Advertisement Upgrade to remove ads

Final Exam

Employers today rely on knowledge workers' _____ skills to keep them competitive.

computer

A general-purpose computer relies on the _____ being used to perform an activity.

software

A computer relies on the combination of _____ and _____ to operate.

hardware, software

A computer that manages information uses a _____ to organize and deliver it.

database

What two digits represent the binary number system?

0 and 1

A _____ is an example of a computer assigned to a special task.

kiosk

One thing to consider when choosing a mobile device is _____.

battery life

The speed of the ____ dictates how fast the processor can process data.

internal clock

Using Moore's Law, we can gauge how ____ processors might be in the coming years.

fast

Integrated circuits are also known as ____.

microchips

Most of today's PCs come equipped with at least 512 ____ of video memory.

megabytes

An example of digital convergence is our smart phone which combines many digital functions into one device.

True

A bit has two states, left or right.

False

ASCII is the standard used to represent ____ in digital form—with 1s and 0s.

keyboard characters

The ____ rate for a hard disk drive is much slower than that of solid-state storage.

access

The task of video _____ is to serve as a buffer between the processor and the monitor.

memory

Video cards have their own _____.

memory

A mouse and a touch pad are examples of ____ devices.

pointing

Display size is measured ____.

diagonally

Large retail stores use _____ terminals to track purchases and inventory.

POS

There are ____ stages to the software development life cycle.

five

Which of the following is NOT an object-oriented programming language?

UNIX

A PC comes with all of the following EXCEPT ____.

custom software

Small businesses can take advantage of _____ software in the cloud to keep track of their customers and everyday transactions.

CRM

A(n) ____ license defines the permissions, rights, and restrictions provided to the person who purchases a copy of a work.

software

All of the following are examples of freeware EXCEPT ____.

Microsoft Office

Many in the open-source movement are opposed to ____ software, like that developed by Microsoft.

proprietary

The ____ license was designed to fill the gap between full copyright and public domain options for authors, artists, and educators.

Creative Commons

If you create, develop, or pay to have a software program written, it becomes your intellectual property.

True

Shareware is software that is made available to the public at no cost.

False

A type of computer connection that provides Internet service through a phone line that services both the Interent and your phone is ____.

DSL

One feature of Internet2 technology is ____.

speed

The Internet has become an important part of daily life for only businesses and professionals.

False

Using the Web as a primary user interface to access the Internet is also referred to as ____.

cloud computing

A popular Web server software today is ____.

Apache

A cookie file is stored on a user's computer.

True

Google relies on ____ to relay information related to its mapped software.

satellites

Playing online Scrabble with others on the Web at any given time is an example of a ____ gaming experience.

multiplayer

Having a personal Web site that lists your accomplishments can help your job search.

True

Facebook is a popular Web application.

True

There is hope that WiMAX technology will help resolve the ____ problem.

last mile

A ____ is considered a telecommunications device that sends and receives signals.

all of the above

____ is a popular cable type used as network backbone by major telecommunications companies.

Fiber-optic

With the advent of ____ generation technology, broadband Internet services over cellular networks were made available.

fourth (4G)

A pager receives signals from ____.

transmitters

Tagging a photo with geographic data is known as ____.

geotagging

With Bluetooth, up to ____ devices can be paired simultaneously.

seven

Items such as a credit cards are beginning to take advantage of RFID technology through the use of a(n) ____ reader.

NFC

A ____ Area Network is the interconnection of personal information technology devices, typically wirelessly, within the range of an individual.

Personal

Wide Area Networks use telecommunication devices such as ____ to transmit data.

satellites

The ____ was the first eBook reading device to gain widespread acceptance.

Kindle

Only slate devices such as the iPad are capable of supporting eBooks.

False

An advantage of using a(n) ____ format is its ability to compress CD music files to one tenth their original size.

MP3

When you digitize a sound wave, you measure and record its ____ at regular time intervals called the sampling rate.

amplitude

Designers rely on ____ software to help them build prototypes for further research and testing.

CAD

An example of a vector graphic image is ____.

clip art

Digital photography captures, stores, and manipulates photographs digitally as a series of ____.

1s and 0s

All of the following are photo-editing software applications EXCEPT ____.

Adobe Illustrator

The editing tools provided on today's camcorders are as sophisticated and powerful as those provided by video-editing software.

False

Social networks employ virtual reality to provide an environment in which individuals can interact through the use of ____.

avatars

In a database, a collection of related fields that describes some object or activity is referred to as a ____.

record

Relationships between tables can be illustrated through a(n) ____ relationship diagram.

entity

When building a database, careful consideration must be given to ____.

content

In a database, your first name would be categorized as a ____.

field

____ usually involves breaking one table into two or more tables in order to correct a data problem or anomaly.

Normalization

A database ____ is a graphical representation of the structure of a database.

schema

A schema can stand alone or be part of a database.

True

On Amazon.com, when the customer is ready to make a purchase, the database ____ manages the entire process.

management system

Installation and ongoing function of software on a database system is the job of the database ____.

administrator

A retail store may use the ____ approach to analyze data collected from checkout scanners.

business-intelligence

In the ____ form of e-commerce, transactions between businesses across private networks, the Internet, and the Web are supported.

B2B

The popularity of ____ e-commerce is a good example of how customers can successfully implement their own sales strategy on the Web.

C2C

Companies take advantage of location-based advertising when you visit such sites as ____.

foursquare.com

Many e-tail sites support ____ virtual imagery, so you can easily view what you want to purchase in full detail.

three-dimensional

Online ____, such as uBid.com, provide a method for manufacturers to liquidate stock and for consumers to find a good deal.

clearinghouses

____ supply management services have played an important role in building relationships between corporate buyers and sellers.

Global

All of the following are technologies that play an important role in e-commerce EXCEPT ____.

DHTML

Electronic data interchange uses private communications networks called ____ networks.

value-added

Hosting companies provide all the necessary software tools to deliver e-commerce applications EXCEPT ____.

shipping

Information transmitted from an online sales transaction uses a secure ____ connection where buyers enter their account information and submit it.

encrypted

An MIS system uses a(n) ____ report when a request is made by a specific person for a specific purpose.

demand

A corporation relies on its ____ statistics to provide insight into the state of the business and its overall health.

key performance indicator

Management information systems are powered by ____.

databases

The final stage of decision making and problem solving is known as the ____ stage, where the results of a decision are reviewed.

monitoring

Which of the following is NOT a benefit of an ERP system?

low expense in time and money

Solutions that deliver improved customer service and targeted marketing support all of the following areas of an enterprise EXCEPT ____.

human resources

A(n) ____ system can help a business alleviate the need for multiple information system programs.

enterprise

The first step in systems analysis is to ____ of the organization and how the computer system can help solve them.

identify the overall goals

In a Gantt chart, each time a ____ is completed, a grid cell is marked to indicate its completion.

task

In a(n) ____ analysis, the strengths and weaknesses of the existing business are uncovered.

systems

Computerized expert systems use ____ to arrive at conclusions or make suggestions.

heuristics

Communication and language are key elements in the ____.

Turing Test

Singularity embraces the idea of ____ and other recent trends in technology.

Moore's Law

AI systems typically include all of the following EXCEPT ____.

concatenated methodologies

A(n) ____ system is software that is knowledgeable in a particular field or area.

expert

Computational intelligence is directly related to ____.

artificial intelligence

Medical robots are built with ____ machine capabilities and sophisticated AI controlling software.

high-precision

AI expert ____ has created an AI program he calls the Cybernetic Poet that can create poetry in the style of human poets.

Ray Kurzweil

Through ____, a computer can pick up movement in its environment.

visual input

Facial recognition is used in ____ to verify a person's identity.

authentication

____ permissions provide registered users with access to the files they need, while restricting access to private resources.

User

A company may hire a ____ hacker to learn about vulnerabilities in their system.

white-hat

All of the following are examples of malware EXCEPT for ____.

updates

The process of examining computing equipment to determine if it has been used for illegal, unauthorized, or unusual activities is known as ____.

computer forensics

A common form of authentication is a ____.

password

Through the use of ____, data is secured when it is stored and transported over a network.

encryption

In a Wi-Fi network, ____ provide several settings that can all but bulletproof a wireless network.

access points

An Internet ____ can be found in the form of a chain letter, scam, and false alarm.

hoax

An important function of a firewall is to protect all the ____ of a network or computer from undesirable data.

ports

In a distributed denial-of-service (DDoS) attack, the services of a(n) ____ can be halted.

Internet server

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set