Study Guide Final Exam Computer 101
* The preview only display some random pages of manuals. You can download
full content via the form below.
The preview is being generated... Please wait a
moment!
- Submitted by: Gabriella
- File size: 151 KB
- File
type: application/pdf
- Words: 2,927
- Pages: 10
Report / DMCA this file
Add to bookmark
Description
Study Guide Final Exam CIS105 F2019
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) The capacity of a communication channel is measured in ________. 1) _______ A) bit capacity B) data flow C) band rate D) bandwidth 2) In a virtualized environment, the operating system of each virtual machine is known as the ________ operating system. A) client B) host C) guest D) home
2) _______
3) Hard disks store and organize files using all the following, except ________. A) tracks B) cylinders C) paths D) sectors
3) _______
4) ________ are used to create text-based documents. A) Presentation programs B) Databases C) Word processors D) Spreadsheets
4) _______
5) Which of the following is not a popular mobile operating system? A) Android B) iOS C) UNIX D) Windows 10 Mobile
5) _______
6) In OOP, each ________ contains both the data and processing operations necessary to perform a task. A) unstructured program B) structured program C) content component D) object
6) _______
7) Which of the following is not malware? A) worms C) viruses
7) _______ B) Ad-Aware D) Trojan horses
8) IF-THEN-ELSE is also known as a ________ structure, one of the types of logic structures. A) random B) loop C) selection D) sequential
8) _______
9) In a communication system, which among the following convert messages into packets that can travel across the communication channel? A) storage devices B) connection devices C) secondary devices D) sending and receiving devices
9) _______
10) An MIS requires a(n) ________ management system to integrate data from different departments. A) decision support B) executive support C) general ledger D) database
1
10) ______
Study Guide Final Exam CIS105 F2019
11) The hard-disk's surface is scratched and some or all of the data is destroyed when there is a ________. A) head crash B) track crash C) sector crash D) cylinder crash
11) ______
12) A(n) ________ support system is designed to be easy to use and allows someone to obtain essential information without extensive training. A) management information B) executive C) decision D) transaction processing
12) ______
13) Before sending a large file over the Internet, you might want to use one of these programs. A) Disk defragmenter B) Disk cleanup program C) Uninstaller D) File compression program
13) ______
14) TPS stands for ________. A) transaction processing system C) Trojan prevention system
14) ______ B) two-way processor synchronization D) triple port synchronization
15) Another name for Phase 5: Systems Implementation is ________. A) analysis B) feasibility C) development
15) ______ D) conversion
16) ________ programs allow you to mix text and graphics to create publications of professional quality. A) Word processing B) Desktop publishing C) Presentation D) Spreadsheet
16) ______
17) ________ ports are audiovisual ports typically used to connect large monitors. A) S/PDIF B) MIDI C) MiniDP D) Thunderbolt
17) ______
18) ________ are programs that combine a variety of visual objects to create attractive, visually interesting presentations. A) Presentation software B) Spreadsheets C) Desktop publishers D) DBMS
18) ______
19) When an order comes in, the ________ activity alerts the warehouse to ship a product. A) decision support system B) inventory control system C) sales order processing D) general ledger
19) ______
20) The ________ of a secondary storage device indicates how much data the storage medium can hold. A) capacity B) access C) memory D) storage
20) ______
21) A decision support system consists of four parts: the user, system software, data, and ________. A) decision models B) supervisory discretion C) management models D) general ledger analysis
21) ______
2
Study Guide Final Exam CIS105 F2019
22) In a(n) ________ database, any action on one element immediately affects the elements related to it. A) hierarchical B) multidimensional C) relational D) object-oriented
22) ______
23) Network interface cards (NIC) are connected through ________ on the system board. A) ports B) sound cards C) expansion slots D) wireless network cards
23) ______
24) A program that replicates itself and clogs computers and networks. A) Trojan horse B) virus C) worm D) denial-of-service attack
24) ______
25) ________ consists of programs designed to work behind the scenes to handle detailed operating procedures. A) Decision support B) Internal data C) External data D) System software
25) ______
26) Activities in the program maintenance area fall under two categories: ________ and changing needs. A) system flowcharts B) sample output C) program listings D) operations
26) ______
27) ________ is the process of breaking down information sent or transmitted across the Internet into small parts. A) Bandwidth B) Identification C) Protocol D) Packetization
27) ______
28) In a network database, a node may be reached through more than one path with the help of ________. A) pointers B) connectors C) strings D) links
28) ______
29) According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away? A) Computer Fraud and Abuse Act B) The Gramm-Leach-Bliley Act C) Digital Millennium Copyright Act D) Computer Abuse Amendments Act
29) ______
30) ________ ports provide high-speed connections for external disk drives, optical disks, and other large secondary storage devices. A) MiniDP B) Ethernet C) eSATA D) MIDI
30) ______
31) These specialty chips are designed to improve specific computing operations such as displaying 3D images and encrypting data. A) smartcards B) coprocessors C) NIC cards D) CPUs
31) ______
3
Study Guide Final Exam CIS105 F2019
32) The ________ is the central node that coordinates the flow of data by sending messages directly between the sender and receiver nodes. A) switch B) server C) gateway D) client
32) ______
33) ________ transmits data as pulses of light through tiny tubes of glass. A) WiMax B) Microwave C) Cellular D) Fiber optic cable
33) ______
34) The essential features of this include identifying, sending, and receiving devices and breaking information into small parts for transmission across the Internet. A) FTP B) TCP/IP C) HTTPs D) DNS
34) ______
35) System ________ show the flow of input data to processing and finally to output. A) grids B) top-down analysis C) flowcharts D) checklists
35) ______
36) Basic activities in every accounting department, including sales order processing, accounts receivable, inventory and purchasing, accounts payable, and payroll, are recorded in the ________. A) inventory control system B) accountant's database C) general ledger D) corporate database
36) ______
37) ________ is concerned with protecting software and data from unauthorized tampering or damage. A) Disaster recovery plan B) Data backup C) Physical security D) Data security
37) ______
38) ________ is the name of the process of converting from analog to digital. A) Optical recognition B) Modulation C) Demodulation D) Virtualization
38) ______
39) Which of the following is not a popular desktop operating system? A) Android B) Linux C) Windows 10
39) ______ D) macOS X
40) ________ ensures that there aren't multiple sources of the same data. A) Reliability B) Sharing C) Security D) Data integrity
40) ______
41) Which among the following is a way to shut down an ISP or website? A) Trojan horses B) viruses C) denial-of-service attack D) worms
41) ______
42) In a(n) ________ database, a node may be reached through more than one path with the help of pointers. A) relational B) network C) multidimensional D) object-oriented
42) ______
4
Study Guide Final Exam CIS105 F2019
43) ________ processing is also known as online processing. A) Batch B) Consignment C) Real-time
43) ______ D) Group
44) The ________ report describes the current information system, the requirements for a new system, and a possible development schedule. A) top-down analysis B) data flow C) systems analysis D) components
44) ______
45) A(n) ________ shows the relationship between input and output documents. A) investigation report B) checklist C) top-down analysis D) grid chart
45) ______
46) The category of operating system used for handheld devices. A) stand-alone B) open source C) network
46) ______ D) embedded
47) A(n) ________ is a program that provides modules of prewritten code. A) application generator B) artificial intelligence C) machine language D) pseudocode
47) ______
48) ________ of the system happens after the installation of software and hardware. A) Implementation B) Design analysis C) Management studies D) Testing
48) ______
49) Creating a website is called web ________. A) specializing B) processing
49) ______ C) authoring
D) management
50) A computer can become infected with viruses in all the following ways, except by ________. A) downloading software from the Internet B) creating a new folder on your computer C) opening attachments to email messages D) downloading files from the web
50) ______
51) ________ software is end-user software designed to accomplish a variety of tasks. A) System B) Application C) Communications D) Utility
51) ______
52) ________ memory uses the hard drive to substitute for RAM. A) Virtual B) Cache C) Hard drive
52) ______ D) Flash
53) Digital photographs consist of thousands of dots, or ________, that form images. A) rasters B) pixels C) vectors D) bitmaps
53) ______
54) In the ________ database, data elements are stored in different tables, each of which consists of rows and columns. A) hierarchical B) relational C) object-oriented D) network
54) ______
5
Study Guide Final Exam CIS105 F2019
55) Which of the following allows a computer to run two or more operations simultaneously? A) multicore processors B) multiplexing C) coprocessors D) binary system
55) ______
56) ________ are used to quickly create a presentation by providing predesigned styles and layouts as well as suggested content based on the type you choose. A) Templates B) Galleries C) Groups D) Tabs
56) ______
57) This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords. A) fake B) rogue C) virus D) worm
57) ______
58) An important aspect of the preliminary investigation phase is to ________. A) prepare a preliminary investigation report B) suggest alternative solutions C) analyze the data D) gather the data
58) ______
59) ________ show the data or information flow within an information system; the data is traced from its origin through processing, storage, and output. A) Data flow diagrams B) Top-down analysis methods C) Grid charts D) System flow charts
59) ______
60) The ________ approach to systems implementation is used only in cases in which the cost of failure or of interrupted operation is great. A) direct B) pilot C) phased D) parallel
60) ______
61) All of the following are true of DVD-ROM drives except: A) They can provide over two hours of high-quality video and sound comparable to that found in motion picture theaters. B) They are also known as erasable optical discs. C) DVD-ROM stands for "digital versatile disc-read only memory." D) They are a type of optical disc.
61) ______
62) This version of UNIX is an open source operating system that is an alternative to Windows. A) Lion B) High Sierra C) Sierra D) Linux
62) ______
63) The repetition, or ________ structure, describes a process that may be repeated as long as a certain condition remains true. A) loop B) random C) sequential D) selection
63) ______
64) Which of the following is not a measure to protect computer security? A) encrypting data B) keeping the same password on all systems consistently
64) ______
6
Study Guide Final Exam CIS105 F2019
C) copying data and storing it at a remote location D) restricting access 65) Frequently accessed information is held in ________. A) read only memory B) the hard drive C) flash memory D) cache memory
65) ______
66) This process improves system performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU. A) RAID B) disk caching C) data compression D) data access
66) ______
67) A ________ error occurs when the programmer uses an incorrect calculation or leaves out a programming procedure. A) syntax B) machine C) translation D) logic
67) ______
68) Program ________ graphically present the detailed sequence of steps needed to solve a programming problem. A) flowcharts B) pseudocode C) loops D) modules
68) ______
69) ________ organize, analyze, and graph numeric data such as budgets and financial reports. A) Presentation programs B) Databases C) Word processors D) Spreadsheet programs
69) ______
70) The range of Wi-Fi networks using microwave connections is being extended over greater distances using a new technology known as ________. A) WiMax B) Bluetooth C) RAID D) broadcast
70) ______
71) A typical ________ system can produce income statements and balance sheets. A) executive support B) management information C) decision support D) general ledger
71) ______
72) Common names for computer-based information systems are transaction processing, management information, ________, and executive support systems. A) virtual support B) decision support C) cloud information D) reflective information
72) ______
73) Proofreading a printout of a program is known as desk checking or code ________. A) modulation B) feedback C) calculation D) review
73) ______
74) An external hard disk ________. A) is heavy B) cannot be used in addition to an internal hard disk C) usually connects to a USB or Thunderbolt port D) is hard to remove
74) ______
7
Study Guide Final Exam CIS105 F2019
75) ________ models assist top-level managers in long-range planning, such as stating company objectives or planning plant locations. A) Operational B) Corporate C) Strategic D) Tactical
75) ______
76) Organizations use the following to allow suppliers and others limited access to their networks. A) extranets B) firewalls C) intranets D) proxy servers
76) ______
77) Monthly sales and production reports are examples of ________ reports. A) on-demand B) periodic C) exception D) executive
77) ______
78) When evaluating alternative systems, systems designers must consider economic feasibility, ________ feasibility, and operational feasibility. A) top-down B) currency C) digital D) technical
78) ______
79) ________ images are made up of geometric shapes or objects. A) Raster B) Pixel C) Vector
79) ______ D) Bitmap
80) In a Ribbon GUI, ________ are used to divide the ribbon into major activity areas. A) dialog boxes B) tabs C) galleries D) groups
80) ______
81) Systems designers evaluate each alternative in the systems design phase for ________ by looking at economic, technical, and operational factors. A) accuracy B) feasibility C) currency D) organization
81) ______
82) The third phase in the systems life cycle is the systems ________ phase. A) implementation B) analysis C) design D) maintenance
82) ______
83) A ________ is a collection of related data—the electronic equivalent of a file cabinet. A) presentation B) spreadsheet C) gallery D) database
83) ______
84) This operating system is designed to run only with Apple computers. A) macOS B) Linux C) Windows D) UNIX
84) ______
85) These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files. A) employee-monitoring software B) freeware C) spyware D) cookies
85) ______
86) The systems design report presents the ________. A) costs versus the benefits B) possible development schedule C) description of the current system D) requirements for a new system
86) ______
87) All the following are commonly used units of measurement to describe memory capacity, except ________.
87) ______
8
Study Guide Final Exam CIS105 F2019
A) gigabyte (GB) C) nanobyte (NB)
B) terabyte (TB) D) megabyte (MB)
88) Documentation written for programmers should include text and program flowcharts, ________, and sample output as well as system flowcharts. A) program listings B) logic errors C) pseudocode D) syntax errors
88) ______
89) ________ ports provide high-speed connections for up to seven separate devices connected one to another. A) MIDI B) eSATA C) Thunderbolt D) Ethernet
89) ______
90) A ________ error is a violation of the rules of the programming language. A) machine B) logic C) syntax D) translation
90) ______
91) Storage that retains its data after the power is turned off is referred to as ________. A) nonvolatile storage B) sequential storage C) volatile storage D) direct storage
91) ______
92) As opposed to general-purpose applications, which are widely used in nearly every discipline, ________ applications are more narrowly focused. A) electronic B) object-oriented C) specialized D) web authoring
92) ______
93) ________ languages can be run on more than one kind of computer. A) Assembly B) Portable C) Task-oriented D) Machine
93) ______
94) The scenario wherein many files about the same person exist across different departments within an organization is called data ________. A) duplication B) repetition C) redundancy D) doubling
94) ______
95) The process of coding information to make it unreadable except to those who have a special piece of information known as a key. A) restriction B) security C) protection D) encryption
95) ______
96) Which among the following is considered a line-of-sight communication medium? A) satellite B) Bluetooth C) microwave D) broadcast radio
96) ______
97) A(n) ________ decision support system is used to support collective work. A) executive B) supervisory C) group D) transaction
97) ______
98) ________ uses standard telephone lines to provide high-speed connections. A) Cellular B) DSL C) Satellite D) Cable
98) ______
9
Study Guide Final Exam CIS105 F2019
Which of the following is not an example of secondary storage?
99) ______
99) A) RAM C) flash drives
B) external hard drives D) RAID
100) Which of the following characteristics about RAID is incorrect? A) highly reliable B) fast access speed C) expanded storage capability D) one high-capacity hard disk drive
10
100) _____