logo image

CIS105 Unit 1 Study Guide Ch 1,24,5, Unit 1 Exam

Information technology is the study of managing and processing information, and the automatic retrieval of information.
true or false
true
Computer forensics analyzes computer systems in gathering potential legal evidence.
true or false
true
Being ________ means being familiar enough with computers that you understand their capabilities and limitations.
a. computer competent
b. technology literate
c. computer literate
d. computer savvy
c. computer literate
A virus is electronic junk mail.
true or false
false
The goal of ________ is to provide technological solutions to physical problems, such as providing sight to the blind.
a. RFID technology
b. computer forensics
d. biomedical chip research
e. 3D animations
d. biomedical chip research
Affective computing is a field of study focused on managing and processing information and the automatic retrieval of information.
true or false
false
Faculty at universities often use course management software such as ________ to make information available to students.
a. Noodle
b. Blueboard
c. Whiteboard
d. Blackboard
d. Blackboard
You cannot be computer literate unless you have knowledge of higher level computer skills, such as computer programming.
true or false
false
Data mining is the process of searching large datasets to find patterns.
true or false
true
Computer literacy means that you are an expert on computer repair.
true or false
false
RAM is a ________ storage location.
a. network
b. nonvolatile
c. volatile
d. permanent
c. volatile
All of the following are examples of permanent storage, EXCEPT ________.
a. hard disk drive
b. RAM
c. USB drive
d. DVD
b. RAM
Computers gather data, which means that they allow users to ________ data.
a. store
b. present
c. enter
d. output
c. enter
Computers use the ________ language consisting of 0s and 1s.
a. system
b. binary
c. byte
d. symbol
b. binary
A ________ is approximately 1 million bytes.
a. megabyte
b. gigabyte
c. terabyte
d. kilobyte
a. megabyte
External hard drives are often used to back up data that are contained on the internal hard drive.
true or false
true
Which of the following is NOT one of the four major data processing functions of a computer?
a. Processing data into information
b. Analyzing the data or information
c. Gathering data
d. Storing the data or information
b. Analyzing the data or information
The term “bit” is short for ________.
a. binary language
b. megabyte
c. binary number
d. binary digit
d. binary digit
The four functions of the computer include input, process, output, and ________.
a. saving
b. storage
c. calculating
d. retrieval
b. storage
The standard keyboard is known as the ________ keyboard.
a. QWERTY
b. Bluetooth
c. Dvorak
d. Ergonomic
a. QWERTY
Any part of the computer that you can touch is called ________.
a. software
b. operating system
c. input
d. hardware
d. hardware
Which of the following is the largest unit of measure for the size of a computer file?
a. Terabyte
b. Megabyte
c. Petabyte
d. Gigabyte
c. Petabyte
The central processing unit controls all the functions performed by the computer’s other components and processes all the commands issued to it by software instructions.
true or false
true
A keyboard and mouse are examples of ________ devices.
a. processing
b. output
c. input
d. storage
c. input
Which of the following operating systems is used primarily with mainframes as a network operating system?
a. Symbian OS
b. Mac OS
c. Windows Vista
d. UNIX
d. UNIX
Which of the following statements about a graphical user interface is FALSE?
a. A GUI uses windows, which are rectangular boxes displayed on the screen.
b. A GUI is a command-driven interface.
c. A GUI uses menus, which are lists of commands that appear on the screen.
d. Icons represent an object such as a software application, a file, or a folder.
b. A GUI is a command-driven interface.
The OS enables you to organize the contents of your computer in a hierarchical structure of ________.
a. files
b. libraries
c. drives
d. directories
d. directories
MS-DOS first used a command-driven interface.
true or false
true
The top three operating systems for personal computers are ________.
a. Mac OS X, Android 3.0, and UNIX
b. Microsoft Windows, Android 3.0, and Linux
c. Microsoft Windows, Mac OS X, and Linux
d. Microsoft Windows, Mac OS X, and Android 3.0
c. Microsoft Windows, Mac OS X, and Linux
UNIX was developed by Ken Thompson and Dennis Richie who worked at ________.
a. IBM
b. AT&T’s Bell Labs
c. Xerox
d. Microsoft
b. AT&T’s Bell Labs
Which of the following is an open source operating system for personal computers?
a. Mountain Lion
b. Android 3.0
c. Windows 8
d. Linux
d. Linux
The ________ is(are) the group of programs that controls how your computer functions.
a. operating system
b. user interface
c. application software
d. utility programs
a. operating system
C:DocumentsSpring 2012CIS 101Term PaperComputer Technology is an example of a ________.
a. file extension
b. file list
c. file path
d. file type
c. file path
Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS.
a. communication utility
b. device configurator
c. device driver
d. translator
c. device driver
All of the following are examples of network operating systems, EXCEPT ________.
a. Windows 8
b. OS X Mountain Cougar
c. Linux
d. Android 3.0
b. OS X Mountain Cougar
A(n) ________ is a small program that performs general housekeeping tasks for your computer.
a. application software
b. user interface
c. utility program
d. operating system
c. utility program
Which of the following was the first widely used operating system installed in personal computers?
a. Symbian OS
b. Linux
d. Microsoft Windows
d. MS-DOS
d. MS-DOS
Wizards are step-by-step guides for performing complicated tasks in application software.
true or false
true
QuarkXPress and Adobe InDesign are examples of ________ software.
a. word processing
b. video-editing
c. desktop publishing
d. image-editing
c. desktop publishing
Another way to obtain software is through ________, where a vendor hosts the software online over the Internet and you do not have to install it on your computer.
a. Proprietary as a Service
b. Webware as a Service
c. software as a Service
d. Open Source as a Service
c. software as a Service
All of the following are examples of software suites, EXCEPT ________.
a. Apple iWork
b. Microsoft Office 2010
c. Apache OpenOffice
d. Microsoft OneNote
d. Microsoft OneNote
Every software program has a set of ________ that specify the minimum recommended standards for the operating system, processor, RAM, and hard drive capacity.
a. system requirements
b. specifications
c. programming instructions
d. help files
a. system requirements
Multimedia software includes all of the following, EXCEPT ________.
a. audio-editing software
b. animation software
c. utility software
d. image-editing software
c. utility software
All Web-based software is free.
true or false
false
The type of software that is free and available with few licensing and copyright restrictions is known as ________ software.
a. proprietary
b. closed source
c. open source
d. commercial
c. open source
The general software you use to do tasks at home, school, or work is known as ________ software.
a. application
b. commercial
c. system
d. open source
a. application
________ software helps you manage e-mail, contacts, calendars, and tasks in one place.
a. Spreadsheet
b. Database
c. Word processing
d. Personal information manager
d. Personal information manager
OpenOffice.org is an example of open source software.
true or false
true
When uninstalling software, it is best simply to open the Explorer window and delete the folder containing the software.
true or false
false
All of the following are examples of database software, EXCEPT ________.
a. OneNote
b. MySQL
c. Access
d. Oracle
a. OneNote
The ESP system targeted at helping with autism stands for ________.
a. extra sensory perception
b. emotional-stabilizing program
c. emotional-social prosthesis
d. emotional-social program
c. emotional-social prosthesis
Educators do not need to be computer literate.
true or false
false
ZipCar is an example of ownership.
true or false
false
Faculty at universities often use course management software such as ________ to make information available to students.
a. Blackboard
b. Blueboard
c. Noodle
d. Whiteboard
a. Blackboard
Joining together as a group to use a specific product more efficiently is called ________.
a. affective computing
b. social networking
c. creative surplus
d. collaborative consumption
d. collaborative consumption
Examples of information technology careers are telecommunication and software deployment.
true or false
true
Autonomy is the feeling of confidence and excitement from seeing your own skills progress.
true or false
false
________ is a field of study focused on information handling and retrieval of information automatically.
a. Computer forensics
b. Database mining
c. RFID
d. Information technology
d. Information technology
If you are a design student, there is no reason for you to know how to use a computer.
true or false
false
Using the Internet to get small donations from many people to start a business is called ________.
a. kickstarting
b. crowdfunding
c. crowdsourcing
d. collaborating
b. crowdfunding
The Witness Project uses the power of video and a grassroots movement to advocate for ________.
a. computer literacy
b. social networking
c. human rights
d. responsible citizenship
c. human rights
Analyzing computer systems to gather potential legal evidence is ________.
a. computer detectives
b. computer forensics
c. forensics detectives
d. computer enforcement
b. computer forensics
Mastery is the simple understanding that you are working for something larger than yourself.
true or false
false
________ is a wearable device that hangs around your neck and consists of a camera, a projector, and a mirror that can communicate with the Internet over wireless Bluetooth technology.
a. FastSCAN
b. Data mining
c. Emotional-social prosthesis (ESP)
d. SixthSense
d. SixthSense
Information technology is the study of managing and processing information, and the automatic retrieval of information.
true or false
true
The crisis-mapping tool ________ can collect information to make instantly and publicly available for use in emergencies.
a. Marahabaa
b. Ushahidi
c. data mining
d. The Witness Project
b. Ushahidi
Computer forensics analyzes computer systems in gathering potential legal evidence.
true or false
true
Mastery of software programs, such as Adobe Illustrator and Corel Painter, is essential to creating digital art.
true or false
true
________ computing relates to emotion or deliberately tries to influence emotion.
a. Affective
b. Personal
c. Psychological
d. Emotional
a. Affective
Which of the following software can best be used to help create digital art?
a. Microsoft Excel
b. Microsoft Word
c. Adobe Acrobat
d. Adobe Illustrator
d. Adobe Illustrator
Information technology is the study of managing and processing information, and the automatic retrieval of information.
false or true
true
The process of searching huge amounts of data with the hope of finding a pattern is called ________.
a. data mining
b. data searching
c. data warehousing
d. data retrieval
a. data mining
The emotional-social prosthesis (ESP) device, developed by a group at the MIT Media Lab, is targeted at helping people who have ________.
a. paralysis
b. diabetes
c. autism
d. drain damage
c. autism
VeriMed can be used to keep Alzheimer patients safe.
true or false
true
Autonomy is defined as ________.
a. working for something larger.
b. feeling confident and excited about learning new skills.
c. working without continual direction and control.
d. repressing motivated behavior.
c. working without continual direction and control.
Data mining is the process of searching huge amounts of data with the hope of finding a pattern.
true or false
true
Some art museums use technology to let you download informational podcasts to listen to while touring the exhibits.
true or false
true
Being ________ means being familiar enough with computers that you understand their capabilities and limitations.
a. computer savvy
b. technology literate
c. computer literate
d. computer competent
c. computer literate
You cannot be computer literate unless you have knowledge of higher level computer skills, such as computer programming.
true or false
false
The goal of ________ is to provide technological solutions to physical problems, such as providing sight to the blind.
a. 3D animations
b. computer forensics
c. biomedical chip research
d. RFID technology
c. biomedical chip research
Dancers can be wired with light electronic sensors so that their movements can be digitized for computer analysis.
true or false
true
Analyzing computer systems to gather potential legal evidence is ________.
b. computer forensics
Which of the following is an example of data mining?
a. An Excel spreadsheet listing all employees and their annual salaries in a random order.
b. Amazon providing you with a list of books you might enjoy.
c. Raw data from questionnaires given at the mall.
d. A printout of all sales taken from the register at the end of the day.
b. Amazon providing you with a list of books you might enjoy
Educators do not need to be computer literate.
false or true
false
Unwanted or junk e-mail is called ________.
a. spam
b. spyware
c. adware
d. software
a. spam
People who are ________ make the Internet a powerful research tool and know how to find the information that they want effectively.
a. computer productive
b. computer literate
c. technologically informed
d. computer efficient
b. computer literate
A ________ is approximately 1 million bytes.
a. gigabyte
b. kilobyte
c. megabyte
d. terabyte
c. megabyte
In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of ________.
a. eight bytes
b. eight kilobytes
c. eight characters
d. eight bits
d. eight bits
The ________ is used in combination with other keys to perform shortcuts and special tasks.
a. Toggle key
b. Function key
c. Control (Ctrl) key
d. Windows key
c. Control (Ctrl) key
Serial ports and parallel ports have long been used to connect input and output devices to the computer.
true or false
true
Processing performance is affected by the number of processing paths called ________.
a. speed
b. chips
c. cores
d. stars
c. cores
New technologies pushing the boundaries of printing DO NOT include ________.
a. cloud printing
b. inkless printing
c. 3-D printing
d. None of these
d. None of these
Data and information are terms that can be used interchangeably.
true or false
false
One bit is equal to eight bytes.
true or false
false
A ________ sits on your computer monitor or is built into a laptop and is used primarily for transmitting live video.
a. scanner
b. camcorder
c. webcam
d. digicam
c. webcam
External hard drives are often used to back up data that are contained on the internal hard drive.
true or false
true
Modern printers feature Bluetooth connectivity technology.
true or false
true
After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered ________.
a. data
b. output
c. input
d. a process
b. output
A digicam sits on your computer monitor and is used primarily for transmitting live video.
True or false
false
Liquid crystal display technology uses organic compounds that produce light when exposed to an electric current.
true or false
false
The term “bit” is short for ________.
a. megabyte
b. binary language
c. binary digit
d. binary number
c. binary digit
________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.
a. Mainframe
b. Desktop
c. Embedded
d. Internal
c. Embedded
Brightness determines how lighter colors appear on the display.
true or false
false
The Google search engine can process more than 3 petabytes of user-generated data per hour.
true or false
false
________ is data that has been organized or presented in a meaningful fashion.
information
All of the following are names for a flash drive, EXCEPT ________.
a. jump drive
b. USB drive
c. thumb drive
d. hard drive
d. hard drive
________ is the abbreviation for the place in the computer where the programs and data the computer is currently using are stored.
a. ROM
b. CPU
c. RAM
d. USB
c. RAM
When performing data entry, you cannot use the numeric keypad on your keyboard to enter numeric values.
true or false
false
The operating system provides the means for users to interact with a computer.
true or false
true
A smartphone is a computer.
true or false
true
The ________ contains the central electronic components of the computer.
a. motherboard
b. system unit
c. peripheral unit
d. input unit
a. motherboard
On a keyboard, Num Lock and Caps Lock are both toggle keys.
true or false
true
Joysticks and steering wheels are examples of game controllers.
true or false
true
The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a ________.
a. stylus
b. touch pad
c. game control
d. trackball
b. touch pad
The number of pixels displayed on the screen is known as ________.
a. contrast ratio
b. aspect ratio
c. brightness resolution
d. screen resolution
d. screen resolution
The computer port that is used to connect televisions and DVD players is the ________.
a. VGA
b. DVI
c. HDMI
d. LCD
b. DVI
Apple developed ________ Mouse, which is the first multitouch wireless mouse.
a. Taboo
b. Trick
c. Touch
d. Magic
d. Magic
Computer systems run at speeds measured in gigahertz.
true or false
true
Bits and bytes are used to represent the quantity of data and information the computer inputs and outputs.
true or false
true
Restarting the computer while it’s powered on is called a cold boot.
true or false
false
Which of the following is NOT one of the four major data processing functions of a computer?
a. Gathering data
b. Processing data into information
c. Analyzing the data or information
d. Storing the data or information
c. Analyzing the data or information
Using applications on smartphones and tablets to buy and sell products is known as ________.
a. smart commerce
b. table commerce
c. mobile commerce
d. Web commerce
c. mobile commerce
______ software is the software that helps run the computer and coordinate instructions between the computer and the hardware devices.
a. Application
b. Recovery
c. Backup
d. System
d. System
Coordinated colors and styles in a word processing program is known as a theme.
true or false
true
The primary benefit of spreadsheet software is its capability to automatically recalculate formulas and functions.
true or false
true
Multimedia software includes all of the following, EXCEPT ________.
a. image-editing software
b. animation software
c. utility software
d. audio-editing software
c. utility software
All Web-based software is free.
true or false
false
Adobe Illustrator is a type of drawing software.
true
The general software you use to do tasks at home, school, or work is known as ________ software.
a. system
b. open source
c. application
d. commercial
c. application
A typical CD stores between 10-15 songs in uncompressed format but 300-400 in MP3 format.
true or false
false
Media management programs are entertainment applications that turn artificial environments into a realistic experience.
true or false
false
All of the following are media management software used to organize music, video, and pictures, EXCEPT ________.
a. Windows Media Player
b. Sony Sound Forge
c. Apple iTunes
d. inamp
b. Sony Sound Forge
Application software helps run the computer and coordinates instructions.
true or false
false
Presentation software includes all of the following features, EXCEPT ________.
a. animation effects
b. formulas
c. text and images
d. speaker notes
b. formulas
In a spreadsheet, equations that use addition, subtraction,multiplication, and division operators, as well as values and cell references are called ________.
a. functions
b. calculations
c. formulas
d. values
c. formulas
The intersection of a row and column in a spreadsheet program is known as a ________.
a. label
b. formula
c. function
d. cell
d. cell
Microsoft’s ________ enables you to create a 3-D walkthrough of your favorite vacation places.
a. Photostitch
b. Photosynth
c. Photosync
d. Photosee
b. Photosynth
A wizard is a systematic guide that walks you through the steps necessary to complete a complicated task.
true or false
true
OpenOffice.org is an example of open source software.
true or false
true
Apple’s Final Cut Pro is an example of software that enables you to edit video.
true or false
true
________ software helps you manage e-mail, contacts, calendars, and tasks in one place.
a. Database
b. Personal information manager
c. Spreadsheet
d. Word processing
b. Personal information manager
All of the following are types of multimedia and entertainment software, EXCEPT ________.
a. digital audio software
b. gaming software
c. drawing software
d. productivity software
d. productivity software
Computer-aided design software is used primarily by ________.
a. engineers to create models
b. airline pilots to navigate
c. project managers to track tasks
d. game makers to create games
a. engineers to create models
What is Google’s first attempt at a netbook where all applications and files are stored on the Web?
a. Google docs
b. Gmail
c. Chromebooks
d. Cloud Computing
c. Chromebooks
Moodle and Blackboard are examples of ________.
a. utility software
b. educational software
c. course management software
d. gaming software
c. course management software
System software does all of the following, EXCEPT ________.
a. help run the computer
b. coordinate instructions between application software and the computer’s hardware devices
c. add graphics and pictures to files
d. help manage system resources
c. add graphics and pictures to files
All of the following are examples of educational and reference software EXCEPT ________.
a. Test Preparation
b. Trip Planning
c. Genealogy
d. EverQuest
d. EverQuest
Angel is a gaming software.
true or false
false
The type of software that is free and available with few licensing and copyright restrictions is known as ________ software.
a. open source
b. closed source
c. proprietary
d. commercial
a. open source
Software refers to a set of instructions that tells the computer what to do. These instruction sets are called ________.
a. databases
b. programs
c. peripherals
d. devices
b. programs
QuickBooks and Peachtree are examples of ________ software.
a. educational
b. accounting
c. course management
d. gaming
b. accounting
One of the new capabilities of PowerPoint 2010 enables you to trim video clips without a separate video-editing program.
true or false
true
Another way to obtain software is through ________, where a vendor hosts the software online over the Internet and you do not have to install it on your computer.
a. Open Source as a Service
b. Proprietary as a Service
c. Software as a Service
d. Webware as a Service
c. Software as a Service
The type of software that is best used to create a simple budget is ________.
a. spreadsheet software
b. word processing software
c. presentation software
d. database software
a. spreadsheet software
In databases, information is organized in ________.
a. tables
b. records
c. fields
d. All of these
d. All of these
Word processing software enables you to easily change the appearance and organization of your documents.
true or false
true
C:DocumentsSpring 2012CIS 101Term PaperComputer Technology is an example of a ________.
a. file extension
b. file type
c. file path
d. file list
c. file path
Windows 8 is the operating system developed by ________.
a. Apple
b. Microsoft
c. Google
d. open source
b. Microsoft
Which of the following statements about a graphical user interface is FALSE?
1. A GUI uses windows, which are rectangular boxes displayed on the screen.
2. Icons represent an object such as a software application, a file, or a folder.
3. A GUI is a command-driven interface.
4. A GUI uses menus, which are lists of commands that appear on the screen.
3. A GUI is a command-driven interface.
Installing a device driver can sometimes cause system instability.
true or false
true
XO is the name of the computer provided by the ________ initiative.
a. IT Beta
b. Computers for All
c. DigiKid
d. One Laptop per Child
d. One Laptop per Child
Which of the following is an open source operating system for personal computers?
a. Windows 8
b. Mountain Lion
c. Android 3.0
d. Linux
d. Linux
Windows 8 can be considered a network operating system.
true or false
true
The type of processor in the computer dictates which operating system a desktop uses.
true or false
true
A command-driven interface is one in which you enter commands to communicate with the computer system.
true or false
true
Preemptive multitasking is the term used when the operating system processes higher priority tasks before lower priority tasks.
true or false
true
The Windows 7 File Recovery Tools enable you to make a duplicate copy of all the data on your hard drive.
true or false
true
Which of the following operating systems is used primarily with mainframes as a network operating system?
a. UNIX
b. Mac OS
c. Symbian OS
d. Windows Vista
a. UNIX
UNIX was developed by Ken Thompson and Dennis Richie who worked at ________.
a. IBM
b. Microsoft
c. Xerox
d. AT&T’s Bell Labs
d. AT&T’s Bell Labs
The most recent version of the Mac operating system is called Mac OS X Mountain Lion.
true or false
true
The process of optimizing RAM storage by borrowing hard drive space is called ________.
a. thrashing
b. swap file
c. virtual memory
d. page file
c. virtual memory
In the Windows operating system, the C drive is commonly referred to as the ________ directory.
root
You can use System Restore to restore your system’s settings back to a specific date when everything was working properly.
true or false
true
The user interface is part of a computer’s operating system.
true or false
true
All of the following are terms related to part of the boot process, EXCEPT ________.
a. ROM
b. BIOS
c. RAM
d. USB
d. USB
Which of the following is the name of a Microsoft Access file?
a. inventory.xlsx
b. inventory.wpd
c. inventory.accdb
d. inventory.bmp
c. inventory.accdb
The ________ is(are) the group of programs that controls how your computer functions.
a. utility programs
b. application software
c. user interface
d. operating system
d. operating system
You can return to the Start screen in Windows 8 by pressing the Window key on the computer keyboard.
true or false
true
Every computer has an operating system.
true or false
true
Which utility takes out redundancies in a file to reduce the file size?
a. Disk Cleanup
b. File Compression
c. Error-Checking
d. System Restore
b. File Compression
All of the following are true about real-time operating systems (RTOS), EXCEPT ________.
a. they are also called embedded systems
b. they are programs with specific purposes
c. they require significant user interaction
d. they are written specifically for the needs of the device
c. they require significant user interaction
Which of the following was the first widely used operating system installed in personal computers?
a. Symbian OS
b. Microsoft Windows
c. MS-DOS
d. Linux
c. MS-DOS
The most essential software in your computer system is the ________.
a. security
b. antivirus
c. operating system
d. productivity
c. operating system
The High Contrast accessibility feature enables you to select a color scheme setting in which you control the contrast between text and background.
true or false
true
Windows 8 uses a(n) ________ account to easily access and store your files online.
a. iCloud
b. Chrome
c. Sky Drive
d. eye OS
c. Sky Drive
Live Icons enable you to preview the actual contents of a specific file or folder from within a window without having to open the file.
true or false
true
Another name for a multiuser operating system used by networks is a real-time operating system.
true or false
false
All of the following can be used in a Windows file name, EXCEPT ________.
a. *
b. #
c. %
d. $
a. *

Need essay sample on "CIS105 Unit 1 Study Guide Ch 1,24,5, Unit 1 Exam"? We will write a custom essay sample specifically for you for only $ 13.90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy