Computer Class Midterm

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Match the following terms and their definitions. - Is used to make decisions. - Can be quantitative or qualitative. - Is created by adding context. 1. Data 2. Information 3. Knowledge

- 3 - 1 - 2

Place the following terms in order from lowest form (1) to highest form (4) 1. wisdom 2. information 3. data 4. knowledge

4, 2, 1, 3

Which of the following meet the requirement to be a broadband connection? (check all that apply) 5MB bps 256k bps 56k bps 128k bps

5MB bps 256k bps

According to your textbook modern PCs can process ___ bits of data at a time. 8 32 64 16

64

What is a UAV?

A UAV is also known as a drone. It is a small airplane or helicopter that can fly without a pilot. They run autonomously by computer in a vehicle or are run by a person with a remote control. They are mainly used for military or civil applications but sometimes used personally.

What is a code of ethics? What is one advantage and one disadvantage of a code of ethics?

A code of ethics is a document that outlines a set of acceptable behaviors for a professional or social group. An advantage is it clarifies the acceptable standards of behavior for a professional group. A disadvantage is that it may not entirely reflect the ethics or morals of every member of the group.

What does a software license grant?

A software license grants a person use of the features of the software. You cannot make illegal copies of the software and you cannot use it for illegal purposes.

What is change management?

Change management is a critical component of IT oversight. it manages the way change is implemented in an organization. The organization should be sure to communicate proposed changes before they happen and plan to minimize the impact of the change that will occur after implementation.

Why would an organization outsource?

An organization would outsource to cut costs and contract out a whole group or department. Outsourcing is used in design and creation of a new website or the upgrade of an ERP system.

What is metadata? Data about data A dating service A data type in a database A data warehouse

Data about data

Business intelligence aims to improve an organizations internal processes, while analytics aims to improve an organizations competitive advantage. True False

False

By using a Creative Commons license, authors cannot control the use of their work. True False

False

Computers, keyboards, disk drives, iPads, and flash drives are all examples of data. True False

False

In a client-server environment, a network is not necessary. True False

False

In a database, all the fields are related by one or more tables, so that it is possible to connect all the fields through the tables they have in common. True False

False

Information Systems hardware is best defined as the part of the computer that provide operating instructions to processor. True False

False

Over 90% of YouTube users are outside the US. True False

False

Project managers are in charge of setting organizations' information-security policies, and then overseeing the implementation of those policies. True False

False

SSD are much slower than the traditional hard disk. True False

False

Systems-Development Life Cycle makes more sense when dealing with smaller projects with less resources. True False

False

Technical feasibility determines if a system development project is affordable. True False

False

The World Wide Web was invented before the Internet. True False

False

The late majority will adopt an innovation after a varying degree of time. True False

False

VoIP stands for Voice over Internet Protocol and refers to customers dropping their landline telephone for a cellular phone. True False

False

What are three differences between second-generation and third-generation languages?

First-generation languages are called machine code. The programming is done by directly setting actual ones an zeroes in the program using binary code. The second-generation language is assembly language. It gives english-like phrases to the machine-code instructions making it easier to program. It must be run through an assembler which converts it into machine code.

Which of the following best defines a packet? Fundamental unit of data transmitted over the Internet. Location of units of data on the Internet. Analysis of units of data sent over the Internet. Connection of all other devices on the internet.

Fundamental unit of data transmitted over the Internet.

List the following in increasing order (slowest to fastest). kilohertz megahertz gigahertz

Kilo, mega, giga

___________________ are those who adopt an innovation after the average member of the society. Early Adopters Early Majority Innovators Late Majority Laggards

Late Majority

What are five examples of information system hardware discussed in your textbook? Mouse Network Adaptor Personal Computer (PC) Tablet Computer Radio Smart Phone Printer

Mouse, Personal Computer (PC), Tablet Computer, Smart Phone, Printer

What is multi-factor authentication?

Multi-factor authentication is a more secure way to authenticate a user. Multi-factor authentication is used by combining two or more factors of regular authentication. The factors of regular authentication are something the user knows, something they have and something they are. This makes it much more difficult for someone to misrepresent themselves.

What is role-based access control?

With Role-based access control, users are assigned roles and then those roles are assigned the access. Administrators can manage users and roles separately which improves security.

The process of NORA ____________________. decreases individual privacy None of the answers are correct. increases individual privacy is illegal in more than half of the states has no effect on individual privacy

decreases individual privacy

Which of the following is an application of collaborative technologies? a. Technologies that allow physical objects to send and receive data about themselves. b. Software that routes us to our destination in the shortest amount of time. c. Websites that review different companies d. Devices that can operate themselves to perform specific functions by combining several technologies. e. Both b and c are applications of collaborative technologies.

e. Both b and c are applications of collaborative technologies.

Advances in ___________ technologies and sensors make objects "findable". printable Collaborative wearable None of the answers are correct. wireless

wireless

What are the five components that make up an information system? software people data peripherals computers competitive advantage process hardware

process, hardware, software, people, data

The purpose of normalization is to create rigidity so the database can't be altered. create duplicate copies of the data so you have a backup. reduce duplicate copies of data. make it look like a spreadsheet.

reduce duplicate copies of data.

Data mining performs which of the following? - searches for unknown trends, patterns, and associations. - seeks to confirm known trends, patterns, and associations. - requires oxygen, a hard hat, and a light. - protects everyone's privacy.

searches for unknown trends, patterns, and associations.

The personal computer has become a commodity because there is very little differentiation between computers. so many people take them to the commode. sale prices are dropping. everyone has one.

there is very little differentiation between computers.

Which of the following is NOT an example of wearable technologies? Jawbone UP Google Glass Smartphone None of the answers are an example of wearable technologies. Apple Watch

Smartphone

Which of the following is NOT an example of a relational database Microsoft Access MySQL Oracle Tableau

Tableau

How did the Y2K (year 2000) problem affect the sales of ERP systems?

The ERP systems sales increased because of the Y2K problem because the system was Y2K compliant.

What are the advantages and disadvantages of centralizing the IT function?

The advantages of centralizing the IT function is it gave departments the chance to gain some computing resources for themselves. Some departments created an internal information-systems group complete with systems analysts, programmers and even database administrators. The disadvantages were there were now several people performing the same jobs in different departments. The company data was being stored in several places.

What are the challenges of globalization?

The challenges of globalization are infrastructure differences, labor laws and regulations, legal restrictions, language, customs and preferences and international shipping.

What does the CIO do?

The chief information officer is the head of the information-systems function. The CIO aligns the plans and operations of the information systems with the strategic goals of the organization.

Which country has the highest average Internet speed? How does your country compare?

The country with the highest average Internet speed is South Korea. It has an average of 16.63Mb/s and the United States has an average of 4.6 Mb/s.

What are Jakob Nielsen's three stages of the digital divide?

The economic divide which is the idea that some people can afford to have a computer and Internet access while others cannot. The usability divide which is concerned with the fact that technology remains so complicated that many people could not use a computer even if they got one for free. The empowerment divide is concerned with how we use technology to empower ourselves.

What is globalization? The process of making all countries equally rich None of the answers are correct about globalization. The process of keeping cultures separate The process of making people speaking only one language The integration of goods, services, and cultures among the nations of the world

The integration of goods, services, and cultures among the nations of the world

A code of ethics is a document that outlines a set of acceptable behaviors for a professional or social group. True False

True

A computer trainer conducts classes to teach people specific computer skills. True False

True

A digital device processes electronic signals that represent either a one or a zero. True False

True

A disadvantage of a code of ethics is that there could be a chance that important issues will arise that are not specifically addressed in the code. True False

True

A process is a series of steps undertaken to achieve a desired outcome or goal. True False

True

A solid-state drive uses flash memory instead of a spinning disk to save information. True False

True

A trademark is a word, phrase, logo, shape or sound that identifies a source of goods or services. True False

True

Apple introduced the Macintosh computer in 1994. True False

True

Business intelligence aims to improve an organizations internal processes, while analytics aims to improve an organizations competitive advantage. True False

True

Devices that we can hold in one hand are more powerful that the computers used to land a man on the moon. True False

True

Downloading copyrighted music is like walking into a store and stealing a CD. True False

True

Encryption tools are information security tools. True False

True

Fair use is a limitation on copyright law that allows for the use of protected works without prior authorization in specific cases. True False

True

Globalization is the term used to refer to the integration of goods, services, and culture among the nations of the world. True False

True

In 1975, the first microcomputer was announced on the cover of Popular Mechanics. True False

True

In 2011, smartphones began outselling personal computers. True False

True

Instead of training an existing employee for a limited role a company may outsource the job. True False

True

Intranet is for secure internal file sharing and an extranet is used to securely share files with external partners. True False

True

Jawbone is a company that produces wearable technology. True False

True

Many organizations require each of their project managers to become certified as a project management professional. True False

True

Microsoft, Google, and Apple offer word processing, spreadsheet, and presentation software. True False

True

Productivity software allows office employees to complete their daily work effectively. True False

True

Rapid Application Development methodology consists of four phases. True False

True

Software is a set of instructions that tells the hardware what to do. True False

True

The most common form of authentication is the user ID and password. True False

True

The term ethics is defined as "a set of moral principles". True False

True

There can be challenges dealing with employees and customers from different cultures that include labor laws, legal restrictions, and international shipping. True False

True

Web 2.0 had a big impact on many businesses and some industries. True False

True

When users log in to the local area network from their PC by connecting to a powerful computer called a "server" it is called "client-server". True False

True

What are two good examples of a complex password?

Two good examples of complex passwords are ukRb7o2$vz and 9$Uvq27nTs

A strong password should not exceed eight characters. True False

False

Accessibility is a member of the Information Security Triad. True False

False

According to the text, the World Wide Web is the killer app for the Internet. True False

False

The internet was invented in what year? 1969 1967 None of the answers are correct. 1972 1970

1969

The first modern day cell phone was invented in ______. 1986 1979 1973 1990

1973

In what year did Microsoft release its first version of Windows? 1981 1985 1982 1987

1985

In what year were restrictions on commercial use of the Internet first lifted? 1991 1993 1990 1992

1991

In what year was Amazon founded? 1993 1994 1992 1991

1994

In what year was eBay founded? 1997/1998 1994/1995 1995/1996 1996/1997

1994/1995

What protections are provided by a copyright? How do you obtain one?

A copyright gives the author protections over who can make copies of the work, who can make derivative works from the original work, who can perform the work publicly, who can display the work publicly, who can distribute the work, a copyright is obtained by the simple act of creating the original

Which of the following are important reasons to define the data type of a field? A data type tells the database what functions can be performed with the data. So we know whether our database includes a representation of all data types. The proper amount of storage space is allocated for the data. So it is easier to categorize the data.

A data type tells the database what functions can be performed with the data, The proper amount of storage space is allocated for the data.

What is a firewall?

A hardware firewall is a device that is connected to the network and filters based on a set of rules. A software firewall runs on the operating system and intercepts packets as they arrive to a computer.

What is a "killer" app? What was the killer app for the PC?

A killer app is one where many people will buy a device just to use that specific app. The killer app for the PC was spreadsheet.

How would you categorize the software that runs on mobile devices? Break down these apps into at least three basic categories and give an example of each.

A mobile app is the software that runs on mobile devices. The three basic categories of apps are native, web and hybrid. Gmail is a web app, Facebook is a native app and Netflix is a hybrid app.

Which of the following is NOT an advantage brought about by globalization? A larger market for products A more diverse world The ability to operate 24 hours a day None of the answers are brought about by globalization. The ability to locate expertise and labor around the world

A more diverse world

Describe the job of a project manager

A project manager is responsible for keeping projects on time and on budget. They do not have the authority over the project team, but they do coordinate schedules and resources in order to maximize the project outcome. They must be a good communicator, organized and good with people.

Which of the following is true about a strong password? A strong password should contain at least one upper-case letter, one special character, and one number. A strong password should not exceed eight characters. All of the answers are true about a strong password. A strong password should contain social security number. A strong password should be a word that can be found in a dictionary.

A strong password should contain at least one upper-case letter, one special character, and one number.

Which of the following is NOT a member of the Information Security Triad? Accessibility Integrity Confidentiality None of the answers is a member of the Information Security Triad. Availability

Accessibility

How will advances in wireless technologies and sensors make objects "findable"?

Advances in wireless technologies and sensors will allow physical objects to send and receive data about themselves. Many technologies do this already but now they will be integrated. There are six applications for this and they are tracking behavior, enhanced situational awareness, sensor-driven decision analysis, process optimization, optimized resource consumption, and complex autonomous systems.

The first microcomputer was named ________ which was featured on Popular Mechanics Magazine. Apple II Altair 8800 Dell IBM PC None of the answers are correct.

Altair 8800

Explain what an ERP system does.

An ERP is an application used by an entire organization. It will be used by all employees where there is a shared database.

When computers use the base-two numbering system it is called __________. Decimal Binary Octal Hexadecimal

Binary

Which countries are the biggest users of the Internet? Social media? Mobile?

China has the biggest mobile users. Facebook has the biggest users in Indonesia, Mexico and the Philippines. Social media other than Facebook's biggest users are the UK, India, Germany, Canada, France, South Korea and Russia. China, India and Indonesia are the biggest Internet users.

__________________ design the computing devices that we use every day. Database administrators Computer engineers Computer operators Help-Desk analysts Project mangers

Computer engineers

A company shuts down its old COBOL legacy system and immediately starts up its new PeopleSoft ERP system. What type of implementation is the company using? None of the answers are correct. Phased implementation Parallel operation Pilot implementation Direct cutover

Direct cutover

____________________ are those who adopt innovation after a technology has been introduced and proven. Innovators Early Majority Late Majority Laggards Early Adopters

Early Adopters

________________ feasibility determines if a system development project is affordable. Organizational Time Technical Economic Behavioral

Economic

Which of the following is NOT a capability of printable technologies? Bringing manufacturing to the desktop computer Testing prototypes None of the answers a capability of printable technologies. Enhancing situational awareness Building something as a proof of concept

Enhancing situational awareness

"Globalization 1.0" is when the world shrank from size "large" to size "small" True False

False

"Globalization 1.0" occurred from about 1800 until the year 2000. True False

False

A hard disk is considered working memory and the RAM is considered long term memory. True False

False

A hard disk is much faster than a solid-state drive. True False

False

What are two different applications of wearable technologies?

Google Glass is an augmented reality device that you wear over your eyes like a pair of glasses. It projects images into your field of vision based on your context and voice commands. The UP by Jawbone tracks how you eat, sleep and move. It reports to an app on your mobile device.

What protections are provided by HIPAA, COPPA, and FERPA?

HIPAA gives patients specific rights to control their medical records, requires health care providers and others who maintain this information to get specific permission in order to share it, and imposes penalties on the institutions that breach that trust. COPPA makes organizations put in good-faith effort to determine the age of those accessing their websites and if users are under thirteen years old, they must obtain parental consent before collecting any information. FERPA protects the privacy of student education records and specifies that parents have a right to their child's educational information until the child reaches either the age of eighteen or begins attending school beyond high school level.

What is the relationship between HTML and CSS in website design?

HTML is used to define the components of a web page, CCS are used to define the styles of the components on a page. The combination of HTML and CSS can be used to create a wide variety of formats and designs. Developers use web design tools that generate the HTML and CSS for them. Professionals web designers need to learn HTML and CSS in order to have full control over the web pages they are developing.

What was one of the key points of The Rise of the Network Society?

He identified new ways in which economic activity was being organized around the networks that the new telecommunication technologies have provided. It was an economy with the capacity to work as a unit in real time on a planetary scale.

The first smartphone that was introduced was known as the _____________? IBM Simon Apple Iphone Motorola Razr Android

IBM Simon

Systems Analyst, programmer, and helpdesk support are roles people play in ________ Information systems (IS) Information Technology (IT) the corporate world society

Information systems (IS)

_____________________ are in charge of setting organizations' information-security policies, and then overseeing the implementation of those policies. Data analysts Information-security officers Project Managers Trainers Mobile-technology specialists

Information-security officers

_____________ is property (as an idea, invention, or process) that derives from the work of the mind or intellect. Information property Intelligent property Knowledgeable property Intellectual property None of the answers are correct.

Intellectual property

What was invented first, the personal computer or the Internet (ARPANET)? Both were created at the same time. Internet (ARPANET) Personal computer None of the answers are correct.

Internet (ARPANET)

LAN stands for Lost All Noise Local Authentic Network Local Area Network Localized Ariel Network

Local Area Network

What were the first four locations hooked up to the Internet (ARPANET)? MIT New York University USC Stanford University of Utah UCLA

MIT, Stanford, University of Utah, UCLA

Select the software from the list that is considered application software. Microsoft Word Google Chrome iTunes Microsoft Windows

Microsoft Word, Google Chrome, iTunes

What is open-source software? How does it differ from closed-source software? Give an example of each.

Open-source software means it is able to be downloaded and copied. It differs from closed-source software because programmers can add features and fix bugs. Mozilla Firefox is an open-source software and Microsoft Office is a closed-source software.

Which of the following is NOT a member of the Quality Triangle? Time None of the answers are a member of the Quality Triangle. Cost Quality People

People

What does the term personally identifiable information mean?

Personally identifiable information is information about a person that can be used to uniquely establish that person's identity such as name, social security number, date of birth, place of birth, mother's maiden name, biometric records, medical records, educational records, financial information and employment information.

The systems development life cycle proceeds in which order: System Analysis - System Design - Preliminary Analysis - Maintenance - Programming - Testing - Implementation Preliminary Analysis - Implementation - System Analysis - Programming - Testing - System Design - Maintenance Preliminary Analysis - System Design - System Analysis - Programming - Testing - Implementation - Maintenance Preliminary Analysis - System Analysis - System Design - Programming - Testing - Maintenance - Implementation Preliminary Analysis - System Analysis - System Design - Programming - Testing - Implementation - Maintenance

Preliminary Analysis - System Analysis - System Design - Programming - Testing - Implementation - Maintenance

Which of the following best describes RAM? Operating system is stored here. Rogers Access Memory Programs are loaded here for processing. Longterm storage.

Programs are loaded here for processing.

What is RAD software development?

RAD software development methodology focuses on quickly building a working model of the software, getting feedback from users and then using the feedback to update the working model. The RAD methodology's four phases are requirements planning, user design, construction and cutover.

_____________ is a method of developing websites that allows them to be viewed on many different types of devices without losing capability or effectiveness. ICT design None of the answers are correct. System design Responsive design Website design

Responsive design

Which of the following is false about role-based access control? Role-based access control gives specific users access rights to an information resource. All the answers are false about role-based access control. With role-based access control, users are assigned to roles and then those roles are assigned the access. Role-based access control allows the administrators to manage users and roles separately. Role-based access control simplifies administration and improves security.

Role-based access control gives specific users access rights to an information resource.

What impact has information technology had on the way companies are organized?

The integration of information technology has influenced the structure of organizations. The increased ability to communicate and share information has led to a flattening of the organizational structure due to the removal of one or more layers of management.

What is the OLPC project? Has it been successful?

The mission of One Laptop per Child(OLPC) is to empower the children of developing countries to learn by providing one connected laptop to every school-aged child. The OLPC project failed to live up to expectations, running into many problems related to globalization such as different cultures, corruption, and competition.

What are the functions of the operating system?

The operating system connects the hardware and the user. It manages the hardware, provides user interface components and allows software developers to create applications.

Come up with your own definition of software. Explain the key terms in your definition.

The software tells the hardware what to do and there are two types, operating systems and application software. The operating system connects the hardware and user and the application software is a useful program to the user.

What makes the lean methodology unique?

The thing that makes the lean methodology unique is that the full set of requirements for the system are not known when the project is launched. As each iteration of the project is released, the statistics and feedback gathered are used to determine the requirements. This works best in an entrepreneurial environment where a company is interested in determining if their idea for a software application is worth developing.

Briefly define each of the three members of the information security triad.

The three members of the information security triad are confidentiality, integrity and availability. Confidentiality protects information by restricting who can access it, disallowing everyone else to see the contents. Integrity is the assurance that the information being accessed has not been altered and truly represents what is intended. Lastly, availability means the information can be accessed and modified by anyone authorized to do so in an appropriate timeframe.

Which of the following best describes a hard disk? They are not removable. They have always been called floppy disks. They can never work like flash memory. They can hold very large amounts of data for a very long time.

They can hold very large amounts of data for a very long time.

"Globalization 3.0" is our current era, beginning in the year 2000. True False

True

Which of the following are operating systems? Microsoft Excel Google iTunes Windows Android Angry Birds.

Windows Android

Nanobot _______________________________. is a robot whose components are on the scale of about a nanometer shows promise for applications in the medical field cannot combat cancer can combat a specific disease a, b, and d are correct.

abd

Which of the following is true about the key points of "The Rise of the Network Society"? Economic activity was being organized around the networks that the new telecommunication technologies had provided. The economy has the capacity to work as a unit in real time on a planetary scale. This new, global economic activity was the same as that of the past. In the network society, we are all connected on a global scale. a, b, and d are true about the key points of "The Rise of the Network Society.

abd

An example of application software is __________________. Internet Explorer All of the answers are considered application software. Google Chrome iTunes Microsoft Word

all

Copyright protections address which of the following. All of the answers are addressed by copyright protections. Who can make derivative works from the original work. Who can distribute the work. Who can perform the work publicly, and who can display the work publicly. Who can make copies of the work.

all

Web 2.0 allowed people to interact with the World Wide Web in a new way - they could post to it. Which of the following are examples of businesses that have used Web 2.0 tools? - Flickr - Facebook - Instagram - Twitter

all

Which information technologies brought about "Globalization 3.0"? The World Wide Web The Internet All of the answers brought about "Globalization 3.0". The graphical interface of Windows The workflow software

all

Which of the following are disadvantages of purchasing software from a vendor instead of building software in-house? The purchased software may not integrate with existing systems. All of the answers are correct. The purchased software may be difficult to customize. The company will not have control over the upgrades of the purchased software. It may be difficult for the company to differentiate itself based on a business process that is in the purchased software.

all

Which of the following are information security tools? Authentication tools All of the answers are information security tools. Comprehensive backup plans Access control tools Encryption tools

all

Which of the following is an application of the Internet of Things? Complex autonomous systems Sensor-driven decision analysis Enhanced situational awareness Tracking behavior All of the answers are applications of the Internet of Things.

all

Which of the following is the challenge of globalization? Different languages, customs and preferences All of the answers are the challenges of globalization. Legal restrictions Infrastructure differences Labor laws and regulations

all

Which of the following is the component of a good backup plan? Offsite storage of backup data sets Test of data restoration Regular backups of all data A full understanding of the organizational information resources All of the answers are components of a good backup plan.

all

Which of the following is true about agile methods? Agile methods involve small cross-functional teams that include development-team members and users. Agile methods utilize incremental changes with a focus on quality and attention to detail. All of the answers are true about agile methods. Agile methods emphasize iterative development, user interaction, and ability to change. Agile methods provide the flexibility of an iterative approach while ensuring a quality product.

all

Which of the following is true about authentication? The purpose of authentication is to ensure that the person accessing the information is who he/she presents himself/herself to be. The most common form of authentication is the user ID and password. All the answers are true about authentication. To log in to an information resource using a combination of a six-digit PIN and an access code generated by a token device is an example of multi-factor authentication. Biometrics involves identifying someone through his/her physical characteristics.

all

Which of the following is true about the impact of information technology on the way companies are organized? Information technology enables the network-based organizational structure. The organizational structure has been flattened. All of the answers are true about the impact of information technology on the way companies are organized. The organizations have fewer layers of management. People with the right skills are brought together for a project and then released to work on other projects when that project is over.

all

Moore's Law states that the number of transistors on a chip will double every two years. computing power will double every two years for the same price point. the price for the same computing power will be cut in half every two years. all of these are correct.

all of these are correct.


Set pelajaran terkait

Folklore of the Middle East Final

View Set

AA Ch. 4, AA Ch. 3, AA Ch.2, AA Ch. 1, Ch 4 AA CONSOLIDATED FINANCIAL STATEMENTS AND OUTSIDE OWNERSHIP: Problems, Ch 3 AA Consolidations-Subsequent to the Date of Acquisition: Problems, Ch 2 AA Consolidation of Financial Information: Problems, accoun...

View Set

Chapter 7 - Workplace Legislation

View Set

Series 10- New Issues/Trading Markets

View Set

Specimen Collection: Midstream (Clean-Voided)

View Set

Maternal Newborn Success - Normal Postpartum & High Risk Postpartum

View Set