MIS Flashcards

(100 cards)

1
Q

What is the component of the processor that directs and coordinates most of the operations in the computer?

A

Control Unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a signal that is continuous and varies in strength and quality with an infinite number of values?

A

Analog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is unauthorized access?

A

Unauthorized access is the use of a computer or its data for unapproved or possibly illegal activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the term for a square-shaped coded graphic that corresponds to a web address or other information?

A

QR Code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a collection of data organized for access, retrieval, and use?

A

Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the process of converting readable data into encoded characters to prevent unauthorized access?

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is cache?

A

Cache is a temporary memory source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is an example of software theft?

A

ALL OF THEM

Includes: a. Intentionally erasing programs, b. Illegally register and/or activate a program, c. Illegally copying a program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What component interprets and carries out basic instructions that operate a computer?

A

Central Processing Unit (CPU)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a popular query language for managing, updating, and retrieving data?

A

SQL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is malware?

A

Malware, short for malicious software, consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In a Microsoft Access database, what does a column equal?

A

A column is equal to a field within a record.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Does a data mart contain data about each file in a database and each field within a file?

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the engineering principle that incorporates comfort, efficiency, and safety into workplace design?

A

ergonomics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the discovery, collection, and analysis of evidence found on computers and networks called?

A

digital forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a combination of one or more related characters in a database known as?

A

Field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following allows for storage and management of a company’s documents, such as word processing documents, presentations and spreadsheets?

A

DMS (Document management system)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is NOT an example of a digital security risk?

A

Slacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following allows users to add, modify and delete data?

A

Database management system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Processed data that is organized in a meaningful and useful way is known as which of the following?

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How many bits in a byte?

A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The binary system uses how many unique digits, and what are those digits?

A

TWO (0 and 1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The base 10 numerical system is known as which of the following?

A

decimal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information or processing capability is known as which of the following?

A

Digital Security Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
In a Microsoft Access database, a row is equal to a record and a column is equal to a field within that record. Is this statement true or false?
TRUE
26
Non-volatile memory does not lose its contents when the power source is interrupted. Is this statement true or false?
TRUE
27
A videoconference is a meeting between two or more geographically separated people and can save companies time and money. Is this statement true or false?
TRUE
28
The amount of time it takes the processor to read from memory, and which is measured in nanoseconds is known as which of the following?
Access Time
29
Over time, which of the following is true of thermal printers?
They are inexpensive, but the print quality is low and images tend to fade
30
Non-volatile memory loses its contents when the power is interrupted. Is this statement true or false?
FALSE
31
Which of the following identifies the quality of data in a database?
Data Integrity
32
Reducing the electricity and environmental waste while using computers, mobile devices and related technologies is known as which of the following?
Green Computing
33
What are digital signals?
Digital signals are in one of two states: on or off. ## Footnote TRUE
34
What is the main circuit board of the computer called?
The main circuit board of the computer is known as the motherboard.
35
What does the arithmetic logic unit (ALU) do?
The arithmetic logic unit (ALU) performs arithmetic, comparison, and other operations. ## Footnote TRUE
36
Which of the following is not an example of a pointing device?
Tablet
37
What is a light-sensing input device that reads printed text and graphics called?
A light-sensing input device that reads printed text and graphics is known as a scanner.
38
What is a field that uniquely identifies each record in a database called?
A field that uniquely identifies each record in a database is known as a primary key.
39
What is any data and instructions entered into the memory of a computer called?
Any data and instructions entered into the memory of a computer or mobile device is known as input.
40
What is true about SSDs compared to traditional hard disks?
SSDs have faster transfer rates.
41
What refers to an environment of servers that provide access to resources through the Internet?
Cloud computing refers to an environment of servers that house and provide access to resources users access through the Internet.
42
What happens to volatile memory when power is interrupted?
Volatile memory loses its programming when the power is interrupted. ## Footnote TRUE
43
What are computer viruses, worms, Trojan horses, and rootkits classified as?
They are classified as malware, or programs that act without a user's knowledge and deliberately alter the computer's operations.
44
What are electronic components that store instructions and data called?
Electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processing the data are known as Memory.
45
Is cache a non-volatile memory source?
Cache is not a non-volatile memory source. ## Footnote False
46
What is a record in a database?
A record is a group of related fields in a database. ## Footnote True
47
Does volatile memory lose its contents when power is removed?
Volatile memory does lose its contents when power is removed. ## Footnote False
48
What is hardware and/or software that protects a network's resources called?
Hardware and/or software that protects a network's resources from intrusion is known as a firewall.
49
What is the base 2 numerical system called?
The base 2 numerical system is known as binary.
50
What is an attack that disrupts computer access to internet services called?
An attack that disrupts computer access to internet services is known as a denial of service (DoS).
51
What involves reducing electricity consumption and environmental waste when using a computer?
Green Computing involves reducing the electricity consumed and environmental waste generated when using a computer.
52
What does a storage device do?
A storage device records (writes) and/or retrieves (reads) items to and from storage media.
53
What is a collection of individual programs sold as a unit?
Software Suite
54
The applied science devoted to incorporating comfort, efficiency and safety into the design of items in the workplace is known as which of the following?
Ergonomics
55
Which of the following entails having the knowledge and understanding of computers, mobile devices, the Internet, and related technologies?
Computer literacy
56
What is a program placed on a computer or mobile device without the user's knowledge that secretly collects information about the user and then communicates the collected information to some outside source while the user is online known as?
Spyware
57
Which of the following is a collection of computers and devices connected together, often wirelessly, via communications devices and transmission media?
Network
58
In which gesture do you press and hold one finger on an object and then move the finger to the new location?
Drag
59
Which of the following represents the amount of data that travels over a network?
Bandwidth
60
Which of the following software allows users to organize data in rows and columns and performs calculations?
Spreadsheet software
61
Which of the following is a collection of unprocessed items, which can include text, numbers, images, audio, and video?
Data
62
Which software allows users to create, access and manage data?
Database software
63
A light-sensing input device that converts printed text and images into a form the computer can process is which of the following?
Scanner
64
Which of the following is NOT an example of malware?
Antivirus software
65
What is a security tool that detects and protects a computer and its data from unauthorized intrusions?
Firewall
66
IT certifications can do which of the following for the certified employee?
Enhance job prospects
67
Which of the following is a program that extends the capability of a web browser?
Browser extension
68
Software that enables users with an Internet connection to access and view webpages on a computer or mobile device is known as which of the following?
Web browser
69
Which of the following is an electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data according to specified rules, produce results, and store the results for future use?
Computer
70
Which of the following is a computer dedicated to providing one or more services to other computers or devices on a network?
Server
71
Which of the following is equal to approximately one million characters?
Megabyte
72
FTP is an acronym that stands for what?
File Transfer Protocol
73
Word processing software, spreadsheet software, database software, and presentation software are examples of what category of computer software?
Productivity software
74
Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user's personal and financial information?
Phishing
75
Which kind of device is hardware capable of transferring items from computers and devices to transmission media and vice versa?
Input/Output device
76
Which of the following is a special purpose computer that functions as a component in a larger product?
Embedded computer
77
Which of the following enables users to speak to other users over the Internet?
VoIP software
78
In which gesture do you move two fingers together?
Pinch
79
You do not want to store your data locally on your hard disk. You would rather store it using an Internet service. What is this kind of storage known as?
Cloud storage
80
What translates domain names, the text-based name that corresponds to an IP address, to its associated IP address?
DNS
81
In which gesture do you move two fingers apart?
Expand
82
Which of the following is an example of an operating system?
Windows
83
An IP address is a sequence of number and letters that uniquely identifies each computer or device connected to the Internet.
True
84
Which of the following is a popular Cisco certification?
CCNA
85
A website is a collection of related webpages and associated items, such as documents and pictures, stored on a web server.
True
86
Software, also called a(n) ____________________, tells the computer what tasks to perform and how to perform them.
Program
87
Which of the following conveys meaning and is useful to users?
Information
88
Which of the following is a worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals?
Internet
89
A USB port, short for universal serial bus port, can connect up to how many different peripheral devices together with a single connector?
127
90
What kind of software consists of programs designed to make users more productive and/or assist them with personal tasks?
Application software
91
Memory consists of electronic components that store instructions waiting to be executed and the data needed by those instructions.
True
92
The Internet has its roots in a network that became functional in 1969, linking scientific and academic researchers across the United States. What was the name of that network?
ARPANET
93
Which of the following is a set of programs that coordinates all the activities among a computer or mobile device's hardware?
Operating system
94
Any hardware component that conveys information from a computer or mobile device to one or more people is known as a(n) ____________________.
Output device
95
E-mail is a utility program.
False
96
Which of the following facilitates the transfer of files from one computer to another over the Internet?
FTP
97
A computer keeps data, instructions and information on what kind of media?
Storage media
98
Which of the following is an electronic version of a printed book, readable on computers and other digital devices?
E-book
99
Which of the following allows users to create and manipulate documents?
Word processing software
100
The DNS in 'DNS server' stands for which of the following?
Domain Name System