Exam 1 - Computer Information Systems

Ace your homework & exams now with Quizwiz!

Binary language consists of two digits, ________ and ________

0; 1

Most new laptop computers come with how much storage?

256 GB - 1 TB

Also known as additive manufacturing (AM), ________ printing sprays successive layers of material to create an object.

3D

When you buy a new laptop, how much RAM should it come with?

4-8gb

A form of E-mail fraud where criminals change the account where money is being transferred is called a(n) ________ scam.

A form of E-mail fraud where criminals change the account where money is being transferred is called a(n) ________ scam.

Along with the From line, what is the most important factor in ensuring your business message is read?

Along with the From line, what is the most important factor in ensuring your business message is read

The two main components of a processor are the control and the ________.

Arithmetic Logic Unit (ALU)

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?

DSS

Business management software that encompasses nearly all business activities in a corporation is called ________ software.

ERP

What is the acronym for End-User Licensing Agreement?

EULA

n application that navigates all of the files and folders on your Mac is the _______

Finder

The ________ computer creates images on your computer.

GPU

The ________ is a separate processor (computer) on your computer that enhances your video.

GPU

This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery.

Gait analysis

The processor directly houses the ________ cache.

L1

Most laptops, tablets, and smartphones use a(n) ________ display.

LCD

The technology (chips) that allow cell phone microphones and hearing aids to be so small is the ________ chip.

MEMS

All of the following are common ports that are included with laptop computers except ______

MIDI ports

Be careful to only open e-mail from senders you know and trust. ________ may be contained in e-mail messages.

Malware

A commonly used short-range wireless technology used for data transfer and electronic payments is called ________.

NFC

Apple Pay uses ________ for payment transfer.

NFC

Though currently expensive, curved and paper-thin displays are possible using ________ display technology.

OLED

The technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called

OMR

Printer speed is described using which acronym?

PPM

System BIOS (Basic Input/Output System) is stored in ________.

ROM

RFID stands for which of the following?

Radio Frequency Identification

Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?

SCMS

A combination input and output device that allows users to interact with large computer displays that is sometimes found in classrooms is called an interactive whiteboard or a(n) ________.

SMART board

Which of the following is not a presentation software term?

Speaker image

Which category of management information systems (MIS) focuses on tracking sales and inventories?

TPS

Laser printers are popular in offices because they use relatively inexpensive ________.

Toner

Television displays with resolutions of at least 3840 x 2160 pixels are referred to as ________.

Ultra HD

When referring to business information technology, MIS stands for ________.

When referring to business information technology, MIS stands for ________.

Smartphone cameras work by focusing incoming light onto what type of array that captures images?

active pixel scanner

A bus is a channel over which information flows. A bus has two parts: the ________ and the ________?

address bus; data bus

The mouse was developed by which company?

apple

The width of a screen compared to the height of a screen is referred to as ________.

aspect ratio

Inkjet printers are often sold ________ their production cost.

below

Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a(n) ________, which closes the access point used by the hacker.

block

Since its radio waves pass through walls or desktops, ________-capable devices are very popular.

bluetooth

Data flows between different computer parts via ________.

buses

In ASCII 8 bits are combined to create a ________.

byte

One ________ represents a letter, symbol, or number (one character) of information.

byte

Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on ________.

checks

What manages hardware and software, supports the computer's basic functions, and runs programs?

computer

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ________.

corruption

Stealing confidential materials such as copyrighted material, confidential information, or company e-mails from a network is called ________. Most often, this crime is committed by employees inside the company rather than outside hackers.

data theft

Which device carries a relatively large footprint and separate system unit?

desktop

How is the screen size of a laptop computer measured?

diagonally from left corner to right corner

RAM is ________ and has no moving parts.

electronic

The art and science of creating output that provides information in the most useful manner is called ________.

ergonomics

The number of times per second a frame in a video is advanced is the definition of _______

frame rate

What is equal to one cycle per second?

hertz

he SSD cost is ________ than the traditional hard drive cost.

higher

In the body of a professionally formatted business e-mail, where should a request be placed?

in the first sentence of the body of your e-mail

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ________.

information systems (information technology) technician

Josh is taking an Intro to Computers course and needs to use Microsoft Office to complete a variety of assignments. He has purchased the software, now he must ________ it so he can start his assignments.

install

Adding software to a digital device, or adding hardware components to a digital device is called ________.

installing

mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or a ________ computer.

laptop

It's always a good idea to check the ________ before clicking Reply to All.

list of addressees

A laptop typically has ________ RAM than a smartphone.

more

Which of the following is a strength of the Android platform?

most widely used OS for smartphones and tablets

The information in the memory (the RAM, the caches, the registers) is ________ when a computer is shut down.

not saved

In photography, there are two ways to focus on distant objects, digital zoom and ________ zoom.

optical

An input, output or storage device connected to a computer is known as a(an) ________.

peripheral

Using cells of ionized gas to create images, ________ displays are actually becoming less popular.

plasma

Though legal, which of the following would likely be prohibited by a typical business computer-use policy?

playing online games

The term that describes how fast each pixel in a display is updated is ________.

refresh rate

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ________ software.

remote desktop

The number of pixels in an image is called the image's ________.

resolution

Increased data transfer will be less likely to have errors if you use a ________ USB cord.

shorter

The average tablet has a ________ hard drive compared to the average desktop.

smaller

While not a required step in sending an e-mail, it's wise to ________ any message before clicking Send.

spell-check

Visiting pornography sites while using a company computer and/or network violates your company's computer-use policy. You've signed a policy that requires you to report any computer ethics violations to your boss. You observe a co-worker visiting porn sites at work and determine that you should report this activity. Other co-workers also noticed this violation. You shoul

tell your boss that you've witnessed the co-worker visiting porn sites while using the company computer or network.

The most common printers for printing receipts are ________ printers.

thermal

To create an image with a laser printer ________ is(are) drawn to the drum.

toner

Using information systems to help foresee corporate business opportunities and threats that might be done by all levels of management, but it is most important for which management level?

top-level managers

Used in a variety of devices including ATMs and point-of-sale terminals, ________ allow for the input of data with the use of a stylus or finger.

touchscreens

Today, many computers use ________, a coding scheme that uses at least 16 bits to represent a character.

unicode

Tiffany has purchased a new laptop. She noticed many unwanted programs came pre installed on her laptop. She wants to ________ the programs from her device so they do not take up storage space.

uninstall

The technology that uses cameras, microphones, displays, speakers, and software to allow users to both see and hear each other is called

video conferencing

ith ____ recognition technologies, frequency, pitch, speech rhythms, and other characteristics are charted and compared to existing records.

voice


Related study sets

Section Four: Agency in Michigan

View Set

ASTR 100 Midterm #2 Review Questions(Chapters 8, 18.4, 19-22, 24)

View Set

Unit 4: Macroeconomics, Inflation & the Business Cycle

View Set

Development of the teeth ch. 5 me

View Set

People of Congress (DO NOT USE "LEARN" ON THIS SET. USE "WRITE"!!!!!!!!!!!!!)

View Set

USAG Tough Coaching and Emotional Abuse

View Set

Texas Health and Life Insurance ExamFX

View Set

Physics 1st: Einstein's Theory of Special Relativity

View Set

Unit 4: Differentiating Instruction in an Inclusive Classroom

View Set

Human Skeleton, Bone Development, Growth, Types

View Set