MIS Test
SlamBook is a social networking site which currently has around 2,000,000 users. The company has always valued its users' privacy and has taken extensive measures to safeguard it. However, SlamBook has recently faced severe customer backlash regarding privacy issues associated with one of its applications. Which of the following statements would best explain the apparent discrepancy above? A) Recently, the government introduced stringent privacy regulations for Internet firms. B) The application did not have any provisions that restricted minors from using the application. C) MyPlace, SlamBook's closest competitor, had seen great success with a similar application and an opt-out system. D) Launching opt-out applications instead of opt-in applications is an industry trend. E) The application was an opt-out system, whereby all users were enrolled by default.
...
Which of the following is as an example of nearshoring? A) British Airways moves customer relations and passenger revenue accounting to India. B) Parts of Airbus and Boeing airplanes are designed and engineered in Moscow, Russia. C) McKinsey sets up a global research division in India. D) Worldwide banking group HSBC moves back-office operations to India. E) T-Mobile moves part of its content development process from India to the Czech Republic.
...
Which of the following statements is true about online privacy? A) A vendor cannot track the Web pages you look at. B) A vendor cannot track what products you examine in detail. C) A vendor is not capable of knowing the method of payment you choose to use. D) A vendor is not required by law to respect your privacy. E) A vendor cannot know where you are having the product delivered.
A vendor is not required by law to respect your privacy.
The digital divide is one of the major ethical challenges facing society today when you consider the strong linkage between computer literacy and a person's ability to compete in the information age. Which of the following statements, if true, would widen the digital divide? A) According to Moore's law, the cost of computing is expected to decrease drastically over the next few years. B) Companies like Microsoft and Berkshire Hathaway have invested billions of dollars in research on information technology. C) IT firms are concerned about and are conducting extensive research on the obsolescence of technology. D) The increase in the need for innovative technology has increased the cost of research, which has resulted in an increase in the cost of computing. E) Certain IT firms are conducting exclusive research to make the technology product life-cycle longer.
According to Moore's law, the cost of computing is expected to decrease drastically over the next few years.
According to Nicholas Carr, cloud computing may contribute to the decline in outsourcing. Which of the following justifies this statement? A) An IT outsourcer's business is built around managing complex internal systems. A shift to a simpler cloud-based IT infrastructure should reduce the need for outsourcers. B) Outsourcing is based on the availability of cheap labor; these workers will not be able to work on complex cloud-based IT infrastructures, thereby contributing to the decline in outsourcing. C) Cloud computing is customized in each country, thus making it impossible to outsource. D) Cloud computing is standardized in all countries, reducing the need for outsourcing. E) An IT outsourcer's business is built around managing simple internal systems. A shift to a complex cloud-based IT infrastructure would discourage outsourcing.
An IT outsourcer's business is built around managing simple internal systems. A shift to a complex cloud-based IT infrastructure would discourage outsourcing.
________ is the transmission capacity of a computer or communications channel. A) Latency B) Throughput C) Bandwidth D) Jitter E) Codec
Bandwidth
TransCorp is a medium-sized IT firm that is looking to outsource its payroll processes. Which of the following statements, if true, would most strengthen the decision to outsource? A) Companies in other countries can do the same amount of work at a comparable cost. B) Outsourcing has become a trend among most firms in developed nations. C) Companies in other countries are more efficient in all aspects of work, along with lower cost. D) Firms across the globe are adopting cloud computing systems. E) The firm is enjoying good profit margins.
Companies in other countries are more efficient in all aspects of work, along with lower cost.
TransCorp is a medium-sized IT firm that has outsourced its customer-service processes to the Philippines for the last two years. Which of the following statements, if true, would most weaken the decision to continue outsourcing? A) Most firms in the Philippines have been accused of poor working conditions. B) The firm's prime competitor recently withdrew its outsourcing process. C) Customers' complaints about the quality of service have risen dramatically over the past two years. D) According to a company survey, most employees feel that they require extensive training. E) The value of the company's stock recently fell by 5 percent in the New York Stock Exchange.
Customers' complaints about the quality of service have risen dramatically over the past two years.
The ________ Act of 1986 made it much more difficult for anyone, including the government, to eavesdrop on phone conversations. A) Electronic Communication Modernization B) Internet Privacy C) Sarbanes-Oxley D) Gramm-Leach-Bliley E) Electronic Communications Privacy
Electronic Communications Privacy
In his book The World Is Flat, New York Times foreign affairs columnist Thomas L. Friedman characterized the evolution of globalization as having distinct phases. During this globalization phase, mainly European countries were globalizing, attempting to extend their territories into the New World. Identify this globalization phase. A) Globalization 1.0 B) Globalization 2.0 C) Globalization 3.0 D) Globalization 4.0 E) Globalization 5.0
Globalization 1.0
________ refers to physical computer equipment, such as the computer monitor, central processing unit, or keyboard. A) Software B) Malware C) Data D) Hardware E) Telecommunication
Hardware
Which of the following statements is true about information systems (IS) and information technology (IT)? A) IS programs are more technical in nature than IT programs. B) IT programs have a stronger managerial focus than IS programs. C) Software and telecommunications are present in IS, but excluded from IT. D) The differences between IT and IS is increasing due to globalization. E) IT programs are more technical in nature, whereas IS programs have a stronger managerial focus.
IT programs are more technical in nature, whereas IS programs have a stronger managerial focus.`
________ refers to the delegation of a company's logistics operations to a subcontractor that specializes in that operation. A) Outsourcing B) In-forming C) Offshoring D) In-sourcing E) Licensing
In-sourcing
According to Thomas L. Friedman, which of the following is true about Globalization 3.0? A) Industries changed slowly and change took generations. B) Continents were brought closer together, shrinking the world "from size medium to size small". C) Individuals and small groups from virtually every nation joined the globalization movement. D) Mainly Americans and Europeans were globalizing. E) People didn't notice how it affected their lives due to the slow pace of change.
Individuals and small groups from virtually every nation joined the globalization movement.
________ is concerned with ensuring the authenticity and fidelity of information as well as with identifying who is responsible for informational errors that harm people. A) Information privacy B) Information accuracy C) Information accessibility D) Information property E) Information protection
Information accuracy
Which of the following occurred when Alvin Toffler's "third wave" gained speed? A) Society moved from a predominantly agrarian culture to the urbanized machine age. B) Occupations changed to accommodate the mechanized society. C) The ability to perform repetitive tasks became a quality to be instilled and valued. D) Individuals shifted from handicrafting items for sale to working in factories. E) Information became the currency of the realm.
Information became the currency of the realm.
________ is concerned with what information an individual should have to reveal to others in the workplace or through other transactions. A) Information accessibility B) Information accuracy C) Information privacy D) Information asymmetry E) Information piracy
Information privacy
________ are used to enter information into a computer using devices such as a keyboard and mouse on your personal computer, a biometric fingerprint reader to authenticate a person entering a secure laboratory, or RFID scanners to track valuable inventory in a warehouse. A) Processing technologies B) Storage technologies C) Input technologies D) Computational technologies E) Output technologies
Input technologies
Which of the following can be cited as an example of a digital divide? A) Unlike Joey, Ryan has access to more books and good advice because he studies in a better school. B) Unlike Ben, Claudia possesses superior analytical skills, which makes her better at mathematics. C) Kevin is more successful than Vincent because of his people skills. D) Lora has access to more information than Frank because she knows how to operate a computer. E) Trisha is wealthier than Neal because her father is a successful businessman.
Lora has access to more information than Frank because she knows how to operate a computer.
During the time of the industrial revolution, some individuals who felt threatened by the changes brought about by technology resorted to protesting against the technology. Identify these individuals. A) Luddites B) Utopists C) Millenarists D) Utilitarians E) Preterists
Luddites
Which of the following statements is true about data? A) It can be defined as a representation of reality. B) It is the ability to understand information. C) It has no meaning in and of itself. D) It is the ability to make decisions or predictions based on information. E) It organizes or manipulates information to make it suitable for a given task.
It has no meaning in and of itself.
Which of the following statements is true about information? A) It has no meaning in and of itself. B) It organizes or manipulates knowledge to make it suitable for a given task. C) It is raw material—recorded, unformatted words and numbers. D) It is a representation of reality. E) It is the ability to make predictions based on data.
It is a representation of reality.
Which of the following statements is true about secondary storage? A) The instructions and work stored in secondary storage are lost when the computer is shut off. B) It retains the data when the power to the computer is shut off. C) It is a temporary storage place for data that is currently being processed. D) It is considerably faster than primary storage. E) The work stored in secondary storage is lost when new data is placed.
It retains the data when the power to the computer is shut off.
According to Thomas L. Friedman, which of the following is true about Globalization 2.0? A) During this stage, mainly European countries were globalizing. B) It brought continents closer together, shrinking the world "from size large to size medium." C) During this stage, virtually every nation joined the globalization movement. D) It was interrupted by the Great Depression and the two world wars. E) During this stage, people didn't notice how it affected their lives due to the slow pace of change.
It was interrupted by the Great Depression and the two world wars.
Which of the following predictions made by Peter Drucker is true? A) Knowledge workers have lesser bargaining power than workers in other industries. B) Knowledge workers do not possess valuable real-world skills. C) Knowledge workers are not reliant on formal education. D) Knowledge workers are continually learning how to do their jobs better. E) Knowledge workers are not paid as well as their prior industrial counterparts.
Knowledge workers are continually learning how to do their jobs better.
Which of the following can be cited as an example of outsourcing? A) Microsoft hands over its customer service function to Convergys, located in India. B) Volkswagon acquires a steel manufacturing plant to reduce its overall production costs. C) Dell sources computer parts from suppliers located in Russia. D) Audi starts a manufacturing facility in China to take advantage of low labor costs. E) P&G acquires a retail outlet to reduce its distribution costs.
Microsoft hands over its customer service function to Convergys, located in India.
________ is the use of locations closer to the home country in terms of geographical, political, linguistic, economic, or cultural distance. A) In-forming B) Nearshoring C) Onshoring D) In-sourcing E) Outsourcing
Nearshoring
In 1994, a company called ________ released the first mainstream Web browser thereby opening up the possibilities of the Internet for the general public. A) Netscape B) Microsoft C) Opera D) Internet Explorer E) Firefox
Netscape
________ deliver information to you in a usable format. A) Output technologies B) Computational technologies C) Storage technologies D) Input technologies E) Processing technologies
Output technologies
________ networks enable any computer or device on the network to provide and request services. All members of the network have equivalent capabilities and responsibilities. A) Server-centric B) Server-to-peer C) Client-to-peer D) Peer-to-peer E) Client-centric
Peer-to-peer
________ define the procedures that different computers follow when they transmit and receive data. A) Consoles B) Ports C) Protocols D) Hosts E) Domains
Protocols
________ refer(s) to a program or set of programs that tell the computer to perform certain tasks. A) Software B) Telecommunication C) Hardware D) Data E) Networks
Software
________ is the collection of programs that control the basic operations of computer hardware. A) Application software B) Transitory software C) Systems software D) Open source software E) Peripheral software
Systems software
Which of the following statements is true about open source software? A) These programs are used by a few professional users. B) These programs do not include systems software. C) They are back-up software used when a system is converting from systems to application software. D) These programs do not include application software. E) These programs' source code is freely available for use and/or modification.
These programs' source code is freely available for use and/or modification.
Which of the following statements is true about servers? A) They are used to provide services to users within large organizations or to Web users. B) They are primarily used as the main, central computing system for major corporations. C) They are used primarily to assist in solving massive scientific problems. D) They are optimized for visualization and rendering of three-dimensional models. E) They are used for personal computing and small business computing.
They are used to provide services to users within large organizations or to Web users.
Which of the following statements is true about today's service-oriented IS personnel? A) They modify systems at a moment's notice to meet customer needs quickly and effectively. B) They patiently wait for customers to come in with systems complaints. C) They believe that they own and control the computing resources. D) They give reasons why customers' ideas cannot or will not work. E) They believe they should tell users what they can and cannot do with the computing resources.
They modify systems at a moment's notice to meet customer needs quickly and effectively.
Which of the following statements is true about processing technologies? A) They are used to enter information into a computer. B) They deliver information in a usable format. C) They define the procedures that different computers follow when they transmit and receive data. D) They transform inputs into outputs. E) They move data storage away from a centralized location to the"edges" of a network.
They transform inputs into outputs.
Which of the following steps should be taken to ensure ones privacy online? A) Avoid Web sites that are monitored by independent organizations. B) Visit Web sites anonymously. C) Adjust your Web browser settings to save cookies. D) Ensure you receive a confirmation e-mail whenever you buy products online. E) Maintain only one e-mail account and use it when making online purchases.
Visit Web sites anonymously.
WorldTravel (www.worldtravel.com) is a travel Web site that provides detailed information about the different places that tourists can visit across the globe. Additionally, it also helps visitors to book tickets and hotels in these destinations. Which of the following, if true, would most assure the customers about their online privacy? A) WorldTravel, when collecting personal information, explicitly states the purpose of the information and that it will not be used for anything else. B) WorldTravel informs its members that it is following the best practices in the industry. C) WorldTravel, when collecting personal information, explicitly tells all its customers that the information collected will be protected by a third party who specializes in this domain. D) WorldTravel decides not to send any spam mails to any of its members. E) WorldTravel, when collecting personal information, explicitly tells all its customers that the information collected is protected under the Electronic Communications Privacy Act.
WorldTravel, when collecting personal information, explicitly states the purpose of the information and that it will not be used for anything else.
Which of the following IS personnel is responsible for the maintenance of information systems? A) a systems analyst B) a database administrator C) a programmer D) an IS security manager E) a systems consultant
a database administrator
Which of the following IS personnel is responsible for coding, testing, debugging, and installing programs? A) a programmer B) a systems consultant C) an IS manager D) a systems analyst E) an IS security manager
a programmer
The ability to independently learn new technologies as they emerge and assess their impact on your work and life is called ________. A) computer assisted learning B) computer adaptation C) computer fluency D) computer compatibility E) computer programming
computer fluency
Which of the following is part of an IS personnel's systems knowledge and skills? A) hardware platforms B) business processes C) alternative development methodologies D) cabling and network interface cards E) application software
alternative development methodologies
The customer relationship management system and personal productivity software are examples of ________. A) application software B) peripheral software C) systems software D) transitory software E) open source software
application software
Operating systems are often written in ________, a very low level computer programming language that allows the computer to operate quickly and efficiently. A) structured query language B) hyper text markup language C) assembly language D) extensible markup language E) practical extraction and report language
assembly language
Uploading enables individuals to ________. A) access sensitive information on the Internet B) be producers of information instead of mere consumers C) copyright information available on the Internet D) save information found on the Internet onto their personal computers E) permanently remove information available on the Internet
be producers of information instead of mere consumers
Bandwidth is measured in ________. A) moles per second B) joules per second C) parts per million D) bits per second E) relays per second
bits per second
The ________ is responsible for performing all the operations of the computer. A) random-access memory B) central processing unit C) read-only memory D) application software E) operating system
central processing unit
A ________ is any computer on the network, or any software application that uses only the services provided by the server. A) peer B) client C) host D) console E) port
client
Microsoft's Exchange/Outlook and Lotus Notes, provide people with e-mail, automated calendaring, and online, threaded discussions, enabling close contact with others, regardless of their location. Identify this type of information system. These are examples of ________. A) collaboration systems B) office automation systems C) data mining and visualization systems D) functional area information systems E) transaction processing systems
collaboration systems
Which of the following is used to describe the issues and standards of conduct as they pertain to the use of information systems? A) virtual ethics B) social informatics C) cyber security D) computer etiquette E) computer ethics
computer ethics
Knowledge workers are professionals who ________. A) use knowledge to perform their jobs, but do not create knowledge B) create, modify, and/or synthesize knowledge as a fundamental part of their jobs C) use their skills to help others gain knowledge D) modify knowledge created by others, but do not create knowledge themselves E) work in the education industry
create, modify, and/or synthesize knowledge as a fundamental part of their jobs
Outsourcing has seen a huge increase because of the ________. A) increase in decentralization B) decrease in transportation costs C) increase in advertising costs D) decrease in telecommunication costs E) increase in the cost of raw materials
decrease in telecommunication costs
Information accessibility focuses on ________. A) defining what information a person or organization has the right to obtain about others B) identifying who is responsible for informational errors that harm people C) information that has been encrypted by the owner to make it unaccessible to others D) who owns information about individuals and how information can be sold and exchanged E) what information an individual should have to reveal to others in the workplace
defining what information a person or organization has the right to obtain about others
Information about "who am I, and where do I live?" is an example of ________. A) behavioral data B) geographic data C) psychographic data D) demographic data E) attitudinal data
demographic data
Which of the following is an example of an economic change brought about by globalization? A) increases in the frequency of worldwide fads and phenomena B) development of low-cost computing platforms C) availability of low-cost communication systems D) increases in the outsourcing of labor E) decentralization of organizations
development of low-cost computing platforms
Which of the following is a geoeconomic challenge of operating in the digital world? A) differences in network infrastructures B) differences in the concept of time and life focus C) differences in measurement units D) differences in export and import regulations E) differences in languages
differences in network infrastructures
Which of the following is a cultural challenge of operating in the digital world? A) conducting videoconferences across different time zones B) aging populations in the United States and Western Europe C) differences in power distance and uncertainty avoidance D) availability of labor force and salary differences E) differences in academic degrees and measurement units
differences in power distance and uncertainty avoidance
A global project called One Laptop per Child is attempting to distribute low-cost laptop computers to children in developing countries around the world in an attempt to shrink the ________. A) digital divide B) electronic gap C) power distance D) horizontal disparity E) knowledge gap
digital divide
The gap between those individuals in our society who are computer literate and have access to information resources like the Internet and those who do not is referred to as the ________. A) horizontal disparity B) digital divide C) electronic gap D) generation gap E) knowledge divide
digital divide
Which of the following is part of an IS personnel's technical knowledge and skills? A) systems analysis and design B) integrating subsystems and systems C) alternative development methodologies D) network operating systems E) technological communication and presentation
network operating systems
The purpose of an intelligent system is to ________. A) enable people to communicate, collaborate, and coordinate with each other B) create, store, analyze, and manage spatial data C) emulate or enhance human capabilities D) support the coordination of suppliers, product or service production, and distribution E) produce detailed information to help manage a firm
emulate or enhance human capabilities
Which of the following is an example of a technological change brought about by globalization? A) increases in the frequency of international travel B) increases in the levels of immigration C) enforcement of global patent and copyright laws D) decreases in the frequency of worldwide fads E) decentralization of organizations
enforcement of global patent and copyright laws
The purpose of a(n) ________ is to support and integrate all facets of the business, including planning, manufacturing, sales, marketing, and so on. A) intelligent system B) functional area information system C) electronic commerce system D) enterprise resource planning system E) management information system
enterprise resource planning system
Which of the following allows individuals to utilize powerful search engines on the Internet to build their "own personal supply chain of information, knowledge, and entertainment"? A) offshoring B) in-forming C) in-sourcing D) exporting E) outsourcing
in-forming
A ________ is used primarily as the main, central computing system for major corporations. A) microcomputer B) supercomputer C) server D) mainframe E) workstation
mainframe
A ________ is used for personal computing and small business computing. A) workstation B) microcomputer C) mainframe D) server E) supercomputer
microcomputer
A(n) ________ is also referred to as the computer's brain. A) random-access memory B) operating system C) read-only memory D) application software E) microprocessor or CPU
microprocessor or CPU
Aortego, a U.S.-based automobile company, has a manufacturing plant in India and has been able to reduce its manufacturing costs significantly because of the country's highly-skilled yet low cost labor. However, Aortego is forced to shift its plant from India to Canada because of the introduction of a new law which mandates that all companies collaborate with Indian companies before entering into the country. Which of the following best explains Aortego's shift from India to Canada? A) offshoring B) outsourcing C) in-forming D) nearshoring E) in-sourcing
nearshoring
U.S. companies move work from India back to Mexico or British Columbia in order to address some of the challenges associated with overseas destinations. This is an example of ________. A) in-sourcing B) outsourcing C) in-forming D) onshoring E) nearshoring
nearshoring
Aircraft manufacturer Boeing designed its new 787 Dreamliner aircraft in Russia, making use of the availability of highly skilled aeronautical engineers. Identify this strategy. A) offshoring B) outsourcing C) in-sourcing D) franchising E) licensing
offshoring
Which of the following refers to having certain functions performed by the same company but in a different country? A) outsourcing B) offshoring C) exporting D) licensing E) franchising
offshoring
In order to take advantage of the high quality talent pool, Ernst & Young sets up operations in the Philippines and moves part of its tax services to its new facility. Identify this strategy. A) outsourcing B) franchising C) offshoring D) in-sourcing E) in-forming
outsourcing
Which of the following best explains the process of moving business processes or tasks to another company? A) offshoring B) in-forming C) in-sourcing D) exporting E) outsourcing
outsourcing
The Internet relies on ________ technology to deliver data and information across networks. A) circuit-switching B) frame-relay C) packet-switching D) packet-sniffing E) store-and-forward
packet-switching
A ________ is any computer that requests and provides services. A) console B) client C) peer D) host E) port
peer
Which of the following tasks is performed by the systems software? A) writing a business letter B) managing a stock portfolio C) coordination of suppliers, product or service production, and distribution D) printing documents E) manipulating a series of forecasts
printing documents
Which of the following can be cited as an example of a supply chain management system? A) procurement planning B) market analysis C) knowledge portal D) sales force automation E) product demand forecasting system
procurement planning
In information systems management, a systems consultant is responsible for ________. A) analyzing business requirements and selecting information systems that meet those needs B) coding, testing, debugging, and installing programs C) auditing information systems for compliance with internal and external standards D) managing security measures and disaster recovery E) providing information systems knowledge to external clients
providing information systems knowledge to external clients
The CPU interacts with ________ for permanently storing data. A) primary storage B) volatile memory C) random-access memory D) output technologies E) secondary storage
secondary storage
A ________ is any computer on a network that makes access to files, printing, communications, and other services available to users of the network. A) workstation B) server C) microcomputer D) supercomputer E) mainframe
server
In ________ networks, servers and clients have defined roles. A) server-centric B) peer-to-peer C) peer-centric D) client-centric E) server-to-peer
server-centric
Toyota's automotive electronics systems and FedEx's Web site were not developed solely because managers in these organizations wanted to do things faster or because they wanted to have the latest, greatest technology. These organizations developed these systems to help gain or sustain competitive advantage. The choices made in developing the systems at both Toyota and FedEx were ________ in their intent. A) operational B) functional C) strategic D) departmental E) tactical
strategic
A ________ is the most expensive and most powerful kind of computer, which is used primarily to assist in solving massive scientific problems. A) supercomputer B) workstation C) mainframe D) server E) microcomputer
supercomputer
The operating system of a computer is an example of a(n) ________ software. A) systems B) open source C) transitory D) peripheral E) application
systems
The process of connecting separate information systems and data to improve business processes and decision making is known as ________. A) database development B) business intelligence C) systems integration D) application development E) collaboration systems
systems integration
Which of the following is part of an IS personnel's business knowledge and skills? A) information gathering and synthesis B) technological communication and presentation C) systems development life cycle D) problem identification and solution formulation E) virtualization
technological communication and presentation
Thomas L. Friedman uses the term "the steroids" to refer to technologies ________. A) that make different forms of collaboration digital, mobile, virtual, and personal B) that tightly integrate retailers, their suppliers, and their customers C) that allow firms to outsource business processes on a global scale D) that allow users to add, remove, or edit content from Web sites E) that allow individuals to build their own personal supply chain of information and entertainment
that make different forms of collaboration digital, mobile, virtual, and personal
Which of the following IS personnel is responsible for strategic planning and IS use throughout a firm? A) the chief information officer B) the IS security manager C) the IS manager D) the Webmaster E) the IS auditor
the chief information officer
Who owns the computerized information that is stored in thousands of databases by retailers, credit card companies, and marketing research companies? A) the government B) the Chief Information Officer C) the firm that maintains the database D) the customers themselves E) the company's IT department
the firm that maintains the database
Identify the purpose of a transaction processing system used in organizations. A) to support the activities within a specific functional area of the firm B) to handle day-to-day business event data at the operational level of the organization C) to support interaction between the firm and its customers D) to support the coordination of suppliers, product or service production, and distribution E) to enable customers to buy goods and services from a firm's Web site
to handle day-to-day business event data at the operational level of the organization
Identify the purpose of an office automation system. A) to processes day-to-day business event data at the operational level of the organization B) to provide access to databases in order to support quantitative decision making C) to support a wide range of predefined day-to-day activities of individuals and small groups D) to support interaction between the firm and its customers E) to support the activities within a specific functional area of the firm
to support a wide range of predefined day-to-day activities of individuals and small groups
A grocery store checkout cash register with a connection to a network is an example of a(n) ________. A) intelligent system B) functional area information system C) decision support system D) transaction processing system E) electronic commerce system
transaction processing system
Any input your computer receives is digitized and then is processed by the CPU. Which of the following explains the meaning of the word "digitized" in the preceding sentence? A) stored in random-access memory B) encrypted in the operating system C) stored in a hard drive D) translated into binary code E) converted into application software
translated into binary code
Which of the following best describes the phenomenon termed Web 2.0? A) using the Internet as a platform for applications B) uploading files on the Internet C) learning new technologies as they emerge D) setting up an online business E) downloading free software from the Internet
using the Internet as a platform for applications
The primary storage is also known as ________. A) volatile memory B) permanent memory C) nonvolatile memory D) protocols E) long-term memory
volatile memory
Information property focuses on ________. A) who owns information about individuals and how information can be sold and exchanged B) information that has been encrypted by the owner to make it unaccessible to others C) information an individual should or should not have to reveal to others in the workplace D) information a person or organization has the right to obtain about others E) the authenticity of information as well as responsibility for informational errors that harm people
who owns information about individuals and how information can be sold and exchanged
The term ________ refers to Web sites allowing users to add, remove, or edit content and is now often used synonymously with open source dictionaries. A) html B) ajax C) wiki D) perl E) Web 2.0
wiki
Designed for medical, engineering, or animation and graphics design uses, ________ are optimized for visualization and rendering of three-dimensional models. A) mainframes B) supercomputers C) workstations D) servers E) microcomputers
workstations
Which of the following tasks is performed by the application software? A) printing documents B) writing a business letter C) presenting information via a monitor D) updating the system clock E) saving data to a disk
writing a business letter