers have instructions for both transforming and ________ information.
Transferring
Memory has a finite capacity.
True
The ________ defines the form of the information that can be stored in a field.
data type
How many digits are in the hexadecimal system? A. 8 B. 16 C. 15 D. 4
B. 16
What is the base of hexadecimal? A. 2 B. 16 C. 4 D. 10
B. 16
The Hawaiian alphabet has 18 symbols. How many bits are needed to represent these symbols? A. 2 B. 5 C. 28 D. 16
B. 5 (2^x = 16, x=4, Answer > 4)
The original version of ASCII used A. 4-bit code B. 7-bit code C. 16-bit code D. 8-bit code
B. 7-bit code
How many instructions do computers know? A. A lot (1000+) B. A few (100 or so) C. Only one D. More than humans can count
B. A few (100 or so)
The lowest level programming language that humans use is A. Binary B. Assembly C. C# D. Java
B. Assembly
A form of a program that is directly executable by a computer is a(n) A. Device driver file B. Binary object file C. Assembly file D. High-level language file
B. Binary object file
In the Fetch/Execute Cycle, the action of retrieving a machine instruction from the memory address is given by the program counter occurs during the A. Data Fetch (DF) step B. Instruction Fetch (IF) step C. Instruction Execute (EX) step D. Instruction Decode (ID) step
B. Instruction Fetch (IF) step
_____ refers to whether a number is even or odd. A. The binary system B. Parity C. The place system D. PandA
B. Parity
The quality of a sound recording is determined by the _____ and the sample precision. A. Notification rate B. Sample Rate C. Sample Speed D. Bit width
B. Sample Rate
The SELECT COLUMN operation is used to: A. create a new table from existing rows in a table B. create a logical table from existing fields in a table C. exclude specific rows from a table D. remove existing fields from a table
B. create a logical table from existing fields in a table
An important property of metadata is that it is intertwined with the information that it describes.
False
Because of its inaccuracy, lossy compression is useless for multimedia files.
False
The hardware implementation of the Fetch/Execute Cycle is the A) RAM B) control unit C) peripheral D) input/output (I/O) ports
) control unit
Briefly describe the three areas that are needed to build an information system
- Organization: Major Business functions including Accounting, Finance, Sales, Marketing, Manufacturing, Human Resources - Management Structure and levels- senior managers, middle managers, operational managers focusing on different aspects of the business - Technology - computers, hardware, software, database, networking and security.
What are the four basic capabilities of an information system?
- Perform high-speed, high-volume, numerical computation - Provide fast, accurate, and inexpensive communication within and between organizations - Automate both semiautomatic business processes and manual tasks - Store huge amounts of information in an easy-to-access, yet small space
Who are the users of an information system supporting compensation plans of a company?
. Human resources department.
30) Select all that apply. Which of the following is an example of the computer providing feedback to the user? 30) ______ A) The cursor changes to indicate an operation is in progress. B) The user uses a keyboard shortcut like CTRL-S. C) Editing changes become visible on the screen. D) A progress bar shows how much of the work is done.
A) The cursor changes to indicate an operation is in progress. C) Editing changes become visible on the screen. D) A progress bar shows how much of the work is done.
31) When you install a new app, you should immediate and intuitively perform two activities which are clicking around and blazing away. A) True B) False ANSWER:
A) True
32) Many desktop applications, regardless of vendor, share some basic features, such as a File menu and an Edit menu, and the items within these menus normally include the same operations. A) True B) False ANSWER:
A) True
If a cell points to cell N$8, this is an example of a(n) A) an absolute reference to the row and a relative reference to the column B) absolute cell reference C) relative cell reference D) an absolute reference to the column and a relative reference to the row
A) an absolute reference to the row and a relative reference to the column
In the 1950s and 1960s before integrated circuits were used, memory was made A) by stringing tiny magnetic "donuts" onto a grid of wire threads B) by a process of printing bits, similar to film photography C) by using a single transistor D) by creating a standing wave on a tightened electrical wire
A) by stringing tiny magnetic "donuts" onto a grid of wire threads
Select the one that does NOT apply. Digitized sound A) can be considered a synonym for analog sound B) can be reproduced exactly C) can be fixed by removing offending noises D) can be processed to reduce the number of bits
A) can be considered a synonym for analog sound
4) Perfect reproduction is a property of 4) _______ A) digital information B) target information C) analog information D) source information
A) digital information
9) Getting files from a web server is called 9) _______ A) downloading B) multicasting C) client-based networking D) uploading
A) downloading
Getting files from a web server is called A) downloading B) multicasting C) uploading D) client-based networking
A) downloading
To select a range of cells A) drag the cursor across the cells B) click Select on the Edit menu C) click the Add icon D) double-click the first and last cells
A) drag the cursor across the cells
27) The purpose of a cookie is to 27) ______ A) give the illusion of a continuous connection B) assign an IP address to a computer when it boots C) help packets find the correct web server D) translate host names to IP addresses
A) give the illusion of a continuous connection
Understanding how the pedals on your bicycle transfer power to the wheels A) makes you operationally attuned B) is an abstraction C) is a generalization D) is an algorithm
A) makes you operationally attuned
15) The boxes in the box model, from the inside out, are content, ________, border, and margin. 15) ______ A) padding B) stuffing C) expansion D) extra
A) padding
XML tags cannot contain A) spaces B) numbers C) uppercase letters D) lowercase letters
A) spaces
A weakness of Wikipedia is that A) the content is not always validated by experts B) the editing of content is highly restricted C) it contains old information which is never updated D) it covers only a limited number of topics
A) the content is not always validated by experts
If quotes surround the phrase "my favorite food", the search would find all pages with A) the exact phrase my favorite food B) the word favorite C) the word my D) the word food
A) the exact phrase my favorite food
If an algorithm is run at different times but with the same data the output will be A) the same B) sometimes the same but not often C) different D) impossible to tell
A) the same
16) Computer experts call spaces, tabs, and blanks that have been inserted for readability 16) ______ A) white space B) embedded space C) alignment D) tags
A) white space
If we want a subpixel to be half intensity, we use A. 1000 0000 B. 0000 1111 C. 1100 0000 D. 1111 0000
A. 1000 0000
37)Multicasting and point-to-point communication are equivalent terms. A) True B) False ANSWER:
B) False
38)URLs are always case sensitive. A) True B) False ANSWER:
B) False
39)The Internet is not yet fast enough to mimic synchronous communication. A) True B) False ANSWER:
B) False
43)Two common image formats used on web pages are .gif and .css. A) True B) False ANSWER:
B) False
44)In an advanced search, you can use the AND operator or the OR operator to narrow down search results but you cannot use both operators in one statement. A) True B) False ANSWER:
B) False
Select all that apply. Which of the following statements is TRUE? A) Given enough time, manufacturers can develop bug-free software. B) Getting out and getting back in often works when an application is not working correctly. C) Program testing reveals only the absence of bugs, never their presence. D) Extensive and appropriate program testing will reveal all possible bugs.
B) Getting out and getting back in often works when an application is not working correctly.
7) Which of the following is NOT an advantage of using Copy/Paste/Edit? 7) _______ A) It is more accurate. B) It allows the user to recreate the formatting from scratch. C) It works well if the copied content is mostly similar to the desired final content. D) It is fast.
B) It allows the user to recreate the formatting from scratch.
A search engine consists, in part, of A) a snoop and an index B) a crawler and a query processor C) a link and a crawler D) a spider and a web
B) a crawler and a query processor
24) To create a web page with a list of HTML commands and their tags, it may be best to use 24) ______ A) a table B) a definition list C) an unnumbered list D) an ordered list
B) a definition list
A structure without any properties or content is A) information B) an instance C) a record D) a shortcut
B) an instance
18) A search for "baseball" AND ("stadiums" OR "parks") AND NOT "national parks" would look for 18) ______ A) baseball or stadiums or parks but not national parks B) baseball stadiums or baseball parks but not national parks C) baseball and stadiums and parks but not national parks D) None of these
B) baseball stadiums or baseball parks but not national parks
13) CSS considers every HTML5 element to be enclosed in a 13) ______ A) folder B) box C) body D) page
B) box
12) When a web browser needs to get a web page to display, it connects to the server 12) ______ A) when the first page located on that server is visited and stays connected until the browser is closed B) briefly and then displays the page after the transaction is complete C) when the first page located on that server is visited and stays connected until a page from a different server is visited D) when the page is visited and stays connected until another page is visited
B) briefly and then displays the page after the transaction is complete
An attribute or a set of attributes that could potentially be chosen as the table's key is a A) provisional key B) candidate key C) primary key D) secondary key
B) candidate key
25) In a search engine the index is built by the 25) ______ A) query processor B) crawler C) linker D) indexer
B) crawler
The processor clock A) measures the response time of user actions such as typing or clicking B) makes the machine cycle go to the next step C) measures how long a program has been running D) keeps the current time of day
B) makes the machine cycle go to the next step
Descriptive information should be placed A) on the bottom and left B) on the top and left C) on the bottom and right D) on the top and right
B) on the top and left
The first production application of digital information was A) the ENIAC computer B) punched card tabulation for the 1890 US Census C) the invention of the transistor at Bell Labs D) the use of vacuum tubes for calculations needed by the US Army
B) punched card tabulation for the 1890 US Census
26) Using only 1s and 0s means the information can be perfectly 26) ______ A) converted to a placeholder B) reproduced C) consistent D) converted to any home appliance
B) reproduced
Using only 1s and 0s means the information can be perfectly A) consistent B) reproduced C) converted to any home appliance D) converted to a placeholder
B) reproduced
Rebooting a computer means to A) run a program from a hard disk B) restart the computer C) start the computer D) None of these
B) restart the computer
5) A familiar example of the touch metaphor is 5) _______ A) a standard keyboard entry B) the Cover Flow mechanism C) a mouse click selection D) All of these
B) the Cover Flow mechanism
If the first character in a cell is the equals sign (=) A) the cell can only contain cell references and not data B) the cell contains a formula C) the cell must reference at least two other cells D) None of these
B) the cell contains a formula
22) The packets that make up a web page 22) ______ A) take the path through the network specified by DNS B) travel independently and may take different paths through the network C) always take the designated path through the Internet, as determined when the browser first contacts the server D) travel as a group so they all take the same path through the Internet
B) travel independently and may take different paths through the network
Algorithms should A) be ambiguous to allow creativity B) use resources efficiently C) only be clear to the algorithm designer D) be written to solve one specific case
B) use resources efficiently
A measure of how much information is transmitted per unit time is the _____.
Bandwith
The number of digits in a numbering system is its _____ or radix.
Base
Describe basic functions of a Customer Relationship Management system. Who are typical users of such a system?
Basic functions include the integration of all customer related information, and providing a unified view of the customer. All customer facing departments in an organizations like sales and marketing, customer support, and technical support are typical users.
An 8-bit sequence on the computer is called a(n) ________.
Byte
20) Placeholders can be inserted throughout your work for long, commonly occurring phrases, and the placeholders can later be changed easily by using 20) ______ A) metaphors B) Copy/Paste (C/P) C) Find/ReplaceAll (F/RA) D) Copy/Paste/Edit (C/P/E)
C) Find/ReplaceAll (F/RA)
What operation takes rows from one table to create a new table? A) Project B) Union C) Select row D) Difference
C) Select row
Which of the following is NOT an example of the computer providing feedback to the user? A) The cursor changes to indicate an operation is in progress. B) Editing changes become visible on the screen. C) The user uses a keyboard shortcut like CTRL-S. D) A progress bar shows how much of the work is done.
C) The user uses a keyboard shortcut like CTRL-S.
A Google search result includes a snippet for each web page in the returned list. In this context, what is a snippet? A) the site's URL B) the text between the page's <title></title> tags C) a preview of what might be on the page D) None of these
C) a preview of what might be on the page
17) In a web search, a match to a query is known as a(n) 17) ______ A) intersection B) URL list C) hit D) None of these
C) hit
Using even parity, a normal byte, such as 1010 0011, would A) use a ninth bit to determine which bit was changed if an error occurs B) include a ninth bit, set to 1 C) include a ninth bit, set to 0 D) not use a ninth bit
C) include a ninth bit, set to 0
19) The order in which hits are returned to a page is determined, in part, by 19) ______ A) anchor text B) meta data C) page rank D) page order
C) page rank
2) Which of the following can accurately complete the sentence shown below? The touch metaphor is truly a new metaphor because it A) replaces the mouse with a touch-sensitive screen B) means different things to different people C) represents the screen differently with content moved around D) enables simple navigation techniques
C) represents the screen differently with content moved around
The quality of a sound recording is determined by the ________ and the sample precision. A) bit width B) notification rate C) sample rate D) sample speed
C) sample rate
The familiar UPC bar code uses more than the minimum number of bits to code symbols A) so additional information can be coded B) so the code will fill up the required amount of space on the package C) so the reader can tell whether or not the product is upside down D) to allow for expansion in the future
C) so the reader can tell whether or not the product is upside down
A(n) _____ sequence is an ordering for a set of symbols used to sort them, such as alphabetical ordering.
Collating
In binary representations, an encoding that switches a 0 to a 1 or a 1 to a 0 is called the _____.
Complement
29) Which of the following research practices will help ensure that you obtain highly reliable information when you do a search? 29) ______ A) never rely on a single source B) question the information C) assess the site's authoritativeness D) All of these
D) All of these
Which of the following statements is NOT true about algorithms? A) Algorithms always work. B) Algorithms can be given at different levels of detail, depending on the abilities of the agent. C) Problems can be solved by different algorithms in different ways. D) All of these are true.
D) All of these are true.
23) Which of the following represents the correct order from largest to smallest? 23) ______ A) Internet, LAN, WWW B) WWW, Internet, LAN C) LAN, WWW, Internet D) Internet, WWW, LAN
D) Internet, WWW, LAN
Which of the following is NOT a property of computer memory? A) Memory locations store or record values. B) It is a series of discrete locations. C) Every memory location has an address. D) Memory locations have unlimited size.
D) Memory locations have unlimited size.
Extended ASCII is a 9-bit code.
False
1) Select all that apply. Which of the following is(are) TRUE about applying the placeholder technique? A) You use F/RA to make corrections. B) You replace all correct text sequences with a placeholder. C) You replace the placeholder with the original text. D) You must use the hashtag symbol (#) to mark all text that you want to correct.
D) You must use the hashtag symbol (#) to mark all text that you want to correct.
A logical table: A) is created from existing information B) is created fresh each time it is needed C) may combine information from multiple tables D) all of the above
D) all of the above
Communication between one sender and many receivers is called A) point-to-point communication B) unicast communication C) client/server communication D) broadcast communication
D) broadcast communication
8) DSL stands for 8) _______ A) dialup service link B) direct service link C) digital subscriber link D) digital subscriber line
D) digital subscriber line
3) The gesture that is typically used to launch an application is a ... A) two-finger sweep B) flick C) drag D) double tap
D) double tap
GIF encoding A) was invented by the Joint Photographic Experts Group of the ISO B) is used for movies C) can display 1024 different colors D) is a lossless encoding scheme
D) is a lossless encoding scheme
Which of the following can NOT complete the statement below? The intersect of an alphabetized list (IAL) and a No Alphabetized List (NAL) are different solutions because they A) require different forms of the input B) have different running times C) rely on the characteristics of the input D) look for different outcomes
D) look for different outcomes
A word or phrase assigned to a cell or range of cells is its A) symbol ID B) value C) literal D) name
D) name
The boxes in the box model, from the inside out, are content, ________, border, and margin. A) stuffing B) expansion C) extra D) padding
D) padding
10) The last part of a URL is the 10) ______ A) protocol B) www C) domain name D) pathname
D) pathname
The binary number 101 represents the decimal number A. 7 B. 3 C. 9 D. 5
D. 5
What does ASCII stand for? A. Algorithmic Sequence of Computer Integrated Information B. Aspiring Students Confused by Incoherent Incantations C. All Standards Complete Initialization Interface D. American Standard Code for Information Interchange
D. American Standard Code for Information Interchange
Which does NOT apply. Digitized sound A. Can be reproduced exactly B. Can be fixed by removing offending noises C. Can be processed to reduce the number of bits D. Can be considered a synonym for analog sound
D. Can be considered a synonym for analog sound
The PandA system A. Has 10 digits B. Contains gray C. Is formed from 256 letter representations D. Is binary
D. Is binary
Which of the following statements is NOT correct? A. OCR is a very sophisticated technology B. OCR can be used to read the handwritten digits on checks C. OCR's business applications include sorting mail and banking D. OCR systems can easily interpret words created by reCaptcha
D. OCR systems can easily interpret words created by reCaptcha
Which of the following would NOT be considered a typical processor instruction? A. Compute the logical AND of two values B. Shift the bits of a word to the right, putting 0's on the left and discarding bits on the right C. Test if a bit is 0 and jump to a specific set of instructions, based on outcome D. Search through a list of names to find the entry equal to a particular value
D. Search through a list of names to find the entry equal to a particular value
To search for a word in a picture, pixels must be converted to A. Analog B. reCaptcha C. Bits D. Text
D. Text
In database terminology, a set of entity instances refers to: A. fields B. columns C. tables D. rows
D. rows
Explain the differences among data, information and knowledge. Give an example for each.
Data: Streams of raw facts representing events such as business transactions. Information: Clusters of facts that is meaningful and useful to human beings in the processes such as making decisions. Knowledge: Data and/or information that have been organized and processed to convey understanding, experience, accumulated learning, and expertise as apply to a current problem or activity
A red, yellow, and green traffic light is a good example of a binary system
FALSE
All algorithms contain loops
FALSE
All cells in a spreadsheet are always visible.
FALSE
All image files must be stored in their own folder.
FALSE
Computer scientists say it is better to refer to cells by their explicit column/row position than by a symbolic name.
FALSE
Data can be copied from one cell to another but formulas cannot
FALSE
Extended ASCII is a 9-bit code.
FALSE
Internet communications are sent strictly through telephone lines.
FALSE
MP3 is popular for Internet transmission because it yields higher quality sound even though this also requires higher bandwidths.
FALSE
Microsoft's Internet Explorer is an example of an open source browser. supposed to be close
FALSE
Only a computer can use digital information.
FALSE
Quotation marks are not allowed inside a tag
FALSE
The Fetch/Execute Cycle consists of four steps.
FALSE
The World Wide Web is the same as the Internet.
FALSE
The computer first digitized the U.S. census data in 1980
FALSE
The placeholder technique is a two-step process: hide and restore. Should be hide,edit, restore
FALSE
The processor's electronic clock is what shows you the current time on your computer's desktop
FALSE
There is normally only one unique way to solve every computational task.
FALSE
Transistors helped advance computing because they increased the complexity of the assembly process.they simplfy it
FALSE
Use the File menu to insert comments into a spreadsheet. Review menu?
FALSE
When digitizing sound, a slower sampling rate does not affect the recorded wave
FALSE
You cannot mix absolute and relative references in one cell reference.
FALSE
A megabyte is exactly one million bits.
False
A red, yellow, and green traffic light is a good example of a binary system.
False
Define the field_name, data_format, and optional_comment needed to create a table that could be used as a datebook.
One possible design of the datebook table is this: Field Format Comment Name. Character 15 Name of the person to meet Cell_Phone text 10 Cell phone number of the person Date text 30 A date (month, day, and year) Day_of_Week Character 9 Day of the week Time text 9 Time of the meeting, e.g., 6:30p.m. Place text 20 Where to meet - place, address, etc. Notes text 50 Additional notes
) By default, heading tags create web page headings that get smaller as the header level decreases; for example, an <h2></h2> header is smaller than an <h4></h4> header.
Other way around-FALSE
_____ refers to whether a number is odd or even.
Parity
small points of colored light arranged in a grid to form a computer display are called _____.
Pixels
The people who write the instructions for computers are _____.
Programmers
The process of executing a program is also called instruction ________.
Interpretation
How would you categorize a payroll system used by the accounting department?
It is most likely a transactional processing systems (TPS).
Describe information systems support for knowledge workers. Are middle-level managers knowledge workers?
Knowledge workers use information systems to find information, interpret information, and analyze information. Therefore, the support needed includes Internet-based search engines and data mining tools; intelligent support systems to apply expert judgment; and various decision support and analytical tools.
Describe basic functions of a Life Cycle Management system. Who are typical users of such a system?
Life cycle management, also known as supply chain management systems are responsible for integrating all information related to the building, distributing, selling, and servicing of a product. Suppliers, manufacturers, distributors, retailers, and customers are typical users of these systems.
The process of reducing the number of bits required to represent information from which the original form can be exactly reconstructed as _____ compression.
Lossless
The process of reducing the number of bits required to present information from which the original form cannot be exactly reconstructed is known as _____ compression.
Lossy
The compression scheme of the Motion Pictures Experts Group of the ISO is _____.
MPEG
Programs and their data must reside in the computer's _____ when the programs run.
Memory
_____ is information that describes the properties of other information.
Metadata
Four bits is known as a(n) ________.
Nibble
________ are the operations that transform a physical database into a logical one.
Queries
To _____ means to take measurements at regular intervals, as in sound digitization.
Sample
The ability to control when _____ do and don't conduct electricity is the main process used in computer construction.
Semiconductors
If you have a printer attached to your computer and then add a new pair of speakers, you will not need a new device driver since you already have a device driver for the printer
Speakers need own device driver-FALSE
Relate the complexity (sophistication) of information systems to the level of management they serve.
TPSs are less costly and less sophisticated. ESSs are more sophisticated and therefore very expensive. The others are in between.
ARM (Advanced RISC Machine) is a standard processor that is often used as a component of consumer devices.
TRUE
All HTML files must be text format files.
TRUE
Assembly language allows humans to write the binary code that computers understand but using words instead of binary 0s and 1s.
TRUE
Client/server relationships drive the WWW.
TRUE
Crawlers consider descriptive text when adding a page's URL to the index.
TRUE
Digitizing a sound wave requires that the analog wave be converted to bits.
TRUE
Every bit can exist in one of two states: 0 or 1.
TRUE
Every memory location in the computer is numbered, starting with 0.
TRUE
In a JPEG, as the amount of compression is increased, the picture eventually begins to pixelate
TRUE
It requires three bytes to represent the color of a single pixel.
TRUE
Many desktop applications, regardless of vendor, share some basic features, such as a File menu and an Edit menu, and the items within these menus normally include the same operations.
TRUE
No one organizes all the information posted on the web.
TRUE
One way product developers minimize learning time for users is to create controls that match the user's expectations, such as using sliders and dials.
TRUE
Search engines crawl only a fraction (probably less than half) of the web.
TRUE
The Alto personal computer, created by the Xerox Palo Alto Research Center (PARC) was the first computer with a Graphical User Interface (GUI).
TRUE
The byte is the standard unit for computer memory.
TRUE
The camera in a smart phone can be classified as an input device.
TRUE
The logical database shows the user the view of the information he or she needs and wants
TRUE
The type of data and the form of the data must be specified when creating an algorithm
TRUE
The way to know that an algorithm works is to know what properties the computation has that cause it to produce the right result every time and to be able to explain how those properties do the job.
TRUE
To describe how a web page should look, many pages use Hypertext Markup Language (HTML).
TRUE
To make the task of intersecting multiple lists a little easier, the URL lists are alphabetized.
TRUE
When an object vibrates, the vibrations push the air which causes pressure waves that vibrate our eardrums and, by doing this, create sound.
TRUE
When an operation is processing a series of inputs, the completion count gives the tally of the completed instances or, equivalently, the number of instances remaining
TRUE
_____ are the most common way to provide metadata.
Tags
What key field connects all the tables in this database? Why is this field preferable to their name or their Social Security number?
The key field that connects all the tables in this database is Emp_ID. It is preferred to the employee's name, because there is no guarantee that names will be unique (which is a required feature of an attribute to be used as a key). The SSN, on the other hand, satisfies the uniqueness requirement but still is not a good choice for a key, because it represents sensitive information that shouldn't be widely distributed, especially given that not all potential users of this database will absolutely need to know it to perform their tasks.
HR needs a list of all employees who are due for their annual review. The annual review is done during the month the employee was hired. What should the table that HR needs look like so they can complete their review?
The table HR needs should contain the following fields - all taken from the tables Personal and HR: Emp_ID, First_Name, Last_Name, Dept, Supervisor, Projects, Performance
The softball manager needs a list of players so they can be contacted about the upcoming season. What should the table look like?
The table needed by the softball manager should contain the following fields - all taken from the tables Personal and Softball: Emp_ID, First_Name, Last_Name, Address, City, State, ZIP, Phone, Throws, Bats, Position It could be argued that as long as there is a record of someone's Emp_ID in the Softball table, the other fields in that table won't be necessary for the sole purpose of summoning the team for the upcoming season's training sessions.
What are the characteristics of Transaction Processing Systems?
They are capable of handling rather large amount of information. They support day-to-day activities of an organization. They can store the transaction information and generate various short term reports
A branch or jump instruction can cause the processor to execute instructions out of memory address order.
True
A combination of your high school grades, application essays, letters of recommendation, and Scholastic Aptitude Test (SAT) scores would be considered information.
True
A list of football scores with the names of the teams that played the games would be considered information.
True
Although ASCII and its variations are widely used, _____ is a more complete representation. It uses up to four bytes to encode about 100,000 symbols.
Unicode
When your purchases are swiped over the bar-code reader at the point-of-sale terminals at Wal-Mart, a _____ records the data. a) transaction processing system b) functional area information system c) dashboard d) enterprise resource planning system e) office automation system
a) transaction processing system
You are registering for the next semester at your university. You take into account your major, the courses you need, the prerequisites for each course, the times you take each course, and the professors teaching each section, as well as your work schedule. You are using _____ to select your class schedule. a) information b) knowledge c) experience d) wisdom e) data
b) knowledge
In formulas, _______ cell references are not modified by Excel when copied.
absolute
_____ is (are) data that have been organized to have meaning and value to a recipient. a) Insights b) Information c) Knowledge d) Experience e) Wisdom
b) Information
The list of all your purchases from Amazon (books bought, price paid, and dates) is defined as ___________. a) data b) information c) knowledge d) experience e) wisdom
b) information
An organization's _____ consists of the physical facilities, IT components, IT services, and IT management that will support the entire organization. a) information technology architecture b) information technology infrastructure c) information technology d) information system e) computer-based information system
b) information technology infrastructure
The Join operation works by combining tables based on a(n) ______.
common field
What Excel command can we use to avoid having to enter (by hand) the corresponding formulas for cells G6 through G8? __________
copy/paste
_____ conveys understanding, accumulated learning, and expertise as they apply to a current problem. a) Data b) Information c) Knowledge d) Experience e) Wisdom
c) Knowledge
A purchase of books in the college bookstore is ___________. The report at the end of the day showing sales totals for the day is ____________. a) information, knowledge b) information, data c) data, information d) data, database e) data item, business intelligence
c) data, information
Which of the following is the correct hierarchy from the lowest level to the highest level? a) knowledge, information, data b) information, data, knowledge c) data, information, knowledge d) data, information, experience e) information, experience, wisdom
c) data, information, knowledge
Supply chain systems are which type of information system? a) departmental information systems b) enterprisewide information systems c) interorganizational information systems d) end-user computing systems e) individual information systems
c) interorganizational information systems
If Amazon uses a list of all your purchases (books bought, price paid, dates) to recommend other books to you, then it is applying its _____. a) data b) information c) knowledge d) experience e) wisdom
c) knowledge
2. Enterprise resource planning systems a) were designed to process transactions faster. b) evolved because newer technologies made older systems obsolete. c) use a common database for all functional areas. d) are utilized to conduct site analyses. e) All the above statements are true.
c) use a common database for all functional areas.
Each cell has a unique address. It is identified by its _______ and its ______
column; row
If we want a cell reference, in a formula, to remain constant regardless of how a formula is copied we prefix both the _________ and the ______ with a ______.
column; row; row
You have just been hired by the largest manufacturer in your area to join their management trainee program. You enjoyed your "computer course" in college and hope that you'll be able to put that knowledge to good use. Which of the following might you expect to do during the management training program? a) Code a new application b) Recommend new technologies that might impact the organization c) Design a new application d) Become familiar with tools to support using data for decision making e) Work 9-5 in your office.
d) Become familiar with tools to support using data for decision making
A listing of all courses offered at your university would be considered _____, whereas a listing of all courses required in your major would be considered _____. a) information, data b) knowledge, information c) information, knowledge d) data, information e) data, knowledge
d) data, information
A(n) ______ is an organized collection of information on a particular topic.
database
The physical database is designed by ________.
database administrators
The ________ is a collection of table definitions that gives the name of the table, lists the attributes and their data types, and identifies the primary key.
database scheme, schema
When creating a database, you can ______ a field by specifying the field_name and the data_format.
declare