Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CIS 105 Final Exam/ CIS 105 Final Exam Study Guide Updated 2023-2024 Latest Version, Exams of Software Engineering

CIS 105 Final Exam/ CIS 105 Final Exam Study Guide Updated 2023-2024 Latest Version

Typology: Exams

2022/2023

Available from 08/05/2023

john-wachira
john-wachira 🇺🇸

3.6

(38)

530 documents

1 / 14

Toggle sidebar

Related documents


Partial preview of the text

Download CIS 105 Final Exam/ CIS 105 Final Exam Study Guide Updated 2023-2024 Latest Version and more Exams Software Engineering in PDF only on Docsity! CIS 105 Final Exam/ CIS 105 Final Exam Study Guide Updated 2023-2024 Latest Version With these systems, input and output devices are located outside of the system unit ----- ----- Correct Answer ---------- Desktop systems This type of computer is a thin slab that is almost all monitor with the system unit located behind the monitor ---------- Correct Answer ---------- Tablet The processing speed of a microprocessor is typically represented by its ---------- Correct Answer ---------- Clock speed Which of the following allows a computer to run two or more operations simultaneously - --------- Correct Answer ---------- Multicore chip For multiple processors to be used effectively, computers must understand how to divide tasks in two parts that can be distributed across each core-an operation called --- ------- Correct Answer ---------- Parallel processing A type of specialty processor devoted exclusively to protecting your privacy ---------- Correct Answer ---------- Cryptoprocessor Frequently accessed information is held in ---------- Correct Answer ---------- Cache memory _____ is any data or instructions that are used by a computer ---------- Correct Answer -- -------- Input The arrangement of keys on a keyboard, QWERTY reflects the keyboard layout by ------ ---- Correct Answer ---------- Taking the letters of the first six alphabetical characters found on the top row of keys Keyboards that are widely used on various smartphones and other small portable devices, and which are designed primarily for communicating via texting and connection to the web ---------- Correct Answer ---------- Thumb The type of keyboard that uses a touch screen as the input device ---------- Correct Answer ---------- Virtual A keyboard key, like caps lock, that turns a feature on or off is called a_______key ------ ---- Correct Answer ---------- Toggle This type of mouse emits and senses light to detect Mouse movement ---------- Correct Answer ---------- Optical The study of human factors related to the things people use ---------- Correct Answer ---- ------ Ergonomics These screens can be touched with more than one finger, which allows for interactions such as rotating graphical objects on the screen with your hand or zooming in and out by pinching and stretching your fingers ---------- Correct Answer ---------- Multi-touch Which of the following is not a type of scanning device ---------- Correct Answer ---------- Stylus Barcode readers use______ embedded in them to read bar codes ---------- Correct Answer ---------- Photoelectric cells This reading devices used in Banks to read the numbers on the bottom of checks and deposit slips ---------- Correct Answer ---------- Micr Which of the following types of character recognition systems is used for standardized multiple-choice testing ---------- Correct Answer ---------- Omr Omr, Oceano, and micr are all types of ---------- Correct Answer ---------- Character end mark recognition devices ______-input devices convert sounds into a form that can be processed by the system unit ---------- Correct Answer ---------- Audio The most widely used audio input device is ---------- Correct Answer ---------- Microphone These special processors are designed to improve specific computing operations such as this plane 3D images and encrypting data ---------- Correct Answer ---------- Co- processors The series of dots that form the image on a monitor are called ---------- Correct Answer - --------- Pixels This indicates the monitors ability to display Colors by comparing the light intensity of the brightest white to The Darkest black ---------- Correct Answer ---------- Contrast ratio The distance between each pixel ---------- Correct Answer ---------- Dot pitch The size, or_________, is measured by the diagonal length of the monitors viewing area ---------- Correct Answer ---------- Active display area The proportional relationship between a display's width and height ---------- Correct Answer ---------- Aspect ratio In the URL " http://www.simnetonline.com", ".com" is the ---------- Correct Answer --------- - Top-level domain (TLD) Which programming language is used within HTML documents to trigger interactive features ---------- Correct Answer ---------- JavaScript Which of the following are files inserted into an HTML document that control the appearance of web pages including layout, colors, and fonts ---------- Correct Answer ---- ------ CSS This type of email account is more widely used because it frees so user from installing and maintaining an email client on every computer used to access email ---------- Correct Answer ---------- Web-based This social networking site as he used for professional, business-oriented networking --- ------- Correct Answer ---------- LinkedIn Twitter is an example of what type of site ---------- Correct Answer ---------- Microblog _______ typically broadcast live events and use streaming technology in which audio and video files are continuously downloaded to your computer while you are listening to and/or viewing the content ---------- Correct Answer ---------- Webcasts ________ do not use streaming technology and are used to download media files to your computer ---------- Correct Answer ---------- Podcast Which of the following is a website specially designed to allow visitors to use their browser to add, and it, or delete the site's content ---------- Correct Answer ---------- Wiki These special programs continually look for new information and update the bad databases used by search devices ---------- Correct Answer ---------- Spiders When you enter a keyword or phrase into a search engine the results display as a list of these ---------- Correct Answer ---------- Hits This type of software words with end users, application software, and computer hardware to handle the majority of technical details ---------- Correct Answer ---------- System This type of software can be described as end-user software and is used to accomplish a variety of tasks ---------- Correct Answer ---------- Application _________ provide additional information and request to user input ---------- Correct Answer ---------- Dialog boxes Most applications use a(n) _____ that displays graphical elements call icons to represent familiar objects ---------- Correct Answer ---------- Graphical user interface General purpose applications include all the following except ---------- Correct Answer --- ------- Web authoring The GUI includes tabs, groups and galleries ---------- Correct Answer ---------- Ribbon Please organize commonly used commands into a set of tabs ---------- Correct Answer -- -------- Ribbons To create documents that consists primarily of text, you need the software ---------- Correct Answer ---------- Word processor Which would be the most appropriate type of application to create, analyze and forecast budgets ---------- Correct Answer ---------- Spreadsheet The electronic equivalent of a file cabinet is a ---------- Correct Answer ---------- Database A byte is formed by a group of ---------- Correct Answer ---------- 8bits Which of the following is not a character encoding standard ---------- Correct Answer ----- ----- Cisc The character encoding scheme allows non-english characters and special characters to be represented ---------- Correct Answer ---------- Unicode The system board is also known as the ---------- Correct Answer ---------- Motherboard On the motherboard, the connection points for chips are referred to as ---------- Correct Answer ---------- Sockets Tiny circuit boards H-Town two squares of sand like material, called silicon, are called -- -------- Correct Answer ---------- Chips Integrated circuits must be on_______, which are then plugged into the motherboard --- ------- Correct Answer ---------- Chip carriers Which of the following is a function of the control unit ---------- Correct Answer ---------- It directs the movement of electronic signals between memory and arithmetic logic unit Pathways that support communication among the various electronic components on the system board are called ---------- Correct Answer ---------- Bus lines In most personal computer systems, the CPU is contained on a single chip called the --- ------- Correct Answer ---------- Microprocessor Term used to describe the number of states that a CPU can access at one time ---------- Correct Answer ---------- Word A 32-bit word computer can access ---------- Correct Answer ---------- 4 bytes at a time Hottest store and organize files using all the following, except ---------- Correct Answer -- -------- Paths Which of the following is true about an internal hard disk ---------- Correct Answer --------- - Fixed amount of storage On a hard disk each track is divided into invisible wedge-shape sections called ---------- Correct Answer ---------- Sectors The hard disk's disk surface is scratched and some or all of the data is destroyed when there is a ---------- Correct Answer ---------- Head crash Which of the following is not an example of secondary storage ---------- Correct Answer - --------- Ram An external hard disk ---------- Correct Answer ---------- Usually connects to a USB or Thunderbolt port Storage that retains its data after the power is turned off is referred to as ---------- Correct Answer ---------- Non-volatile storage The process of accessing information from secondary storage devices is referred to as - --------- Correct Answer ---------- Reading The _______ of a secondary storage device indicates how much data the storage medium can hold ---------- Correct Answer ---------- Capacity Which of the following measures the amount of time required by the storage device to retrieve data and programs ---------- Correct Answer ---------- Access speed One of the most dramatic changes in connectivity & Communications in the past two years has been ---------- Correct Answer ---------- Widespread use of mobile devices with wireless internet connectivity In communication system, which among the following originate and accept messages in the form of data, information, and/or instructions ---------- Correct Answer ---------- Sending and receiving devices Programs used to secretly record an individual's activities on the internet are called ------ ---- Correct Answer ---------- Spyware which type of program would likely be used by investigators to prove Court a potential suspects' internet activities ---------- Correct Answer ---------- Keystroke logger This type of computer criminal creates and distributes malicious programs ---------- Correct Answer ---------- Cracker Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk ---------- Correct Answer ---------- Privacy mode Which of the following is not a malware ---------- Correct Answer ---------- Ad-aware A program that replicates itself and clogs computers and networks ---------- Correct Answer ---------- Worm Free computer games and free screensaver programs are typically carriers of ---------- Correct Answer ---------- TrojanHorses Which among of the following is a way to shut down an ISP or website ---------- Correct Answer ---------- Denial-of-service attack Which among the following is a fraudulent or deceptive Act designed to trick individuals on the internet spending time or money for little or no return ---------- Correct Answer ---- ------ Internet scam The use of the internet, cell phones, or other devices to send a post content intended to hurt or embarrass another person ---------- Correct Answer ---------- Cyber bullying The most significant concerns for implementation of computer technology involve_______, security, and ethics ---------- Correct Answer ---------- Privacy According to which law is it illegal for an owner of a program to make backup copies for their personal use and resell or give them away ---------- Correct Answer ---------- Digital Millennium Copyright Act Corporations often use this to prevent copyright violations ---------- Correct Answer ------- --- Digital Rights Management (DRM) This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account ---------- Correct Answer ---------- Dictionary attack This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords ---------- Correct Answer ---------- Rogue the process of getting information to make it unreadable except for those who have a special piece of information known as a key ---------- Correct Answer ---------- Encryption A(n)________ acts as a security buffer between a corporation's private Network and all external Networks ---------- Correct Answer ---------- Firewall Which of the following is the most widely used wireless network encription for Home wireless Networks ---------- Correct Answer ---------- WPA2 which of the following is not a measure to protect computer security ---------- Correct Answer ---------- Keeping the same password on all systems consistently _______ is concerned with protecting software and data from unauthorized tampering or damage ---------- Correct Answer ---------- Data security Pricing, promoting, selling, and distributing the organization's goods and Services pertains to which of the following functions ---------- Correct Answer ---------- Marketing Creating finished goods and services using raw materials and personnel pertains to which of the following functions ---------- Correct Answer ---------- Production who is responsible for operational matters and monitoring day to day events ---------- Correct Answer ---------- Supervisors __________ systems help supervisors by generating databases then act as the foundation for other information systems ---------- Correct Answer ---------- Transaction processing Which of the following refers to a system that summarizes detailed data from the transaction processing systems in standard reports for middle level managers ---------- Correct Answer ---------- Management information system (Mis) Who uses management information systems ---------- Correct Answer ---------- Middle level managers This level of management is concerned with long-range planning and uses information that will help them plan the future growth and direction of the organization ---------- Correct Answer ---------- Top management This level of management is involved with tactical planning and implementing two long- term goals within an organization ---------- Correct Answer ---------- Middle management Which system percent information in a highly summarize form ---------- Correct Answer - --------- Executive support system (ESS) A transaction processing system is also referred to as a ---------- Correct Answer ---------- Data processing system The_____ activity records the customer requests for products or services ---------- Correct Answer ---------- Sales order processing Money collected from or owed by customers is called ---------- Correct Answer ---------- Accounts receivable The _______ keeps records of the number of each kind of part or finished good in the warehouse ---------- Correct Answer ---------- Inventory control system what documentation shows the difference between the income and expenses of the company for a specific time period ---------- Correct Answer ---------- Income statements This records asset, liability, and the Equity owned by the owners of an organization ------ ---- Correct Answer ---------- Balance sheet regional managers can compare their regular sales reports with that of other regional managers by using ---------- Correct Answer ---------- Periodic reports An example of this type of report would be a sales report that shows that certain items are selling significantly above or below forecast ---------- Correct Answer ---------- Exception this system is a flexible tool for data analysis since its reports do not have a fixed --------- - Correct Answer ---------- Decision support system In a GDSS, The ________ is generally the decision maker ---------- Correct Answer ------ ---- Group This typically consists of transactions from the transaction processing system ---------- Correct Answer ---------- Internal data This decision model helps middle level managers control the work of the organization such as Financial Planning and sales promotion planning ---------- Correct Answer -------- -- Tactical model These systems can be organized to retrieve information from database outside the company, such as business news services ---------- Correct Answer ---------- Executive support systems ESS these systems are used in managing documents, communicating, and scheduling -------- -- Correct Answer ---------- Office automation systems
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved