Lecture Test 2 Flashcards

1
Q

An external hard disk_____.

A

usually connects to a USB or Thunderbolt port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Optical discs use these to represent data.

A

Pits and lands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Smartphones use which of these storage technologies?

A

Flash memory card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Solid-state storage devices are different than hard disks in that they_____.

A

have no moving parts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This allows you to upload and store documents on the Internet.

A

Cloud storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Three ways to improve the performance of a hard disk include_____.

A

disk caching, RAID, and file compression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is not an example of secondary storage?

A

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is true about an internal hard disk?

A

Often stores the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following measures the amount of time required by the storage device to retrieve data and programs?

A

Access speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of these is not a mass storage device?

A

Optical disc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A service that uses existing phone lines to provide high-speed connections is called _____.

A

DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cellular services use _____ to provide wireless connectivity to the internet.

A

3G and 4G cellular networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Every computer on the Internet has a unique numeric address called a(n) _____.

A

IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Organizations use the following to allow suppliers and others limited access to their networks.

A

Extranets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Remote users can connect to an organization’s network through this type of secure private connection.

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The _____ is the central node that coordinates the flow of data by sending messages directly between the sender and receiver nodes.

A

switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The capacity of a communication channel is measured in _____.

A

bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The essential features of this include identifying, sending, and receiving devices and breaking information into small parts for transmission across the Internet.

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

This type of network strategy uses central servers to coordinate and supply services to other nodes on the network.

A

Client/server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which physical connection is the fastest?

A

Fiber-optic cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A _____ acts as a security buffer between a corporation’s private network and all external networks.

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A program that replicates itself and clogs computers and networks.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Corporations often use this to prevent copyright violations.

A

Digital rights management (DRM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.

A

Privacy mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Programs used to secretly record an individual’s activities on the Internet are called _____.

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Small data files that are deposited on a user’s hard disk when they visit a website are called _____.

A

cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The process of coding information to make it unreadable except to those who have a special information known as a key.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.

A

Cyberbullying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.

A

Rogue

30
Q

Which amonth the following is a way to shut down and ISP or website?

A

Denial of service attack

31
Q

A transaction processing system is also referred to as a _____.

A

data processing system

32
Q

An Example of this type of report would be a sales report that shows that certain items are selling significantly above or below forecasts.

A

Exception

33
Q

Money collected from or owed by customers is called _____.

A

accounts receivable

34
Q

Pricing, promoting, selling, and distributing the organization’s goods and services pertains to which of the following functions?

A

Marketing

35
Q

The _____ keeps records of the number of each kind of part or finished good in the warehouse.

A

inventory control system

36
Q

This level of management is involved with tactical planning and implementing the long-term goals within an organization.

A

Middle management

37
Q

This lists the assets, liabilities, and the equity of an organization.

A

Balance sheet

38
Q

This typically consists of transactions from the transaction processing system.

A

Internal data

39
Q

Which system is a type of artificial intelligence that uses a database, containing facts and rules, to provide assistance to others?

A

Expert system

40
Q

Which system presents information in a highly summarized form?

A

Executive support system (ESS)

41
Q

A collection of related fields such as a person’s name, address, and age.

A

Record

42
Q

A field that uniquely identifies each record.

A

Primary key

43
Q

Access to these databases is offered to the public or selected outside individuals, for a fee.

A

Commercial databases

44
Q

Analysis tools that support viewing all or selected parts of data, querying the database, and generating reports include query-by-example as well as a specialized programming language called _____.

A

SQL

45
Q

Having several instances of the same data is called data _____.

A

redundancy

46
Q

In this subsystem, a user can create data entry forms.

A

Application generation

47
Q

Information collected by an organization from a variety of external and internal databases is stored in this special type of database.

A

Data warehouse

48
Q

These databases store not only data but also instructions to manipulate the data.

A

Object-oriented

49
Q

This subsystem defines the logical structure of the database by using a data dictionary or schema.

A

Data definition

50
Q

This type of database is organized into many tables with common data items (key fields) linking the tables to one another.

A

Relational

51
Q

During which phase of the systems life cycle are users trained to use the new system?

A

Systems Implementation

52
Q

In order to obtain financing to continue to Phase 2: Systems Analysis, the systems analyst does this.

A

Prepares a report

53
Q

In this phase of the systems life cycle, new or alternative information systems are designed.

A

Systems Design

54
Q

Selecting the _____ is the first step in implementing a new system.

A

Conversion Type

55
Q

This conversion approach is preferred when there are many people in an organization performing similar operations.

A

Pilot

56
Q

This is performed to determine whether the new procedures are actually furthering productivity.

A

Systems audit

57
Q

This is the process of building a model that can be modified before the actual system is installed.

A

prototyping

58
Q

Which of the following is used to identify the components of a complex system and make each component easier to analyze and deal with?

A

Top-down analysis

59
Q

Which of the following phases of the systems life cycle is considered to be an ongoing activity?

A

Systems Maintenance

60
Q

Which of the following tools presents data or information flow within an information system?

A

Data Flow Diagram

61
Q

A compiler _____.

A

converts the source code into machine language

62
Q

An interpreter _____.

A

converts the procedural language one line at a time into machine code

63
Q

Identify the programming tool that uses symbols to show the sequence of steps needed to solve a programming problem.

A

flowcharts

64
Q

In this logic structure, one program statement follows another.

A

linear

65
Q

In this logic structure, the outcome of the decision determines which of the two paths to follow?

A

If-then-else

66
Q

These first-generation languages are hard to use, with one of the reasons being that they are different depending on the make of the computer.

A

machine

67
Q

This is an outline of the logic of the program you will write.

A

pseudocode

68
Q

This is testing a program by a select group of potential users.

A

beta

69
Q

This logic structure involves repeating a sequence as long as a certain condition remains true.

A

do loop

70
Q

This type of error could be the result of the programmer making an incorrect calculation.

A

logic