Ch. 7-12 (13 is not included in this, but we need to study that also.)
Help!
|
|
||||
|---|---|---|---|---|---|
| Which of the following measures the amount of time required by the storage device to retrieve data and programs? | Access speed
🗑
|
||||
| Which of the following is not an example of secondary storage? | RAM
🗑
|
||||
| ______ speed is the measure of the amount of time required by a storage device to retrieve data and programs. | Access
🗑
|
||||
| One way to improve the storage capacity of a hard disk is to _______ | use file compression
🗑
|
||||
| Which of the following is true about an internal hard disk? | Often stores the operating system
🗑
|
||||
| This process improves system performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU. | Disk caching
🗑
|
||||
| Three common storage options discussed in your text are hard disk, ________, and solid-state storage. | optical disc
🗑
|
||||
| Cell phones use which of these storage technologies? | Flash memory card
🗑
|
||||
| ________ are storage drives that contain both solid-state storage and hard disks in an attempt to gain the speed and power benefits of SSDs while still having the low cost and large capacity of hard drives. | Hybrid drives
🗑
|
||||
| _______ improves hard-disk performance by anticipating data needs and reducing time to access data from secondary storage. | Disk caching
🗑
|
||||
| An external hard disk _______ | usually connects to a USB or Thunderbolt port
🗑
|
||||
| The ________ of a secondary storage device indicates how much data the storage medium can hold. | capacity
🗑
|
||||
| Tracks are divided into invisible wedge-shaped sections called ____ | sectors
🗑
|
||||
| Optical discs use these to represent data. | Pits and lands
🗑
|
||||
| ________ programs scan files for ways to reduce the amount of required storage | File compression
🗑
|
||||
| Typically a personal computer uses a(n) ________ to store the operating system and software applications. | internal hard disk
🗑
|
||||
| Which of these is not an example of solid state storage? | Digital versatile disc
🗑
|
||||
| All the following are true of DVD-ROM drives except | they are also known as erasable optical discs.
🗑
|
||||
| Solid-state storage devices are different than hard disks in that they _______ | have no moving parts
🗑
|
||||
| Due to its expanded storage capability, fast access speed, and high reliability, ________ is (are) often used by Internet servers and large organizations. | RAID
🗑
|
||||
| In a communication system, which among the following originate and accept messages in the form of data, information, and/or instructions? | Sending and receiving devices
🗑
|
||||
| ________ are countrywide and worldwide networks. | Wide area networks
🗑
|
||||
| In a wireless LAN, all communications pass through the network's centrally located wireless access point or ________ station. | base
🗑
|
||||
| Microwave communication uses high-frequency ________. | radio waves
🗑
|
||||
| A(n) ________ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to headsets, controllers to game systems, and so on. | personal
🗑
|
||||
| _____ is a term relating to sending data to a satellite. | Uplink
🗑
|
||||
| A(n) ________ is a private network that connects more than one organization. | extranet
🗑
|
||||
| ________ is a high-frequency transmission medium that has a single solid-copper core. | Coaxial cable
🗑
|
||||
| This type of network strategy uses central servers to coordinate and supply services to other nodes on the network | Client/server
🗑
|
||||
| A(n) ________ is a network where the nodes are in close physical proximity to each other. | local area network
🗑
|
||||
| _____ uses standard telephone lines to provide high-speed connections. | DSL
🗑
|
||||
| The actual connecting or transmission medium that carries the message in a communication system is called the ________. | communication channel
🗑
|
||||
| In a client/server network, the ________ provides access to resources and services. | server
🗑
|
||||
| In a computer network, this node that requests and uses resources available from other nodes. | Client
🗑
|
||||
| In a communication system, which among the following convert messages into packets that can travel across the communication channel? | Connection devices
🗑
|
||||
| Which among the following is considered a line-of-sight communication medium? | Microwave
🗑
|
||||
| Using this type of communications channel, several users can simultaneously use a single connection for high-speed data transfer. | Broadband
🗑
|
||||
| Which physical connection is the fastest? | Fiber-optic cable
🗑
|
||||
| The range of Wi-Fi networks using microwave connections is being extended over greater distances using a wireless technology known as ________. | WiMax
🗑
|
||||
| A(n) ________ network system uses central servers to coordinate and supply services to other nodes on the network | client-server
🗑
|
||||
| This type of computer criminal creates and distributes malicious programs. | Cracker
🗑
|
||||
| These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files. | Employee-monitoring software
🗑
|
||||
| ________ are used by advertising companies to keep track of your web activity as you move from one site to the next. | Third-party cookies
🗑
|
||||
| ________ is concerned with protecting software and data from unauthorized tampering or damage. | Data security
🗑
|
||||
| Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called ________. | zombies
🗑
|
||||
| A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet ________. | scam
🗑
|
||||
| Which of the following is not malware? | Ad-Aware
🗑
|
||||
| The most significant concerns for implementation of computer technology involve ________, security, and ethics. | privacy
🗑
|
||||
| A ________ is a computer criminal who creates and distributes malicious programs or malware. | cracker
🗑
|
||||
| As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the ________. | firewall
🗑
|
||||
| Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk. | Privacy mode
🗑
|
||||
| ________ store information about the current session, your general preferences, and your activity on the website. | First-party cookies
🗑
|
||||
| ________ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver. | Trojan horses
🗑
|
||||
| Programs used to secretly record an individual's activities on the Internet are called ________. | spyware
🗑
|
||||
| A(n) ________ attempts to slow down or stop a computer system or network by sending repetitive requests for information. | DoS attack
🗑
|
||||
| A(n) ________ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information. | rogue
🗑
|
||||
| This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account. | Dictionary attack
🗑
|
||||
| The use of the Internet to send or post content intended to hurt or embarrass another person. | Cyberbullying
🗑
|
||||
| ______ is concerned with protecting software and data from unauthorized tampering or damage. | Data security
🗑
|
||||
| ________ is the illegal assumption of someone's identity for the purposes of economic gain. | Identity theft
🗑
|
||||
| ________-level information flow is primarily vertical. | Supervisory
🗑
|
||||
| What documentation shows the income, expenses and difference between them for a company during a specific time period? | Income statements
🗑
|
||||
| The ________ activity records the customer requests for products or services. | sales order processing
🗑
|
||||
| ________ models assist top-level managers in long-range planning, such as stating company objectives or planning plant locations. | Strategic
🗑
|
||||
| When an order comes in, the ________ activity alerts the warehouse to ship a product. | sales order processing
🗑
|
||||
| Which system is a type of artificial intelligence that uses a database, containing facts and rules, to provide assistance to users? | Expert system
🗑
|
||||
| Some of these systems have the ability to retrieve information from databases outside the company, such as business-news services. | Executive support systems (ESS)
🗑
|
||||
| Money collected from or owed by customers is called ________. | accounts receivable
🗑
|
||||
| ________ systems are computer systems that allow people located at various geographic locations to communicate and have in-person meetings. | Videoconferencing
🗑
|
||||
| This level of management is involved with tactical planning and implementing the long-term goals within an organization. | Middle management
🗑
|
||||
| Who uses management information systems? | Middle-level managers
🗑
|
||||
| An example of this type of report would be a sales report that shows that certain items are selling significantly above or below forecasts. | Exception
🗑
|
||||
| This system is a flexible tool for data analysis, since its reports do not have a fixed format. | Decision support system
🗑
|
||||
| _______ systems help supervisors by generating databases that act as the foundation for other information systems. | Transaction processing
🗑
|
||||
| Project resources can be scheduled, planned, and controlled using ________ | project managers
🗑
|
||||
| This lists the assets, liabilities, and the equity of an organization | Balance sheet
🗑
|
||||
| ________ workers use OAS systems and are involved with the creation of information in their areas of expertise. | Knowledge
🗑
|
||||
| Regional managers can compare their regular sales reports with that of the other regional managers by using ________. | periodic reports
🗑
|
||||
| Common names for computer-based information systems are transaction processing, management information, ________, and executive support systems. | decision support
🗑
|
||||
| This decision model helps middle-level managers control the work of the organization, such as financial planning and sales promotion planning. | Tactical model
🗑
|
||||
| In the object-oriented database model, this term is the equivalent to a field in a relational model. | Attribute
🗑
|
||||
| In ________, data from transactions are collected over time and then processed all at once. | batch processing
🗑
|
||||
| These databases store not only data but also instructions to manipulate the data. | Object-oriented
🗑
|
||||
| The data ________ or schema contains a description of the structure of data in the database. | dictionary
🗑
|
||||
| In this database model, the fields or records are structured in nodes | Hierarchical
🗑
|
||||
| Users of a(n) ________ database have access through their personal computers linked to local or wide area networks. | company
🗑
|
||||
| The analysis tools associated with the data manipulation subsystem that support querying databases include ________ and structured query languages (SQL). | query-by-example
🗑
|
||||
| Analysis tools that support viewing all or selected parts of data, querying the database, and generating reports include query-by-example as well as a specialized programming language called ________. | SQL
🗑
|
||||
| In this type of database, the data and the DBMS are stored either on the user's hard-disk drive or on a LAN file server. | Individual
🗑
|
||||
| The most basic logical element of data is a(n) ________. | character
🗑
|
||||
| This subsystem defines the logical structure of the database by using a data dictionary or schema. | Data definition
🗑
|
||||
| A(n) ________ database, sometimes called a data cube, allows data to be viewed as a cube having three or more sides and consists of cells. | multidimensional
🗑
|
||||
| In the ________ database, data elements are stored in different tables, each of which consists of rows and columns. | relational
🗑
|
||||
| The analysis tools associated with the ________ subsystem include query-by-example and structured query languages (SQL). | data manipulation
🗑
|
||||
| Access to these databases is offered to the public or selected outside individuals, for a fee. | Commercial databases
🗑
|
||||
| In a(n) ________ database, a node may be reached through more than one path with the help of pointers. | network
🗑
|
||||
| These types of databases are also called information utilities or data banks. | Commercial
🗑
|
||||
| A(n) ________ represents a collection of attributes that describe an entity. | record
🗑
|
||||
| The combined information presented on this type of database can be used to change the whole merchandising strategy of a store. | Company
🗑
|
||||
| If Mr. Smith's bike has been sent to his new address, but the bill to his old one, it can most likely be attributed to a lack of data ________. | integrity
🗑
|
||||
| The ________ approach to systems implementation is used only in cases in which the cost of failure or of interrupted operation is great. | parallel
🗑
|
||||
| In this phase of the systems life cycle, the new information system is installed, and people are trained to use it. | Systems implementation
🗑
|
||||
| This is performed to determine whether the new procedures are actually furthering productivity. | Systems audit
🗑
|
||||
| The third phase in the systems life cycle is the systems ________ phase. | design
🗑
|
||||
| _______ feasibility is evaluated to determine if the proposed system can actually be made to operate in the organization | Operational
🗑
|
||||
| The ________ identifies the top-level components of a complex system. | top-down analysis method
🗑
|
||||
| This conversion type is not recommended because problems arising in this approach could be catastrophic. | Direct approach
🗑
|
||||
| When evaluating alternative systems, systems designers must consider economic feasibility, ________ feasibility, and operational feasibility. | technical
🗑
|
||||
| System ________ show the flow of input data to processing and finally to output. | flowcharts
🗑
|
||||
| In the preliminary investigation phase of the systems life cycle, which one of the following tasks would not be included? | Gathering the data
🗑
|
||||
| Identify the sixth phase of the systems life cycle. | Systems maintenance
🗑
|
||||
| New hardware and software are acquired, developed, and tested in the systems ________ stage of the systems life cycle. | development
🗑
|
||||
| Systems analysis and design is a problem-solving procedure for examining and improving a(n) ________ system. | information
🗑
|
||||
| This individual studies an organization’s systems to determine what actions to take and how to use computer technology to assist them. | Systems analyst
🗑
|
||||
| This is the final step of the systems implementation phase of the systems life cycle. | Train users
🗑
|
||||
| ________ of the system happens after the installation of software and hardware. | Testing
🗑
|
||||
| This document presents the costs versus the benefits and outlines the effect of alternative designs on the organization. | Systems design report
🗑
|
||||
| This is the first step in the systems design phase. | Design alternative systems
🗑
|
||||
| Most organizations spend more time and money on the systems ________ phase than on any of the other phases. | maintenance
🗑
|
||||
| During which phase of the systems life cycle are users trained to use the new system? | Systems implementation
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
Cmprotzman