CSIT test #3 – Flashcards
Unlock all answers in this set
Unlock answersquestion
            1. Digital convergence combines several industries, including the following:   A. computers and communications  B. consumer electronics  C. entertainment and mass media  D. All of these
answer
        All of these
question
            2. An example of digital portability is a ________.   A. mobile phone.  B. living room TV with internet access.  C. refrigerator with access to email.  D. none of these.
answer
        Mobile Phone
question
            3. Telecommunications can be organized through two kinds of arrangements: the ________ model and the ________ model.   A. river-and-stream; switched-circuit  B. tree-and-branch; switched-network  C. parent-and-child; divided-road  D. None of these
answer
        Tree and branch
question
            4. Studying while eating, along with listening to music while talking on the phone or handling email, are all instances of ________.   A. choice overload  B. surplus websurfing  C. multitasking  D. digital convergence
answer
        Multitasking
question
            5. The downside of personalization is people feel overburdened with too much choice, so that they are more likely to ________.   A. regret their decisions  B. be reluctant to make decisions  C. have excessive expectations about their decisions  D. All of these
answer
        All of these
question
            6. MP3 files are compressed, so that they are about ________ the size of uncompressed audio files.   A. one-tenth  B. one-quarter  C. one-third  D. one-half
answer
        One-tenth
question
            7. Digital music players utilize one or both of the following technologies: ________ and ________.   A. hard-disk drives; flash memory  B. Wi-Fi; Bluetooth  C. microwaves; infrared waves  D. None of these
answer
        Hard-disk drives, flash memory
question
            8. The quality of a song on a digital audio player is determined by its ________, the number of times a song is measured and converted to a digital value.   A. resolution  B. zoom rate  C. sampling rate  D. file transfer rate
answer
        sampling rate
question
            9. How many children and teens in the U.S. suffer from noise-induced hearing loss (in part caused by hours of listening to MP3 players)?   A. 33%  B. 24%  C. 12%  D. 5%
answer
        12%
question
            10. A form of radio in which broadcasters are able to squeeze two digital and one analog station on the same frequency is called ________ radio.   A. high-definition  B. internet  C. satellite  D. none of these
answer
        HD
question
            11. The biggest competitor to regular radio is ________.   A. satellite radio  B. internet radio  C. high-definition radio  D. none of these
answer
        Internet Radio
question
            12. A camera, either film or digital, that automatically adjusts settings such as exposure and focus is a ________ camera.   A. wide-angle  B. single-lens reflex  C. point-and-shoot  D. optical zoom
answer
        Point and shoot
question
            13. Another name for image sharpness is ________.   A. pixel setting  B. digital zoom  C. optical zoom  D. resolution
answer
        Resolution
question
            14. A digital camera's images are stored on ________.   A. mini-CDs  B. digital film  C. flash memory cards  D. All of these
answer
        flash memory cards
question
            15. The eye-level glass device on the camera that you look through and that shows the image to be photographed is called the ________.   A. LCD screen  B. image frame  C. optical viewfinder  D. none of these
answer
        optical viewfinder
question
            16. A portable device that stores personal organization tools, such as schedule planner, address book, and to-do list, along with other, more specialized software, is called a ________.   A. palmtop  B. handheld  C. personal digital assistant  D. All of these
answer
        All of these
question
            17. To transfer files from your PDA to your PC, you can do the following: ________.   A. Pull out your PDA's flash card and insert it into your computer's card reader.  B. Put your PDA in a special cradle plugged into a USB port.  C. Transfer data wirelessly if the PDA has built-in Wi-Fi or Bluetooth capability.  D. Any of these.
answer
        Any of these
question
            18. A tablet PC is a special notebook computer outfitted with a digitizer tablet and ________ that allows a user to handwrite text on the unit's screen.   A. lightpen  B. touchscreen  C. stylus  D. cursor
answer
        Stylus
question
            19. When most of us tune in our TV sets, we get a system of varying signal amplitude and frequency that represents picture and sound elements. This system is called ________.   A. interactive television  B. personalized television  C. internet television  D. analog television
answer
        Analog television
question
            20. ________ TV uses a digital signal, or series of 0s and 1s, and is much clearer than analog TV.   A. Digital  B. High-definition  C. Standard-definition  D. none of these
answer
        Digital
question
            21. ________ consists of a wide set of technologies that enable viewers to select videos or TV programs from a central server to watch when they want.   A. Video on demand  B. TiVo  C. Interactive TV  D. Personal TV
answer
        Video on demand
question
            22. ________ is a technology in which television and video signals are sent to viewers using internet protocols.   A. Internet TV  B. Internet Protocol TV  C. Interactive Protocol TV  D. Internet Personal TV
answer
        Internet Protocol TV
question
            23. The societal effects of the New TV technology are that it can change ________.   A. when you watch TV.  B. where you watch TV.  C. the nature of TV programs.  D. All of these.
answer
        All of these
question
            24. ________ is using a cellphone or PDA to send short messages to a pager, PDA, smartphone, or other handheld device.   A. Instant messaging  B. Internet messaging  C. Text messaging  D. Voice messaging
answer
        Text messaging
question
            25. Ringtones may be ________.   A. music tones  B. polyphonic  C. monophonic  D. any of these
answer
        Any of these
question
            26. An example of a videogame console is the ________.   A. Microsoft PlayStation 3  B. Sony Revolution  C. Nintendo Xbox 360  D. none of these
answer
        None of these
question
            1. A field is a unit of data consisting of a collection of ________.   A. characters  B. tables  C. records  D. files
answer
        Characters
question
            2. What is one byte of data also called?   A. character  B. field  C. record  D. file
answer
        Character
question
            3. Which of the following is NOT a level of the data storage hierarchy?   A. bit  B. byte  C. record  D. network
answer
        Network
question
            4. A record is a collection of related ________.   A. characters  B. tables  C. fields  D. files
answer
        Fields
question
            5. A file is a collection of related ________.   A. characters  B. tables  C. fields  D. records
answer
        Records
question
            6. What is a field that is chosen to uniquely identify a record called?   A. main field  B. super field  C. high field  D. key field
answer
        Key field
question
            7. Filename extensions, follow a period and may be up to ________ letters in length.   A. three  B. four  C. five  D. six
answer
        Three or four
question
            8. If a file contains software instructions, then it is a ________ file.   A. statistics  B. program  C. data  D. key
answer
        Program
question
            9. In a database management system, the ________ is a document or file that stores the data definitions and descriptions of the structure of data used in the database.   A. access security  B. data dictionary  C. report generator  D. DBMS utility
answer
        Data dictionary
question
            10. What are programs that help a database to be maintained, by creating, editing, and deleting data, records, and files?   A. access security  B. data dictionary  C. report generator  D. DBMS utilities
answer
        DBMS utilities
question
            11. Which of the following is a program that produces an on-screen or printed document from all or part of a database?   A. access security  B. data dictionary  C. report generator  D. DBMS utilities
answer
        Report generator
question
            12. The person who coordinates all activities and needs for an organization's database is the ________.   A. database administrator  B. database manager  C. database analyst  D. database master
answer
        database administrator
question
            13. Which of the following is NOT a task performed by the database administrator (DBA)?   A. Determining user access privileges.  B. Assisting in establishing priorities for requests.  C. Installing hardware.  D. Developing user documentation
answer
        Installing hardware
question
            14. Which type of database model arranges fields or records in related groups whereby each child record can have only one parent record?   A. hierarchical database  B. network database  C. distributed database  D. object-oriented database
answer
        Hierarchical database
question
            15. What is a parent record called in network database terminology?   A. guest  B. owner  C. member  D. resident
answer
        Owner
question
            16. What is a child record called in network database terminology?   A. guest  B. owner  C. member  D. resident
answer
        member
question
            17. Which type of database model is similar to a hierarchical database, but allows each child record to have more than one parent record?   A. hierarchical database  B. network database  C. distributed database  D. object-oriented database
answer
        network database
question
            18. Which type of database model connects data in different files through the use of a key field?   A. hierarchical database  B. network database  C. relational database  D. object-oriented database
answer
        relational database
question
            19. Which of the following is NOT an example of database terminology?   A. tuples  B. attributes  C. qualities  D. relations
answer
        qualities
question
            20. Which of the following clauses is NOT a component of structured query language (SQL)?   A. SELECT...FROM statement  B. WHERE clause  C. ORDER BY clause  D. WHEREBY clause
answer
        WHEREBY clause
question
            21. Which type of database uses software written in small, reusable chunks as elements within database files?   A. hierarchical database  B. network database  C. distributed database  D. object-oriented database
answer
        Object oriented database
question
            22. Which of the following is the computer-assisted process of sifting through and analyzing vast amounts of data to extract meaning and discover new knowledge?   A. data mining  B. e-commerce  C. data warehousing  D. business-to-business systems
answer
        data mining
question
            23. What is the process of removing errors and inconsistencies from data called?   A. data cleansing  B. data polishing  C. data buffing  D. data manipulation
answer
        data cleansing
question
            24. What describes contents of a data warehouse?   A. omega data  B. meta-data  C. data area  D. warehouse data
answer
        meta-data
question
            25. What is a special database of cleansed data called?   A. data warehouse  B. relational database  C. shared database  D. data area
answer
        data warehouse
question
            26. What data mining (DM) tool is used to catalog galaxies?   A. SKICAT  B. IDIS  C. GALAXOR  D. query-and-report
answer
        SKICAT
question
            27. The buying and selling of products and services via computer networks is called ________.   A. data mining  B. e-commerce  C. commerce  D. data warehousing
answer
        e-commerce
question
            28. What enables businesses to sell goods or services to other businesses using the internet or a private network?   A. DBMS  B. B2B  C. data mining  D. mirroring
answer
        B2B
question
            29. Which department of an organization makes products or provides services?   A. human resources  B. marketing & sales  C. production (operations)  D. research & development
answer
        production (operations)
question
            30. Which department of an organization recruits people?   A. human resources  B. marketing & sales  C. production (operations)  D. research & development
answer
        Human resources
question
            31. Which function of an organization oversees advertising, promotion, and sales?   A. human resources  B. marketing & sales  C. production (operations)  D. research & development
answer
        marketing & sales
question
            32. A schematic showing the hierarchy of formal relationships among an organization's employees is a(n) ________.   A. management chart  B. organization chart  C. management tree  D. relationship chart
answer
        organization chart
question
            33. The ________manager is concerned with long-range, or strategic planning and decisions.   A. operational  B. tactical  C. top  D. principal
answer
        top
question
            34. The ________ manager makes tactical decisions to implement the strategic goals of an organization.   A. operational  B. tactical  C. top  D. principal
answer
        tactical
question
            35. The ________ manager makes operational decisions by following a well-defined set of routine procedures.   A. operational  B. tactical  C. top  D. principal
answer
        operational
question
            36. Which of the following statements about managers is incorrect?   A. Top-level managers make strategic decisions.  B. Lower management makes operational decisions.  C. Operational managers make analytical decisions.  D. Middle-level managers make tactical decisions.
answer
        operational managers make analytical decisions
question
            37. In a business organization, a recorded event having to do with routine business activities is a ________.   A. model  B. transaction  C. operation  D. contract
answer
        transaction
question
            38. A system that combines various technologies such as voice mail, fax machines, and others in order to reduce the manual labor is a(n) ________ system.   A. transaction processing  B. office automation  C. decision support  D. executive support
answer
        Office automation
question
            39. A computer-based information system that keeps track of the transactions needed to conduct business is a(n) ________ system.   A. transaction processing  B. office automation  C. executive support  D. decision support
answer
        transaction processing
question
            40. A computer-based information system that uses data recorded by transaction processing system as input into programs that produce routine reports as output is a(n) ________ system.   A. office automation  B. executive support  C. management information  D. decision support
answer
        management information
question
            41. If you were in operational (lower) management, which type of computer-based information system would you use?   A. transaction processing system (TPS)  B. management information system (MIS)  C. decision support system (DSS)  D. executive support system (ESS)
answer
        transaction processing system
question
            42. A computer-based information system that provides a flexible tool for analysis and helps managers focus on the future is a(n) ________ system.   A. office automation  B. decision support  C. executive support  D. transaction processing
answer
        decision support
question
            43. An easy-to-use decision support system that specifically supports strategic decision-making is a(n) ________ system.   A. executive support  B. office automation  C. decision support  D. transaction processing
answer
        executive support
question
            44. If you were in top management, which type of computer-based information system would you use?   A. transaction processing system (TPS)  B. management information system (MIS)  C. executive support system (ESS)  D. decision support system (DSS)
answer
        executive support system
question
            45. A set of interactive computer programs that help users solve problems that would otherwise require the assistance of a human expert is a(n) ________ system.   A. expert  B. authority  C. professional  D. influence
answer
        Expert
question
            46. What is the software that controls the structure of a database and access to the data?   A. office suite  B. database management system  C. spreadsheet  D. database suite
answer
        database management system
question
            47. What program is used to screen out dangerous commercial airline passengers?   A. CAPPS II  B. TOI  C. report generator  D. MVS
answer
        CAPPS II
question
            48. The right of a person to avoid disclosure of his or her personal information is called ________.   A. secrecy  B. privacy  C. personality  D. rationality
answer
        Privacy
question
            49. The crime in which thieves hijack a person's name and identity to gain money or purchase goods is called ________.   A. theft of privacy  B. theft of identity  C. theft of rationality  D. theft of secrecy
answer
        Theft of identity
question
            1. Which of the following is a limitation when using databases for research?   A. accuracy  B. acquiring incomplete data  C. limited history  D. All of these
answer
        All of these
question
            2. Which of the following is NOT among the errors and accidents that may afflict computer systems?   A. human errors  B. electromechanical problems  C. procedural problems  D. disaster-recovery problems
answer
        Disaster-recovory problems
question
            3. Incomplete, outdated, or otherwise inaccurate data is known as ________ data.   A. bad  B. dirty  C. unsaved  D. recycled
answer
        dirty
question
            4. Electromechanical problems are examples of ________.   A. errors and accidents  B. crimes against computers  C. worms and viruses  D. connectivity failures
answer
        errors and accidents
question
            5. Dirty data is ________.   A. virus-infected data  B. worm-infected data  C. inaccurate, incomplete data  D. downloaded data
answer
        inaccurate, incomplete data
question
            6. Errors and accidents caused by NOT following procedures are known as ________ errors.   A. human  B. electromechanical  C. dirty data  D. procedural
answer
        procedural
question
            7. The 1999 crashing of the $125 million Mars Climate Orbiter is an example of what type of error or problem?   A. procedural error  B. software error  C. electromechanical error  D. "dirty data" error
answer
        procedural error
question
            8. Power failures is an example of ________.   A. electromechanical problems  B. human errors  C. procedural errors  D. software errors
answer
        electromechanical problems
question
            9. A computer crime is defined as ________.   A. an illegal act perpetuated against computers or telecommunications  B. the use of computers or telecommunications to accomplish an illegal act  C. both a and b  D. neither a nor b
answer
        both a and b
question
            10. Which of the following is NOT a function of the Computer Emergency Response Team (CERT)?   A. Counseling the party under attack.  B. Helping to thwart the intruder.  C. Evaluating the system afterwards against future break-ins.  D. Prosecuting those caught.
answer
        Prosecuting those caught
question
            11. "Dirty data" problems fall under the category of ________.   A. errors and accidents  B. natural hazards  C. Crimes against computers and communications  D. Crimes using computers and communications
answer
        errors and accidents
question
            12. File swapping as implemented by Kazaa is an example of ________ services.   A. internet  B. ISP  C. client/server  D. peer-to-peer
answer
        peer to peer
question
            13. File swapping provided by Napster is an example of ________ services.   A. client  B. server  C. client/server  D. peer-to-peer
answer
        client/server
question
            14. The Nigerian letter scam is an example of ________.   A. errors and accidents  B. theft of time and services  C. worms and viruses  D. internet-related fraud
answer
        internet-related fraud
question
            15. Sending emails that appear to come from a trusted source, which direct you to a website where you're asked to reveal personal information is called _________   A. email non-disclosure  B. credit-card or debit-card fraud  C. phishing  D. check fraud
answer
        phishing
question
            16. A variant on conventional phishing, in which a hacker or cracker sets up a Wi-Fi hotspot or access point that makes your computer think it's accessing a safe public network or your home network and then monitors your communications and steals data you enter into a website, is known as (an) ________.   A. Evil Twin attack  B. Wi-Fi phishing  C. both a and b  D. neither a nor b
answer
        both a and b
question
            17. When a computer is taken over covertly and programmed to respond to instructions sent remotely, often by instant-messaging channels, it is called a(n) ________.   A. botnet  B. zombie  C. Nigerian letter  D. cyberslave
answer
        zombie
question
            18. Which of the following is NOT a method in which a security system tries to authenticate a user's identity?   A. What you have-cards, keys, signatures, badges.  B. What you know-PINs, passwords, and digital signatures.  C. What you are-physical traits or biometrics.  D. What you need-request made verbally or manually.
answer
        what you need request made verbally or manually
question
            19. Which of the following is NOT a security procedure used by organizations to protect software and data?   A. audit controls  B. disaster-recovery plans  C. control of access to only those who need access  D. people controls such as screening job applicants
answer
        disaster recovery plan
question
            20. Which of the following is included in a disaster recovery plan?   A. public and private keys  B. a list of all business functions  C. access control  D. digital signatures
answer
        a list of all business functions
question
            21. Which of the following terms describes old, obsolete electronic gadgetry?   A. dirty data  B. e-dump  C. e-waste  D. junk
answer
        e-waste
question
            22. A blocking program for protecting children from online objectionable adult material is ________.   A. Cybersitter  B. Cyber Patrol  C. Net Nanny  D. All of these
answer
        All of these
question
            23. In morphing, a film or video image is displayed on a computer screen and altered pixel by pixel.   True False
answer
        True
question
            24. The five categories of errors and accidents that may affect computer systems are human errors, software errors, administrative errors, electromechanical problems, and dirty data problems.   True False
answer
        False
question
            25. A software bug can is an error in a program that causes it not to work properly.   True False
answer
        True
question
            26. Humans often are not good at assessing their own information needs.   True False
answer
        True
question
            27. The crash of the $125 million Mars Climate Orbiter in 1999 is an example of a software error.   True False
answer
        True
question
            28. When a combination of minor failures led to the explosion of the Challenger space shuttle in 1986, this was an example of an electromechanical problem.   True False
answer
        True
question
            29. A computer crime can be an illegal act perpetrated against computers/telecommunications or it can be the use of computers/telecommunications to accomplish an illegal act.   True False
answer
        True
question
            30. Illegal file swapping shifted from peer-to-peer services like Napster to client/server services like Kazaa, Grokster, and Limeware.   True False
answer
        False
question
            31. In the Nigerian letter scam, victims are given a chance to receive nonexistent government money as long as they pay a fee to help transfer the money to an overseas account.   True False
answer
        True
question
            32. In the Evil Twin attack, a network of computers is compromised by means of a Trojan horse that plants instructions within each PC to wait for commands from the personal controlling that network.   True False
answer
        False
question
            33. A zombie is the name given to a computer taken over covertly and programmed to respond to instructions sent remotely, often by instant-messaging channels.   True False
answer
        True
question
            34. Foreign intelligence services, even those belonging to countries friendly to the U.S., can be a threat to U.S. computer systems.   True False
answer
        True
question
            35. Programs used to monitor how much time workers spend on the web and to block employee access to gambling and pornography sites are known as employee internet management (EIM) software.   True False
answer
        True