Computer Class Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What are two good examples of a complex password?

!70xAlglaffsbifpstMx70! !3HsshtmmotrstwymafyK8!

IBM was known as the dominant mainframe company and was nicknamed ______________

"Big Blue"

Which of the following meet the requirement to be a broadband connection?

256k bps Correct Response 5MB bps

How heavy was the first Compaq PC?

28 pounds

According to your textbook modern PCs can process ___ bits of data at a time.

64

According to the textbook the first personal computer could process __ bits of data at once.

8

Wearable technology allow users to compile and aggregate minuscule information into a simple form to understand future outcomes. It also allows users to share this information with those around them to create a simpler and more direct means of communication between friends and/or doctors.

Anything that can be designed on a computer can be created with a 3-d printer. Ranging from prosthetic body parts to parts of a jet.

What is metadata?

Data about data

By using a Creative Commons license, authors cannot control the use of their work.

False

Computers, keyboards, disk drives, iPads, and flash drives are all examples of data.

False

Confidentiality is not a member of the Information Security Triad.

False

Fourth-generation languages are refereed to as machine code.

False

Over 90% of YouTube users are outside the US.

False

SSD are much slower than the traditional hard disk.

False

Systems-Development Life Cycle was first developed in the 1980s.

False

Technical feasibility determines if a system development project is affordable.

False

The World Wide Web was invented before the Internet.

False

The introduction of new technology does not have an effect on human behavior.

False

VoIP stands for Voice over Internet Protocol and refers to customers dropping their landline telephone for a cellular phone.

False

Without software, the computer hardware would still be able to function as normal.

False

Web 2.0 allowed people to interact with the World Wide Web in a new way - they could post to it. Which of the following are examples of businesses that have used Web 2.0 tools?

Flickr Correct Response Facebook Correct Response Instagram Correct Response Twitter

Which of the following best defines a packet?

Fundamental unit of data transmitted over the Internet.

___________________ are those who adopt an innovation after the average member of the society.

Late Majority

Nanobot _______________________________.

a, b, and d are correct.

The duties of _______________ include keeping the operating system up to date, ensuring available memory and disk storage, and overseeing the physical environment of the computer.

computer operators

The job of a system analyst is to ____________________.

understand business requirements and translate them into the requirements of an information system

Mary is using public key encryption to send a message to Mike. Mary encrypts the message with Mike's _______key, and Mike decrypts the message using his _________key.

public, private

The purpose of normalization is to

reduce duplicate copies of data.

Data mining performs which of the following?

searches for unknown trends, patterns, and associations.

The personal computer has become a commodity because

there is very little differentiation between computers.

Come up with your own definition of software. Explain the key terms in your definition.

Software is the brain of an operating system. For humans, the human body is our operating system and they come in all shapes and sizes, and the software that powers those bodies is our brain. Without software, an operating system is a hollow shell; without an operating system, software is unusable for most individuals person.

Which country has the highest average Internet speed? How does your country compare?

South Korea has the highest internet speed by far at over 16Mb/s. It more than quadruples the internet speed found in the United States.

Which of the following software development methods is structured, time consuming, and may produce excessive documentation?

Systems development life cycle

Which of the following is NOT an example of a relational database

Tableau

What are five examples of information system hardware discussed in your textbook?

Tablet Computer Smart Phone Printer Mouse Personal Computer (PC)

Which of the following is NOT one of Jakob Nielsen's three stages of the digital divide?

Technical divide

What does the CIO do?

The chief information officer is basically like the CEO of the information system and acts as a project manager for the information system by devising strategic plans for improvement and carrying out goals for improving the information system.

What does the term digital divide mean?

The digital divide is a term used to describe the separation between those who have access to globalization 3.0/the global network and those who do not.

What is globalization?

The integration of goods, services, and cultures among the nations of the world

A 3-D printer allows you to print virtually any 3-D object based on a model of that object designed on a computer.

True

A computer trainer conducts classes to teach people specific computer skills.

True

A database is an organized collection of related information.

True

A digital device processes electronic signals that represent either a one or a zero.

True

A disadvantage of a code of ethics is that there could be a chance that important issues will arise that are not specifically addressed in the code.

True

A process is a series of steps undertaken to achieve a desired outcome or goal.

True

According to the text the second component of an information system is software.

True

Advances in information technology make NORA easier.

True

CASE refers to computer-aided software-engineering.

True

Certifications are designations given by a certifying body that someone has a specific level of knowledge in a specific technology.

True

Encryption tools are information security tools.

True

Functional managers will report to the CIO and manage the employees specific to their function.

True

Globalization is the term used to refer to the integration of goods, services, and culture among the nations of the world.

True

In 1975, the first microcomputer was announced on the cover of Popular Mechanics.

True

In 1998 the US Congress passed the Digital Millennium Copyright Act.

True

In March of 2012, Google introduced the world to their driverless car.

True

In a database, all the fields are related by one or more tables, so that it is possible to connect all the fields through the tables they have in common.

True

In the late 1990s a "platform for global collaboration" was created by three types of technology.

True

Innovators are the first individuals to adopt a new technology.

True

Intellectual property is defined as "property that derives from the work of the mind or intellect".

True

Intranet is for secure internal file sharing and an extranet is used to securely share files with external partners.

True

Jawbone is a company that produces wearable technology.

True

Laggards are individuals who are last to adopt an innovation.

True

Linux is a version of the Unix operating system that runs on the personal computer.

True

Microsoft, Google, and Apple offer word processing, spreadsheet, and presentation software.

True

Nanobots could be introduced into the body to combat cancer.

True

Operating systems manage the hardware and create the interface between the hardware and the user.

True

Productivity software allows office employees to complete their daily work effectively.

True

Role-based access control simplifies administration and improves security.

True

Software is a set of instructions that tells the hardware what to do.

True

The average smartphone user looks at his or her smartphone 150 times a day.

True

The most common form of authentication is the user ID and password.

True

Time is a member of the Quality Triangle.

True

Web 2.0 had a big impact on many businesses and some industries.

True

When users log in to the local area network from their PC by connecting to a powerful computer called a "server" it is called "client-server".

True

To keep track of its customers a large organization would use what type of software?

CRM

Accessibility is a member of the Information Security Triad.

False

According to the text, the World Wide Web is the killer app for the Internet.

False

Apple introduced the Macintosh computer in 1994.

False

The internet was invented in what year?

1969

The first modern day cell phone was invented in ______.

1973

According to the text, Compaq Computer Corp. developed the first commercially successful portable computer in what year?

1983

In what year did Microsoft release its first version of Windows?

1985

In what year were restrictions on commercial use of the Internet first lifted?

1991

In what year was Amazon founded?

1994

In what year was eBay founded?

1994/1995

Which of the following are important reasons to define the data type of a field?

A data type tells the database what functions can be performed with the data. The proper amount of storage space is allocated for the data.

Which of the following is true about patent protection in the USA?

A patent holder has the right to exclude others from making, using, offering for sale, or selling the invention throughout the United States or importing the invention into the United States for a limited time in exchange for public disclosure of the invention when the patent is granted.

Which of the following is true about a strong password?

A strong password should contain at least one upper-case letter, one special character, and one number.

Describe the role of a systems analyst.

A systems analyst will work with a business to find the flaws in their current information system and design the improvements needed for it.

What does a trademark protect? How do you obtain one?

A trademark protects a phrase, shape, logo, or sound from being infringed upon. A company can claim one of the prior listed items as a common law trade mark if it appears often. A company that wants to ensure no one else can use their trade mark will have to register it with a patent and trademark office.

What are some of the advantages brought about by globalization?

Ability to seek consulting from around the world, larger workforce, and larger markets to sell to around the world.

Which of the following is an application of the Internet of Things?

All of the answers are applications of the Internet of Things.

Which of the following is the component of a good backup plan?

All of the answers are components of a good backup plan.

An example of application software is __________________.

All of the answers are considered application software.

A UAV is _______________________________.

All of the answers are correct.

Which of the following is true about the OLPC project?

All of the answers are true about the OLPC project.

Which of the following are true about the three eras of globalization?

All of the answers are true about the three eras of globalization.

Which information technologies brought about "Globalization 3.0"?

All of the answers brought about "Globalization 3.0".

Which of the following is true about authentication?

All the answers are true about authentication.

The first microcomputer was named ________ which was featured on Popular Mechanics Magazine.

Altair 8800

Explain what an ERP system does.

An ERP links all the different parts of a large company together so everyone can see the same things. This would fall in line with what Walmart uses to keep track of all of its stores.

How would you categorize the software that runs on mobile devices? Break down these apps into at least three basic categories and give an example of each.

Application software: Safari, Mozilla Firefox, etc... Productivity Software: Microsoft Word, Powerpoint, Excel, etc.. Utility/Programming Software: MalwareBytes, Norton Antivirus, etc...

__________________ design the computing devices that we use every day.

Computer engineers

Briefly define each of the three members of the information security triad.

Confidentiality- Restricting the access to information for only those that are suppose to and allowed to be viewing it. Integrity- This is the assurance that all information within the server has not been altered and is true. Availability-This is the up-time of the server and ensures that users that are allowed to access, view, and modify information can do so at all times deemed necessary.

What impact has information technology had on the way companies are organized?

Constant flow of information - takes external information combined with objective information to provide subjective information to everyone using the system. Everything is easier to understand and makes it easier to make informed decisions.

__________ is the protection given to songs, computer programs, books, and other creative works.

Copyright

Business intelligence aims to improve an organizations internal processes, while analytics aims to improve an organizations competitive advantage.

False

Which of the following is false about digital divide?

Digital divide cannot occur between neighborhoods.

________________ feasibility determines if a system development project is affordable.

Economic

Which of the following is false about empowerment divide?

Empowerment divide is the easiest to solve.

"Globalization 1.0" occurred from about 1800 until the year 2000.

False

A compiled language is one that requires a runtime program to be installed in order to execute.

False

A hard disk is considered working memory and the RAM is considered long term memory.

False

A hard disk is much faster than a solid-state drive.

False

A strong password should include your social security number.

False

How does Friedman define the three eras of globalization?

Globalization 1.0 was centered around countries trading with other countries. Globalization 2.0 was centered around companies that had were multinational and utilized different aspects of different countries to run a business. Globalization 3.0 is centered around personal computers and the internet which allows even the least influential person to go global.

What does the term globalization mean?

Globalization is the integration of one culture into another culture or multiple cultures into multiple cultures to allow them to work together.

Which of the following are operating systems?

Google

Select the software from the list that is considered application software.

Google Chrome iTunes Microsoft Word

What is the relationship between HTML and CSS in website design?

HTML is used to create the actual content of a page and CSS is used to create the design or style of the content on the page.

What are some of the different roles for a computer engineer?

Hardware, software, systems, and network are all different subsets of the computer engineer.

The first smartphone that was introduced was known as the _____________?

IBM Simon

What is enhanced situational awareness?

Information from a large number of sensors that can sense change in texture/moisture/proximity/weight among other things to provide feedback or perform a service or duty.

Systems Analyst, programmer, and helpdesk support are roles people play in ________

Information systems (IS)

True

Instead of training an existing employee for a limited role a company may outsource the job.

What was invented first, the personal computer or the Internet (ARPANET)?

Internet (ARPANET)

What is a code of ethics? What is one advantage and one disadvantage of a code of ethics?

It is a document that outlines a group's acceptable behaviors. An advantage is that it sets a clear standard for how everyone should uphold themselves. A disadvantage is that there can be grey areas that are not specifically mentioned in the code of ethics when assessing a situation.

What is the purpose of encryption?

It is a means of sending information over the internet so that only authorized individuals can view what is sent.

What is change management?

It is a term that is used to describe the way every facet of an organization will be impacted by a change in usable sources, budget allocation, internal systems, and much more.

What does the term personally identifiable information mean?

It is information about a person that can be used to establish that person's identity.

LAN stands for

Local Area Network

What does the term physical security mean?

Locked doors, security cameras, temperature gauges, and employee training on the subject of security.

What were the first four locations hooked up to the Internet (ARPANET)?

MIT Correct Response University of Utah Stanford Correct Response UCLA

In 2013, 80% of Facebook users were from ________________.

None of the answers are correct.

Which of the following is NOT a member of the Quality Triangle?

People

What are the steps in the SDLC methodology?

Pre-analysis, system analysis, system design, programming, testing, implementation, and maintenance.

What protections are provided by HIPAA, COPPA, and FERPA?

Privacy protections concerning website data collection, healthcare, and educational documents.

What protections are provided by a patent? How do you obtain one?

Protects the patent holder from others using, making, or selling their creation for 20 years in exchange for disclosing the properties of the patent when granted. You must submit your patent application to a government patent office and wait for approval or denial.

What is multi-factor authentication?

Rather than using 1 authentication method to identify someone, multi-factor authentication uses 2 or more methods of authentication to ensure the user's identity.

_____________ is a method of developing websites that allows them to be viewed on many different types of devices without losing capability or effectiveness.

Responsive design

Which of the following is false about role-based access control?

Role-based access control gives specific users access rights to an information resource.

What is the difference between the pilot implementation methodology and the parallel implementation methodology?

They are both similar however in the pilot implementation methodology, a smaller subset of an organization is using the newer technology which makes it easier for support to answer and give feedback to concerns. In parallel, both the old system and new system are used simultaneously which could leads to increased costs by having two systems.

Which of the following best describes a hard disk?

They can hold very large amounts of data for a very long time.

What makes the lean methodology unique?

When using lean methodology, the designers are not dead set on a specific design or usage for their program. They create a rough draft of their initial idea and get feedback; they add on or take away from their rough draft and keep doing this process over and over until they have a product that is efficient and has a demand.

Place the following terms in order from lowest form (1) to highest form (4)

__1__ data __2__ information __3__ knowledge __4__ wisdom

Match the following terms and their definitions.

__3__ Is used to make decisions. __2__ Is created by adding context. __1__ Can be quantitative or qualitative. 1. Data 2. Information 3. Knowledge

List the following in increasing order (slowest to fastest).

__3__ gigahertz __1__ kilohertz __2__ megahertz

Moore's Law states that

all of these are correct.

What are the five types of information-systems users?

innovators, early adopters, early majority, late majority, and laggards.

The motherboard is considered the bus of the computer because

it is the central electrical connection between different computer components.


Set pelajaran terkait

ch.3 newborn and infant growth and development

View Set

Newtons Laws Multiple choice Physics

View Set

Odessey American Government CH1 section 2

View Set

Chapter 41: Gastrointestinal Dysfunction NCLEX

View Set

Which of the following words is most closely related to technological risks associated with HVAC?

View Set