Flashcards on CIS final

question

GIF images are always rectangular, but can use a(n) ____ background color to make the images appear to be nonrectangular.
answer

transparent
question

One of the first items that Melissa installed was a(n) ____, which checks all incoming and outgoing traffic and only allows authorized traffic to pass through.
answer

firewall
question

After patients log on, they should be able to download scanned versions of their X-rays and MRIs. These images should be provided in the ____ format.
answer

TIF
question

____ bring buyers and sellers together to facilitate transactions between the two parties.
answer

Brokerage sites
question

Cookies and spyware are possible privacy risks.
answer

True
question

Heavy use of computers, combined with information overload and 24/7 accessibility via technology, can lead to ____—a state of fatigue or frustration brought about by overwork.
answer

burnout
question

The objective of ____ is to gather useful data about the system under study.
answer

data collection
question

One controversial patent granted to Google in 2013 is for \”____\” advertising—a business model for charging advertisers according to the number of views an ad receives via a \”head mounted gaze tracking device\” (speculated to be Google Glass).
answer

pay-for-gaze
question

____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone’s computer activity.
answer

Computer monitoring software
question

Web conferences typically take place via a personal computer or mobile phone and are used by businesses and individuals.
answer

True
question

When intermediary hubs specialize in a specific industry (such as healthcare), they are sometimes called ____ hubs.
answer

vertical
question

It is illegal to use computer monitoring software on your own computer or on the computers of your employees. _________________________
answer

False
question

____ was originally developed as a programming language designed for processing text.
answer

Perl
question

Fixed wireless Internet access is similar to satellite Internet in that it uses wireless signals, but it uses radio transmission towers instead of satellites.
answer

True
question

A(n) keyword search uses a list of categories displayed on the screen. _________________________
answer

False
question

____ tags are similar to HTML tags, but there are stricter rules about how the markup tags are written.
answer

XHTML
question

Some of the most popular Web site authoring programs are Microsoft Expression Web and ____.
answer

Adobe Dreamweaver
question

You can surf anonymously, opt out of some marketing activities, and use filters and other tools to limit your exposure to spam.
answer

True
question

A(n) ____ is a collection of elements (people, hardware, software, and data) and procedures that interact to generate information needed by the users in an organization.
answer

information system
question

A ____ is a malicious program that masquerades as something else—usually as some type of application program.
answer

Trojan horse
question

The goal of ____ is for your Web site to be listed as close as possible to the top of the search result hits that are displayed when an individual performs a Web search using keywords related to your site or business.
answer

SEO
question

E-commerce business models (B2C, B2B, and so on) are not necessarily mutually exclusive. _________________________
answer

True
question

Collecting in-depth information about an individual is known as ____.
answer

electronic profiling
question

Repetitive stress injuries and other injuries related to the workplace environment are estimated to account for ____ of all serious workplace injuries.
answer

one-third
question

New security risks are revealed all the time. For instance, it was recently discovered that data from some unencrypted smart meters can be accessed from nearly ____ away, enabling would-be burglars to monitor homes to see if they are occupied based on electricity usage within the homes.
answer

1,000 feet
question

Similar to audio files, compressing video is frequently used on Web pages to speed up delivery. _________________________
answer

False
question

Common multimedia elements included in online games are background music, sound effects, images, animated effects, narration, talking characters, and video clips. _________________________
answer

Computer-aided manufacturing (CAM)
question

Whenever you include content on a Web page that requires a(n) ____, include an obvious link that takes visitors to a Web page where they can download its free version.
answer

plug-in
question

C-level attacks can occur because of a natural disaster (such as a tornado, fire, flood, or hurricane), sabotage, or terrorist attack. _________________________
answer

False
question

Some benefits can be computed relatively easily by calculating the amount of labor the new system will save, the reduction in paperwork it will allow, and so on. These gains are called ____ because they represent quantifiable dollar amounts.
answer

tangible benefits
question

Users who want their desktop computers to remain powered up when the electricity goes off should use a(n) ____, as shown in the accompanying figure.
answer

UPS
question

For the genomics division, Mother Goose is planning to replace the old system by the new one all at once. This is called a ____ conversion.
answer

direct
question

____ managers include supervisors, office managers, foremen, and other managers who supervise nonmanagement workers.
answer

Operational
question

When you break a large document apart, consider including a link to view or download the entire document intact either as a Web page or in a common format, such as Word or ____.
answer

PDF
question

In order to prevent others from stealing her logo, Jill should get a ____.
answer

trademark
question

Research has shown that having an academic honor code does not effectively reduce cheating.
answer

False
question

The GIF format uses lossless file compression, so the quality of the image is not decreased when it is saved in the GIF format. _________________________
answer

True
question

Brenda also orders movies and television through the Internet via a(n) ____ provider, which allows users to download video for a small fee.
answer

VOD
question

The figure above shows the components of a(n) information system. _________________________
answer

True
question

According to the Bureau of Labor Statistics, one of the top five projected fastest growing careers in the United States through 2018 is network systems and data communications analyst, with a projected growth of 53% by 2018. _________________________
answer

True
question

Most Web pages today are written in a ____— a coding system used to define the structure, layout, and general appearance of the content of a Web page.
answer

markup language
question

An emotional health concern related to computer use is ____.
answer

addiction to the Internet or another technology
question

When a proposal for a new system or system modification is submitted, one of the first steps is to conduct a ____.
answer

preliminary investigation
question

____ generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online.
answer

Web 2.0
question

Direct Internet connections are typically ____ connections.
answer

broadband
question

Managers are usually classified into three categories: executive, ____, and operational.
answer

middle
question

____ includes any acts of malicious destruction to a computer or computer resource.
answer

Computer sabotage
question

Each step of the ____ produces some type of documentation to pass on to the next step.
answer

system development life cycle
question

The primary infrastructure that makes up the ____ is typically owned by communications companies, such as telephone and cable companies.
answer

Internet backbone
question

Two specific types of ____ are e-commerce systems and point-of-sale (POS) systems.
answer

order entry systems
question

People who use the Internet for activities, such as looking up telephone numbers, browsing through online catalogs, or making an online purchase, are referred to as \”users.\”
answer

True
question

____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.
answer

passwords
question

One advantage of using personal computers for Internet access is that they have relatively large screens for viewing Internet content, and they typically have a full keyboard for easier data entry. _________________________
answer

true
question

____ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes.
answer

video surveillance
question

The first basic step in the development process of a multimedia Web site is ____.
answer

creating the multimedia elements
question

Keyboard supports lower the keyboard, enabling the user to keep his or her forearms parallel to the floor more easily. _________________________
answer

false
question

Promotion of a site refers to advertising its existence, purpose, and URL. _________________________
answer

true
question

People who use the Internet for activities, such as looking up telephone numbers, browsing through online catalogs, or making an online purchase, are referred to as \”users.\”
answer

true
question

Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.
answer

threat definitions
question

The disaster recovery plan is also called a business continuity plan.
answer

true
question

Extensive mouse use has also been associated with CVS.
answer

false
question

Direct Internet connections are much slower than dial-up connections.
answer

false
question

Businesses and ISPs typically archive e-mail messages that travel through their servers.
answer

true
question

Although e-commerce is most often implemented today via Web sites, banks, for example, have been conducting e-commerce for years using private networks. _________________________
answer

true
question

Electronic check processing is the first thing that comes to mind when considering online payments. _________________________
answer

false
question

Semirugged PCs are designed to withstand drops of three feet or more onto concrete, extreme temperature ranges, wet conditions, and use while being bounced around over rough terrain in a vehicle.
answer

false
question

Computer glasses are optimized for viewing in the intermediate zone of vision where a computer monitor usually falls. _________________________
answer

true
question

One of the most obvious types of hardware loss is hardware theft. _________________________
answer

true
question

The accompanying figure shows a(n) ____ credit card.
answer

OTP
question

While a keyboard, mouse, monitor, and printer can be connected to a portable computer directly, a ____ is a device designed to more easily connect a portable computer to peripheral devices.
answer

docking station
question

A ____ is responsible for maintaining a large, multiuser system.
answer

system administrator
question

Phishing schemes use legitimate-looking e-mails to trick users into providing private information. _________________________
answer

true
question

A(n) ____ is a collection of an individual’s work accessible through a Web site.
answer

e-portfolio
question

The various types of communications systems in place in many organizations include e-mail, messaging, online conferencing, ____, and telecommuting.
answer

collaborative system
question

In response to the increased occurrence of identity theft, some local governments have removed birth and death information from their available online records.
answer

true
question

B2B possibilities include buying goods and services needed for business operations, as well as purchasing manufacturing supplies and raw goods.
answer

true
question

Like a computer virus, a ____ is a malicious program designed to cause damage.
answer

computer worm
question

Recently, Sharon won a contract to photograph exhibits at the National Zoo. However, the magazine that commissioned these photos is located in a different state. Sharon can use a ____ to authenticate the validity of any contracts she signs electronically.
answer

digital certificate
question

The BMP format is commonly used with scanned images. _________________________
answer

false
question

According to the Bureau of Labor Statistics, one of the top five projected fastest growing careers in the United States through 2018 is network systems and data communications analyst, with a projected growth of 53% by 2018. _________________________
answer

true
question

The accompanying figure shows the MSN ____ Web page.
answer

portal
question

____ is the process of gathering, storing, accessing, and analyzing data about a company in order to make better business decisions.
answer

business intelligence
question

For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.
answer

throw-away e-mail address
question

Some electronic tools, such as computer monitoring software and video surveillance equipment, can be used legally by individuals, businesses, and law enforcement agencies.
answer

true
question

____ carry on written \”conversations\” with people in a natural language.
answer

chatterbots
question

MISs are typically interactive and provide information on demand whenever a decision needs to be made.
answer

false
question

In traditional system development, the phases of system development are carried out in a preset order.
answer

true
question

Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.
answer

war driving
question

A computer that is controlled by a hacker or other computer criminal is referred to as a ____.
answer

bot
question

Sans serif typefaces, such as Arial, do not have serifs and are frequently used for titles, headings, Web page banners, and other text elements that usually are displayed larger than body text or that otherwise need a more distinctive appearance.
answer

true
question

Technically, the Internet is a physical network, and the Web is the collection of Web pages accessible over the Internet.
answer

true
question

Some e-commerce Web sites utilize ____ to display environments or show what products (such as a car or a home) look like in the real world.
answer

virtual reality
question

In addition to the normal business transaction processing systems, there are also specialty transaction processing systems used by law enforcement, the military, and other organizations.
answer

true
question

____ tags are used by many (but not all) search engines to classify the Web page when it is added to a search database.
answer

meta
question

Prevention measures against the counterfeiting of documents—such as checks and identification cards—include using microprinting, watermarks, and other difficult-to-reproduce content. _________________________
answer

true
question

Writing a computer virus or other type of malware or even posting the malware code on the Internet is not illegal, but it is considered highly unethical and irresponsible behavior.
answer

true
question

The hard drives of computers that are to be disposed of should be destroyed before they are sold or recycled. _________________________
answer

false
question

____ refers to identifying the browser used by each visitor, typically via JavaScript code.
answer

browser sniffing
question

Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.
answer

privacy policy
question

Data mining used in conjunction with Web site data is referred to as Web mining. _________________________
answer

true
question

One emerging type of Trojan horse is called a ____-Access Trojan.
answer

remote
question

There are many options for protecting yourself against computer monitoring by your employer or the government.
answer

false
question

The GIS in the accompanying figure shows the locations of crime incidents based on the selected crime type, location, and date range.
answer

true
question

The three main types of intellectual property rights are copyrights, trademarks, and ____.
answer

patents
question

Anthony regularly visits several popular political ____, which are Web pages designed to facilitate written discussions between people on specific subjects.
answer

message boards
question

The ____ implements regulations for unsolicited e-mail messages and lays the groundwork for a federal Do Not E-Mail Registry.
answer

CAN-SPAM act
question

The goal of ____ is to ensure that every child in the world has access to a rugged, low-cost, low-power connected laptop in order to provide them with access to new channels of learning, sharing, and self-expression.
answer

OPLC
question

Banner ads can be emotional ads—that is, ads that are targeted to individuals based on their preferences, buying habits, or interests. _________________________
answer

false
question

Laptop ____ protect portable computers from scratches and other damage when they are carried in a conventional briefcase or bag.
answer

sleeves
question

____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities—usually to buy products or services in that person’s name.
answer

identity theft
question

Typohunting is registering a domain name that is similar to a trademark or domain name but that is slightly misspelled in hopes that individuals will accidentally arrive at the site when trying to type the URL of the legitimate site. _________________________
answer

false
question

A computer operations manager designs and builds the end-user interfaces and tools used with cloud services.
answer

false
question

MISs are typically interactive and provide information on demand whenever a decision needs to be made.
answer

false
question

Some human resources departments view college degrees from online diploma mills or other nonaccredited organizations as a form of digital manipulation.
answer

false
question

By ____, you instruct companies you do business with that they cannot share your personal data with third parties.
answer

opting out
question

Some expert systems are designed to take the place of human experts, while others are designed to assist them.
answer

true
question

The ____ is cited as a disadvantage of Web-based training and distance learning by some educators.
answer

lack of face to face
question

E-commerce credit card transactions are much less likely to be fraudulent than conventional credit card transactions.
answer

false
question

Mary is interested in identifying the business needs of a system and ensuring the systems meet those needs. Her advisor will probably tell her to look into becoming a ____.
answer

business analyst
question

FTP programs block access to a computer from outside computers and enable each user to specify which programs on his or her computer are allowed to have access to the Internet. _________________________
answer

false
question

An inventory management system that goes beyond just inventory to act as a complete distribution system is referred to as a ____ management system (WMS).
answer

warehouse
question

In order to accept credit cards, a business typically opens an e-commerce merchant account, also called a(n) ____.
answer

internet merchant account
question

John wants to reduce some of his day-to-day burden of inventory management and shipping. He should look into a(n) ____.
answer

order- fulfillment company
question

A Java applet is a group of GIF images stored in a special animated GIF file that is inserted in a Web page.
answer

false
question

In reaction to scandals, Congress passed the Sarbanes-Oxley Act of 2002, which includes provisions to require ____ to personally vouch for the truth and fairness of their company’s disclosures.
answer

CEOs and CFOs
question

Some people are ____ who learn best by doing.
answer

kinesthetic
question

E-commerce Web sites cannot be designed and developed in-house; instead, businesses have to outsource these tasks to a professional Web development company.
answer

false
question

Most search sites use a ____—a software program—in conjunction with a huge database of information about Web pages to help visitors find Web pages that contain the information they are seeking.
answer

search engine
question

Many online auction sites collect comments about transactions, typically called auctiontalk.
answer

false
question

In 1992, the U.S. Environmental Protection Agency (EPA) introduced ____ as a voluntary labeling program designed to identify and promote energy-efficient products to reduce greenhouse gas emissions.
answer

energy star
question

The technician also found a ____ on the computer, which is designed to find sensitive information about the user located on the PC and then send it to the malware creator. The technician explains that this type of malware cannot replicate itself.
answer

trojan horse
question

The legal concept of limited use permits limited duplication and use of a portion of copyrighted material for certain purposes, such as criticism, commentary, news reporting, teaching, and research. _________________________
answer

false
question

The goal of business intelligence is to provide a detailed picture of an organization, its functions, and its systems, and the relationships among these items. _________________________
answer

false

Get instant access to
all materials

Become a Member