Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Computer Science: Types of Software, Hardware, and Networks, Exams of Advanced Education

A comprehensive overview of various types of software, hardware, and networks in a computer system. It covers topics such as system software, utilities, servers, personal computers, handheld computers, microcomputers, ram, secondary storage, system unit, microprocessor, memory, programming languages, web-based email, social networking sites, wikis, graphical user interfaces, general purpose applications, word processors, spreadsheets, databases, desktop systems, tablets, character encoding, audio input devices, co-processors, tcp/ip, network gateways, hotspots, network topologies, extranets, proxies, vpns, mesh networks, information resellers, transaction processing systems, management information systems, and executive support systems.

Typology: Exams

2023/2024

Available from 05/23/2024

professoraxel
professoraxel 🇰🇪

4.2

(11)

2.1K documents

1 / 32

Toggle sidebar

Related documents


Partial preview of the text

Download Computer Science: Types of Software, Hardware, and Networks and more Exams Advanced Education in PDF only on Docsity! CIS 105 FINAL EXAM QUESTIONS WITH 100% CORRECT ANSWERS 2024 Which part of an information system consists of the rules or guidelines for people to follow - Correct Answer-Procedures The equipment that processes data in order to create information is called the - Correct Answer-Hardware In most cases the word software is interchangeable with the word - Correct Answer-Program What are the two major softwareTypes - Correct Answer- System software and application software Which of the following is a collection of programs rather than a single program - Correct Answer-System software Background software that helps the computer manage resources is called - Correct Answer-System software Identify the program that coordinates Computer Resources, provides an interface between users and the computer, and runs applications - Correct Answer-Operating system Antivirus programs protect your computer system from viruses or malicious programs. This is an example of which type of software - Correct Answer-Utilities System software includes all of the following except - Correct Answer-Browser Which of the following computers is also referred to as a server and is used to support end users for things such as retrieving data from a database or providing access to application software - Correct Answer-Mid-range Desktop, laptop, and tablet computers, and mobile devices are classified as - Correct Answer-Personal computers The most widely used handheld computers are - Correct Answer-Smartphones Which of the following is not a well-known web browser - Correct Answer-Windows Explorer A web page typically contains _______, which contains the formatting instructions for displaying the web page - Correct Answer-Hypertext markup language(HTML) Browsers to connect to resources on the internet, the location of the resources must be specified through addresses called - Correct Answer-Uniform resource locators (URLs) In the URL " http://www.simnetonline.com", what is the domain - Correct Answer-Www. Simnet online.com In the URL " http://www.simnetonline.com", ".com" is the - Correct Answer-Top-level domain (TLD) Which programming language is used within HTML documents to trigger interactive features - Correct Answer-JavaScript Which of the following are files inserted into an HTML document that control the appearance of web pages including layout, colors, and fonts - Correct Answer-CSS This type of email account is more widely used because it frees so user from installing and maintaining an email client on every computer used to access email - Correct Answer- Web-based This social networking site as he used for professional, business-oriented networking - Correct Answer-LinkedIn Twitter is an example of what type of site - Correct Answer- Microblog _______ typically broadcast live events and use streaming technology in which audio and video files are continuously downloaded to your computer while you are listening to and/or viewing the content - Correct Answer-Webcasts ________ do not use streaming technology and are used to download media files to your computer - Correct Answer- Podcast Which of the following is a website specially designed to allow visitors to use their browser to add, and it, or delete the site's content - Correct Answer-Wiki These special programs continually look for new information and update the bad databases used by search devices - Correct Answer-Spiders When you enter a keyword or phrase into a search engine the results display as a list of these - Correct Answer-Hits This type of software words with end users, application software, and computer hardware to handle the majority of technical details - Correct Answer-System This type of software can be described as end-user software and is used to accomplish a variety of tasks - Correct Answer- Application _________ provide additional information and request to user input - Correct Answer-Dialog boxes Tiny circuit boards H-Town two squares of sand like material, called silicon, are called - Correct Answer-Chips Integrated circuits must be on_______, which are then plugged into the motherboard - Correct Answer-Chip carriers Which of the following is a function of the control unit - Correct Answer-It directs the movement of electronic signals between memory and arithmetic logic unit Pathways that support communication among the various electronic components on the system board are called - Correct Answer-Bus lines In most personal computer systems, the CPU is contained on a single chip called the - Correct Answer-Microprocessor Term used to describe the number of states that a CPU can access at one time - Correct Answer-Word A 32-bit word computer can access - Correct Answer-4 bytes at a time The processing speed of a microprocessor is typically represented by its - Correct Answer-Clock speed Which of the following allows a computer to run two or more operations simultaneously - Correct Answer-Multicore chip For multiple processors to be used effectively, computers must understand how to divide tasks in two parts that can be distributed across each core-an operation called - Correct Answer-Parallel processing A type of specialty processor devoted exclusively to protecting your privacy - Correct Answer-Cryptoprocessor Frequently accessed information is held in - Correct Answer- Cache memory _____ is any data or instructions that are used by a computer - Correct Answer-Input The arrangement of keys on a keyboard, QWERTY reflects the keyboard layout by - Correct Answer-Taking the letters of the first six alphabetical characters found on the top row of keys Keyboards that are widely used on various smartphones and other small portable devices, and which are designed primarily for communicating via texting and connection to the web - Correct Answer-Thumb The type of keyboard that uses a touch screen as the input device - Correct Answer-Virtual A keyboard key, like caps lock, that turns a feature on or off is called a_______key - Correct Answer-Toggle This type of mouse emits and senses light to detect Mouse movement - Correct Answer-Optical The study of human factors related to the things people use - Correct Answer-Ergonomics The proportional relationship between a display's width and height - Correct Answer-Aspect ratio Hottest store and organize files using all the following, except - Correct Answer-Paths Which of the following is true about an internal hard disk - Correct Answer-Fixed amount of storage On a hard disk each track is divided into invisible wedge-shape sections called - Correct Answer-Sectors The hard disk's disk surface is scratched and some or all of the data is destroyed when there is a - Correct Answer-Head crash Which of the following is not an example of secondary storage - Correct Answer-Ram An external hard disk - Correct Answer-Usually connects to a USB or Thunderbolt port Storage that retains its data after the power is turned off is referred to as - Correct Answer-Non-volatile storage The process of accessing information from secondary storage devices is referred to as - Correct Answer-Reading The _______ of a secondary storage device indicates how much data the storage medium can hold - Correct Answer- Capacity Which of the following measures the amount of time required by the storage device to retrieve data and programs - Correct Answer-Access speed One of the most dramatic changes in connectivity & Communications in the past two years has been - Correct Answer-Widespread use of mobile devices with wireless internet connectivity In communication system, which among the following originate and accept messages in the form of data, information, and/or instructions - Correct Answer-Sending and receiving devices Any communication system, which among the following convert messages into packets that can travel across the communication Channel - Correct Answer-Connection devices Which physical connection is the fastest - Correct Answer- Fiber optic cable Which among the following is considered a line of sight communication medium - Correct Answer-Microwave Wimax stands for - Correct Answer-Worldwide interoperability for microwave access Microwave communication uses high frequency - Correct Answer-Radio waves LTE stands for - Correct Answer-Long term evolution The GPS device in an automobile uses which Communication channel - Correct Answer-Satellite Organization to use the following to allow the suppliers and others limited access to their Networks - Correct Answer- Extranets All Communications between a company's International Networks and the outside world pass through this server - Correct Answer-Proxy Remote users can connect to an organization's Network through this type of secure private connection - Correct Answer-VPN This type of network topology does not use a specific physical layout - Correct Answer-Mesh People that collect and sell personal data are called - Correct Answer-Information resellers Who's programs recorded virtually everything you do on your computer and are used by employers to search employee email and computer files - Correct Answer-Employee monitoring system Small data files that are deposited on a user's hard disk when they visit a website - Correct Answer-Cookies These are used by advertisers to keep track of your web activity As you move from one side to the next - Correct Answer-Third party cookies Programs used to secretly record an individual's activities on the internet are called - Correct Answer-Spyware which type of program would likely be used by investigators to prove Court a potential suspects' internet activities - Correct Answer-Keystroke logger This type of computer criminal creates and distributes malicious programs - Correct Answer-Cracker Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk - Correct Answer- Privacy mode Which of the following is not a malware - Correct Answer-Ad- aware A program that replicates itself and clogs computers and networks - Correct Answer-Worm Free computer games and free screensaver programs are typically carriers of - Correct Answer-TrojanHorses Which among of the following is a way to shut down an ISP or website - Correct Answer-Denial-of-service attack Which among the following is a fraudulent or deceptive Act designed to trick individuals on the internet spending time or money for little or no return - Correct Answer-Internet scam The use of the internet, cell phones, or other devices to send a post content intended to hurt or embarrass another person - Correct Answer-Cyber bullying The most significant concerns for implementation of computer technology involve_______, security, and ethics - Correct Answer-Privacy __________ systems help supervisors by generating databases then act as the foundation for other information systems - Correct Answer-Transaction processing Which of the following refers to a system that summarizes detailed data from the transaction processing systems in standard reports for middle level managers - Correct Answer- Management information system (Mis) Who uses management information systems - Correct Answer-Middle level managers This level of management is concerned with long-range planning and uses information that will help them plan the future growth and direction of the organization - Correct Answer-Top management This level of management is involved with tactical planning and implementing two long-term goals within an organization - Correct Answer-Middle management Which system percent information in a highly summarize form - Correct Answer-Executive support system (ESS) A transaction processing system is also referred to as a - Correct Answer-Data processing system The_____ activity records the customer requests for products or services - Correct Answer-Sales order processing Money collected from or owed by customers is called - Correct Answer-Accounts receivable The _______ keeps records of the number of each kind of part or finished good in the warehouse - Correct Answer-Inventory control system what documentation shows the difference between the income and expenses of the company for a specific time period - Correct Answer-Income statements This records asset, liability, and the Equity owned by the owners of an organization - Correct Answer-Balance sheet regional managers can compare their regular sales reports with that of other regional managers by using - Correct Answer-Periodic reports An example of this type of report would be a sales report that shows that certain items are selling significantly above or below forecast - Correct Answer-Exception this system is a flexible tool for data analysis since its reports do not have a fixed - Correct Answer-Decision support system In a GDSS, The ________ is generally the decision maker - Correct Answer-Group This typically consists of transactions from the transaction processing system - Correct Answer-Internal data This decision model helps middle level managers control the work of the organization such as Financial Planning and sales promotion planning - Correct Answer-Tactical model query by example as well as specialized programming language called - Correct Answer-SQL This system defines the logical structure of the database by using a data dictionary or schema - Correct Answer-Data definition in this subsystem, user can create a data entry forms - Correct Answer-Application generation In this database model comma the fields or records are structured in nodes - Correct Answer-Hierarchical A network database utilizes these special connections between a parent nodes and child nodes - Correct Answer- Pointers This type of database is organized into many tables with common data items kkey fields) linking the tables to one another - Correct Answer-Relational Which of the following is an advantage of using multidimensional databases - Correct Answer- Conceptualization These databases store not only data but also instructions to manipulate the data - Correct Answer-Object-oriented In the object oriented database model, this term is the equivalent to a field in a relational model - Correct Answer- Attribute In this type of database, the data and the DBMS are stored either on the user's hard disk drive or on a lan file server - Correct Answer-Individual these types of databases are also called information utilities or data banks - Correct Answer-Commercial The combined information presence on this type of database can be used to change the whole merchandising strategy of a store - Correct Answer-Company if all the data in the database is not physically located in one place, it would be a(n)_________database - Correct Answer- Distributed This commercial database offers news and information on legal public records, and business issues - Correct Answer- LexisNexis Information collected by an organization from a variety of external and internal database is is stored in this special type of database - Correct Answer-Data warehouse Access to these databases is offered to the public or selected outside individuals, for free - Correct Answer-Commercial databases
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved