Computer Class Midterm
Match the following terms and their definitions. - Is used to make decisions. - Can be quantitative or qualitative. - Is created by adding context. 1. Data 2. Information 3. Knowledge
- 3 - 1 - 2
Place the following terms in order from lowest form (1) to highest form (4) 1. wisdom 2. information 3. data 4. knowledge
4, 2, 1, 3
Which of the following meet the requirement to be a broadband connection? (check all that apply) 5MB bps 256k bps 56k bps 128k bps
5MB bps 256k bps
According to your textbook modern PCs can process ___ bits of data at a time. 8 32 64 16
64
What is a UAV?
A UAV is also known as a drone. It is a small airplane or helicopter that can fly without a pilot. They run autonomously by computer in a vehicle or are run by a person with a remote control. They are mainly used for military or civil applications but sometimes used personally.
What is a code of ethics? What is one advantage and one disadvantage of a code of ethics?
A code of ethics is a document that outlines a set of acceptable behaviors for a professional or social group. An advantage is it clarifies the acceptable standards of behavior for a professional group. A disadvantage is that it may not entirely reflect the ethics or morals of every member of the group.
What does a software license grant?
A software license grants a person use of the features of the software. You cannot make illegal copies of the software and you cannot use it for illegal purposes.
What is change management?
Change management is a critical component of IT oversight. it manages the way change is implemented in an organization. The organization should be sure to communicate proposed changes before they happen and plan to minimize the impact of the change that will occur after implementation.
Why would an organization outsource?
An organization would outsource to cut costs and contract out a whole group or department. Outsourcing is used in design and creation of a new website or the upgrade of an ERP system.
What is metadata? Data about data A dating service A data type in a database A data warehouse
Data about data
Business intelligence aims to improve an organizations internal processes, while analytics aims to improve an organizations competitive advantage. True False
False
By using a Creative Commons license, authors cannot control the use of their work. True False
False
Computers, keyboards, disk drives, iPads, and flash drives are all examples of data. True False
False
In a client-server environment, a network is not necessary. True False
False
In a database, all the fields are related by one or more tables, so that it is possible to connect all the fields through the tables they have in common. True False
False
Information Systems hardware is best defined as the part of the computer that provide operating instructions to processor. True False
False
Over 90% of YouTube users are outside the US. True False
False
Project managers are in charge of setting organizations' information-security policies, and then overseeing the implementation of those policies. True False
False
SSD are much slower than the traditional hard disk. True False
False
Systems-Development Life Cycle makes more sense when dealing with smaller projects with less resources. True False
False
Technical feasibility determines if a system development project is affordable. True False
False
The World Wide Web was invented before the Internet. True False
False
The late majority will adopt an innovation after a varying degree of time. True False
False
VoIP stands for Voice over Internet Protocol and refers to customers dropping their landline telephone for a cellular phone. True False
False
What are three differences between second-generation and third-generation languages?
First-generation languages are called machine code. The programming is done by directly setting actual ones an zeroes in the program using binary code. The second-generation language is assembly language. It gives english-like phrases to the machine-code instructions making it easier to program. It must be run through an assembler which converts it into machine code.
Which of the following best defines a packet? Fundamental unit of data transmitted over the Internet. Location of units of data on the Internet. Analysis of units of data sent over the Internet. Connection of all other devices on the internet.
Fundamental unit of data transmitted over the Internet.
List the following in increasing order (slowest to fastest). kilohertz megahertz gigahertz
Kilo, mega, giga
___________________ are those who adopt an innovation after the average member of the society. Early Adopters Early Majority Innovators Late Majority Laggards
Late Majority
What are five examples of information system hardware discussed in your textbook? Mouse Network Adaptor Personal Computer (PC) Tablet Computer Radio Smart Phone Printer
Mouse, Personal Computer (PC), Tablet Computer, Smart Phone, Printer
What is multi-factor authentication?
Multi-factor authentication is a more secure way to authenticate a user. Multi-factor authentication is used by combining two or more factors of regular authentication. The factors of regular authentication are something the user knows, something they have and something they are. This makes it much more difficult for someone to misrepresent themselves.
What is role-based access control?
With Role-based access control, users are assigned roles and then those roles are assigned the access. Administrators can manage users and roles separately which improves security.
The process of NORA ____________________. decreases individual privacy None of the answers are correct. increases individual privacy is illegal in more than half of the states has no effect on individual privacy
decreases individual privacy
Which of the following is an application of collaborative technologies? a. Technologies that allow physical objects to send and receive data about themselves. b. Software that routes us to our destination in the shortest amount of time. c. Websites that review different companies d. Devices that can operate themselves to perform specific functions by combining several technologies. e. Both b and c are applications of collaborative technologies.
e. Both b and c are applications of collaborative technologies.
Advances in ___________ technologies and sensors make objects "findable". printable Collaborative wearable None of the answers are correct. wireless
wireless
What are the five components that make up an information system? software people data peripherals computers competitive advantage process hardware
process, hardware, software, people, data
The purpose of normalization is to create rigidity so the database can't be altered. create duplicate copies of the data so you have a backup. reduce duplicate copies of data. make it look like a spreadsheet.
reduce duplicate copies of data.
Data mining performs which of the following? - searches for unknown trends, patterns, and associations. - seeks to confirm known trends, patterns, and associations. - requires oxygen, a hard hat, and a light. - protects everyone's privacy.
searches for unknown trends, patterns, and associations.
The personal computer has become a commodity because there is very little differentiation between computers. so many people take them to the commode. sale prices are dropping. everyone has one.
there is very little differentiation between computers.
Which of the following is NOT an example of wearable technologies? Jawbone UP Google Glass Smartphone None of the answers are an example of wearable technologies. Apple Watch
Smartphone
Which of the following is NOT an example of a relational database Microsoft Access MySQL Oracle Tableau
Tableau
How did the Y2K (year 2000) problem affect the sales of ERP systems?
The ERP systems sales increased because of the Y2K problem because the system was Y2K compliant.
What are the advantages and disadvantages of centralizing the IT function?
The advantages of centralizing the IT function is it gave departments the chance to gain some computing resources for themselves. Some departments created an internal information-systems group complete with systems analysts, programmers and even database administrators. The disadvantages were there were now several people performing the same jobs in different departments. The company data was being stored in several places.
What are the challenges of globalization?
The challenges of globalization are infrastructure differences, labor laws and regulations, legal restrictions, language, customs and preferences and international shipping.
What does the CIO do?
The chief information officer is the head of the information-systems function. The CIO aligns the plans and operations of the information systems with the strategic goals of the organization.
Which country has the highest average Internet speed? How does your country compare?
The country with the highest average Internet speed is South Korea. It has an average of 16.63Mb/s and the United States has an average of 4.6 Mb/s.
What are Jakob Nielsen's three stages of the digital divide?
The economic divide which is the idea that some people can afford to have a computer and Internet access while others cannot. The usability divide which is concerned with the fact that technology remains so complicated that many people could not use a computer even if they got one for free. The empowerment divide is concerned with how we use technology to empower ourselves.
What is globalization? The process of making all countries equally rich None of the answers are correct about globalization. The process of keeping cultures separate The process of making people speaking only one language The integration of goods, services, and cultures among the nations of the world
The integration of goods, services, and cultures among the nations of the world
A code of ethics is a document that outlines a set of acceptable behaviors for a professional or social group. True False
True
A computer trainer conducts classes to teach people specific computer skills. True False
True
A digital device processes electronic signals that represent either a one or a zero. True False
True
A disadvantage of a code of ethics is that there could be a chance that important issues will arise that are not specifically addressed in the code. True False
True
A process is a series of steps undertaken to achieve a desired outcome or goal. True False
True
A solid-state drive uses flash memory instead of a spinning disk to save information. True False
True
A trademark is a word, phrase, logo, shape or sound that identifies a source of goods or services. True False
True
Apple introduced the Macintosh computer in 1994. True False
True
Business intelligence aims to improve an organizations internal processes, while analytics aims to improve an organizations competitive advantage. True False
True
Devices that we can hold in one hand are more powerful that the computers used to land a man on the moon. True False
True
Downloading copyrighted music is like walking into a store and stealing a CD. True False
True
Encryption tools are information security tools. True False
True
Fair use is a limitation on copyright law that allows for the use of protected works without prior authorization in specific cases. True False
True
Globalization is the term used to refer to the integration of goods, services, and culture among the nations of the world. True False
True
In 1975, the first microcomputer was announced on the cover of Popular Mechanics. True False
True
In 2011, smartphones began outselling personal computers. True False
True
Instead of training an existing employee for a limited role a company may outsource the job. True False
True
Intranet is for secure internal file sharing and an extranet is used to securely share files with external partners. True False
True
Jawbone is a company that produces wearable technology. True False
True
Many organizations require each of their project managers to become certified as a project management professional. True False
True
Microsoft, Google, and Apple offer word processing, spreadsheet, and presentation software. True False
True
Productivity software allows office employees to complete their daily work effectively. True False
True
Rapid Application Development methodology consists of four phases. True False
True
Software is a set of instructions that tells the hardware what to do. True False
True
The most common form of authentication is the user ID and password. True False
True
The term ethics is defined as "a set of moral principles". True False
True
There can be challenges dealing with employees and customers from different cultures that include labor laws, legal restrictions, and international shipping. True False
True
Web 2.0 had a big impact on many businesses and some industries. True False
True
When users log in to the local area network from their PC by connecting to a powerful computer called a "server" it is called "client-server". True False
True
What are two good examples of a complex password?
Two good examples of complex passwords are ukRb7o2$vz and 9$Uvq27nTs
A strong password should not exceed eight characters. True False
False
Accessibility is a member of the Information Security Triad. True False
False
According to the text, the World Wide Web is the killer app for the Internet. True False
False
The internet was invented in what year? 1969 1967 None of the answers are correct. 1972 1970
1969
The first modern day cell phone was invented in ______. 1986 1979 1973 1990
1973
In what year did Microsoft release its first version of Windows? 1981 1985 1982 1987
1985
In what year were restrictions on commercial use of the Internet first lifted? 1991 1993 1990 1992
1991
In what year was Amazon founded? 1993 1994 1992 1991
1994
In what year was eBay founded? 1997/1998 1994/1995 1995/1996 1996/1997
1994/1995
What protections are provided by a copyright? How do you obtain one?
A copyright gives the author protections over who can make copies of the work, who can make derivative works from the original work, who can perform the work publicly, who can display the work publicly, who can distribute the work, a copyright is obtained by the simple act of creating the original
Which of the following are important reasons to define the data type of a field? A data type tells the database what functions can be performed with the data. So we know whether our database includes a representation of all data types. The proper amount of storage space is allocated for the data. So it is easier to categorize the data.
A data type tells the database what functions can be performed with the data, The proper amount of storage space is allocated for the data.
What is a firewall?
A hardware firewall is a device that is connected to the network and filters based on a set of rules. A software firewall runs on the operating system and intercepts packets as they arrive to a computer.
What is a "killer" app? What was the killer app for the PC?
A killer app is one where many people will buy a device just to use that specific app. The killer app for the PC was spreadsheet.
How would you categorize the software that runs on mobile devices? Break down these apps into at least three basic categories and give an example of each.
A mobile app is the software that runs on mobile devices. The three basic categories of apps are native, web and hybrid. Gmail is a web app, Facebook is a native app and Netflix is a hybrid app.
Which of the following is NOT an advantage brought about by globalization? A larger market for products A more diverse world The ability to operate 24 hours a day None of the answers are brought about by globalization. The ability to locate expertise and labor around the world
A more diverse world
Describe the job of a project manager
A project manager is responsible for keeping projects on time and on budget. They do not have the authority over the project team, but they do coordinate schedules and resources in order to maximize the project outcome. They must be a good communicator, organized and good with people.
Which of the following is true about a strong password? A strong password should contain at least one upper-case letter, one special character, and one number. A strong password should not exceed eight characters. All of the answers are true about a strong password. A strong password should contain social security number. A strong password should be a word that can be found in a dictionary.
A strong password should contain at least one upper-case letter, one special character, and one number.
Which of the following is NOT a member of the Information Security Triad? Accessibility Integrity Confidentiality None of the answers is a member of the Information Security Triad. Availability
Accessibility
How will advances in wireless technologies and sensors make objects "findable"?
Advances in wireless technologies and sensors will allow physical objects to send and receive data about themselves. Many technologies do this already but now they will be integrated. There are six applications for this and they are tracking behavior, enhanced situational awareness, sensor-driven decision analysis, process optimization, optimized resource consumption, and complex autonomous systems.
The first microcomputer was named ________ which was featured on Popular Mechanics Magazine. Apple II Altair 8800 Dell IBM PC None of the answers are correct.
Altair 8800
Explain what an ERP system does.
An ERP is an application used by an entire organization. It will be used by all employees where there is a shared database.
When computers use the base-two numbering system it is called __________. Decimal Binary Octal Hexadecimal
Binary
Which countries are the biggest users of the Internet? Social media? Mobile?
China has the biggest mobile users. Facebook has the biggest users in Indonesia, Mexico and the Philippines. Social media other than Facebook's biggest users are the UK, India, Germany, Canada, France, South Korea and Russia. China, India and Indonesia are the biggest Internet users.
__________________ design the computing devices that we use every day. Database administrators Computer engineers Computer operators Help-Desk analysts Project mangers
Computer engineers
A company shuts down its old COBOL legacy system and immediately starts up its new PeopleSoft ERP system. What type of implementation is the company using? None of the answers are correct. Phased implementation Parallel operation Pilot implementation Direct cutover
Direct cutover
____________________ are those who adopt innovation after a technology has been introduced and proven. Innovators Early Majority Late Majority Laggards Early Adopters
Early Adopters
________________ feasibility determines if a system development project is affordable. Organizational Time Technical Economic Behavioral
Economic
Which of the following is NOT a capability of printable technologies? Bringing manufacturing to the desktop computer Testing prototypes None of the answers a capability of printable technologies. Enhancing situational awareness Building something as a proof of concept
Enhancing situational awareness
"Globalization 1.0" is when the world shrank from size "large" to size "small" True False
False
"Globalization 1.0" occurred from about 1800 until the year 2000. True False
False
A hard disk is considered working memory and the RAM is considered long term memory. True False
False
A hard disk is much faster than a solid-state drive. True False
False
What are two different applications of wearable technologies?
Google Glass is an augmented reality device that you wear over your eyes like a pair of glasses. It projects images into your field of vision based on your context and voice commands. The UP by Jawbone tracks how you eat, sleep and move. It reports to an app on your mobile device.
What protections are provided by HIPAA, COPPA, and FERPA?
HIPAA gives patients specific rights to control their medical records, requires health care providers and others who maintain this information to get specific permission in order to share it, and imposes penalties on the institutions that breach that trust. COPPA makes organizations put in good-faith effort to determine the age of those accessing their websites and if users are under thirteen years old, they must obtain parental consent before collecting any information. FERPA protects the privacy of student education records and specifies that parents have a right to their child's educational information until the child reaches either the age of eighteen or begins attending school beyond high school level.
What is the relationship between HTML and CSS in website design?
HTML is used to define the components of a web page, CCS are used to define the styles of the components on a page. The combination of HTML and CSS can be used to create a wide variety of formats and designs. Developers use web design tools that generate the HTML and CSS for them. Professionals web designers need to learn HTML and CSS in order to have full control over the web pages they are developing.
What was one of the key points of The Rise of the Network Society?
He identified new ways in which economic activity was being organized around the networks that the new telecommunication technologies have provided. It was an economy with the capacity to work as a unit in real time on a planetary scale.
The first smartphone that was introduced was known as the _____________? IBM Simon Apple Iphone Motorola Razr Android
IBM Simon
Systems Analyst, programmer, and helpdesk support are roles people play in ________ Information systems (IS) Information Technology (IT) the corporate world society
Information systems (IS)
_____________________ are in charge of setting organizations' information-security policies, and then overseeing the implementation of those policies. Data analysts Information-security officers Project Managers Trainers Mobile-technology specialists
Information-security officers
_____________ is property (as an idea, invention, or process) that derives from the work of the mind or intellect. Information property Intelligent property Knowledgeable property Intellectual property None of the answers are correct.
Intellectual property
What was invented first, the personal computer or the Internet (ARPANET)? Both were created at the same time. Internet (ARPANET) Personal computer None of the answers are correct.
Internet (ARPANET)
LAN stands for Lost All Noise Local Authentic Network Local Area Network Localized Ariel Network
Local Area Network
What were the first four locations hooked up to the Internet (ARPANET)? MIT New York University USC Stanford University of Utah UCLA
MIT, Stanford, University of Utah, UCLA
Select the software from the list that is considered application software. Microsoft Word Google Chrome iTunes Microsoft Windows
Microsoft Word, Google Chrome, iTunes
What is open-source software? How does it differ from closed-source software? Give an example of each.
Open-source software means it is able to be downloaded and copied. It differs from closed-source software because programmers can add features and fix bugs. Mozilla Firefox is an open-source software and Microsoft Office is a closed-source software.
Which of the following is NOT a member of the Quality Triangle? Time None of the answers are a member of the Quality Triangle. Cost Quality People
People
What does the term personally identifiable information mean?
Personally identifiable information is information about a person that can be used to uniquely establish that person's identity such as name, social security number, date of birth, place of birth, mother's maiden name, biometric records, medical records, educational records, financial information and employment information.
The systems development life cycle proceeds in which order: System Analysis - System Design - Preliminary Analysis - Maintenance - Programming - Testing - Implementation Preliminary Analysis - Implementation - System Analysis - Programming - Testing - System Design - Maintenance Preliminary Analysis - System Design - System Analysis - Programming - Testing - Implementation - Maintenance Preliminary Analysis - System Analysis - System Design - Programming - Testing - Maintenance - Implementation Preliminary Analysis - System Analysis - System Design - Programming - Testing - Implementation - Maintenance
Preliminary Analysis - System Analysis - System Design - Programming - Testing - Implementation - Maintenance
Which of the following best describes RAM? Operating system is stored here. Rogers Access Memory Programs are loaded here for processing. Longterm storage.
Programs are loaded here for processing.
What is RAD software development?
RAD software development methodology focuses on quickly building a working model of the software, getting feedback from users and then using the feedback to update the working model. The RAD methodology's four phases are requirements planning, user design, construction and cutover.
_____________ is a method of developing websites that allows them to be viewed on many different types of devices without losing capability or effectiveness. ICT design None of the answers are correct. System design Responsive design Website design
Responsive design
Which of the following is false about role-based access control? Role-based access control gives specific users access rights to an information resource. All the answers are false about role-based access control. With role-based access control, users are assigned to roles and then those roles are assigned the access. Role-based access control allows the administrators to manage users and roles separately. Role-based access control simplifies administration and improves security.
Role-based access control gives specific users access rights to an information resource.
What impact has information technology had on the way companies are organized?
The integration of information technology has influenced the structure of organizations. The increased ability to communicate and share information has led to a flattening of the organizational structure due to the removal of one or more layers of management.
What is the OLPC project? Has it been successful?
The mission of One Laptop per Child(OLPC) is to empower the children of developing countries to learn by providing one connected laptop to every school-aged child. The OLPC project failed to live up to expectations, running into many problems related to globalization such as different cultures, corruption, and competition.
What are the functions of the operating system?
The operating system connects the hardware and the user. It manages the hardware, provides user interface components and allows software developers to create applications.
Come up with your own definition of software. Explain the key terms in your definition.
The software tells the hardware what to do and there are two types, operating systems and application software. The operating system connects the hardware and user and the application software is a useful program to the user.
What makes the lean methodology unique?
The thing that makes the lean methodology unique is that the full set of requirements for the system are not known when the project is launched. As each iteration of the project is released, the statistics and feedback gathered are used to determine the requirements. This works best in an entrepreneurial environment where a company is interested in determining if their idea for a software application is worth developing.
Briefly define each of the three members of the information security triad.
The three members of the information security triad are confidentiality, integrity and availability. Confidentiality protects information by restricting who can access it, disallowing everyone else to see the contents. Integrity is the assurance that the information being accessed has not been altered and truly represents what is intended. Lastly, availability means the information can be accessed and modified by anyone authorized to do so in an appropriate timeframe.
Which of the following best describes a hard disk? They are not removable. They have always been called floppy disks. They can never work like flash memory. They can hold very large amounts of data for a very long time.
They can hold very large amounts of data for a very long time.
"Globalization 3.0" is our current era, beginning in the year 2000. True False
True
Which of the following are operating systems? Microsoft Excel Google iTunes Windows Android Angry Birds.
Windows Android
Nanobot _______________________________. is a robot whose components are on the scale of about a nanometer shows promise for applications in the medical field cannot combat cancer can combat a specific disease a, b, and d are correct.
abd
Which of the following is true about the key points of "The Rise of the Network Society"? Economic activity was being organized around the networks that the new telecommunication technologies had provided. The economy has the capacity to work as a unit in real time on a planetary scale. This new, global economic activity was the same as that of the past. In the network society, we are all connected on a global scale. a, b, and d are true about the key points of "The Rise of the Network Society.
abd
An example of application software is __________________. Internet Explorer All of the answers are considered application software. Google Chrome iTunes Microsoft Word
all
Copyright protections address which of the following. All of the answers are addressed by copyright protections. Who can make derivative works from the original work. Who can distribute the work. Who can perform the work publicly, and who can display the work publicly. Who can make copies of the work.
all
Web 2.0 allowed people to interact with the World Wide Web in a new way - they could post to it. Which of the following are examples of businesses that have used Web 2.0 tools? - Flickr - Facebook - Instagram - Twitter
all
Which information technologies brought about "Globalization 3.0"? The World Wide Web The Internet All of the answers brought about "Globalization 3.0". The graphical interface of Windows The workflow software
all
Which of the following are disadvantages of purchasing software from a vendor instead of building software in-house? The purchased software may not integrate with existing systems. All of the answers are correct. The purchased software may be difficult to customize. The company will not have control over the upgrades of the purchased software. It may be difficult for the company to differentiate itself based on a business process that is in the purchased software.
all
Which of the following are information security tools? Authentication tools All of the answers are information security tools. Comprehensive backup plans Access control tools Encryption tools
all
Which of the following is an application of the Internet of Things? Complex autonomous systems Sensor-driven decision analysis Enhanced situational awareness Tracking behavior All of the answers are applications of the Internet of Things.
all
Which of the following is the challenge of globalization? Different languages, customs and preferences All of the answers are the challenges of globalization. Legal restrictions Infrastructure differences Labor laws and regulations
all
Which of the following is the component of a good backup plan? Offsite storage of backup data sets Test of data restoration Regular backups of all data A full understanding of the organizational information resources All of the answers are components of a good backup plan.
all
Which of the following is true about agile methods? Agile methods involve small cross-functional teams that include development-team members and users. Agile methods utilize incremental changes with a focus on quality and attention to detail. All of the answers are true about agile methods. Agile methods emphasize iterative development, user interaction, and ability to change. Agile methods provide the flexibility of an iterative approach while ensuring a quality product.
all
Which of the following is true about authentication? The purpose of authentication is to ensure that the person accessing the information is who he/she presents himself/herself to be. The most common form of authentication is the user ID and password. All the answers are true about authentication. To log in to an information resource using a combination of a six-digit PIN and an access code generated by a token device is an example of multi-factor authentication. Biometrics involves identifying someone through his/her physical characteristics.
all
Which of the following is true about the impact of information technology on the way companies are organized? Information technology enables the network-based organizational structure. The organizational structure has been flattened. All of the answers are true about the impact of information technology on the way companies are organized. The organizations have fewer layers of management. People with the right skills are brought together for a project and then released to work on other projects when that project is over.
all
Moore's Law states that the number of transistors on a chip will double every two years. computing power will double every two years for the same price point. the price for the same computing power will be cut in half every two years. all of these are correct.
all of these are correct.