CGS 2100 Final

Ace your homework & exams now with Quizwiz!

Select the common word processing file extensions.

.docx // .avi

Select the common audio file formats.

.mp4 [M4A] // .wav // .mp3

Rank the following in typical order of size with the largest at top.

1. Directory 2. Folder 3. Subfolder 4. File

Place the following steps in the correct order if you want to reply only to the sender of an outlook message.

1. Go to Outlook [log in if necessary] 2. Click Inbox to see your message 3. Click the message you wish to reply to 4. Click reply to Rely to All 5. Type your response and click send

Information or information systems are important in all areas of business. Match the computer activity that would correspond with business activity.

1. Marketing : Online advertising and social media 2. Accounting : Records keeping and reporting 3. Finance : Providing current investments values and opportunities 4. Operations : Decision-making software such as MIS

Match the business information activity with the appropriate management level.

1. Middle Managers: Use information systems for communication policies and performances reports up and down the corporate ladder. 2. First Level Managers [supervisors, file managers]: Use information systems for recording line employee performance. 3. Top-level Management [business executives and presidents]: Use information systems to foresee corporate opportunities and threats

Place the following steps in order to store a file on Google Drive.

1. Open your Google Drive account [sign in if necessary] 2. Click on New to open the drop-down menu 3. Browse to the file and click Open 4. Select File upload

List the following steps in order that they occur after you press "send" on your phone.

1. Signal is sent via a weak microwave to a cell tower 2. The cell tower's base transceiver station sends the signal to your MSS. 3. Your MSS sends the signal to the receiver's MSS. 4. The receiver's MSS locates the receiver's phone and sends a signal to the receiver's BTS and associated cell tower.

Select the advantages of using a database instead of a traditional filing system.

A database can hold larger amounts of data // A database can provide better data integrity

Select what is true about database fields.

A group of related characters in a database // Represents a characteristic of someone or something // Primary key is a field designation

An AUP is a written document that provides a framework of rules to be followed by computer users. AUP stands for ___.

Acceptable Use Policy

Match the operating system with it's characteristic: Android 11.0 iOS 15 series

Android 11.0 : used with Samsung phones and Google phones iOS 15 Series : used on iPhone 13 Pro

Once so commonly used that people even called it the "Crackberry", the ___ popularity dropped significantly in the U.S. after 2007.

BlackBerry

One way to copy and paste a file to a new location is to click on the file and press CTRL + C to copy, then move your cursor to the new site and press ________ to paste.

CTRL+V

To remove a file from one folder and place it in another, click on the item and press ___ then move your cursor to the new location and press CTRL+V.

CTRL+X

There are several ways to rename a folder in Windows. Which of these would work?

Click the folder icon and press F2 to activate the edit mode // Right-click a folder and click Rename // Double-click on the title bar // Click New and then click Folder

Select the usual tasks of a data analyst.

Collects data // Interprets information provided by the database // Creates reports for senior management

Which category of management information systems [MIS] focuses on providing forecasting capabilities for sales and production?

DSS

In oder to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer - use standards. Failure to set such policies can lead to which of the following?

Decreased employee performance // Decreased network speed // Increased likelihood of security breaches

EDI is the electronic interchange of business information using a standardized format. EDI is the acronym for ________.

Electronic Data Interchange

Which of these should business owners do to help protect their data?

Establish strong firewall protection for their business's network // Ensure antivirus software is installed and up-to-date // Create strong password protections and protocols

If you see the extension .xlsx, you know that you are looking at a(n) ___ file.

Excel

A quick way to rename files or folders in Windows is to select the item and then press the ___ key.

F2

Select the Samsung smartphone.

Galaxy S21

Which of the following are true regarding IP addresses?

IP stands for Internet Protocol // In most home networks IP addresses are assigned by the Internet Service Provider // If two laptops are connected to the same home network and surfing the web simultaneously, they share the same IP addresses

Which two statements about Instagram are true?

If you don't want to be tracked, turn off geo-tagging in the Settings under Location Services // It's important to adjust your privacy settings so you can determine who follows you.

Select the usual roles of information systems (IS) technicians.

Installing IS hardware and software // Maintaining IS hardware and software // Repairing and replacing IS hardware and software

In order to ensure that employees understand what's appropriate or inappropriate use of company computer equipment, software, and networks, employers must set ethical computer-use standards. This includes which of the the following?

Instructing employees on standards // Enforcing standards by creating firewalls, monitoring protocols, and filters // Periodically reviewing computer-use policies

If you own a small business, what can you do to ensure your computers and data is kept secure?

Keep software updates, particularly antivirus software // Physically secure computers to minimize risk of theft // Backup your data regularly

Select the cell phone manufacturers.

Lenovo // Huawei // LG Electronics

Select appropriate business e-mail etiquette practices.

Maintaining high levels of formality, especially with initial contacts // Consider if the e-mail is appropriate means of communication.

Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create forms, reports, data dictionaries and other capabilities, it is often referred to as a Database ___ System.

Management

Because it locates cellular devices, assigns frequencies, transmits signals to the correct sites, the ___ is probably the most important part of any cellular network.

Mobile Switching Station [MSS]

Select the advantages of a 3G phone.

More energy efficient; battery lasts longer // Less expensive

Choose the Samsung Galaxy tablet options.

Note series // Tab series

A digital identity is comprised of which two attributes?

Online Search Activities // Purchasing Behavior

For which of the following activities would a typical marketing department need a strong information system?

Online sales // online advertising // updating business's social media sites

Which of the following is an email program?

Outlook

Select the reasons for compressing a file.

Reduce bandwidth needed to transmit a file // Reduce storage space requirements

There are several ways to create a new folder in Windows. Which of these would work?

Right-click a folder list // Click New and then click Folder // On the command bar, click New Folder // Double-click on the title bar // Click New and then click Folder

You're tired of losing documents so you've decided to save your research paper to your desktop where you know you'll be able to locate it quickly. To save it to the desktop, you first click the File tab to open the file menu. Next you select ___ .

Save As

Select what's true about object-oriented databases.

Store instructions for how to compute data as well as the data to be processes // Equipped to handle unstructured data // Use object Query Language to construct queries that extract data from databases.

Property formatted professional e-mail message should contain which of these components?

Subject // Salutation

Select the usual tasks of information systems (IS) program managers.

Supervising IS technicians // Working with developers and senior management to procure and implement IS processes // Developing training plans and policies for IS

Which of the listed activities are considered theft of software?

Taking a registration code from the Internet and using it register a program that you did not purchase // Illegally copying a program stealing software programs

The Federal ___ Commission is the main government organization that oversees Internet privacy.

Trade

Select the characteristics of a modem

Usually provided by the ISP // Converts analog signals into digital signals // Converts digital signals into analog signals

Select the reasons why you might want to add a microSD card to your smartphone.

You want to save more music files // You want to save more image files

In professional messages, avoid the use of emoticons and ___

acronyms

In order to change sound waves into digital signals, smartphones contain a(n) ___ digital converter.

analog

Personal ___ is the process used by individuals to make them stand out from others by identifying and expressing their unique traits and values.

branding

To select a folder, simply put your cursor on it and ___.

click

Being able to surf the web, watch videos, and listen to steaming audio is why cell service with a ___ plan is extremely popular in the U.S.

data

The DBMS subsystem allows for data recovery, support, maintaining and securing databases is called the ___ subsystem.

data administration

When you receive a utility bill, you're actually getting a report generated by a database management system. DBMS subsystems that provides for data maintenance, analysis and generation of reports

data manipulation subsystem

Stealing confidential materials such as copyrighted material, confidential information, or company emails from a network is called ___ . Most often, this crime is committed by employees inside the company rather than outside hackers.

data theft

Amazon.com allows you to search for thousands and thousands of items using images and information that are organized logically. This much storage and management requires a complex ___ .

database

It can store virtually unlimited amounts of data that can be shared across networks and the data can be kept for more accurately, a ___ has many advantages over a traditional filing system.

database

You need to purchase tickets for your friends. You go to SubHub.com to find them. You can search between hundreds of seats in thousands of venues and thousands of events. To organize this information in a searchable manner, they use a complex ___.

database

Because he wanted to be able to sort gifts according to continent and time zone, in 1984 Santa switched from using long lists to using ___.

databases

An integral part of a database management system [DBMS] is the Data Definition subsection. This subsection uses a data schema or data ___.

dictionary

When you ___ a file Windows should automatically open it. If it can't Windows will prompt you to select the correct app to open the file.

double-click

If you have two folders open on your desktop and you want to move a file from one folder to the other, simply ___ the file.

drag

E-commerce stands for

electronic commerce

Theft of software occurs when someone engages in all the following except ________.

erasing a program you have purchased

In a database a ___ is a group of related characters in a database table that represents a characteristic of someone or something.

field

The risk of downloading a file from the internet includes all except

fileware

To control how information is entered into a database, programmers and database administrators create ___ to help ensure data integrity.

forms

Databases are built by starting with single characters of data, organizing the data into fields, organizing the related fields into records, the records then make up a table. This organization is referred to as a data ___ .

hierarchy

Select the Apple tablet offerings.

iPad pro series // iPad air series // iPad mini series

While many 3rd party apps are available through its App Store, apps for ___ must first be tested and approved before they're made available for downloading.

iPhones

In order to sync your iPhone to your MacBook you must first open the ___ app.

iTunes

All the following should be taken into account when using Twitter, except

if a Twitter user has been blocked you can file a format complaint through Twitter

Software piracy include all the following except

illegally learning about software.

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the ________.

information systems [information technician] program manager

Forms structure data input to help ensure data ________, meaning the information entered is accurate, timely, and useful.

integrity

Be careful to only open email from senders you know and trust. ___ may be contained in email messages.

malware

One advantage that the Samsung tablets have over the iPads is that you can add ___ to the Note or Tab.

microSD storage

To listen to an .mp4 (M4A) file, you'll need an app such as iTunes or QuickTime. These apps are called audio ___ .

players

To watch an .mpeg file, you'll need an app such as Windows Media Player or QuickTime. These apps are called video ___ .

players

To search a database for information, create a ___.

query

In a relational database, such as Microsoft Access, a collection of related fields in a data file is called a ___.

record

In the data sheet view of a relational database a row of information is called a

record

The type of database that uses common fields to create links between tables is called a ___ database.

relational

The most common method of renaming files and folders is to simply ___ on the item and select Rename.

right-click

If you're in an area where your home network has no cell coverage, you may need to use the cellular network of a different provider. This is called _______.

roaming

To look for a file or folder in the Windows 10, just type the file name in the ___ box.

search

WhatsApp messenger is a cross-platform messaging app that allows you to ________ and receive messages without having to pay for SMS (text messaging).

send

Anything you share on Facebook can be easily ___ to others.

sent

Social networking is based on the six-degree of ___ concept that argues you can connect to anyone through a chain of no more than six introductions or personal connections.

separation

Taken and shared photos or videos on Snapchat are called ________.

snaps

The cell tower's base transmission station is connected to a mobile ________ station.

switching

Connecting your phone to your laptop to transfer photos, videos, or music files is referred to as ___.

syncing

Visiting porn sites using a company computer or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers notice this violation. You should:

tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.

Along with Form line, what is the most important factor in ensuring your business message is read?

the subject line

Using information systems to help foresee corporate business opportunities and threats that might be done by all levels of management, but it's most important for which management level?

top-level managers

WhatsApp users can create groups, and send _____ images, video and audio messages for free.

unlimited

Some apps that use a surprising amount of data are those that include embedded __.

videos

To change the size of your folder's icon, just right-click on a blank area of the Contents pane and click ________.

view

In urban areas, the cell towers become more numerous and the cell signals transmitted by the cell towers are ___, than those in less populated areas.

weaker


Related study sets

ТАБЛИЦА СЛОВООБРАЗОВАНИЯ (F)

View Set

Man. of Strat. All 13 chapter Ultimate Final Study Guide

View Set

Energy, Catalysis & Biosynthesis - Cell Bio Test 2

View Set

Ecology Chapter 4- Coping with Environmental Variation

View Set

Developmental Psychology: Childhood

View Set