Sei sulla pagina 1di 2

.

. BIS 320 Final Exam


smaller

The ___ the dot pitch, sharper and brighter the screen image will be. The CPU has a small amount of very fast memory called: a grocery scanning checkout system is an example of:

cache vertical market software Which of the following is TRUE of in-house custom-developed software? Tailor-made software Which of the following is true of VPN? a) Uses public b )Cost cutting measure Most homes and small businesses use_______because they receive more data than they transmit. ADSL A ________connects computers at different geographic locations. WAN
Which type of chart should you use? Line chart In the Web 2.0 world, the value of the site increases TRUE ________tracks changes to documents and provides features and functions to accomodate concurrent work.

version management
The broadest definition of _______ includes viruses, worms, Trojan horses, spyware and adware Malware Which of the following statements is true regarding position sensitivity? It enables security personnel to
prioritize their activities in accordance with the possible risk and loss. Which of the following is true regarding an incident-response plan? The plan should identify critical personnel and their off-hours contact info.

Projects that spend so much time ______ are sometimes said to be in analysis paralysis.

documenting

requirements
During the _____ phase of the SDLC process, developers construct, test and install the components of information system. implementation The easiest and cheapest time to alter the information system is in the ____ phase of the SDLC.

requirements phase
1. When one buys an operating system like WinXP, you are actually buying a software (License) 2. ___ software is processed on client computers. (Client application programs) 3. The ___ system manages the computers resources. (operating) 4. A loosely coupled group of volunteer programmers that contribute code to develop and maintain software are called___. (The open source community) 5. Volatile memory ___ data when the power is turned off. (loses) 6. Linux is an example of: (Open source software) 7. Which device listed below is not an example of an input hardware device? (Printer) 8. If your computer is slow in loading large image files, it is likely that you need t o upgrade the computers: (main memory) 9. ___is designed to increase the overall throughput of the CPU. (Cache memory) 10. A spreadsheet program would be an example of: (Horizontal market software) 11. To keep from getting a virus on your computer, be sure to never download files, programs, or attachments from ___ Web sites. (Unknown) 12. The Apple operating system is called ___. (Mac OS) 13. One ___ is equivalent to 1024 GB. (Terabyte) 14. Which device listed below is an example of a processing hardware device? ( hardware, Central processing Unit (CPU)) 15. Windows only work with __ from Intel and companies who comply with In tel instruction set. (Processors) 16. The operating system employs ___ so that users can run multiple applications and files at the same time. (memory swapping) 17. Software vendors should make it easier for users to download and apply ___ t o fix known holes in their software.(patches) 18. A collection of servers called a ___ coordinates the activities of hundreds of users. (Server farm) 19. ___ Software is installed in special, read-only memory in devices like printers or communication devices. (Firmware) 20. ___ software consist of programs that perform business functions like general ledger and accounting. (Application) 21. RAM is an example of: (volatile memory)

22. A ___ holds up to 4.7 GB and is good for backing up files. (DVD) 23. Main memory contains data and instructions for the ___ program, which controls the computers resources. (operating system) 24. A virus delivers a(n) ___ when i ts program deletes and programs data. (worm) 25. A ___ virus attaches itself to Word, Excel, or other type of documents. (macro) 26. Which device listed below is an example of an output hardware device? (Printer) 27. ___ software are programs that control the computers resources. (Operating system) 28. A ___ is a virus that replicates itself over the Internet and other networks. (Worm) 29. When a user opens a new program, the CPU may make a ___ and move a b lock of unused data to make room for the one just called up. (Memory swap) 30. A ___ is a virus that disguises itself as a program or game and secretly delivers a payload. (Trojan Horse) 31. Hardware includes all of the following except: (instruction sets) 32. ___ is a special CPU and memory that stores and processes video images. (Video processor) 33. Which device listed below is an example of a storage hardware device? (Optical disc) 34. The surface of an ___ disc is treated so that it can reflect light to represent binary data. (Optical) 35. A bar code scanner would be an example of a (n): (Input device) 36. The quickest and least risky option for software buying is the tried and t rue ___. (off the shelf applications) 37. Data in the CPU is processed in the form of: (bits) 38. A bit has a value of: (0 or 1) 39. Monitors display images by illuminating a grid of dots called ___ on the screen. (pixels) 40. The CPU works in conjunction with the ___. (Main memory) 41. ___ software is developed for a specific, unique need. (One-of-a-kind application) 42. ___ are commands that CPU can process. It may be specific for each processor type. (Instruction sets) 43. Data moves between components on the motherboard via the: (Data Bus) 44. ___ is by far the most popular type of memory device. (Magenetic disk) 45. ___ is generally regarded as one of the more difficult operating systems to learn to use. (Unix) 46. The ___ of a CPU is measured in hertz. (Clock speed) 47. The ___ the dot pitch, sharper and brighter the screen image will be. (smaller) 48. A grocery scanning checkout system would be an example of: (Vertical market software) 49. Every monitor has a(n) ___ which is the size of the pixel grid that will give the best sharpness and clarity. (Optimal resolution)

Potrebbero piacerti anche