cgs 2060 final

Ace your homework & exams now with Quizwiz!

select the usual tasks for Info systems program managers

-supervise IS technicians -working with developers and senior management to procure and implement IS processes -developing training plans and policies for IS

Which of these extensions, if you open it, will probably install software onto your computer? Be careful!

.exe

Which of the following file extensions is commonly used for drawings?

.gif

The 3 phases that should be accomplished in the investigation step of the SDLC include:

1. Defining the problem. What should this system do? Who will by using this IT system? 2. Examining alternatives. Can available hardware and software perform the same task? 3. Reporting. Document your investigation's findings.

The fifth step in the SDLC process is the system implementation phase. During this phase the new system is brought online. Select methods of converting an organization from an older IT system to a newer IT system.

1. Direct conversion - shutting down the old system completely and starting the new one. 2. Parallel conversion - running both systems side-by-side for a while and then shutting the old system. 3. Pilot conversion - starting the new system in one sector of the organization to ensure that it works smoothly.

Select what's true about packet Specialized hardware or software that capture packets transmitted over a network

1. Legitimate sniffers are used for routine examination and problem detection. 2. Unauthorized sniffers are used to steal information.

Select the Android operating systems.

1. Lollipop 2. marshmallow

Select the anti-virus software options.

1. Mcafee 2. Norton 3. AVG

There are several ways to rename a folder in Windows. Which of these would work?

1. On the command bar, click Organize and then click Rename. 2. Click the folder icon and press F2 to activate the edit mode. 3. Right-click a folder and click Rename.

Select the phases included in the system development step of the SDLC process.

1. Purchasing necessary software. 2. Purchasing needed hardware. 3. Setting up, installing, and testing system.

Select the qualities that make a trait useful for biometic recognition.

1. The trait must not change over time. 2. cannot change over time 3. must be measurably different

select the characteristics of a CD

1. holds approx 700 MB of data 2. uses pits and lands to store data

Select the characteristics of a OneDrive account

1. microsoft email account 2. provides free cloud storage 3. can serve as extra storage space

Select the features common in DSLR cameras.

1. often allow for interchangeable lenses 2. usually have a mirror that allows the photographer to look directly through the lens

Select the reasons for compressing a file.

1. reduce the bandwidth needed to transmit a file 2. reduce storage space requirements

a typical laptop has a strong capacity of approx

500 GB - 1 TB

2GL

Assembly language - an assembler converts 2GL into machine language.

To remove a file from one folder and place it in another, click on the item and press ___, then move your cursor to the new location and press CTRL + V.

CTRL + X

which of the following are considered storage media?

DVDs blu ray discs

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .

Distributed Denial of Service

5GL

Extremely advanced - uses statements (scripts) rather than algorithms.

a quick way to rename files or folders in Windows is to select the item and then press the ____ key

F2

While not technically a programming language, ___ refers to the protocols that allow content to display on the web.

HTML

3GL

High-level programming language - uses a compiler to convert into machine language.

a switch distinguishes between various devices within a network by their ______ addresses

MAC

which category of MIS combines the forecasting capacity of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?

SCMS

4GL

Specifically designed for creating database management programs.

which category of management info systems (MIS) focuses on tracking sales and inventories

TPS

examples of management info systems (MIS) include

TPS ESS DSS

PaaS (distribution)

The distribution of computer applications over the Internet. Commonly referred to as web apps.

spam messages are sometimes referred to as _________

UBE

What type of port do most digital devices use to attach peripherals?

USB port

URL stands for ___ Resource Locator.

Uniform

While not technically a programming language, ___ refers to the protocols that allow content to displayed on the web.

XML

select the advantages of using a database instead of a traditional filing system

a database can hold larger amounts of data a database can provide better data integrity

zip

a lossless compression format

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called

adware

which of these operating systems is based on the Linux and used on smartphones

android

if you believe you have fallen victim to a phishing scam you should

contact the institution the message was allegedly sent from contact US CERT

The first commercially available computer with a graphical user interface was NeXT's ___ computer.

cube

An integral part of a databases management system (DBMS) is the Data Definition subsection. This subsection uses a data schema, also called a data ___ .

dictionary

A database that stores data in different physical locations and that users access though client/server networks is called a ___ database.

distributed

a database that stores data in different physical locations and that users access thru client/server networks is called a ________ database

distributed

DDoS stands for?

distributed denial of service

A ___ name identifies a server site on the Internet.

domain

The distance between two adjacent sub-pixels on a display is referred to as ___ .

dot pitch

When you drag a file into the Recycle Bin it cannot be recovered. T/F

false

a refracted laser beam striking a photo reactor from many different angles allows _______ storage to retain many bits of data in the same location

holographic

Which of these is found on iPhones and iPads?

iOS

select apple tablet offerings

iPad pro series ipad air series iPad mini series

phased

implements new areas of the system in a predetermined period of time

the role of installing, maintaining, repairing, and replacing info system hardware and software typically falls to the __________

info systems (info technology) technician

Rout kits allow a remote user to do which of the following

install rogue kits create backdoor programs delete files

Adam was in the fifth grade when he was adopted by the Smith's. Because his school used a centralized database, all of his teachers had his correct name on their grade reports. This is an example of how a centralized database can help improve data ___ .

integrity

which of these browsers was developed by microsoft

internet explorer

what 3 items are needed to install a wifi network

internet signal modem router

A process that has an initial value, a process, and a test condition that can potentially return the program to the initial value is called a ___ .

loop

select the characteristics of fiber optic lines

made of 1 or thousands of fiber high speed transmission

The final step in the SDLC has two phases, a system audit and an evaluation phase. This final step is referred to as ___ the system.

maintaining

be careful to only open emails from senders you know and trust. __________ may be contained

malware

Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create forms, reports, data dictionaries and other capabilities, it is often referred to as a Database ___ System.

management

When you receive a utility bill, you're actually getting a report that was generated by a database management system. The DBMS subsystem that provides for data maintenance, analysis, and the generation of reports is called the data ___ subsystem.

manipulation

L3 cache

memory located adjacent to the processor

L1 cache

memory located directly on the processor itself

Disk Cache

memory used to increase a hard drive's efficiency

One advantage that the Samsung tablets have over the iPads is that you can add ___ to the Note or Tab.

microSD storage

By upgrading to it's maximum capacity of 16 GB of RAM and 1 TB of storage, the ___ tablet could be an extremely powerful computer!

microsoft surface pro 4

Megahertz is equal to one _____ cycles (or instructions) per second.

million

Because it locates cellular devices, assigns frequencies, transmits signals to the correct sites, the ___ is probably the most important part of any cellular network.

mobile switching station (MSS)

A complex database that organizes and stores information in a cube format and has measure attributes and feature attributes is called a ___ database.

multidimensional

a storage device that uses lasers to read CDs, DVDs, or blu ray discs is referred to as an

optical drive

The BitTorrent protocol is often called ___ file sharing.

peer to peer

Using cells of ionized gas to create images, ___ displays are actually becoming less popular.

plasma

RFID stands for which of the following.

radio frequency identification

In the datasheet view of a relational database (such as Microsoft Access) a row of information is called a ___ .

record

which of the following are internet service options

satellite cable router

since it comes with a full computer operating system, some consider the ______ a laptop computer rather than a tablet computer

surface pro 4

Because Objective-C was difficult to write in, Apple developed ___ , a programming language for writing software for the Mac OS and the iOS.

swift

Connecting your phone to your laptop to transfer photos, videos, or music files is referred to as ___ .

syncing

A collection of related records in a database is referred to as a _____.

table

Which devices use a virtual keyboard?

tablet smartphone

HTML and it's 5th revision (HTML5) allow content to be displayed on ___ .

the world wide web

select the reasons you might add a microSD card to your smartphone

you want to save more music files you want to save more image files

Select the common video file formats.

.mov .avi

Select the common audio file formats.

.mp3 .mp4 .wav

Select the common word processing file extensions.

.odf .docx

Select what's true about database fields

1. A group of related characters in a database 2. Represents a characteristic of someone or something 3. Primary key is a field designation

Select what's true regarding all-in-one computers.

1. All-in-one computers house every component except the keyboard and mouse inside the same case as the monitor. 2. An all-in-one computer is a stationary device with a separate keyboard and mouse.

The system analysis step of the SDLC involves 3 phases. Select these three phases.

1. Data collection - gathering info about needs and existing hardware and software. 2. Analyze data - determine the system requirements. 3. Prepare the system specifications.

There are several ways to create a new folder in Windows. Which of these would work?

1. Right-click any blank area in the Contents pane. Click New and then click Folder. 2. Right-click a folder in the folders list. Click New and then click Folder. 3. On the command bar, click New folder.

The data definition, as described in the data dictionary, tells users how each unit of data is defined in the database. Which of the following elements will be used to describe the data?

1. What field name will the data fall under 2. What data type will be included

Which of the following are output?

1. a YouTube video displayed on a screen 2. an anti-lock brake system applying brakes

Select the methods of using cloud storage.

1. emailing a file to yourself 2. saving a photo on Flickr 3. purchasing online storage space

select the characteristics of a bluray disc

1. holds approx 25 gb of data 2. uses pits and lands to store data

Your college has a database with a Students table. Which of the following could be a primary key in the table?

1. student number 2. social security number

The final step in the system development life cycle is maintaining the system. Select the two phases of this step.

1. system audit 2. evaluation phase

Select the characteristics of a projector.

1. usually requires a darkened environment 2. allows large audiences to view digital output 3. usually used with a screen

How can you attach a mouse or other pointing device to your computer?

1. with a Bluetooth connection 2. with a wire through a USB port 3. with a WiFi connection

You can change your Firefox settings to allow you to

1.approve cookie storage requests. 2.deny cookie storage requests. 3.delete stored cookies automatically when you start Firefox.

SaaS (testing)

A programming environment used to develop, test, and disseminate web apps via the Internet.

A set of programs that allow data to be exchanged on a website without changing the website's display is ___ .

AJAX

business managers, copyright holders, and network administrators publish ________ so that users understand what is expected and permissible when they use the network computer equipment and/or software

AOPS

IaaS (business)

An organization uses servers in the cloud instead of buying and maintaining storage servers for their day-to-day business operations.

The 3rd generation programming language that most students learned when most computers used MS DOS was ___ . It remains a safe programming language for using 3rd party code and provides a coding standard that integrates easily with other programming languages.

BASIC

The coding step of the PDLC might use which of the following languages?

C++

which optical drive stores approx 700 mb of data

CD

If you have 2 folders open on your desktop and you want to copy a file from one folder to the other, hold down ___ and drag the file.

CTRL

One way to copy a file to a new location is to click on the file and press CTRL + C, then move your cursor to the new site and press ___ .

CTRL + V

Which of these programs make data more readable to programmers by parsing XML files?

JSON

A program that makes creating websites and webpages much faster is ___ .

Javascript

1GL

Machine language - represented by a series of 1s and 0s.

Broadband is measured in _____ .

Mbps

When you make an online purchase and enter your shipping or billing information, you're actually filling out a form that was generated by a database management system. The DBMS subsystem that allows for form creation is the ___ generation subsystem.

application

AJAX stands for ___ JavaScript and XML.

asynchronous

select the video compression formats

avi mp4 quicktime

The volume of data that can be carried on an Internet transmission media in an amount of time is called _____.

bandwidth

the capacity of a particular transmission medium is called its ___________

bandwidth

The final steps in the PDLC process include testing and documenting the software. When testing is conducted by potential customers of the software, it's referred to as a(n) ___ test.

beta

server banks have capacities measured in _____

betabytes

If it can be answered as either yes or no, or true or false, the question is called ___ .

binary

Once so commonly used that people even called it the "Crackberry", the ___ popularity dropped significantly in the U.S. after 2007.

blackberry

intrusion detections systems (IDS) are several techniques to protect networks. One is called "halt" which stops the hacker from progressing into the network. Another is called a __________ which closes the access point used by the hacker.

block

This technology provides short-distance wireless communication between electronic devices using extremely low power radio signals.

bluetooth

The two major factors that impact processor speed are clock speed and _____

bus width

In addition to the RAM, modern processors temporarily keep frequently accessed data in a _____.

cache

the first commercially available computer with a graphical user interface was NeXT's ___________

cube

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.

cyberbullying

The DBMS subsystem that allows for data recovery, support, and maintaining and securing the database is called the ___ subsystem.

data administration

What element of a database field specifies the data in a field such as text, numeric, or date/time?

data type

what element of a database field specifies the data in a field such as text, numeric, or data/time

data type

Amazon.com allows you to search for thousands and thousands of items using images and information that are organized logically. This much storage and management requires a complex ___ .

database

The third step of the SDLC has 3 phases, specifically, developing several system proposals, selecting the most feasible proposal, and reporting on the selected system to be developed. This step is called the system ___ step.

design

When you ___ a file Windows should automatically open it. If it can't Windows will prompt you to select the correct app to open the file.

double click

routers than can send internet signals over 2 distinct frequencies are called _______ routers

dual band

which transmission has the lightest bandwidth

fiber optic

Defining the problem is the ___ step in the Program Development Life Cycle.

first

in the body of a professionally formatted business email, where should a request be placed?

first sentence of the body in email

A graphic representation of a process is called a ___ .

flowchart

In order to keep your files organized, it's a good idea to create ___ and place your files in them.

folders

when you need to link 2 tables in a database that don't have a field in common, one solution is to create a ________ in one table that links to the primary key in another table

foreign key

To control how information is entered into a database, programmers and database administrators create ___ to help ensure data integrity.

forms

which of these devices are manufactured by samsung?

galaxy note

The level of complexity of the programming language, or the degree from which it is separated from machine language itself, is called the ___ of the programming language.

generation

The visual image output that a computer creates is known as ____ .

graphics

A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.

hacker

the act of hacking or breaking into a computer system for a politically or socially motivated purpose is called ______

hacktivism

Databases are built by starting with single characters of data, organizing the data into fields, organizing the related fields into records, the records then make up a table. This organization is referred to as a data ___ .

hierarchy

The first step in the SDLC involves defining the problems that the IT system should address, examining various alternatives, and reporting the findings. This is referred to as the ___ step.

investigation

Once the algorithm or plan has been created, the next step in the PDLC is to write the coding for the program. This highly structured process may be completed using which languages?

java C++ english

Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of

keystrokes passwords confidential info

Another term for a programming code is a programming ___ .

language

Instructions (software) that allow a computer (hardware) to be used are written using specific symbols, letters and numbers known as a programming ___ or code.

language

select whats true about packet sniffers

legit sniffers are used for routine examinations and problem detection unauthorized sniffers are used to steal info

The process used to develop and maintain an IT system is referred to as the SDLC. SDLC stands for the System Development ___ Cycle.

life

The DBMS engine provides an interface for the end user of the database, Mis interface is called the ________ view

logical

The DBMS engine provides an interface for the end user of the database. This interface is called the ___ view.

logical

select whats true about trojan malware

often found attached to free downloads and apps often used to find passwords, destroy data, and to bypass firewalls

parallel

old and new systems run side-by-side for a while

Changing the appearance of your can make it easier to keep your information organized. To change your folder's appearance, first click on the folder, and then go to the command bar and click ___ .

organize

Paul Baran developed the technology called _____ switching that made the internet possible and reliable

packet

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .

pharming

A request for an electronic "echo" or response from another computer or server is called a ____.

ping

a request for an electronic echo or response from another computer or server is called a _______

ping

Written in natural language, but often including programming shorthand to assist in writing the program itself, ___ is the term that describes an intermediate step in creating an algorithm from a flowchart.

pseudocode

lossy

reduces space required by reducing redundancy within files

lossless

reduces space required by removing less valuable data

The type of database that uses common fields to create links between tables is called a ___ database.

relational

to display or distribute info from a database, programmers or database admins create _________

reports

the device that connects 2 networks is a ______

router

Because they're both Apple products, the browser that works smoothest with Macintosh OS X is ___ .

safari

You're tired of losing documents so you've decided to save your research paper to your desktop where you know you'll be able to locate it quickly. To save it to the desktop, you first click the File tab to open the file menu. Next you select ___ .

save as

The diagonal measure of the visible display is known as _____ .

screen size

To look for a file or folder in Windows 10, just type the file name in the __ box.

search

The two major concerns regarding cloud storage are reliability and ___ .

security

Pseudocode is written in natural language, but often including programming ___ to assist in writing the program itself. Pseudocode is the term that describes an intermediate step in creating an algorithm from a flowchart.

shorthand

direct

shuts down the old system and starts the new system

amateur computer hackers w/ little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called ________

skript kiddies

A combination input and output device that allows users to interact with large computer displays that is sometimes found in classrooms is called an interactive whiteboard or a ___.

smartboard

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

sniffers

Which of the following are online nuisances?

spam spyware spoofing

pilot

starts in one area of the organization and then is deployed to the rest of the organization

the component of a computer that allows data to be retained after power is turned off is referred to as

storage

select whats true about object oriented databases

store instructions for how to compute data as well as the data to be processed equipped to handle unstructured data such as MP4 files use object query languages to construct queries that extract data from the database

what group determines the standards for world wide web

the world wide web consortium (W3C)

The most common printers for printing receipts are ___ printers.

thermal

A programming design that breaks down a problem into a series of tasks is called ___ programming.

top down

match the business info systems (IT) activity with the appropriate management level

top level management - business executives and presidents(use it to monitor overall business performance) middle managers - use is for record keeping and reporting purposes first level managers(supervisors, floor managers) - use is for scheduling daily and weekly

Select the smartphone input device.

touchscreen or keyboard

one of the largest data requirements of the future will be

tracking patient's genomes

Often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a _____.

trojan horse

By default Windows hides file extensions for known file types but you can unhide them if you wish.

true

whats true about passwords

use combo of letters, symbols, and numbers; the more characters you use, the more secure your password will be regularly check your accounts to ensure they haven't been tampered with

common types of malware are

viruses worms trojan horses

Select the functions of a Digital Signal Processor

1. analyzes signals received from the analog-digital converter to enhance audio quality 2. reduces unwanted noise 3. moderates call volume

Select the statements that are true regarding IP addresses.

1. assigned to your home network by your ISP 2. means by which your network is identified by other servers and computers on the Internet 3. ISPs often have blocks of IP addresses that they assign as demanded

Select the characteristics of a modem.

1. converts analog signals into digital signals 2. converts digital signals into analog signals 3. usually provided by the ISP

Select the statements that are true regarding Fiber Optic Internet service.

1. fastest home network option when available 2. not available in all areas 3. signal is carried by light waves so it's less subject to electromagnetic interference

Select the statements that are true regarding Cellular Internet service.

1. uses cell phone radio waves to transmit and receive Internet signals 2. Many providers offer data packages that may place limits on uploading and downloading. 3. Many smartphones can send and receive WiFi signal, allowing them to become hotspots.

Select the statements that are true regarding cable Internet service.

1. uses the same coaxial cable that brings the cable television signal 2. usually has more bandwidth than DSL lines 3. Internet service can often be bundled with television service

According to US-CERT if you receive a phishing message you should contact them using which of the following methods.

1.In Outlook Express, you can create a new message and drag and drop the phishing email into the new message. Address the message to [email protected] and send it. 2.In Outlook Express you can also open the email message* and select File > Properties > Details. The email headers will appear. You can copy these as you normally copy text and include it in a new message to [email protected]. 3.If you cannot forward the phishing message, at a minimum, send the URL of the phishing website to US-CERT.

Most touchpads use _____ to sense when a finger has moved across the pad.

capacitance

Clockspeed, also referred to as _________, is the speed at which the processor performs the operations required to run a digital device and instructions executed by the digital device.

clock rate

The malicious use of computer code to modify the normal operations of a computer or network is called a

cyberattack

Because he wanted to be able to sort gifts according to continent and time zone, in 1984 Santa switched from using long lists to using ___ .

databases

Screensize is measured by the ___ across the monitor.

diagonal

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a

firewall

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.

quarantine

To search a database for information, create a ___ .

query

Which colors make up a typical monitor's pixels?

red green blue

To display or distribute information from a database, programmers or database administrators create ___ .

reports

The number of pixels in a display is called the display's ___ .

resolution

Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP networks have firewalls where they connect to the Internet.

router

3D mapping, feature charting, and skin texture are some of the methods facial recognition software uses to identify individuals. T/F

true

Some cell phone carriers promising "unlimited data" will actually limit your high-speed, 4G LTE data to a couple of gigabytes per month. T/F

true

You must individually adjust cookie settings in every browser you use. T/F

true

Match the extension with the type of document.

webpage - .html spreadsheet - .accdb database - .xlsx presentation - .pez

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.

white hat hackers

After the code has been written there are nearly always mistakes. The 4th step in the PDLC involves finding and correcting these errors in a process called ___ .

debugging

If you have 2 folders open on your desktop and you want to move a file from one folder to the other, simply ___ the file.

drag

After the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a flowchart, and is in written in an ordinary language, such as ___ .

english

The machine cycle consists of which four steps?

fetch, decode, execute, and store

Which transmission media has the largest bandwidth?

fiber optic

In a database a _____ is a group of related characters in a database table that represents a characteristic of someone or something.

field

A URL identifies a particular __ address on the World Wide Web.

file

You created a flyer and saved it in your Documents folder. To find this file you could open Cortana (in Windows 10) and type the flyer's name in the search window, or you could click on the ___ icon (all Windows versions, on your toolbar) and access the Documents folder from there.

file explorer


Related study sets

Econ Exam - Chapter's Assignment Review

View Set

sonnets mastery test edmentum english 12

View Set

CompTIA Security+ 501 (RAID levels)

View Set

IRSC Microeconomics final exam study guide 2023

View Set

Micro Ch. 22: Helicobacter pylori

View Set

CH: 7 Corruption and Ethics in Global Business

View Set

Therapeutic milieu, psychosocial assessment, group therapy Nursing

View Set