Lecture Test 2 Flashcards

1
Q

An external hard disk_____.

A

usually connects to a USB or Thunderbolt port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Optical discs use these to represent data.

A

Pits and lands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Smartphones use which of these storage technologies?

A

Flash memory card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Solid-state storage devices are different than hard disks in that they_____.

A

have no moving parts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This allows you to upload and store documents on the Internet.

A

Cloud storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Three ways to improve the performance of a hard disk include_____.

A

disk caching, RAID, and file compression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is not an example of secondary storage?

A

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is true about an internal hard disk?

A

Often stores the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following measures the amount of time required by the storage device to retrieve data and programs?

A

Access speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of these is not a mass storage device?

A

Optical disc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A service that uses existing phone lines to provide high-speed connections is called _____.

A

DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cellular services use _____ to provide wireless connectivity to the internet.

A

3G and 4G cellular networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Every computer on the Internet has a unique numeric address called a(n) _____.

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Organizations use the following to allow suppliers and others limited access to their networks.

A

Extranets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Remote users can connect to an organization’s network through this type of secure private connection.

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The _____ is the central node that coordinates the flow of data by sending messages directly between the sender and receiver nodes.

A

switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The capacity of a communication channel is measured in _____.

A

bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The essential features of this include identifying, sending, and receiving devices and breaking information into small parts for transmission across the Internet.

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This type of network strategy uses central servers to coordinate and supply services to other nodes on the network.

A

Client/server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which physical connection is the fastest?

A

Fiber-optic cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A _____ acts as a security buffer between a corporation’s private network and all external networks.

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A program that replicates itself and clogs computers and networks.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Corporations often use this to prevent copyright violations.

A

Digital rights management (DRM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.

A

Privacy mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Programs used to secretly record an individual's activities on the Internet are called _____.
spyware
26
Small data files that are deposited on a user's hard disk when they visit a website are called _____.
cookies
27
The process of coding information to make it unreadable except to those who have a special information known as a key.
Encryption
28
The use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.
Cyberbullying
29
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.
Rogue
30
Which amonth the following is a way to shut down and ISP or website?
Denial of service attack
31
A transaction processing system is also referred to as a _____.
data processing system
32
An Example of this type of report would be a sales report that shows that certain items are selling significantly above or below forecasts.
Exception
33
Money collected from or owed by customers is called _____.
accounts receivable
34
Pricing, promoting, selling, and distributing the organization's goods and services pertains to which of the following functions?
Marketing
35
The _____ keeps records of the number of each kind of part or finished good in the warehouse.
inventory control system
36
This level of management is involved with tactical planning and implementing the long-term goals within an organization.
Middle management
37
This lists the assets, liabilities, and the equity of an organization.
Balance sheet
38
This typically consists of transactions from the transaction processing system.
Internal data
39
Which system is a type of artificial intelligence that uses a database, containing facts and rules, to provide assistance to others?
Expert system
40
Which system presents information in a highly summarized form?
Executive support system (ESS)
41
A collection of related fields such as a person's name, address, and age.
Record
42
A field that uniquely identifies each record.
Primary key
43
Access to these databases is offered to the public or selected outside individuals, for a fee.
Commercial databases
44
Analysis tools that support viewing all or selected parts of data, querying the database, and generating reports include query-by-example as well as a specialized programming language called _____.
SQL
45
Having several instances of the same data is called data _____.
redundancy
46
In this subsystem, a user can create data entry forms.
Application generation
47
Information collected by an organization from a variety of external and internal databases is stored in this special type of database.
Data warehouse
48
These databases store not only data but also instructions to manipulate the data.
Object-oriented
49
This subsystem defines the logical structure of the database by using a data dictionary or schema.
Data definition
50
This type of database is organized into many tables with common data items (key fields) linking the tables to one another.
Relational
51
During which phase of the systems life cycle are users trained to use the new system?
Systems Implementation
52
In order to obtain financing to continue to Phase 2: Systems Analysis, the systems analyst does this.
Prepares a report
53
In this phase of the systems life cycle, new or alternative information systems are designed.
Systems Design
54
Selecting the _____ is the first step in implementing a new system.
Conversion Type
55
This conversion approach is preferred when there are many people in an organization performing similar operations.
Pilot
56
This is performed to determine whether the new procedures are actually furthering productivity.
Systems audit
57
This is the process of building a model that can be modified before the actual system is installed.
prototyping
58
Which of the following is used to identify the components of a complex system and make each component easier to analyze and deal with?
Top-down analysis
59
Which of the following phases of the systems life cycle is considered to be an ongoing activity?
Systems Maintenance
60
Which of the following tools presents data or information flow within an information system?
Data Flow Diagram
61
A compiler _____.
converts the source code into machine language
62
An interpreter _____.
converts the procedural language one line at a time into machine code
63
Identify the programming tool that uses symbols to show the sequence of steps needed to solve a programming problem.
flowcharts
64
In this logic structure, one program statement follows another.
linear
65
In this logic structure, the outcome of the decision determines which of the two paths to follow?
If-then-else
66
These first-generation languages are hard to use, with one of the reasons being that they are different depending on the make of the computer.
machine
67
This is an outline of the logic of the program you will write.
pseudocode
68
This is testing a program by a select group of potential users.
beta
69
This logic structure involves repeating a sequence as long as a certain condition remains true.
do loop
70
This type of error could be the result of the programmer making an incorrect calculation.
logic