CGS 2100 Midterm

Ace your homework & exams now with Quizwiz!

Select the technologies used by facial recognition software.

1. 3-D mapping 2. Feature charting 3. Skin texture analysis

Match the following optical storage media.

1. DVD: capacity of up to 8.5 GB 2. Blu-ray: capacity of up to 50 GB (per side) 3. CD: capacity of up to 700 MB

The SDLC's system analysis phase includes three stages. Choose the three stages.

1. Data collection-gathering info about needs and existing hardware and software. 2. Analyze data-determine the system requirements. 3. Prepare the system specifications.

Select the peripherals.

1. Printer 2. Monitor

Choose the SSD characteristics.

1. no moving parts 2. extremely fast

Common names for a USB drive include?

1. thumb drive 2. flash drive 3. jump drive

Firewalls help protect against ________ and ________.

1. worms 2. hackers

The second step in the PDLC is to create the plan or algorithm. This plan is usually written as a flowchart, and is in written in ________.

English

System BIOS (Basic Input/Output System) is stored in ________.

ROM

Sometimes spam messages are referred to as ________.

UBE

________ Basic is a programming language of the third generation that enables BASIC to be used with the benefits of a graphical user interface.

Visual

A camera that takes photos or streams video into a computer or over the Internet is called a ________.

Webcam

Although not a programming language technically, ________ pertains to the protocols that enable content to be displayed on the Internet.

XML

Plug and Play

a technology that enables the OS to detect and configure peripherals without downloading software or drivers

The distance between two adjacent sub-pixels on a display is referred to as ________.

dot pitch

RAM

largest memory of a computer, connected to the processor via the front side bus

A laptop typically has ________ RAM than a smartphone.

more

Converting a task into commands that a computer can use to perform the task is called ________.

programming

Devices allowing data to be retained when your computer is shut down are called ________ devices.

storage

The most common printers for printing receipts are ________ printers.

thermal

Most of the PC games were written in ________ or ________.

1. C 2. C++

Select the characteristics of thermal printing.

1. Commonly used for printing receipts 2. Paper turns black when heated

Common symptoms of a computer virus include?

1. Documents won't save. 2. Computer runs extremely slow. 3. Programs launch on their own.

Smartphone features include

1. Internet capabilities 2. Touch screen 3. Front/ back facing cameras 4. Speaker

Select the acronyms that describe a type of computer monitor.

1. LED 2. LCD

Examples of input devices include

1. Mouse 2. Keyboard 3. Camera

Select the characteristics of a plotter.

1. Prints large graphic displays 2. Mechanically moves a pen over a large sheet of paper

Factors that damage computer hardware include?

1. power surges 2. overheating 3. humidity 4. magnetic fields

The boot process consists of how many steps.

4

When you buy a new laptop, how much RAM should it come with?

4-8 GB

What is the acronym for End-User Licensing Agreement?

EULA

An application that navigates all of the files and folders on your Mac is the ________.

Finder

Which of the following is an e-mail program?

Outlook

When discussing digital cameras or smartphone cameras with APS CMOS, APS stands for ________.

active pixel sensor

Which device carries a relatively large footprint and separate system unit?

desktop

These facilitate getting data and information into your computer.

input devices

Lower range tones generally require ________ speakers.

larger

The smallest image element is a(n) ________.

pixel

Select the input devices often found with a point-of-sale system.

1. MICR 2. touch screen

Select the usual tasks of database administrators (DBAs).

1. Monitors the database's performance. 2. Develops and maintains the database itself. 3. Establishes user privileges for the database to help protect the data.

Select the e-mail services.

Gmail Outlook iCloudiCloud

RAM is ________ and has no moving parts.

electronic (solid state)

Select appropriate business e-mail etiquette practices.

1. Remember that potentially negative news is best given face-to-face. 2. Keep attachments small.

Examples of management information systems (MIS) include ________.

1. TPS 2. DSS 3. ESS

Select the two phases of the final step in the system development life cycle.

1. system audits 2. evaluation phase

Select the statements that describe a computer programmer's algorithm.

1. written in a natural language, such as English 2. written in the form of a flowchart so that it will be more easily converted into a programming language

Which category of management information systems (MIS) focuses on tracking sales and inventories?

TPS

Which of the following is a strength of the Linux platform?

free to download and use

Increased data transfer will be less likely to have errors if you use a ________ USB cord.

shorter

Most smartphones and tablets produced today use a ________ keyboard.

virtual

A hacker-controlled computer is called a ________.

zombie

Place the following steps in order for the process of uninstalling a program from a Chromebook.

1. Click the Launcher (circle icon). 2. Right-click the unwanted app. 3. Select Uninstall or Remove from Chrome. 4. Click Remove.

Select the usual tasks of a data analyst.

1. Collects data 2. Interprets information provided by the database 3. Creates reports for senior management

Match the Macintosh keyboard shortcut with the appropriate result.

1. Command+F: Find (in most apps) 2. Command+A: Select all 3. Command+S: Save 4. Command+Shift+3: Screenshot

Match the following.

1. Connector: On a cable, the connector is the end that connects to a port. 2. USB: allows for data transfer between devices and for devices to be electrically charged 3. Port: a slot or hole that matches the cord or expansion card being connected to the port 4. FireWire: a type of Thunderbolt port, commonly found on older Apple computers

Which of these should business owners do to help protect their data.

1. Establish strong firewall protection for their business's network. 2. Ensure antivirus software is installed and up-to-date. 3. Create strong password protections and protocols.

Place the following steps in the correct order if you want to reply only to the sender of an Outlook message.

1. Go to Outlook (log in if necessary). 2. Click Inbox to see your messages. 3. Click the message you wish to reply to. 4. Click Reply or Reply to All. 5. Type your response and click Send.

Place the following in order if you were opening and reading a message in Outlook.

1. Go to Outlook (log in if necessary). 2. Click Inbox. 3. Click on the message you wish to open. 4. After reading the message, click X to close or Delete to remove the message from your Inbox.

Match the following computers with their characteristics.

1. Laptop computer: designed for those who need a mobile computer but need to enter a large amount of data 2. Tablet computer: highly mobile device that can be used while standing or even walking 3. 2-in-1 computer: similar to a tablet but comes with a detachable keyboard/touchpad unit 4. All-in-one computer: designed to stay on a desk; provides a large monitor but takes up less space than a desktop computer

Match the business information activity with the appropriate management level.

1. Middle managers: Use information systems for communicating policies and performance reports up and down the corporate ladder. 2. First level managers (supervisors, floor managers): Use information systems for recording line employee performance. 3. Top-level management (business executives and presidents): Use information systems to foresee corporate opportunities and threats.

Select the smartphone input devices.

1. Motion sensors 2. Buttons 3. Microphones

Common types of servers include

1. Network server 2. File server 3. Web server

In which order should you delete cookies in Internet Explorer (Microsoft Edge)?

1. On the Start screen, tap or click Internet Explorer to open Internet Explorer. 2. Swipe in from the right edge of the screen, and then tap Settings. (If you're using a mouse, point to the lower-right corner of the screen, move the mouse pointer up, and then click Settings). 3. Tap or click Options, and then, under History, tap or click Select. 4. Select the Cookies check box, then tap or click Delete.

Put the following steps in order for creating a new e-mail message in Microsoft Outlook.

1. Open Outlook (log in if necessary). 2. Click New. 3. Enter the recipient's address in the To area. 4. Type the subject in the Subject area. 5. Type your message in the area beneath the formatting buttons. 6. Click Send.

Select the usual tasks of information systems (IS) program managers.

1. Supervising IS technicians. 2. Working with developers and senior management to procure and implement IS processes. 3. Developing training plans and policies for IS.

Which of the following are designed as a network operating system?

1. Windows NT 2. Windows Server 3. UNIX

Reasons to purchase a tablet computer include

1. business workplace 2. families 3. gamers

You can minimize your risk of computer damage by using a ________ or a ________.

1. surge protector 2. UPS (Uninterruptible Power Supply)

"Full HD" resolution is expressed as

1920 x 1080.

How many bits equal a byte?

8

Adding software to a digital device, or adding hardware components to a digital device is called ________.

installing

The first step in the SDLC is to define the problems to be addressed by the IT system, examine different alternatives, and report the findings. This is called the ________ step.

investigation

Many apps allow you to create mini-programs that reduce the number of routine steps required to complete a task. These mini-programs are called ________.

macros

L1 cache

memory located directly on the processor itself

Using information systems to help foresee corporate business opportunities and threats that might be done by all levels of management, but it is most important for which management level?

top-level managers

Used in a variety of devices including ATMs and point-of-sale terminals, ________ allow for the input of data with the use of a stylus or finger.

touchscreens

A terabyte equals approximately one ________ bytes?

trillion

What order of steps should you take to change your cookie preferences in Safari?

1. Choose Safari. 2. Click Preferences. 3. Click Privacy. 4. Change cookie settings.

Which of these would be considered a cybercrime?

1. Internet scams 2. cyber espionage 3. information theft

Match the following.

1. Storage: Putting a photo onto a USB drive (thumb drive) 2. Output: Playing a song from Spotify 3. Input: Entering text in a word document

Identify what is true about script kiddies.

1. are amateur computer hackers with little programming expertise 2. illegally gain access to computer systems using programs (scripts) that others have written

Choose what is true about computer worms.

1. automatically reproduce 2. Replication exhausts network bandwidth or available storage. 3. often sent using e-mail attachments

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer-use standards. Failure to set such policies can lead to which of the following?

1. decreased employee performance 2. decreased network speed 3. increased likelihood of security breaches

Select what is true about session cookies.

1. determine the start and end of a session 2. analyze and measure traffic on a web page 3. determine the web browser being used

Choose the colors to create pixels on most output devices.

1. red 2. blue 3. green

Also known as additive manufacturing (AM), ________ printing sprays successive layers of material to create an object.

3-D

Match the appropriate Windows keyboard shortcut with its result.

CTRL+S: Save CTRL+P: Print CTRL+V: Paste CTRL+Z: Undo

Digital music devices are connected to computers using ________ ports.

MIDI

MIDI is an acronym that stands for?

Musical Instrument Digital Interface

A gigabyte equals approximately one ________ bytes.

billion

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ________.

data analyst

Which of these would be deemed a cybercrime?

data manipulation

Stealing confidential materials such as copyrighted material, confidential information, or company e-mails from a network is called ________. Most often, this crime is committed by employees inside the company rather than outside hackers.

data theft

Which of the following refer to ultra-high-definition television displays?

1. 4K UHD 2. 8K UHD 3. UltraHD

The technology (chips) that allow cell phone microphones and hearing aids to be so small is the ________ chip.

MEMS

All of the following are common ports that are included with laptop computers except ________.

MIDI

The technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called

OMR

To improve the sound quality of their smartphones, many users purchase larger external ________ to listen to music.

Speakers

AJAX stands for ________ JavaScript and XML.

asynchronous

Data flows between different computer parts via ________.

buses

Breaking into a computer system (hacking), for politically or socially purposes is called ________.

hacktivism

The SSD cost is ________ than the traditional hard drive cost.

higher

Malware is designed to do all the following except

improve data

In the body of a professionally formatted business e-mail, where should a request be placed?

in the first sentence of the body of your e-mail

The three most common types of e-mail viruses include all except

password savers

The initial phase in the program improvement life cycle is "Defining the ________."

problem

Cache

relatively small amount of memory (measured in kilobytes or megabytes)

The average tablet has a ________ hard drive compared to the average desktop.

smaller

Specialized hardware or software that capture packets transmitted over a network are called packet ________.

sniffers

While not a required step in sending an e-mail, it's wise to ________ any message before clicking Send.

spell-check

A computer that is highly mobile, has a smaller OS, and uses a touchscreen as the primary input method is called a ________.

tablet

Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You should

tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.

To create an image with a laser printer ________ is(are) drawn to the drum.

toner

Tiffany has purchased a new laptop. She noticed many unwanted programs came pre installed on her laptop. She wants to ________ the programs from her device so they do not take up storage space.

uninstall

Choose what all-in-one computers actually mean.

1. All-in-one computers house every component except the keyboard and mouse inside the same case as the monitor. 2. An all-in-one computer is a stationary device with a separate keyboard and mouse.

Select what's true regarding all-in-one computers.

1. All-in-one computers house every component except the keyboard and mouse inside the same case as the monitor. 2. An all-in-one computer is a stationary device with a separate keyboard and mouse.

Popular Personal Media Players (PMP's) include which two of the following devices?

1. Amazon Kindle Fire 2. Apple iPod

Select the input devices often found at a point-of-sale station.

1. Bar code or UPC reader 2. Keypad 3. UPC scanning wand

Select the true statements regarding an LED display.

1. Can be extremely thin 2. Great for well-lit areas 3. Extremely energy efficient

Which of the following are the steps involved in programming?

1. Categorizing which parts of a task a digital device can perform. 2. Describing the task in a precise manner. 3. Translating the task into the language the computer's CPU can use.

Good password management include which three of the following?

1. Changing your password often. 2. Using strong passwords. 3. Never use the same password twice.

Select the characteristics of audio output.

1. Converts electrical impulses into air movement 2. Digital devices use digital-to-analog converters

Place the steps of the Program Development Life Cycle in the correct order.

1. Defining the problem. 2. Creating a plan. 3. Writing the code. 4. Debugging the code. 5. Testing the code.

The three stages to be completed in the SDLC's inquiry phase include

1. Defining the problem. What should this system do? Who will by using this IT system? 2. Examining alternatives. Can available hardware and software perform the same task? 3. Reporting. Document your investigation's findings.

Which statements refer to a display's contrast ratio?

1. Describes the difference in brightness 2. Luminance of white pixels compared to black pixels

Choose the desktop computer features.

1. Desktops allow for relatively easy upgrade and expansion. 2. Desktops are often used in offices since they do not need to be mobile. 3. Desktops use a full OS.

According to US-CERT, you should contact them using one of the following methods when you receive a phishing message.

1. In Outlook Express, you can create a new message and drag and drop the phishing e-mail into the new message. Address the message to [email protected] and send it. 2. In Outlook Express you can also open the e-mail message* and select File > Properties > Details. The e-mail headers will appear. You can copy these as you normally copy text and include it in a new message to [email protected]. 3. If you cannot forward the phishing message, at a minimum, send the URL of the phishing website to US-CERT.

Select the usual roles of information systems (IS) technicians.

1. Installing IS hardware and software. 2. Maintaining IS hardware and software. 3. Repairing and replacing IS hardware and software.

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer-use standards. This includes which of the following?

1. Instructing employees on standards. 2. Enforcing standards by creating firewalls, monitoring protocols, and filters. 3. Periodically reviewing computer-use policies.

Match the processor manufacturer to the correct statement.

1. Intel: Founded in 1968, this is the world's largest manufacturer of processors. 2. Nvidia: Founded in 1993, this company produces popular mobile device processors. 3. AMD: Founded in 1969, this company's technology is featured inside every major next generation gaming console and home entertainment system: Microsoft's Xbox One, Sony's PS4™, and Nintendo's Wii.

Put the SDLC steps in order.

1. Investigation 2. Analysis 3. Design 4. Develop

If you own a small business, what can you do to ensure your computers and data is kept secure?

1. Keep software updated, particularly antivirus software. 2. Physically secure computers to minimize risk of theft. 3. Backup your data regularly.

Common computer virus infection indicators include ________, ________, and ________.

1. OS doesn't launch properly 2. files get deleted or encrypted 3. strange error messages or pop-up ads

What is the correct order of steps to use when uninstalling a program in Windows 10 using the search feature?

1. Open the Start menu. 2. Click Settings. 3. Click System on the Settings menu. 4. Select Apps & features. 5. Select a program you wish to uninstall.

Select the current uses for RFID tags.

1. Pet identification 2. Pacakge tracking 3. Inventory tracking

Rank the storage capacities from highest to lowest. Start with the highest capacity first.

1. Petabyte 2. Terabyte 3. Gigabtye 4. Megabyte 5. Kilobyte Optional 6. Byte 7. Bit

Select the advantages of a point-and-shoot camera over a smartphone camera.

1. Point-and-shoot cameras often have larger pixel sensor arrays, providing higher resolution. 2. Point-and-shoot cameras, being thicker, often come with optical zoom capability.

Choose the stages included in the SDLC process's system design phase.

1. Purchasing necessary software. 2. Purchasing needed hardware. 3. Setting up, installing, and testing the system.

Match the computer styles with its features.

1. Tablet computer: highly mobile—you can use it while standing or walking around 2. Desktop computer: not mobile, but allows for relatively easy upgrade and expansion 3. Laptop computer: clamshell (hinged) type computer 4. All-in-one computer: not mobile, but since most of it's components are housed behind the monitor it takes relatively little space on your desk

Select the statements that refer to the term "dot pitch."

1. The distance between two adjoining sub-pixels in a display 2. The closer the spacing (the smaller the dot pitch) the sharper the image

Select the qualities that make a trait useful for biometic recognition.

1. The trait must not change over time. 2. Everyone must have the trait. 3. The trait must be measurably different with each person.

Put the steps of a virus infection in the correct order.

1. The virus arrives via e-mail attachment, file download, or by visiting an infected site. 2. An action such as running or opening the file triggers the virus. 3. The infection is spread to other devices or a network. 4. The payload is activated and the virus starts its destructive actions.

Match the business information systems (IS, sometimes called information technology or IT) activity with the appropriate management level.

1. Top-level management (business executives and presidents): Use IS to monitor overall business performance. 2. Middle managers: Use IS for record keeping and reporting purposes. 3. First level managers (supervisors, floor managers): Use IS for scheduling daily and weekly operations.

Which of the following are true regarding high-definition displays?

1. Typically have aspect ratios of 16:9 2. Typically have 1080 horizontal lines of pixels

What is true about passwords?

1. Use a combination of letters, symbols, and numbers; the more characters you use, the more secure your password will be. 2. Regularly check your accounts to ensure they have not been tampered with.

Speech recognition software uses which of the following characteristics?

1. Voice frequency 2. Voice pitch 3. Speech rhythms

Which are important considerations when purchasing a new computer?

1. What is its price? 2. How much RAM comes with it? 3. Does the device have USB ports?

Which of the following should you consider when buying a new computer?

1. What is the cost? 2. Does it have HDMI ports? 3. Does it have an SD card slot?

How can you attach a mouse or other pointing device to your computer?

1. With a Bluetooth connection 2. With an IrDA connection 3. With a wire through a USB port

Select the reasons for purchasing a tablet computer.

1. You need a computer that you can use while walking. 2. You need a highly mobile computer that works well for reading ebooks or for online gaming.

Select the statements that refer to color depth.

1. also known as "bit depth" 2. a measure of the accuracy of the color of each pixel 3. specifically, the number of bits of data describing each pixel in a display

When reporting a computer ethics violation of a co-worker to your employer, it's important to ________.

1. be brief and direct 2. state only what you witnessed

A multi-core processor has two or more ________; and is capable of ________.

1. cores 2. hyperthreading

Which of the following are treated as cybercrimes?

1. data manipulation 2. data corruption 3. cyberbullying

What are some characteristics of a 2-in-1 computer?

1. full operating system 2. touch screen monitor

Rank the following from fastest to slowest. The fastest should be on top.

1. gigahertz 2. megahertz 3. kilohertz 4. hertz

Spyware collects your ________, ________, and ________ to gain information about your Internet habits and activities.

1. keystrokes 2. passwords 3. confidential information

What is true of the malware Trojan horse?

1. often found attached to free downloads and apps 2. often used to find passwords, destroy data, or to bypass firewalls

For which of the following activities would a typical marketing department need a strong information system?

1. online sales 2. online advertising 3. updating the business's social media sites

In each browser's settings area you should consider ________, ________, and ________.

1. periodically deleting cookies 2. blocking/customizing your cookie settings 3. decide from which sites you want to allow cookies

The software development process includes which of the following steps?

1. planning 2. programming 3. debugging 4. beta review

Select what's true about utility programs.

1. program that performs a specific maintenance type of task 2. included in both Windows and Mac OS 3. common examples include disk formatting, disk cleanup, and disk defragmenting

An Internet filter is firewall software used to block a user's access to specific Internet content. This software can reside on which three of the following?

1. router or user's computer 2. network 3. stand-alone filter attached to a server

Cyberattacks include the following

1. spyware. 2. pharming and phishing. 3. spamming and spoofing. 4. DoS and DDoS attacks.

Choose what all-in-one computers actually mean.

1. stationary device 2. have a large monitor 3. usually touch screen monitor

Choose what all-in-one computers actually mean.

1. stationary device 2. have a large monitor 3. usually touch screen monitor

Websites that use cookies can collect information about

1. surfing habits. 2. selling your collected information to third parties. 3. monitoring your web behavior.

Important considerations when purchasing a new tablet computer include which three items?

1. the amount of RAM it has. 2. the size of its screen. 3. the amount of storage it has.

Choose the two answers that define the term "resolution" in output devices.

1. the number of pixels in a display 2. quality of the image

Match the following description with the appropriate programming language generation.

1GL: Machine language-represented by a series of 1s and 0s. 2GL: Assembly language-An assembler converts 2GL into machine language. 3GL: High-level programming language-uses a compiler to convert into machine language. 4GL: Specifically designed for creating database management programs. 5GL: Extremely advanced-uses statements (scripts) rather than algorithms.

Most new laptop computers come with how much storage?

256 GB - 1 TB

A set of programs for exchanging data on a website without altering the display of the website is ________.

AJAX

Some computers use ________ to represent characters in a binary format.

ASCII

Business owners, copyright holders, and network administrators publish ________ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.

AUPs

The programming language of the third generation learned by most students when most computers used MS DOS was ________. It continues as a secure programming language to use 3rd party code and offers a standard for coding that readily integrates with other programming languages.

BASIC

If you are planning to write PC games software, you might need to know C or ________.

C++

The PDLC's coding phase uses which of the following languages?

C++

A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the ________.

Control panel

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?

DDS

A ________ attack on a network is created to stop or interrupt traffic by saturating it with too many requests.

DDoS

Cyberattacks include ________ and ________.

DDoS attacks identity theft

This version of the HTML set of protocols designed to display documents on the web provides a smooth interface between natural language and machine language by wrapping data for web display in "tags".

Extensible Markup Language

This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery.

Gait analysis

Relatively rugged, water-resistant video cameras that allow users to film high-definition video under harsh conditions, such as on ski mountains, in the ocean, or at high altitudes are called extreme-action video cameras or simply a ________.

GoPro

The ________ is a separate processor (computer) on your computer that enhances your video.

Graphic processor (GPU)

A port that allows the transfer of high quality video and audio signals is called a(n) ________ port.

HDMI

VPN (Virtual Private Network) is a very useful tool in protecting your online identity. A VPN hides your ________ to outside websites.

IP address

Computer hardware and software used by an organization to improve its performance is called its ________.

IT system

Which is true regarding the length of a USB cord?

In general, the more data being transmitted, the shorter the cord should be.

Which chip and manufacturing company is the largest in the world?

Intel

Cyberattacks include all the following except

Internet browsing.

Which of these programs, by parsing XML documents, makes information more readable for programmers?

JSON

An object-oriented programming language used by Android phones and tablets to write apps is ________.

Java

The programming language ________ makes it much quicker to create websites and web pages.

JavaScript

To speed up the programming process while producing dynamic web pages, select the program that utilizes tiny programs called scripts.

JavaScript

Most laptops, tablets, and smartphones use a(n) ________ display.

LCD

Be careful to only open e-mail from senders you know and trust. ________ may be contained in e-mail messages.

Malware

When referring to business information technology, MIS stands for ________.

Management information systems

Which of the listed programs are used for creating documents, basic web pages, and desktop publishing?

Microsoft Word

Which of the following might be risky to uninstall from a Windows PC laptop?

Microsoft Works 6-9 Converter

Match the flowchart symbol with its meaning.

Oval: start point or finish point Parallelogram: input or output point Diamond: decision point Rectangle: process or procedure

The information in ________ is dumped when a computer is shut down.

RAM

RFID stands for which of the following?

Radio Frequency Identification

Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?

SCMS

Most tablets and phones use ________ as their main storage device.

SSD

Apple developed ________, a programming language for Mac OS and iOS writing software because Objective-C was hard to write.

Swift

What type of port do most digital devices use to attach peripherals?

USB port

Software that collects the web browsing history of the user and uses the collected data to create unwanted pop-up ads is called ________.

adware

Written in the English language and as a flowchart, a programmer uses a(n) ________ to describe the problem to be solved by the program.

algorithm

Combining a desktop's power with a clean look, ________ computers are popular with companies. However, their inability to expand makes them less popular with serious gamers.

all-in-one

Devices which house every component except the keyboard and mouse inside the same case as the monitor are called ________ computers.

all-in-one

HDMI

allows for the transmission of high-definition audio and video signals

One of the first stages of the PDLC testing method is a test of fresh software performed by the programmers themselves or contract evaluators working alongside the programmers. This is called the ________ test.

alpha

The second step of the SDLC phase is to collect information on current hardware and software, analyze this information, and prepare system requirements. This is called the phase of the ________ scheme.

analysis

A device commonly used for checkout in stores, that measures the reflection of a laser beam, is called a ________ reader.

bar code

Inkjet printers are often sold ________ their production cost.

below

A question that is answered as either yes or no, or true or false, is called ________.

binary

A ________ is the smallest unit of data that a computer can process.

bit

Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a ________, which closes the access point used by the hacker.

block

A collection of hacker-controlled computers is called a ________.

botnet

A channel over which information flows inside a digital device is called a ________.

bus

The two main factors that affect the speed of the processor are clock speed and ________.

bus width

Avoiding viruses include all the following except

bypass your browser's built-in security.

In ASCII 8 bits are combined to create a ________.

byte

One ________ represents a letter, symbol, or number (one character) of information.

byte

MIDI

capable of carrying digital music signals and are common in today's music scene

Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on ________.

checks

An alternative term for a programming language is programming ________.

code

The number of bits of data describing each pixel in a display is referred to as ________.

color depth

A digital device that accepts input, processes and stores the input, and provides output is a ________.

computer

A description of the difference in the luminance of a display's white pixels compared to the black pixels is called ________.

contrast ratio

A small text file of information created by websites that your web browser stores on your hard drive is called a ________.

cookie

The most popular web browsers have a private browsing mode (Incognito). While browsing in Incognito mode your browser will not store ________.

cookies

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ________.

corruption

Repeated and deliberate harassment or harassment of a person or group of people through information technology and networks is called?

cyberbullying

A crime in which a computer is the object of a crime or in which a crime or offense is committed is called ________.

cybercrime

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ________.

database administrator (DBA)

There are almost always errors after the code has been written. The PDLC's fourth step involves finding and correcting these errors in a process. This process is called ________.

debugging

The SDLC's third step consists of three phases, specifically developing multiple system proposals, selecting the most feasible proposal, and reporting on the system to be developed. This is called the system ________.

design

The fourth step in the life cycle of system growth is to get the required equipment and ensure that it operates properly. This is called the system development step.

developement

The correct way to measure the screen size of a computer monitor is?

diagonally from one corner to the other

The art and science of creating output that provides information in the most useful manner is called ________.

ergonomics

Register

extremely small amount of memory (measured in bits) located throughout the processor

The machine cycle consists of which four steps?

fetch, decode, execute, and store

Trojan horse programs are used to find all of the following except

finding free downloads.

A ________ is the hardware or software used to keep a computer secure from external threats such as hackers and viruses by allowing or blocking Internet traffic.

firewall

Defining the problem is the ________ step in the Program Development Life Cycle.

first

The ________ step in software development is: What should this program do?

first

A process's graphical representation is called a ________.

flowchart

Typical tablet computer or smartphone SSD capabilities are measured in ________.

gigabytes

The visual image output created by the computer is called ________.

graphics

A person with unlawful access to networks to steal and corrupt information and data is called a ________.

hacker

A zombie is a computer controlled by a ________.

hacker

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ________.

information systems (information technology) technician

Peripherals

input, output, or storage devices connected to a computer.

Josh is taking an Intro to Computers course and needs to use Microsoft Office to complete a variety of assignments. He has purchased the software, now he must ________ it so he can start his assignments.

install

A program that can be used to turn a single line of C# into a machine language without the complete program being compiled is called a C# ________.

interpreter

A two-in-one computer combines a tablet with a detachable ________ to make a relatively powerful, yet mobile computer.

keyboard

A mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or a ________ computer.

laptop

An initial value process, a process and a test condition which can potentially return to the initial value is called a ________.

loop

What type of virus is written in a macro language and placed in a document or table?

macro virus

There are two stages of the final step in the SDLC, one system audit and one assessment stage. This final step is called ________ the system.

maintaining

Megahertz is the same as a ________ cycles (or instruction) per second.

million

Sometimes used in smaller business networks, employee ________ software is impractical for large networks because of the number of users and the potential for misuse.

monitoring

Which of the following is a strength of the Android platform?

most widely used OS for smartphones and tablets

Which of the following is a strength of the Windows platform?

most widely used OS in laptops, desktops, usually leading to lower prices

The actual pixel number in a monitor is called the ________ resolution.

native

A(n) ________-oriented assessment operates well when inputs can readily be put into distinct categories or classes.

object

Though legal, which of the following would likely be prohibited by a typical business computer-use policy?

online personal shopping

What manages hardware and software, supports the computer's basic functions, and runs programs?

operating system

In photography, there are two ways to focus on distant objects, digital zoom and ________ zoom.

optical

Many manufacturers have made ________ optional equipment when purchasing a new laptop computer.

optical drives

Cookies used to collect user information like passwords and stored on a computer hard drive until deleted or expired are called ________ cookies.

persistent

Unlike phishing that uses fake e-mails to gain personal information about a user, ________ uses fake websites to gain personal information.

pharming

Using cells of ionized gas to create images, ________ displays are actually becoming less popular.

plasma

Though legal, which of the following would likely be prohibited by a typical business computer-use policy?

playing online games

Converting a task into commands that a computer can use to perform the task is one definition of computer ________.

programming

Which type of touchscreen uses a single metallic-coated panel and uses electricity to calculate touch points?

projective capacitive

An output device that uses light to display video or image output on a surface is called a ________.

projector

Written in natural language, but often including shorthand programming to help write the program itself, ________ is the word that defines an intermediate step in generating a flowchart algorithm.

pseudocode

If antivirus software can not delete an infected file, it sends the file to a hard disk area called ________.

quarantine

The number of pixels in a display is called the display's ________.

resolution

Along with the From line, what is the most important factor in ensuring your business message is read?

the Subject line

One of the main differences between free and fee-based antivirus software is ________.

the number of features

A kilobyte is equal to approximately one ________ bytes.

thousand

Cookies stored on a computer store information about ________.

user preferences

If you purchase a new graphics computer game or a new photo/video editing software for your desktop computer, you may want to purchase a new ________ card.

video

The technology that uses cameras, microphones, displays, speakers, and software to allow users to both see and hear each other is called ________.

video conferencing

Software that infects a computer and is created by computer code is called a ________.

virus

With ____ recognition technologies, frequency, pitch, speech rhythms, and other characteristics are charted and compared to existing records.

voice

A form of E-mail fraud where criminals change the account where money is being transferred is called a ________ scam.

wire-wire


Related study sets

FTCE - Professional Education 3 pre

View Set

#2. Compare Freud, Erikson, Piaget models for human development

View Set

Simple Distillation and Fractional Distillation

View Set