CGS 2100 Final
Select the common word processing file extensions.
.docx // .avi
Select the common audio file formats.
.mp4 [M4A] // .wav // .mp3
Rank the following in typical order of size with the largest at top.
1. Directory 2. Folder 3. Subfolder 4. File
Place the following steps in the correct order if you want to reply only to the sender of an outlook message.
1. Go to Outlook [log in if necessary] 2. Click Inbox to see your message 3. Click the message you wish to reply to 4. Click reply to Rely to All 5. Type your response and click send
Information or information systems are important in all areas of business. Match the computer activity that would correspond with business activity.
1. Marketing : Online advertising and social media 2. Accounting : Records keeping and reporting 3. Finance : Providing current investments values and opportunities 4. Operations : Decision-making software such as MIS
Match the business information activity with the appropriate management level.
1. Middle Managers: Use information systems for communication policies and performances reports up and down the corporate ladder. 2. First Level Managers [supervisors, file managers]: Use information systems for recording line employee performance. 3. Top-level Management [business executives and presidents]: Use information systems to foresee corporate opportunities and threats
Place the following steps in order to store a file on Google Drive.
1. Open your Google Drive account [sign in if necessary] 2. Click on New to open the drop-down menu 3. Browse to the file and click Open 4. Select File upload
List the following steps in order that they occur after you press "send" on your phone.
1. Signal is sent via a weak microwave to a cell tower 2. The cell tower's base transceiver station sends the signal to your MSS. 3. Your MSS sends the signal to the receiver's MSS. 4. The receiver's MSS locates the receiver's phone and sends a signal to the receiver's BTS and associated cell tower.
Select the advantages of using a database instead of a traditional filing system.
A database can hold larger amounts of data // A database can provide better data integrity
Select what is true about database fields.
A group of related characters in a database // Represents a characteristic of someone or something // Primary key is a field designation
An AUP is a written document that provides a framework of rules to be followed by computer users. AUP stands for ___.
Acceptable Use Policy
Match the operating system with it's characteristic: Android 11.0 iOS 15 series
Android 11.0 : used with Samsung phones and Google phones iOS 15 Series : used on iPhone 13 Pro
Once so commonly used that people even called it the "Crackberry", the ___ popularity dropped significantly in the U.S. after 2007.
BlackBerry
One way to copy and paste a file to a new location is to click on the file and press CTRL + C to copy, then move your cursor to the new site and press ________ to paste.
CTRL+V
To remove a file from one folder and place it in another, click on the item and press ___ then move your cursor to the new location and press CTRL+V.
CTRL+X
There are several ways to rename a folder in Windows. Which of these would work?
Click the folder icon and press F2 to activate the edit mode // Right-click a folder and click Rename // Double-click on the title bar // Click New and then click Folder
Select the usual tasks of a data analyst.
Collects data // Interprets information provided by the database // Creates reports for senior management
Which category of management information systems [MIS] focuses on providing forecasting capabilities for sales and production?
DSS
In oder to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer - use standards. Failure to set such policies can lead to which of the following?
Decreased employee performance // Decreased network speed // Increased likelihood of security breaches
EDI is the electronic interchange of business information using a standardized format. EDI is the acronym for ________.
Electronic Data Interchange
Which of these should business owners do to help protect their data?
Establish strong firewall protection for their business's network // Ensure antivirus software is installed and up-to-date // Create strong password protections and protocols
If you see the extension .xlsx, you know that you are looking at a(n) ___ file.
Excel
A quick way to rename files or folders in Windows is to select the item and then press the ___ key.
F2
Select the Samsung smartphone.
Galaxy S21
Which of the following are true regarding IP addresses?
IP stands for Internet Protocol // In most home networks IP addresses are assigned by the Internet Service Provider // If two laptops are connected to the same home network and surfing the web simultaneously, they share the same IP addresses
Which two statements about Instagram are true?
If you don't want to be tracked, turn off geo-tagging in the Settings under Location Services // It's important to adjust your privacy settings so you can determine who follows you.
Select the usual roles of information systems (IS) technicians.
Installing IS hardware and software // Maintaining IS hardware and software // Repairing and replacing IS hardware and software
In order to ensure that employees understand what's appropriate or inappropriate use of company computer equipment, software, and networks, employers must set ethical computer-use standards. This includes which of the the following?
Instructing employees on standards // Enforcing standards by creating firewalls, monitoring protocols, and filters // Periodically reviewing computer-use policies
If you own a small business, what can you do to ensure your computers and data is kept secure?
Keep software updates, particularly antivirus software // Physically secure computers to minimize risk of theft // Backup your data regularly
Select the cell phone manufacturers.
Lenovo // Huawei // LG Electronics
Select appropriate business e-mail etiquette practices.
Maintaining high levels of formality, especially with initial contacts // Consider if the e-mail is appropriate means of communication.
Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create forms, reports, data dictionaries and other capabilities, it is often referred to as a Database ___ System.
Management
Because it locates cellular devices, assigns frequencies, transmits signals to the correct sites, the ___ is probably the most important part of any cellular network.
Mobile Switching Station [MSS]
Select the advantages of a 3G phone.
More energy efficient; battery lasts longer // Less expensive
Choose the Samsung Galaxy tablet options.
Note series // Tab series
A digital identity is comprised of which two attributes?
Online Search Activities // Purchasing Behavior
For which of the following activities would a typical marketing department need a strong information system?
Online sales // online advertising // updating business's social media sites
Which of the following is an email program?
Outlook
Select the reasons for compressing a file.
Reduce bandwidth needed to transmit a file // Reduce storage space requirements
There are several ways to create a new folder in Windows. Which of these would work?
Right-click a folder list // Click New and then click Folder // On the command bar, click New Folder // Double-click on the title bar // Click New and then click Folder
You're tired of losing documents so you've decided to save your research paper to your desktop where you know you'll be able to locate it quickly. To save it to the desktop, you first click the File tab to open the file menu. Next you select ___ .
Save As
Select what's true about object-oriented databases.
Store instructions for how to compute data as well as the data to be processes // Equipped to handle unstructured data // Use object Query Language to construct queries that extract data from databases.
Property formatted professional e-mail message should contain which of these components?
Subject // Salutation
Select the usual tasks of information systems (IS) program managers.
Supervising IS technicians // Working with developers and senior management to procure and implement IS processes // Developing training plans and policies for IS
Which of the listed activities are considered theft of software?
Taking a registration code from the Internet and using it register a program that you did not purchase // Illegally copying a program stealing software programs
The Federal ___ Commission is the main government organization that oversees Internet privacy.
Trade
Select the characteristics of a modem
Usually provided by the ISP // Converts analog signals into digital signals // Converts digital signals into analog signals
Select the reasons why you might want to add a microSD card to your smartphone.
You want to save more music files // You want to save more image files
In professional messages, avoid the use of emoticons and ___
acronyms
In order to change sound waves into digital signals, smartphones contain a(n) ___ digital converter.
analog
Personal ___ is the process used by individuals to make them stand out from others by identifying and expressing their unique traits and values.
branding
To select a folder, simply put your cursor on it and ___.
click
Being able to surf the web, watch videos, and listen to steaming audio is why cell service with a ___ plan is extremely popular in the U.S.
data
The DBMS subsystem allows for data recovery, support, maintaining and securing databases is called the ___ subsystem.
data administration
When you receive a utility bill, you're actually getting a report generated by a database management system. DBMS subsystems that provides for data maintenance, analysis and generation of reports
data manipulation subsystem
Stealing confidential materials such as copyrighted material, confidential information, or company emails from a network is called ___ . Most often, this crime is committed by employees inside the company rather than outside hackers.
data theft
Amazon.com allows you to search for thousands and thousands of items using images and information that are organized logically. This much storage and management requires a complex ___ .
database
It can store virtually unlimited amounts of data that can be shared across networks and the data can be kept for more accurately, a ___ has many advantages over a traditional filing system.
database
You need to purchase tickets for your friends. You go to SubHub.com to find them. You can search between hundreds of seats in thousands of venues and thousands of events. To organize this information in a searchable manner, they use a complex ___.
database
Because he wanted to be able to sort gifts according to continent and time zone, in 1984 Santa switched from using long lists to using ___.
databases
An integral part of a database management system [DBMS] is the Data Definition subsection. This subsection uses a data schema or data ___.
dictionary
When you ___ a file Windows should automatically open it. If it can't Windows will prompt you to select the correct app to open the file.
double-click
If you have two folders open on your desktop and you want to move a file from one folder to the other, simply ___ the file.
drag
E-commerce stands for
electronic commerce
Theft of software occurs when someone engages in all the following except ________.
erasing a program you have purchased
In a database a ___ is a group of related characters in a database table that represents a characteristic of someone or something.
field
The risk of downloading a file from the internet includes all except
fileware
To control how information is entered into a database, programmers and database administrators create ___ to help ensure data integrity.
forms
Databases are built by starting with single characters of data, organizing the data into fields, organizing the related fields into records, the records then make up a table. This organization is referred to as a data ___ .
hierarchy
Select the Apple tablet offerings.
iPad pro series // iPad air series // iPad mini series
While many 3rd party apps are available through its App Store, apps for ___ must first be tested and approved before they're made available for downloading.
iPhones
In order to sync your iPhone to your MacBook you must first open the ___ app.
iTunes
All the following should be taken into account when using Twitter, except
if a Twitter user has been blocked you can file a format complaint through Twitter
Software piracy include all the following except
illegally learning about software.
The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the ________.
information systems [information technician] program manager
Forms structure data input to help ensure data ________, meaning the information entered is accurate, timely, and useful.
integrity
Be careful to only open email from senders you know and trust. ___ may be contained in email messages.
malware
One advantage that the Samsung tablets have over the iPads is that you can add ___ to the Note or Tab.
microSD storage
To listen to an .mp4 (M4A) file, you'll need an app such as iTunes or QuickTime. These apps are called audio ___ .
players
To watch an .mpeg file, you'll need an app such as Windows Media Player or QuickTime. These apps are called video ___ .
players
To search a database for information, create a ___.
query
In a relational database, such as Microsoft Access, a collection of related fields in a data file is called a ___.
record
In the data sheet view of a relational database a row of information is called a
record
The type of database that uses common fields to create links between tables is called a ___ database.
relational
The most common method of renaming files and folders is to simply ___ on the item and select Rename.
right-click
If you're in an area where your home network has no cell coverage, you may need to use the cellular network of a different provider. This is called _______.
roaming
To look for a file or folder in the Windows 10, just type the file name in the ___ box.
search
WhatsApp messenger is a cross-platform messaging app that allows you to ________ and receive messages without having to pay for SMS (text messaging).
send
Anything you share on Facebook can be easily ___ to others.
sent
Social networking is based on the six-degree of ___ concept that argues you can connect to anyone through a chain of no more than six introductions or personal connections.
separation
Taken and shared photos or videos on Snapchat are called ________.
snaps
The cell tower's base transmission station is connected to a mobile ________ station.
switching
Connecting your phone to your laptop to transfer photos, videos, or music files is referred to as ___.
syncing
Visiting porn sites using a company computer or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers notice this violation. You should:
tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.
Along with Form line, what is the most important factor in ensuring your business message is read?
the subject line
Using information systems to help foresee corporate business opportunities and threats that might be done by all levels of management, but it's most important for which management level?
top-level managers
WhatsApp users can create groups, and send _____ images, video and audio messages for free.
unlimited
Some apps that use a surprising amount of data are those that include embedded __.
videos
To change the size of your folder's icon, just right-click on a blank area of the Contents pane and click ________.
view
In urban areas, the cell towers become more numerous and the cell signals transmitted by the cell towers are ___, than those in less populated areas.
weaker