ITE 120 Midterm

Created by sinajoseph 

Upgrade to
remove ads

Which of the following is not a characteristic of good information?

interchangeability

A good information system will provide each user with:

large quantities of information

It is probably harder to make changes to the __________ of an information system than the data itself.

procedures

The most important component of an information system is __________.

people

To get the most out of any class you take it is important to __________ the material by asking, "How will this class help me to achieve my goals?"

personalize

The quality of your __________ is a large part of the quality of your information system

thinking

The __________ functions as a bridge between the human side of the information system components and the computer/automation side.

data

An iPod would be an example of the __________ component of an information system

hardware

Knowledge derived from recorded facts is __________.

information

____ is the most important component in the five component framework.

Hardware

The basic idea of Moore's law is that:

the density of transistors on a computer chip doubles every 18 months.

If you are a __________ recipient of sensitive information, such as might be overheard or contained in a misdirected email, this would not be illegal, but might be unethical to use it.

passive

The process of __________ moves work from people to computers

automation

It is important to try to understand the __________ of teachers, authors, and your colleagues.

perspective

A ___ is a collection of interacting components that achieve some purpose.

system

A good information system will provide each user with more information than they could possibly use?

False

Information systems are components that interact with information to produce a viable computer system?

False

Hardware is the most important component in the five component framework.

False

The higher you rise in an organization the ___ information you will be given

More

Multiparty text chats are a __________ virtual meeting.

synchronous

Henry collects the parts made by six people and puts them together to form one item. This is an example of collaboration?

False

George's team uses videoconferencing to asynchronously communicate?

False

Project managers must make __________ because resources are scarce.

Trade-offs

Victoria's team stores their work on an ftp server so that others can download them. This is an example of shared content that has no control?

True

Storing documents on servers is a better choice than emails because documents are:

in a single storage place.

__________ thinking centers on the self.

Egocentric

Liz's team conference calls every Tuesday at 2. This is an example of synchronous communication. ?

True

A Local Area Network (LAN) would be used to connect computers located in Seattle and Philadelphia.

False

A(n) __________ firewall examines each part of the message and decides whether it will let that part pass through to the network.

packet-filtering

An analog signal is a digital format.? T/F

False

An internet is a network of networks. T/fF?

True

TCP/IP is an example of an LAN protocol.

False

__________ transmits signals using light rays.

Optical fiber cable

A(n) __________ connects computers at different geographic locations.

WAN

The one of the most common optical connectors is a(n) __________.

ST

The protocol which handles messages between a modem and an ISP is known as the __________.

PPP

Virtual private connections over public networks are called __________.

Tunnels

When comparing WANs, managers need to consider what criterium/criteria?

all of these

A protocol is a standardized means for coordinating an communications between two or more internets. T/F

False

The hardware component that connects a printer's circuitry to the network is called a(n):

NIC

Transmission delays that occur during periods of network congestion are known as __________.

latency

DSL stands for digital signal line and operates on the same lines as voice telephones and dial-up modems

False

Determining the best mix of products that a company should sell is an example of an unstructured decision?

Determining the best mix of products that a company should sell is an example of an unstructured decision?

Understanding how the output from your system impacts other people in the organization is an example of __________ thinking.

Understanding how the output from your system impacts other people in the organization is an example of __________ thinking.

Understanding how the output from your system impacts other people in the organization is an example of __________ thinking.

Understanding how the output from your system impacts other people in the organization is an example of __________ thinking.

Jane's team receives and reviews the documents at the same time. This is an example of sequential workflow?

Jane's team receives and reviews the documents at the same time. This is an example of sequential workflow?

Ad hoc work groups are __________ collaboration groups? T/F

Ad hoc work groups are __________ collaboration groups? T/F

Rufus' group stores documents on a server using __________.

Rufus' group stores documents on a server using __________.

Engineers at Richard's company meet every Friday over the Internet. He wanted to ski one week, so he convinced John to sign into the system and pretend to be him. This is an example of spoofing. T/F?

Engineers at Richard's company meet every Friday over the Internet. He wanted to ski one week, so he convinced John to sign into the system and pretend to be him. This is an example of spoofing. T/F?

Determining the best mix of products to sell in the European market is an example of a(n) __________ decision.

Determining the best mix of products to sell in the European market is an example of a(n) __________ decision.

A computer with two CPUs is called a dual-processor computer.

A computer with two CPUs is called a dual-processor computer.

The operating system employs __________ so that users can run multiple applications and files at the same time.

The operating system employs __________ so that users can run multiple applications and files at the same time.

As software vendors discover security holes in their products they continually issue modifications called "hole repairs".

As software vendors discover security holes in their products they continually issue modifications called "hole repairs".

Software vendors should make it easier for users to download and apply __________ to fix known holes in their software.

Software vendors should make it easier for users to download and apply __________ to fix known holes in their software.

__________ software is processed on client computers.

__________ software is processed on client computers.

A collection of servers called a __________ coordinates the activities of hundreds of users.

A collection of servers called a __________ coordinates the activities of hundreds of users.

When one buys an operating system like WinXP, you are actually buying a software:

When one buys an operating system like WinXP, you are actually buying a software:

Linux is a version of Unix that was developed by the open source community.

Linux is a version of Unix that was developed by the open source community.

A CPU is sometimes called the "brain" of the computer.

A CPU is sometimes called the "brain" of the computer.

The term "bit" stands for binary digit.

The term "bit" stands for binary digit.

Every monitor has a(n) __________ which is the size of the pixel grid that will give the best sharpness and clarity.

Every monitor has a(n) __________ which is the size of the pixel grid that will give the best sharpness and clarity.

Volatile memory devices maintain their contents without the power being on.

Volatile memory devices maintain their contents without the power being on.

A gigabyte or GB is 1024MB.

A gigabyte or GB is 1024MB.

To keep from getting a virus on your computer, be sure to never download files, programs, or attachments from __________ Web sites.

To keep from getting a virus on your computer, be sure to never download files, programs, or attachments from __________ Web sites.

The Blackberry Pearl and the iPhone are examples of mobile computing devices.

The Blackberry Pearl and the iPhone are examples of mobile computing devices.

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set