IT in Business Exam 1
____ is an example of a popular general purpose software suite for personal computer users a) Google Chrome b) Snow Leopard c) Mozilla Firefox d) Microsoft Office
d) Microsoft Office
The protocols used on the internet are arranged according to a structure known as the _____ protocol architecture. a) FTP b) SMTP c) HTTP d) TCP/IP
d) TCP/IP
Which of the following is NOT true regarding to transmission media types: a) coaxial cable is more expensive than twisted-pair wires b) twisted-pair wire is widely available c) fiber-optic is the most expensive to purchase and install d) coaxial cables are used for telephone services
d) coaxial cables are used for telephone services
_____ is a special software program that converts the programmer's source code into the machine-language instructions. a) programming language b) syntax c) protocol d) compiler
d) compiler
Which of the following is a characteristic of volatile memory? a) processor heats up during the operation b) files are stored permanently c) processing of data is very slow d) contents are lost when power is off
d) contents is lost when power is off
The area covered by one or more interconnected wireless access points is called: a) LAN b) Webpage c) RFID d) Hotspot
d) hotspot
A(n) _____ device provides data and instructions to the computer and receives results from it. a) back-side b) expansion c) internal d) input/output
d) input/output
When an individual buys a program for his or her personal computer, he or she is actually buying a software____. a) copyright b) trademark c) patent d) license
d) license
A ________ is a small, lightweight, power-conserving, computing device that is capable of wireless access. a) PC b) mainframe computer c) server d) mobile device
d) mobile device
Sara Beth and Taylor have developed a new software that they plan to distribute for free, allowing other software professionals to study, change, and improved it. Their software is an example of _________. a) an app b) an operating system c) a simulation system d) open source software
d) open source software
_____ is/are considered to be the most important element in computer-based information systems a) bandwidth b) software applications c) standard operating procedures d) people
d) people
Completing an instruction involves two phases-instruction and execution-which are each broken down into two steps for a total of four steps. Which of the following is NOT one of the four steps? a) fetch instruction b) store results c) execute instruction d) process data
d) process data
Java, C#, and VB.NET are examples of ________. a) thin-client applications b) client operating systems c) structured queries d) programming languages
d) programming languages
A ____ is a set of rules that programs on two communicating devices follow a) codec b) cloud c) packet d) protocol
d) protocol
Adobe Acrobat is an application that allows users to create and edit digital documents. This is an example of_____. a) hardware b) virtualization c) business intelligence d) software
d) software
____ are the most powerful computers with the fastest processing speed and highest performance a) blade servers b) workstations c) mainframe computers d) supercomputers
d) supercomputers
All of the following are advantages of proprietary software except: a) you can get exactly what you need b) you can easily modify the software and add needed features c) being involved in the development process offers more control over the results d) the software is likely to be high quality because many customer firms have tested the software
d) the software is likely to be high quality because many customer firms have tested the software
A lightweight computer with no storage power built to connect to a server from a remote location is called a ________. a) widget b) bot c) plug-and-play program d) thin client
d) thin client
Advanced Research Project Agency (ARPANET) is the ancestor of the internet: True False
True
Ronald runs both Windows 7 and Linux on his personal computer. This process is called virtualization. True False
True
Which of the following statements is true of information technology (IT)? a) IT refers to the abilities, tools, methods, inventions that are used for the purpose of producing information b) IT is an umbrella term that covers information systems and the products, methods, inventions, and standards used to produce information c) IT and information systems are synonymous with each other and can be used interchangeably d) IT is an assembly of hardware, software, data, procedures, and people that produces information
a) IT refers to the abilities, tools, methods, inventions, that are used for the purpose of producing information
Computers that reside in different geographic locations are connected using a(n) ________. a) WAN b) LAN c) URL d) XML
a) WAN
When you are looking for a 'hotspot' you are searching for ____. a) a wireless access point b) bluetooth c) free charging stations d) strong satellite signals
a) a wireless access point
The term "open source" means that the source code of the program is _____. a) available to the public b) compatible with both 32-bit and 64-bit processors c) available for licensing if desired d) available only to carefully vetted contractors
a) available to the public
The speed of a CPU is expressed in cycles called ________. a) hertz b) knot c) Mach d) rev
a) hertz
Which of the following is the distinguishing feature of LANs? a) single location b) number of computers c) bandwidth d) hardware requirement
a) single location
An operating system like Windows or Linux is an example of the _____ component of an information system a) software b) hardware c) data d) procedure
a) software
Pinterest, a visual bookmarking Website, logs more than 14 terabytes of new data each day, which means its storage needs are constantly changing. As a result, Pinterest has turned to Amazon for _______. a) a storage as a service b) grid computing c) parallel computing d) infrastructure as a service
a) storage as a service
Anti-virus is an example of _____. a) utility program b) operating system c) programming language d) groupware
a) utility program
______ is not only buying and selling of goods and services but also providing information over computer networks a) E-commerce b) E-business c) E-government d) M-commerce
b) E-business
A (An) ____ is a number that identifies a particular device on the network a) domain b) IP address c) hyperlink d) href
b) IP address
Which of the following is a critical characteristic of good information? a) abundance of detail b) completeness c) low cost d) ease of creation
b) completeness
The value of information is directly linked to how it helps decision makers achieve their organization's _____. a) cost/profit target b) goals c) cost reduction initiatives d) customer satisfaction levels
b) goals
A private internet that is used exclusively within an organization is called a(n) ________. a) Ethernet b) intranet c) cloud d) server
b) intranet
To run a program or process data, the computer first transfers the program or data from disk to the ________. a) optical drive b) main memory c) input device d) ROM
b) main memory
A type of memory whose contents are not lost if the power is turned off or interrupted is said to be _____. a) unarbitrary b) nonvolatile c) inaccessible d) nonadjacent
b) nonvolatile
CPU clock speed is the _______________ at a predetermined rate. a) number of instructions processed b) number of electronic pulses created c) number of files created d) number of memory pages loaded
b) number of electronic pulses created
_______ is an error, flaw, failure or fault in a computer program that causes it to produce an incorrect or unexpected result, or to behave in unintended ways. a) Spam b) Software bug c) software updates d) interpreter
b) software bug
Source code is computer code ____. a) that is represented as bits and bytes b) that is written by humans c) that is not understandable by humans d) that cannot be modified
b) that is written by humans
Which of the following mobile operating systems is licensed by Google? a) Blackberry OS b) Symbian c) Android d) Windows RT
c) Android
_____ an integrated software that is used to plan for all the required recourses of functional areas in an organization a) SCM b) CRM c) ERP d) MIS
c) ERP
A network that connects your personal devices that are located close together is called: a) LAN b) Bluetooth c) PAN d) VPN
c) PAN
______ is a personal application software that includes a wide range of built-in functions for statistical, financial, logical, database, graphics, and date and time calculations. a) Word processing b) Desktop Publishing (DTP) c) Spreadsheet d) Graphics
c) Spreadsheet
According to Moore's Law, the ________. a) price of an integrated chip reduces once in 18 months b) performance of an integrated chip doubles every year c) the amount of digital data is expected to double every two years d) density of a transistor decreases every year
c) The amount of digital data is expected to double every two years
________ is a wireless protocol designed for transmitting data over short distances, replacing cables. a) IPv6 b) PaaS c) Bluetooth d) IPv4
c) bluetooth
To improve performance the CPU keeps frequently used instructions in the _____. a) nonvolatile memory b) main memory c) cache d) hard disk
c) cache
As production manager at a bottling plant for a cola manufacturer, you receive reports containing figures for raw materials from last year, but stated as the current year's. This information would qualify as bad information because it is ____. a) late b) voluminous c) inaccurate d) too narrow in score
c) innacurate
_____ a technique that enables a computer to execute programs and manipulate data files larger than main memory. a) multitasking b) multiuser c) swapping d) multiprocessing
c) swapping
Google Chrome is a: a) System Software b) Web programming language c) Web browser d) Website
c) web browser