CSIT test #3 – Flashcards
Unlock all answers in this set
Unlock answersquestion
1. Digital convergence combines several industries, including the following: A. computers and communications B. consumer electronics C. entertainment and mass media D. All of these
answer
All of these
question
2. An example of digital portability is a ________. A. mobile phone. B. living room TV with internet access. C. refrigerator with access to email. D. none of these.
answer
Mobile Phone
question
3. Telecommunications can be organized through two kinds of arrangements: the ________ model and the ________ model. A. river-and-stream; switched-circuit B. tree-and-branch; switched-network C. parent-and-child; divided-road D. None of these
answer
Tree and branch
question
4. Studying while eating, along with listening to music while talking on the phone or handling email, are all instances of ________. A. choice overload B. surplus websurfing C. multitasking D. digital convergence
answer
Multitasking
question
5. The downside of personalization is people feel overburdened with too much choice, so that they are more likely to ________. A. regret their decisions B. be reluctant to make decisions C. have excessive expectations about their decisions D. All of these
answer
All of these
question
6. MP3 files are compressed, so that they are about ________ the size of uncompressed audio files. A. one-tenth B. one-quarter C. one-third D. one-half
answer
One-tenth
question
7. Digital music players utilize one or both of the following technologies: ________ and ________. A. hard-disk drives; flash memory B. Wi-Fi; Bluetooth C. microwaves; infrared waves D. None of these
answer
Hard-disk drives, flash memory
question
8. The quality of a song on a digital audio player is determined by its ________, the number of times a song is measured and converted to a digital value. A. resolution B. zoom rate C. sampling rate D. file transfer rate
answer
sampling rate
question
9. How many children and teens in the U.S. suffer from noise-induced hearing loss (in part caused by hours of listening to MP3 players)? A. 33% B. 24% C. 12% D. 5%
answer
12%
question
10. A form of radio in which broadcasters are able to squeeze two digital and one analog station on the same frequency is called ________ radio. A. high-definition B. internet C. satellite D. none of these
answer
HD
question
11. The biggest competitor to regular radio is ________. A. satellite radio B. internet radio C. high-definition radio D. none of these
answer
Internet Radio
question
12. A camera, either film or digital, that automatically adjusts settings such as exposure and focus is a ________ camera. A. wide-angle B. single-lens reflex C. point-and-shoot D. optical zoom
answer
Point and shoot
question
13. Another name for image sharpness is ________. A. pixel setting B. digital zoom C. optical zoom D. resolution
answer
Resolution
question
14. A digital camera's images are stored on ________. A. mini-CDs B. digital film C. flash memory cards D. All of these
answer
flash memory cards
question
15. The eye-level glass device on the camera that you look through and that shows the image to be photographed is called the ________. A. LCD screen B. image frame C. optical viewfinder D. none of these
answer
optical viewfinder
question
16. A portable device that stores personal organization tools, such as schedule planner, address book, and to-do list, along with other, more specialized software, is called a ________. A. palmtop B. handheld C. personal digital assistant D. All of these
answer
All of these
question
17. To transfer files from your PDA to your PC, you can do the following: ________. A. Pull out your PDA's flash card and insert it into your computer's card reader. B. Put your PDA in a special cradle plugged into a USB port. C. Transfer data wirelessly if the PDA has built-in Wi-Fi or Bluetooth capability. D. Any of these.
answer
Any of these
question
18. A tablet PC is a special notebook computer outfitted with a digitizer tablet and ________ that allows a user to handwrite text on the unit's screen. A. lightpen B. touchscreen C. stylus D. cursor
answer
Stylus
question
19. When most of us tune in our TV sets, we get a system of varying signal amplitude and frequency that represents picture and sound elements. This system is called ________. A. interactive television B. personalized television C. internet television D. analog television
answer
Analog television
question
20. ________ TV uses a digital signal, or series of 0s and 1s, and is much clearer than analog TV. A. Digital B. High-definition C. Standard-definition D. none of these
answer
Digital
question
21. ________ consists of a wide set of technologies that enable viewers to select videos or TV programs from a central server to watch when they want. A. Video on demand B. TiVo C. Interactive TV D. Personal TV
answer
Video on demand
question
22. ________ is a technology in which television and video signals are sent to viewers using internet protocols. A. Internet TV B. Internet Protocol TV C. Interactive Protocol TV D. Internet Personal TV
answer
Internet Protocol TV
question
23. The societal effects of the New TV technology are that it can change ________. A. when you watch TV. B. where you watch TV. C. the nature of TV programs. D. All of these.
answer
All of these
question
24. ________ is using a cellphone or PDA to send short messages to a pager, PDA, smartphone, or other handheld device. A. Instant messaging B. Internet messaging C. Text messaging D. Voice messaging
answer
Text messaging
question
25. Ringtones may be ________. A. music tones B. polyphonic C. monophonic D. any of these
answer
Any of these
question
26. An example of a videogame console is the ________. A. Microsoft PlayStation 3 B. Sony Revolution C. Nintendo Xbox 360 D. none of these
answer
None of these
question
1. A field is a unit of data consisting of a collection of ________. A. characters B. tables C. records D. files
answer
Characters
question
2. What is one byte of data also called? A. character B. field C. record D. file
answer
Character
question
3. Which of the following is NOT a level of the data storage hierarchy? A. bit B. byte C. record D. network
answer
Network
question
4. A record is a collection of related ________. A. characters B. tables C. fields D. files
answer
Fields
question
5. A file is a collection of related ________. A. characters B. tables C. fields D. records
answer
Records
question
6. What is a field that is chosen to uniquely identify a record called? A. main field B. super field C. high field D. key field
answer
Key field
question
7. Filename extensions, follow a period and may be up to ________ letters in length. A. three B. four C. five D. six
answer
Three or four
question
8. If a file contains software instructions, then it is a ________ file. A. statistics B. program C. data D. key
answer
Program
question
9. In a database management system, the ________ is a document or file that stores the data definitions and descriptions of the structure of data used in the database. A. access security B. data dictionary C. report generator D. DBMS utility
answer
Data dictionary
question
10. What are programs that help a database to be maintained, by creating, editing, and deleting data, records, and files? A. access security B. data dictionary C. report generator D. DBMS utilities
answer
DBMS utilities
question
11. Which of the following is a program that produces an on-screen or printed document from all or part of a database? A. access security B. data dictionary C. report generator D. DBMS utilities
answer
Report generator
question
12. The person who coordinates all activities and needs for an organization's database is the ________. A. database administrator B. database manager C. database analyst D. database master
answer
database administrator
question
13. Which of the following is NOT a task performed by the database administrator (DBA)? A. Determining user access privileges. B. Assisting in establishing priorities for requests. C. Installing hardware. D. Developing user documentation
answer
Installing hardware
question
14. Which type of database model arranges fields or records in related groups whereby each child record can have only one parent record? A. hierarchical database B. network database C. distributed database D. object-oriented database
answer
Hierarchical database
question
15. What is a parent record called in network database terminology? A. guest B. owner C. member D. resident
answer
Owner
question
16. What is a child record called in network database terminology? A. guest B. owner C. member D. resident
answer
member
question
17. Which type of database model is similar to a hierarchical database, but allows each child record to have more than one parent record? A. hierarchical database B. network database C. distributed database D. object-oriented database
answer
network database
question
18. Which type of database model connects data in different files through the use of a key field? A. hierarchical database B. network database C. relational database D. object-oriented database
answer
relational database
question
19. Which of the following is NOT an example of database terminology? A. tuples B. attributes C. qualities D. relations
answer
qualities
question
20. Which of the following clauses is NOT a component of structured query language (SQL)? A. SELECT...FROM statement B. WHERE clause C. ORDER BY clause D. WHEREBY clause
answer
WHEREBY clause
question
21. Which type of database uses software written in small, reusable chunks as elements within database files? A. hierarchical database B. network database C. distributed database D. object-oriented database
answer
Object oriented database
question
22. Which of the following is the computer-assisted process of sifting through and analyzing vast amounts of data to extract meaning and discover new knowledge? A. data mining B. e-commerce C. data warehousing D. business-to-business systems
answer
data mining
question
23. What is the process of removing errors and inconsistencies from data called? A. data cleansing B. data polishing C. data buffing D. data manipulation
answer
data cleansing
question
24. What describes contents of a data warehouse? A. omega data B. meta-data C. data area D. warehouse data
answer
meta-data
question
25. What is a special database of cleansed data called? A. data warehouse B. relational database C. shared database D. data area
answer
data warehouse
question
26. What data mining (DM) tool is used to catalog galaxies? A. SKICAT B. IDIS C. GALAXOR D. query-and-report
answer
SKICAT
question
27. The buying and selling of products and services via computer networks is called ________. A. data mining B. e-commerce C. commerce D. data warehousing
answer
e-commerce
question
28. What enables businesses to sell goods or services to other businesses using the internet or a private network? A. DBMS B. B2B C. data mining D. mirroring
answer
B2B
question
29. Which department of an organization makes products or provides services? A. human resources B. marketing & sales C. production (operations) D. research & development
answer
production (operations)
question
30. Which department of an organization recruits people? A. human resources B. marketing & sales C. production (operations) D. research & development
answer
Human resources
question
31. Which function of an organization oversees advertising, promotion, and sales? A. human resources B. marketing & sales C. production (operations) D. research & development
answer
marketing & sales
question
32. A schematic showing the hierarchy of formal relationships among an organization's employees is a(n) ________. A. management chart B. organization chart C. management tree D. relationship chart
answer
organization chart
question
33. The ________manager is concerned with long-range, or strategic planning and decisions. A. operational B. tactical C. top D. principal
answer
top
question
34. The ________ manager makes tactical decisions to implement the strategic goals of an organization. A. operational B. tactical C. top D. principal
answer
tactical
question
35. The ________ manager makes operational decisions by following a well-defined set of routine procedures. A. operational B. tactical C. top D. principal
answer
operational
question
36. Which of the following statements about managers is incorrect? A. Top-level managers make strategic decisions. B. Lower management makes operational decisions. C. Operational managers make analytical decisions. D. Middle-level managers make tactical decisions.
answer
operational managers make analytical decisions
question
37. In a business organization, a recorded event having to do with routine business activities is a ________. A. model B. transaction C. operation D. contract
answer
transaction
question
38. A system that combines various technologies such as voice mail, fax machines, and others in order to reduce the manual labor is a(n) ________ system. A. transaction processing B. office automation C. decision support D. executive support
answer
Office automation
question
39. A computer-based information system that keeps track of the transactions needed to conduct business is a(n) ________ system. A. transaction processing B. office automation C. executive support D. decision support
answer
transaction processing
question
40. A computer-based information system that uses data recorded by transaction processing system as input into programs that produce routine reports as output is a(n) ________ system. A. office automation B. executive support C. management information D. decision support
answer
management information
question
41. If you were in operational (lower) management, which type of computer-based information system would you use? A. transaction processing system (TPS) B. management information system (MIS) C. decision support system (DSS) D. executive support system (ESS)
answer
transaction processing system
question
42. A computer-based information system that provides a flexible tool for analysis and helps managers focus on the future is a(n) ________ system. A. office automation B. decision support C. executive support D. transaction processing
answer
decision support
question
43. An easy-to-use decision support system that specifically supports strategic decision-making is a(n) ________ system. A. executive support B. office automation C. decision support D. transaction processing
answer
executive support
question
44. If you were in top management, which type of computer-based information system would you use? A. transaction processing system (TPS) B. management information system (MIS) C. executive support system (ESS) D. decision support system (DSS)
answer
executive support system
question
45. A set of interactive computer programs that help users solve problems that would otherwise require the assistance of a human expert is a(n) ________ system. A. expert B. authority C. professional D. influence
answer
Expert
question
46. What is the software that controls the structure of a database and access to the data? A. office suite B. database management system C. spreadsheet D. database suite
answer
database management system
question
47. What program is used to screen out dangerous commercial airline passengers? A. CAPPS II B. TOI C. report generator D. MVS
answer
CAPPS II
question
48. The right of a person to avoid disclosure of his or her personal information is called ________. A. secrecy B. privacy C. personality D. rationality
answer
Privacy
question
49. The crime in which thieves hijack a person's name and identity to gain money or purchase goods is called ________. A. theft of privacy B. theft of identity C. theft of rationality D. theft of secrecy
answer
Theft of identity
question
1. Which of the following is a limitation when using databases for research? A. accuracy B. acquiring incomplete data C. limited history D. All of these
answer
All of these
question
2. Which of the following is NOT among the errors and accidents that may afflict computer systems? A. human errors B. electromechanical problems C. procedural problems D. disaster-recovery problems
answer
Disaster-recovory problems
question
3. Incomplete, outdated, or otherwise inaccurate data is known as ________ data. A. bad B. dirty C. unsaved D. recycled
answer
dirty
question
4. Electromechanical problems are examples of ________. A. errors and accidents B. crimes against computers C. worms and viruses D. connectivity failures
answer
errors and accidents
question
5. Dirty data is ________. A. virus-infected data B. worm-infected data C. inaccurate, incomplete data D. downloaded data
answer
inaccurate, incomplete data
question
6. Errors and accidents caused by NOT following procedures are known as ________ errors. A. human B. electromechanical C. dirty data D. procedural
answer
procedural
question
7. The 1999 crashing of the $125 million Mars Climate Orbiter is an example of what type of error or problem? A. procedural error B. software error C. electromechanical error D. "dirty data" error
answer
procedural error
question
8. Power failures is an example of ________. A. electromechanical problems B. human errors C. procedural errors D. software errors
answer
electromechanical problems
question
9. A computer crime is defined as ________. A. an illegal act perpetuated against computers or telecommunications B. the use of computers or telecommunications to accomplish an illegal act C. both a and b D. neither a nor b
answer
both a and b
question
10. Which of the following is NOT a function of the Computer Emergency Response Team (CERT)? A. Counseling the party under attack. B. Helping to thwart the intruder. C. Evaluating the system afterwards against future break-ins. D. Prosecuting those caught.
answer
Prosecuting those caught
question
11. "Dirty data" problems fall under the category of ________. A. errors and accidents B. natural hazards C. Crimes against computers and communications D. Crimes using computers and communications
answer
errors and accidents
question
12. File swapping as implemented by Kazaa is an example of ________ services. A. internet B. ISP C. client/server D. peer-to-peer
answer
peer to peer
question
13. File swapping provided by Napster is an example of ________ services. A. client B. server C. client/server D. peer-to-peer
answer
client/server
question
14. The Nigerian letter scam is an example of ________. A. errors and accidents B. theft of time and services C. worms and viruses D. internet-related fraud
answer
internet-related fraud
question
15. Sending emails that appear to come from a trusted source, which direct you to a website where you're asked to reveal personal information is called _________ A. email non-disclosure B. credit-card or debit-card fraud C. phishing D. check fraud
answer
phishing
question
16. A variant on conventional phishing, in which a hacker or cracker sets up a Wi-Fi hotspot or access point that makes your computer think it's accessing a safe public network or your home network and then monitors your communications and steals data you enter into a website, is known as (an) ________. A. Evil Twin attack B. Wi-Fi phishing C. both a and b D. neither a nor b
answer
both a and b
question
17. When a computer is taken over covertly and programmed to respond to instructions sent remotely, often by instant-messaging channels, it is called a(n) ________. A. botnet B. zombie C. Nigerian letter D. cyberslave
answer
zombie
question
18. Which of the following is NOT a method in which a security system tries to authenticate a user's identity? A. What you have-cards, keys, signatures, badges. B. What you know-PINs, passwords, and digital signatures. C. What you are-physical traits or biometrics. D. What you need-request made verbally or manually.
answer
what you need request made verbally or manually
question
19. Which of the following is NOT a security procedure used by organizations to protect software and data? A. audit controls B. disaster-recovery plans C. control of access to only those who need access D. people controls such as screening job applicants
answer
disaster recovery plan
question
20. Which of the following is included in a disaster recovery plan? A. public and private keys B. a list of all business functions C. access control D. digital signatures
answer
a list of all business functions
question
21. Which of the following terms describes old, obsolete electronic gadgetry? A. dirty data B. e-dump C. e-waste D. junk
answer
e-waste
question
22. A blocking program for protecting children from online objectionable adult material is ________. A. Cybersitter B. Cyber Patrol C. Net Nanny D. All of these
answer
All of these
question
23. In morphing, a film or video image is displayed on a computer screen and altered pixel by pixel. True False
answer
True
question
24. The five categories of errors and accidents that may affect computer systems are human errors, software errors, administrative errors, electromechanical problems, and dirty data problems. True False
answer
False
question
25. A software bug can is an error in a program that causes it not to work properly. True False
answer
True
question
26. Humans often are not good at assessing their own information needs. True False
answer
True
question
27. The crash of the $125 million Mars Climate Orbiter in 1999 is an example of a software error. True False
answer
True
question
28. When a combination of minor failures led to the explosion of the Challenger space shuttle in 1986, this was an example of an electromechanical problem. True False
answer
True
question
29. A computer crime can be an illegal act perpetrated against computers/telecommunications or it can be the use of computers/telecommunications to accomplish an illegal act. True False
answer
True
question
30. Illegal file swapping shifted from peer-to-peer services like Napster to client/server services like Kazaa, Grokster, and Limeware. True False
answer
False
question
31. In the Nigerian letter scam, victims are given a chance to receive nonexistent government money as long as they pay a fee to help transfer the money to an overseas account. True False
answer
True
question
32. In the Evil Twin attack, a network of computers is compromised by means of a Trojan horse that plants instructions within each PC to wait for commands from the personal controlling that network. True False
answer
False
question
33. A zombie is the name given to a computer taken over covertly and programmed to respond to instructions sent remotely, often by instant-messaging channels. True False
answer
True
question
34. Foreign intelligence services, even those belonging to countries friendly to the U.S., can be a threat to U.S. computer systems. True False
answer
True
question
35. Programs used to monitor how much time workers spend on the web and to block employee access to gambling and pornography sites are known as employee internet management (EIM) software. True False
answer
True