CGS2060 Midterm

Ace your homework & exams now with Quizwiz!

Select the qualities that make a trait useful for biometic recognition.

- The trait must not change over time. The trait must not change over time. - Everyone must have the trait. Everyone must have the trait. - The trait must be measurably different with each person.

In the United States the federal _____ covers most consumer oriented electronic transactions.

EFT Act

Select the optical drives

dvd drive blu-ray player

Select the colors that are used to create pixels in most output devices

red blue green

A programming design that breaks down a problem into a series of tasks is called ___ programming.

top-down

Snaps on Snapchat can be viewed for up to ___ seconds (depending on what the user chooses) and then disappear.

10

The ___ cache is located directly on the processor itself.

L1

Match the business information activity with the appropriate management level: 1. First level managers (supervisors, floor managers) 2. Middle managers 3. Top level management (business executives and presidents)

1. First level managers - Use information systems for recording line employee performance. 2. Middle managers - Use information systems for communicating policies and performance reports up and down the corporate ladder. 3. Top level management - Use information systems to foresee corporate opportunities and threats.

Match the Macintosh keyboard shortcut with the appropriate result: Command+V Command+C Command+Z Command+I

Command+V - Paste Command+C - Copy Command+Z - Undo Command+I - Italicize

Storage capacity for laptop hard drives is typically described in terabytes or ___ .

gigabytes

Even a small degree of programming skill can be beneficial. Many apps allow you to create mini-programs that reduce the number of routine steps required to complete a task. These mini-programs are called ___ .

macros

The final step in the SDLC has two phases, a system audit and an evaluation phase. This final step is referred to as ___ the system.

maintaining

On Facebook your _____ is a collection of the photos and stories that tell people about you and your experiences.

profile

In general, the ___ the access time, the faster the hard drive.

shorter

Select the parts of an RFID system.

transceiver transponder antenna

Personal branding can be accomplished digitally and in more traditional means including all of the following except _____ .

writing private journal entries

Select the statements that describe a computer programmer's algorithm.

written in a natural language, such as English written in a natural language, such as English written in the form of a flowchart so that it will be more easily converted into a programming language

There are risks associated with downloading content from the Internet. It is important to consider all of the following when downloading from the Internet except

your anti-virus software will ensure your files are safe.

Sometimes used to create prototype models for casting, ___ printing is also known as additive manufacturing.

3D

When you buy a new laptop, how much RAM should it come with?

4-8 GB

Which of the following are the steps involved in programming?

Categorizing which parts of a task a digital device can perform Describing the task in a precise manner. Describing the task in a precise manner. Translating the task into the language the computer's CPU can use

EDI stands for ___ .

Electronic Data Interchange

The main governmental organization that oversees Internet privacy is the Federal ___ Commission.

Trade

true or false: The amount of RAM a computer comes with or the ability to expand it's RAM is an important consideration when buying a new device.

True

Select the popular video teleconferencing applications.

apple facetime google hangout microsoft skype

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ___ .

data analyst

One disadvantage of cloud storage is that

data is only available when you're online.

Devices with a separate system unit and a relatively large footprint are called _____ computers

desktop

If your debit card has been compromised U.S. Federal law says you are only liable for a maximum of _____ in fraudulent charges if you tell your bank within two business days of learning about them.

$50.00

Select the statements that refer to color depth.

- also known as "bit depth" also known as "bit depth" - a measure of the accuracy of the color of each pixel a measure of the accuracy of the color of each pixel - specifically, the number of bits of data describing each pixel in a display specifically, the number of bits of data describing each pixel in a display - the number of pixels in a display

Which are true regarding a screen's resolution?

- equals the number of pixels in a display equals the number of pixels in a display - measures image quality

Which statements refer to a display's contrast ratio?

- luminance of white pixels compared to the luminance of black pixels - describes the number of pixels in a display

The text contained in about 4 books uses approximately ___ times more data than a short email.

1,000

Match the following: 1. Input 2. Output 3. Storage

1. Input: Entering text in a word document. 2. Output: Playing a song from Spotify. 3. Storage: Putting a photo onto a USB drive (thumbdrive).

Match the conversion methods with the correct description in the system implementation step of the SDLC: 1. Pilot 2. Direct 3. Phased 4. Parallel

1. Pilot - starts in one area of the organization and then is deployed to the rest of the organization 2. Direct - shuts down the old system and starts the new system 3. Phased - implements new areas of the system in a predetermined period of time 4. Parallel - old and new systems run side-by-side for a while

Twitter recommends using no more than ___ hashtags per Tweet.

2

Business owners, copyright holders, and network administrators publish ___ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.

AUPs

AJAX stands for ___ JavaScript and XML.

Asynchronous

A global nonprofit organization that empowers people to create open resource materials that can be shared or reused is called _____ Commons.

Creative

The system analysis step of the SDLC involves 3 phases. Select these three phases.

Data collection Analyze data Prepare the system specifications.

What technology allows for the electronic communication of business oriented transactions and information between people and organizations?

EDI

Which of these should business owners do to help protect their data.

Establish strong firewall protection for their business's network. Ensure antivirus software is installed and up-to-date. Create strong password protections and protocols.

All of the following are considered e-commerce transactions except

G2B

Which of the following statements about Instagram are true?

If you don't want to be tracked turn off geo-tagging in the settings under Location Services. If you don't want to be tracked turn off geo-tagging in the settings under Location Services. It is important to adjust your privacy settings so you can determine who follows you.

Which is true regarding the length of a USB cord?

In general, the more data being transmitted, the shorter the cord should be.

All of the following are true about Instagram except

Instagram charges a fee to download the app

Select the true statements regarding Instagram.

Instagram is a photo sharing app that is available for download to a variety of digital devices. If you specify a location with your photo, you can opt to have Instagram check you in on Foursquare.

Select the usual roles of information systems (IS) technicians.

Installing IS hardware and software. Maintaining IS hardware and software. Repairing and replacing IS hardware and software.

The largest chip designing and manufacturing company in the world is ____ .

Intel

Once the algorithm or plan has been created, the next step in the PDLC is to write the coding for the program. This highly structured process may be completed using which languages?

Java Javascript C++

All of the following are common ports that are included with laptop computers except

MIDI ports

Because of their capability of storing data in multiple hard drives, data warehouses use ___ technology to ensure redundant data storage.

RAID

The instructions needed to boot-up a computer, such as the BIOS, are typically stored in ___ .

ROM

Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?

SCMS

The titles in the DMCA that directly impact digital copyright issues include all of the following except

Title 5 - Copyright Protection Proviso.

Television displays with resolutions of at least 3840 x 2160 pixels are referred to as ___ .

UltraHD

While not technically a programming language, ___ refers to the protocols that allow content to displayed on the web.

XML

Which of the following are true statements regarding LinkedIn?

You can use LinkedIn to apply for jobs. LinkedIn includes a resume tool to assist you in creating a professional resume.

DVDs store data using ___ .

a reflective coating that has pits and lands

A test of new software conducted by the programmers themselves or by contracted evaluators working alongside the programmers is one of the first phases of the testing process in the PDLC. This is referred to as a(n) ___ test.

alpha

The second step of the SDLC process involves collecting data about existing hardware and software, analyzing this data, and preparing specifications for the system. This is called the system ___ step.

analysis

The final steps in the PDLC process include testing and documenting the software. When testing is conducted by potential customers of the software, it's referred to as a(n) ___ test.

beta

If it can be answered as either yes or no, or true or false, the question is called ___ .

binary

Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a(n) ___, which closes the access point used by the hacker.

block

This technology provides short-distance wireless communication between electronic devices using extremely low power radio signals.

bluetooth

Select appropriate LinkedIn contacts.

business contacts professional peers

One character of information, for example, a letter or a number consists of one ___ of storage

byte

Most PC games have been written in either ___ or ___ .

c c++

Most touchpads use _____ to sense when a finger has moved across the pad.

capacitance

Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on ____ .

checks

Emailing a file to yourself is an example of using ___ storage.

cloud

A program that takes an entire program, check the source code for errors, and converts it into machine language is a ___ .

compiler

A digital device that accepts input, processes and stores the input, and provides output is a ____ .

computer

Stealing confidential materials such as copyrighted material, confidential information, or company emails from a network is called ___ . Most often, this crime is committed by employees inside the company rather than outside hackers.

data theft

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ___ .

database administrator (DBA)

After the code has been written there are nearly always mistakes. The 4th step in the PDLC involves finding and correcting these errors in a process called ___ .

debugging

In order to ensure that employees understand what's appropriate and what's inappropriate use of company computer equipment, software, and networks, employers must set ethical computer use standards. Failure to set such policies can lead to which of the following?

decreased employee performance decreased network speed decreased network speed increased likelihood of security breaches

Purchasing the necessary software for the system is part of the system ___ step in the SDLC process.

development

Screen size is measured by the ___.

diagonal distance between the upper right and lower left corners of the screen

Transferring a file from the Internet to your digital device is called _____.

downloading

Using a stylus and touchpad to map the signature and also measure pressure, pen angle, pen up/down, speed, etc, is known as what type of signature recognition?

dynamic

Software theft occurs when someone engages in all of the following except _______.

erasing a program you purchased then sold to a friend

Defining the problem is the ___ step in the Program Development Life Cycle.

first

A graphic representation of a process is called a ___ .

flowchart

After the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a ___ and is written in an ordinary language, such as English.

flowchart

All of the following are true about RFID except

high-frequency RFID can transmit signals further than 1500 feet.

Select the characteristics of a CD.

holds approximately 700 MB of data uses pits and lands to store data

A refracted laser beam striking a photoreceptor from many different angles allows ___ storage to retain many bits of data in the same location.

holographic

All of the following should be considered when using Twitter except

if a Twitter user has been blocked you can file a formal complaint through Twitter.

These facilitate getting data and information into your computer.

input devices

To protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products, there are ___ property laws.

intellectual

A mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or a ____ computer.

laptop

A process that has an initial value, a process, and a test condition that can potentially return the program to the initial value is called a ___ .

loop

Megahertz is equal to one _____ cycles (or instructions) per second.

million

Which of the following is a strength of the Android platform?

most widely used OS for smartphones and tablets

The standard code of respectful behavior governing the use of electronic communications software and hardware is called electronic etiquette or _____.

netiquette

All of the following are part of an RFID system except _____.

network

All of the following are protected against unauthorized use or distribution by intellectual property laws except

open educational resources

Many manufacturers have made _____ optional equipment when purchasing a new laptop computer.

opitcal drives

In photography, there are 2 ways to focus on distant objects, digital zoom and ____ zoom.

optical

Rank the storage capacities from highest to lowest. Start with the highest capacity first.

petabyte terabyte gigabyte megabyte kilobyte

When you personally share an image on Pinterest it is known as a _____.

pin

Select the advantages of helium hard drives over traditional hard drives.

platters spin faster Platters stay cooler. More platters can be placed in the same amount of space.

All of the following are best practices when using LinkedIn except

post vacation photos to show your friends where you've travelled.

An output device that uses light to display video or image output on a surface is called a ___ .

projector

Select the reasons to compress a file.

reduce storage space requirements reduce bandwidth needed to transmit a file

Select the characteristics of computer storage.

retains data when power is turned off sometimes referred to as secondary storage

Two main factors concerning your digital identity are privacy and ___.

security

Data from the hard drive reaches the CPU ___ than data from the RAM.

slower

Devices that allow for the retention of data when your computer has been shut down are called ___ devices.

storage

The component of a computer that allows data to be retained after power is turned off is referred to as _______.

storage

Because Objective-C was difficult to write in, Apple developed ___ , a programming language for writing software for the Mac OS and the iOS.

swift

The final step in the system development life cycle is maintaining the system. Select the two phases of this step.

system audit evaluation phase

Select activities that would be considered software theft.

taking a registration code from the Internet and using it register a program that you didn't purchase illegally copying a program illegally copying a program stealing software programs

Select the output devices.

televisions printers

HTML and it's 5th revision (HTML5) allow content to be displayed on ___ .

the world wide web

True or false: The platform or operating system of a computer controls all of the functions of a computer.

true

true or false: Applications are computer programs created to execute specific tasks.

true

true or false: The processes of removing software from a computer is called uninstalling.

true

WhatsApp users can create groups, and send _____ images, video and audio messages for free.

unlimited

A digital identity is comprised of a variety of digital attributes including

usernames and passwords. usernames and passwords. online search activities. online search activities. personal data such as your social security number and birthdate.

Select the characteristics of SSD storage.

uses flash technology uses flash technology uses the same technology that is found in USB drives has no mechanically moving parts

Select the characteristics of a traditional hard drive.

uses magnetically charged plates to store data commonly found in desktop computers


Related study sets

Ch 30. Overview of European Colonialism-1

View Set

Microsoft Licensing: Fundamentals

View Set

Metric System and Metric Conversions

View Set

Potable Water and Water Treatment

View Set

Health Test Review Tobacco, Alc, and Drugs

View Set

Chapter 4: Theoretical Foundations of Nursing Practice Review Questions

View Set

Vascular Technology Registry Review

View Set