click below
click below
Normal Size Small Size show me how
Technology FINAL
Ch. 7-12 (13 is not included in this, but we need to study that also.)
| Question | Answer |
|---|---|
| Which of the following measures the amount of time required by the storage device to retrieve data and programs? | Access speed |
| Which of the following is not an example of secondary storage? | RAM |
| ______ speed is the measure of the amount of time required by a storage device to retrieve data and programs. | Access |
| One way to improve the storage capacity of a hard disk is to _______ | use file compression |
| Which of the following is true about an internal hard disk? | Often stores the operating system |
| This process improves system performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU. | Disk caching |
| Three common storage options discussed in your text are hard disk, ________, and solid-state storage. | optical disc |
| Cell phones use which of these storage technologies? | Flash memory card |
| ________ are storage drives that contain both solid-state storage and hard disks in an attempt to gain the speed and power benefits of SSDs while still having the low cost and large capacity of hard drives. | Hybrid drives |
| _______ improves hard-disk performance by anticipating data needs and reducing time to access data from secondary storage. | Disk caching |
| An external hard disk _______ | usually connects to a USB or Thunderbolt port |
| The ________ of a secondary storage device indicates how much data the storage medium can hold. | capacity |
| Tracks are divided into invisible wedge-shaped sections called ____ | sectors |
| Optical discs use these to represent data. | Pits and lands |
| ________ programs scan files for ways to reduce the amount of required storage | File compression |
| Typically a personal computer uses a(n) ________ to store the operating system and software applications. | internal hard disk |
| Which of these is not an example of solid state storage? | Digital versatile disc |
| All the following are true of DVD-ROM drives except | they are also known as erasable optical discs. |
| Solid-state storage devices are different than hard disks in that they _______ | have no moving parts |
| Due to its expanded storage capability, fast access speed, and high reliability, ________ is (are) often used by Internet servers and large organizations. | RAID |
| In a communication system, which among the following originate and accept messages in the form of data, information, and/or instructions? | Sending and receiving devices |
| ________ are countrywide and worldwide networks. | Wide area networks |
| In a wireless LAN, all communications pass through the network's centrally located wireless access point or ________ station. | base |
| Microwave communication uses high-frequency ________. | radio waves |
| A(n) ________ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to headsets, controllers to game systems, and so on. | personal |
| _____ is a term relating to sending data to a satellite. | Uplink |
| A(n) ________ is a private network that connects more than one organization. | extranet |
| ________ is a high-frequency transmission medium that has a single solid-copper core. | Coaxial cable |
| This type of network strategy uses central servers to coordinate and supply services to other nodes on the network | Client/server |
| A(n) ________ is a network where the nodes are in close physical proximity to each other. | local area network |
| _____ uses standard telephone lines to provide high-speed connections. | DSL |
| The actual connecting or transmission medium that carries the message in a communication system is called the ________. | communication channel |
| In a client/server network, the ________ provides access to resources and services. | server |
| In a computer network, this node that requests and uses resources available from other nodes. | Client |
| In a communication system, which among the following convert messages into packets that can travel across the communication channel? | Connection devices |
| Which among the following is considered a line-of-sight communication medium? | Microwave |
| Using this type of communications channel, several users can simultaneously use a single connection for high-speed data transfer. | Broadband |
| Which physical connection is the fastest? | Fiber-optic cable |
| The range of Wi-Fi networks using microwave connections is being extended over greater distances using a wireless technology known as ________. | WiMax |
| A(n) ________ network system uses central servers to coordinate and supply services to other nodes on the network | client-server |
| This type of computer criminal creates and distributes malicious programs. | Cracker |
| These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files. | Employee-monitoring software |
| ________ are used by advertising companies to keep track of your web activity as you move from one site to the next. | Third-party cookies |
| ________ is concerned with protecting software and data from unauthorized tampering or damage. | Data security |
| Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called ________. | zombies |
| A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet ________. | scam |
| Which of the following is not malware? | Ad-Aware |
| The most significant concerns for implementation of computer technology involve ________, security, and ethics. | privacy |
| A ________ is a computer criminal who creates and distributes malicious programs or malware. | cracker |
| As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the ________. | firewall |
| Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk. | Privacy mode |
| ________ store information about the current session, your general preferences, and your activity on the website. | First-party cookies |
| ________ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver. | Trojan horses |
| Programs used to secretly record an individual's activities on the Internet are called ________. | spyware |
| A(n) ________ attempts to slow down or stop a computer system or network by sending repetitive requests for information. | DoS attack |
| A(n) ________ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information. | rogue |
| This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account. | Dictionary attack |
| The use of the Internet to send or post content intended to hurt or embarrass another person. | Cyberbullying |
| ______ is concerned with protecting software and data from unauthorized tampering or damage. | Data security |
| ________ is the illegal assumption of someone's identity for the purposes of economic gain. | Identity theft |
| ________-level information flow is primarily vertical. | Supervisory |
| What documentation shows the income, expenses and difference between them for a company during a specific time period? | Income statements |
| The ________ activity records the customer requests for products or services. | sales order processing |
| ________ models assist top-level managers in long-range planning, such as stating company objectives or planning plant locations. | Strategic |
| When an order comes in, the ________ activity alerts the warehouse to ship a product. | sales order processing |
| Which system is a type of artificial intelligence that uses a database, containing facts and rules, to provide assistance to users? | Expert system |
| Some of these systems have the ability to retrieve information from databases outside the company, such as business-news services. | Executive support systems (ESS) |
| Money collected from or owed by customers is called ________. | accounts receivable |
| ________ systems are computer systems that allow people located at various geographic locations to communicate and have in-person meetings. | Videoconferencing |
| This level of management is involved with tactical planning and implementing the long-term goals within an organization. | Middle management |
| Who uses management information systems? | Middle-level managers |
| An example of this type of report would be a sales report that shows that certain items are selling significantly above or below forecasts. | Exception |
| This system is a flexible tool for data analysis, since its reports do not have a fixed format. | Decision support system |
| _______ systems help supervisors by generating databases that act as the foundation for other information systems. | Transaction processing |
| Project resources can be scheduled, planned, and controlled using ________ | project managers |
| This lists the assets, liabilities, and the equity of an organization | Balance sheet |
| ________ workers use OAS systems and are involved with the creation of information in their areas of expertise. | Knowledge |
| Regional managers can compare their regular sales reports with that of the other regional managers by using ________. | periodic reports |
| Common names for computer-based information systems are transaction processing, management information, ________, and executive support systems. | decision support |
| This decision model helps middle-level managers control the work of the organization, such as financial planning and sales promotion planning. | Tactical model |
| In the object-oriented database model, this term is the equivalent to a field in a relational model. | Attribute |
| In ________, data from transactions are collected over time and then processed all at once. | batch processing |
| These databases store not only data but also instructions to manipulate the data. | Object-oriented |
| The data ________ or schema contains a description of the structure of data in the database. | dictionary |
| In this database model, the fields or records are structured in nodes | Hierarchical |
| Users of a(n) ________ database have access through their personal computers linked to local or wide area networks. | company |
| The analysis tools associated with the data manipulation subsystem that support querying databases include ________ and structured query languages (SQL). | query-by-example |
| Analysis tools that support viewing all or selected parts of data, querying the database, and generating reports include query-by-example as well as a specialized programming language called ________. | SQL |
| In this type of database, the data and the DBMS are stored either on the user's hard-disk drive or on a LAN file server. | Individual |
| The most basic logical element of data is a(n) ________. | character |
| This subsystem defines the logical structure of the database by using a data dictionary or schema. | Data definition |
| A(n) ________ database, sometimes called a data cube, allows data to be viewed as a cube having three or more sides and consists of cells. | multidimensional |
| In the ________ database, data elements are stored in different tables, each of which consists of rows and columns. | relational |
| The analysis tools associated with the ________ subsystem include query-by-example and structured query languages (SQL). | data manipulation |
| Access to these databases is offered to the public or selected outside individuals, for a fee. | Commercial databases |
| In a(n) ________ database, a node may be reached through more than one path with the help of pointers. | network |
| These types of databases are also called information utilities or data banks. | Commercial |
| A(n) ________ represents a collection of attributes that describe an entity. | record |
| The combined information presented on this type of database can be used to change the whole merchandising strategy of a store. | Company |
| If Mr. Smith's bike has been sent to his new address, but the bill to his old one, it can most likely be attributed to a lack of data ________. | integrity |
| The ________ approach to systems implementation is used only in cases in which the cost of failure or of interrupted operation is great. | parallel |
| In this phase of the systems life cycle, the new information system is installed, and people are trained to use it. | Systems implementation |
| This is performed to determine whether the new procedures are actually furthering productivity. | Systems audit |
| The third phase in the systems life cycle is the systems ________ phase. | design |
| _______ feasibility is evaluated to determine if the proposed system can actually be made to operate in the organization | Operational |
| The ________ identifies the top-level components of a complex system. | top-down analysis method |
| This conversion type is not recommended because problems arising in this approach could be catastrophic. | Direct approach |
| When evaluating alternative systems, systems designers must consider economic feasibility, ________ feasibility, and operational feasibility. | technical |
| System ________ show the flow of input data to processing and finally to output. | flowcharts |
| In the preliminary investigation phase of the systems life cycle, which one of the following tasks would not be included? | Gathering the data |
| Identify the sixth phase of the systems life cycle. | Systems maintenance |
| New hardware and software are acquired, developed, and tested in the systems ________ stage of the systems life cycle. | development |
| Systems analysis and design is a problem-solving procedure for examining and improving a(n) ________ system. | information |
| This individual studies an organization’s systems to determine what actions to take and how to use computer technology to assist them. | Systems analyst |
| This is the final step of the systems implementation phase of the systems life cycle. | Train users |
| ________ of the system happens after the installation of software and hardware. | Testing |
| This document presents the costs versus the benefits and outlines the effect of alternative designs on the organization. | Systems design report |
| This is the first step in the systems design phase. | Design alternative systems |
| Most organizations spend more time and money on the systems ________ phase than on any of the other phases. | maintenance |
| During which phase of the systems life cycle are users trained to use the new system? | Systems implementation |