CSC 120
Information systems include a collection of technical and human resources providing technological solutions for an entity or enterprise.
True
Protocols are used to determine how information is exchanged
True
Internet addresses are classified by domains like .gov, .edu and .net.
False
Nano technology refers to larger than life technology.
False
Types of networks include all except,
SAN
Major browsers include
Safari, Chrome & Firefox
Which of the following displays an incorrect domain name?
www.newyork.new
What is the protocol used for the Internet?
TCP/IP
3-D describes depth perception
True
4GL languages typically use real world objects as a basis for modeling software components.
True
A bus network broadcasts signals to all devices.
True
A gateway is a bridge to another LAN using the same protocol
True
As files are written and deleted, hard disks can become fragmented.
True
Authentication ensures that uses are who they say they are.
True
Bluetooth devices use short-range radio waves to transmit data.
True
Security is important because it is there are many security breaches that can cause loss or potential loss of data, equipment, and individuals.
True
The ARPANET was the beginning of the Internet.
True
The Internet is a massive network of networks, a networking infrastructure connected globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the Internet.
True
The data function of control allows the granting of permission to access data.
True
The only difference between cyberharrassment and cyberbullying is the age of the perpetrator.
True
The processor has two components, the ALU which handles the data manipulations and the control unit that handles the processor activities.
True
Unintentional acts can cause as much or more damage as intentional acts.
True
When virtual memory is used, that means the RAM is overloaded.
True
Simple set of instructions
algorithm
The Graphical User Interface is a program interface that
all of the above
Money or other valuable assets cannot be lost through the use of computers or computer systems.
False
Platforms are the only way files can be shared between different systems
False
Productivity software is designed and programmed for an individual customer, and can be very costly
False
Software developed for, marketed and sold to the general public is known as custom software.
False
Standard keyboards in the QWERTY design provide comfort, efficiency, and safety in the design of the workplace.
False
Storage media are not a function of data security and therefore do not need to be safeguarded.
False
Symbols and numbers were the only data used with the languages introduced by the third generation of computer programming.
False
Tablet computers can only respond to voice commands.
False
The Internet Society owns the Internet.
False
The OSI model defines a networking framework to implement protocols in nine layers.
False
The binary number system uses 8 digits to represent all data in a computer system.
False
The syntax used in 3GL is very close to human language which is an improvement from the previous generation of languages.
False
Accidental problems are only caused by the computer user, never the computer itself.
False
After you have looked at implementing safeguards for your computer system, you further protect it by looking at your risky behavior to modify them.
False
An early programming language called assembly language is the actual language that the computer understands.
False
Antivirus programs help protect your computer against pop-ups, slow performance and security threats caused by spyware and other unwanted software
False
Availability means the information needed from a computer system is not altered by unauthorized persons.
False
Cable moderm allows internet connection through mobile devices.
False
Command-line interfaces are no longer in use.
False
Communication software is not an interface for the user. It only helps users to connect to one another.
False
Computer Telephony uses telephone wire to transmit data.
False
Controllers are used to send data to and from the motherboard.
False
Embedded computer components can be removed and placed in different systems.
False
Hard copy is data and information that can only be view using a digital display unit like a monitor or LCD projector.
False
If you use an ISP to connect to the Internet, your computer is no longer part of a network.
False
Information travels between components on the motherboard through groups of wires called Expansion Slots.
False
Intelligent machines are programs that have "conversation" between the user and the computer program
False
Internet Service Providers (ISPs) only offer cable and DSL broadband connections. For other connections, you have to connect directly.
False
It's not important to backup your files. Once you save them you don't need to worry about losing them.
False
User interface refers to how the user connects the computer's peripherals to the system unit.
False
Pharming sends an email that falsely claims to be a legitimate enterprise in attempt to scam the user into surrendering private information to be used for identity theft.
False (Phishing)
Data storage that holds more that hold more than 1 million bytes of information
Gigabyte, Petavyte, and Terabyte
From the list below, choose the option that is not an accurate description of a Tower Case.
Mid cases are cubed or rectangular in shape and used for specialized motherboards
The ALU performs the actual operations on the data, including all of the basic operations except
Multiplication
Operating system that resides on a server allowing a group of computers to connect and share resources.
NOS
Choose the option that is not a part of the motherboard.
NOT IDE NOT BIOS
Technology that allows machines to determine what humans are saying.
Natural language processing (NLP)
Processing can be done in all the following ways except
No core
Every device of a network is called?
Node
Command-line interface systems
Not A and not D
What is booting a computer?
Powering up and loading operating system commands
Which of the following statements about the computer is false?
Primary Memory (RAM stores programs and data. When the computer you log off, the contents of RAM are automatically moved to storage.
The four primary functions of computer system components include all of the following except
Print Information
Which of the following opition is not accomplished by the control unit?
Providing logical and computational capabilities
Which type of memory is considered unalterable or permanent?
ROM
Which step is not a part of the Machine Cycle?
Retrieve
Every device has exactly two neighbours.
Ring
Layer of the OSI model that manages the connection between network applications.
Session Layer
A keylogger is a type of surveillance software that has the capability to record every keystroke you make to a log file.
True
Access to Web documents, called Web pages, is done via hyperlinks.
True
An electronic device that scans printed or handwritten text documents, images, or a particular object to convert them into a digital file format is a scanner.
True
Artificial intelligence is a branch of computer science that focuses on trying to make computers behave like humans
True
COTS us an acronym for commercial off-the-shelf software.
True
Clusters share common characteristics and can be used to target segments
True
Cryptography ensures the protection of information by using code and a secret key.
True
Email uses asynchronous network technology.
True
Fifth generation languages test the use of neural networks with computer technology.
True
Google Drive allows you to compose files, share files and folders, and keep your documents organized.
True
Hyperlinks are elements in an electronic document that link to another place in the same document or to a different document.
True
In order to protect your computer system from a malicious threat, you should never use the Internet without virus protection software.
True
MAN is biger than LAN.
True
Microsoft Edge enables you to view Web pages using a graphical interface.
True
Multi-Touch input devices include the smart phones and tablet PCs.
True
Neural networking is a process used to turn raw data into useful information using software to look for patterns in large batches of data
True
Poor managment and data security issues are disadventages of using computer networks.
True
Portable computers are small enough to be carried around.
True
Ports are located on the outside of the computer system box and are used to attach peripherals.
True
Semantic Analysis is a more sophisticated form of Natural Language Processing focused on the process of stringing words together.
True
Social networking use dedicated websites and applications to interact with people from various parts of the country and world.
True
Software programming is the link between human language and machine language.
True
Storage holds data, instructions, and information for future use. It is a permanent holding placed for data and information.
True
The WWW uses HTTP transmission protocol.
True
The hard disk is a common example of persistent storage.
True
Port that is replacing serial and parallel ports.
USB
Which of these closely defines what network topology is?
Virtual structure of a network
which of the following term is not associated with wireless network?
WAN
Apple gadgets of the 2010's
Watch, iPad, and AirPod
The difference between the Web and Web 2.0 is:
Web 2.0 focuses on collaboration and information sharing
Productivity Software includes all of the following except
Windows 10
Domain Names
both
Physical security protects computer systems from the people who work in an organization.
false
The security function of detection means that you must prepare yourself to pull up your backup files and restore from scratch.
false
When you buy software you are purchasing a EULA license that allows you to
legally use the software
All of the following are true about Windows Defender except
prevents unauthorized access
With cloud storage you can do all except
text message
How your data is managed is part of data function security.
true
The data functions of switching, interchanging, transmitting, and receiving refer to how data travels along telecommunications media and should be protected during those functions.
true
The difference between an attack and a vulnerability is that a vulnerability is a weakness in a controlled system, where an attack takes advantage of a vulnerability to cause loss or potential loss.
true
The programs used to direct the operation of a computer, as well as documentation giving instructions on how to use them is the definition of software.
-
This application is an online version of the Microsoft Office application suite giving users the experience as if the software is running from their personal computer.
-
Software piracy is
A violation of copyright and/or patent laws
An access point is a hardware device or computer software that is used as a communication hub for wireless device users to connect to a wired LAN.
Access Point
Adventages of computer networks?
All of the above
Productivity software allows you to produce
All of the above
Which of the following network is called a file sharing network?
All of the above
Gadgets of the future include
An umbrella that can detect weather
Utility programs can complete all of the following tasks except
Antivirus Protection
Numbering system that uses 2-digits to represent everything a computer can understand.
Binary
Technology used to provide short-range data and voice communication.
Bluetooth
Graphical user interfaces
Both
Storage devices that can be hardware components of your personal computer include all of this list except
Cloud
Science that combine multiple studies to learn how the mind functions and, when applied to AI, how machines can simulate human thought and action.
Cognitive Science, True
When actual program code that the developer created has run through a special program that translates the source code into a form that the computer can understand, ________________ is produced.
Complied Software
When organizing files and folders, you can do all the following in File Explorer except
Defragmentation
Slowest form of internet connection is?
Digital Subscriber Line
The card that connected to motherboard to transmit data is called?
Ethernet
A byte is the smallest unit of information a computer can process. It is represented by a 0 or 1.
False
A computer is any system that can process data, but the input and output must be done by a separate device.
False
A neural network is a form of artificial intelligence that attempts to imitate how the human nervous system works.
False
Most Operating Systems
-
Real-time communication network is?
Synchronous
Wireless broadband connections include
Satellite
Network topologies include all except
Cash
A popular encoding system used is called
ASCII
Peripheral devices
All of the above
Home networks commonly use?
Star Topology
You create Web pages using
Website Builders
In an information system, the software includes entities needed to carry out the telecommunication process. These entities include,
-
Apps can only be used on mobile devices.
-
What is a Node?
A processing location, like a computer or printer.
A digitizing device is an input device that can take samples of the real world and convert it into a form that a computer can use. They include each of the following except
Key Boards
Branch of AI that gives tecnology the ability to learn a task without pre-existing code
Machine Learning
This computer is used to send data to multiple systems in remote locations.
Mainframe
Components of the motherboard include all except
Peripherals
Desktop and workstation computers are for single use, but
The desktop is on the low end of the processing scale
The most common forms of electronic infection include all of the following except
Computer viruses fall under the category of natural disasters
false
If your passwords, passcodes, or other access data are left in a secure place, they are vulnerable to unauthorized access.
false