Chapter 01 Flashcards

1
Q

End-user computing refers to the use of computer technology for both ____and ______ use

A

business and personal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When did businesses first start using computers?

40s
50s
60s
70s

A

The 1950s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of these was not a primary characteristic of computer use in the 1950s and 1960s?

a. Located at a central site

b.Served as an Internet host computer

c. Programmed and operated by computer professionals

f. Used to automate transaction processing and prepare management reports

A

b.Served as an Internet host computer ?????

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Businesses and organizations first began to use data communications and network technology to connect computer systems in the ____.

1960s

1970s

1980s

1990s

A

1970s ????

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Widespread use of the Internet by business and home users first occurred in the ____.

1960s

1970s

1980s

1990s

A

1980s ??????

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of these is not one of the trends that led to growth in decentralized computing during the 1980s and 1990s?

a. Increase in the number of knowledge workers

b. Availability of inexpensive microcomputers

c. Availability of inexpensive productivity software

d. Increase in the cost of large-scale computer systems

A

d. Increase in the cost of large-scale computer systems ??????????

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Computer technology generally doubles in capacity every two ____.

weeks

years

decades

centuries

A

years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Classifying end users as internal versus external is a classification by ____.

environment

skill level

frequency of use

relationship

A

relationship???

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Peripheral devices are part of a computer system’s ____.

hardware

operating system

applications software

supplies

A

hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of these categories of computer software can add thousands of dollars to the cost of a computer system?

Operating system

Applications software

Specialized software

Mass-market software

A

specialized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Due to increased use of the Internet, which of these are likely to increase in the future as a percentage of the total cost of a computer system?

Hardware maintenance costs

Software upgrade costs

Supply costs

Information costs

A

Software upgrade costs ???????

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Application software used to prepare printed materials that include graphic images, such as newsletters, flyers, brochures, and posters, is called ____.

graphical user interface

desktop publishing

personal information manager

word processing

A

desktop publishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A software package used to prepare budgets, reports, forecasts, and financial statements is a ____.

web browser

spreadsheet program

database management program

desktop publishing program

A

spreadsheet program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A software program that enables users to find and display information stored as HTML pages on the Internet is a(n) ____.

web browser

electronic mail program

word processor

desktop publisher

A

web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Application software that is intended for use in a specialized business environment is called ____.

enterprise applications

industry-specific applications

customized applications

MIS applications

A

industry-specific applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A computer user who enters an incorrect formula in a spreadsheet that results in a serious error is a victim of which common problem?

Waste of resources

Theft of resources

Computer crime

User mistake

A

user mistake

15
Q

Making an illegal copy of a software program is called ____.

invasion of privacy

shareware

piracy

a user mistake

A

piracy

16
Q

Which of these is generally considered security threats?

Virus

Spam email

Keystroke logger

Any of these

A

Any of these

17
Q

Carpal tunnel syndrome is an example of which common problem?

Ergonomics

Viruses

Mistakes

Data loss

A

ergonomics

18
Q

The Bureau of Labor Statistics forecasts that the number of computer and network support specialist positions in the US will grow at about ____% over the next 10 years.

1-2

5

20

50

A

20%

19
Q

Employees who provide informal peer support to other users in an organization ____.

are often highly-trained technology professionals

are often well-trained to provide support

often have little or no training in user support

often have little interest in technology

A

often have little or no training in user support

20
Q

An organization that provides a wide range of support services to users is called a(n) ____.

user support center

help desk

peer support

hotline

A

user support center

21
Q

Which of these is an advantage to outsourcing as a way to provide user support?

Outsourcing is a low-cost support method.

Outsourcing develops in-house support expertise.

Outsourcing facilitates on-site assistance.

Outsourcing takes advantage of expertise a company does not have.

A

Outsourcing takes advantage of expertise a company does not have.

22
Q

The purpose of support standards is to accomplish all but which of the following?

Limit supported products

Expand supported products

Control supported products

Recommend supported products

A

expand supported products

23
Q

The process of unpacking, setting up, and configuring new technology for a user is ____.

system assembly

system purchase assistance

user orientation

system installation assistance

A

System installation assistance

24
Q

What is the applications developments backlog?

A

This term refers to the excess demand for computer applications (programs) that could not be met by the existing supply of computer professionals available to develop them.

25
Q

A knowledge worker is an employee whose primary job is to ____, ____, _____, and ____information.

A

collect, prepare, process, and distribute information

26
Q

What is a microcomputer?

A

A complete computer (often called a personal computer, or PC) built on a smaller scale workgroup systems, with a microprocessor as the central processing unit (CPU).