CIS 105 exam 3
Unlock all answers in this set
Unlock answersquestion
One of the most dramatic changes in connectivity and communications in the past few years has been ________
answer
A) Widespread use of mobile devices with wireless internet connectivity
question
in a communication system, which among the following originate and accept messages in the form of data, information, and/or instructions?
answer
B) sending and receiving devices
question
in a communication system, which among the following convert messages into packets that can travel across the communication channel?
answer
A) connection devices
question
which physical connection is the fastest?
answer
C) fiber-optic cable
question
which among the following is considered a line of sight communication medium?
answer
D) microwave
question
wimax stands for _________
answer
C) worldwide interoperability for microwave access
question
microwave communication uses high frequency ________
answer
A) radio waves
question
LTE stands for
answer
A) long term evolution
question
the GPS device in an automobile uses which communication channel?
answer
D) satellite
question
A service that uses existing phone lines to provide high speed connections is called _______
answer
D) DSL
question
cellular services use _______ to provide wireless connectivity to the internet.
answer
D) 3G and 4G cellular networks
question
the capacity of a communication channel is measured in _______
answer
A) bandwidth
question
using this type of communication channel, several users can simultaneously use a single connection for high speed data transfer.
answer
C) broadband
question
every computer on the internet has a unique numeric address called a(n)
answer
C) IP address
question
_____ is the process of breaking down information sent or transmitted across the internet in small part.
answer
D) packetization
question
the essential features of this include identifying, sending, and receiving devices and breaking information into small parts for transmission across the internet.
answer
B) TCP/IP
question
the _____ is the central node that coordinates the flow of data by sending messages directly between the sender and receiver nodes
answer
C) switch
question
in a computer network, this node that request and uses resources available from other nodes
answer
A) Client
question
this device enables connectivity between two lans or a lan and a larger network .
answer
A) networks gateway
question
a wireless access point that provide internet access in a public such as a coffee shop, library, and bookstore, or university.
answer
A) Hot spot
question
A network topology in which the central node s connected to two or more subordinate nodes that, in turn, are conncected to other sub-ordinate nodes.
answer
D) Tree
question
this type of network strategy uses central servers to coordinate and supple services to other nodes on the networks
answer
B) Client/server
question
organizations use the following to allow supppliers and others limited access to their networks.
answer
B) Extranets
question
all communication between a company's internal networks and the outside world pass through
answer
D) Proxy
question
remote users can conncet to an organization's network through this type of secure private connection.
answer
A) VPN
question
this type of network topology does not use a specific physical layout
answer
C) Mesh
question
people that collect and sell personal data are called ____
answer
C) information re sellers
question
these programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.
answer
C) employee-monitoring software
question
small data files taht are deposited on a user's hard disk when they visit a website are called _____.
answer
A) cookies
question
these are used by advertisers to keep track of your web activity as you move from one site to the next.
answer
D) third-party cookies
question
Programs used to secretly record an individual's activities on the internet are called _____.
answer
A) spyware
question
which type of program would likely be used by investigators to record a potential suspects internet activities?
answer
C) Keystroke logger
question
this type of computer criminal creates and distributes malicious programs.
answer
C) Cracker
question
Most browsers offer this, which ensures that your browsing activity is not recording on your hard disk.
answer
D) privacy mode
question
which of the following is not malware?
answer
D) Ad-aware
question
a program that replicates itself and clogs computers and networks.
answer
B) Worm
question
free computer games and free screen saver programs are typical carriers of _____
answer
D)Trojan horses
question
Which among the following is a way to shut down an ISP or website?
answer
A) Denial of services attack
question
which among the following is a fraudulent or deceptive act designed to trick indiviuals on the internet into spending time or money for little or no return?
answer
B) internet scam
question
the use of the internet, cell phones, or other devices to send or post conent intended to hurt or embarrass another person.
answer
C) cyberbullying
question
the most significant concerns for implementation of computer technology involve security and ethics.
answer
C) privacy
question
according to which law is it illegal for an owner of a program to make backup copies for their personal use and resell or give them away?
answer
A) digital millennium copyright act
question
corporations often use this to prevent copyright viloations.
answer
C) Digital rights management (DRM)
question
this uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
answer
D) dictionary attack
question
this type of wi-fi hotspot operate close to a legitimate wi-fi hotspot and steals information such as usernames and passwords.
answer
D) Rouge
question
the process of coding information to make it unreadable except to those who have a special piece of information known as a key.
answer
D) encryption
question
a(n) _______ acts as a security buffer between a corporation's private network and all external networks.
answer
A) firewall
question
which of the following is the most widely used wireless network encryption for home wireless networks?
answer
D) WPA2
question
which of the following is not a measure to protect computer security?
answer
D) keeping the same password on all systems consistently.
question
_____ is concerned with protecting software and data from unauthorized tampering or damage.
answer
D) Data security
question
this is a legal concept that gives content creators the right to control use and distribution of their work.
answer
C) copyright
question
this law gives you the right to look at your personal records held by government agencies.
answer
B) freedom of information act
question
computer criminals that create and spread viruses are punished under this law
answer
D) computer fraud and abuse act
question
pricing, promoting, selling, and distributing the organization's goods and services pertains to which of the following functions?
answer
A) Marketing
question
Creating finished goods and services using raw materials and personnel pertains to which of the following functions?
answer
C) production
question
who is responsible for operational matters and monitoring day-to-day events?
answer
A) Supervisors
question
this level of management is concerned with-range planning and uses information that will help them plan the future growth and direction of the organization.
answer
A) Top management.
question
this level of management is involved with tactical planning and implementing the the long-term goals within an organization.
answer
B) Middle management
question
____ system help supervisors by generating databases that act as the foundation for other information systems.
answer
B) transaction processing
question
which of the following refers to a system that summarizes detailed data from the transaction processing systems in systems in standard reports for middle-level managers?
answer
B) management information system (MIS)
question
who uses management information system?
answer
C) middle-level managers
question
which system presents information in a highly summarized form?
answer
D) Executive support system (ESS)
question
A transaction processing system is also referred to as a ______.
answer
B) data processing system
question
the ______ activity records the customer requests for products or services.
answer
B) Sales order processing
question
money collected from or owed by customers is called _______
answer
C) accounts receivable
question
The ______ keeps records of the number of each kind of part or finished good in the warehouse.
answer
B) inventory control system
question
What documentation shows the difference between the income and expenses of the company for a specific time period?
answer
A) income statements
question
this records assets, liabilities, and the equality owned by the owners of an organization.
answer
A) balance sheet
question
regional managers can compare their regular sales reports with that of the other regional managers by using ______.
answer
B) periodic reports
question
an example of this type of report would be a sales report that shows that certain items are selling significantly above or below forecasts.
answer
D) Exception
question
this system is a flexible tool for data analysis, since its reports do not have a fixed format.
answer
B) decision support system
question
in a GDSS, the ______ is generally the decision maker.
answer
C) group
question
this typically consists of transactions from the transaction processing system.
answer
D) internal data
question
this decision model helps middle-level managers control the work of the organization, such as financial planning and sales promotion planning.
answer
C) tactical model
question
these systems can be organized to retrieve information from databases outside the company, such as business-news services.
answer
D) executive support systems (ESS)
question
these systems are used in managing documents communicating and scheduling.
answer
A) Office automation systems
question
project resources can be scheduled, planned and controlled using ______
answer
A) project managers
question
which system is a type of artificial intelligence that uses a database contain facts and rules to provide assistance to users?
answer
B) Expert system