IST 195 Final

Analysts often refer to the three ____'s when describing characteristics of Big Data.

V

Who can establish standard user accounts that allow alterations to security settings?

Administrators

Which of the following allows hiring managers to learn more about you beyond what you can convey in a traditional one-page paper resume?

Profesional online presence

In which of the following mouse operations do you press and release the primary mouse button?

click

What is the term for a communications device that connects multiple computers together and transmits data to its correct destination on a network?

Router

What is the general term for programs that act without a user's knowledge and deliberately alter the computer's operations?

Malware

What is the definition of a command?

an instruction that causes a program or app to perform a specific action

The operating system that a computer uses sometimes is called which of the following?

platform

What does a Project Management Professional (PMP) test evaluate?

knowledge of tasks required during system development

Which of the following is a set of hardware, software, data, people, and procedures that work together to produce information?

Information System

What kind of software provides the capabilities of adjusting or enhancing image colors, adding special effects such as shadows and glows, and the like?

Image Editing

Which of the following search texts will display pizza or sandwich places in New Orleans?
a. pizza + sandwich (New Orleans)
b. New Orleans (pizza or sandwich)
c. *New Orleans + pizza_sandwich
d. "New Orleans + pizza_or_sandwich"

B

A standard CD-ROM is referred to as this kind of disc because manufacturers write all items on the disc at one time. What is the term used?

Single Session

When using the interface shown in the accompanying figure, the set of instructions entered into a computer is called which of the following languages?
(Green text on black)

Command


____ apps can allow you to lock your mobile device and SIM card remotely.

Mobile Security

Which of the following allows the computer to collect data over time and process all transactions later, as a group?

Batch Processing

Which of the following style of tablet does not contain a physical keyboard?

slate

Which type of test is used to verify that all programs in an application work together properly?

A Systems Test

Your organization has a large number of servers. Which type of server are you most likely to choose as a result?

Blade

Which of the following is a query language that allows users to manage, update, and retrieve data?

SQL

Your manager has asked you to shift usage and consumption of technology resources from a local environment managed by in-house IT staff to the Internet. What kind of computing will allow you to accomplish her goal?

Cloud Computing

Green computing involves reducing electricity consumed and environmental waste generated when using a computer. What is a valid strategy for supporting green computing?

Buy a computer from a retailer who will dispose of your old computer properly

Where do RAM chips usually reside within a computer?

On a memory module

You have just written a new app to intercept documents from the operating system that are to be printed and place them in the queue. What is this app called?

Print Spooler

​Which of the following has meaning to the person who receives it?

Useful Information

2 out of 2 points
Which of the following is a register function?

Storing the location from which an instruction is fetched

What is a more user-friendly interface some users use instead of interacting directly with a DBMS?

Front End

Which of the following is a description of a database analyst?

uses data modeling techniques and tools to analyze and specify data usage

Which of the following is NOT a common type of memory card?
a. SDXC
b. SDHC
c. MX6
d. Memory Stick PRO Duo

C

You have created a specific named location on your hard disk to hold some songs you have purchased. What is the term for this location?

Folder

Many worksheet cells like those in the accompanying figure contain a number that can be used in a calculation. What is the name for this?

Value

Antivirus programs look for a specific pattern of virus code. What is this pattern called?

Virus Signature

Which of the following terms includes speakers, webcams, and printers as examples?

Peripherals

Who analyzes, develops, and supports the functionality of a website?

Web Developer

Which of the following are you most likely to find on your next trip to an amusement park?
a. ticket kiosk
b. virtual kiosk
c. cloud kiosk
d. financial kiosk

A

Which statement best describes how the RFID standard works?
a. Two connected network devices use infrared light to create a direct frequency.
b. The network uses radio signals to communicate with a tag placed in or attached to an object, animal, or person.
c. A node on a network must have an individual ID code that can communicate with other ready devices.
d. The network uses reference devices instead of actual devices to speed up the transmission process.

B

What type of information is arranged to suit the needs and requirements of the decision maker?

Organzied

You have heard that it is possible to improve your computer's performance by storing all related files for a particular program together. What is the term for this?

Defragmenting

If a dog is identified by scanning the shoulder or neck of the animal, what provides the information about the dog?

A microchip.

Which term is used to describe large businesses that require special hardware geared for heavy use, and maximum availability and efficiency to fit the needs of their hundreds or thousands of workers?

Enterprise

What is the term for the process of comparing data with a set of rules or values to find out if the data is correct?

Validtion

Which of the following is the process of transferring files from a computer to a server on the Internet?

Uploading

Who invented the Ethernet?

Robert Metcalfe

Which of the following describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission?

A virus

Which of the following consists of one or more chips on the motherboard that hold items such as data and instructions while the processor interprets and executes them?

RAM

Memory (chips) accesses items in which of the following units of time?

Nanoseconds

Which of the following is NOT true about caring for optical discs?a. Store optical discs in jewel boxes and store them vertically.
b. Do not expose discs to extreme temperatures or humidity.
c. Never bend a disc.
d. Moisten a nonabrasive cloth with warm water and ammonia to clean the disc.

D

Who is responsible for the security of data and information stored on computers and mobile devices within an organization?

Computer Security Specialist

What type of printer forms characters and graphics on a piece of paper without actually contacting the paper, such as an inkjet printer?

nonimpact printer

If your computer or printer does not have a built-in slot for memory cards, you can purchase a device that can access the data stored on the memory card. What is that device called?

a card reader/writer

IF YOU RECEIVE AN EMAIL MESSAGE IN ALL CAPITAL LETTERS, WHAT DOES THIS SIGNIFY?

THE PERSON WHO WROTE THE EMAIL WAS SHOUTING AT YOU

A printer, such as that shown in the accompanying figure, creates images using a laser beam and powdered ink. What is this ink called?

Toner

You have a new web app and the host for it is going to provide storage for your data on their server. What is this called?

Cloud Storage

When you purchase a digital camera, what type of software often is included with the purchase?

photo editing software

Some input devices, such as a mouse or a smartphone include tactile output. What best describes tactile output?

the user receives a physical response from the device

Which of the following kinds of devices is any type of hardware capable of transmitting data, instructions, and information between a sending device and a receiving device?

Communications

In which gesture do you press and hold one finger and then move the finger horizontally or vertically on the screen?

Swipe

Which of the following tools searches for and removes unnecessary files?

Disk Cleanup

Which of the following kinds of keyboard has a design that reduces the chance of wrist and hand injuries?

Ergonomic

Why do many webpages use graphical designs and images?

To convey a message

Which of the following provides a myriad of financial reporting requirements and guidelines for public companies?

Sarbanes-Oxley Act

Which of the following kinds of storage is NOT used by NAS and SAN solutions?

Flash Memory

Which type of optical scanner works in a manner similar to a copy machine?

Flatbed Scanner

Which of the following terms identifies any network based on the 802.11 family of standards?

Wi-Fi

Which of the following kinds of computing refers to an environment of servers that house and provide access to resources users access through the Internet?

Cloud

Which of the following gestures would you use if you want to activate a mode that enables you to move an item with one finger to a new location on your new tablet?

Press and hold

Which of the following is NOT a name of an Android release?
a. Ice Cream Sandwich
b. Key Lime Pie
c. Gingerbread
d. Blackberry

Blackberry

Which of the following companies does not manufacture computers that use the Windows operating system?
a. Apple
b. HP
c. Lenovo
d. Dell

Apple

Which statement best describes how the RFID standard works?
a. Two connected network devices use infrared light to create a direct frequency.
b. A node on a network must have an individual ID code that can communicate with other ready devices.
c. The network uses reference devices instead of actual devices to speed up the transmission process.
d. The network uses radio signals to communicate with a tag placed in or attached to an object, animal, or person.

D

Which of the following is not a characteristic of a hard disk?
a. sectors and tracks
b. write-protect notch
c. read/write head
d. capacity

B

Which of the following occurs when the electrical supply or voltage drops, often defined as more than five percent below the normal volts?
a. overvoltage
b. undervoltage
c. power surge
d. online surge

B

Who is Apple's cofounder?

Steve Jobs

What is the electronic component that interprets and carries out the basic instructions that operate the computer?

Processor

The term, payload, as it pertains to computer crime, is defined as _____________.

Payload

Which of the following is the main circuit board of the system unit?
a. control board
b. index board
c. master board
d. system board

D

What is storage media?

The physical material on which a computer keeps data, instructions, and information

Which of the following is an open source operating system?
a. DOS
b. UNIX
c. Solaris
d. Linux

D

Which of the following terms is the number of bytes (characters) a storage medium can hold?
a. retention
b. resolution
c. capacity
d. dimensionality

C

A form that sends entered data across a network or the Internet is called which of the following terms?

E-form

An alternative to e-mail filtering is to purchase which of the following kinds of program that attempts to remove a message before it reaches a user's inbox?

Anti-spam

For smaller business and home networks, which of the following allows multiple computers to share a single broadband Internet connection such as through a cable modem or DSL modem?

Router

Which of the following are audio output devices that rest inside the ear canal?

earbuds

Who is the creator of the World Wide Web?

Tim Berners-Lee

A data dictionary contains details about data. What term is used to describe this characteristic?

Metadata

Which type of disc is a type of storage media that consists of a flat, round, portable metal disc made of metal, plastic, and lacquer that is written and read by a laser?

optical

What is being measured using KBps, MBps, and GBps?

Transfer Rate

If your friend is playing a game on a computer, on what type of device would he see a big explosion within the game?

Output

You want to add a new external hard disk to your computer, but you are unable to connect because you have run out of USB ports. Which of the following can you use instead?

USB Hub

Which of the following is the component of the system unit that converts the wall outlet AC power into the DC power a computer requires?
a. electricity changer
b. power surge
c. energy spotter
d. power supply

D

If someone's boss wanted to send a message to an employee that contains both a video and a Word processing document, which Internet service would be the most appropriate for her to use?

Email

Which of the following specifies the structure, interface, and requirements of a large-scale database; and determines security and permissions for users?
a. Cloud Architect
b. Database Designer
c. App Developer
d. Web Designer

B

Computer memory and computer storage are available in varying sizes. Which of the following is the largest amount of memory or storage?
a. kilobyte (KB)
b. terabyte (TB)
c. gigabyte (GB)
d. megabyte (MB)

B

An organization to which you belong is joining the W3C. What is the mission of the work you will undertake as a member?
a. To expand mobile broadband access
b. To promote Internet2 ventures
c. To ensure the continued growth of the web
d. To devise technology for connecting to the Internet

C

Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?
a. secure
b. digital
c. assigned
d. protected

B

Which of the following are typically hired based on expertise and provides technology services to his or her clients?
a. Outsourcing Consultant
b. IT Consultant
c. Tech Trainer
d. Offshore Trainer

B

Human resources, manufacturing, and customer service are examples of what?

Functional Units

Which of the following are programs that analyze data, such as those in a decision support system?
a. ORD
b. OPAL
c. OLAP
d. OPAC

C

Many scanners include a certain kind of software, which can read and convert text documents into electronic files. What is that kind of software?
a. ECR
b. SCR
c. DCR
d. OCR

D

What is the first step in the startup process of a computer?
Selected Answer:
a. The processor chip resets itself and finds the ROM chips that contain the BIOS.
b. LEDs flicker on devices such as the disk drives and keyboard.
c.The power supply or battery sends an electrical current to circuitry in the computer or mobile device.
d. Instructions stored in the kernel are accessed and processed sequential

C. The power supply or battery sends an electrical current to circuitry in the computer or mobile device.

You want to allow sound to be input through a microphone and output through external speakers on your computer. What must you have in order to do this?
a. SCSI port
b. port duplicator
c. sound card
d. peripheral device manager

c. sound card

Which of the following is a wireless transmission medium that distributes radio signals through the air over long distances?
a. bandless transmission
b. optical resolution
c. broadcast radio
d. mobile transmission

c. broadcast radio

What is the term for characters, such as :) or :( , used to express emotion in an email message or newsgroup article?
a. emoticons
b. FAQs
c. spam
d. flames

a. emoticons

Which of the following is an information system that captures and processes data from day-to-day business activities?
a. Transaction Programming System
b. Transaction Processing System
c. Transaction Processing Site
d. Transaction Proposal System

b. Transaction Processing System

Which of the following has a higher capacity and better quality than standard DVDs, especially for high-definition audio and video?
a. a mini-DVD
b. a double-sided DVD
c. a DVD-ROM
d. a Blu-ray Disc

d. a Blu-ray Disc

Which of the following is NOT a media player?
Selected Answer:
a. RealPlayer
b. Safari
c. iTunes
d. Windows Media Player

b. Safari

Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?
a. Fair Credit Reporting Act
b. Electronic Communications Privacy Act (ECPA)
c. Computer Fraud and Abuse Act
d. Computer Matching and Privacy Protection Act

b. Electronic Communications Privacy Act (ECPA)

A wireless keyboard is a battery-powered device that transmits data to the system unit using wireless technology. Which of the following wireless technologies commonly are used for this purpose?
a. DVI
b. Bluetooth
c. KeyTrack
d. SATA

b. Bluetooth

Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?
Selected Answer:
a. digital
b. protected
c. assigned
d. secure

a. digital

Which type of individual may steal credit card numbers to make fraudulent purchases?
a. kiddie
b. corrupt
c. administrator
d. Caesar

b. corrupt

Which of the following helps users analyze information and make decisions?
a. DSE
b. DRS
c. ESS
d. DSS

d. DSS

Which of the following statements is not true about software theft?
a. Software piracy is the unauthorized and illegal duplication of copyrighted software.
b. A keygen distributes user names and passwords to those who register their legally purchased copies of a software program.
c. Software theft includes disabling or removing programs from company computers.
d. With a single-user license agreement, users are permitted to make one copy of the software as a backup.

b. A keygen distributes user names and passwords to those who register their legally purchased copies of a software program.

In a graphical user interface, which of the following is a small symbol on the screen whose location and shape changes as a user moves a pointing device?
a. keystroke
b. keypad
c. index
d. pointer

d. pointer

Which of the following is NOT taught by corporate trainers?
a. how to set up a Facebook account
b. how to use software and apps
c. how to write programs
d. how to design and develop systems

a. how to set up a Facebook account

Which of the following is NOT considered a part of file maintenance?
a. deleting records from a database
b. the creation of a new database
c. adding a record to a database
d. modifying data in a record

b. the creation of a new database

Which of the following protects against electrical power variations?
a. electronic leveling
b. surge protector
c. cloud computing
d. server virtualization

b. surge protector

The faster the clock speed, the more of these the processor can execute per second. What are they?
a. registers
b. instructions
c. arguments
d. functions

b. instructions

You compose a new song and you now have exclusive rights to sell your song. Of which of the following is this an example?
a. trademarking
b. intellectual publication
c. copyright
d. private domain

c. copyright

Which of the following kinds of software is a sophisticated type of application software that assists a professional user in creating engineering, architectural, and scientific designs?
a. CBT
b. WBT
c. CAD
d. DTP

c. CAD

You create a computer-aided design database that stores data including a list of components of an item being designed, the relationship among the components, and previous versions of the design drafts. Which data model did you use?
a. object-oriented
b. multidimensional
c. relational
d. object-relational

b. multidimensional

In reference to computer communications, what does the term noise mean?
a. the busy signal that indicates the network is busy
b. audio transmissions
c. voice transmissions that include static
d. electrical disturbances

d. electrical disturbances

In which of the following mouse operations do you quickly press and release the left mouse button twice without moving the mouse?
a. drag
b. double-click
c. click
d. double-press

b. double-click

Which of the following integrates MRP II with the information flow across an organization to manage and coordinate the ongoing activities of the enterprise?
a. Excellent Customer Production
b. ​Enterprise Customer Planning
c. Enterprise Resource Production
d. ​Enterprise Resource Planning

d. ​Enterprise Resource Planning

Memory access times can be measured in fractions of a second. When measuring memory access times, which of the following is the fastest?
a. millisecond
b. nanosecond
c. microsecond
d. picosecond

d. picosecond

What does a controller control?
Selected Answer:
a. the electronic circuits that control the platters
b. the interface between the hard disk and the system bus
c. the interface between the hard disk and the operating system
d. the ports for removable storage devices

b. the interface between the hard disk and the system bus

What is unique about a multi-core processor?
a. It is a single chip with two or more separate processor cores.
b. It uses core memory to enhance the processing speed of processors.
c. It is a single processor with two or more separate chips.
d. It contains multiple control elements that, when working together, can increase the data processed over the Internet.

a. It is a single chip with two or more separate processor cores.

Which of the following is equal to approximately one million characters?
a. megabyte
b. gigabyte
c. kilobyte
d. terabyte

a. megabyte

Which of the following kinds of backup is another name for a full backup?
a. archival
b. differential
c. selective
d. incremental

a. archival

Which of the following terms is used to describe a small text file that a web server stores on your computer?
a. a breadcrumb
b. a cracker
c. a nugget
d. a cookie

d. a cookie

An alternative to e-mail filtering is to purchase which of the following kinds of program that attempts to remove a message before it reaches a user's inbox?
a. filtering
b. email
c. sieve
d. anti-spam

d. anti-spam

Over time, which of the following is true of thermal printers?
a. They are expensive, but the print quality is low although the images tend to last.
b. They are inexpensive, but the print quality is low and the images tend to fade.
c. They are inexpensive, but the print quality is high and the images tend to last.
d. They are expensive, but the print quality is high although the images tend to fade.

b. They are inexpensive, but the print quality is low and the images tend to fade.

What type of device reads the strip of magnetic material on the back of your credit card?
a. credit card reader
b. magReader
c. MCR
d. magnetic stripe card reader

d. magnetic stripe card reader

Which of the following category of users works on a computer while away from a main office, home office, or school?
a. power
tb. mobile
c. key
d. SOHO

b. mobile

Which kind of tablet positions the case below a keyboard, providing functionality similar to that of a laptop?
a. slate
b. console
c. integrated
d. convertible

d. convertible

Which of the following is a collection of unprocessed items, which can include text, numbers, images, audio, and video?
a. Information
b. Input
c. Output
d. Data

d. Data

You have just written a new app to intercept documents from the operating system that are to be printed and place them in the queue. What is this app called?
a. page interceptor
b. print spooler
c. job manager
d. printer task handler

b. print spooler

Which of the following analyzes, develops, and supports the functionality of a website?
a. systems programmer
b. systems analyst
c. database designer​
d. web developer​

d. web developer​

If your computer or printer does not have a built-in slot for memory cards, you can purchase a device that can access the data stored on the memory card. What is that device called?
a. a transfer port
b. a card reader/writer
c. a memory stick
d. a read/write head

b. a card reader/writer

Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?
a. a worm
b. a virus
c. a rootkit
d. a Trojan horse

c. a rootkit

A type of computer usually has thousands of users. Which of the following is most likely to be the type of computer?
a. supercomputer
b. mobile computer
c. game console
d. personal computer

a. supercomputer

Which of the following does your new smartphone use to unlock the device?
a. iris recognition system
b. face recognition system
c. hand geometry system
d. digital forensics system

b. face recognition system

You are purchasing a new mobile phone, and are learning about categories of cellular transmissions. You ask the sales person what the 'G' stands for in the categories 1G, 2G, 3G, and 4G. What does he reply?
a. gigabytes
b. generation
c. global
d. geographic

b. generation

If you were required to give a speech identifying the risks of using computers and digital devices, which group of items would you include?
a. Privacy risks, environmental risks, reliability risks, communication risks
b. Health risks, privacy risks, environmental risks
c. Impact on labor force risks, environmental risks, speed risks, information sharing risks
d. Unreliability risks, mental health risks, behavioral risks, computer crime risks

b. Health risks, privacy risks, environmental risks

What percent of e-waste is recycled?
a. 20
b. 38
c. 45
d. 76

a. 20

Which of the following items are required in order for your company to conduct a videoconference?
a. videoconferencing software or web app, microphone, video camera
b. videoconferencing software or web app, speakers, communications-enabled eyeglasses for each participant
c. network, television screen, tablet PCs, microphone
d. video camera, digital pens, microphone

videoconferencing software or web app, microphone, video camera

The role of memory to store both data and programs is known as which of the following concepts?
a. ROM
b. store and send
c. random memory
d. stored program

d. stored program

Which of the following increases or decreases how crisp the objects in a photo appear?
a. contrast
b. crispness
c. brightness
d. sharpness

d. sharpness

You have just designed a device-tracking app for sale in the app marketplace. Which of the following are you least likely to use in your app?
a. GPS
b. IP addresses
c. Wi-Fi
d. UNIX

d. UNIX

You own a third-party business that provides networking services such as EDI, secure data and information transfer, storage, and email. Into what category of business does this business fall?
Answers:
a. EAN
b. NIC
c. VAN
d. CIN

c. VAN

COGNITIVE ASSESSMENT

What is the term for the area of the hard disk used for virtual memory?
a. the cloud
b. a partition
c. a page
d. a swap file

d. a swap file

Which of the following types of software do engineers, architects and scientists use to create designs?
a. computer-aided design software (CAD)
b. design and development software (DAD)
c. computer-based engineering design software (CED)
d. augmented design software (ADS)

a. computer-aided design software (CAD)

You are going to purchase a mass-produced computer from your local computer store. Which of the following is likely a component you can customize?
a. video card
b. sound card
c. processor type
d. all of the above

c. processor type

Which of the following is true about the database approach?
a. Unauthorized users are unable under any circumstances to gain access to a single database file that contains personal and confidential data.
b. Data in a database is less vulnerable than data in file processing systems.
c. Business and home users often work with databases because of their numerous advantages.
d. A database is never more complex than a file processing system.

b. Data in a database is less vulnerable than data in file processing systems.

Who was a technology inventor and futurist?
Selected Answer:
a. Ray Kurzweil
b. Thomas Gould
c. Meg Swan
d. Richard Thomson

a. Ray Kurzweil

Which of the following is a federally funded Internet security research and development center?
a. NSF
b. Internet2
c. CERT/CC
d. W3C

c. CERT/CC

Which of the following kinds of values is the one that a DBMS initially displays in a field?
a. start
b. default
c. query
d. initial

b. default

Which of the following is true of DSL?
a. It uses a line that is shared with other users in the neighborhood.
a. It uses a line that is shared with other users in the neighborhood.
b. It is a popular digital line alternative for the small business or home user.
c. Users share DSL nodes with up to hundreds of other users.
d. It has widespread availability.

b. It is a popular digital line alternative for the small business or home user.

Which of the following is a computer that allows users to upload and/or download files using FTP?
a. FTP network
b. FTP client
c. FTP base unit
d. FTP server

d. FTP server

You own a third-party business that provides networking services such as EDI, secure data and information transfer, storage, and email. Into what category of business does this business fall?
a. EAN
b. VAN
c. CIN
d. NIC

b. VAN

Which of the following programs allow designers to rotate designs of 3-D objects to view them from any angle?
a. DTP
b. DTM
c. CAM
d. CAD

d. CAD

Using ink-jet printer technology, but on a much larger scale, which of the following creates photo-realistic-quality color prints?
a. impact printer
b. large-format printer
c. plotter
d. NLQ printer

b. large-format printer

What is another term for servers that control access to the hardware, software, and other network resources?
a. node computers
b. host computers
c. client computers
d. receiver computers

b. host computers

Which of the following is not a determinant of the category in which a computer best fits?
a. resolution
b. speed
c. processing power
d. price

a. resolution

The faster the clock speed, the more of these the processor can execute per second. What are they?
a. registers
b. instructions
c. arguments
d. functions

b. instructions

Which recovery technique is more expensive, but provides recovery of damaged data in a matter of seconds?
a. continuous backup
b. rollforward
c. rollbackward
d. instant restoration

a. continuous backup

What is the goal of Internet2?
a. It is the same as Internet; it has no particular goal.
b. Replace Internet1.
c. Develop and test advanced Internet technologies.
d. Ensure telemedicine, digital libraries, high-definition video, and Internet fraud detection all can be available over the Internet.

c. Develop and test advanced Internet technologies.

Which of the following is a number(s) or character(s) that is appended to or inserted into a primary key field?
a. check digit
b. index
c. integer
d. insertion ordinal

a. check digit

Which of the following includes and profits from installing trial versions of antivirus software on their computers?
a. VARs
b. OEMs
c. BSEs
d. ISPs

b. OEMs

You are looking for a backup that copies only the files that have changes since the last full backup. Which of the following will you use?
a. incremental backup
b. selective backup
c. differential backup
d. archival backup

a. incremental backup

Which of the following communicates with a satellite dish to provide high-speed Internet connections via satellite?
a. satellite modem
b. satellite receiver
c. satellite transceiver
d. satellite dialer

a. satellite modem

Which category of applications allows you to locate a nearby restaurant or check the weather forecast?
a. geography-based
b. convenience
c. education
d. lifestyle

d. lifestyle

Which of the following helps users analyze information and make decisions?
a. ESS
b. DSS
c. DSE
d. DRS

b. DSS

Which of the following determines the number of bits that the computer can transmit at one time?
a. bus interpolation
b. bus circumference
c. bus diameter
d. bus width

d. bus width

Which of the following storage devices typically has the fastest transfer rate?
a. optical disc
b. hard disk
c. RAM
d. memory card

c. RAM

Which of the following is NOT true of the new multi-core processor you have just purchased?
a. The multi-core processor requires a lower level of power consumption.
b. The multi-core processor is more energy efficient than separate multiple processors.
c. The multi-core processor emits less heat inside the case.
d. Each processor core on the multi-core processor runs at a faster speed than a single-core processor.

d. Each processor core on the multi-core processor runs at a faster speed than a single-core processor.

Which of the following is least likely to be the reason for an automatic update?
a. modifying device drivers
b. improving functionality
c. enhancing security
d. providing decryption

d. providing decryption

Which of the following is a business that provides individuals and companies access to the Internet for free or for a fee?
a. email provider
b. service provider
c. host provider
d. access provider

d. access provider

You want to allow sound to be input through a microphone and output through external speakers on your computer. What must you have in order to do this?
a. sound card
b. SCSI port
c. port duplicator
d. peripheral device manager

a. sound card

An announcement of an alumni association meeting sent to people who have graduated is what type of information?
a. useful
b. accurate
c. organized
d. accessible

a. useful

What is unique about a multi-core processor?
a. It is a single processor with two or more separate chips.
b. It uses core memory to enhance the processing speed of processors.
c. It is a single chip with two or more separate processor cores.
d. It contains multiple control elements that, when working together, can increase the data processed over the Internet.

c. It is a single chip with two or more separate processor cores.

You are inside a sports arena with your friend. Both of you have Wi-Fi devices. For the devices to communicate with each other, what is the maximum distance they can be apart in this closed space?
b. 100 feet
c. 250 feet
d. 500 feet

b. 100 feet

Which category of applications allows you to locate a nearby restaurant or check the weather forecast?
a. convenience
b. education
c. geography-based
d. lifestyle

d. lifestyle

Your new calendar application allows you to make sure that your mobile device and your corporation's server both have the latest version of any updated information. What is the term for this capability?
a. adjoinment
b. reconciliation
c. concatenation
d. synchronization

d. synchronization

Which of the following communications technologies does not use broadcast radio signals?
a. UWB
b. Wi-Fi
c. Bluetooth
d. IR

d. IR

One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage?
a. 25
b. 35
c. 55
d. 75

a. 25

You have a new e-book reader and you are expecting to be away on a long hike with it. How many hours of reading can you get from it before needing to recharge it?
a. 75
b. 100
c. 125
d. 150

a. 75

Which RAID level technique splits data, instructions, and information across multiple disks in the array?
a. differentiation
b. archiving
c. striping
d. mirroring

c. striping

A computer technician told your friend he needed a circuit board that provides a connection to a peripheral device for use with his computer. What category of circuit board should your friend purchase?
a. memory card
b. external card
c. adapter card
d. expansion board

c. adapter card

Complex DBMSs maintain a listing of activities that modify the contents of a database. What is this listing called?
a. log
b. recovery disk
c. backup
d. index

a. log

Storage devices access items in which of the following units of time?
a. milliseconds
b. petaseconds
c. macroseconds
d. nanoseconds

a. milliseconds

The role of memory to store both data and programs is known as which of the following concepts?
a. stored program
b. ROM
c. random memory
d. store and send

a. stored program

Which of the following best describes DSL connections?
a. uses long-distance digital telephone lines to carry multiple signals over a single line; only medium to large companies can afford them
b. transmits at fast speeds on existing standard copper telephone wiring; popular for small business or home user
c. uses fiber-optic cable to provide extremely high-speed Internet access to a user's physical, permanent location
d. a service that carries voice, data, video, and multimedia at a high speed; used by telephone networks and the Internet

b. transmits at fast speeds on existing standard copper telephone wiring; popular for small business or home user

IST 195 Final - Subjecto.com

IST 195 Final

Your page rank:

Total word count: 6120
Pages: 22

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Analysts often refer to the three ____’s when describing characteristics of Big Data.

V

Who can establish standard user accounts that allow alterations to security settings?

Administrators

Which of the following allows hiring managers to learn more about you beyond what you can convey in a traditional one-page paper resume?

Profesional online presence

In which of the following mouse operations do you press and release the primary mouse button?

click

What is the term for a communications device that connects multiple computers together and transmits data to its correct destination on a network?

Router

What is the general term for programs that act without a user’s knowledge and deliberately alter the computer’s operations?

Malware

What is the definition of a command?

an instruction that causes a program or app to perform a specific action

The operating system that a computer uses sometimes is called which of the following?

platform

What does a Project Management Professional (PMP) test evaluate?

knowledge of tasks required during system development

Which of the following is a set of hardware, software, data, people, and procedures that work together to produce information?

Information System

What kind of software provides the capabilities of adjusting or enhancing image colors, adding special effects such as shadows and glows, and the like?

Image Editing

Which of the following search texts will display pizza or sandwich places in New Orleans?
a. pizza + sandwich (New Orleans)
b. New Orleans (pizza or sandwich)
c. *New Orleans + pizza_sandwich
d. "New Orleans + pizza_or_sandwich"

B

A standard CD-ROM is referred to as this kind of disc because manufacturers write all items on the disc at one time. What is the term used?

Single Session

When using the interface shown in the accompanying figure, the set of instructions entered into a computer is called which of the following languages?
(Green text on black)

Command


____ apps can allow you to lock your mobile device and SIM card remotely.

Mobile Security

Which of the following allows the computer to collect data over time and process all transactions later, as a group?

Batch Processing

Which of the following style of tablet does not contain a physical keyboard?

slate

Which type of test is used to verify that all programs in an application work together properly?

A Systems Test

Your organization has a large number of servers. Which type of server are you most likely to choose as a result?

Blade

Which of the following is a query language that allows users to manage, update, and retrieve data?

SQL

Your manager has asked you to shift usage and consumption of technology resources from a local environment managed by in-house IT staff to the Internet. What kind of computing will allow you to accomplish her goal?

Cloud Computing

Green computing involves reducing electricity consumed and environmental waste generated when using a computer. What is a valid strategy for supporting green computing?

Buy a computer from a retailer who will dispose of your old computer properly

Where do RAM chips usually reside within a computer?

On a memory module

You have just written a new app to intercept documents from the operating system that are to be printed and place them in the queue. What is this app called?

Print Spooler

​Which of the following has meaning to the person who receives it?

Useful Information

2 out of 2 points
Which of the following is a register function?

Storing the location from which an instruction is fetched

What is a more user-friendly interface some users use instead of interacting directly with a DBMS?

Front End

Which of the following is a description of a database analyst?

uses data modeling techniques and tools to analyze and specify data usage

Which of the following is NOT a common type of memory card?
a. SDXC
b. SDHC
c. MX6
d. Memory Stick PRO Duo

C

You have created a specific named location on your hard disk to hold some songs you have purchased. What is the term for this location?

Folder

Many worksheet cells like those in the accompanying figure contain a number that can be used in a calculation. What is the name for this?

Value

Antivirus programs look for a specific pattern of virus code. What is this pattern called?

Virus Signature

Which of the following terms includes speakers, webcams, and printers as examples?

Peripherals

Who analyzes, develops, and supports the functionality of a website?

Web Developer

Which of the following are you most likely to find on your next trip to an amusement park?
a. ticket kiosk
b. virtual kiosk
c. cloud kiosk
d. financial kiosk

A

Which statement best describes how the RFID standard works?
a. Two connected network devices use infrared light to create a direct frequency.
b. The network uses radio signals to communicate with a tag placed in or attached to an object, animal, or person.
c. A node on a network must have an individual ID code that can communicate with other ready devices.
d. The network uses reference devices instead of actual devices to speed up the transmission process.

B

What type of information is arranged to suit the needs and requirements of the decision maker?

Organzied

You have heard that it is possible to improve your computer’s performance by storing all related files for a particular program together. What is the term for this?

Defragmenting

If a dog is identified by scanning the shoulder or neck of the animal, what provides the information about the dog?

A microchip.

Which term is used to describe large businesses that require special hardware geared for heavy use, and maximum availability and efficiency to fit the needs of their hundreds or thousands of workers?

Enterprise

What is the term for the process of comparing data with a set of rules or values to find out if the data is correct?

Validtion

Which of the following is the process of transferring files from a computer to a server on the Internet?

Uploading

Who invented the Ethernet?

Robert Metcalfe

Which of the following describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission?

A virus

Which of the following consists of one or more chips on the motherboard that hold items such as data and instructions while the processor interprets and executes them?

RAM

Memory (chips) accesses items in which of the following units of time?

Nanoseconds

Which of the following is NOT true about caring for optical discs?a. Store optical discs in jewel boxes and store them vertically.
b. Do not expose discs to extreme temperatures or humidity.
c. Never bend a disc.
d. Moisten a nonabrasive cloth with warm water and ammonia to clean the disc.

D

Who is responsible for the security of data and information stored on computers and mobile devices within an organization?

Computer Security Specialist

What type of printer forms characters and graphics on a piece of paper without actually contacting the paper, such as an inkjet printer?

nonimpact printer

If your computer or printer does not have a built-in slot for memory cards, you can purchase a device that can access the data stored on the memory card. What is that device called?

a card reader/writer

IF YOU RECEIVE AN EMAIL MESSAGE IN ALL CAPITAL LETTERS, WHAT DOES THIS SIGNIFY?

THE PERSON WHO WROTE THE EMAIL WAS SHOUTING AT YOU

A printer, such as that shown in the accompanying figure, creates images using a laser beam and powdered ink. What is this ink called?

Toner

You have a new web app and the host for it is going to provide storage for your data on their server. What is this called?

Cloud Storage

When you purchase a digital camera, what type of software often is included with the purchase?

photo editing software

Some input devices, such as a mouse or a smartphone include tactile output. What best describes tactile output?

the user receives a physical response from the device

Which of the following kinds of devices is any type of hardware capable of transmitting data, instructions, and information between a sending device and a receiving device?

Communications

In which gesture do you press and hold one finger and then move the finger horizontally or vertically on the screen?

Swipe

Which of the following tools searches for and removes unnecessary files?

Disk Cleanup

Which of the following kinds of keyboard has a design that reduces the chance of wrist and hand injuries?

Ergonomic

Why do many webpages use graphical designs and images?

To convey a message

Which of the following provides a myriad of financial reporting requirements and guidelines for public companies?

Sarbanes-Oxley Act

Which of the following kinds of storage is NOT used by NAS and SAN solutions?

Flash Memory

Which type of optical scanner works in a manner similar to a copy machine?

Flatbed Scanner

Which of the following terms identifies any network based on the 802.11 family of standards?

Wi-Fi

Which of the following kinds of computing refers to an environment of servers that house and provide access to resources users access through the Internet?

Cloud

Which of the following gestures would you use if you want to activate a mode that enables you to move an item with one finger to a new location on your new tablet?

Press and hold

Which of the following is NOT a name of an Android release?
a. Ice Cream Sandwich
b. Key Lime Pie
c. Gingerbread
d. Blackberry

Blackberry

Which of the following companies does not manufacture computers that use the Windows operating system?
a. Apple
b. HP
c. Lenovo
d. Dell

Apple

Which statement best describes how the RFID standard works?
a. Two connected network devices use infrared light to create a direct frequency.
b. A node on a network must have an individual ID code that can communicate with other ready devices.
c. The network uses reference devices instead of actual devices to speed up the transmission process.
d. The network uses radio signals to communicate with a tag placed in or attached to an object, animal, or person.

D

Which of the following is not a characteristic of a hard disk?
a. sectors and tracks
b. write-protect notch
c. read/write head
d. capacity

B

Which of the following occurs when the electrical supply or voltage drops, often defined as more than five percent below the normal volts?
a. overvoltage
b. undervoltage
c. power surge
d. online surge

B

Who is Apple’s cofounder?

Steve Jobs

What is the electronic component that interprets and carries out the basic instructions that operate the computer?

Processor

The term, payload, as it pertains to computer crime, is defined as _____________.

Payload

Which of the following is the main circuit board of the system unit?
a. control board
b. index board
c. master board
d. system board

D

What is storage media?

The physical material on which a computer keeps data, instructions, and information

Which of the following is an open source operating system?
a. DOS
b. UNIX
c. Solaris
d. Linux

D

Which of the following terms is the number of bytes (characters) a storage medium can hold?
a. retention
b. resolution
c. capacity
d. dimensionality

C

A form that sends entered data across a network or the Internet is called which of the following terms?

E-form

An alternative to e-mail filtering is to purchase which of the following kinds of program that attempts to remove a message before it reaches a user’s inbox?

Anti-spam

For smaller business and home networks, which of the following allows multiple computers to share a single broadband Internet connection such as through a cable modem or DSL modem?

Router

Which of the following are audio output devices that rest inside the ear canal?

earbuds

Who is the creator of the World Wide Web?

Tim Berners-Lee

A data dictionary contains details about data. What term is used to describe this characteristic?

Metadata

Which type of disc is a type of storage media that consists of a flat, round, portable metal disc made of metal, plastic, and lacquer that is written and read by a laser?

optical

What is being measured using KBps, MBps, and GBps?

Transfer Rate

If your friend is playing a game on a computer, on what type of device would he see a big explosion within the game?

Output

You want to add a new external hard disk to your computer, but you are unable to connect because you have run out of USB ports. Which of the following can you use instead?

USB Hub

Which of the following is the component of the system unit that converts the wall outlet AC power into the DC power a computer requires?
a. electricity changer
b. power surge
c. energy spotter
d. power supply

D

If someone’s boss wanted to send a message to an employee that contains both a video and a Word processing document, which Internet service would be the most appropriate for her to use?

Email

Which of the following specifies the structure, interface, and requirements of a large-scale database; and determines security and permissions for users?
a. Cloud Architect
b. Database Designer
c. App Developer
d. Web Designer

B

Computer memory and computer storage are available in varying sizes. Which of the following is the largest amount of memory or storage?
a. kilobyte (KB)
b. terabyte (TB)
c. gigabyte (GB)
d. megabyte (MB)

B

An organization to which you belong is joining the W3C. What is the mission of the work you will undertake as a member?
a. To expand mobile broadband access
b. To promote Internet2 ventures
c. To ensure the continued growth of the web
d. To devise technology for connecting to the Internet

C

Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?
a. secure
b. digital
c. assigned
d. protected

B

Which of the following are typically hired based on expertise and provides technology services to his or her clients?
a. Outsourcing Consultant
b. IT Consultant
c. Tech Trainer
d. Offshore Trainer

B

Human resources, manufacturing, and customer service are examples of what?

Functional Units

Which of the following are programs that analyze data, such as those in a decision support system?
a. ORD
b. OPAL
c. OLAP
d. OPAC

C

Many scanners include a certain kind of software, which can read and convert text documents into electronic files. What is that kind of software?
a. ECR
b. SCR
c. DCR
d. OCR

D

What is the first step in the startup process of a computer?
Selected Answer:
a. The processor chip resets itself and finds the ROM chips that contain the BIOS.
b. LEDs flicker on devices such as the disk drives and keyboard.
c.The power supply or battery sends an electrical current to circuitry in the computer or mobile device.
d. Instructions stored in the kernel are accessed and processed sequential

C. The power supply or battery sends an electrical current to circuitry in the computer or mobile device.

You want to allow sound to be input through a microphone and output through external speakers on your computer. What must you have in order to do this?
a. SCSI port
b. port duplicator
c. sound card
d. peripheral device manager

c. sound card

Which of the following is a wireless transmission medium that distributes radio signals through the air over long distances?
a. bandless transmission
b. optical resolution
c. broadcast radio
d. mobile transmission

c. broadcast radio

What is the term for characters, such as 🙂 or 🙁 , used to express emotion in an email message or newsgroup article?
a. emoticons
b. FAQs
c. spam
d. flames

a. emoticons

Which of the following is an information system that captures and processes data from day-to-day business activities?
a. Transaction Programming System
b. Transaction Processing System
c. Transaction Processing Site
d. Transaction Proposal System

b. Transaction Processing System

Which of the following has a higher capacity and better quality than standard DVDs, especially for high-definition audio and video?
a. a mini-DVD
b. a double-sided DVD
c. a DVD-ROM
d. a Blu-ray Disc

d. a Blu-ray Disc

Which of the following is NOT a media player?
Selected Answer:
a. RealPlayer
b. Safari
c. iTunes
d. Windows Media Player

b. Safari

Which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail?
a. Fair Credit Reporting Act
b. Electronic Communications Privacy Act (ECPA)
c. Computer Fraud and Abuse Act
d. Computer Matching and Privacy Protection Act

b. Electronic Communications Privacy Act (ECPA)

A wireless keyboard is a battery-powered device that transmits data to the system unit using wireless technology. Which of the following wireless technologies commonly are used for this purpose?
a. DVI
b. Bluetooth
c. KeyTrack
d. SATA

b. Bluetooth

Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?
Selected Answer:
a. digital
b. protected
c. assigned
d. secure

a. digital

Which type of individual may steal credit card numbers to make fraudulent purchases?
a. kiddie
b. corrupt
c. administrator
d. Caesar

b. corrupt

Which of the following helps users analyze information and make decisions?
a. DSE
b. DRS
c. ESS
d. DSS

d. DSS

Which of the following statements is not true about software theft?
a. Software piracy is the unauthorized and illegal duplication of copyrighted software.
b. A keygen distributes user names and passwords to those who register their legally purchased copies of a software program.
c. Software theft includes disabling or removing programs from company computers.
d. With a single-user license agreement, users are permitted to make one copy of the software as a backup.

b. A keygen distributes user names and passwords to those who register their legally purchased copies of a software program.

In a graphical user interface, which of the following is a small symbol on the screen whose location and shape changes as a user moves a pointing device?
a. keystroke
b. keypad
c. index
d. pointer

d. pointer

Which of the following is NOT taught by corporate trainers?
a. how to set up a Facebook account
b. how to use software and apps
c. how to write programs
d. how to design and develop systems

a. how to set up a Facebook account

Which of the following is NOT considered a part of file maintenance?
a. deleting records from a database
b. the creation of a new database
c. adding a record to a database
d. modifying data in a record

b. the creation of a new database

Which of the following protects against electrical power variations?
a. electronic leveling
b. surge protector
c. cloud computing
d. server virtualization

b. surge protector

The faster the clock speed, the more of these the processor can execute per second. What are they?
a. registers
b. instructions
c. arguments
d. functions

b. instructions

You compose a new song and you now have exclusive rights to sell your song. Of which of the following is this an example?
a. trademarking
b. intellectual publication
c. copyright
d. private domain

c. copyright

Which of the following kinds of software is a sophisticated type of application software that assists a professional user in creating engineering, architectural, and scientific designs?
a. CBT
b. WBT
c. CAD
d. DTP

c. CAD

You create a computer-aided design database that stores data including a list of components of an item being designed, the relationship among the components, and previous versions of the design drafts. Which data model did you use?
a. object-oriented
b. multidimensional
c. relational
d. object-relational

b. multidimensional

In reference to computer communications, what does the term noise mean?
a. the busy signal that indicates the network is busy
b. audio transmissions
c. voice transmissions that include static
d. electrical disturbances

d. electrical disturbances

In which of the following mouse operations do you quickly press and release the left mouse button twice without moving the mouse?
a. drag
b. double-click
c. click
d. double-press

b. double-click

Which of the following integrates MRP II with the information flow across an organization to manage and coordinate the ongoing activities of the enterprise?
a. Excellent Customer Production
b. ​Enterprise Customer Planning
c. Enterprise Resource Production
d. ​Enterprise Resource Planning

d. ​Enterprise Resource Planning

Memory access times can be measured in fractions of a second. When measuring memory access times, which of the following is the fastest?
a. millisecond
b. nanosecond
c. microsecond
d. picosecond

d. picosecond

What does a controller control?
Selected Answer:
a. the electronic circuits that control the platters
b. the interface between the hard disk and the system bus
c. the interface between the hard disk and the operating system
d. the ports for removable storage devices

b. the interface between the hard disk and the system bus

What is unique about a multi-core processor?
a. It is a single chip with two or more separate processor cores.
b. It uses core memory to enhance the processing speed of processors.
c. It is a single processor with two or more separate chips.
d. It contains multiple control elements that, when working together, can increase the data processed over the Internet.

a. It is a single chip with two or more separate processor cores.

Which of the following is equal to approximately one million characters?
a. megabyte
b. gigabyte
c. kilobyte
d. terabyte

a. megabyte

Which of the following kinds of backup is another name for a full backup?
a. archival
b. differential
c. selective
d. incremental

a. archival

Which of the following terms is used to describe a small text file that a web server stores on your computer?
a. a breadcrumb
b. a cracker
c. a nugget
d. a cookie

d. a cookie

An alternative to e-mail filtering is to purchase which of the following kinds of program that attempts to remove a message before it reaches a user’s inbox?
a. filtering
b. email
c. sieve
d. anti-spam

d. anti-spam

Over time, which of the following is true of thermal printers?
a. They are expensive, but the print quality is low although the images tend to last.
b. They are inexpensive, but the print quality is low and the images tend to fade.
c. They are inexpensive, but the print quality is high and the images tend to last.
d. They are expensive, but the print quality is high although the images tend to fade.

b. They are inexpensive, but the print quality is low and the images tend to fade.

What type of device reads the strip of magnetic material on the back of your credit card?
a. credit card reader
b. magReader
c. MCR
d. magnetic stripe card reader

d. magnetic stripe card reader

Which of the following category of users works on a computer while away from a main office, home office, or school?
a. power
tb. mobile
c. key
d. SOHO

b. mobile

Which kind of tablet positions the case below a keyboard, providing functionality similar to that of a laptop?
a. slate
b. console
c. integrated
d. convertible

d. convertible

Which of the following is a collection of unprocessed items, which can include text, numbers, images, audio, and video?
a. Information
b. Input
c. Output
d. Data

d. Data

You have just written a new app to intercept documents from the operating system that are to be printed and place them in the queue. What is this app called?
a. page interceptor
b. print spooler
c. job manager
d. printer task handler

b. print spooler

Which of the following analyzes, develops, and supports the functionality of a website?
a. systems programmer
b. systems analyst
c. database designer​
d. web developer​

d. web developer​

If your computer or printer does not have a built-in slot for memory cards, you can purchase a device that can access the data stored on the memory card. What is that device called?
a. a transfer port
b. a card reader/writer
c. a memory stick
d. a read/write head

b. a card reader/writer

Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?
a. a worm
b. a virus
c. a rootkit
d. a Trojan horse

c. a rootkit

A type of computer usually has thousands of users. Which of the following is most likely to be the type of computer?
a. supercomputer
b. mobile computer
c. game console
d. personal computer

a. supercomputer

Which of the following does your new smartphone use to unlock the device?
a. iris recognition system
b. face recognition system
c. hand geometry system
d. digital forensics system

b. face recognition system

You are purchasing a new mobile phone, and are learning about categories of cellular transmissions. You ask the sales person what the ‘G’ stands for in the categories 1G, 2G, 3G, and 4G. What does he reply?
a. gigabytes
b. generation
c. global
d. geographic

b. generation

If you were required to give a speech identifying the risks of using computers and digital devices, which group of items would you include?
a. Privacy risks, environmental risks, reliability risks, communication risks
b. Health risks, privacy risks, environmental risks
c. Impact on labor force risks, environmental risks, speed risks, information sharing risks
d. Unreliability risks, mental health risks, behavioral risks, computer crime risks

b. Health risks, privacy risks, environmental risks

What percent of e-waste is recycled?
a. 20
b. 38
c. 45
d. 76

a. 20

Which of the following items are required in order for your company to conduct a videoconference?
a. videoconferencing software or web app, microphone, video camera
b. videoconferencing software or web app, speakers, communications-enabled eyeglasses for each participant
c. network, television screen, tablet PCs, microphone
d. video camera, digital pens, microphone

videoconferencing software or web app, microphone, video camera

The role of memory to store both data and programs is known as which of the following concepts?
a. ROM
b. store and send
c. random memory
d. stored program

d. stored program

Which of the following increases or decreases how crisp the objects in a photo appear?
a. contrast
b. crispness
c. brightness
d. sharpness

d. sharpness

You have just designed a device-tracking app for sale in the app marketplace. Which of the following are you least likely to use in your app?
a. GPS
b. IP addresses
c. Wi-Fi
d. UNIX

d. UNIX

You own a third-party business that provides networking services such as EDI, secure data and information transfer, storage, and email. Into what category of business does this business fall?
Answers:
a. EAN
b. NIC
c. VAN
d. CIN

c. VAN

COGNITIVE ASSESSMENT

What is the term for the area of the hard disk used for virtual memory?
a. the cloud
b. a partition
c. a page
d. a swap file

d. a swap file

Which of the following types of software do engineers, architects and scientists use to create designs?
a. computer-aided design software (CAD)
b. design and development software (DAD)
c. computer-based engineering design software (CED)
d. augmented design software (ADS)

a. computer-aided design software (CAD)

You are going to purchase a mass-produced computer from your local computer store. Which of the following is likely a component you can customize?
a. video card
b. sound card
c. processor type
d. all of the above

c. processor type

Which of the following is true about the database approach?
a. Unauthorized users are unable under any circumstances to gain access to a single database file that contains personal and confidential data.
b. Data in a database is less vulnerable than data in file processing systems.
c. Business and home users often work with databases because of their numerous advantages.
d. A database is never more complex than a file processing system.

b. Data in a database is less vulnerable than data in file processing systems.

Who was a technology inventor and futurist?
Selected Answer:
a. Ray Kurzweil
b. Thomas Gould
c. Meg Swan
d. Richard Thomson

a. Ray Kurzweil

Which of the following is a federally funded Internet security research and development center?
a. NSF
b. Internet2
c. CERT/CC
d. W3C

c. CERT/CC

Which of the following kinds of values is the one that a DBMS initially displays in a field?
a. start
b. default
c. query
d. initial

b. default

Which of the following is true of DSL?
a. It uses a line that is shared with other users in the neighborhood.
a. It uses a line that is shared with other users in the neighborhood.
b. It is a popular digital line alternative for the small business or home user.
c. Users share DSL nodes with up to hundreds of other users.
d. It has widespread availability.

b. It is a popular digital line alternative for the small business or home user.

Which of the following is a computer that allows users to upload and/or download files using FTP?
a. FTP network
b. FTP client
c. FTP base unit
d. FTP server

d. FTP server

You own a third-party business that provides networking services such as EDI, secure data and information transfer, storage, and email. Into what category of business does this business fall?
a. EAN
b. VAN
c. CIN
d. NIC

b. VAN

Which of the following programs allow designers to rotate designs of 3-D objects to view them from any angle?
a. DTP
b. DTM
c. CAM
d. CAD

d. CAD

Using ink-jet printer technology, but on a much larger scale, which of the following creates photo-realistic-quality color prints?
a. impact printer
b. large-format printer
c. plotter
d. NLQ printer

b. large-format printer

What is another term for servers that control access to the hardware, software, and other network resources?
a. node computers
b. host computers
c. client computers
d. receiver computers

b. host computers

Which of the following is not a determinant of the category in which a computer best fits?
a. resolution
b. speed
c. processing power
d. price

a. resolution

The faster the clock speed, the more of these the processor can execute per second. What are they?
a. registers
b. instructions
c. arguments
d. functions

b. instructions

Which recovery technique is more expensive, but provides recovery of damaged data in a matter of seconds?
a. continuous backup
b. rollforward
c. rollbackward
d. instant restoration

a. continuous backup

What is the goal of Internet2?
a. It is the same as Internet; it has no particular goal.
b. Replace Internet1.
c. Develop and test advanced Internet technologies.
d. Ensure telemedicine, digital libraries, high-definition video, and Internet fraud detection all can be available over the Internet.

c. Develop and test advanced Internet technologies.

Which of the following is a number(s) or character(s) that is appended to or inserted into a primary key field?
a. check digit
b. index
c. integer
d. insertion ordinal

a. check digit

Which of the following includes and profits from installing trial versions of antivirus software on their computers?
a. VARs
b. OEMs
c. BSEs
d. ISPs

b. OEMs

You are looking for a backup that copies only the files that have changes since the last full backup. Which of the following will you use?
a. incremental backup
b. selective backup
c. differential backup
d. archival backup

a. incremental backup

Which of the following communicates with a satellite dish to provide high-speed Internet connections via satellite?
a. satellite modem
b. satellite receiver
c. satellite transceiver
d. satellite dialer

a. satellite modem

Which category of applications allows you to locate a nearby restaurant or check the weather forecast?
a. geography-based
b. convenience
c. education
d. lifestyle

d. lifestyle

Which of the following helps users analyze information and make decisions?
a. ESS
b. DSS
c. DSE
d. DRS

b. DSS

Which of the following determines the number of bits that the computer can transmit at one time?
a. bus interpolation
b. bus circumference
c. bus diameter
d. bus width

d. bus width

Which of the following storage devices typically has the fastest transfer rate?
a. optical disc
b. hard disk
c. RAM
d. memory card

c. RAM

Which of the following is NOT true of the new multi-core processor you have just purchased?
a. The multi-core processor requires a lower level of power consumption.
b. The multi-core processor is more energy efficient than separate multiple processors.
c. The multi-core processor emits less heat inside the case.
d. Each processor core on the multi-core processor runs at a faster speed than a single-core processor.

d. Each processor core on the multi-core processor runs at a faster speed than a single-core processor.

Which of the following is least likely to be the reason for an automatic update?
a. modifying device drivers
b. improving functionality
c. enhancing security
d. providing decryption

d. providing decryption

Which of the following is a business that provides individuals and companies access to the Internet for free or for a fee?
a. email provider
b. service provider
c. host provider
d. access provider

d. access provider

You want to allow sound to be input through a microphone and output through external speakers on your computer. What must you have in order to do this?
a. sound card
b. SCSI port
c. port duplicator
d. peripheral device manager

a. sound card

An announcement of an alumni association meeting sent to people who have graduated is what type of information?
a. useful
b. accurate
c. organized
d. accessible

a. useful

What is unique about a multi-core processor?
a. It is a single processor with two or more separate chips.
b. It uses core memory to enhance the processing speed of processors.
c. It is a single chip with two or more separate processor cores.
d. It contains multiple control elements that, when working together, can increase the data processed over the Internet.

c. It is a single chip with two or more separate processor cores.

You are inside a sports arena with your friend. Both of you have Wi-Fi devices. For the devices to communicate with each other, what is the maximum distance they can be apart in this closed space?
b. 100 feet
c. 250 feet
d. 500 feet

b. 100 feet

Which category of applications allows you to locate a nearby restaurant or check the weather forecast?
a. convenience
b. education
c. geography-based
d. lifestyle

d. lifestyle

Your new calendar application allows you to make sure that your mobile device and your corporation’s server both have the latest version of any updated information. What is the term for this capability?
a. adjoinment
b. reconciliation
c. concatenation
d. synchronization

d. synchronization

Which of the following communications technologies does not use broadcast radio signals?
a. UWB
b. Wi-Fi
c. Bluetooth
d. IR

d. IR

One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage?
a. 25
b. 35
c. 55
d. 75

a. 25

You have a new e-book reader and you are expecting to be away on a long hike with it. How many hours of reading can you get from it before needing to recharge it?
a. 75
b. 100
c. 125
d. 150

a. 75

Which RAID level technique splits data, instructions, and information across multiple disks in the array?
a. differentiation
b. archiving
c. striping
d. mirroring

c. striping

A computer technician told your friend he needed a circuit board that provides a connection to a peripheral device for use with his computer. What category of circuit board should your friend purchase?
a. memory card
b. external card
c. adapter card
d. expansion board

c. adapter card

Complex DBMSs maintain a listing of activities that modify the contents of a database. What is this listing called?
a. log
b. recovery disk
c. backup
d. index

a. log

Storage devices access items in which of the following units of time?
a. milliseconds
b. petaseconds
c. macroseconds
d. nanoseconds

a. milliseconds

The role of memory to store both data and programs is known as which of the following concepts?
a. stored program
b. ROM
c. random memory
d. store and send

a. stored program

Which of the following best describes DSL connections?
a. uses long-distance digital telephone lines to carry multiple signals over a single line; only medium to large companies can afford them
b. transmits at fast speeds on existing standard copper telephone wiring; popular for small business or home user
c. uses fiber-optic cable to provide extremely high-speed Internet access to a user’s physical, permanent location
d. a service that carries voice, data, video, and multimedia at a high speed; used by telephone networks and the Internet

b. transmits at fast speeds on existing standard copper telephone wiring; popular for small business or home user

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending