Study Guide Final Exam Computer 101

* The preview only display some random pages of manuals. You can download full content via the form below.

The preview is being generated... Please wait a moment!
  • Submitted by: Gabriella
  • File size: 151 KB
  • File type: application/pdf
  • Words: 2,927
  • Pages: 10
Report / DMCA this file Add to bookmark

Description

Study Guide Final Exam CIS105 F2019

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) The capacity of a communication channel is measured in ________. 1) _______ A) bit capacity B) data flow C) band rate D) bandwidth 2) In a virtualized environment, the operating system of each virtual machine is known as the ________ operating system. A) client B) host C) guest D) home

2) _______

3) Hard disks store and organize files using all the following, except ________. A) tracks B) cylinders C) paths D) sectors

3) _______

4) ________ are used to create text-based documents. A) Presentation programs B) Databases C) Word processors D) Spreadsheets

4) _______

5) Which of the following is not a popular mobile operating system? A) Android B) iOS C) UNIX D) Windows 10 Mobile

5) _______

6) In OOP, each ________ contains both the data and processing operations necessary to perform a task. A) unstructured program B) structured program C) content component D) object

6) _______

7) Which of the following is not malware? A) worms C) viruses

7) _______ B) Ad-Aware D) Trojan horses

8) IF-THEN-ELSE is also known as a ________ structure, one of the types of logic structures. A) random B) loop C) selection D) sequential

8) _______

9) In a communication system, which among the following convert messages into packets that can travel across the communication channel? A) storage devices B) connection devices C) secondary devices D) sending and receiving devices

9) _______

10) An MIS requires a(n) ________ management system to integrate data from different departments. A) decision support B) executive support C) general ledger D) database

1

10) ______

Study Guide Final Exam CIS105 F2019

11) The hard-disk's surface is scratched and some or all of the data is destroyed when there is a ________. A) head crash B) track crash C) sector crash D) cylinder crash

11) ______

12) A(n) ________ support system is designed to be easy to use and allows someone to obtain essential information without extensive training. A) management information B) executive C) decision D) transaction processing

12) ______

13) Before sending a large file over the Internet, you might want to use one of these programs. A) Disk defragmenter B) Disk cleanup program C) Uninstaller D) File compression program

13) ______

14) TPS stands for ________. A) transaction processing system C) Trojan prevention system

14) ______ B) two-way processor synchronization D) triple port synchronization

15) Another name for Phase 5: Systems Implementation is ________. A) analysis B) feasibility C) development

15) ______ D) conversion

16) ________ programs allow you to mix text and graphics to create publications of professional quality. A) Word processing B) Desktop publishing C) Presentation D) Spreadsheet

16) ______

17) ________ ports are audiovisual ports typically used to connect large monitors. A) S/PDIF B) MIDI C) MiniDP D) Thunderbolt

17) ______

18) ________ are programs that combine a variety of visual objects to create attractive, visually interesting presentations. A) Presentation software B) Spreadsheets C) Desktop publishers D) DBMS

18) ______

19) When an order comes in, the ________ activity alerts the warehouse to ship a product. A) decision support system B) inventory control system C) sales order processing D) general ledger

19) ______

20) The ________ of a secondary storage device indicates how much data the storage medium can hold. A) capacity B) access C) memory D) storage

20) ______

21) A decision support system consists of four parts: the user, system software, data, and ________. A) decision models B) supervisory discretion C) management models D) general ledger analysis

21) ______

2

Study Guide Final Exam CIS105 F2019

22) In a(n) ________ database, any action on one element immediately affects the elements related to it. A) hierarchical B) multidimensional C) relational D) object-oriented

22) ______

23) Network interface cards (NIC) are connected through ________ on the system board. A) ports B) sound cards C) expansion slots D) wireless network cards

23) ______

24) A program that replicates itself and clogs computers and networks. A) Trojan horse B) virus C) worm D) denial-of-service attack

24) ______

25) ________ consists of programs designed to work behind the scenes to handle detailed operating procedures. A) Decision support B) Internal data C) External data D) System software

25) ______

26) Activities in the program maintenance area fall under two categories: ________ and changing needs. A) system flowcharts B) sample output C) program listings D) operations

26) ______

27) ________ is the process of breaking down information sent or transmitted across the Internet into small parts. A) Bandwidth B) Identification C) Protocol D) Packetization

27) ______

28) In a network database, a node may be reached through more than one path with the help of ________. A) pointers B) connectors C) strings D) links

28) ______

29) According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away? A) Computer Fraud and Abuse Act B) The Gramm-Leach-Bliley Act C) Digital Millennium Copyright Act D) Computer Abuse Amendments Act

29) ______

30) ________ ports provide high-speed connections for external disk drives, optical disks, and other large secondary storage devices. A) MiniDP B) Ethernet C) eSATA D) MIDI

30) ______

31) These specialty chips are designed to improve specific computing operations such as displaying 3D images and encrypting data. A) smartcards B) coprocessors C) NIC cards D) CPUs

31) ______

3

Study Guide Final Exam CIS105 F2019

32) The ________ is the central node that coordinates the flow of data by sending messages directly between the sender and receiver nodes. A) switch B) server C) gateway D) client

32) ______

33) ________ transmits data as pulses of light through tiny tubes of glass. A) WiMax B) Microwave C) Cellular D) Fiber optic cable

33) ______

34) The essential features of this include identifying, sending, and receiving devices and breaking information into small parts for transmission across the Internet. A) FTP B) TCP/IP C) HTTPs D) DNS

34) ______

35) System ________ show the flow of input data to processing and finally to output. A) grids B) top-down analysis C) flowcharts D) checklists

35) ______

36) Basic activities in every accounting department, including sales order processing, accounts receivable, inventory and purchasing, accounts payable, and payroll, are recorded in the ________. A) inventory control system B) accountant's database C) general ledger D) corporate database

36) ______

37) ________ is concerned with protecting software and data from unauthorized tampering or damage. A) Disaster recovery plan B) Data backup C) Physical security D) Data security

37) ______

38) ________ is the name of the process of converting from analog to digital. A) Optical recognition B) Modulation C) Demodulation D) Virtualization

38) ______

39) Which of the following is not a popular desktop operating system? A) Android B) Linux C) Windows 10

39) ______ D) macOS X

40) ________ ensures that there aren't multiple sources of the same data. A) Reliability B) Sharing C) Security D) Data integrity

40) ______

41) Which among the following is a way to shut down an ISP or website? A) Trojan horses B) viruses C) denial-of-service attack D) worms

41) ______

42) In a(n) ________ database, a node may be reached through more than one path with the help of pointers. A) relational B) network C) multidimensional D) object-oriented

42) ______

4

Study Guide Final Exam CIS105 F2019

43) ________ processing is also known as online processing. A) Batch B) Consignment C) Real-time

43) ______ D) Group

44) The ________ report describes the current information system, the requirements for a new system, and a possible development schedule. A) top-down analysis B) data flow C) systems analysis D) components

44) ______

45) A(n) ________ shows the relationship between input and output documents. A) investigation report B) checklist C) top-down analysis D) grid chart

45) ______

46) The category of operating system used for handheld devices. A) stand-alone B) open source C) network

46) ______ D) embedded

47) A(n) ________ is a program that provides modules of prewritten code. A) application generator B) artificial intelligence C) machine language D) pseudocode

47) ______

48) ________ of the system happens after the installation of software and hardware. A) Implementation B) Design analysis C) Management studies D) Testing

48) ______

49) Creating a website is called web ________. A) specializing B) processing

49) ______ C) authoring

D) management

50) A computer can become infected with viruses in all the following ways, except by ________. A) downloading software from the Internet B) creating a new folder on your computer C) opening attachments to email messages D) downloading files from the web

50) ______

51) ________ software is end-user software designed to accomplish a variety of tasks. A) System B) Application C) Communications D) Utility

51) ______

52) ________ memory uses the hard drive to substitute for RAM. A) Virtual B) Cache C) Hard drive

52) ______ D) Flash

53) Digital photographs consist of thousands of dots, or ________, that form images. A) rasters B) pixels C) vectors D) bitmaps

53) ______

54) In the ________ database, data elements are stored in different tables, each of which consists of rows and columns. A) hierarchical B) relational C) object-oriented D) network

54) ______

5

Study Guide Final Exam CIS105 F2019

55) Which of the following allows a computer to run two or more operations simultaneously? A) multicore processors B) multiplexing C) coprocessors D) binary system

55) ______

56) ________ are used to quickly create a presentation by providing predesigned styles and layouts as well as suggested content based on the type you choose. A) Templates B) Galleries C) Groups D) Tabs

56) ______

57) This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords. A) fake B) rogue C) virus D) worm

57) ______

58) An important aspect of the preliminary investigation phase is to ________. A) prepare a preliminary investigation report B) suggest alternative solutions C) analyze the data D) gather the data

58) ______

59) ________ show the data or information flow within an information system; the data is traced from its origin through processing, storage, and output. A) Data flow diagrams B) Top-down analysis methods C) Grid charts D) System flow charts

59) ______

60) The ________ approach to systems implementation is used only in cases in which the cost of failure or of interrupted operation is great. A) direct B) pilot C) phased D) parallel

60) ______

61) All of the following are true of DVD-ROM drives except: A) They can provide over two hours of high-quality video and sound comparable to that found in motion picture theaters. B) They are also known as erasable optical discs. C) DVD-ROM stands for "digital versatile disc-read only memory." D) They are a type of optical disc.

61) ______

62) This version of UNIX is an open source operating system that is an alternative to Windows. A) Lion B) High Sierra C) Sierra D) Linux

62) ______

63) The repetition, or ________ structure, describes a process that may be repeated as long as a certain condition remains true. A) loop B) random C) sequential D) selection

63) ______

64) Which of the following is not a measure to protect computer security? A) encrypting data B) keeping the same password on all systems consistently

64) ______

6

Study Guide Final Exam CIS105 F2019

C) copying data and storing it at a remote location D) restricting access 65) Frequently accessed information is held in ________. A) read only memory B) the hard drive C) flash memory D) cache memory

65) ______

66) This process improves system performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU. A) RAID B) disk caching C) data compression D) data access

66) ______

67) A ________ error occurs when the programmer uses an incorrect calculation or leaves out a programming procedure. A) syntax B) machine C) translation D) logic

67) ______

68) Program ________ graphically present the detailed sequence of steps needed to solve a programming problem. A) flowcharts B) pseudocode C) loops D) modules

68) ______

69) ________ organize, analyze, and graph numeric data such as budgets and financial reports. A) Presentation programs B) Databases C) Word processors D) Spreadsheet programs

69) ______

70) The range of Wi-Fi networks using microwave connections is being extended over greater distances using a new technology known as ________. A) WiMax B) Bluetooth C) RAID D) broadcast

70) ______

71) A typical ________ system can produce income statements and balance sheets. A) executive support B) management information C) decision support D) general ledger

71) ______

72) Common names for computer-based information systems are transaction processing, management information, ________, and executive support systems. A) virtual support B) decision support C) cloud information D) reflective information

72) ______

73) Proofreading a printout of a program is known as desk checking or code ________. A) modulation B) feedback C) calculation D) review

73) ______

74) An external hard disk ________. A) is heavy B) cannot be used in addition to an internal hard disk C) usually connects to a USB or Thunderbolt port D) is hard to remove

74) ______

7

Study Guide Final Exam CIS105 F2019

75) ________ models assist top-level managers in long-range planning, such as stating company objectives or planning plant locations. A) Operational B) Corporate C) Strategic D) Tactical

75) ______

76) Organizations use the following to allow suppliers and others limited access to their networks. A) extranets B) firewalls C) intranets D) proxy servers

76) ______

77) Monthly sales and production reports are examples of ________ reports. A) on-demand B) periodic C) exception D) executive

77) ______

78) When evaluating alternative systems, systems designers must consider economic feasibility, ________ feasibility, and operational feasibility. A) top-down B) currency C) digital D) technical

78) ______

79) ________ images are made up of geometric shapes or objects. A) Raster B) Pixel C) Vector

79) ______ D) Bitmap

80) In a Ribbon GUI, ________ are used to divide the ribbon into major activity areas. A) dialog boxes B) tabs C) galleries D) groups

80) ______

81) Systems designers evaluate each alternative in the systems design phase for ________ by looking at economic, technical, and operational factors. A) accuracy B) feasibility C) currency D) organization

81) ______

82) The third phase in the systems life cycle is the systems ________ phase. A) implementation B) analysis C) design D) maintenance

82) ______

83) A ________ is a collection of related data—the electronic equivalent of a file cabinet. A) presentation B) spreadsheet C) gallery D) database

83) ______

84) This operating system is designed to run only with Apple computers. A) macOS B) Linux C) Windows D) UNIX

84) ______

85) These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files. A) employee-monitoring software B) freeware C) spyware D) cookies

85) ______

86) The systems design report presents the ________. A) costs versus the benefits B) possible development schedule C) description of the current system D) requirements for a new system

86) ______

87) All the following are commonly used units of measurement to describe memory capacity, except ________.

87) ______

8

Study Guide Final Exam CIS105 F2019

A) gigabyte (GB) C) nanobyte (NB)

B) terabyte (TB) D) megabyte (MB)

88) Documentation written for programmers should include text and program flowcharts, ________, and sample output as well as system flowcharts. A) program listings B) logic errors C) pseudocode D) syntax errors

88) ______

89) ________ ports provide high-speed connections for up to seven separate devices connected one to another. A) MIDI B) eSATA C) Thunderbolt D) Ethernet

89) ______

90) A ________ error is a violation of the rules of the programming language. A) machine B) logic C) syntax D) translation

90) ______

91) Storage that retains its data after the power is turned off is referred to as ________. A) nonvolatile storage B) sequential storage C) volatile storage D) direct storage

91) ______

92) As opposed to general-purpose applications, which are widely used in nearly every discipline, ________ applications are more narrowly focused. A) electronic B) object-oriented C) specialized D) web authoring

92) ______

93) ________ languages can be run on more than one kind of computer. A) Assembly B) Portable C) Task-oriented D) Machine

93) ______

94) The scenario wherein many files about the same person exist across different departments within an organization is called data ________. A) duplication B) repetition C) redundancy D) doubling

94) ______

95) The process of coding information to make it unreadable except to those who have a special piece of information known as a key. A) restriction B) security C) protection D) encryption

95) ______

96) Which among the following is considered a line-of-sight communication medium? A) satellite B) Bluetooth C) microwave D) broadcast radio

96) ______

97) A(n) ________ decision support system is used to support collective work. A) executive B) supervisory C) group D) transaction

97) ______

98) ________ uses standard telephone lines to provide high-speed connections. A) Cellular B) DSL C) Satellite D) Cable

98) ______

9

Study Guide Final Exam CIS105 F2019

Which of the following is not an example of secondary storage?

99) ______

99) A) RAM C) flash drives

B) external hard drives D) RAID

100) Which of the following characteristics about RAID is incorrect? A) highly reliable B) fast access speed C) expanded storage capability D) one high-capacity hard disk drive

10

100) _____