Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Question

Which of the following measures the amount of time required by the storage device to retrieve data and programs?
click to flip
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't know

Question

Which of the following is not an example of secondary storage?
Remaining cards (119)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Technology FINAL

Ch. 7-12 (13 is not included in this, but we need to study that also.)

QuestionAnswer
Which of the following measures the amount of time required by the storage device to retrieve data and programs? Access speed
Which of the following is not an example of secondary storage? RAM
______ speed is the measure of the amount of time required by a storage device to retrieve data and programs. Access
One way to improve the storage capacity of a hard disk is to _______ use file compression
Which of the following is true about an internal hard disk? Often stores the operating system
This process improves system performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU. Disk caching
Three common storage options discussed in your text are hard disk, ________, and solid-state storage. optical disc
Cell phones use which of these storage technologies? Flash memory card
________ are storage drives that contain both solid-state storage and hard disks in an attempt to gain the speed and power benefits of SSDs while still having the low cost and large capacity of hard drives. Hybrid drives
_______ improves hard-disk performance by anticipating data needs and reducing time to access data from secondary storage. Disk caching
An external hard disk _______ usually connects to a USB or Thunderbolt port
The ________ of a secondary storage device indicates how much data the storage medium can hold. capacity
Tracks are divided into invisible wedge-shaped sections called ____ sectors
Optical discs use these to represent data. Pits and lands
________ programs scan files for ways to reduce the amount of required storage File compression
Typically a personal computer uses a(n) ________ to store the operating system and software applications. internal hard disk
Which of these is not an example of solid state storage? Digital versatile disc
All the following are true of DVD-ROM drives except they are also known as erasable optical discs.
Solid-state storage devices are different than hard disks in that they _______ have no moving parts
Due to its expanded storage capability, fast access speed, and high reliability, ________ is (are) often used by Internet servers and large organizations. RAID
In a communication system, which among the following originate and accept messages in the form of data, information, and/or instructions? Sending and receiving devices
________ are countrywide and worldwide networks. Wide area networks
In a wireless LAN, all communications pass through the network's centrally located wireless access point or ________ station. base
Microwave communication uses high-frequency ________. radio waves
A(n) ________ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to headsets, controllers to game systems, and so on. personal
_____ is a term relating to sending data to a satellite. Uplink
A(n) ________ is a private network that connects more than one organization. extranet
________ is a high-frequency transmission medium that has a single solid-copper core. Coaxial cable
This type of network strategy uses central servers to coordinate and supply services to other nodes on the network Client/server
A(n) ________ is a network where the nodes are in close physical proximity to each other. local area network
_____ uses standard telephone lines to provide high-speed connections. DSL
The actual connecting or transmission medium that carries the message in a communication system is called the ________. communication channel
In a client/server network, the ________ provides access to resources and services. server
In a computer network, this node that requests and uses resources available from other nodes. Client
In a communication system, which among the following convert messages into packets that can travel across the communication channel? Connection devices
Which among the following is considered a line-of-sight communication medium? Microwave
Using this type of communications channel, several users can simultaneously use a single connection for high-speed data transfer. Broadband
Which physical connection is the fastest? Fiber-optic cable
The range of Wi-Fi networks using microwave connections is being extended over greater distances using a wireless technology known as ________. WiMax
A(n) ________ network system uses central servers to coordinate and supply services to other nodes on the network client-server
This type of computer criminal creates and distributes malicious programs. Cracker
These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files. Employee-monitoring software
________ are used by advertising companies to keep track of your web activity as you move from one site to the next. Third-party cookies
________ is concerned with protecting software and data from unauthorized tampering or damage. Data security
Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called ________. zombies
A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet ________. scam
Which of the following is not malware? Ad-Aware
The most significant concerns for implementation of computer technology involve ________, security, and ethics. privacy
A ________ is a computer criminal who creates and distributes malicious programs or malware. cracker
As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the ________. firewall
Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk. Privacy mode
________ store information about the current session, your general preferences, and your activity on the website. First-party cookies
________ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver. Trojan horses
Programs used to secretly record an individual's activities on the Internet are called ________. spyware
A(n) ________ attempts to slow down or stop a computer system or network by sending repetitive requests for information. DoS attack
A(n) ________ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information. rogue
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account. Dictionary attack
The use of the Internet to send or post content intended to hurt or embarrass another person. Cyberbullying
______ is concerned with protecting software and data from unauthorized tampering or damage. Data security
________ is the illegal assumption of someone's identity for the purposes of economic gain. Identity theft
________-level information flow is primarily vertical. Supervisory
What documentation shows the income, expenses and difference between them for a company during a specific time period? Income statements
The ________ activity records the customer requests for products or services. sales order processing
________ models assist top-level managers in long-range planning, such as stating company objectives or planning plant locations. Strategic
When an order comes in, the ________ activity alerts the warehouse to ship a product. sales order processing
Which system is a type of artificial intelligence that uses a database, containing facts and rules, to provide assistance to users? Expert system
Some of these systems have the ability to retrieve information from databases outside the company, such as business-news services. Executive support systems (ESS)
Money collected from or owed by customers is called ________. accounts receivable
________ systems are computer systems that allow people located at various geographic locations to communicate and have in-person meetings. Videoconferencing
This level of management is involved with tactical planning and implementing the long-term goals within an organization. Middle management
Who uses management information systems? Middle-level managers
An example of this type of report would be a sales report that shows that certain items are selling significantly above or below forecasts. Exception
This system is a flexible tool for data analysis, since its reports do not have a fixed format. Decision support system
_______ systems help supervisors by generating databases that act as the foundation for other information systems. Transaction processing
Project resources can be scheduled, planned, and controlled using ________ project managers
This lists the assets, liabilities, and the equity of an organization Balance sheet
________ workers use OAS systems and are involved with the creation of information in their areas of expertise. Knowledge
Regional managers can compare their regular sales reports with that of the other regional managers by using ________. periodic reports
Common names for computer-based information systems are transaction processing, management information, ________, and executive support systems. decision support
This decision model helps middle-level managers control the work of the organization, such as financial planning and sales promotion planning. Tactical model
In the object-oriented database model, this term is the equivalent to a field in a relational model. Attribute
In ________, data from transactions are collected over time and then processed all at once. batch processing
These databases store not only data but also instructions to manipulate the data. Object-oriented
The data ________ or schema contains a description of the structure of data in the database. dictionary
In this database model, the fields or records are structured in nodes Hierarchical
Users of a(n) ________ database have access through their personal computers linked to local or wide area networks. company
The analysis tools associated with the data manipulation subsystem that support querying databases include ________ and structured query languages (SQL). query-by-example
Analysis tools that support viewing all or selected parts of data, querying the database, and generating reports include query-by-example as well as a specialized programming language called ________. SQL
In this type of database, the data and the DBMS are stored either on the user's hard-disk drive or on a LAN file server. Individual
The most basic logical element of data is a(n) ________. character
This subsystem defines the logical structure of the database by using a data dictionary or schema. Data definition
A(n) ________ database, sometimes called a data cube, allows data to be viewed as a cube having three or more sides and consists of cells. multidimensional
In the ________ database, data elements are stored in different tables, each of which consists of rows and columns. relational
The analysis tools associated with the ________ subsystem include query-by-example and structured query languages (SQL). data manipulation
Access to these databases is offered to the public or selected outside individuals, for a fee. Commercial databases
In a(n) ________ database, a node may be reached through more than one path with the help of pointers. network
These types of databases are also called information utilities or data banks. Commercial
A(n) ________ represents a collection of attributes that describe an entity. record
The combined information presented on this type of database can be used to change the whole merchandising strategy of a store. Company
If Mr. Smith's bike has been sent to his new address, but the bill to his old one, it can most likely be attributed to a lack of data ________. integrity
The ________ approach to systems implementation is used only in cases in which the cost of failure or of interrupted operation is great. parallel
In this phase of the systems life cycle, the new information system is installed, and people are trained to use it. Systems implementation
This is performed to determine whether the new procedures are actually furthering productivity. Systems audit
The third phase in the systems life cycle is the systems ________ phase. design
_______ feasibility is evaluated to determine if the proposed system can actually be made to operate in the organization Operational
The ________ identifies the top-level components of a complex system. top-down analysis method
This conversion type is not recommended because problems arising in this approach could be catastrophic. Direct approach
When evaluating alternative systems, systems designers must consider economic feasibility, ________ feasibility, and operational feasibility. technical
System ________ show the flow of input data to processing and finally to output. flowcharts
In the preliminary investigation phase of the systems life cycle, which one of the following tasks would not be included? Gathering the data
Identify the sixth phase of the systems life cycle. Systems maintenance
New hardware and software are acquired, developed, and tested in the systems ________ stage of the systems life cycle. development
Systems analysis and design is a problem-solving procedure for examining and improving a(n) ________ system. information
This individual studies an organization’s systems to determine what actions to take and how to use computer technology to assist them. Systems analyst
This is the final step of the systems implementation phase of the systems life cycle. Train users
________ of the system happens after the installation of software and hardware. Testing
This document presents the costs versus the benefits and outlines the effect of alternative designs on the organization. Systems design report
This is the first step in the systems design phase. Design alternative systems
Most organizations spend more time and money on the systems ________ phase than on any of the other phases. maintenance
During which phase of the systems life cycle are users trained to use the new system? Systems implementation
Created by: Cmprotzman
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards