Lecture Test 2 Flashcards
An external hard disk_____.
usually connects to a USB or Thunderbolt port
Optical discs use these to represent data.
Pits and lands
Smartphones use which of these storage technologies?
Flash memory card
Solid-state storage devices are different than hard disks in that they_____.
have no moving parts
This allows you to upload and store documents on the Internet.
Cloud storage
Three ways to improve the performance of a hard disk include_____.
disk caching, RAID, and file compression
Which of the following is not an example of secondary storage?
RAM
Which of the following is true about an internal hard disk?
Often stores the operating system
Which of the following measures the amount of time required by the storage device to retrieve data and programs?
Access speed
Which of these is not a mass storage device?
Optical disc
A service that uses existing phone lines to provide high-speed connections is called _____.
DSL
Cellular services use _____ to provide wireless connectivity to the internet.
3G and 4G cellular networks
Every computer on the Internet has a unique numeric address called a(n) _____.
IP address
Organizations use the following to allow suppliers and others limited access to their networks.
Extranets
Remote users can connect to an organization’s network through this type of secure private connection.
VPN
The _____ is the central node that coordinates the flow of data by sending messages directly between the sender and receiver nodes.
switch
The capacity of a communication channel is measured in _____.
bandwidth
The essential features of this include identifying, sending, and receiving devices and breaking information into small parts for transmission across the Internet.
TCP/IP
This type of network strategy uses central servers to coordinate and supply services to other nodes on the network.
Client/server
Which physical connection is the fastest?
Fiber-optic cable
A _____ acts as a security buffer between a corporation’s private network and all external networks.
firewall
A program that replicates itself and clogs computers and networks.
Worm
Corporations often use this to prevent copyright violations.
Digital rights management (DRM)
Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.
Privacy mode
Programs used to secretly record an individual’s activities on the Internet are called _____.
spyware
Small data files that are deposited on a user’s hard disk when they visit a website are called _____.
cookies
The process of coding information to make it unreadable except to those who have a special information known as a key.
Encryption
The use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person.
Cyberbullying
This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.
Rogue
Which amonth the following is a way to shut down and ISP or website?
Denial of service attack
A transaction processing system is also referred to as a _____.
data processing system
An Example of this type of report would be a sales report that shows that certain items are selling significantly above or below forecasts.
Exception
Money collected from or owed by customers is called _____.
accounts receivable
Pricing, promoting, selling, and distributing the organization’s goods and services pertains to which of the following functions?
Marketing
The _____ keeps records of the number of each kind of part or finished good in the warehouse.
inventory control system
This level of management is involved with tactical planning and implementing the long-term goals within an organization.
Middle management
This lists the assets, liabilities, and the equity of an organization.
Balance sheet
This typically consists of transactions from the transaction processing system.
Internal data
Which system is a type of artificial intelligence that uses a database, containing facts and rules, to provide assistance to others?
Expert system
Which system presents information in a highly summarized form?
Executive support system (ESS)
A collection of related fields such as a person’s name, address, and age.
Record
A field that uniquely identifies each record.
Primary key
Access to these databases is offered to the public or selected outside individuals, for a fee.
Commercial databases
Analysis tools that support viewing all or selected parts of data, querying the database, and generating reports include query-by-example as well as a specialized programming language called _____.
SQL
Having several instances of the same data is called data _____.
redundancy
In this subsystem, a user can create data entry forms.
Application generation
Information collected by an organization from a variety of external and internal databases is stored in this special type of database.
Data warehouse
These databases store not only data but also instructions to manipulate the data.
Object-oriented
This subsystem defines the logical structure of the database by using a data dictionary or schema.
Data definition
This type of database is organized into many tables with common data items (key fields) linking the tables to one another.
Relational
During which phase of the systems life cycle are users trained to use the new system?
Systems Implementation
In order to obtain financing to continue to Phase 2: Systems Analysis, the systems analyst does this.
Prepares a report
In this phase of the systems life cycle, new or alternative information systems are designed.
Systems Design
Selecting the _____ is the first step in implementing a new system.
Conversion Type
This conversion approach is preferred when there are many people in an organization performing similar operations.
Pilot
This is performed to determine whether the new procedures are actually furthering productivity.
Systems audit
This is the process of building a model that can be modified before the actual system is installed.
prototyping
Which of the following is used to identify the components of a complex system and make each component easier to analyze and deal with?
Top-down analysis
Which of the following phases of the systems life cycle is considered to be an ongoing activity?
Systems Maintenance
Which of the following tools presents data or information flow within an information system?
Data Flow Diagram
A compiler _____.
converts the source code into machine language
An interpreter _____.
converts the procedural language one line at a time into machine code
Identify the programming tool that uses symbols to show the sequence of steps needed to solve a programming problem.
flowcharts
In this logic structure, one program statement follows another.
linear
In this logic structure, the outcome of the decision determines which of the two paths to follow?
If-then-else
These first-generation languages are hard to use, with one of the reasons being that they are different depending on the make of the computer.
machine
This is an outline of the logic of the program you will write.
pseudocode
This is testing a program by a select group of potential users.
beta
This logic structure involves repeating a sequence as long as a certain condition remains true.
do loop
This type of error could be the result of the programmer making an incorrect calculation.
logic