CGS 2060 Midterm

Ace your homework & exams now with Quizwiz!

Relatively rugged, water-resistant video cameras that allow users to film high-definition video under harsh conditions, such as on ski mountains, in the ocean, or at high altitudes are called extreme-action video cameras or simply a ___ .

GoPro

A port that allows the transfer of high quality video and audio signals is called a(n) ___ port.

HDMI

All of the following are true about Instagram except

Instagram charges a fee to download the app.

To protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products, there are ___ property laws

Intellectual

Windows OS is owned and maintained by _____ .

Microsoft

Output

Playing a song from Spotify

A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a ___ .

Plotter

Storage

Putting a photo onto a USB drive (thumbdrive).

Because of their capability of storing data in multiple hard drives, data warehouses use ___ technology to ensure redundant data storage.

RAID

Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?

SCMS

Most tablets and phones use _____ as their main storage device.

SSD

A computer platform is commonly referred to as an operating system or OS.

TRUE

Screensize is an important consideration when buying a new computer.

TRUE

Which has the most storage capacity? -Kilobyte -Gigabyte -Terabyte -megabyte

Terabyte

The main governmental organization that oversees Internet privacy is the Federal ___ Commission.

Trade

Television displays with resolutions of at least 3840 x 2160 pixels are referred to as ___ .

UltraHD

Middle managers

Use IS for record keeping and reporting purposes.

First level managers (supervisors, floor managers)

Use IS for scheduling daily and weekly operations.

Top level management (business executives and presidents)

Use IS to monitor overall business performance.

A 3rd generation programming language that allows BASIC to be used with the advantages of a graphical user interface is ___ Basic.

Visual

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the ___ .

information systems (information technology) program manager

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ___ .

information systems (information technology) technician

Because a metal platter is physically spinning, hard drives have ___ access times than solid state hard drives.

longer

A process that has an initial value, a process, and a test condition that can potentially return the program to the initial value is called a ___ .

loop

Sometimes used in smaller business networks, employee ___ software is impractical for large networks because of the number of users and the potential for misuse.

monitoring

Which of the following is a strength of the Windows platform?

most widely used OS in laptops, desktops, usually leading to lower prices

All of the following are part of an RFID system except _____. -Transponder -antenna -transceiver -network

network

Parallel SDLC

old and new systems run side-by-side for a while

Marketing

online advertising and social media

All of the following are protected against unauthorized use or distribution by intellectual property laws except

open educational resources.

Output device

projector

Finance

providing current investment values and opportunities

Written in natural language, but often including programming shorthand to assist in writing the program itself, ___ is the term that describes an intermediate step in creating an algorithm from a flowchart.

pseudocode

Accounting

records keeping and reporting

The number of pixels in a display is called the display's ___ .

resolution

Two main factors concerning your digital identity are privacy and ___.

security

Social networking is based on the six degrees of _____ concept which posits that you can connect with anyone through a chain of no more than six introductions or personal links.

separation

Direct SDLC

shuts down the old system and starts the new system

While not a required step in sending an email, it's wise to ___ any message before clicking Send.

spell check

Pilot SDLC

starts in one area of the organization and then is deployed to the rest of the organization

A thousand gigabytes equals one ___ .

terabyte

HTML and it's 5th revision (HTML5) allow content to be displayed on ___ .

the World Wide Web

Along with the From line, what is the most important factor in ensuring your business message is read?

the subject line

Personal branding can be accomplished digitally and in more traditional means including all of the following except _____ .

writing private journal entries

If your debit card has been compromised and you wait more than two days, but fewer than two months after you learn about the loss, you can be liable for up to _____.

$500.00

Which of the following are typical aspect ratios for monitors?

-16:9 -4:3

Select what's true regarding all-in-one computers.

-All-in-one computers house every component except the keyboard and mouse inside the same case as the monitor. -An all-in-one computer is a stationary device with a separate keyboard and mouse.

Which of these should business owners do to help protect their data.

-Establish strong firewall protection for their business's network. -Ensure antivirus software is installed and up-to-date. -Create strong password protections and protocols.

Select the email services.

-Gmail -Outlook -iCloud

Select the image compression formats.

-JPEG -PNG

If you own a small business, what can you do to ensure your computers and data is kept secure?

-Keep software updated, particularly antivirus software. -Physically secure computers to minimize risk of theft. -Backup your data regularly.

Which of the following are true statements regarding LinkedIn?

-LinkedIn includes a resume tool to assist you in creating a professional resume. -You can use LinkedIn to apply for jobs.

Select the advantages of using cloud storage.

-Redundancy - data is stored on multiple servers. -Availability - data can be retrieved by any Internet-connected device.

Select appropriate business email etiquette practices.

-Remember that potentially negative news is best given face-to-face. -Keep attachments small.

Select the phases included in the system development step of the SDLC process.

-Setting up, installing, and testing system. -Purchasing needed hardware. -Purchasing necessary software.

Which statements are true regarding Instagram?

-The Profile section lists your name, birthday, gender and phone number. -If you don't want to be tracked, turn off geo-tagging in the settings under Location Services.

Select the advantages of using a USB drive instead of a DVD.

-USB drive has shorter access time. -USB drive is more durable.

Select the audio file compression formats.

-WAV -MP4

Select appropriate LinkedIn contacts.

-business contacts -professional peers

Select the characteristics of thermal printing.

-commonly used for printing receipts -paper turns black when heated

Select the usual tasks of database administrators (DBAs).

-monitors the database's performance -develops and maintains the database itself -establishes user privileges for the database to help protect the data

For which of the following activities would a typical marketing department need a strong information system?

-online sales -online advertising -updating the business's social media sites

A digital identity is comprised of a variety of digital attributes including

-personal data such as your social security number and birthdate. -online search activities -usernames and passwords.

Select the reasons to compress a file.

-reduce storage space requirements -reduce bandwidth needed to transmit a file

Select the characteristics of computer storage.

-retains data when power is turned off -sometimes referred to as secondary storage

Select activities that would be considered software theft.

-taking a registration code from the Internet and using it register a program that you didn't purchase -stealing software programs -illegally copying a program

Select the characteristics of a traditional hard drive.

-uses magnetic charges to store data -has a read/write head to detect magnetic charges -has physically moving platters

"Full HD" resolution is expressed as:

1920 x 1080

Twitter recommends using no more than ___ hashtags per Tweet.

2

When you buy a new laptop, how much RAM should it come with?

4-8 GB

The mouse was developed by which company?

Apple

All new laptop computers come with an optical drive installed.

FALSE

All of the following are considered e-commerce transactions except

G2B.

Though it could theoretically hold terabytes of data for thousands of years in a microscopic space, ___ storage, using genetic material, is a distant storage option.

DNA

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?

DSS

Devices with a separate system unit and a relatively large footprint are called _____ computers.

Desktop

What technology allows for the electronic communication of business oriented transactions and information between people and organizations?

EDI

EDI stands for ___ .

Electronic Data Interchange

Input

Entering text in a word document.

Select the optical drives

Blu-ray player DVD drive

If you plan to write software for PC games you should probably learn C or ___ .

C++

The coding step of the PDLC might use which of the following languages?

C++

A digital device that accepts input, processes and stores the input, and provides output is a ____ .

Computer

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___.

Corruption

A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is called _____ Commons.

Creative

Which of the following statements about Facebook is true?

Cyberstalking and online predators are a real problem on Facebook.

The fact that data on servers is nearly always backed up onto other servers gives ___ storage a major advantage over other data storage methods.

cloud

A program that takes an entire program, check the source code for errors, and converts it into machine language is a ___ .

compiler

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___ .

data analyst

Operations

decision making software such as MIS

Transferring a file from the Internet to your digital device is called _____.

downloading

Software theft occurs when someone engages in all of the following except _______.

erasing a program you purchased then sold to a friend

Input device

game controller

The level of complexity of the programming language, or the degree from which it is separated from machine language itself, is called the ___ of the programming language.

generation

Storage device

hard drive

All of the following are true about RFID except

high-frequency RFID can transmit signals further than 1500 feet.

Select the characteristics of a Blu-ray disc.

holds approximately 25 GB of data uses pits and lands to store data

A refracted laser beam striking a photoreceptor from many different angles allows ___ storage to retain many bits of data in the same location.

holographic

All of the following should be considered when using Twitter except

if a Twitter user has been blocked you can file a formal complaint through Twitter.

Phased SDLC

implements new areas of the system in a predetermined period of time


Related study sets

Chapter 23 Study Guide - The Immortal Life of Henrietta Lacks

View Set

Russel Brandon Psychology Test 2 Part 2

View Set

Conceptual Physics Test 1 Review

View Set

Chapter 43: Anti-hypertensive Agents PrepU

View Set

PEDS Practice: Chapter 27 Nursing Care of the Child with an Alteration in Genetics

View Set

Biology 101 Exam #2 (Cellular Respiration, CH6)

View Set