Question
click below
click below
Question
Normal Size Small Size show me how
Technology FINAL
Ch. 7-12 (13 is not included in this, but we need to study that also.)
Question | Answer |
---|---|
Which of the following measures the amount of time required by the storage device to retrieve data and programs? | Access speed |
Which of the following is not an example of secondary storage? | RAM |
______ speed is the measure of the amount of time required by a storage device to retrieve data and programs. | Access |
One way to improve the storage capacity of a hard disk is to _______ | use file compression |
Which of the following is true about an internal hard disk? | Often stores the operating system |
This process improves system performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU. | Disk caching |
Three common storage options discussed in your text are hard disk, ________, and solid-state storage. | optical disc |
Cell phones use which of these storage technologies? | Flash memory card |
________ are storage drives that contain both solid-state storage and hard disks in an attempt to gain the speed and power benefits of SSDs while still having the low cost and large capacity of hard drives. | Hybrid drives |
_______ improves hard-disk performance by anticipating data needs and reducing time to access data from secondary storage. | Disk caching |
An external hard disk _______ | usually connects to a USB or Thunderbolt port |
The ________ of a secondary storage device indicates how much data the storage medium can hold. | capacity |
Tracks are divided into invisible wedge-shaped sections called ____ | sectors |
Optical discs use these to represent data. | Pits and lands |
________ programs scan files for ways to reduce the amount of required storage | File compression |
Typically a personal computer uses a(n) ________ to store the operating system and software applications. | internal hard disk |
Which of these is not an example of solid state storage? | Digital versatile disc |
All the following are true of DVD-ROM drives except | they are also known as erasable optical discs. |
Solid-state storage devices are different than hard disks in that they _______ | have no moving parts |
Due to its expanded storage capability, fast access speed, and high reliability, ________ is (are) often used by Internet servers and large organizations. | RAID |
In a communication system, which among the following originate and accept messages in the form of data, information, and/or instructions? | Sending and receiving devices |
________ are countrywide and worldwide networks. | Wide area networks |
In a wireless LAN, all communications pass through the network's centrally located wireless access point or ________ station. | base |
Microwave communication uses high-frequency ________. | radio waves |
A(n) ________ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to headsets, controllers to game systems, and so on. | personal |
_____ is a term relating to sending data to a satellite. | Uplink |
A(n) ________ is a private network that connects more than one organization. | extranet |
________ is a high-frequency transmission medium that has a single solid-copper core. | Coaxial cable |
This type of network strategy uses central servers to coordinate and supply services to other nodes on the network | Client/server |
A(n) ________ is a network where the nodes are in close physical proximity to each other. | local area network |
_____ uses standard telephone lines to provide high-speed connections. | DSL |
The actual connecting or transmission medium that carries the message in a communication system is called the ________. | communication channel |
In a client/server network, the ________ provides access to resources and services. | server |
In a computer network, this node that requests and uses resources available from other nodes. | Client |
In a communication system, which among the following convert messages into packets that can travel across the communication channel? | Connection devices |
Which among the following is considered a line-of-sight communication medium? | Microwave |
Using this type of communications channel, several users can simultaneously use a single connection for high-speed data transfer. | Broadband |
Which physical connection is the fastest? | Fiber-optic cable |
The range of Wi-Fi networks using microwave connections is being extended over greater distances using a wireless technology known as ________. | WiMax |
A(n) ________ network system uses central servers to coordinate and supply services to other nodes on the network | client-server |
This type of computer criminal creates and distributes malicious programs. | Cracker |
These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files. | Employee-monitoring software |
________ are used by advertising companies to keep track of your web activity as you move from one site to the next. | Third-party cookies |
________ is concerned with protecting software and data from unauthorized tampering or damage. | Data security |
Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called ________. | zombies |
A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet ________. | scam |
Which of the following is not malware? | Ad-Aware |
The most significant concerns for implementation of computer technology involve ________, security, and ethics. | privacy |
A ________ is a computer criminal who creates and distributes malicious programs or malware. | cracker |
As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the ________. | firewall |
Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk. | Privacy mode |
________ store information about the current session, your general preferences, and your activity on the website. | First-party cookies |
________ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver. | Trojan horses |
Programs used to secretly record an individual's activities on the Internet are called ________. | spyware |
A(n) ________ attempts to slow down or stop a computer system or network by sending repetitive requests for information. | DoS attack |
A(n) ________ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information. | rogue |
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account. | Dictionary attack |
The use of the Internet to send or post content intended to hurt or embarrass another person. | Cyberbullying |
______ is concerned with protecting software and data from unauthorized tampering or damage. | Data security |
________ is the illegal assumption of someone's identity for the purposes of economic gain. | Identity theft |
________-level information flow is primarily vertical. | Supervisory |
What documentation shows the income, expenses and difference between them for a company during a specific time period? | Income statements |
The ________ activity records the customer requests for products or services. | sales order processing |
________ models assist top-level managers in long-range planning, such as stating company objectives or planning plant locations. | Strategic |
When an order comes in, the ________ activity alerts the warehouse to ship a product. | sales order processing |
Which system is a type of artificial intelligence that uses a database, containing facts and rules, to provide assistance to users? | Expert system |
Some of these systems have the ability to retrieve information from databases outside the company, such as business-news services. | Executive support systems (ESS) |
Money collected from or owed by customers is called ________. | accounts receivable |
________ systems are computer systems that allow people located at various geographic locations to communicate and have in-person meetings. | Videoconferencing |
This level of management is involved with tactical planning and implementing the long-term goals within an organization. | Middle management |
Who uses management information systems? | Middle-level managers |
An example of this type of report would be a sales report that shows that certain items are selling significantly above or below forecasts. | Exception |
This system is a flexible tool for data analysis, since its reports do not have a fixed format. | Decision support system |
_______ systems help supervisors by generating databases that act as the foundation for other information systems. | Transaction processing |
Project resources can be scheduled, planned, and controlled using ________ | project managers |
This lists the assets, liabilities, and the equity of an organization | Balance sheet |
________ workers use OAS systems and are involved with the creation of information in their areas of expertise. | Knowledge |
Regional managers can compare their regular sales reports with that of the other regional managers by using ________. | periodic reports |
Common names for computer-based information systems are transaction processing, management information, ________, and executive support systems. | decision support |
This decision model helps middle-level managers control the work of the organization, such as financial planning and sales promotion planning. | Tactical model |
In the object-oriented database model, this term is the equivalent to a field in a relational model. | Attribute |
In ________, data from transactions are collected over time and then processed all at once. | batch processing |
These databases store not only data but also instructions to manipulate the data. | Object-oriented |
The data ________ or schema contains a description of the structure of data in the database. | dictionary |
In this database model, the fields or records are structured in nodes | Hierarchical |
Users of a(n) ________ database have access through their personal computers linked to local or wide area networks. | company |
The analysis tools associated with the data manipulation subsystem that support querying databases include ________ and structured query languages (SQL). | query-by-example |
Analysis tools that support viewing all or selected parts of data, querying the database, and generating reports include query-by-example as well as a specialized programming language called ________. | SQL |
In this type of database, the data and the DBMS are stored either on the user's hard-disk drive or on a LAN file server. | Individual |
The most basic logical element of data is a(n) ________. | character |
This subsystem defines the logical structure of the database by using a data dictionary or schema. | Data definition |
A(n) ________ database, sometimes called a data cube, allows data to be viewed as a cube having three or more sides and consists of cells. | multidimensional |
In the ________ database, data elements are stored in different tables, each of which consists of rows and columns. | relational |
The analysis tools associated with the ________ subsystem include query-by-example and structured query languages (SQL). | data manipulation |
Access to these databases is offered to the public or selected outside individuals, for a fee. | Commercial databases |
In a(n) ________ database, a node may be reached through more than one path with the help of pointers. | network |
These types of databases are also called information utilities or data banks. | Commercial |
A(n) ________ represents a collection of attributes that describe an entity. | record |
The combined information presented on this type of database can be used to change the whole merchandising strategy of a store. | Company |
If Mr. Smith's bike has been sent to his new address, but the bill to his old one, it can most likely be attributed to a lack of data ________. | integrity |
The ________ approach to systems implementation is used only in cases in which the cost of failure or of interrupted operation is great. | parallel |
In this phase of the systems life cycle, the new information system is installed, and people are trained to use it. | Systems implementation |
This is performed to determine whether the new procedures are actually furthering productivity. | Systems audit |
The third phase in the systems life cycle is the systems ________ phase. | design |
_______ feasibility is evaluated to determine if the proposed system can actually be made to operate in the organization | Operational |
The ________ identifies the top-level components of a complex system. | top-down analysis method |
This conversion type is not recommended because problems arising in this approach could be catastrophic. | Direct approach |
When evaluating alternative systems, systems designers must consider economic feasibility, ________ feasibility, and operational feasibility. | technical |
System ________ show the flow of input data to processing and finally to output. | flowcharts |
In the preliminary investigation phase of the systems life cycle, which one of the following tasks would not be included? | Gathering the data |
Identify the sixth phase of the systems life cycle. | Systems maintenance |
New hardware and software are acquired, developed, and tested in the systems ________ stage of the systems life cycle. | development |
Systems analysis and design is a problem-solving procedure for examining and improving a(n) ________ system. | information |
This individual studies an organization’s systems to determine what actions to take and how to use computer technology to assist them. | Systems analyst |
This is the final step of the systems implementation phase of the systems life cycle. | Train users |
________ of the system happens after the installation of software and hardware. | Testing |
This document presents the costs versus the benefits and outlines the effect of alternative designs on the organization. | Systems design report |
This is the first step in the systems design phase. | Design alternative systems |
Most organizations spend more time and money on the systems ________ phase than on any of the other phases. | maintenance |
During which phase of the systems life cycle are users trained to use the new system? | Systems implementation |