CIS 110 Quiz Answers – Flashcards

Unlock all answers in this set

Unlock answers
question
 
answer
3
question
Examples of crowdfunding and crowdsourcing include 1. Kickstarter and MobileVoice. 2. Call a Bike and Zipcar. 3. Ushahidi and Kiva. 4. Bing and Google
answer
1
question
Being computer literate includes being able to 1. diagnose and fix hardware and software problems. 2. use the web effectively. 3. avoid spam, adware, and spyware. 4. all of the above.
answer
4
question
Computer Forensics 1. analyzes computer systems to gather potential legal evidence. 2. is used to create three-dimensional art. 3. tests computers for hardware malfunction. 4. analyzes the design of a computer system.
answer
1
question
Data Mining is 1. important now because it is so easy to gather enormous data sets. 2. the study of data using algorithms to detect patterns. 3. the translation of Big Data sets into meaningful information. 4. all of the above.
answer
4
question
QR or ________ codes let any piece of print host a link to online information. 1. quality retention 2. quick retention 3. quick response 4. quality response
answer
3
question
Sharing products rather than owning them individually is known as ________. 1. collaborative consumption 2. crowdfunding 3. social networking 4. crowdsourcing
answer
1
question
A popular Voice over Internet Protocol (VoIP) service is ________. 1. Social Network 2. Mobile bridge 3. Skype 4. Tablet
answer
3
question
The process of searching huge amounts of data seeking a pattern is called data ________. 1. searching 2. mining 3. diving 4. warehousing
answer
2
question
What was the name of the first web browser? 1. Firefox 2. Mosaic 3. Netscape 4. Internet Explorer
answer
2
question
Which operating system was specifically developed for the first IBM PC? 1. Visicalc 2. CP/M 3. Cobol 4. MS-DOS
answer
4
question
Which invention replaced vacuum tubes in computers? 1. magnetic tape 2. the transistor 3. the microprocessor chip 4. the integrated circuit
answer
2
question
Which computer was touted as the first personal computer? 1. Altair 2. Lisa 3. Commodore PET 4. Osborne
answer
1
question
What was the importance of the Turing machine to today's computers? 1. It described a system that was a precursor to today's notebook computer. 2. It described a process to read, write, and erase symbols on a tape and was the precursor to today's RAM. 3. It was the first computer to have a monitor. 4. It was the first electronic calculator and a precursor to the computer.
answer
2
question
Which computer first stored its operating system in ROM? 1. Lisa 2. Apple II 3. Apple I 4. Macintosh
answer
2
question
What was the first word processing application? 1. WordPerfect 2. Alto 3. Word for MS-DOS 4. WordStar
answer
4
question
Which components are a characteristic of second-generation computers? 1. Integrated circuits 2. Microprocessor Chips 3. Transistors 4. Vacuum Tubes
answer
3
question
For what is the Atanasoft-Berry Computer best known? 1. It was the first computer to incorporate a magnetic tape system. 2. It was the first computer to use the binary system. 3. was the first computer to use vacuum tubes instead of mechanical switches. 4. It was the first computer used as a mechanical calculator
answer
3
question
Who are the founders of Microsoft? 1. Steve Jobs and Steve Wozniak 2. Bill Gates and Steve Wozniak 3. Paul Allen and Bill Gates 4. Steve Jobs and Bill Gates
answer
3
question
Which ethical theory focuses on adherence to moral duties and rights? 1. utilitarianism 2. deontology 3. divine command theory 4. relativism
answer
2
question
The ethical theory that states that deities are all-knowing and set moral truth is 1. Virtue Ethics 2. Divine Command Theory 3. Utilitarianism 4. Deontology
answer
2
question
Which ethical philosophy states that morals are internal? 1. Relativism 2. Divine Command Theory 3. Virtue Ethics 4. Deontology
answer
3
question
Which of the following statements is false? 1. Unethical behavior is always illegal. 2. Individuals who have no sense of right or wrong exhibit amoral behavior. 3. Ethical decisions are usually influenced by personal ethics. 4. Life experience affects an individual's personal ethics.
answer
1
question
Unethical behavior 1. is based on civil disobedience. 2. is different from illegal behavior. 3. is governed by specific laws passed by legislative bodies. 4. is the same as illegal behavior.
answer
2
question
The field of psychology that theorizes that happiness results from ethical living is known as 1. moral psychology. 2. affirmative psychology. 3. principled psychology. 4. positive psychology.
answer
4
question
Which system of ethics states there is no universal moral truth? 1. There is no universally agreed-on best system. 2. relativism 3. utilitarianism 4. virtue ethics
answer
2
question
What should you do if you spot unethical behavior at your workplace? 1. Nothing, as long as the behavior is legal. 2. Follow company procedures for reporting unethical behavior. 3. Report it to the police immediately. 4. Start looking for a new job.
answer
2
question
Which of the following actions would NOT help to identify your personal ethics? 1. Prepare a list of values that are most important to you. 2. Describe yourself. 3. Identify the influences of your work environment. 4. Conduct a genealogic study of your extended family
answer
4
question
Ethical decisions in business affect which of the following? 1. the suppliers and financial lenders 2. the employees 3. the business's clients and customers 4. all stakeholders
answer
4
question
Which of the following is NOT a major type of cybercrime reported to the IC3? 1. Malware Fraud 2. Government Impersonation Scams 3. Advance Fee Fraud 4. Identity Theft
answer
1
question
Viruses that load from USB drives left connected to computers when computers are turned on are known as 1. boot-sector viruses. 2. encryption viruses. 3. script viruses. 4. polymorphic viruses.
answer
1
question
Software designed to close logical ports in your computer is known as a(n) 1. Firewall 2. Network Address Translator 3. Packet Filter 4. Anti-Malware Blocker
answer
1
question
Which is NOT a tool hackers use to gain access to and take control of your computer? 1. Rootkits 2. Trojan Horse 3. Phishing Software 4. Backdoor Programs
answer
3
question
A computer that a hacker has gained control of in order to launch DoS attacks is known as a ________ computer 1. Zombie 2. Rootkit 3. Compromised 4. Breached
answer
1
question
A backup of all the files on your computer, which essentially creates a "snapshot" of what your computer looks like at that point in time, is known as a(n) 1. Modification Backup 2. Total Backup 3. Incremental Backup 4. Image Backup
answer
4
question
The Internet Crime Complaint Center (IC3) is a partnership between the ________ 1. National White Collar Crime Center and U.S. Department of Defense 2. FBI and National White Collar Crime Center 3. FBI and local police departments 4. FBI and National Defense Department
answer
2
question
All of the following activities may infect your computer with a virus EXCEPT ________ 1. downloading or running an e-mail attachment file 2. downloading video files from peer-to-peer sites 3. printing a document 4. sharing flash drives
answer
3
question
A ________ is a virus that is attached to documents such as Word or Excel files 1. script virus 2. macro virus 3. polymorphic virus 4. Trojan horse
answer
2
question
Which of the following classifications of viruses can change its own code to avoid detection? 1. Stealth 2. Polymorphic 3. Multipartite 4. Worm
answer
2
question
The internet was created to provide 1. a secure form of communications. 2. a common communication means for all computers. 3. both A and B 4. neither A or B
answer
3
question
Which of the following describes an IP address? 1. It is referred to as a dotted quad. 2. It identifies any computer connecting to the Internet. 3. It identifies a website. 4. all of the above
answer
4
question
Which of the following browsers was introduced with Windows 10? 1. Edge 2. Chrome 3. Internet Explorer 4. Firefox
answer
1
question
What web browser feature would be particularly useful when using public computers? 1. Pinned tabs 2. Session restore 3. Privacy Browsing 4. All of the above
answer
3
question
In the URL https://www.whitehouse.gov/blog, which part is considered the protocol? 1. www.whitehouse.gov 2. .gov 3. /blog 4. http
answer
4
question
Search engines that search other search engines are called 1. megasearch engines. 2. betasearch engines. 3. metasearch engines. 4. gigasearch engines.
answer
3
question
A computer connected to the Internet that asks for data is a(n) ________ 1. Aggregator 2. Surrogate 3. Server 4. Client
answer
4
question
A(n) ________ is installed on your computer, and when the program is opened, your e-mail is downloaded to your computer. 1. Email Server 2. Email Host 3. Email Client 4. Web-based email
answer
3
question
All of the following are tips for professional e-mail etiquette EXCEPT ________ 1. be concise and to the point 2. use spell-checker and proofread before sending 3. use abbreviations such as "u," "r," and "BRB" to keep the e-mail message shorter 4. include a meaningful subject line
answer
3
question
Podcasts enable you to ________ 1. deliver audio/video files via RSS 2. communicate with friends in real time 3. post journal entries on the web 4. edit video files over the web
answer
1
question
What is a gigabyte? 1. one million bits 2. one trillion bytes 3. one billion bytes 4. one billion bits
answer
3
question
Which of the following is NOT an output device? 1. optical mouse 2. speakers 3. touch-screen monitor 4.laser printer
answer
1
question
Monitor screens are made up of millions of tiny dots known as 1. bytes. 2. bits. 3. pixels. 4. resolution points.
answer
3
question
Which of these is located on the motherboard? 1. Hard drive 2. RAM 3. DVD drive 4. SSD drive
answer
2
question
Which of these is an optical storage device? 1. SSD drive 2. flash drive 3. External hard drive 4. Blu-ray drive
answer
4
question
Ergonomics is an important consideration 1 .only for laptop computers. 2. only for desktop computers. 3. for all computing devices. 4. only for laptop and desktop computers, but never for mobile devices
answer
3
question
Computers use ________ language consisting of 0s and 1s 1. byte 2. binary 3. system 4. symbol
answer
2
question
Apple's OS X and Microsoft Windows are examples of ________ software. 1. communication 2. application 3. utility 4. operating system
answer
4
question
Each of these is a basic type of a touch screen, EXCEPT ________ 1. capacitive 2. reflective 3. surface acoustic wave 4. resistive
answer
2
question
Inkjet printers and laser printers are examples of ________ printers 1. thermal 2. dot-matrix 3. impact 4. nonimpact
answer
4
question
When is it sufficient to use a list to organize data? 1. when more than one person needs to access the data 2. when the data is simple and can be organized in one table 3. when data needs to be organized into two or more tables 4. all of the above
answer
2
question
Which is NOT a component of a database that describes how data is stored? 1. record 2. report 3. table 4. field
answer
2
question
The type of database that uses fields, records, and measure as data attributes is 1. two-dimensional. 2. object-oriented. 3. relational. 4. multidimensional.
answer
4
question
Which of the following is NOT considered metadata? 1. field size 2. table name 3. the data type 4. field name
answer
2
question
Data captured from websites as users navigate through a website is called? 1. time-variant data 2. staged data 3. web-user data 4. clickstream data
answer
4
question
Which of the following database systems uses artificial intelligence? 1. enterprise resource planning system 2. transaction-processing system 3. knowledge-based system 4. office support system
answer
3
question
If a school keeps two lists, one for student registration and one for student financial information, both containing name and address information, this is an example of data ________. 1. Integrity 2. Redundancy 3. Completeness 4. Normalization
answer
2
question
In a database, the term ________ is synonymous with a category of information 1. row 2. record 3. table 4. field
answer
4
question
Data ________ ensures that the data contained in a database is accurate and reliable. 1. Consistency 2. Redundancy 3. Efficiency 4. Integrity
answer
4
question
In a Microsoft Access database, something like the entire Gettysburg Address document would be stored in a(n) ________ field. 1. long text 2. short text 3. object 4. text
answer
3
question
Which of the following would you not see on a Windows 10 Start menu? 1. Power 2. Task View 3. All Apps 4. Tiles
answer
2
question
When an OS processes tasks in a priority order, it is known as 1. interruptive multitasking. 2. multitasking handling. 3. preemptive interrupting. 4. preemptive multitasking.
answer
4
question
An example of an open source OS is 1. Linux 2. Windows 3. OS X 4. DOS
answer
1
question
Which of the following is not considered an accessibility utility? 1. Narrator 2. System Restore 3. Speech Recognition 4. Magnifier
answer
2
question
Special programs that facilitate communication between a device and the OS are called 1. Utility Programs 2. Hardware Player 3. APIs 4. Device Drivers
answer
4
question
A new feature in Windows 10 that is used to organize open windows into task-specific groups is called 1. Virtual Desktop 2. Program Manager 3. Snap Assist 4. Task View
answer
1
question
OS X is the operating system developed by ________. 1. Linux 2. Microsoft 3. Apple 4. Google
answer
3
question
All of the following are examples of network operating systems EXCEPT ________. 1. Linux 2. Os X 3. MS-DOS 4.
answer
3
question
Most smartphones use operating systems developed by ________ 1. Apple and Microsoft 2. Microsoft and Google 3. Symbian and Apple 4. Google and Apple
answer
4
question
The Mac OS was the first commercially available OS to incorporate ________. 1. color graphics 2. sound 3. point and click technology 4. networking
answer
3
question
Which software application would you use to calculate and manipulate numerical data? 1. Microsoft Office Excel 2. Apple iWork Numbers 3. Apache OpenOffice Calc 4. all of the above
answer
4
question
Calendars, tasks, and e-mail will be found in which application? 1. One Note 2. Access 3. Outlook 4. Excel
answer
3
question
Which of the following describes copyleft? 1. terms enabling free use of software content 2. terms enabling redistributing open source software 3. terms enabling redistributing proprietary software 4. terms restricting free use of software content
answer
2
question
When a vendor hosts software on a website and you don't need to install the software on your device, this is known as: 1. Freeware. 2. Open source software. 3. Beta software. 4. Software as a Service.
answer
4
question
Which type of software is used to make 3-D models? 1. spreadsheet 2. simulation 3. DTP 4. CAD
answer
4
question
________ software helps run the computer and coordinates instructions between other software and the hardware devices. 1. System 2. Application 3. Recovery 4. Productivity
answer
1
question
Using applications on smartphones and tablets to buy and sell products is known as ________ commerce. 1. smart 2. remote 3. mobile 4. web
answer
3
question
Which of the following is NOT an example of a general productivity software application? 1. personal information management 2. word processing 3. image editing 4. spreadsheet
answer
3
question
All of the following are examples of software suites EXCEPT ________. 1. Microsoft OneNote 2. Apache OpenOffice 3. Microsoft Office 2016 4. Apple iWork
answer
1
question
The appropriate software to use for creating research papers is ________ software. 1. presentation 2. database 3. word processing 4. spreadsheet
answer
3
question
Moore's law refers to: 1. the amount of memory on a memory chip. 2. the number of transistors inside a CPU chip. 3. the overall system processing capability. 4. the speed of DRAM.
answer
2
question
Which of the following is true? 1. The CPU contains the ALU. 2. The Windows System Properties window tells you how much memory you should buy. 3. Intel is the only manufacturer of CPUs. 4. RAM is where the CPU is located.
answer
1
question
Computers are designed with 1. neither volatile nor nonvolatile memory. 2. both volatile and nonvolatile memory. 3. volatile memory. 4. nonvolatile memory.
answer
2
question
A good way to assess your CPU usage is to 1. check the number reported by the system defrag utility. 2. check the Performance tab of the Task Manager. 3. listen for the sound of a spinning hard disk drive. 4. feel the temperature of the CPU with your hand.
answer
2
question
The video memory in a modern video card is 1. set by the CPU speed. 2. mechanical. 3. related to the size of the SSD drive. 4. several gigabytes of GDDR5.
answer
4
question
Windows creates "restore points" so that you can 1. extend your warranty. 2. return your system to the way it was before you installed new software. 3. protect your system from viruses. 4. add additional hard disk storage space.
answer
2
question
The processor market for desktop and laptop computers is dominated by ________. 1. Microsoft 2. Apple 3. Intel 4. IBM
answer
3
question
Which of the following activities is carried out by the ALU? 1. Moves read/write heads 2. Performs arithmetic calculations 3. Renders video images 4. Creates virtual memory
answer
2
question
The CPU consists of which two parts? 1. Cache memory and SSD storage 2. The arithmetic logic unit and the front side bus 3. The control unit and the arithmetic logic unit 4. The control unit and the front side bus
answer
3
question
Windows uses a memory-management technique known as ________ to monitor which applications you use most frequently. It preloads them into your system memory. 1. SuperRetrieve 2. SuperGet 3. SuperTake 4. SuperFetch
answer
4
question
Which of the following would NOT be a benefit of networking computers? 1. sharing printers and other peripherals 2. sharing files 3. sharing an Internet connection 4. sharing software licenses
answer
4
question
Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA Soccer on his Xbox, and her dad is checking stock quotes on his iPad. What kind of network does this family have? 1. P2P network 2. Client/server network 3. both A and B 4. neither A and B
answer
1
question
What two devices are often combined into one device in a small network to connect the home network to the Internet and to share the connection between devices on the network? 1. switch and router 2. modem and switch 3. modem and router 4. router hub and switch
answer
3
question
Which of the following is used to access the Internet when WiFi is not available? 1. mobile hotspot 2. 4G LTE Internet access 3. 3G Internet access 4. all of the above
answer
4
question
Which of the following should you NOT do to secure a wireless network? 1. Create a security encryption passphrase. 2. Keep the default network name and router password. 3. Implement media access control. 4. Disable SSID broadcasting.
answer
2
question
Which of the following might cause interference or poor connectivity between nodes on a wireless network? 1. some appliances 2. concrete walls 3. nodes that are too far apart 4. all of the above
answer
4
question
A ________ is any device connected to a network such as a computer, printer, or game console. 1. node 2. NOS 3. NIC 4. packet
answer
1
question
________ is the actual speed of data transfer that is achieved and is always less than or equal to the data transfer rate. 1. Broadband 2. Bandwidth 3. Benchmark 4. Throughput
answer
4
question
A network that spans a large physical distance is called a ________. 1. MAN 2. LAN 3. PAN 4. WAN
answer
4
question
Which transmission medium transmits data the fastest? 1. Fiber-optic cable 2. Twisted-pair cable 3. Wireless 4. Coaxial cable
answer
1
question
A cell phone is cellular because 1. software can be plugged in or removed. 2. phones have become so small in size. 3. it uses a network made up of cells or base transceiver stations. 4. of the pattern on the screen of the device.
answer
3
question
Which of the following is false? 1. An analog-to-digital converter chip converts your voice into digital signals. 2. Bluetooth technology uses radio waves. 3. Your phone can only be connected to the Internet if there is a WiFi network available. 4. SMS is an acronym for short message service, also called text messaging.
answer
3
question
Which of the following is NOT a mobile device? 1. 2-in-1 2. base transceiver station 3. ultrabook 4. tablet
answer
2
question
DRM is an acronym for 1. Digital Rights Management. 2. Digital Real Movie. 3. Digital Role Maker. 4. Distribution Regional Media.
answer
1
question
Image resolution is 1. the number of data points recorded in an image. 2. the size of the image in bytes. 3. based on the kind of compression used. 4. only important with analog image capture
answer
1
question
A digital camera's resolution 1. is measured in megapixels (MP). 2. tells you how to transfer images to your printing service. 3. depends on the camera's lens. 4. only matters for analog cameras.
answer
1
question
The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and telephone needs. 1. telephony 2. multimedia message service 3. digital convergence 4. mobile switching center
answer
3
question
The operating system of a cell phone is stored in ________. 1. ROM 2. RAM 3. the CPU 4. an SD card
answer
1
question
A(n) ________ chip converts sound waves from a voice into digital signal. 1. digital convergence 2. analog-to-digital converter 3. telephony 4. digital signal processor
answer
2
question
A ________ is a geographical area with a base transceiver station at its center. 1. wave 2. hot-spot 3. port 4. cell
answer
4
question
The individuals responsible for generating images for websites are referred to as 1. graphic designers. 2. web programmers. 3. network administrators. 4. interface designers.
answer
1
question
What type of job involves working at client locations and the ability to work with little direct supervision? 1. field-based 2. home-based 3. office-based 4. project-based
answer
1
question
Which position is not typically a part of the information systems department? 1. helpdesk analyst 2. web server administrator 3. network administrator 4. graphic designer
answer
4
question
Outsourcing is thought to be an attractive option for many companies because of 1. increased data security. 2. the cost savings that can be realized. 3. decreased travel and entertainment costs. 4. the emphasis on employee training.
answer
2
question
Which of the following IT positions is responsible for directing a company's strategy on sites such as Facebook, Twitter, and Yelp? 1. social media director 2. customer interaction technician 3. social web analyst 4. project manager
answer
1
question
Which of the following statements about IT careers is false? 1. Women who have IT skills have ample opportunities for securing IT employment. 2. Many IT jobs are staying in the United States. 3. IT employers typically prefer experience over certification. 4. Most IT jobs require little interaction with other people.
answer
4
question
Which task is not typically performed by a network administrator? 1. web programming 2. planning for disaster recovery 3. installing networks 4. developing network usage policies
answer
1
question
Interface designers are the people responsible for 1. creating the look and feel of a website. 2. providing feedback to website customers. 3. deploying the materials prepared by content creators. 4. orchestrating the company strategy in online venues.
answer
1
question
If you are artistic and have mastered software packages such as Adobe Photoshop, Autodesk 3ds Max, and Autodesk Maya, you might consider a career as which of the following? 1. game tester 2. web designer 3. game designer 4. game programmer
answer
3
question
Which position is not a part of the systems development department? 1. project manager 2. programmer 3. database administrator 4. systems analyst
answer
3
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New