MIS Final – Flashcard Test Answers
Flashcard maker : Marlon Riddle
question
What is the goal of Internet2?
a. Replace Internet1.
b. It is the same as Internet; it has no particular goal.
c. Develop and test advanced Internet technologies.
d. Ensure telemedicine, digital libraries, high-definition video, and Internet fraud detection
all can be available over the Internet.
a. Replace Internet1.
b. It is the same as Internet; it has no particular goal.
c. Develop and test advanced Internet technologies.
d. Ensure telemedicine, digital libraries, high-definition video, and Internet fraud detection
all can be available over the Internet.
answer
C
question
What are 2 main components on the motherboard
a. system unit, memory
c. processor, system unit
b. CPU, processor
d. memory, processor
a. system unit, memory
c. processor, system unit
b. CPU, processor
d. memory, processor
answer
D
question
A computer salesman refers to the shape and size of your new computer by a specific term. What term does he use?
a. resolution
c. form factor
b. aggregator
d. base index
a. resolution
c. form factor
b. aggregator
d. base index
answer
C
question
Which of the following best describes the term, cybercrime?
a. online or Internet-based illegal acts
b. any illegal act involving a computer
c. a type of gaming software that simulates criminal acts
d. using the Internet to apprehend and prosecute criminals
a. online or Internet-based illegal acts
b. any illegal act involving a computer
c. a type of gaming software that simulates criminal acts
d. using the Internet to apprehend and prosecute criminals
answer
A
question
If your instructor advises you to use the keys at the top of your keyboard that are identified by the letter F and then a number to perform certain activities, what kind of keys is she advising you to use?
a. facilitating keys
c. feature keys
b. function keys
d. finger keys
a. facilitating keys
c. feature keys
b. function keys
d. finger keys
answer
B
question
Which storage term used to measure capacity is approximately a billion bytes?
a. megabyte
b. kilobyte
c. gigabyte
d. terabyte
a. megabyte
b. kilobyte
c. gigabyte
d. terabyte
answer
B
question
What is another term for the operating system a computer uses?
a. system utility
b. platform
c. file manager
d. application
a. system utility
b. platform
c. file manager
d. application
answer
C
question
What is a receiving device?
a. a device that initiates an instruction to transmit data, instructions, or information
b. a device that connects to a communications channel
c. a device on which data, instructions, and information travel
d. a device that accepts the transmission of data, instructions, or information
a. a device that initiates an instruction to transmit data, instructions, or information
b. a device that connects to a communications channel
c. a device on which data, instructions, and information travel
d. a device that accepts the transmission of data, instructions, or information
answer
D
question
What does the hibernate mode option do?
a. saves any open documents and programs to RAM, turns off all unneeded functions, and
then places the computer or device in a low-power state
b. shuts down the operating system so it cannot be accessed without a password
c. starts the screen saver and keeps programs and files open and ready to be accessed with
the touch of a button
d. saves any open documents and programs to a hard drive before removing power from the
computer or device
a. saves any open documents and programs to RAM, turns off all unneeded functions, and
then places the computer or device in a low-power state
b. shuts down the operating system so it cannot be accessed without a password
c. starts the screen saver and keeps programs and files open and ready to be accessed with
the touch of a button
d. saves any open documents and programs to a hard drive before removing power from the
computer or device
answer
D
question
What does the booting process do?
a. starts the computer in safe mode
b. sends the computer to idle mode
c. shuts down the computer
d. starts or restarts the computer
a. starts the computer in safe mode
b. sends the computer to idle mode
c. shuts down the computer
d. starts or restarts the computer
answer
D
question
Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer?
a. a virus
b. a Trojan horse
c. a worm
d. a rootkit
a. a virus
b. a Trojan horse
c. a worm
d. a rootkit
answer
D
question
The term firewall is _____________.
a. the access point a hacker uses to intrude on a computer or network
b. a program that searches for cybercriminals by looking for patterns in attacks
c. hardware and/or software that protects a network’s resources from intrusion
d. a virus that prevents the computer or network from accessing outside resources
a. the access point a hacker uses to intrude on a computer or network
b. a program that searches for cybercriminals by looking for patterns in attacks
c. hardware and/or software that protects a network’s resources from intrusion
d. a virus that prevents the computer or network from accessing outside resources
answer
C
question
What is unique about a multi-core processor?
a. It is a single chip with two or more separate processor cores.
b. It is a single processor with two or more separate chips.
c. It contains multiple control elements that, when working together, can increase the data
processed over the Internet.
d. It uses core memory to enhance the processing speed of processors.
a. It is a single chip with two or more separate processor cores.
b. It is a single processor with two or more separate chips.
c. It contains multiple control elements that, when working together, can increase the data
processed over the Internet.
d. It uses core memory to enhance the processing speed of processors.
answer
A
question
If your friend is enjoying a cup of coffee in a trendy coffee shop and at the same time is surfing the web, which of the following is she using?
a. FFT
b. SIS
c. a hotspot
d. Fixed Limited Online Access Transport (FLOAT)
a. FFT
b. SIS
c. a hotspot
d. Fixed Limited Online Access Transport (FLOAT)
answer
C
question
What causes a head crash on a hard disk?
a. A platter skips a revolution.
b. The motor that spins the platters causes a short circuit in the read/write head.
c. A read/write head touches the surface of a platter.
d. The head actuator positions the read/write head arms over the incorrect location.
a. A platter skips a revolution.
b. The motor that spins the platters causes a short circuit in the read/write head.
c. A read/write head touches the surface of a platter.
d. The head actuator positions the read/write head arms over the incorrect location.
answer
C
question
What is product activation?
a. a technique to ensure software is not installed on more computers than legally licensed
b. the method used by some software companies to guarantee that software purchased on the
web will work on the computer on which the software was downloaded
c. the process of entering registration information so that users of the software will receive
newsletters and other marketing materials regarding purchased software
d. a term used to describe starting application software purchased in a retail store
a. a technique to ensure software is not installed on more computers than legally licensed
b. the method used by some software companies to guarantee that software purchased on the
web will work on the computer on which the software was downloaded
c. the process of entering registration information so that users of the software will receive
newsletters and other marketing materials regarding purchased software
d. a term used to describe starting application software purchased in a retail store
answer
A
question
The term CAPTCHA is _____________.
a. a private combination of words associated with a user name that allows access to
computer resources
b. the average time it takes a computer to discover a password based on the number of
characters
c. a digital image used to help decipher a faded or blurry word in digitized news archives
d. a series of distorted characters that a user is required to enter correctly to continue using a
website
a. a private combination of words associated with a user name that allows access to
computer resources
b. the average time it takes a computer to discover a password based on the number of
characters
c. a digital image used to help decipher a faded or blurry word in digitized news archives
d. a series of distorted characters that a user is required to enter correctly to continue using a
website
answer
D
question
The term, PIN, is an acronym for which of the following?
a. personal identification number
b. private Internet notification
c. possessed information number
d. personal information network
a. personal identification number
b. private Internet notification
c. possessed information number
d. personal information network
answer
A
question
If a computer advertisement states a computer operates at 5 GHz, what does this mean?
a. The computer contains 5 GHz of RAM.
b. The CPU in the computer is an Intel processor.
c. The system clock has a clock speed of five billion clock cycles per second.
d. It guarantees the computer runs faster than one that operates at 4 GHz.
a. The computer contains 5 GHz of RAM.
b. The CPU in the computer is an Intel processor.
c. The system clock has a clock speed of five billion clock cycles per second.
d. It guarantees the computer runs faster than one that operates at 4 GHz.
answer
C
question
What is virtual memory?
a. data stored in the cloud
b. where instructions are stored while waiting for a device to become idle
c. a portion of the hard disk designated to function as additional RAM
d. data that is not stored when the computer is turned off
a. data stored in the cloud
b. where instructions are stored while waiting for a device to become idle
c. a portion of the hard disk designated to function as additional RAM
d. data that is not stored when the computer is turned off
answer
C
question
Which of the following is not considered a part of file maintenance?
a. adding a record to a database
b. modifying data in a record
c. the creation of a new database
d. deleting records from a database
a. adding a record to a database
b. modifying data in a record
c. the creation of a new database
d. deleting records from a database
answer
C
question
When a document contains text displayed in 10-point Cambria, to what does the 10-point refer?
a. the font style
b. the number of characters that can fit in one linear inch of text
c. the number of colors in which a character can be displayed
d. the font size
a. the font style
b. the number of characters that can fit in one linear inch of text
c. the number of colors in which a character can be displayed
d. the font size
answer
D
question
An engineer who needs to manage new product development might use what type of software?
a. project management software
b. engineering management software
c. product development management software
d. process management software
a. project management software
b. engineering management software
c. product development management software
d. process management software
answer
A
question
If your friend recently has participated in e-filing, what has she been doing?
a. using database software to electronically file all her records
b. creating a file-based system that allows her to produce a transcript and resume and then send them to potential employers online
c. accumulating digital graphics and photographs for online display
d. filing her state and/or federal tax returns online
a. using database software to electronically file all her records
b. creating a file-based system that allows her to produce a transcript and resume and then send them to potential employers online
c. accumulating digital graphics and photographs for online display
d. filing her state and/or federal tax returns online
answer
D
question
What is an EULA intended to do?
a. license software for individual use
b. outline computer activities for which the computer and network may or may not be used
c. contract with an outside organization to provide security and recovery services for a
network
d. establish a network of computers, such as a homegroup
a. license software for individual use
b. outline computer activities for which the computer and network may or may not be used
c. contract with an outside organization to provide security and recovery services for a
network
d. establish a network of computers, such as a homegroup
answer
A
question
What is the purpose of an Internet Protocol address (IP address)?
a. It specifies whether a computer is using a broadband network or a direct-dial network.
b. It differentiates between a server computer and a client computer and contains codes to identify whether the computer can send data or receive data.
c. It contains the protocol schema used to identify whether the computer is on a wired or wireless network.
d. It uniquely identifies the location of each computer or device connected to the Internet.
a. It specifies whether a computer is using a broadband network or a direct-dial network.
b. It differentiates between a server computer and a client computer and contains codes to identify whether the computer can send data or receive data.
c. It contains the protocol schema used to identify whether the computer is on a wired or wireless network.
d. It uniquely identifies the location of each computer or device connected to the Internet.
answer
D
question
A DNS server is able to identify which of the following?
a. every computer or device connected to the Internet
b. an IP address based on a domain name
c. the TLD for a given company
d. the browser being used by a mobile device
a. every computer or device connected to the Internet
b. an IP address based on a domain name
c. the TLD for a given company
d. the browser being used by a mobile device
answer
B
question
If your cousin wanted to view information from the World Wide Web, what application software would you tell her to be sure she has on her computer?
a. browser
b. Word processor
c. DNS server support system
d. ISP interface resolution and handshake configuration controller
a. browser
b. Word processor
c. DNS server support system
d. ISP interface resolution and handshake configuration controller
answer
A
question
Which of the following statements best describes the Ethernet network standard?
a. no central computer or device on the network should control when data can be transmitted
b. describes rules for dividing messages into small pieces, called packets
c. computers and devices on the network share or pass a special signal in a unidirectional manner and in a preset order
d. computers on a network cannot communicate unless they share the same form of translation
a. no central computer or device on the network should control when data can be transmitted
b. describes rules for dividing messages into small pieces, called packets
c. computers and devices on the network share or pass a special signal in a unidirectional manner and in a preset order
d. computers on a network cannot communicate unless they share the same form of translation
answer
A
question
Which statement best describes how the RFID standard works?
a. The network uses radio signals to communicate with a tag placed in or attached to an object, animal, or person.
b. Two connected network devices use infrared light to create a direct frequency.
c. A node on a network must have an individual ID code that can communicate with other ready devices.
d. The network uses reference devices instead of actual devices to speed up the transmission process.
a. The network uses radio signals to communicate with a tag placed in or attached to an object, animal, or person.
b. Two connected network devices use infrared light to create a direct frequency.
c. A node on a network must have an individual ID code that can communicate with other ready devices.
d. The network uses reference devices instead of actual devices to speed up the transmission process.
answer
A
question
While working with a database, you encounter a wizard. What best describes the purpose of a wizard?
a. guides you through the steps of creating a database object
b. the database creator and administrator
c. a screen in which you enter or modify data
d. the instructions that control how the data in the database is connected
a. guides you through the steps of creating a database object
b. the database creator and administrator
c. a screen in which you enter or modify data
d. the instructions that control how the data in the database is connected
answer
A
question
Which of the following may need to happen before your Bluetooth headset can communicate with your smartphone?
a. They might need to be coupled.
b. They might need to be adapted.
c. They might need to be synced.
d. They might need to be paired
a. They might need to be coupled.
b. They might need to be adapted.
c. They might need to be synced.
d. They might need to be paired
answer
D
question
What does a disk cleanup utility do?
a. organizes files into consecutive sectors
b. creates an index of files on the disk
c. searches for and removes unnecessary files
d. provides file management capabilities
a. organizes files into consecutive sectors
b. creates an index of files on the disk
c. searches for and removes unnecessary files
d. provides file management capabilities
answer
C
question
Why is a fragmented disk slower than one that is defragmented?
a. A fragmented disk contains temporary Internet files and unused program files that need to be deleted.
b. A fragmented disk contains programs that were deleted using Windows Explorer.
c. A fragmented disk has many files stored in noncontiguous sectors.
d. A fragmented disk has no index.
a. A fragmented disk contains temporary Internet files and unused program files that need to be deleted.
b. A fragmented disk contains programs that were deleted using Windows Explorer.
c. A fragmented disk has many files stored in noncontiguous sectors.
d. A fragmented disk has no index.
answer
C
question
What was the original purpose of a screen saver?
a. to prevent images from being permanently etched on a monitor’s screen
b. to protect a computer by requiring a password to deactivate it
c. to prevent access by hackers and avoid viruses
d. to save energy by reducing the monitor activity
a. to prevent images from being permanently etched on a monitor’s screen
b. to protect a computer by requiring a password to deactivate it
c. to prevent access by hackers and avoid viruses
d. to save energy by reducing the monitor activity
answer
A
question
Which of the following best describes e-commerce?
a. a customer (consumer) experience requiring the Internet, cash, a shopping cart, and videos
b. a business transaction that occurs over an electronic network such as the Internet
c. the sale of electronic goods and services that enable an Internet connection
d. a transaction between two businesses that are bartering and auctioning goods and services via secure telephonic connections
a. a customer (consumer) experience requiring the Internet, cash, a shopping cart, and videos
b. a business transaction that occurs over an electronic network such as the Internet
c. the sale of electronic goods and services that enable an Internet connection
d. a transaction between two businesses that are bartering and auctioning goods and services via secure telephonic connections
answer
B
question
What are two elements found in an email address?
a. user name and domain name
b. address book and user name
c. @ symbol and dot com name
d. domain name and POP3
a. user name and domain name
b. address book and user name
c. @ symbol and dot com name
d. domain name and POP3
answer
A
question
YOU RECEIVE AN EMAIL MESSAGE IN ALL CAPITAL LETTERS, WHAT DOES THIS SIGNIFY?
a. THE EMAIL IS IMPORTANT.
b. THE EMAIL WAS SENT FROM A GOVERNMENT AGENCY.
c. THE PERSON WHO WROTE THE EMAIL WAS SHOUTING AT YOU.
d. THE CAPSLOCK KEY ON YOUR KEYBOARD IS MALFUNCTIONING.
a. THE EMAIL IS IMPORTANT.
b. THE EMAIL WAS SENT FROM A GOVERNMENT AGENCY.
c. THE PERSON WHO WROTE THE EMAIL WAS SHOUTING AT YOU.
d. THE CAPSLOCK KEY ON YOUR KEYBOARD IS MALFUNCTIONING.
answer
C
question
Which of the following is NOT true of a Wi-Fi network?
a. Many home users set them up.
b. A Wi-Fi’s Internet service can be dial-up access.
c. Wi-Fi networks send signals to a communications device that is connected to a high-speed Internet service.
d. Many public locations are Wi-FI hot spots.
a. Many home users set them up.
b. A Wi-Fi’s Internet service can be dial-up access.
c. Wi-Fi networks send signals to a communications device that is connected to a high-speed Internet service.
d. Many public locations are Wi-FI hot spots.
answer
B
question
Which of the following is a request for specific data from a database?
a. query
b. formula
c. resample
d. function
a. query
b. formula
c. resample
d. function
answer
A
question
What separates the components of a domain name?
a. spaces
b. apostrophes
c. commas
d. periods
a. spaces
b. apostrophes
c. commas
d. periods
answer
D
question
Which of the following is NOT a wireless Internet connection?
a. Wi-Fi
b. DSL
c. mobile broadband
d. satellite
a. Wi-Fi
b. DSL
c. mobile broadband
d. satellite
answer
B
question
Which of the following kinds of computing refers to an environment of servers that house and provide access to resources users access through the Internet?
a. disperse b. cloud c. digital d. liberated
a. disperse b. cloud c. digital d. liberated
answer
B
question
Which of the following is a network standard that specifies no central computer or device on the network should control when data can be transmitted?
a. Ethernet b. Telnet c. IEEE d. Gopher
a. Ethernet b. Telnet c. IEEE d. Gopher
answer
A
question
Which of the following is the data transfer rate equivalent to one million bits per second?
a. Mbps b. Tbps c. Pbps d. Gbps
a. Mbps b. Tbps c. Pbps d. Gbps
answer
A
question
Which of the following cameras is a high-end digital camera that has interchangeable lenses and uses a mirror to display on its screen an exact replica of the image to be photographed?
a. MMS b. convertible c. point-and-shoot d. SLR
a. MMS b. convertible c. point-and-shoot d. SLR
answer
D
question
What is the definition of a website?
a. a collection of related webpages
b. the location from which a webpage originates
c. the source of a webpage
d. an author of a webpage
a. a collection of related webpages
b. the location from which a webpage originates
c. the source of a webpage
d. an author of a webpage
answer
A
question
Which of the following is a request for specific data from a database?
a. query b. index c. ask d. inquiry
a. query b. index c. ask d. inquiry
answer
A
question
Which of the following, with regard to the entire database, should be made on a regular basis?
a. backup b. baseline c. after image d. retread
a. backup b. baseline c. after image d. retread
answer
A
question
Which browser is included with the Mac OS?
a. Firefox b. Chrome c. Internet Explorer d. Safari
a. Firefox b. Chrome c. Internet Explorer d. Safari
answer
D
question
Which of the following is not a determinant of the category in which a computer best fits?
a. resolution c. price b. speed d. processing power
a. resolution c. price b. speed d. processing power
answer
A
question
Which of the following is true in a relational database?
a. Each row and each column has a primary key.
b. Each row has a unique name and each column has a primary key.
c. Each row has a primary key and each column has a unique name.
d. Each row and each column has a unique name.
a. Each row and each column has a primary key.
b. Each row has a unique name and each column has a primary key.
c. Each row has a primary key and each column has a unique name.
d. Each row and each column has a unique name.
answer
C
question
Which of the following is a type of optical disc that users can read from but not write to or erase?
a. CD-R b. CD-RW c. DVD-ROM d. DVD-RW
a. CD-R b. CD-RW c. DVD-ROM d. DVD-RW
answer
C
question
Which of the following is NOT an example of malware?
a. adware b. vaporware c. rootkits d. zombies
a. adware b. vaporware c. rootkits d. zombies
answer
B
question
Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user’s personal and financial information?
a. spam b. spit c. phishing d. spyware
a. spam b. spit c. phishing d. spyware
answer
C
question
Which of the following kinds of file utilities shrink the size of a file(s)?
a. unit b. file compression c. matrix d. conversion
a. unit b. file compression c. matrix d. conversion
answer
B
question
Which of the following is a disadvantage of an all-in-one printer?
a. it requires more space than having a separate printer, scanner, copy machine, and fax machine
b. it is significantly more expensive than purchasing a printer, scanner, copy machine, and fax machine separately
c. if the device breaks down, users lose all four functions
d. all of the above
a. it requires more space than having a separate printer, scanner, copy machine, and fax machine
b. it is significantly more expensive than purchasing a printer, scanner, copy machine, and fax machine separately
c. if the device breaks down, users lose all four functions
d. all of the above
answer
C
question
Which of the following is a program that extends the capability of a browser?
a. player b. plug-in c. rebrowser d. publisher
a. player b. plug-in c. rebrowser d. publisher
answer
B
question
The amount of data, instructions, and information that can travel over a communications channel sometimes is called which of the following?
a. broadband b. latency c. baseband d. bandwidth
a. broadband b. latency c. baseband d. bandwidth
answer
D
question
Which of the following kinds of cable consists of a single copper wire surrounded by at least three layers: an
insulating material, a woven or braided metal, and a plastic outer coating?
a. coaxial b. integrated c. twisted-pair d. fiber-optic
insulating material, a woven or braided metal, and a plastic outer coating?
a. coaxial b. integrated c. twisted-pair d. fiber-optic
answer
A
question
For best performance of a communications channel, which of the following should be true?
a. bandwidth and latency should be low
b. bandwidth should be low and latency high
c. bandwidth should be high and latency low
d. bandwidth and latency should be high
a. bandwidth and latency should be low
b. bandwidth should be low and latency high
c. bandwidth should be high and latency low
d. bandwidth and latency should be high
answer
C
question
Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?
a. restored file b. bot c. IP file d. backup
a. restored file b. bot c. IP file d. backup
answer
D
question
What is the general term for programs that act without a user’s knowledge and deliberately alter the computer’s operations?
a. malware b. cybersoft c. evilapp d. viralware
a. malware b. cybersoft c. evilapp d. viralware
answer
A