CIS MC Final
Terms in this set (100)
The goal of ________ is to provide technological solutions to physical problems, such as providing sight to the blind.
biomedical chip research
All of the following are examples of being computer literate, EXCEPT ________.
knowing only how to use your computer for e-mails
Cognitive surplus means that we now find many people with ________.
excess time and free tools for collaboration
Businesses use ________ to search large amounts of data to find trends and patterns.
Collaborative consumption is when people get together to ______.
increase the use of a single product by sharing access to it.
The technology called QR codes stands for ________.
Affective computing is ________.
responding to human emotions
The difference between people with access to computers and the Internet and those without this access is known as the ________.
Analyzing computer systems to gather potential legal evidence is ________.
All of the following are types of cyberbullying EXCEPT ________.
physically stalking an individual
Enacted in 2002, the ________ Act requires companies to provide mechanisms for employees and third parties to anonymously report complaints, including ethics violation, anonymously.
Intellectual property (such as music, writing, and software) is protected through ________ law.
Social media sites such as Facebook inherently share information with others. The use of this information can raise questions regarding ________.
Which of the following statements is true?
Life experience affects an individual's personal ethics.
What was the first electronic spreadsheet application to be used on personal computers?
Introduced in the 1970s, which of the following allowed users to interact with the computer more easily?
The graphical user interface (GUI)
What programming language revolutionized the software industry because beginning students could learn it easily?
Released in 1993, ________ was the first Internet Web browser.
Many people believe Grace Hopper's greatest contribution to computing was the invention of the ________.
A ________ is a virus that is attached to documents such as Word or Excel files.
A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT ________.
launch a denial of service (DoS) attack on your computer
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
With regard to computer protection, quarantining is defined as ________.
placing a found virus in a secure area on the hard drive
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
A DDoS attack
A(n) ________ takes advantage of file transport methods to spread on their own.
Which of the following statements about cookies is NOT true?
Cookies obtain your personal information by searching your hard drive.
________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet.
All of the following are ways that can infect your computer with a virus, EXCEPT ________.
logging into e-mail
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________.
The Internet is ________.
a large network of networks
Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called ________.
Web 2.0 is classified as the ________.
You can keep track of IM contacts by using a ________.
A ________ is a Web site where anyone can add, remove, or edit its content.
________ is a social networking service that enables you to exchange short text messages with your friends or "followers."
A ________ is a personal journal posted on the Web.
The name of the free Internet browser from Mozilla is ________.
All of the following are examples of permanent storage, EXCEPT ________.
In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of ________.
The number of pixels displayed on the screen is known as ________.
RAM is a ________ storage location.
The most common type of monitor is a(n) ________.
liquid crystal display (LCD)
Inkjet printers and laser printers are examples of ________ printers.
Flash drives plug into a(n) ________.
Which of the following is NOT one of the four major data processing functions of a computer?
Analyzing the data or information
In a database, a ________ is a group of related fields.
In a database, a group of related records is called a(n) ________.
In a database, a ________ is synonymous with a category of information.
If a numeric field has a size of 5, which is the highest number it can hold?
If a business keeps two lists, one for employee payroll and one for employee benefits information, both containing name and address information, this is an example of data ________.
________ is the process of reducing data redundancy by recording data only once.
A ________ is automatically displayed in a field unless the user enters something different.
What does the acronym DBMS stand for?
Database management system
A(n) ________is a way of retrieving information from one or more tables that defines a particular subset of data.
________ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table.
A ________ temporarily displays records that match the specified criteria.
The top three operating systems for personal computers are ________.
Microsoft Windows, Mac OS X, and Linux
Which of the following is an open source operating system for personal computers?
Which of the following Windows utility programs arranges pieces of files on your hard drive in sequential order?
The location of a file is specified by its ________.
Which utility takes out redundancies in a file to reduce the file size?
The basic input/output system is stored on a ________ chip.
All of the following can be used in a Windows file name, EXCEPT ________.
Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS.
A(n) ________ software installation enables you to decide which features you want to install on the hard drive.
The type of software that is free and available with few licensing and copyright restrictions is known as ________ software.
Every software program has a set of ________ that specify the minimum recommended standards for the operating system, processor, RAM, and hard drive capacity.
The general software you use to do tasks at home, school, or work is known as ________ software.
Software designed for a specific industry is known as ________ software.
Multimedia software includes all of the following, EXCEPT ________.
CD ripping refers to ________.
encoding CDs to MP3 format
A ________ is a Microsoft Office feature that walks you through steps to complete a complicated task.
The amount of RAM recommended for most systems today is measured in ________.
Running the Disk Cleanup utility is a quick way to ________.
clear out unnecessary files
The rule of thumb that predicts that CPU capacity will double every two years is called ________.
Which is the fastest type of optical drive on the market?
On a Windows 7 system, you can determine the amount of RAM by looking in the ________ window.
A DVD is an example of a(n)________.
The dominant system processors on the market are made by ________.
Running the Disk Defragmenter utility will ________.
make the hard drive work more efficiently
A ________ uses electronic memory and has no motors or moving parts.
solid state drive
All of the following are benefits of networks EXCEPT, ________.
sharing an operating system
The device used to move data between two networks is called a ________.
A large network designed to provide access to a specific geographic area, such as a large city is a ________.
Data are sent through a network on bundles called ________.
Wireless Internet is available using ________.
Normal telephone cable is a type of ________.
The most popular transmission media option for wired Ethernet networks is ________.
unshielded twisted-pair (UTP) cable
A(n) ________ is a device connected to a network such as a computer or a game console.
Which of the following uses radio waves to transmit data signals over short distances?
Text messaging is also called ________.
short message service (SMS)
The choice communication mode of people aged 14 to 30 is ________.
Digital convergence means that ________.
one device can perform the jobs of several
A ________ runs a traditional desktop operating system and is lightweight.
Almost all cell phones are designed with a ________ port.
You can send messages that include photos and videos between mobile devices using ________ technology.
multimedia message service (MMS)
When a U.S. company hires a company outside of the United States, it uses a technique called ________.
When a business hires a third-party firm to provide services it once offered itself, it is called ________.
Which position is not typically a part of the information systems department?
________ jobs involve little day-to-day supervision and require a great deal of self-discipline.
YOU MIGHT ALSO LIKE...
Test Preparation TOEIC, SAT, TOEFL
Computer science Final Exam
Other Cis 150 Material
OTHER SETS BY THIS CREATOR
Required VFR Equipment (Night)
Required VFR Equipment (Day)
Required IFR Equipment
V Speeds Diamond DA-20