logo image

CSIT test #3

1. Digital convergence combines several industries, including the following:
A. computers and communications
B. consumer electronics
C. entertainment and mass media
D. All of these
All of these
2. An example of digital portability is a ________.
A. mobile phone.
B. living room TV with internet access.
C. refrigerator with access to email.
D. none of these.
Mobile Phone
3. Telecommunications can be organized through two kinds of arrangements: the ________ model and the ________ model.
A. river-and-stream; switched-circuit
B. tree-and-branch; switched-network
C. parent-and-child; divided-road
D. None of these
Tree and branch
4. Studying while eating, along with listening to music while talking on the phone or handling email, are all instances of ________.
A. choice overload
B. surplus websurfing
C. multitasking
D. digital convergence
Multitasking
5. The downside of personalization is people feel overburdened with too much choice, so that they are more likely to ________.
A. regret their decisions
B. be reluctant to make decisions
C. have excessive expectations about their decisions
D. All of these
All of these
6. MP3 files are compressed, so that they are about ________ the size of uncompressed audio files.
A. one-tenth
B. one-quarter
C. one-third
D. one-half
One-tenth
7. Digital music players utilize one or both of the following technologies: ________ and ________.
A. hard-disk drives; flash memory
B. Wi-Fi; Bluetooth
C. microwaves; infrared waves
D. None of these
Hard-disk drives, flash memory
8. The quality of a song on a digital audio player is determined by its ________, the number of times a song is measured and converted to a digital value.
A. resolution
B. zoom rate
C. sampling rate
D. file transfer rate
sampling rate
9. How many children and teens in the U.S. suffer from noise-induced hearing loss (in part caused by hours of listening to MP3 players)?
A. 33%
B. 24%
C. 12%
D. 5%
12%
10. A form of radio in which broadcasters are able to squeeze two digital and one analog station on the same frequency is called ________ radio.
A. high-definition
B. internet
C. satellite
D. none of these
HD
11. The biggest competitor to regular radio is ________.
A. satellite radio
B. internet radio
C. high-definition radio
D. none of these
Internet Radio
12. A camera, either film or digital, that automatically adjusts settings such as exposure and focus is a ________ camera.
A. wide-angle
B. single-lens reflex
C. point-and-shoot
D. optical zoom
Point and shoot
13. Another name for image sharpness is ________.
A. pixel setting
B. digital zoom
C. optical zoom
D. resolution
Resolution
14. A digital camera’s images are stored on ________.
A. mini-CDs
B. digital film
C. flash memory cards
D. All of these
flash memory cards
15. The eye-level glass device on the camera that you look through and that shows the image to be photographed is called the ________.
A. LCD screen
B. image frame
C. optical viewfinder
D. none of these
optical viewfinder
16. A portable device that stores personal organization tools, such as schedule planner, address book, and to-do list, along with other, more specialized software, is called a ________.
A. palmtop
B. handheld
C. personal digital assistant
D. All of these
All of these
17. To transfer files from your PDA to your PC, you can do the following: ________.
A. Pull out your PDA’s flash card and insert it into your computer’s card reader.
B. Put your PDA in a special cradle plugged into a USB port.
C. Transfer data wirelessly if the PDA has built-in Wi-Fi or Bluetooth capability.
D. Any of these.
Any of these
18. A tablet PC is a special notebook computer outfitted with a digitizer tablet and ________ that allows a user to handwrite text on the unit’s screen.
A. lightpen
B. touchscreen
C. stylus
D. cursor
Stylus
19. When most of us tune in our TV sets, we get a system of varying signal amplitude and frequency that represents picture and sound elements. This system is called ________.
A. interactive television
B. personalized television
C. internet television
D. analog television
Analog television
20. ________ TV uses a digital signal, or series of 0s and 1s, and is much clearer than analog TV.
A. Digital
B. High-definition
C. Standard-definition
D. none of these
Digital
21. ________ consists of a wide set of technologies that enable viewers to select videos or TV programs from a central server to watch when they want.
A. Video on demand
B. TiVo
C. Interactive TV
D. Personal TV
Video on demand
22. ________ is a technology in which television and video signals are sent to viewers using internet protocols.
A. Internet TV
B. Internet Protocol TV
C. Interactive Protocol TV
D. Internet Personal TV
Internet Protocol TV
23. The societal effects of the New TV technology are that it can change ________.
A. when you watch TV.
B. where you watch TV.
C. the nature of TV programs.
D. All of these.
All of these
24. ________ is using a cellphone or PDA to send short messages to a pager, PDA, smartphone, or other handheld device.
A. Instant messaging
B. Internet messaging
C. Text messaging
D. Voice messaging
Text messaging
25. Ringtones may be ________.
A. music tones
B. polyphonic
C. monophonic
D. any of these
Any of these
26. An example of a videogame console is the ________.
A. Microsoft PlayStation 3
B. Sony Revolution
C. Nintendo Xbox 360
D. none of these
None of these
1. A field is a unit of data consisting of a collection of ________.
A. characters
B. tables
C. records
D. files
Characters
2. What is one byte of data also called?
A. character
B. field
C. record
D. file
Character
3. Which of the following is NOT a level of the data storage hierarchy?
A. bit
B. byte
C. record
D. network
Network
4. A record is a collection of related ________.
A. characters
B. tables
C. fields
D. files
Fields
5. A file is a collection of related ________.
A. characters
B. tables
C. fields
D. records
Records
6. What is a field that is chosen to uniquely identify a record called?
A. main field
B. super field
C. high field
D. key field
Key field
7. Filename extensions, follow a period and may be up to ________ letters in length.
A. three
B. four
C. five
D. six
Three or four
8. If a file contains software instructions, then it is a ________ file.
A. statistics
B. program
C. data
D. key
Program
9. In a database management system, the ________ is a document or file that stores the data definitions and descriptions of the structure of data used in the database.
A. access security
B. data dictionary
C. report generator
D. DBMS utility
Data dictionary
10. What are programs that help a database to be maintained, by creating, editing, and deleting data, records, and files?
A. access security
B. data dictionary
C. report generator
D. DBMS utilities
DBMS utilities
11. Which of the following is a program that produces an on-screen or printed document from all or part of a database?
A. access security
B. data dictionary
C. report generator
D. DBMS utilities
Report generator
12. The person who coordinates all activities and needs for an organization’s database is the ________.
A. database administrator
B. database manager
C. database analyst
D. database master
database administrator
13. Which of the following is NOT a task performed by the database administrator (DBA)?
A. Determining user access privileges.
B. Assisting in establishing priorities for requests.
C. Installing hardware.
D. Developing user documentation
Installing hardware
14. Which type of database model arranges fields or records in related groups whereby each child record can have only one parent record?
A. hierarchical database
B. network database
C. distributed database
D. object-oriented database
Hierarchical database
15. What is a parent record called in network database terminology?
A. guest
B. owner
C. member
D. resident
Owner
16. What is a child record called in network database terminology?
A. guest
B. owner
C. member
D. resident
member
17. Which type of database model is similar to a hierarchical database, but allows each child record to have more than one parent record?
A. hierarchical database
B. network database
C. distributed database
D. object-oriented database
network database
18. Which type of database model connects data in different files through the use of a key field?
A. hierarchical database
B. network database
C. relational database
D. object-oriented database
relational database
19. Which of the following is NOT an example of database terminology?
A. tuples
B. attributes
C. qualities
D. relations
qualities
20. Which of the following clauses is NOT a component of structured query language (SQL)?
A. SELECT…FROM statement
B. WHERE clause
C. ORDER BY clause
D. WHEREBY clause
WHEREBY clause
21. Which type of database uses software written in small, reusable chunks as elements within database files?
A. hierarchical database
B. network database
C. distributed database
D. object-oriented database
Object oriented database
22. Which of the following is the computer-assisted process of sifting through and analyzing vast amounts of data to extract meaning and discover new knowledge?
A. data mining
B. e-commerce
C. data warehousing
D. business-to-business systems
data mining
23. What is the process of removing errors and inconsistencies from data called?
A. data cleansing
B. data polishing
C. data buffing
D. data manipulation
data cleansing
24. What describes contents of a data warehouse?
A. omega data
B. meta-data
C. data area
D. warehouse data
meta-data
25. What is a special database of cleansed data called?
A. data warehouse
B. relational database
C. shared database
D. data area
data warehouse
26. What data mining (DM) tool is used to catalog galaxies?
A. SKICAT
B. IDIS
C. GALAXOR
D. query-and-report
SKICAT
27. The buying and selling of products and services via computer networks is called ________.
A. data mining
B. e-commerce
C. commerce
D. data warehousing
e-commerce
28. What enables businesses to sell goods or services to other businesses using the internet or a private network?
A. DBMS
B. B2B
C. data mining
D. mirroring
B2B
29. Which department of an organization makes products or provides services?
A. human resources
B. marketing & sales
C. production (operations)
D. research & development
production (operations)
30. Which department of an organization recruits people?
A. human resources
B. marketing & sales
C. production (operations)
D. research & development
Human resources
31. Which function of an organization oversees advertising, promotion, and sales?
A. human resources
B. marketing & sales
C. production (operations)
D. research & development
marketing & sales
32. A schematic showing the hierarchy of formal relationships among an organization’s employees is a(n) ________.
A. management chart
B. organization chart
C. management tree
D. relationship chart
organization chart
33. The ________manager is concerned with long-range, or strategic planning and decisions.
A. operational
B. tactical
C. top
D. principal
top
34. The ________ manager makes tactical decisions to implement the strategic goals of an organization.
A. operational
B. tactical
C. top
D. principal
tactical
35. The ________ manager makes operational decisions by following a well-defined set of routine procedures.
A. operational
B. tactical
C. top
D. principal
operational
36. Which of the following statements about managers is incorrect?
A. Top-level managers make strategic decisions.
B. Lower management makes operational decisions.
C. Operational managers make analytical decisions.
D. Middle-level managers make tactical decisions.
operational managers make analytical decisions
37. In a business organization, a recorded event having to do with routine business activities is a ________.
A. model
B. transaction
C. operation
D. contract
transaction
38. A system that combines various technologies such as voice mail, fax machines, and others in order to reduce the manual labor is a(n) ________ system.
A. transaction processing
B. office automation
C. decision support
D. executive support
Office automation
39. A computer-based information system that keeps track of the transactions needed to conduct business is a(n) ________ system.
A. transaction processing
B. office automation
C. executive support
D. decision support
transaction processing
40. A computer-based information system that uses data recorded by transaction processing system as input into programs that produce routine reports as output is a(n) ________ system.
A. office automation
B. executive support
C. management information
D. decision support
management information
41. If you were in operational (lower) management, which type of computer-based information system would you use?
A. transaction processing system (TPS)
B. management information system (MIS)
C. decision support system (DSS)
D. executive support system (ESS)
transaction processing system
42. A computer-based information system that provides a flexible tool for analysis and helps managers focus on the future is a(n) ________ system.
A. office automation
B. decision support
C. executive support
D. transaction processing
decision support
43. An easy-to-use decision support system that specifically supports strategic decision-making is a(n) ________ system.
A. executive support
B. office automation
C. decision support
D. transaction processing
executive support
44. If you were in top management, which type of computer-based information system would you use?
A. transaction processing system (TPS)
B. management information system (MIS)
C. executive support system (ESS)
D. decision support system (DSS)
executive support system
45. A set of interactive computer programs that help users solve problems that would otherwise require the assistance of a human expert is a(n) ________ system.
A. expert
B. authority
C. professional
D. influence
Expert
46. What is the software that controls the structure of a database and access to the data?
A. office suite
B. database management system
C. spreadsheet
D. database suite
database management system
47. What program is used to screen out dangerous commercial airline passengers?
A. CAPPS II
B. TOI
C. report generator
D. MVS
CAPPS II
48. The right of a person to avoid disclosure of his or her personal information is called ________.
A. secrecy
B. privacy
C. personality
D. rationality
Privacy
49. The crime in which thieves hijack a person’s name and identity to gain money or purchase goods is called ________.
A. theft of privacy
B. theft of identity
C. theft of rationality
D. theft of secrecy
Theft of identity
1. Which of the following is a limitation when using databases for research?
A. accuracy
B. acquiring incomplete data
C. limited history
D. All of these
All of these
2. Which of the following is NOT among the errors and accidents that may afflict computer systems?
A. human errors
B. electromechanical problems
C. procedural problems
D. disaster-recovery problems
Disaster-recovory problems
3. Incomplete, outdated, or otherwise inaccurate data is known as ________ data.
A. bad
B. dirty
C. unsaved
D. recycled
dirty
4. Electromechanical problems are examples of ________.
A. errors and accidents
B. crimes against computers
C. worms and viruses
D. connectivity failures
errors and accidents
5. Dirty data is ________.
A. virus-infected data
B. worm-infected data
C. inaccurate, incomplete data
D. downloaded data
inaccurate, incomplete data
6. Errors and accidents caused by NOT following procedures are known as ________ errors.
A. human
B. electromechanical
C. dirty data
D. procedural
procedural
7. The 1999 crashing of the $125 million Mars Climate Orbiter is an example of what type of error or problem?
A. procedural error
B. software error
C. electromechanical error
D. “dirty data” error
procedural error
8. Power failures is an example of ________.
A. electromechanical problems
B. human errors
C. procedural errors
D. software errors
electromechanical problems
9. A computer crime is defined as ________.
A. an illegal act perpetuated against computers or telecommunications
B. the use of computers or telecommunications to accomplish an illegal act
C. both a and b
D. neither a nor b
both a and b
10. Which of the following is NOT a function of the Computer Emergency Response Team (CERT)?
A. Counseling the party under attack.
B. Helping to thwart the intruder.
C. Evaluating the system afterwards against future break-ins.
D. Prosecuting those caught.
Prosecuting those caught
11. “Dirty data” problems fall under the category of ________.
A. errors and accidents
B. natural hazards
C. Crimes against computers and communications
D. Crimes using computers and communications
errors and accidents
12. File swapping as implemented by Kazaa is an example of ________ services.
A. internet
B. ISP
C. client/server
D. peer-to-peer
peer to peer
13. File swapping provided by Napster is an example of ________ services.
A. client
B. server
C. client/server
D. peer-to-peer
client/server
14. The Nigerian letter scam is an example of ________.
A. errors and accidents
B. theft of time and services
C. worms and viruses
D. internet-related fraud
internet-related fraud
15. Sending emails that appear to come from a trusted source, which direct you to a website where you’re asked to reveal personal information is called _________
A. email non-disclosure
B. credit-card or debit-card fraud
C. phishing
D. check fraud
phishing
16. A variant on conventional phishing, in which a hacker or cracker sets up a Wi-Fi hotspot or access point that makes your computer think it’s accessing a safe public network or your home network and then monitors your communications and steals data you enter into a website, is known as (an) ________.
A. Evil Twin attack
B. Wi-Fi phishing
C. both a and b
D. neither a nor b
both a and b
17. When a computer is taken over covertly and programmed to respond to instructions sent remotely, often by instant-messaging channels, it is called a(n) ________.
A. botnet
B. zombie
C. Nigerian letter
D. cyberslave
zombie
18. Which of the following is NOT a method in which a security system tries to authenticate a user’s identity?
A. What you have-cards, keys, signatures, badges.
B. What you know-PINs, passwords, and digital signatures.
C. What you are-physical traits or biometrics.
D. What you need-request made verbally or manually.
what you need request made verbally or manually
19. Which of the following is NOT a security procedure used by organizations to protect software and data?
A. audit controls
B. disaster-recovery plans
C. control of access to only those who need access
D. people controls such as screening job applicants
disaster recovery plan
20. Which of the following is included in a disaster recovery plan?
A. public and private keys
B. a list of all business functions
C. access control
D. digital signatures
a list of all business functions
21. Which of the following terms describes old, obsolete electronic gadgetry?
A. dirty data
B. e-dump
C. e-waste
D. junk
e-waste
22. A blocking program for protecting children from online objectionable adult material is ________.
A. Cybersitter
B. Cyber Patrol
C. Net Nanny
D. All of these
All of these
23. In morphing, a film or video image is displayed on a computer screen and altered pixel by pixel.
True False
True
24. The five categories of errors and accidents that may affect computer systems are human errors, software errors, administrative errors, electromechanical problems, and dirty data problems.
True False
False
25. A software bug can is an error in a program that causes it not to work properly.
True False
True
26. Humans often are not good at assessing their own information needs.
True False
True
27. The crash of the $125 million Mars Climate Orbiter in 1999 is an example of a software error.
True False
True
28. When a combination of minor failures led to the explosion of the Challenger space shuttle in 1986, this was an example of an electromechanical problem.
True False
True
29. A computer crime can be an illegal act perpetrated against computers/telecommunications or it can be the use of computers/telecommunications to accomplish an illegal act.
True False
True
30. Illegal file swapping shifted from peer-to-peer services like Napster to client/server services like Kazaa, Grokster, and Limeware.
True False
False
31. In the Nigerian letter scam, victims are given a chance to receive nonexistent government money as long as they pay a fee to help transfer the money to an overseas account.
True False
True
32. In the Evil Twin attack, a network of computers is compromised by means of a Trojan horse that plants instructions within each PC to wait for commands from the personal controlling that network.
True False
False
33. A zombie is the name given to a computer taken over covertly and programmed to respond to instructions sent remotely, often by instant-messaging channels.
True False
True
34. Foreign intelligence services, even those belonging to countries friendly to the U.S., can be a threat to U.S. computer systems.
True False
True
35. Programs used to monitor how much time workers spend on the web and to block employee access to gambling and pornography sites are known as employee internet management (EIM) software.
True False
True

Need essay sample on "CSIT test #3"? We will write a custom essay sample specifically for you for only .90/page

Can’t wait to take that assignment burden offyour shoulders?

Let us know what it is and we will show you how it can be done!
×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register
Signup & Access Essays

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy