MIS - Final Exam - Quizzes and Test

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

You have a camera with a 16 MP resolution. How many pixels are represented by that resolution?

16 million

Why is a fragmented disk slower than one that is defragmented?

A fragmented disk has many files stored in noncontiguous sectors.

What happens during a DDoS attack?

A zombie army is used to attack computers or computer networks.

Which of the following companies does not manufacture computers that use the Windows operating system?

Apple

Word processing software, spreadsheet software, database software, and presentation software are examples of what category of computer software?

Application software

Who is Microsoft's founder?

Bill Gates

With which of the following can users transfer items to and from other computer on the Internet?

FTP (file transfer protocol)

Which of the following is a computer that allows users to upload and/or download files using FTP? - FTP network - FTP base unit - FTP client - FTP server

FTP server

Which of the following conveys meaning and is useful to users?

Information

Which of the following is a worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals?

Internet

How do you determine which type of computer — tablet, laptop, or desktop — is best?

It depends on your needs.

What is the purpose of an Internet Protocol address (IP address)? - It contains the protocol schema used to identify whether the computer is on a wired or wireless network. - It uniquely identifies the location of each computer or device connected to the Internet. - It specifies whether a computer is using a broadband network or a direct-dial network. - It differentiates between a server computer and a client computer and contains codes to identify whether the computer can send data or receive data.

It uniquely identifies the location of each computer or device connected to the Internet.

Which of the following consists of electronic components that store instructions waiting to be executed and data needed by those instructions?

Memory

What kind of file does Adobe Reader allow you to view?

PDF

Which of the following do you need to verify that you are the holder of the bank card at your local bank branch?

PIN

Which of the following is not a possessed object?

PIN

Which of the following is NOT a suggestion for easing eyestrain while using a mobile device?

Position the display about 90 degrees below eye level.

Which of the following cameras is a high-end digital camera that has interchangeable lenses and uses a mirror to display on its screen an exact replica of the image to be photographed?

SLR (single lens reflex)

If a manufacturer is looking for memory that is very durable and shock resistant, which kind of technology might it use in its laptops?

SSDs

Which of the following is true of VoIP? - It uses a slow speed dial-up connection. - It uses the public switched telephone network. - Skype is an example of VoIP software. - All of the above.

Skype is an example of VoIP software.

What consist(s) of a series of related instructions that tells the computer what tasks to perform and how to perform them?

Software

Who is Apple's cofounder?

Steve Jobs

IF YOU RECEIVE AN EMAIL MESSAGE IN ALL CAPITAL LETTERS, WHAT DOES THIS SIGNIFY? - THE EMAIL WAS SENT FROM A GOVERNMENT AGENCY. - THE PERSON WHO WROTE THE EMAIL WAS SHOUTING AT YOU. - THE CAPSLOCK KEY ON YOUR KEYBOARD IS MALFUNCTIONING. - THE EMAIL IS IMPORTANT

THE PERSON WHO WROTE THE EMAIL WAS SHOUTING AT YOU.

Your electric service has been failing with some frequency lately because of a lot of storms, and you are looking for more peace of mind when it comes to a reliable power source for your computer. Which of the following could help?

UPS (uninterruptible power supply)

Which of the following is a device that plugs in a USB port on the computer or mobile device and contains multiple USB ports?

USB hub

What is the difference between a wiki and a blog? - Users can modify posts in a wiki but they cannot modify posts made by a blogger. - Businesses create blogs but they do not create wikis. - Home users can use blogs but not wikis. - Blogs allow the sharing of ideas from all people while wikis allow sharing from only a single person.

Users can modify posts in a wiki but they cannot modify posts made by a blogger.

Which of the following provides the mobile user with a secure connection to the company network server?

VPN (Virtual Private Network)

The term, botnet, means _____________.

a group of compromised computers connected to a network that attacks other networks

If someone displays a webpage in a browser and the page indicates Flash Player is needed, what is Flash Player? - different browser than the one being used - a media compensator - a streamer - a plug-in

a plug-in

The term CAPTCHA is _____________.

a series of distorted characters that a user is required to enter correctly to continue using a website

What is product activation?

a technique to ensure software is not installed on more computers than legally licensed

Which kind of desktop uses the same case to house the screen and processing circuitry?

all-in-one

A DNS server is able to identify which of the following? - every computer or device connected to the Internet - the browser being used by a mobile device - an IP address based on a domain name - the TLD for a given company

an IP address based on a domain name

You need to restore a computer that has suffered a catastrophic failure. Which of the following are you most likely to use?

backup server

Your data center is looking to conserve space in its server room. Which of the following are you most likely to choose as a result?

blade server

What is the term for a program that performs a repetitive task on a network?

bot

Which of the following terms would you be looking for if you want to make a purchase of a variety of software at the same time that you purchase your new desktop?

bundle

You do not want to store your data locally on your hard disk. You would rather store it using an Internet service. What is this kind of storage known as?

cloud storage

Which of the following is an electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data according to specified rules, produce results, and store the results for future use?

computer

Which of the following types of software do engineers, architects and scientists use to create designs?

computer-aided design software (CAD)

Which design of tablet, as shown on the right in the accompanying figure, has an attached keyboard?

convertible tablet

Which of the following gives authors and artists the exclusive rights to duplicate, publish, and sell their materials?

copyright

You compose a new song and you now have exclusive rights to sell your song. Of which of the following is this an example?

copyright

What term is used to describe the harassment of computer users through various forms of Internet communications? - internet oppression - real-time terrorism - cyberbullying - online harassment

cyberbullying

Which of the following terms refers to someone who uses the Internet or network to destroy or damage computers for political reasons?

cyberterrorist

Which of the following is a collection of data organized in a manner that allows access, retrieval, and use of that data?

database

To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?

decryption

Which of the following entails having the knowledge and understanding of computers, mobile devices, the Internet, and related technologies?

digital literacy

Which of the following tools searches for and removes unnecessary files?

disk cleanup

Which of the following kinds of software provides a means for sharing, distributing, and searching through documents by converting them into a format that can be viewed by any user?

document management

Which of the following is a special-purpose computer that functions as a component in a larger product?

embedded computer

Each employee or customer who uses a computer in a large business is which kind of user?

enterprise

An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?

ethical

How often should you change your password?

every three months

Which of the following kinds of file utilities shrink the size of a file(s)?

file compression

If your friend recently has participated in e-filing, what has she been doing?

filing her state and/or federal tax returns online

A computer salesman refers to the shape and size of your new computer by a specific term. What term does he use?

form factor

Which of the following copies all of the files in a computer?

full backup

Which of the following types of computers targets a specific audience and offers high-quality audio, video, and graphics with optimal performance for sophisticated single-user and networked or Internet multiplayer games?

gaming desktop

A search engine displays a list of webpage names that contain the search text. What is the term for that list? . - pulls - keywords - icons - hits

hits

In a spreadsheet program, how is data organized?

in rows and columns collectively called a worksheet

What is an EULA intended to do?

license software for individual use

What is the general term for programs that act without a user's knowledge and deliberately alter the computer's operations?

malware

Which of the following is special software that a user needs in order to listen to an audio file on a computer? - media reader - media player - audio browser - broadcaster

media player

Which of the following is equal to approximately one million characters? - gigabyte - terabyte - megabyte - kilobyte

megabyte

Which of the following category of users works on a computer while away from a main office, home office, or school?

mobile

Which of the following best describes the term, cybercrime?

online or Internet-based illegal acts

Which type of software has no restrictions from the copyright holder regarding modifications of the software's internal instructions and its redistribution?

open source software

Which of the following is the process of initiating contact between two Bluetooth devices and allowing them to communicate with each other?

pairing

The term, PIN, is an acronym for which of the following?

personal identification number

What is the descriptor for a filter that warns or blocks you from potentially fraudulent or suspicious websites? - phishing - pop-up - spoofing - proxy

phishing

You have received an email that is directing you to a phony website that looks like the website for your mortgage company. What kind of message is this?

phishing

What is the term for the smallest element in an electronic image?

pixel

Which of the following is an affordable and lightweight digital camera with lenses built into it and a screen that displays an approximation of the image to be photographed?

point-and-shoot

Which the following is a filtering program that stops pop-up ads from displaying on web pages?

pop-up blocker

Which kind of user requires the capabilities of a powerful computer?

power

You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software. What is the term for this process?

product activation

A host in a network performs which of the following tasks? - ensures satellite communications are functional - exclusively monitors wireless networks to search for data transmission errors - routes transmissions over a network to guarantee data reaches its intended destination - provides services and connections to other computers on the network

provides services and connections to other computers on the network

Which of the following is a request for specific data from a database?

query

Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?

rootkit

Which of the following is a program that finds websites and webpages? - microbrowser - location utility - web finder - search engine

search engine

What manages the resources on a network?

server

Which of the following is a collection of individual programs sold as a unit?

software suite

Last night, you experienced a power increase that lasted for less than one thousandth of a second. What is the term for this?

spike

A program has been placed on your smartphone without your knowledge and it is collecting personal information about you. What kind of application is this?

spyware

Internet advertising firms often use which of the following to collect information about users web browsing habits?

spyware

When a radio station broadcasts a live sporting event over the Web, what technology are they using? - streaming - gaming - strobbing - podcasting

streaming

A type of computer usually has thousands of users. Which of the following is most likely to be the type of computer?

supercomputer

Which of the following are the fastest, most powerful computers — and the most expensive?

supercomputers

Which of the following allows users to have multiple home pages that automatically display when the browser runs? -atrix browsing - tabbed browsing - linked browsing - indexed browsing

tabbed browsing

The term, payload, as it pertains to computer crime, is defined as _____________.

the destructive event or prank the program is intended to deliver

Which of the following is your library using because it costs less, is easier to maintain, and uses less power than desktop computers?

thin client

Which of the following is a small version of a larger graphic? - Compressed Bit Form (CBF) - SmallGraph - podgraph - thumbnail

thumbnail

What was the original purpose of a screen saver?

to prevent images from being permanently etched on a monitor's screen

Which of the following is the process of transferring files from a computer to a server on the Internet? - downloading - flowing - streaming - uploading

uploading

What are two elements found in an email address? - @ symbol and dot com name - domain name and POP3 - address book and user name - user name and domain name

user name and domain name

Which of the following describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission?

virus

Antivirus programs look for a specific pattern of virus code. What is this pattern called?

virus signature

What type of software restricts access to specified websites?

web filtering

Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?

worm


Set pelajaran terkait

ATI Engage Fundamentals: Vital Signs

View Set

CIT 15 Chapter 12 Technology in Action 16e Fresno City College Fall 2019

View Set

Fluid regulation, water, electrolytes

View Set

Comptia N10-007 Practice test Questions Part 2

View Set