Flashcards on CIS final

Unlock all answers in this set

Unlock answers
question
GIF images are always rectangular, but can use a(n) ____ background color to make the images appear to be nonrectangular.
answer
transparent
question
One of the first items that Melissa installed was a(n) ____, which checks all incoming and outgoing traffic and only allows authorized traffic to pass through.
answer
firewall
question
After patients log on, they should be able to download scanned versions of their X-rays and MRIs. These images should be provided in the ____ format.
answer
TIF
question
____ bring buyers and sellers together to facilitate transactions between the two parties.
answer
Brokerage sites
question
Cookies and spyware are possible privacy risks.
answer
True
question
Heavy use of computers, combined with information overload and 24/7 accessibility via technology, can lead to ____—a state of fatigue or frustration brought about by overwork.
answer
burnout
question
The objective of ____ is to gather useful data about the system under study.
answer
data collection
question
One controversial patent granted to Google in 2013 is for "____" advertising—a business model for charging advertisers according to the number of views an ad receives via a "head mounted gaze tracking device" (speculated to be Google Glass).
answer
pay-for-gaze
question
____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone's computer activity.
answer
Computer monitoring software
question
Web conferences typically take place via a personal computer or mobile phone and are used by businesses and individuals.
answer
True
question
When intermediary hubs specialize in a specific industry (such as healthcare), they are sometimes called ____ hubs.
answer
vertical
question
It is illegal to use computer monitoring software on your own computer or on the computers of your employees. _________________________
answer
False
question
____ was originally developed as a programming language designed for processing text.
answer
Perl
question
Fixed wireless Internet access is similar to satellite Internet in that it uses wireless signals, but it uses radio transmission towers instead of satellites.
answer
True
question
A(n) keyword search uses a list of categories displayed on the screen. _________________________
answer
False
question
____ tags are similar to HTML tags, but there are stricter rules about how the markup tags are written.
answer
XHTML
question
Some of the most popular Web site authoring programs are Microsoft Expression Web and ____.
answer
Adobe Dreamweaver
question
You can surf anonymously, opt out of some marketing activities, and use filters and other tools to limit your exposure to spam.
answer
True
question
A(n) ____ is a collection of elements (people, hardware, software, and data) and procedures that interact to generate information needed by the users in an organization.
answer
information system
question
A ____ is a malicious program that masquerades as something else—usually as some type of application program.
answer
Trojan horse
question
The goal of ____ is for your Web site to be listed as close as possible to the top of the search result hits that are displayed when an individual performs a Web search using keywords related to your site or business.
answer
SEO
question
E-commerce business models (B2C, B2B, and so on) are not necessarily mutually exclusive. _________________________
answer
True
question
Collecting in-depth information about an individual is known as ____.
answer
electronic profiling
question
Repetitive stress injuries and other injuries related to the workplace environment are estimated to account for ____ of all serious workplace injuries.
answer
one-third
question
New security risks are revealed all the time. For instance, it was recently discovered that data from some unencrypted smart meters can be accessed from nearly ____ away, enabling would-be burglars to monitor homes to see if they are occupied based on electricity usage within the homes.
answer
1,000 feet
question
Similar to audio files, compressing video is frequently used on Web pages to speed up delivery. _________________________
answer
False
question
Common multimedia elements included in online games are background music, sound effects, images, animated effects, narration, talking characters, and video clips. _________________________
answer
Computer-aided manufacturing (CAM)
question
Whenever you include content on a Web page that requires a(n) ____, include an obvious link that takes visitors to a Web page where they can download its free version.
answer
plug-in
question
C-level attacks can occur because of a natural disaster (such as a tornado, fire, flood, or hurricane), sabotage, or terrorist attack. _________________________
answer
False
question
Some benefits can be computed relatively easily by calculating the amount of labor the new system will save, the reduction in paperwork it will allow, and so on. These gains are called ____ because they represent quantifiable dollar amounts.
answer
tangible benefits
question
Users who want their desktop computers to remain powered up when the electricity goes off should use a(n) ____, as shown in the accompanying figure.
answer
UPS
question
For the genomics division, Mother Goose is planning to replace the old system by the new one all at once. This is called a ____ conversion.
answer
direct
question
____ managers include supervisors, office managers, foremen, and other managers who supervise nonmanagement workers.
answer
Operational
question
When you break a large document apart, consider including a link to view or download the entire document intact either as a Web page or in a common format, such as Word or ____.
answer
PDF
question
In order to prevent others from stealing her logo, Jill should get a ____.
answer
trademark
question
Research has shown that having an academic honor code does not effectively reduce cheating.
answer
False
question
The GIF format uses lossless file compression, so the quality of the image is not decreased when it is saved in the GIF format. _________________________
answer
True
question
Brenda also orders movies and television through the Internet via a(n) ____ provider, which allows users to download video for a small fee.
answer
VOD
question
The figure above shows the components of a(n) information system. _________________________
answer
True
question
According to the Bureau of Labor Statistics, one of the top five projected fastest growing careers in the United States through 2018 is network systems and data communications analyst, with a projected growth of 53% by 2018. _________________________
answer
True
question
Most Web pages today are written in a ____— a coding system used to define the structure, layout, and general appearance of the content of a Web page.
answer
markup language
question
An emotional health concern related to computer use is ____.
answer
addiction to the Internet or another technology
question
When a proposal for a new system or system modification is submitted, one of the first steps is to conduct a ____.
answer
preliminary investigation
question
____ generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online.
answer
Web 2.0
question
Direct Internet connections are typically ____ connections.
answer
broadband
question
Managers are usually classified into three categories: executive, ____, and operational.
answer
middle
question
____ includes any acts of malicious destruction to a computer or computer resource.
answer
Computer sabotage
question
Each step of the ____ produces some type of documentation to pass on to the next step.
answer
system development life cycle
question
The primary infrastructure that makes up the ____ is typically owned by communications companies, such as telephone and cable companies.
answer
Internet backbone
question
Two specific types of ____ are e-commerce systems and point-of-sale (POS) systems.
answer
order entry systems
question
People who use the Internet for activities, such as looking up telephone numbers, browsing through online catalogs, or making an online purchase, are referred to as "users."
answer
True
question
____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.
answer
passwords
question
One advantage of using personal computers for Internet access is that they have relatively large screens for viewing Internet content, and they typically have a full keyboard for easier data entry. _________________________
answer
true
question
____ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes.
answer
video surveillance
question
The first basic step in the development process of a multimedia Web site is ____.
answer
creating the multimedia elements
question
Keyboard supports lower the keyboard, enabling the user to keep his or her forearms parallel to the floor more easily. _________________________
answer
false
question
Promotion of a site refers to advertising its existence, purpose, and URL. _________________________
answer
true
question
People who use the Internet for activities, such as looking up telephone numbers, browsing through online catalogs, or making an online purchase, are referred to as "users."
answer
true
question
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.
answer
threat definitions
question
The disaster recovery plan is also called a business continuity plan.
answer
true
question
Extensive mouse use has also been associated with CVS.
answer
false
question
Direct Internet connections are much slower than dial-up connections.
answer
false
question
Businesses and ISPs typically archive e-mail messages that travel through their servers.
answer
true
question
Although e-commerce is most often implemented today via Web sites, banks, for example, have been conducting e-commerce for years using private networks. _________________________
answer
true
question
Electronic check processing is the first thing that comes to mind when considering online payments. _________________________
answer
false
question
Semirugged PCs are designed to withstand drops of three feet or more onto concrete, extreme temperature ranges, wet conditions, and use while being bounced around over rough terrain in a vehicle.
answer
false
question
Computer glasses are optimized for viewing in the intermediate zone of vision where a computer monitor usually falls. _________________________
answer
true
question
One of the most obvious types of hardware loss is hardware theft. _________________________
answer
true
question
The accompanying figure shows a(n) ____ credit card.
answer
OTP
question
While a keyboard, mouse, monitor, and printer can be connected to a portable computer directly, a ____ is a device designed to more easily connect a portable computer to peripheral devices.
answer
docking station
question
A ____ is responsible for maintaining a large, multiuser system.
answer
system administrator
question
Phishing schemes use legitimate-looking e-mails to trick users into providing private information. _________________________
answer
true
question
A(n) ____ is a collection of an individual's work accessible through a Web site.
answer
e-portfolio
question
The various types of communications systems in place in many organizations include e-mail, messaging, online conferencing, ____, and telecommuting.
answer
collaborative system
question
In response to the increased occurrence of identity theft, some local governments have removed birth and death information from their available online records.
answer
true
question
B2B possibilities include buying goods and services needed for business operations, as well as purchasing manufacturing supplies and raw goods.
answer
true
question
Like a computer virus, a ____ is a malicious program designed to cause damage.
answer
computer worm
question
Recently, Sharon won a contract to photograph exhibits at the National Zoo. However, the magazine that commissioned these photos is located in a different state. Sharon can use a ____ to authenticate the validity of any contracts she signs electronically.
answer
digital certificate
question
The BMP format is commonly used with scanned images. _________________________
answer
false
question
According to the Bureau of Labor Statistics, one of the top five projected fastest growing careers in the United States through 2018 is network systems and data communications analyst, with a projected growth of 53% by 2018. _________________________
answer
true
question
The accompanying figure shows the MSN ____ Web page.
answer
portal
question
____ is the process of gathering, storing, accessing, and analyzing data about a company in order to make better business decisions.
answer
business intelligence
question
For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.
answer
throw-away e-mail address
question
Some electronic tools, such as computer monitoring software and video surveillance equipment, can be used legally by individuals, businesses, and law enforcement agencies.
answer
true
question
____ carry on written "conversations" with people in a natural language.
answer
chatterbots
question
MISs are typically interactive and provide information on demand whenever a decision needs to be made.
answer
false
question
In traditional system development, the phases of system development are carried out in a preset order.
answer
true
question
Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.
answer
war driving
question
A computer that is controlled by a hacker or other computer criminal is referred to as a ____.
answer
bot
question
Sans serif typefaces, such as Arial, do not have serifs and are frequently used for titles, headings, Web page banners, and other text elements that usually are displayed larger than body text or that otherwise need a more distinctive appearance.
answer
true
question
Technically, the Internet is a physical network, and the Web is the collection of Web pages accessible over the Internet.
answer
true
question
Some e-commerce Web sites utilize ____ to display environments or show what products (such as a car or a home) look like in the real world.
answer
virtual reality
question
In addition to the normal business transaction processing systems, there are also specialty transaction processing systems used by law enforcement, the military, and other organizations.
answer
true
question
____ tags are used by many (but not all) search engines to classify the Web page when it is added to a search database.
answer
meta
question
Prevention measures against the counterfeiting of documents—such as checks and identification cards—include using microprinting, watermarks, and other difficult-to-reproduce content. _________________________
answer
true
question
Writing a computer virus or other type of malware or even posting the malware code on the Internet is not illegal, but it is considered highly unethical and irresponsible behavior.
answer
true
question
The hard drives of computers that are to be disposed of should be destroyed before they are sold or recycled. _________________________
answer
false
question
____ refers to identifying the browser used by each visitor, typically via JavaScript code.
answer
browser sniffing
question
Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.
answer
privacy policy
question
Data mining used in conjunction with Web site data is referred to as Web mining. _________________________
answer
true
question
One emerging type of Trojan horse is called a ____-Access Trojan.
answer
remote
question
There are many options for protecting yourself against computer monitoring by your employer or the government.
answer
false
question
The GIS in the accompanying figure shows the locations of crime incidents based on the selected crime type, location, and date range.
answer
true
question
The three main types of intellectual property rights are copyrights, trademarks, and ____.
answer
patents
question
Anthony regularly visits several popular political ____, which are Web pages designed to facilitate written discussions between people on specific subjects.
answer
message boards
question
The ____ implements regulations for unsolicited e-mail messages and lays the groundwork for a federal Do Not E-Mail Registry.
answer
CAN-SPAM act
question
The goal of ____ is to ensure that every child in the world has access to a rugged, low-cost, low-power connected laptop in order to provide them with access to new channels of learning, sharing, and self-expression.
answer
OPLC
question
Banner ads can be emotional ads—that is, ads that are targeted to individuals based on their preferences, buying habits, or interests. _________________________
answer
false
question
Laptop ____ protect portable computers from scratches and other damage when they are carried in a conventional briefcase or bag.
answer
sleeves
question
____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities—usually to buy products or services in that person's name.
answer
identity theft
question
Typohunting is registering a domain name that is similar to a trademark or domain name but that is slightly misspelled in hopes that individuals will accidentally arrive at the site when trying to type the URL of the legitimate site. _________________________
answer
false
question
A computer operations manager designs and builds the end-user interfaces and tools used with cloud services.
answer
false
question
MISs are typically interactive and provide information on demand whenever a decision needs to be made.
answer
false
question
Some human resources departments view college degrees from online diploma mills or other nonaccredited organizations as a form of digital manipulation.
answer
false
question
By ____, you instruct companies you do business with that they cannot share your personal data with third parties.
answer
opting out
question
Some expert systems are designed to take the place of human experts, while others are designed to assist them.
answer
true
question
The ____ is cited as a disadvantage of Web-based training and distance learning by some educators.
answer
lack of face to face
question
E-commerce credit card transactions are much less likely to be fraudulent than conventional credit card transactions.
answer
false
question
Mary is interested in identifying the business needs of a system and ensuring the systems meet those needs. Her advisor will probably tell her to look into becoming a ____.
answer
business analyst
question
FTP programs block access to a computer from outside computers and enable each user to specify which programs on his or her computer are allowed to have access to the Internet. _________________________
answer
false
question
An inventory management system that goes beyond just inventory to act as a complete distribution system is referred to as a ____ management system (WMS).
answer
warehouse
question
In order to accept credit cards, a business typically opens an e-commerce merchant account, also called a(n) ____.
answer
internet merchant account
question
John wants to reduce some of his day-to-day burden of inventory management and shipping. He should look into a(n) ____.
answer
order- fulfillment company
question
A Java applet is a group of GIF images stored in a special animated GIF file that is inserted in a Web page.
answer
false
question
In reaction to scandals, Congress passed the Sarbanes-Oxley Act of 2002, which includes provisions to require ____ to personally vouch for the truth and fairness of their company's disclosures.
answer
CEOs and CFOs
question
Some people are ____ who learn best by doing.
answer
kinesthetic
question
E-commerce Web sites cannot be designed and developed in-house; instead, businesses have to outsource these tasks to a professional Web development company.
answer
false
question
Most search sites use a ____—a software program—in conjunction with a huge database of information about Web pages to help visitors find Web pages that contain the information they are seeking.
answer
search engine
question
Many online auction sites collect comments about transactions, typically called auctiontalk.
answer
false
question
In 1992, the U.S. Environmental Protection Agency (EPA) introduced ____ as a voluntary labeling program designed to identify and promote energy-efficient products to reduce greenhouse gas emissions.
answer
energy star
question
The technician also found a ____ on the computer, which is designed to find sensitive information about the user located on the PC and then send it to the malware creator. The technician explains that this type of malware cannot replicate itself.
answer
trojan horse
question
The legal concept of limited use permits limited duplication and use of a portion of copyrighted material for certain purposes, such as criticism, commentary, news reporting, teaching, and research. _________________________
answer
false
question
The goal of business intelligence is to provide a detailed picture of an organization, its functions, and its systems, and the relationships among these items. _________________________
answer
false
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New