MIS Flashcards
(100 cards)
What is the component of the processor that directs and coordinates most of the operations in the computer?
Control Unit
What is a signal that is continuous and varies in strength and quality with an infinite number of values?
Analog
What is unauthorized access?
Unauthorized access is the use of a computer or its data for unapproved or possibly illegal activities.
What is the term for a square-shaped coded graphic that corresponds to a web address or other information?
QR Code
What is a collection of data organized for access, retrieval, and use?
Database
What is the process of converting readable data into encoded characters to prevent unauthorized access?
Encryption
What is cache?
Cache is a temporary memory source.
Which of the following is an example of software theft?
ALL OF THEM
Includes: a. Intentionally erasing programs, b. Illegally register and/or activate a program, c. Illegally copying a program.
What component interprets and carries out basic instructions that operate a computer?
Central Processing Unit (CPU)
What is a popular query language for managing, updating, and retrieving data?
SQL
What is malware?
Malware, short for malicious software, consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices.
In a Microsoft Access database, what does a column equal?
A column is equal to a field within a record.
Does a data mart contain data about each file in a database and each field within a file?
FALSE
What is the engineering principle that incorporates comfort, efficiency, and safety into workplace design?
ergonomics
What is the discovery, collection, and analysis of evidence found on computers and networks called?
digital forensics
What is a combination of one or more related characters in a database known as?
Field
Which of the following allows for storage and management of a company’s documents, such as word processing documents, presentations and spreadsheets?
DMS (Document management system)
Which of the following is NOT an example of a digital security risk?
Slacker
Which of the following allows users to add, modify and delete data?
Database management system
Processed data that is organized in a meaningful and useful way is known as which of the following?
Information
How many bits in a byte?
8
The binary system uses how many unique digits, and what are those digits?
TWO (0 and 1)
The base 10 numerical system is known as which of the following?
decimal
An event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information or processing capability is known as which of the following?
Digital Security Risk