In the larger picture, _____ are common tools in all areas of life. A) supercomputers
B) microcomputers
C) mainframes D) minicomputers
Feedback: Microcomputers are common tools in all areas of life. Writers write, artists draw, engineers and scientists calculate-all on microcomputers.
2 INCORRECT Software and hardware manufacturers provide manuals stating the _____ in either a printed format or in electronic form. A) software features B) adjoining outputs list C) adjoining utilities list
D) procedures
Feedback: Software and hardware manufacturers provide manuals with their products. These manuals are provided either in printed or electronic form. 3 CORRECT Which of the following is an example of connectivity?
A) Internet
B) Floppy disk C) Power cord D) Data
Feedback: Connectivity allows computers to connect and share information. This includes Internet connections.
4 CORRECT Minicomputers are also known as A) midrange computers. B) personal digital assistants. C) mainframe computers. D) laptop computers.
Feedback: Minicomputers are also known as midrange computers.
5 INCORRECT The concept describing the ability of end users to tap into resources well beyond their desktops is called A) networks. B) connectivity. C) centralized source. D) open source.
Feedback: Wireless connection is the ability to communicate with other computers without requiring a physical connection such as wires.
6 INCORRECT To be competent with computer technology, one needs to know the five parts of an information system, including people, procedures, software, hardware, and the Internet, along with knowledge about the Web. A) True B) False
Feedback: To be competent with computer technology, you need to know the five parts of an information system: people, procedures, software, hardware, and data.
7 CORRECT Connectivity allows users to greatly expand the capability and usefulness of their information systems. A) True B) False
Feedback: Connectivity allows computers to connect and share information. Connections can be by telephone lines, by cable, through the air.
8 INCORRECT Specialized applications are the kinds of programs that people have to know to be considered computer competent. A) True B) False
Feedback: Basic applications are widely used in nearly all career areas. They are the kinds of programs you have to know to be considered computer competent.
9 CORRECT The microprocessor controls and manipulates data to produce information. A) True B) False
Feedback: The microprocessor controls and manipulates data to produce information.
10 CORRECT The three types of optical discs include compact disks, digital versatile discs, or videos, and high definition discs. A) True B) False
This provides in one tool an uncomplicated interface to the Internet and Web documents. A) Internet service providers. B) Browsers. C) E-mail. D) Filters.
Feedback: Browsers are programs that provide access to Web resources. They provide in one tool an uncomplicated interface to the Internet and Web documents.
2 INCORRECT These typically appear as underlined and colored text and/or images. A) Top-level domain names. B) Protocols. C) Applets. D) Hyperlinks.
Feedback: Hyperlinks or links connect to other documents containing related information-text files, graphic images, audio, and video clips and typically appear on the Web page as underlined and colored text and/or images.
3 CORRECT The recently enacted CAN-SPAM Act requires that marketing-related e-mail provide an _____ option. A) opt-out B) no-send C) only-once D) block-me
Feedback: The recently enacted CAN-SPAM Act requires that every marketing-related e-mail provide an opt-out option. When the option is selected, the recipient's e-mail address is to be removed from future mailing lists. Failure to do so results in heavy fines.
4 CORRECT These search engines receive the results of the search, eliminate duplicates, orders and hits, and then provides the edited list to the user. A) Metasearch engines. B) Keyword searches. C) Directory searches. D) Specialized engines.
Feedback: Metasearch engines are programs that automatically submit your search request to several search engines simultaneously.
5 INCORRECT Whether the author of information on a Web site appears to have a personal agenda aimed at convincing or changing the reader's opinion is answered under this variable. A) Accuracy. B) Authority. C) Objectivity. D) Currency.
Feedback: Objectivity: Is the information factually reported or does the author have a bias. Does the author appear to have a personal agenda aimed at convincing or changing the reader's opinion?
6 CORRECT
Business-to-consumer often eliminates the middleman by allowing manufacturers to sell directly to customers. A) True B) False
Feedback: Business-to-consumer (B2C) involves the sale of a product or service to the general public or end users. eliminates the middleman by allowing manufacturers to sell directly to customers.
7 INCORRECT The only advantage that e-trading has over traditional full service brokers is that it is very convenient. A) True B) False
Feedback: While e-trading is more convenient than using a traditional full service broker, the greatest advantage is cost.
8 INCORRECT Digital cash is as or more convenient than credit card purchases, and is more secure. A) True B) False
Feedback: Digital cash is the Internet's equivalent to traditional cash. Although not as convenient as credit card purchases, digital-cash is more secure.
9 CORRECT Thinkfree is an example of a Web-based application program. A) True B) False
Feedback: An emerging trend, however, is to free users from owning and storing applications by using Web-based services such as ThinkFree.
10 CORRECT Filter programs allow parents as well as organizations to block out selected sites and set time limits. A) True B) False
Feedback: Filters block access to selected sites. Filter programs allow parents as well as organizations to block out selected sites and set time limits.
This type of software is designed to help you be more productive in performing tasks, and is widely used in nearly every discipline and occupation. A) Communications software B) Utility software C) Basic applications software D) System software
2.
Which one of the following would not be one of the most widely used word processing program? A) Word B) WordPerfect C) Word Pro D) AbiWord
3. Which among the following statements is incorrect? A) A numeric entry can be a number or a formula. B) Rows are identified by letters and columns are identified by numbers. C) A range is a series of continuous cells. D) Workbook files consist of one or more related worksheets.
4. These are primarily used to enter new records and to make changes to existing records. A) Questions B) Reports C) Forms D) Queries
5. Microsoft Works Suite is classified as this type of software suite. A) Utility B) Productivity C) Personal D) Specialized
6. A cell can contain text entries or labels, which provide structure to a worksheet by describing the contents of rows and columns. A) True B) False
7. Analytical graphs or charts are numeric representations of data in a worksheet. A) True B) False
8.
Master slides appear in presentation; control format and placement of all slides in a presentation. A) True B) False
9. Object linking and embedding (OLE) is a feature to dynamically share and exchange data. A) True B) False
10. With object embedding, the object is embedded into the destination file and the embedded object can be run from that file. A) True B) False
Artificial intelligence programs include all of the following, except A) virtual reality. B) robotics. C) knowledge-based systems. D) integration tools.
Feedback: Advanced applications include graphics programs, audio and video editing software, multimedia, web authoring, and artificial intelligence, including virtual reality, knowledge-based systems, and robotics.
2 INCORRECT An essential ingredient for effective multimedia presentations incorporates user participation or __________. A) links B) buttons C) interactivity D) integration
Feedback: Interactivity allows the user to choose the information to view, to control the pace and flow of information, and to respond to items and receive feedback.
3 INCORRECT Which among the following is not a specialized or powerful program typically used to create sophisticated commercial sites? A) Macromedia Dreamweaver B) Microsoft FrontPage C) NetObjects Fusion D) Adobe Photoshop
Feedback: Widely used Web authoring programs include Macromedia Dreamweaver, NetObjects Fusion, and Microsoft FrontPage.
4 INCORRECT A special effect in which one image seems to melt into another is referred to as A) drifting. B) flashing. C) morphing. D) polling.
Feedback: Morphing is a special effect in which one image seems to melt into another.
5 INCORRECT A simulated experience generated by computer, like visiting the surface of the sun or experiencing life inside a human blood cell, is called __________. A) fuzzy logic B) extended experience C) virtual reality D) knowledge system
Feedback: Virtual reality is an artificial, or simulated, reality generated in 3-D by a computer.
6 CORRECT Page layout programs, allow you to mix text and graphics to create publications of professional quality. A) True B) False
Feedback: Desktop publishing programs, or page layout programs, allow you to mix text and graphics to create publications of professional quality.
7 INCORRECT Illustration programs, also known as drawing programs, are used to create and edit bitmap images. A) True B) False
Feedback: Illustration programs, also known as drawing programs, are used to create and edit vector images.
8 CORRECT Flash animation is a specialized program available to aid in the creation of animation. A) True B) False
Feedback: One type of interactive animation is produced using software from Adobe, called Flash; it is usually full-screen, highly dynamic, and interactive.
9 INCORRECT Virtual reality programs are not popular since they require very-high-end software costing several thousands of dollars. A) True
B) False
Feedback: Recently, several lower-cost yet powerful authoring programs have been introduced.
10 INCORRECT Virtual reality based expert system allow users to respond to questions with phrases such as, "great," "OK," "terrible," and so on. A) True B) False
Feedback: Many expert systems use so-called fuzzy logic, which allows users to respond to questions in a very humanlike way.
Specialized programs that allow particular input or output devices to communicate with the rest of the computer system are called A) operating systems. B) utilities. C) device drivers. D) language translators.
2. "GUI" stands for A) Gnutella Universal Interface. B) Graphic Uninstall/Install.
C) Graphical User Interface. D) General Utility Interface.
3. Popular network operating systems include all of the following EXCEPT A) NetWare. B) Windows NT Server. C) Windows XP Server. D) Microsoft DOS.
4. If you were trying to locate a lost file on your Macintosh, which application would you use? A) Dock B) Sherlock C) Aqua D) DiskCheck
5. Which of the following is a type of utility used to reduce the size of files to increase the amount of available disk space?
A) file compression program B) troubleshooting program C) antivirus program D) uninstall program
6. A cold boot occurs when the computer is already on and you restart it without turning off the power. A) True B) False
7. Desktop operating systems control various desktops or notebook computers. A) True B) False
8. Linux is an example of a proprietary operating system. A) True B) False
9. Dashboard Widgets are a collection of specialized programs that will constantly update and display information. A) True B) False
10. Norton SystemWorks is one of the most widely used utility suites. A) True B) False
Which of the following is the smallest unit? A) Desktop System Unit B) Notebooks System Unit C) PDA System Unit D) Tablet PC's
2.
Connection point for small specialized electronic parts called chips are provided by A) sockets. B) slots. C) bays. D) chips.
3. When two pieces of data are compared to see whether one is equal to (=), less than (<), or greater than (>) the other, then it is a A) logical operation. B) arithmetic operation. C) graphic operation. D) mathematical operation.
4. This type of memory is commonly called temporary or volatile storage. A) RAM B) ROM C) Flash memory D) virtual memory
5. Memory that cannot be changed is referred to as A) RAM. B) ROM. C) flash memory. D) virtual memory.
6. The CPU is composed of two units: the control unit and the arithmetic control unit. A) True B) False
7. The dual-core chip, can provide two separate and independent CPUs. A) True B) False
8.
Chip capacities is often expressed in byte size. A) True B) False
9. USB is designed to support several external devices without using an expansion card or slots. A) True B) False
10. FireWire buses and ports are used to connect magnetic and optical disk drives to the system board with far greater speed that other buses and slots. A) True B) False
This type of mouse is generally considered the traditional type and is currently the most widely used. A) Mechanical B) Cordless C) Wireless D) Optical
2. Recent versions of Microsoft's Word support A) biometrics. B) voice recognition. C) handwriting recognition. D) touch screen functions.
3. Specialized devices, similar to slide projectors, which connect to microcomputers and project computer output just as it would appear on a monitor are called A) data projectors. B) media players. C) projectors. D) HDTVs.
4. Specialized devices for storing, transferring, and playing audio files are called A) digital media players B) CD players C) MP3 players
D) DVD players
5. A combination of different devices into one unit is known as a A) multifunctional device. B) single-use device. C) shared device. D) flatbed device.
6. A joystick is the most popular input device for computer games. A) True B) False
7. Handwriting recognition software translates Lotus notes into a form that the system unit can process. A) True B) False
8. Grocery stores use bar-code scanners to read UPCs on products. A) True B) False
9. Traditional video cameras record motion digitally on a disk or in the camera's memory. A) True B) False
10. Size is measured by the horizontal length of a monitor's viewing area. A) True B) False
Data is transmitted as pulses of light through tiny tubes of glass in ______. A) Fiber-optic cables
B) Telephone lines C) Coaxial cables D) FireWire
2. Which of the following is used to transfer data and information from a portable device such as a notebook or PDA to a desktop computer? A) Infrared B) Microwave C) Satellite D) Broadcast radio
3. Which among the following is effective for transmitting text documents, but too slow for high-quality audio and video? A) Broadband B) Medium band C) Audioband D) Voiceband
4. This type of network provides access to regional service providers and typically span distances greater than 100 miles. A) LAN B) MAN C) WAN D) WLAN
5. Which among the following do not use the full possessing power available with microcomputers? A) Client/server networks B) Terminal networks C) Peer-to-peer network D) Star network
6. Communication systems are electronic systems that transmit data from one location to another. A) True B) False
7. T1, T2, T3 and T4 lines support all digital communications and provide very high-speed capacity. A) True B) False
8. Cable modems use existing telephone lines to provide high-speed connections. A) True B) False
9. The rules for exchanging data between computers are known as protocols. A) True B) False
10. A Node is any device that is connected to a network. It could be a computer, printer, or data storage device. A) True B) False
The issues that deal with the collection and use of data about individuals is A) access. B) property. C) accuracy. D) privacy.
2. Privacy is primarily a(n) _____ matter. A) ethical B) legal C) security D) business
3. People who gain unauthorized access to computers for the purpose of doing damage are called ____. A) employees B) hackers C) members of organized crime D) crackers
4. _________ is a computer monitoring software. A) Web bug B) Keystroke loggers C) Cookie D) Snoopware
5. When a hard disk crashes, it is an example of a ____ type of computer security threat. A) natural hazard B) criminal C) technological failure D) civil strife
6. There is a large market for data collected about individuals. A) True B) False
7. Privacy of information is primarily a legal issue according to the Financial Moderization Act. A) True B) False
8. Viruses are spread from computer to computer through networks and operating systems. A) True B) False
9. Unauthorized copying of programs for personal gain is a form of theft called service theft. A) True B) False
10. Ergonomics is defined as the study of human factors related to things people use. A) True
B) False
Any human-centered activity within an organization is part of A) research. B) human resources. C) production. D) marketing.
2. Which of the following include weekly sales and production schedules? A) employee-level workers B) middle management C) supervisor-level management D) top-level management
3. The money that the company owes for goods or services is handled by A) accounts receivable B) inventory C) sales order processing
D) accounts payable
4. A(n) _________ produces reports that are predetermined. A) transaction processing system B) decision support system C) executive support system D) management information system
5. __________ are designed primarily to support data workers. A) Project managers B) Videoconferencing systems C) Knowledge work systems D) Office automation systems
6. Purchasing is the buying of materials and services. A) True
B) False
7. In general, the user of a GDSS is some sort of decision maker. A) True B) False
8. Executive support systems are designed to be easy to use. A) True B) False
9. Employees who distribute, create, and communicate information are called e-workers. A) True B) False
10. CAD/CAM systems are widely used in the processing of perishable products. A) True B) False
Which view of information focuses on the meaning and content of the data? A) physical view B) intellectual view C) logical view D) information view
2. A collection of related files is called a A) character B) database C) field D) record
3. Which of the following is not an advantage of using a database? A) security
B) reliability C) less data redundancy D) integrity
4. In a network database model, each child node may have more than one parent node. This relationship is called A) one-to-many B) one-to-one C) many-to-many D) combined join
5. This database model organizes data using objects, classes, entities, attributes, and methods. A) hierarchical B) network C) relational D) object-oriented
6.
Data must be in the form of text. A) True B) False
7. The key field uniquely identifies each record. A) True B) False
8. A hyper plane is the basic data structure used in a multidimensional database. A) True B) False
9. Most proprietary databases are free to use. A) True B) False
10. The term "data mining" refers to the process of sorting through huge volumes of data to extract information. A) True B) False
More and more end users are developing their own information systems. This is because in many organizations there is a _____ backlog of work for systems analysts. A) two-month B) seven-months C) one-year D) three-year
2. Who among the following study an organization's systems and determine what actions to take and how to use computer technology to assist them? A) Computer engineers B) Systems analysts C) Systems engineers D) Database administrator
3. Which among the following is supervised by a systems analyst in case the information is large, or if the information is small, by the end user? A) Suggesting alternative solutions B) Preparing a short report C) Defining the problem D) Gathering data
4. Organization charts are useful for which of the following steps in the systems life cycle? A) Gathering data B) Documenting systems analysis C) Designing alternative systems D) Testing the new system
5. The places where equipment needs to be installed is a very critical decision involved with the _____ phase of the systems life cycle. A) testing the new software B) systems implementation C) periodic evaluation
D) acquiring hardware
6. The whole point of the systems implementation phase of the systems life cycle is to apply logic to the existing arrangement to see how workable it is. A) True B) False
7. RAD relieves the systems analysts of many repetitive tasks, develop clear documentation, and, for larger projects, coordinate team member activities. A) True B) False
8. A system flowchart is the same as the program flowchart. A) True B) False
9. In the pilot approach, risks can be controlled since problems are confined to only certain areas of the organization. A) True B) False
10. A professional software trainer is often used to show people how to use the system in the systems implementation phase. A) True B) False