CGS 2060 FINAL REVIEW 2

Ace your homework & exams now with Quizwiz!

The text contained in about 4 books uses approximately __ times more data than a short email.

1,000

A typical laptop has a storage capacity of approximately __.

16 GB - 256 GB

Blu-rays provide approximately __ of storage space.

25GB

According to YouTube, approximately how much video is uploaded to its site every minute?

300 hours

A typical laptop has a storage capacity of approximately __.

500 GB - 1 TB

Which would be used to store a single bit of data?

A hole in a punch card A transistor

CDs store data using ___.

A reflective coating that has pits and lands

DVDs store data using __.

A reflective coating that has pits and lands

Business owners, copyright holders, and network administrators publish __ so that users understand what is expected and permissible when they use the network, computer equipment, and / or software.

AUPs

Emailing a file to yourself is an example of using __ storage.

Cloud

The fact that data on servers is nearly always backed up onto other servers gives __ storage a major advantage over other data storage methods.

Cloud

Match the component of a business email with its characteristics:

From and/or Subject lines [Symbol] Determines if the email will be opened Body [Symbol] Succinctly discusses the purpose of the message Close [Symbol] Professionally ends the message Salutation [Symbol] Sets the tone of the message

Storage capacity for laptop hard drives is typically described in terabytes or __.

Gigabytes

Select the email services:

Gmail, Outlook, iCloud

Select the image compression format:

JPEG PNG

When you receive a utility bill, you're actually getting a report that was generated by a database management system. The DBMS subsystem that provides for data maintenance, analysis and the generation of reports is called the data __ subsystem.

Manipulation

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the software is called __ software.

Remote desktop

Select the characteristics of computer storage:

Retains data when power is turned off Sometimes referred to as secondary storage Sometimes referred as volatile memory

Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?

SCMS

Because they have no mechanically moving parts, __ provide extremely fast, efficient storage.

SSDs

In general, the __ the access time, the faster the hard drive.

Shorter

Examples of management information systems (MIS) include __.

TPS, DSS, ESS

Select the characteristics of cloud storage:

Users can download files to other devices on the Internet Files are backed-up Servers act like giant hard drives

Select the characteristics of SSD storage:

Uses flash technology Uses the same technology that is found in USB drives Has no mechanically moving parts

Select the characteristics of a traditional hard drive:

Uses magnetic charges to store data Has a read / write head to detect magnetic charges Has physically moving platters Commonly found in desktop computers

Select the audio file compression formats:

WAV MP4

The data definition, as described in the data dictionary, tells users how each unit of data is defined in the database. Which of the following elements will be used to describe the data?

What field name will the data fall under What data type will be included

A form of Email fraud where criminals change the account where money is being transferred is called a __ scam.

Wire-wire

Select the usual roles of information systems (IS) technicians:

Installing IS hardware and software Maintaining IS hardware and software Repairing and replacing IS hardware and software

It's always a good idea to check the ___ before clicking Reply to All.

List of addresses

Match the computer activity that would correspond with the business activity:

Operations [Symbol] Decision making software such as MIS Accounting [Symbol] Records keeping and reporting Finance [Symbol] Providing current investment values and opportunities Marketing [Symbol] Online advertising and social media

A storage device that uses lasers to read CDs, DVDs, or Blu-Ray discs is referred to as an __.

Optical drive

Select the storage devices:

Optical drive External hard drives USB drives

Which of the following is an email program?

Outlook

Server banks have capacities measured in __.

Petabytes

Blu-ray stores data using ___.

Pits and lands that are read by a blue spectrum laser beam

Select the advantages of helium hard drives over traditional hard drives:

Platters spin faster Platters stay cooler More platters can be placed in the same amount of space

To search a database for information, create a __.

Query

A collection of related records in a database is referred to as a __.

Table

Match the following regarding file compression:

Zip [Symbol] A lossless compression format Lossless [Symbol] Reduces space required by reducing redundancy within files Lossy [Symbol] Reduces space required by removing less valuable data

The smallest unit of data storage is a __.

Bit

Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a(n) __, which closes the access point used by the hacker.

Block

One character of information, for example, a letter or a number consists of one __ of storage.

Byte

Select the usual tasks of a data analyst:

Collects data Interprets information provided by the database Creates reports for senior management

To allow hard disk drive platters to spin more smoothly and cooler, some manufacturers seal the platters in __ instead of air

Helium

Select the characteristics of a Blu-ray disc:

Holds approximately 25 GB of data Uses pits and lands to store data

Select the characteristics of a DVD:

Holds approximately 4.5 GB of data Uses pits and lands to store data

A refracted laser beam striking a photoreceptor from many different angles allows __ storage to retain many bits of data in the same location.

Holographic

Using refracted laser light to store data on a photoreceptive substrate is essentially how __. Theoretically this could store gigabytes of data within a cubic millimeter.

Holographic

Adam was in the 5th grade when he was adopted by the Smith's. Because his school used a centralized database, all of his teachers had his correct name on their grade reports. This is an example of how a centralized database can help improve data __.

Integrity

If you own a small business, what can you do to ensure your computers and data is kept secure?

Keep software updated, particularly antivirus software Physically secure computers to minimize risk of theft Backup your data regularly

A short email uses about one __ of data.

Kilobyte

Match the image compression formats:

Portable Network Graphics (PNG) [Symbol] most popular lossless image compression format Joint Photographic Experts Group (JPEG or JPG) [Symbol] most popular lossy image compression format Graphics Interchange Format (GIF) [Symbol] legacy (outdated) lossless format

Because of their capability of storing data in multiple hard drives, data warehouses use __ technology to ensure redundant data storage.

RAID

What are some commonly used names for USB drives?

Thumb drives Flash drives

Match the business information activity with the appropriate management level:

Top level management [Symbol] Use information systems to foresee corporate opportunities and threats, to monitor overall business performance First level managers [Symbol] Use information systems for recording line employee performance, record keeping and reporting purposes Middle managers [Symbol] Use information systems for communicating policies and performance reports up and down the corporate ladder, scheduling daily and weekly operations

Using information systems to help foresee corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level?

Top level managers

One type of storage device is a __.

USB drive

Select the advantage of using a USB drive instead of a DVD.

USB drive has shorter access time USB drive is more durable USB drive is less expensive

Select the video file compression formats:

AVI MP4 QuickTime

Select the characteristics of solid state drive storage devices:

Durable, no moving mechanical parts Uses electronic circuits to store data Uses magnetic charges to store data

When reporting a computer ethics violation of a co-worker to your employer, it's important to __.

Be brief and direct State only what you witnessed

Which optical drive media stores approximately 700 MBs of data?

CD

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data __.

Corruption

Which of the following are considered storage media?

DVDs Blu-Ray discs

The DBMS subsystem that allows for data recovery, support, and maintaining and securing the database is called the __ subsystem.

Data Administration

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a __.

Data analyst

Select the disadvantages of using cloud storage:

Data stored on someone else's server can be accessed by anyone who has administrator privileges to the server Data is only available If you're online

Amazon.com allows you to search for thousands and thousands of items using images and information that are organized logically. This much storage and management requires a complex __.

Database

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a __.

Database administrator (DBA)

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer use standards. Failure to set such policies can lead to which of the following?

Decreased employee performance Decreased network speed Increased likelihood of security

Business management software that encompasses nearly all business activities in a corporation is called __ software.

ERP

Solid state drives store data using __.

Electronic circuits

Which of these should business owners do to help protect their data:

Establish strong firewall protection for their business's network Ensure antivirus software is installed and up-to-date Create strong password protections and protocols

In the body of a professionally formatted business email, where should a request be placed?

In the first sentence of the body of your email

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the __.

Information systems (IT) program manager

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the __.

Information systems (information technology) technician

The DBMS engine provides an interface for the end user of the database. This interface is called the __ view.

Logical

Because a metal platter is physically spinning, hard drives have __ access times than solid state hard drives

Longer

Select the appropriate business email etiquette practices:

Maintain high levels of formality, especially with initial contacts Consider if email is the appropriate means of communication Remember that potentially negative news is best given face-to-face Keep attachments small

Be careful to only open email from senders you know and trust. __ may be contained in email messages.

Malware

When referring to business information technology, MIS stands for __.

Management information systems

One of the largest data requirements of the future will likely be __.

Mapping patients' genomes

A million bytes of data equals approximately one __.

Megabyte

An electronic element that stores data by changing its resistance based on the current that passed through it (similar to RRAM) is called a(n) __.

Memristor

Though legal, which of the following would likely be prohibited by a typical business computer-use policy?

Online personal shopping

Sometimes used in smaller business networks, employee __ software is impractical for large networks because of the number of users and the potential for misuse.

Monitoring

Select the usual tasks of database administrators (DBAs):

Monitors the database's performance Develops and maintains the database itself Establishes user privileges for the database to help protect the data

For which of the following activities would a typical marketing department need a strong information system?

Online sales Online advertising Updating the business's social media sites

Select the reasons to compress a file:

Reduce storage space requirements Reduce bandwidth needed to transmit a file

Select the advantages of using cloud storage:

Redundancy Availability

When referring to digital storage, RAID stands for ___.

Redundant array of independent discs

A link between tables in a relational database that defines how the data is related is called a __.

Relationship

While not a required step in sending an email, it's wise to ___ any message before clicking Send.

Spell check

The component of a computer that allows data to be retained after power is turned off is referred to as __.

Storage

Which category of management information systems (MIS) focuses on tracking sales and inventories?

TPS

Visiting pornography sites while using a company computer and / or network violates your company's computer-use policy. You observe a co-worker visiting porn sites at work and determine you should report this activity. You should:

Tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network Be brief and direct

You observe a co-worker vising porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should..

Tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.

A thousand gigabytes equals one __

Terabyte

Along with the From line, what is the most important factor in ensuring your business message is read?

The subject line


Related study sets

Repaso de Vocabulario 1 Spanish 3

View Set

Health and Skill-Related Components

View Set

Multiply Fractions by a Whole Number- Word Problems

View Set

■ 4. Configuration interne du « coeur gauche »

View Set

Ch 5 Ivy Software Business Math & Stats

View Set

SAFE-NMLS-MLO-CA Exam Study (FULL SET)

View Set

Management of Patients with Oncology Disorder

View Set