SlideShare una empresa de Scribd logo
1 de 14
Descargar para leer sin conexión
CIS 101        Final Exam Questions

____    1. The benefits of computers are possible because they ____.
           a. operate with amazing speed, reliability, consistency, and accuracy
           b. store huge amounts of data and information
           c. allow communications with others
           d. all of the above
____    2. An input device is any hardware component that enables you to ____.
           a. enter data and instructions into a computer
           b. send and receive data, instructions, and information to and from one or more computers
           c. record (write) and/or retrieve (read) items to and from storage media
           d. convey information to one or more people
____    3. An output device is any hardware component that ____.
           a. enters data or instructions into a computer
           b. sends and receives data, instructions, and information to and from one or more computers
           c. records (writes) and/or retrieves (reads) items to and from storage media
           d. conveys information to one or more people
____    4. A communications device is a hardware component that enables a computer to ____.
           a. enter data or instructions into a computer
           b. send and receive data, instructions, and information to and from one or more computers
           c. record (write) and/or retrieve (read) items to and from storage media
           d. convey information to one or more people
____    5. A Web page can contain ____.
           a. text and graphics                                  c. video
           b. audio                                              d. all of the above
____    6. A ____ is a personal computer you can carry from place to place.
           a. desktop computer                                   c. mobile computer
           b. midrange server                                    d. supercomputer
____    7. ____ is a work arrangement in which employees work away from a company’s standard workplace and often
           communicate with the office through the computer.
           a. Telecommuting                                      c. Telescoping
           b. Teleprocessing                                     d. Telephering
____    8. People access ____ Web sites to file taxes, apply for permits and licenses, pay parking tickets, buy stamps, report
           crimes, apply for financial aid, and renew vehicle registrations and driver’s licenses.
           a. education                                          c. industry
           b. government                                         d. finance
____    9. Through ____, health-care professionals in separate locations conduct live conferences on computers.
           a. aeromedicine                                       c. telemedicine
           b. holistic medicine                                  d. nuclear medicine
____   10. The ____ is the electronic component that interprets and carries out the basic instructions that operate the computer.
           a. ALU                                                c. APU
           b. uPC                                                d. CPU
____   11. A(n) ____ system is a set of programs that coordinates all the activities among computer hardware devices.
           a. operating                                          c. utility
           b. director                                           d. management
____   12. A(n) ____ controls access to the hardware, software, and other resources on a network and provides a centralized
           storage area for programs, data, and information.
           a. handheld                                           c. server
           b. PCX                                                d. client
____   13. A(n) ____ is a large, expensive, powerful computer that can handle hundreds or thousands of connected users
           simultaneously.
           a. supercomputer                                      c. midrange PC
           b. mainframe                                          d. client
____   14. Many large companies use the words, ____ computing, to refer to the huge network of computers that meets their
           diverse computing needs.
           a. online                                             c. enterprise
           b. strategic                                          d. management
____   15. Investors often use ____ investing to buy and sell stocks and bonds ― without using a broker.
           a. dynamic                                            c. managed
           b. database-driven                                    d. online
CIS 101       Final Exam Questions

____   16. Some people refer to the series of input, process, output, and storage activities as the information ____ cycle.
           a. production                                          c. processing
           b. management                                          d. publishing
____   17. Unlike high-speed connections that always are on, with ____ you must establish a connection to the Internet.
           a. DSL                                                 c. a cable modem
           b. ISDN                                                d. dial-up access
____   18. A ____ is a computer that delivers requested Web pages to your computer.
           a. Web site                                            c. Web developer
           b. Web browser                                         d. Web server
____   19. ____ is the process of a computer receiving information, such as a Web page, from a server on the Internet.
           a. Downloading                                         c. Uploading
           b. Subscribing                                         d. Unsubscribing
____   20. A business/marketing Web site contains ____.
           a. content that promotes or sells products or services
           b. factual information
           c. exciting, challenging avenues for teaching and learning
           d. newsworthy material
____   21. MP3 format ____ much of the original quality of the sound.
           a. increases an audio file to about ten times its original size, and destroys
           b. increases an audio file to about ten times its original size, but preserves
           c. reduces an audio file to about one-tenth its original size, and preserves
           d. reduces an audio file to about one-tenth its original size, but destroys
____   22. To listen to an audio file on your computer, you need special software called a ____.
           a. host                                                c. portal
           b. receiver                                            d. player
____   23. A customer visits an online business through its ____, which contains product descriptions, graphics, and a shopping
           cart.
           a. electronic storefront                               c. online auction
           b. data warehouse                                      d. chat room
____   24. ____, which is the transmission of messages and files via a computer network, is a primary communications method for
           both personal and business use.
           a. E-mail                                              c. Mailing list
           b. FTP                                                 d. Chat room
____   25. ____ is an Internet standard that permits the process of file uploading and downloading (transferring) with other
           computers on the Internet.
           a. ISDN                                                c. DSL
           b. MPG                                                 d. FTP
____   26. ____ is an online area in which users have written discussions about a particular subject.
           a. E-mail                                              c. FTP
           b. A portal                                            d. A newsgroup
____   27. ____ is a location on an Internet server that permits users to have real-time, typed conversations with each other.
           a. E-mail                                              c. FTP
           b. A chat room                                         d. A home page
____   28. The major carriers of traffic on the Internet are known collectively as the Internet ____.
           a. guidepost                                           c. superhighway
           b. resource matrix                                     d. backbone
____   29. A Web page has a unique address, called a(n) ____.
           a. URL                                                 c. HTTP
           b. POST                                                d. CMOS
____   30. A(n) ____ is a Web site that offers a variety of Internet services from a single, convenient location.
           a. portal                                              c. wiki
           b. blog                                                d. plug-in
____   31. A content ____ is a business that gathers and organizes Web content and then distributes, or feeds, the content to
           subscribers for free or a fee.
           a. collector                                           c. aggregator
           b. navigator                                           d. browser
CIS 101        Final Exam Questions

____   32. ____ is the use of computers to simulate a real or imagined environment that appears as a three-dimensional (3-D)
           space.
           a. CAD                                               c. CAM
           b. CMOS                                              d. VR
____   33. A(n) ____ is a program that extends the capability of a browser.
           a. plug-in                                           c. chat client
           b. IrDA                                              d. VoIP
____   34. Application software is used ____.
           a. as a business tool and to facilitate communications
           b. to assist with graphics and multimedia projects
           c. to support home, personal, and educational activities
           d. all of the above
____   35. ____ performs functions specific to a business or industry.
           a. Custom software                                   c. Shareware
           b. Packaged software                                 d. Public-domain software
____   36. ____ is copyrighted software that is distributed at no cost for a trial period.
           a. Custom software                                   c. Shareware
           b. Packaged software                                 d. Public-domain software
____   37. Which of the following are examples of popular personal computer operating systems?
           a. Microsoft’s Vista and Windows XP, Linux, and Apple’s Mac OS X
           b. Microsoft’s Office, Sun’s StarOffice, and Lotus Organizer
           c. Sun’s StarOffice Impress, Corel’s Quattro Pro, and Windows XP
           d. Sun’s StarOffice, Linux, and Apple’s Mac OS X
____   38. A(n) ____ is a small image displayed on the screen that represents a program, a document, or some other object.
           a. icon                                              c. pointer
           b. command                                           d. file
____   39. A ____ is a named collection of stored data, instructions, or information.
           a. window                                            c. menu
           b. file                                              d. button
____   40. To ____ a document means to make changes to its existing content.
           a. save                                              c. format
           b. edit                                              d. print
____   41. When users ____ a document, they change its appearance.
           a. create                                            c. format
           b. save                                              d. edit
____   42. A query ____.
           a. provides images, pictures, and video to enhance the database
           b. is a request for specific data from a database
           c. compares the spelling of words with an electronic dictionary
           d. is a predefined formula that performs common calculations
____   43. A popular file format used by document management software to save converted documents is ____.
           a. PDF                                               c. JPEG
           b. RSS 2.0                                           d. MPEG-4
____   44. ____ provides the capabilities of paint software and also includes the ability to enhance and modify existing pictures and
           images.
           a. Audio editing software                            c. Image editing software
           b. Presentation graphics software                    d. Note taking software
____   45. ____ helps users create newsletters, brochures, advertisements, postcards, greeting cards, letterhead, business cards,
           banners, calendars, logos, and Web pages.
           a. Legal software                                    c. Tax preparation software
           b. Personal DTP software                             d. Personal finance software
____   46. One popular type of image editing software, called ____, allows users to edit digital pictures by removing red-eye,
           erasing blemishes, restoring aged photos, adding special effects, or creating electronic photo albums.
           a. clip art/image gallery                            c. photo editing software
           b. entertainment software                            d. paint software
____   47. ____, which includes encyclopedias and dictionaries, provides valuable and thorough information for all individuals.
           a. Reference software                                c. Legal software
           b. Paint software                                    d. Entertainment software
CIS 101        Final Exam Questions


____   48. ____ software is a type of application software that helps companies record and report their financial transactions.
           a. Online banking                                      c. Financial management
           b. Personal finance                                    d. Accounting
____   49. ____ software is a sophisticated type of application software that assists a professional user in creating engineering,
           architectural, and scientific designs.
           a. CBT                                                 c. WBT
           b. CAD                                                 d. ELC
____   50. ____ software allows users to combine text, graphics, audio, video, and animation into an interactive application.
           a. Presentation graphics                               c. Web page authoring
           b. Multimedia authoring                                d. Personal DTP
____   51. Processors contain a(n) ____.
           a. serial port and a parallel port
           b. adapter card and an expansion card
           c. control unit and an arithmetic logic unit (ALU)
           d. all of the above
____   52. For every instruction, a processor repeats a set of four basic operations, which comprise a(n) ____: (1) fetching, (2)
           decoding, (3) executing, and (4) storing.
           a. information cycle                                   c. data cycle
           b. machine cycle                                       d. creative cycle
____   53. Current personal computer processors have clock speeds in the ____ range, which equals one billion ticks of the system
           clock per second.
           a. kilohertz (KHz)                                     c. gigahertz (GHz)
           b. megahertz (MHz)                                     d. terahertz (THz)
____   54. The ____ scheme, which is the most widely used coding scheme to represent data, is used by most personal computers
           and servers.
           a. ASCII                                               c. PCMCIA
           b. EBCDIC                                              d. Unicode
____   55. Memory stores ____.
           a. the operating system and other system software that control or maintain the computer and its
               devices
           b. application programs that carry out a specific task
           c. the data being processed by application programs and the resulting information
           d. all of the above
____   56. ____ is the most common type of volatile memory.
           a. Flash memory                                        c. CMOS
           b. RAM                                                 d. ROM
____   57. L2 cache is slightly ____.
           a. faster than L1 cache but has a much smaller capacity
           b. faster than L1 cache and has a much larger capacity
           c. slower than L1 cache but has a much larger capacity
           d. slower than L1 cache and has a much smaller capacity
____   58. For wireless devices to transmit signals to a computer via infrared light waves, both the computer and the device must
           have a(n) ____.
           a. FireWire port                                       c. SCSI port
           b. MIDI port                                           d. IrDA port
____   59. A(n) ____ allows the processor to communicate with peripherals.
           a. expansion bus                                       c. drive bus
           b. system bus                                          d. memory bus
____   60. A computer ____ is a small piece of semiconducting material, usually silicon, on which integrated circuits are etched.
           a. plug                                                c. chip
           b. port                                                d. roster
____   61. The processor relies on a small quartz crystal circuit called the ____ clock to control the timing of all computer
           operations.
           a. registration                                        c. control
           b. operational                                         d. system
CIS 101        Final Exam Questions

____   62. Most computers are ____, which means that they recognize only two discrete states: on and off.
           a. digital                                            c. analog
           b. byte-based                                         d. remastered
____   63. Computers use the ____ system, which is a number system that has just two unique digits, 0 and 1, called bits.
           a. unary                                              c. absolute
           b. binary                                             d. relative
____   64. When 8 bits are grouped together as a unit, they form a(n) ____.
           a. key                                                c. index
           b. cache                                              d. byte
____   65. Memory ____ on the motherboard hold memory modules.
           a. ports                                              c. jacks
           b. slots                                              d. connectors
____   66. Some RAM chips, flash memory chips, and other types of memory chips use ____ technology, which uses battery power
           to retain information even when a computer is off.
           a. CMOS                                               c. EEPROM
           b. BIOS                                               d. CPROM
____   67. ____ time is the amount of time it takes the processor to read data, instructions, and information from memory.
           a. Processing                                         c. Access
           b. Connection                                         d. Meter
____   68. A(n) ____ is any hardware component that allows users to enter data or instructions into a computer.
           a. output device                                      c. storage device
           b. input device                                       d. scanner
____   69. A ____ allows a user to control a pointer on the screen.
           a. storage device                                     c. function key
           b. keyboard                                           d. pointing device
____   70. The goal of ____ is to incorporate comfort, efficiency, and safety in the design of the workplace.
           a. ergonomics                                         c. RSI
           b. computer science                                   d. economics
____   71. On a ____, sometimes called a game controller, users press buttons or move sticks in various directions to activate
           events.
           a. gamepad                                            c. trackball
           b. Click Wheel                                        d. touch screen
____   72. ____ involves reading typewritten, computer-printed, or hand-printed characters from ordinary documents and
           translating the images into a form the computer can process.
           a. PDA                                                c. MIDI
           b. OCR                                                d. OMR
____   73. A(n) ____ often is found in retail stores to record purchases, process credit or debit cards, and update inventory.
           a. MICR reader                                        c. OMR system
           b. bar code scanner                                   d. POS terminal
____   74. ____ is the technology of authenticating a person’s identity by verifying a personal characteristic.
           a. Bionics                                            c. Biometrics
           b. Ergonomics                                         d. Encryption
____   75. ____ describes the difference in light intensity between the brightest white and darkest black that can be displayed on
           an LCD monitor.
           a. Pixel pitch                                        c. Contrast ratio
           b. Resolution                                         d. Refresh rate
____   76. Printer resolution is measured in ____.
           a. pixels                                             c. hertz
           b. dots per inch                                      d. pages per minute
____   77. A(n) ____ generates images by pushing electrically heated pins against heat-sensitive paper.
           a. laser printer                                      c. photo-quality printer
           b. thermal printer                                    d. ink-jet printer
____   78. A dot-matrix printer is a kind of ____ printer.
           a. laser                                              c. nonimpact
           b. plotter                                            d. impact
CIS 101         Final Exam Questions

____   79. Two output options for blind users are ____.
           a. Braille printer and headset
           b. voice output and Braille printer
           c. on-screen keyboard and head-mounted pointer
           d. head mounted pointer and voice recognition
____   80. A(n) ____ is a small metal or plastic device, slightly smaller than a digital pen, that looks like a tiny pen but uses pressure
           instead of ink.
           a. stylus                                               c. indexed pen
           b. icon                                                 d. digitizer
____   81. ____ is the number of horizontal and vertical pixels in a display device.
           a. Pixel depth                                          c. Bit depth
           b. Color index                                          d. Resolution
____   82. A(n) ____ is the smallest element in an electronic image.
           a. bit                                                  c. pixel
           b. candela                                              d. nit
____   83. ____ devices read hand-drawn marks such as small circles or rectangles.
           a. OMR                                                  c. MICR
           b. PCR                                                  d. TFT
____   84. A(n) ____ peripheral is a single device that looks like a copy machine but provides the functionality of a printer, scanner,
           copy machine, and perhaps a fax machine
           a. multivariate                                         c. multiple
           b. multifunction                                        d. multifaceted
____   85. The ____ requires any company with 15 or more employees to make reasonable attempts to accommodate the needs
           of physically challenged workers.
           a. Sarbanes-Oxley Act                                   c. Workers’ Protection Act
           b. ADA                                                  d. W3C Act
____   86. A(n) ____ card, which is similar in size to a credit or ATM card, stores personal data on a thin microprocessor that is
           embedded in the card.
           a. basic                                                c. key
           b. smart                                                d. micro
____   87. ____ is a technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or
           a person.
           a. RFID                                                 c. MICR
           b. OCR                                                  d. TFT
____   88. Which of the following is not a secondary storage medium?
           a. CD                                                   c. DVD
           b. RAM                                                  d. flash memory card
____   89. Storage devices access data in ____ of a second.
           a. thousandths                                          c. billionths
           b. millionths                                           d. trillionths
____   90. ____ measures the amount of time it takes a storage device to locate an item on a storage medium.
           a. Latency                                              c. Access time
           b. Tracking                                             d. Resolution
____   91. Memory (chips) accesses data items in ____ of a second.
           a. millionths                                           c. trillionths
           b. billionths                                           d. quadrillionths
____   92. A ____ occurs when the read/write head of a hard disk touches the surface of a platter.
           a. backup                                               c. reading
           b. head crash                                           d. writing
____   93. Which is not a type of disk controller?
           a. SATA                                                 c. SCSI
           b. EIDE                                                 d. CD-ROM
____   94. A(n) _____ stores items by using microscopic pits and lands in its middle layer and is read by a laser beam.
           a. hard disk                                            c. optical disc
           b. tape                                                 d. floppy
____   95. A(n) ____ disc can be read, written to, and erased.
           a. CD-ROM                                               c. DVD-ROM
           b. CD-R                                                 d. DVD+RW
CIS 101        Final Exam Questions

____    96. A large business, commonly referred to as a(n) ____, has hundreds or thousands of employees.
            a. commonwealth                                       c. enterprise
            b. megacorp                                           d. legacy
____    97. Which has the longest life expectancy?
            a. microfilm                                          c. CDs
            b. magnetic disks                                     d. DVDs
____    98. ____ is the number of bytes a storage medium can hold.
            a. Bit depth                                          c. Dimensionality
            b. Capacity                                           d. Resolution
____    99. ____ is the process of transferring data, instructions, and information from a storage medium into memory.
            a. Reading                                            c. Writing
            b. Running                                            d. Loading
____   100. The process of writing on an optical disc is called ____.
            a. cutting                                            c. loading
            b. formatting                                         d. burning
____   101. The operating system a computer uses sometimes is called the ____.
            a. platform                                           c. kernel
            b. driver                                             d. buffer
____   102. When turning on a computer that has been powered off completely, you are performing a ____.
            a. hot boot                                           c. warm boot
            b. reboot                                             d. cold boot
____   103. A(n) ____ computer continues to operate when one of its components fails.
            a. fail-safe                                          c. faulty
            b. fault-tolerant                                     d. always-on
____   104. ____ is a concept in which the operating system allocates a portion of a storage medium to function as additional RAM.
            a. Fault-tolerant memory                              c. Logical memory
            b. Redundant memory                                   d. Virtual memory
____   105. To protect sensitive data and information as it travels over a network, a network operating system often ____ it.
            a. encrypts                                           c. deletes
            b. decrypts                                           d. monitors
____   106. To defragment a disk means to ____.
            a. slow it down                                       c. reorganize it
            b. diagnose problems with it                          d. repair it
____   107. Which of the following is not a type of operating system?
            a. wireless                                           c. network
            b. stand-alone                                        d. embedded
____   108. Linux is ____ software, which means its code is available to the public for use, modification, and redistribution.
            a. open source                                        c. proprietary
            b. free source                                        d. embedded
____   109. A ____ hides within or looks like a legitimate program such as a screen saver.
            a. virus                                              c. spyware
            b. worm                                               d. Trojan horse
____   110. ____ is a program placed on a computer without the user’s knowledge that secretly collects information about the user.
            a. A virus                                            c. Spyware
            b. A worm                                             d. A Trojan horse
____   111. Compressed files sometimes are called ____ files.
            a. zapped                                             c. reduced
            b. zipped                                             d. encrypted
____   112. ____ software consists of the programs that control or maintain the operations of a computer and its devices.
            a. System                                             c. Platform
            b. Management                                         d. Disk-based
____   113. A(n) ____ system is a set of programs containing instructions that coordinate all the activities among hardware
            resources.
            a. platform                                           c. management
            b. operating                                          d. disk-based
CIS 101        Final Exam Questions

____ 114. A(n) ____ is a segment of memory or storage in which items are placed while waiting to be transferred from an input
          device or to an output device.
          a. index                                              c. nexus
          b. kernel                                             d. buffer
____ 115. The operating system on most PDAs and small devices, called a(n) ____ operating system, resides on a ROM chip.
          a. symbian                                            c. integrated
          b. embedded                                           d. resident
____ 116. A(n) ____ copies itself repeatedly in memory or over a network, using up system resources and possibly shutting the
          system down.
          a. malex                                              c. worm
          b. virus                                              d. Trojan horse
____ 117. ____ is a program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other
          Internet services.
          a. Compression software                               c. Resident software
          b. Symbianware                                        d. Adware
____ 118. A pop-up ____ is a filtering program that stops pop-up ads from displaying on Web pages.
          a. blocker                                            c. stopper
          b. driver                                             d. monitor
____ 119. A ____ is the transmission media on which the data, instructions, or information travel.
          a. sending device                                     c. communications channel
          b. receiving device                                   d. wire
____ 120. The design of computers, devices, and media in a network sometimes is called the _____.
          a. server                                             c. network architecture
          b. hotspot                                            d. communications channel
____ 121. A P2P network sometimes is called a(n) _____ network.
          a. bus                                                c. communications
          b. file sharing                                       d. RFID
____ 122. _____ has been adopted as a network standard for Internet communications.
          a. TCP/IP                                             c. WAP
          b. Wi-Fi                                              d. 802.11
____ 123. Some computers and devices use the ____ specification to transmit data wirelessly to each other via infrared light
          waves.
          a. RFID                                               c. IrDA
          b. WAP                                                d. Wi-Fi
____ 124. Physical transmission media used in communications include _____ cable.
          a. twisted-pair                                       c. fiber-optic
          b. coaxial                                            d. all of the above
____ 125. _____ is an electrical disturbance that can degrade communications.
          a. RFID                                               c. Chatter
          b. Noise                                              d. A hot spot
____ 126. Bluetooth, UWB, HomeRF, Wi-Fi, and WiMAX communications technology use _____.
          a. T1 lines                                           c. infrared
          b. broadcast radio signals                            d. microwaves
____ 127. A(n) ____ is a navigation system that consists of one or more earth-based receivers that accept and analyze signals sent
          by satellites in order to determine the receiver’s geographical location.
          a. EPS                                                c. APS
          b. BPS                                                d. GPS
____ 128. A(n) ____ is a network that connects computers and devices in a limited geographical area, such as a home, school
          computer laboratory, office building, or closely positioned group of buildings.
          a. EFT                                                c. WAN
          b. LAN                                                d. MAN
____ 129. A(n) ____ is a high-speed network that connects LANs in a metropolitan area such as a city or town.
          a. EFT                                                c. MAN
          b. WAN                                                d. WLAN
____ 130. A(n) ____ network is a simple, inexpensive network that typically connects fewer than 10 computers.
          a. bus                                                c. MAN
          b. peer-to-peer                                       d. file
CIS 101        Final Exam Questions

____ 131. A(n) ____ network consists of a single central cable, to which all computers and other devices connect.
          a. ring                                               c. token ring
          b. star                                               d. bus
____ 132. On a(n) ____________________ network, all of the computers and devices on the network connect to a central device.
          a. ring                                               c. token ring
          b. star                                               d. bus
____ 133. A network ____ refers to the layout of the computers and devices in a communications network.
          a. topology                                           c. latency
          b. mapping                                            d. volume
____ 134. A(n) ____ line is a type of always-on connection that is established between two communications devices.
          a. integrated                                         c. dedicated
          b. indexed                                            d. baseband
____ 135. Database software often is called a ____.
          a. data file                                          c. data dictionary
          b. report generator                                   d. database management system
____ 136. Data ____ determine(s) the quality of the data.
          a. models                                             c. integrity
          b. logs                                               d. backup
____ 137. ____ information has an age suited to its use.
          a. Organized                                          c. Useful
          b. Accessible                                         d. Timely
____ 138. ____ information has meaning to the person who receives it.
          a. Organized                                          c. Useful
          b. Accessible                                         d. Timely
____ 139. _____ information is available when the decision maker needs it.
          a. Organized                                          c. Useful
          b. Accessible                                         d. Timely
____ 140. Which of the following data types stores lengthy text entries?
          a. Text                                               c. Hyperlink
          b. Memo                                               d. Object
____ 141. Which of the following data types stores photographs, audio, video, or a document created in another program?
          a. Text                                               c. Hyperlink
          b. Memo                                               d. Object
____ 142. File maintenance procedures include ____.
          a. adding records to a file                           c. changing records in a file
          b. deleting records from a file                       d. all of the above
____ 143. Many programs perform a ____ that analyzes entered data to ensure that it is correct.
          a. validity check                                     c. system scan
          b. logic check                                        d. check digit
____ 144. A(n) ____ check would test the data in two or more associated fields to ensure that the relationship is logical.
          a. range                                              c. consistency
          b. completeness                                       d. alphabetic/numeric
____ 145. A data ____ contains data about each file in the database and each field within those files.
          a. log                                                c. model
          b. warehouse                                          d. dictionary
____ 146. A ____ consists of simple, English-like statements that allow users to specify the data to display, print, or store.
          a. query language                                     c. form
          b. query-by-example                                   d. report generator
____ 147. A ____ allows users to design a report on the screen, retrieve data into the report design, and then display or print the
          report.
          a. query form                                         c. report table
          b. report generator                                   d. recovery utility
____ 148. A database administrator _____.
          a. requires a more technical view of data             c. monitors the performance of the database
          b. creates and maintains the data dictionary          d. all of the above
____ 149. ____ is a computing phrase that points out the accuracy of a computer’s output depends on the accuracy of the input.
          a. TCO                                                c. IMHO
          b. GIGO                                               d. MQA
CIS 101        Final Exam Questions


____ 150. A(n) ____ is a request for specific data from the database.
          a. capture                                            c. form
          b. report                                             d. query

____ 151. The term, ____, refers to online or Internet-based illegal acts.
            a. online crime                                       c. Internet crime
            b. cybercrime                                         d. Webcrime
____ 152. A ____ is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way
            the computer works without the user's knowledge or permission.
            a. cracker                                            c. virus
            b. Trojan horse                                       d. worm
____ 153. A ____ is a program that copies itself repeatedly, for example in memory or in a network, using up resources and possibly
            shutting down the computer or network.
            a. denial of service (DoS) attack                     c. virus
            b. Trojan horse                                       d. worm
____ 154. If an antivirus program cannot remove an infection, it often ____.
            a. quarantines the infected file                      c. disables the drive the file is on
            b. reports the user computer                          d. removes the user from its registry
____ 155. Which of the following is an example of a possessed object?
            a. user name and password                             c. badges and keys
            b. face recognition systems                           d. fingerprint scanner
____ 156. Which of the following is not an example of a biometric device?
            a. smart card                                         c. hand geometry system
            b. face recognition system                            d. fingerprint scanner
____ 157. A person breaking into a computer laboratory and smashing computers is an example of _____.
            a. hardware vandalism                                 c. information theft
            b. hardware theft                                     d. piracy
____ 158. Software ____ is the unauthorized and illegal duplication of copyrighted software.
            a. piracy                                             c. filtering
            b. fraud                                              d. attacks
____ 159. In its simplest form, a(n) ____ is a programmed formula that is used to decrypt ciphertext.
            a. plaintext                                          c. firewall
            b. encryption key                                     d. digital signature
____ 160. ____ can lead to system failure.
            a. Aging hardware
            b. Natural disasters, such as fires, floods, or hurricanes
            c. Errors in computer programs
            d. All of the above
____ 161. A(n) ____ is someone who accesses a computer or network illegally with the intent of destroying data, stealing
            information, or other malicious action.
            a. cracker                                            c. cyberextortionist
            b. cyberterrorist                                     d. cyberstalker
____ 162. A(n) ____ is a program that hides within or looks like a legitimate program.
            a. worm                                               c. virus
            b. Trojan horse                                       d. spyware
____ 163. A virus ____ is a known specific pattern of virus code.
            a. index                                              c. definition
            b. trigger                                            d. payload
____ 164. A(n) ____ attack is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-
            mail.
            a. DoS                                                c. firewall
            b. payload                                            d. intrusion
____ 165. ____ is the process of converting readable data into unreadable characters to prevent unauthorized access.
            a. Encryption                                         c. Decryption
            b. Content filtering                                  d. Remastering
CIS 101       Final Exam Questions

____ 166. A(n) ____ is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.
          a. restoration file                                    c. backup
          b. archivist                                           d. content filter
____ 167. System development cycles often organize activities by grouping them into larger categories called ____.
          a. phases                                              c. stages
          b. subcycles                                           d. indices
____ 168. The ____ phase of the System Development Cycle for a project begins when the steering committee receives a project
          request.
          a. analysis                                            c. feasibility
          b. implementation                                      d. planning
____ 169. The ____ phase of the System Development Cycle consists of two major activities: (1) conduct a preliminary
          investigation and (2) perform detailed analysis.
          a. analysis                                            c. implementation
          b. planning                                            d. feasibility
____ 170. The ____ phase of the System Development Cycle consists of two major activities: (1) if necessary, acquire hardware
          and software and (2) develop all the details of the new or modified information system.
          a. implementation                                      c. planning
          b. execution                                           d. design
____ 171. The purpose of the ____ phase in the System Development Cycle is to construct, or build, the new or modified system
          and then deliver it to the users.
          a. conversion                                          c. design
          b. implementation                                      d. analysis
____ 172. The purpose of the ____ in the System Development Cycle is to provide ongoing assistance for an information system
          and its users after the system is implemented.
          a. implementation                                      c. design
          b. planning                                            d. operation, support, and security
____ 173. ____ are sets of rules and procedures a company expects employees to accept and follow.
          a. Grants                                              c. Programs
          b. Morals                                              d. Standards
____ 174. ____ feasibility measures how well the proposed system will work.
          a. Schedule                                            c. Operational
          b. Technical                                           d. Economic
____ 175. With ____, the user stops using the old system and begins using the new system on a certain date.
          a. parallel conversion                                 c. direct conversion
          b. phased conversion                                   d. pilot conversion
____ 176. With a ____, only one location in the company uses the new system.
          a. parallel conversion                                 c. direct conversion
          b. phased conversion                                   d. pilot conversion
____ 177. A ____ is a set of words, symbols, and codes that enables a programmer to communicate instructions to a computer.
          a. programming language                                c. compiler
          b. program                                             d. source program
____ 178. ____ is a programming language designed for business applications.
          a. C                                                   c. COBOL
          b. BASIC                                               d. Fortran
____ 179. A ____ control structure tells the program which action to take, based on a certain condition.
          a. selection                                           c. loop
          b. sequence                                            d. repetition
____ 180. A ____ committee is a decision-making body in a company.
          a. management                                          c. directors'
          b. steering                                            d. feasibility
____ 181. The main purpose of the ____ investigation is to determine the exact nature of the problem or improvement and decide
          whether it is worth pursuing.
          a. planning                                            c. implementation
          b. preliminary                                         d. custom
____ 182. Application software developed by the user or at the user's request is called ____ software.
          a. packaged                                            c. custom
          b. optimized                                           d. remastered
CIS 101        Final Exam Questions

____ 183. A(n) ____ is a company that purchases products from manufacturers and then resells these products to the public —
          offering additional services with the product.
          a. VAR                                                 c. ERD
          b. RPG                                                 d. TPG
____ 184. ____ language, known as the first generation of programming languages, is the only language the computer directly
          recognizes.
          a. Machine                                             c. Assembly
          b. Compiled                                            d. Executed
____ 185. A(n) ____ program is the program that contains the language instructions, or code, to be converted.
          a. indexed                                             c. source
          b. baseline                                            d. master
____ 186. ____ is a measure of how suitable the development of a system will be to the company.
          a. Index analysis                                      c. Feasibility
          b. Operationalization                                  d. Cost/benefit analysis
____ 187. The ____ manages core activities.
          a. CEO                                                 c. COO
          b. CIO                                                 d. CFO
____ 188. Which is a magnetic storage medium?
          a. DVD                                                 c. PC Card
          b. floppy disk                                         d. flash memory card
____ 189. Some optical disc drives use ____ technology, which works with specially coated discs to etch labels directly on the disc.
          a. BurnDisk                                            c. OpticalName
          b. LabelCD                                             d. LightScribe
____ 190. The operating system typically resides on the computer’s ____.
          a. floppy disk                                         c. CD-ROM
          b. hard disk                                           d. ROM chip
____ 191. ____ is the process of starting or restarting a computer.
          a. Launching                                           c. Booting
          b. Loading                                             d. Keying
____ 192. The design of computers, devices, and media in a network sometimes is called the ____.
          a. server                                              c. network architecture
          b. hotspot                                             d. communications channel
____ 193. ____ has been adopted as a network standard for Internet communications.
          a. TCP/IP                                              c. WAP
          b. Wi-Fi                                               d. 802.11
____ 194. Issues with copyright law led to the development of ____, a strategy designed to prevent illegal distribution of movies,
          music, and other digital content.
          a. pharming                                            c. fair use
          b. RSS                                                 d. DRM
____ 195. As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information
          by taking advantage of the trusting human nature of some victims and the naivety of others.
          a. DoS                                                 c. DRM
          b. social engineering                                  d. scamming
____ 196. A typical enterprise consists of individual operating entities called ____.
          a. managers                                            c. functional units
          b. enterprise models                                   d. expert systems
____ 197. The ____ management activity involves establishing goals and objectives.
          a. leading                                             c. organizing
          b. planning                                            d. controlling
____ 198. The ____ management activity involves measuring performance and, if necessary, taking corrective action.
          a. leading                                             c. organizing
          b. planning                                            d. controlling
____ 199. Using ____, engineers can test the design of a car or bridge before it is built.
          a. CAM                                                 c. CAD
          b. CAE                                                 d. CIM
____ 200. A ____ is an individual business activity, such as a deposit, payment, order, or reservation.
          a. message                                             c. transaction
          b. process                                             d. job
CIS 101        Final Exam Questions

____ 201. A(n) ____ creates three basic types of reports: detailed, summary, and exception.
          a. TPS                                                c. OLTP
          b. MIS                                                d. OIS
____ 202. An expert system consists of two main components: ____.
          a. data and tasks                                     c. a human expert and artificial expert
          b. a knowledge base and inference rules               d. a database and spreadsheet
____ 203. ____ is the process of collecting data from the Internet as a source for a data warehouse.
          a. Web mining                                         c. Scavenging
          b. Web searching                                      d. Web farming
____ 204. A ____ is a defined process that identifies the specific set of steps involved in completing a particular project or business
          process.
          a. workflow                                           c. project management strategy
          b. workaround                                         d. Gantt chart
____ 205. A(n) ____ is used to create a secure connection over the Internet between a user's computer and a company's network.
          a. RFP                                                c. VAR
          b. VPN                                                d. DSS
____ 206. ____ allows large organizations to manage and store information and data using devices geared for heavy use,
          maximum availability, and maximum efficiency.
          a. Enterprise hardware                                c. Networking
          b. Enterprise software                                d. RAID
____ 207. ____ uses a computer and special software to aid in product design.
          a. BI                                                 c. BPA
          b. HRIS                                               d. CAD
____ 208. ____ is the use of computers to control production equipment in the manufacturing process.
          a. CAE                                                c. CIM
          b. CAM                                                d. MRP
____ 209. ____ uses computers to integrate the many different operations of the manufacturing process.
          a. CAE                                                c. CIM
          b. CAM                                                d. MRP
____ 210. Many companies elevate the importance of IT by including a(n) ____ executive position that reports to the CEO.
          a. CFO                                                c. CIO
          b. CTP                                                d. CSO
____ 211. A(n) ____ is recorded audio stored on a Web site that can be downloaded to a computer or a portable digital audio
          player.
          a. blog                                               c. chat
          b. podcast                                            d. videoconference
____ 212. A(n) ____ is someone who develops software or writes the instructions that direct the computer to process data into
          information.
          a. director                                           c. programmer
          b. program manager                                    d. user
____ 213. The primary input device of a PDA is the ____, which looks like a small ballpoint pen but uses pressure instead of ink to
          write and draw.
          a. keyboard                                           c. mouse
          b. stylus                                             d. digital camera
____ 214. Microsoft’s Xbox 360 and Sony’s PlayStation 3 are examples of ____.
          a. game consoles                                      c. PDAs
          b. handheld games                                     d. mobile devices
____ 215. ____ provides high-speed Internet connections through the cable television network.
          a. DSL                                                c. A cable modem
          b. ISDN                                               d. Dial-up access
____ 216. A ____ is the text version of an IP address.
          a. home page                                          c. hyperlink
          b. domain name                                        d. user name
____ 217. A Web page may contain a(n) ____, which is a built-in connection to another Web page or part of a Web page.
          a. portal                                             c. link
          b. directory                                          d. index
CIS 101        Final Exam Questions

____ 218. A(n) ____ is a collaborative Web site that allows users to add to, modify, or delete the Web site content via their Web
          browser.
          a. portal                                              c. Blog
          b. wiki                                                d. content aggregator
____ 219. ____ software serves as the interface between the user, the application software, and the computer’s hardware.
          a. System                                              c. Management
          b. Driver                                              d. Disk-based
____ 220. A ____ restricts access to specified Web sites.
          a. pop-up blocker                                      c. personal computer maintenance utility
          b. spyware remover                                     d. Web filter
____ 221. Memory ____ helps speed the processes of the computer because it stores frequently used instructions and data.
          a. indexing                                            c. cache
          b. pipelining                                          d. rasterizing
____ 222. A ____ connects other computers through telephone or cable television lines.
          a. sound card                                          c. modem card
          b. video card or graphics card                         d. network card
____ 223. A ____ is a stationary pointing device with a ball on its top or side.
          a. mouse                                               c. scanner
          b. joystick                                            d. trackball
____ 224. A ____ is a small, flat, rectangular pointing device that is sensitive to pressure and motion.
          a. trackball                                           c. pointing stick
          b. touchpad                                            d. wheel
____ 225. A(n) ____ conference is a meeting between two or more geographically separated people who use a network or the
          Internet to transmit audio and video data.
          a. video                                               c. dynamic
          b. distance                                            d. professional

Más contenido relacionado

Similar a Final exam review_questions

2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of websitehazirma
 
Group 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docxGroup 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docxJeanmarieColbert3
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsDsunte Wilson
 
Concepts and Applications of Information Technology IFSM.docx
Concepts and Applications of Information Technology IFSM.docxConcepts and Applications of Information Technology IFSM.docx
Concepts and Applications of Information Technology IFSM.docxmaxinesmith73660
 
Ict assessment 1 2013
Ict assessment 1 2013Ict assessment 1 2013
Ict assessment 1 2013Sri Jaykody
 
Melissa TorresOccupation ParalegalBenincasa Law Firm1
Melissa TorresOccupation ParalegalBenincasa Law Firm1Melissa TorresOccupation ParalegalBenincasa Law Firm1
Melissa TorresOccupation ParalegalBenincasa Law Firm1AbramMartino96
 
1. The device that acts as a connection point between computers and .docx
1. The device that acts as a connection point between computers and .docx1. The device that acts as a connection point between computers and .docx
1. The device that acts as a connection point between computers and .docxMargaritoWhitt221
 
template for worksheet.docx
template for worksheet.docxtemplate for worksheet.docx
template for worksheet.docxComputerBwp
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP QuestionsDsunte Wilson
 
2.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.42.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.4hazirma
 
Joji ilagan career center foundation8pre2
Joji ilagan career center foundation8pre2Joji ilagan career center foundation8pre2
Joji ilagan career center foundation8pre2bluejayjunior
 
Cd ict-worksheet-la4-form-5
Cd ict-worksheet-la4-form-5Cd ict-worksheet-la4-form-5
Cd ict-worksheet-la4-form-5cikgushaharizan
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newKatherineJack1
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newEmmaJack2018
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newlizabonilla
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newsarahlazeto
 

Similar a Final exam review_questions (20)

2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website2.3 internet service 2.4 types of website
2.3 internet service 2.4 types of website
 
Group 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docxGroup 11. Which of the following is NOT a basic computer ope.docx
Group 11. Which of the following is NOT a basic computer ope.docx
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks Questions
 
Concepts and Applications of Information Technology IFSM.docx
Concepts and Applications of Information Technology IFSM.docxConcepts and Applications of Information Technology IFSM.docx
Concepts and Applications of Information Technology IFSM.docx
 
Ict assessment 1 2013
Ict assessment 1 2013Ict assessment 1 2013
Ict assessment 1 2013
 
Mcq for final
Mcq for finalMcq for final
Mcq for final
 
Melissa TorresOccupation ParalegalBenincasa Law Firm1
Melissa TorresOccupation ParalegalBenincasa Law Firm1Melissa TorresOccupation ParalegalBenincasa Law Firm1
Melissa TorresOccupation ParalegalBenincasa Law Firm1
 
unit 1 MCQ 316.pdf
unit 1 MCQ 316.pdfunit 1 MCQ 316.pdf
unit 1 MCQ 316.pdf
 
Set2 ict-question
Set2 ict-questionSet2 ict-question
Set2 ict-question
 
1. The device that acts as a connection point between computers and .docx
1. The device that acts as a connection point between computers and .docx1. The device that acts as a connection point between computers and .docx
1. The device that acts as a connection point between computers and .docx
 
template for worksheet.docx
template for worksheet.docxtemplate for worksheet.docx
template for worksheet.docx
 
CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
 
2.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.42.2.1.4,2.2.2.2 until2.2.2.4
2.2.1.4,2.2.2.2 until2.2.2.4
 
Joji ilagan career center foundation8pre2
Joji ilagan career center foundation8pre2Joji ilagan career center foundation8pre2
Joji ilagan career center foundation8pre2
 
Com Ed 8 Prelim
Com Ed 8 PrelimCom Ed 8 Prelim
Com Ed 8 Prelim
 
Cd ict-worksheet-la4-form-5
Cd ict-worksheet-la4-form-5Cd ict-worksheet-la4-form-5
Cd ict-worksheet-la4-form-5
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 
Cis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer newCis 562 week 11 final exam – strayer new
Cis 562 week 11 final exam – strayer new
 

Último

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Último (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Final exam review_questions

  • 1. CIS 101 Final Exam Questions ____ 1. The benefits of computers are possible because they ____. a. operate with amazing speed, reliability, consistency, and accuracy b. store huge amounts of data and information c. allow communications with others d. all of the above ____ 2. An input device is any hardware component that enables you to ____. a. enter data and instructions into a computer b. send and receive data, instructions, and information to and from one or more computers c. record (write) and/or retrieve (read) items to and from storage media d. convey information to one or more people ____ 3. An output device is any hardware component that ____. a. enters data or instructions into a computer b. sends and receives data, instructions, and information to and from one or more computers c. records (writes) and/or retrieves (reads) items to and from storage media d. conveys information to one or more people ____ 4. A communications device is a hardware component that enables a computer to ____. a. enter data or instructions into a computer b. send and receive data, instructions, and information to and from one or more computers c. record (write) and/or retrieve (read) items to and from storage media d. convey information to one or more people ____ 5. A Web page can contain ____. a. text and graphics c. video b. audio d. all of the above ____ 6. A ____ is a personal computer you can carry from place to place. a. desktop computer c. mobile computer b. midrange server d. supercomputer ____ 7. ____ is a work arrangement in which employees work away from a company’s standard workplace and often communicate with the office through the computer. a. Telecommuting c. Telescoping b. Teleprocessing d. Telephering ____ 8. People access ____ Web sites to file taxes, apply for permits and licenses, pay parking tickets, buy stamps, report crimes, apply for financial aid, and renew vehicle registrations and driver’s licenses. a. education c. industry b. government d. finance ____ 9. Through ____, health-care professionals in separate locations conduct live conferences on computers. a. aeromedicine c. telemedicine b. holistic medicine d. nuclear medicine ____ 10. The ____ is the electronic component that interprets and carries out the basic instructions that operate the computer. a. ALU c. APU b. uPC d. CPU ____ 11. A(n) ____ system is a set of programs that coordinates all the activities among computer hardware devices. a. operating c. utility b. director d. management ____ 12. A(n) ____ controls access to the hardware, software, and other resources on a network and provides a centralized storage area for programs, data, and information. a. handheld c. server b. PCX d. client ____ 13. A(n) ____ is a large, expensive, powerful computer that can handle hundreds or thousands of connected users simultaneously. a. supercomputer c. midrange PC b. mainframe d. client ____ 14. Many large companies use the words, ____ computing, to refer to the huge network of computers that meets their diverse computing needs. a. online c. enterprise b. strategic d. management ____ 15. Investors often use ____ investing to buy and sell stocks and bonds ― without using a broker. a. dynamic c. managed b. database-driven d. online
  • 2. CIS 101 Final Exam Questions ____ 16. Some people refer to the series of input, process, output, and storage activities as the information ____ cycle. a. production c. processing b. management d. publishing ____ 17. Unlike high-speed connections that always are on, with ____ you must establish a connection to the Internet. a. DSL c. a cable modem b. ISDN d. dial-up access ____ 18. A ____ is a computer that delivers requested Web pages to your computer. a. Web site c. Web developer b. Web browser d. Web server ____ 19. ____ is the process of a computer receiving information, such as a Web page, from a server on the Internet. a. Downloading c. Uploading b. Subscribing d. Unsubscribing ____ 20. A business/marketing Web site contains ____. a. content that promotes or sells products or services b. factual information c. exciting, challenging avenues for teaching and learning d. newsworthy material ____ 21. MP3 format ____ much of the original quality of the sound. a. increases an audio file to about ten times its original size, and destroys b. increases an audio file to about ten times its original size, but preserves c. reduces an audio file to about one-tenth its original size, and preserves d. reduces an audio file to about one-tenth its original size, but destroys ____ 22. To listen to an audio file on your computer, you need special software called a ____. a. host c. portal b. receiver d. player ____ 23. A customer visits an online business through its ____, which contains product descriptions, graphics, and a shopping cart. a. electronic storefront c. online auction b. data warehouse d. chat room ____ 24. ____, which is the transmission of messages and files via a computer network, is a primary communications method for both personal and business use. a. E-mail c. Mailing list b. FTP d. Chat room ____ 25. ____ is an Internet standard that permits the process of file uploading and downloading (transferring) with other computers on the Internet. a. ISDN c. DSL b. MPG d. FTP ____ 26. ____ is an online area in which users have written discussions about a particular subject. a. E-mail c. FTP b. A portal d. A newsgroup ____ 27. ____ is a location on an Internet server that permits users to have real-time, typed conversations with each other. a. E-mail c. FTP b. A chat room d. A home page ____ 28. The major carriers of traffic on the Internet are known collectively as the Internet ____. a. guidepost c. superhighway b. resource matrix d. backbone ____ 29. A Web page has a unique address, called a(n) ____. a. URL c. HTTP b. POST d. CMOS ____ 30. A(n) ____ is a Web site that offers a variety of Internet services from a single, convenient location. a. portal c. wiki b. blog d. plug-in ____ 31. A content ____ is a business that gathers and organizes Web content and then distributes, or feeds, the content to subscribers for free or a fee. a. collector c. aggregator b. navigator d. browser
  • 3. CIS 101 Final Exam Questions ____ 32. ____ is the use of computers to simulate a real or imagined environment that appears as a three-dimensional (3-D) space. a. CAD c. CAM b. CMOS d. VR ____ 33. A(n) ____ is a program that extends the capability of a browser. a. plug-in c. chat client b. IrDA d. VoIP ____ 34. Application software is used ____. a. as a business tool and to facilitate communications b. to assist with graphics and multimedia projects c. to support home, personal, and educational activities d. all of the above ____ 35. ____ performs functions specific to a business or industry. a. Custom software c. Shareware b. Packaged software d. Public-domain software ____ 36. ____ is copyrighted software that is distributed at no cost for a trial period. a. Custom software c. Shareware b. Packaged software d. Public-domain software ____ 37. Which of the following are examples of popular personal computer operating systems? a. Microsoft’s Vista and Windows XP, Linux, and Apple’s Mac OS X b. Microsoft’s Office, Sun’s StarOffice, and Lotus Organizer c. Sun’s StarOffice Impress, Corel’s Quattro Pro, and Windows XP d. Sun’s StarOffice, Linux, and Apple’s Mac OS X ____ 38. A(n) ____ is a small image displayed on the screen that represents a program, a document, or some other object. a. icon c. pointer b. command d. file ____ 39. A ____ is a named collection of stored data, instructions, or information. a. window c. menu b. file d. button ____ 40. To ____ a document means to make changes to its existing content. a. save c. format b. edit d. print ____ 41. When users ____ a document, they change its appearance. a. create c. format b. save d. edit ____ 42. A query ____. a. provides images, pictures, and video to enhance the database b. is a request for specific data from a database c. compares the spelling of words with an electronic dictionary d. is a predefined formula that performs common calculations ____ 43. A popular file format used by document management software to save converted documents is ____. a. PDF c. JPEG b. RSS 2.0 d. MPEG-4 ____ 44. ____ provides the capabilities of paint software and also includes the ability to enhance and modify existing pictures and images. a. Audio editing software c. Image editing software b. Presentation graphics software d. Note taking software ____ 45. ____ helps users create newsletters, brochures, advertisements, postcards, greeting cards, letterhead, business cards, banners, calendars, logos, and Web pages. a. Legal software c. Tax preparation software b. Personal DTP software d. Personal finance software ____ 46. One popular type of image editing software, called ____, allows users to edit digital pictures by removing red-eye, erasing blemishes, restoring aged photos, adding special effects, or creating electronic photo albums. a. clip art/image gallery c. photo editing software b. entertainment software d. paint software ____ 47. ____, which includes encyclopedias and dictionaries, provides valuable and thorough information for all individuals. a. Reference software c. Legal software b. Paint software d. Entertainment software
  • 4. CIS 101 Final Exam Questions ____ 48. ____ software is a type of application software that helps companies record and report their financial transactions. a. Online banking c. Financial management b. Personal finance d. Accounting ____ 49. ____ software is a sophisticated type of application software that assists a professional user in creating engineering, architectural, and scientific designs. a. CBT c. WBT b. CAD d. ELC ____ 50. ____ software allows users to combine text, graphics, audio, video, and animation into an interactive application. a. Presentation graphics c. Web page authoring b. Multimedia authoring d. Personal DTP ____ 51. Processors contain a(n) ____. a. serial port and a parallel port b. adapter card and an expansion card c. control unit and an arithmetic logic unit (ALU) d. all of the above ____ 52. For every instruction, a processor repeats a set of four basic operations, which comprise a(n) ____: (1) fetching, (2) decoding, (3) executing, and (4) storing. a. information cycle c. data cycle b. machine cycle d. creative cycle ____ 53. Current personal computer processors have clock speeds in the ____ range, which equals one billion ticks of the system clock per second. a. kilohertz (KHz) c. gigahertz (GHz) b. megahertz (MHz) d. terahertz (THz) ____ 54. The ____ scheme, which is the most widely used coding scheme to represent data, is used by most personal computers and servers. a. ASCII c. PCMCIA b. EBCDIC d. Unicode ____ 55. Memory stores ____. a. the operating system and other system software that control or maintain the computer and its devices b. application programs that carry out a specific task c. the data being processed by application programs and the resulting information d. all of the above ____ 56. ____ is the most common type of volatile memory. a. Flash memory c. CMOS b. RAM d. ROM ____ 57. L2 cache is slightly ____. a. faster than L1 cache but has a much smaller capacity b. faster than L1 cache and has a much larger capacity c. slower than L1 cache but has a much larger capacity d. slower than L1 cache and has a much smaller capacity ____ 58. For wireless devices to transmit signals to a computer via infrared light waves, both the computer and the device must have a(n) ____. a. FireWire port c. SCSI port b. MIDI port d. IrDA port ____ 59. A(n) ____ allows the processor to communicate with peripherals. a. expansion bus c. drive bus b. system bus d. memory bus ____ 60. A computer ____ is a small piece of semiconducting material, usually silicon, on which integrated circuits are etched. a. plug c. chip b. port d. roster ____ 61. The processor relies on a small quartz crystal circuit called the ____ clock to control the timing of all computer operations. a. registration c. control b. operational d. system
  • 5. CIS 101 Final Exam Questions ____ 62. Most computers are ____, which means that they recognize only two discrete states: on and off. a. digital c. analog b. byte-based d. remastered ____ 63. Computers use the ____ system, which is a number system that has just two unique digits, 0 and 1, called bits. a. unary c. absolute b. binary d. relative ____ 64. When 8 bits are grouped together as a unit, they form a(n) ____. a. key c. index b. cache d. byte ____ 65. Memory ____ on the motherboard hold memory modules. a. ports c. jacks b. slots d. connectors ____ 66. Some RAM chips, flash memory chips, and other types of memory chips use ____ technology, which uses battery power to retain information even when a computer is off. a. CMOS c. EEPROM b. BIOS d. CPROM ____ 67. ____ time is the amount of time it takes the processor to read data, instructions, and information from memory. a. Processing c. Access b. Connection d. Meter ____ 68. A(n) ____ is any hardware component that allows users to enter data or instructions into a computer. a. output device c. storage device b. input device d. scanner ____ 69. A ____ allows a user to control a pointer on the screen. a. storage device c. function key b. keyboard d. pointing device ____ 70. The goal of ____ is to incorporate comfort, efficiency, and safety in the design of the workplace. a. ergonomics c. RSI b. computer science d. economics ____ 71. On a ____, sometimes called a game controller, users press buttons or move sticks in various directions to activate events. a. gamepad c. trackball b. Click Wheel d. touch screen ____ 72. ____ involves reading typewritten, computer-printed, or hand-printed characters from ordinary documents and translating the images into a form the computer can process. a. PDA c. MIDI b. OCR d. OMR ____ 73. A(n) ____ often is found in retail stores to record purchases, process credit or debit cards, and update inventory. a. MICR reader c. OMR system b. bar code scanner d. POS terminal ____ 74. ____ is the technology of authenticating a person’s identity by verifying a personal characteristic. a. Bionics c. Biometrics b. Ergonomics d. Encryption ____ 75. ____ describes the difference in light intensity between the brightest white and darkest black that can be displayed on an LCD monitor. a. Pixel pitch c. Contrast ratio b. Resolution d. Refresh rate ____ 76. Printer resolution is measured in ____. a. pixels c. hertz b. dots per inch d. pages per minute ____ 77. A(n) ____ generates images by pushing electrically heated pins against heat-sensitive paper. a. laser printer c. photo-quality printer b. thermal printer d. ink-jet printer ____ 78. A dot-matrix printer is a kind of ____ printer. a. laser c. nonimpact b. plotter d. impact
  • 6. CIS 101 Final Exam Questions ____ 79. Two output options for blind users are ____. a. Braille printer and headset b. voice output and Braille printer c. on-screen keyboard and head-mounted pointer d. head mounted pointer and voice recognition ____ 80. A(n) ____ is a small metal or plastic device, slightly smaller than a digital pen, that looks like a tiny pen but uses pressure instead of ink. a. stylus c. indexed pen b. icon d. digitizer ____ 81. ____ is the number of horizontal and vertical pixels in a display device. a. Pixel depth c. Bit depth b. Color index d. Resolution ____ 82. A(n) ____ is the smallest element in an electronic image. a. bit c. pixel b. candela d. nit ____ 83. ____ devices read hand-drawn marks such as small circles or rectangles. a. OMR c. MICR b. PCR d. TFT ____ 84. A(n) ____ peripheral is a single device that looks like a copy machine but provides the functionality of a printer, scanner, copy machine, and perhaps a fax machine a. multivariate c. multiple b. multifunction d. multifaceted ____ 85. The ____ requires any company with 15 or more employees to make reasonable attempts to accommodate the needs of physically challenged workers. a. Sarbanes-Oxley Act c. Workers’ Protection Act b. ADA d. W3C Act ____ 86. A(n) ____ card, which is similar in size to a credit or ATM card, stores personal data on a thin microprocessor that is embedded in the card. a. basic c. key b. smart d. micro ____ 87. ____ is a technology that uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person. a. RFID c. MICR b. OCR d. TFT ____ 88. Which of the following is not a secondary storage medium? a. CD c. DVD b. RAM d. flash memory card ____ 89. Storage devices access data in ____ of a second. a. thousandths c. billionths b. millionths d. trillionths ____ 90. ____ measures the amount of time it takes a storage device to locate an item on a storage medium. a. Latency c. Access time b. Tracking d. Resolution ____ 91. Memory (chips) accesses data items in ____ of a second. a. millionths c. trillionths b. billionths d. quadrillionths ____ 92. A ____ occurs when the read/write head of a hard disk touches the surface of a platter. a. backup c. reading b. head crash d. writing ____ 93. Which is not a type of disk controller? a. SATA c. SCSI b. EIDE d. CD-ROM ____ 94. A(n) _____ stores items by using microscopic pits and lands in its middle layer and is read by a laser beam. a. hard disk c. optical disc b. tape d. floppy ____ 95. A(n) ____ disc can be read, written to, and erased. a. CD-ROM c. DVD-ROM b. CD-R d. DVD+RW
  • 7. CIS 101 Final Exam Questions ____ 96. A large business, commonly referred to as a(n) ____, has hundreds or thousands of employees. a. commonwealth c. enterprise b. megacorp d. legacy ____ 97. Which has the longest life expectancy? a. microfilm c. CDs b. magnetic disks d. DVDs ____ 98. ____ is the number of bytes a storage medium can hold. a. Bit depth c. Dimensionality b. Capacity d. Resolution ____ 99. ____ is the process of transferring data, instructions, and information from a storage medium into memory. a. Reading c. Writing b. Running d. Loading ____ 100. The process of writing on an optical disc is called ____. a. cutting c. loading b. formatting d. burning ____ 101. The operating system a computer uses sometimes is called the ____. a. platform c. kernel b. driver d. buffer ____ 102. When turning on a computer that has been powered off completely, you are performing a ____. a. hot boot c. warm boot b. reboot d. cold boot ____ 103. A(n) ____ computer continues to operate when one of its components fails. a. fail-safe c. faulty b. fault-tolerant d. always-on ____ 104. ____ is a concept in which the operating system allocates a portion of a storage medium to function as additional RAM. a. Fault-tolerant memory c. Logical memory b. Redundant memory d. Virtual memory ____ 105. To protect sensitive data and information as it travels over a network, a network operating system often ____ it. a. encrypts c. deletes b. decrypts d. monitors ____ 106. To defragment a disk means to ____. a. slow it down c. reorganize it b. diagnose problems with it d. repair it ____ 107. Which of the following is not a type of operating system? a. wireless c. network b. stand-alone d. embedded ____ 108. Linux is ____ software, which means its code is available to the public for use, modification, and redistribution. a. open source c. proprietary b. free source d. embedded ____ 109. A ____ hides within or looks like a legitimate program such as a screen saver. a. virus c. spyware b. worm d. Trojan horse ____ 110. ____ is a program placed on a computer without the user’s knowledge that secretly collects information about the user. a. A virus c. Spyware b. A worm d. A Trojan horse ____ 111. Compressed files sometimes are called ____ files. a. zapped c. reduced b. zipped d. encrypted ____ 112. ____ software consists of the programs that control or maintain the operations of a computer and its devices. a. System c. Platform b. Management d. Disk-based ____ 113. A(n) ____ system is a set of programs containing instructions that coordinate all the activities among hardware resources. a. platform c. management b. operating d. disk-based
  • 8. CIS 101 Final Exam Questions ____ 114. A(n) ____ is a segment of memory or storage in which items are placed while waiting to be transferred from an input device or to an output device. a. index c. nexus b. kernel d. buffer ____ 115. The operating system on most PDAs and small devices, called a(n) ____ operating system, resides on a ROM chip. a. symbian c. integrated b. embedded d. resident ____ 116. A(n) ____ copies itself repeatedly in memory or over a network, using up system resources and possibly shutting the system down. a. malex c. worm b. virus d. Trojan horse ____ 117. ____ is a program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services. a. Compression software c. Resident software b. Symbianware d. Adware ____ 118. A pop-up ____ is a filtering program that stops pop-up ads from displaying on Web pages. a. blocker c. stopper b. driver d. monitor ____ 119. A ____ is the transmission media on which the data, instructions, or information travel. a. sending device c. communications channel b. receiving device d. wire ____ 120. The design of computers, devices, and media in a network sometimes is called the _____. a. server c. network architecture b. hotspot d. communications channel ____ 121. A P2P network sometimes is called a(n) _____ network. a. bus c. communications b. file sharing d. RFID ____ 122. _____ has been adopted as a network standard for Internet communications. a. TCP/IP c. WAP b. Wi-Fi d. 802.11 ____ 123. Some computers and devices use the ____ specification to transmit data wirelessly to each other via infrared light waves. a. RFID c. IrDA b. WAP d. Wi-Fi ____ 124. Physical transmission media used in communications include _____ cable. a. twisted-pair c. fiber-optic b. coaxial d. all of the above ____ 125. _____ is an electrical disturbance that can degrade communications. a. RFID c. Chatter b. Noise d. A hot spot ____ 126. Bluetooth, UWB, HomeRF, Wi-Fi, and WiMAX communications technology use _____. a. T1 lines c. infrared b. broadcast radio signals d. microwaves ____ 127. A(n) ____ is a navigation system that consists of one or more earth-based receivers that accept and analyze signals sent by satellites in order to determine the receiver’s geographical location. a. EPS c. APS b. BPS d. GPS ____ 128. A(n) ____ is a network that connects computers and devices in a limited geographical area, such as a home, school computer laboratory, office building, or closely positioned group of buildings. a. EFT c. WAN b. LAN d. MAN ____ 129. A(n) ____ is a high-speed network that connects LANs in a metropolitan area such as a city or town. a. EFT c. MAN b. WAN d. WLAN ____ 130. A(n) ____ network is a simple, inexpensive network that typically connects fewer than 10 computers. a. bus c. MAN b. peer-to-peer d. file
  • 9. CIS 101 Final Exam Questions ____ 131. A(n) ____ network consists of a single central cable, to which all computers and other devices connect. a. ring c. token ring b. star d. bus ____ 132. On a(n) ____________________ network, all of the computers and devices on the network connect to a central device. a. ring c. token ring b. star d. bus ____ 133. A network ____ refers to the layout of the computers and devices in a communications network. a. topology c. latency b. mapping d. volume ____ 134. A(n) ____ line is a type of always-on connection that is established between two communications devices. a. integrated c. dedicated b. indexed d. baseband ____ 135. Database software often is called a ____. a. data file c. data dictionary b. report generator d. database management system ____ 136. Data ____ determine(s) the quality of the data. a. models c. integrity b. logs d. backup ____ 137. ____ information has an age suited to its use. a. Organized c. Useful b. Accessible d. Timely ____ 138. ____ information has meaning to the person who receives it. a. Organized c. Useful b. Accessible d. Timely ____ 139. _____ information is available when the decision maker needs it. a. Organized c. Useful b. Accessible d. Timely ____ 140. Which of the following data types stores lengthy text entries? a. Text c. Hyperlink b. Memo d. Object ____ 141. Which of the following data types stores photographs, audio, video, or a document created in another program? a. Text c. Hyperlink b. Memo d. Object ____ 142. File maintenance procedures include ____. a. adding records to a file c. changing records in a file b. deleting records from a file d. all of the above ____ 143. Many programs perform a ____ that analyzes entered data to ensure that it is correct. a. validity check c. system scan b. logic check d. check digit ____ 144. A(n) ____ check would test the data in two or more associated fields to ensure that the relationship is logical. a. range c. consistency b. completeness d. alphabetic/numeric ____ 145. A data ____ contains data about each file in the database and each field within those files. a. log c. model b. warehouse d. dictionary ____ 146. A ____ consists of simple, English-like statements that allow users to specify the data to display, print, or store. a. query language c. form b. query-by-example d. report generator ____ 147. A ____ allows users to design a report on the screen, retrieve data into the report design, and then display or print the report. a. query form c. report table b. report generator d. recovery utility ____ 148. A database administrator _____. a. requires a more technical view of data c. monitors the performance of the database b. creates and maintains the data dictionary d. all of the above ____ 149. ____ is a computing phrase that points out the accuracy of a computer’s output depends on the accuracy of the input. a. TCO c. IMHO b. GIGO d. MQA
  • 10. CIS 101 Final Exam Questions ____ 150. A(n) ____ is a request for specific data from the database. a. capture c. form b. report d. query ____ 151. The term, ____, refers to online or Internet-based illegal acts. a. online crime c. Internet crime b. cybercrime d. Webcrime ____ 152. A ____ is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission. a. cracker c. virus b. Trojan horse d. worm ____ 153. A ____ is a program that copies itself repeatedly, for example in memory or in a network, using up resources and possibly shutting down the computer or network. a. denial of service (DoS) attack c. virus b. Trojan horse d. worm ____ 154. If an antivirus program cannot remove an infection, it often ____. a. quarantines the infected file c. disables the drive the file is on b. reports the user computer d. removes the user from its registry ____ 155. Which of the following is an example of a possessed object? a. user name and password c. badges and keys b. face recognition systems d. fingerprint scanner ____ 156. Which of the following is not an example of a biometric device? a. smart card c. hand geometry system b. face recognition system d. fingerprint scanner ____ 157. A person breaking into a computer laboratory and smashing computers is an example of _____. a. hardware vandalism c. information theft b. hardware theft d. piracy ____ 158. Software ____ is the unauthorized and illegal duplication of copyrighted software. a. piracy c. filtering b. fraud d. attacks ____ 159. In its simplest form, a(n) ____ is a programmed formula that is used to decrypt ciphertext. a. plaintext c. firewall b. encryption key d. digital signature ____ 160. ____ can lead to system failure. a. Aging hardware b. Natural disasters, such as fires, floods, or hurricanes c. Errors in computer programs d. All of the above ____ 161. A(n) ____ is someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action. a. cracker c. cyberextortionist b. cyberterrorist d. cyberstalker ____ 162. A(n) ____ is a program that hides within or looks like a legitimate program. a. worm c. virus b. Trojan horse d. spyware ____ 163. A virus ____ is a known specific pattern of virus code. a. index c. definition b. trigger d. payload ____ 164. A(n) ____ attack is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e- mail. a. DoS c. firewall b. payload d. intrusion ____ 165. ____ is the process of converting readable data into unreadable characters to prevent unauthorized access. a. Encryption c. Decryption b. Content filtering d. Remastering
  • 11. CIS 101 Final Exam Questions ____ 166. A(n) ____ is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed. a. restoration file c. backup b. archivist d. content filter ____ 167. System development cycles often organize activities by grouping them into larger categories called ____. a. phases c. stages b. subcycles d. indices ____ 168. The ____ phase of the System Development Cycle for a project begins when the steering committee receives a project request. a. analysis c. feasibility b. implementation d. planning ____ 169. The ____ phase of the System Development Cycle consists of two major activities: (1) conduct a preliminary investigation and (2) perform detailed analysis. a. analysis c. implementation b. planning d. feasibility ____ 170. The ____ phase of the System Development Cycle consists of two major activities: (1) if necessary, acquire hardware and software and (2) develop all the details of the new or modified information system. a. implementation c. planning b. execution d. design ____ 171. The purpose of the ____ phase in the System Development Cycle is to construct, or build, the new or modified system and then deliver it to the users. a. conversion c. design b. implementation d. analysis ____ 172. The purpose of the ____ in the System Development Cycle is to provide ongoing assistance for an information system and its users after the system is implemented. a. implementation c. design b. planning d. operation, support, and security ____ 173. ____ are sets of rules and procedures a company expects employees to accept and follow. a. Grants c. Programs b. Morals d. Standards ____ 174. ____ feasibility measures how well the proposed system will work. a. Schedule c. Operational b. Technical d. Economic ____ 175. With ____, the user stops using the old system and begins using the new system on a certain date. a. parallel conversion c. direct conversion b. phased conversion d. pilot conversion ____ 176. With a ____, only one location in the company uses the new system. a. parallel conversion c. direct conversion b. phased conversion d. pilot conversion ____ 177. A ____ is a set of words, symbols, and codes that enables a programmer to communicate instructions to a computer. a. programming language c. compiler b. program d. source program ____ 178. ____ is a programming language designed for business applications. a. C c. COBOL b. BASIC d. Fortran ____ 179. A ____ control structure tells the program which action to take, based on a certain condition. a. selection c. loop b. sequence d. repetition ____ 180. A ____ committee is a decision-making body in a company. a. management c. directors' b. steering d. feasibility ____ 181. The main purpose of the ____ investigation is to determine the exact nature of the problem or improvement and decide whether it is worth pursuing. a. planning c. implementation b. preliminary d. custom ____ 182. Application software developed by the user or at the user's request is called ____ software. a. packaged c. custom b. optimized d. remastered
  • 12. CIS 101 Final Exam Questions ____ 183. A(n) ____ is a company that purchases products from manufacturers and then resells these products to the public — offering additional services with the product. a. VAR c. ERD b. RPG d. TPG ____ 184. ____ language, known as the first generation of programming languages, is the only language the computer directly recognizes. a. Machine c. Assembly b. Compiled d. Executed ____ 185. A(n) ____ program is the program that contains the language instructions, or code, to be converted. a. indexed c. source b. baseline d. master ____ 186. ____ is a measure of how suitable the development of a system will be to the company. a. Index analysis c. Feasibility b. Operationalization d. Cost/benefit analysis ____ 187. The ____ manages core activities. a. CEO c. COO b. CIO d. CFO ____ 188. Which is a magnetic storage medium? a. DVD c. PC Card b. floppy disk d. flash memory card ____ 189. Some optical disc drives use ____ technology, which works with specially coated discs to etch labels directly on the disc. a. BurnDisk c. OpticalName b. LabelCD d. LightScribe ____ 190. The operating system typically resides on the computer’s ____. a. floppy disk c. CD-ROM b. hard disk d. ROM chip ____ 191. ____ is the process of starting or restarting a computer. a. Launching c. Booting b. Loading d. Keying ____ 192. The design of computers, devices, and media in a network sometimes is called the ____. a. server c. network architecture b. hotspot d. communications channel ____ 193. ____ has been adopted as a network standard for Internet communications. a. TCP/IP c. WAP b. Wi-Fi d. 802.11 ____ 194. Issues with copyright law led to the development of ____, a strategy designed to prevent illegal distribution of movies, music, and other digital content. a. pharming c. fair use b. RSS d. DRM ____ 195. As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others. a. DoS c. DRM b. social engineering d. scamming ____ 196. A typical enterprise consists of individual operating entities called ____. a. managers c. functional units b. enterprise models d. expert systems ____ 197. The ____ management activity involves establishing goals and objectives. a. leading c. organizing b. planning d. controlling ____ 198. The ____ management activity involves measuring performance and, if necessary, taking corrective action. a. leading c. organizing b. planning d. controlling ____ 199. Using ____, engineers can test the design of a car or bridge before it is built. a. CAM c. CAD b. CAE d. CIM ____ 200. A ____ is an individual business activity, such as a deposit, payment, order, or reservation. a. message c. transaction b. process d. job
  • 13. CIS 101 Final Exam Questions ____ 201. A(n) ____ creates three basic types of reports: detailed, summary, and exception. a. TPS c. OLTP b. MIS d. OIS ____ 202. An expert system consists of two main components: ____. a. data and tasks c. a human expert and artificial expert b. a knowledge base and inference rules d. a database and spreadsheet ____ 203. ____ is the process of collecting data from the Internet as a source for a data warehouse. a. Web mining c. Scavenging b. Web searching d. Web farming ____ 204. A ____ is a defined process that identifies the specific set of steps involved in completing a particular project or business process. a. workflow c. project management strategy b. workaround d. Gantt chart ____ 205. A(n) ____ is used to create a secure connection over the Internet between a user's computer and a company's network. a. RFP c. VAR b. VPN d. DSS ____ 206. ____ allows large organizations to manage and store information and data using devices geared for heavy use, maximum availability, and maximum efficiency. a. Enterprise hardware c. Networking b. Enterprise software d. RAID ____ 207. ____ uses a computer and special software to aid in product design. a. BI c. BPA b. HRIS d. CAD ____ 208. ____ is the use of computers to control production equipment in the manufacturing process. a. CAE c. CIM b. CAM d. MRP ____ 209. ____ uses computers to integrate the many different operations of the manufacturing process. a. CAE c. CIM b. CAM d. MRP ____ 210. Many companies elevate the importance of IT by including a(n) ____ executive position that reports to the CEO. a. CFO c. CIO b. CTP d. CSO ____ 211. A(n) ____ is recorded audio stored on a Web site that can be downloaded to a computer or a portable digital audio player. a. blog c. chat b. podcast d. videoconference ____ 212. A(n) ____ is someone who develops software or writes the instructions that direct the computer to process data into information. a. director c. programmer b. program manager d. user ____ 213. The primary input device of a PDA is the ____, which looks like a small ballpoint pen but uses pressure instead of ink to write and draw. a. keyboard c. mouse b. stylus d. digital camera ____ 214. Microsoft’s Xbox 360 and Sony’s PlayStation 3 are examples of ____. a. game consoles c. PDAs b. handheld games d. mobile devices ____ 215. ____ provides high-speed Internet connections through the cable television network. a. DSL c. A cable modem b. ISDN d. Dial-up access ____ 216. A ____ is the text version of an IP address. a. home page c. hyperlink b. domain name d. user name ____ 217. A Web page may contain a(n) ____, which is a built-in connection to another Web page or part of a Web page. a. portal c. link b. directory d. index
  • 14. CIS 101 Final Exam Questions ____ 218. A(n) ____ is a collaborative Web site that allows users to add to, modify, or delete the Web site content via their Web browser. a. portal c. Blog b. wiki d. content aggregator ____ 219. ____ software serves as the interface between the user, the application software, and the computer’s hardware. a. System c. Management b. Driver d. Disk-based ____ 220. A ____ restricts access to specified Web sites. a. pop-up blocker c. personal computer maintenance utility b. spyware remover d. Web filter ____ 221. Memory ____ helps speed the processes of the computer because it stores frequently used instructions and data. a. indexing c. cache b. pipelining d. rasterizing ____ 222. A ____ connects other computers through telephone or cable television lines. a. sound card c. modem card b. video card or graphics card d. network card ____ 223. A ____ is a stationary pointing device with a ball on its top or side. a. mouse c. scanner b. joystick d. trackball ____ 224. A ____ is a small, flat, rectangular pointing device that is sensitive to pressure and motion. a. trackball c. pointing stick b. touchpad d. wheel ____ 225. A(n) ____ conference is a meeting between two or more geographically separated people who use a network or the Internet to transmit audio and video data. a. video c. dynamic b. distance d. professional