0% found this document useful (0 votes)
315 views

Study Guide Final Exam Computer 101

This document is a study guide for a final exam in CIS105 that covers multiple choice questions about various computing topics. It includes 36 multiple choice questions testing knowledge of topics like communication channel capacity, virtual machine operating systems, data storage formats, word processors, mobile operating systems, object-oriented programming, malware types, logic structures, communication systems, management information systems, hard disk failures, user support systems, file compression, transaction processing, systems implementation phases, desktop publishing, audio/visual ports, presentation software, inventory control systems, storage capacity, decision support systems, database types, expansion slots, computer security threats, system software functions, data transmission, network databases, copyright law, external storage ports, coprocessors, network roles

Uploaded by

Gabriella
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
315 views

Study Guide Final Exam Computer 101

This document is a study guide for a final exam in CIS105 that covers multiple choice questions about various computing topics. It includes 36 multiple choice questions testing knowledge of topics like communication channel capacity, virtual machine operating systems, data storage formats, word processors, mobile operating systems, object-oriented programming, malware types, logic structures, communication systems, management information systems, hard disk failures, user support systems, file compression, transaction processing, systems implementation phases, desktop publishing, audio/visual ports, presentation software, inventory control systems, storage capacity, decision support systems, database types, expansion slots, computer security threats, system software functions, data transmission, network databases, copyright law, external storage ports, coprocessors, network roles

Uploaded by

Gabriella
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Study Guide Final Exam CIS105 F2019

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the
question.
1) The capacity of a communication channel is measured in ________. 1) _______
A) bit capacity B) data flow C) band rate D) bandwidth

2) In a virtualized environment, the operating system of each virtual machine is known as 2) _______
the ________ operating system.
A) client B) host C) guest D) home

3) Hard disks store and organize files using all the following, except ________. 3) _______
A) tracks B) cylinders C) paths D) sectors

4) ________ are used to create text-based documents. 4) _______


A) Presentation programs B) Databases
C) Word processors D) Spreadsheets

5) Which of the following is not a popular mobile operating system? 5) _______


A) Android B) iOS
C) UNIX D) Windows 10 Mobile

6) In OOP, each ________ contains both the data and processing operations necessary to 6) _______
perform a task.
A) unstructured program B) structured program
C) content component D) object

7) Which of the following is not malware? 7) _______


A) worms B) Ad-Aware
C) viruses D) Trojan horses

8) IF-THEN-ELSE is also known as a ________ structure, one of the types of logic 8) _______
structures.
A) random B) loop C) selection D) sequential

9) In a communication system, which among the following convert messages into packets 9) _______
that can travel across the communication channel?
A) storage devices B) connection devices
C) secondary devices D) sending and receiving devices

10) An MIS requires a(n) ________ management system to integrate data from different 10) ______
departments.
A) decision support B) executive support
C) general ledger D) database

1
Study Guide Final Exam CIS105 F2019

11) The hard-disk's surface is scratched and some or all of the data is destroyed when there 11) ______
is a ________.
A) head crash B) track crash
C) sector crash D) cylinder crash

12) A(n) ________ support system is designed to be easy to use and allows someone to 12) ______
obtain essential information without extensive training.
A) management information B) executive
C) decision D) transaction processing

13) Before sending a large file over the Internet, you might want to use one of these 13) ______
programs.
A) Disk defragmenter B) Disk cleanup program
C) Uninstaller D) File compression program

14) TPS stands for ________. 14) ______


A) transaction processing system B) two-way processor synchronization
C) Trojan prevention system D) triple port synchronization

15) Another name for Phase 5: Systems Implementation is ________. 15) ______
A) analysis B) feasibility C) development D) conversion

16) ________ programs allow you to mix text and graphics to create publications of 16) ______
professional quality.
A) Word processing B) Desktop publishing
C) Presentation D) Spreadsheet

17) ________ ports are audiovisual ports typically used to connect large monitors. 17) ______
A) S/PDIF B) MIDI C) MiniDP D) Thunderbolt

18) ________ are programs that combine a variety of visual objects to create attractive, 18) ______
visually interesting presentations.
A) Presentation software B) Spreadsheets
C) Desktop publishers D) DBMS

19) When an order comes in, the ________ activity alerts the warehouse to ship a product. 19) ______
A) decision support system B) inventory control system
C) sales order processing D) general ledger

20) The ________ of a secondary storage device indicates how much data the storage 20) ______
medium can hold.
A) capacity B) access C) memory D) storage

21) A decision support system consists of four parts: the user, system software, data, and 21) ______
________.
A) decision models B) supervisory discretion
C) management models D) general ledger analysis
2
Study Guide Final Exam CIS105 F2019

22) In a(n) ________ database, any action on one element immediately affects the elements 22) ______
related to it.
A) hierarchical B) multidimensional
C) relational D) object-oriented

23) Network interface cards (NIC) are connected through ________ on the system board. 23) ______
A) ports B) sound cards
C) expansion slots D) wireless network cards

24) A program that replicates itself and clogs computers and networks. 24) ______
A) Trojan horse B) virus
C) worm D) denial-of-service attack

25) ________ consists of programs designed to work behind the scenes to handle detailed 25) ______
operating procedures.
A) Decision support B) Internal data
C) External data D) System software

26) Activities in the program maintenance area fall under two categories: ________ and 26) ______
changing needs.
A) system flowcharts B) sample output
C) program listings D) operations

27) ________ is the process of breaking down information sent or transmitted across the 27) ______
Internet into small parts.
A) Bandwidth B) Identification C) Protocol D) Packetization

28) In a network database, a node may be reached through more than one path with the help 28) ______
of ________.
A) pointers B) connectors C) strings D) links

29) According to which law is it illegal for an owner of a commercial program to make 29) ______
backup copies for their personal use and resell or give them away?
A) Computer Fraud and Abuse Act B) The Gramm-Leach-Bliley Act
C) Digital Millennium Copyright Act D) Computer Abuse Amendments Act

30) ________ ports provide high-speed connections for external disk drives, optical disks, 30) ______
and other large secondary storage devices.
A) MiniDP B) Ethernet C) eSATA D) MIDI

31) These specialty chips are designed to improve specific computing operations such as 31) ______
displaying 3D images and encrypting data.
A) smartcards B) coprocessors C) NIC cards D) CPUs

3
Study Guide Final Exam CIS105 F2019

32) The ________ is the central node that coordinates the flow of data by sending messages 32) ______
directly between the sender and receiver nodes.
A) switch B) server C) gateway D) client

33) ________ transmits data as pulses of light through tiny tubes of glass. 33) ______
A) WiMax B) Microwave
C) Cellular D) Fiber optic cable

34) The essential features of this include identifying, sending, and receiving devices and 34) ______
breaking information into small parts for transmission across the Internet.
A) FTP B) TCP/IP C) HTTPs D) DNS

35) System ________ show the flow of input data to processing and finally to output. 35) ______
A) grids B) top-down analysis
C) flowcharts D) checklists

36) Basic activities in every accounting department, including sales order processing, 36) ______
accounts receivable, inventory and purchasing, accounts payable, and payroll, are
recorded in the ________.
A) inventory control system B) accountant's database
C) general ledger D) corporate database

37) ________ is concerned with protecting software and data from unauthorized tampering 37) ______
or damage.
A) Disaster recovery plan B) Data backup
C) Physical security D) Data security

38) ________ is the name of the process of converting from analog to digital. 38) ______
A) Optical recognition B) Modulation
C) Demodulation D) Virtualization

39) Which of the following is not a popular desktop operating system? 39) ______
A) Android B) Linux C) Windows 10 D) macOS X

40) ________ ensures that there aren't multiple sources of the same data. 40) ______
A) Reliability B) Sharing
C) Security D) Data integrity

41) Which among the following is a way to shut down an ISP or website? 41) ______
A) Trojan horses B) viruses
C) denial-of-service attack D) worms

42) In a(n) ________ database, a node may be reached through more than one path with the 42) ______
help of pointers.
A) relational B) network
C) multidimensional D) object-oriented

4
Study Guide Final Exam CIS105 F2019

43) ________ processing is also known as online processing. 43) ______


A) Batch B) Consignment C) Real-time D) Group

44) The ________ report describes the current information system, the requirements for a 44) ______
new system, and a possible development schedule.
A) top-down analysis B) data flow
C) systems analysis D) components

45) A(n) ________ shows the relationship between input and output documents. 45) ______
A) investigation report B) checklist
C) top-down analysis D) grid chart

46) The category of operating system used for handheld devices. 46) ______
A) stand-alone B) open source C) network D) embedded

47) A(n) ________ is a program that provides modules of prewritten code. 47) ______
A) application generator B) artificial intelligence
C) machine language D) pseudocode

48) ________ of the system happens after the installation of software and hardware. 48) ______
A) Implementation B) Design analysis
C) Management studies D) Testing

49) Creating a website is called web ________. 49) ______


A) specializing B) processing C) authoring D) management

50) A computer can become infected with viruses in all the following ways, except by 50) ______
________.
A) downloading software from the Internet
B) creating a new folder on your computer
C) opening attachments to email messages
D) downloading files from the web

51) ________ software is end-user software designed to accomplish a variety of tasks. 51) ______
A) System B) Application
C) Communications D) Utility

52) ________ memory uses the hard drive to substitute for RAM. 52) ______
A) Virtual B) Cache C) Hard drive D) Flash

53) Digital photographs consist of thousands of dots, or ________, that form images. 53) ______
A) rasters B) pixels C) vectors D) bitmaps

54) In the ________ database, data elements are stored in different tables, each of which 54) ______
consists of rows and columns.
A) hierarchical B) relational
C) object-oriented D) network
5
Study Guide Final Exam CIS105 F2019

55) Which of the following allows a computer to run two or more operations 55) ______
simultaneously?
A) multicore processors B) multiplexing
C) coprocessors D) binary system

56) ________ are used to quickly create a presentation by providing predesigned styles and 56) ______
layouts as well as suggested content based on the type you choose.
A) Templates B) Galleries C) Groups D) Tabs

57) This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals 57) ______
information such as usernames and passwords.
A) fake B) rogue C) virus D) worm

58) An important aspect of the preliminary investigation phase is to ________. 58) ______
A) prepare a preliminary investigation report
B) suggest alternative solutions
C) analyze the data
D) gather the data

59) ________ show the data or information flow within an information system; the data is 59) ______
traced from its origin through processing, storage, and output.
A) Data flow diagrams B) Top-down analysis methods
C) Grid charts D) System flow charts

60) The ________ approach to systems implementation is used only in cases in which the 60) ______
cost of failure or of interrupted operation is great.
A) direct B) pilot C) phased D) parallel

61) All of the following are true of DVD-ROM drives except: 61) ______
A) They can provide over two hours of high-quality video and sound comparable to
that found in motion picture theaters.
B) They are also known as erasable optical discs.
C) DVD-ROM stands for "digital versatile disc-read only memory."
D) They are a type of optical disc.

62) This version of UNIX is an open source operating system that is an alternative to 62) ______
Windows.
A) Lion B) High Sierra C) Sierra D) Linux

63) The repetition, or ________ structure, describes a process that may be repeated as long 63) ______
as a certain condition remains true.
A) loop B) random C) sequential D) selection

64) Which of the following is not a measure to protect computer security? 64) ______
A) encrypting data
B) keeping the same password on all systems consistently
6
Study Guide Final Exam CIS105 F2019

C) copying data and storing it at a remote location


D) restricting access

65) Frequently accessed information is held in ________. 65) ______


A) read only memory B) the hard drive
C) flash memory D) cache memory

66) This process improves system performance by acting as a temporary high-speed 66) ______
holding area between a secondary storage device and the CPU.
A) RAID B) disk caching
C) data compression D) data access

67) A ________ error occurs when the programmer uses an incorrect calculation or leaves 67) ______
out a programming procedure.
A) syntax B) machine C) translation D) logic

68) Program ________ graphically present the detailed sequence of steps needed to solve a 68) ______
programming problem.
A) flowcharts B) pseudocode C) loops D) modules

69) ________ organize, analyze, and graph numeric data such as budgets and financial 69) ______
reports.
A) Presentation programs B) Databases
C) Word processors D) Spreadsheet programs

70) The range of Wi-Fi networks using microwave connections is being extended over 70) ______
greater distances using a new technology known as ________.
A) WiMax B) Bluetooth C) RAID D) broadcast

71) A typical ________ system can produce income statements and balance sheets. 71) ______
A) executive support B) management information
C) decision support D) general ledger

72) Common names for computer-based information systems are transaction processing, 72) ______
management information, ________, and executive support systems.
A) virtual support B) decision support
C) cloud information D) reflective information

73) Proofreading a printout of a program is known as desk checking or code ________. 73) ______
A) modulation B) feedback C) calculation D) review

74) An external hard disk ________. 74) ______


A) is heavy
B) cannot be used in addition to an internal hard disk
C) usually connects to a USB or Thunderbolt port
D) is hard to remove
7
Study Guide Final Exam CIS105 F2019

75) ________ models assist top-level managers in long-range planning, such as stating 75) ______
company objectives or planning plant locations.
A) Operational B) Corporate C) Strategic D) Tactical

76) Organizations use the following to allow suppliers and others limited access to their 76) ______
networks.
A) extranets B) firewalls C) intranets D) proxy servers

77) Monthly sales and production reports are examples of ________ reports. 77) ______
A) on-demand B) periodic C) exception D) executive

78) When evaluating alternative systems, systems designers must consider economic 78) ______
feasibility, ________ feasibility, and operational feasibility.
A) top-down B) currency C) digital D) technical

79) ________ images are made up of geometric shapes or objects. 79) ______
A) Raster B) Pixel C) Vector D) Bitmap

80) In a Ribbon GUI, ________ are used to divide the ribbon into major activity areas. 80) ______
A) dialog boxes B) tabs C) galleries D) groups

81) Systems designers evaluate each alternative in the systems design phase for ________ 81) ______
by looking at economic, technical, and operational factors.
A) accuracy B) feasibility C) currency D) organization

82) The third phase in the systems life cycle is the systems ________ phase. 82) ______
A) implementation B) analysis
C) design D) maintenance

83) A ________ is a collection of related data—the electronic equivalent of a file cabinet. 83) ______
A) presentation B) spreadsheet C) gallery D) database

84) This operating system is designed to run only with Apple computers. 84) ______
A) macOS B) Linux C) Windows D) UNIX

85) These programs record virtually everything you do on your computer and are used by 85) ______
employers to search employee email and computer files.
A) employee-monitoring software B) freeware
C) spyware D) cookies

86) The systems design report presents the ________. 86) ______
A) costs versus the benefits B) possible development schedule
C) description of the current system D) requirements for a new system

87) All the following are commonly used units of measurement to describe memory 87) ______
capacity, except ________.
8
Study Guide Final Exam CIS105 F2019

A) gigabyte (GB) B) terabyte (TB)


C) nanobyte (NB) D) megabyte (MB)

88) Documentation written for programmers should include text and program flowcharts, 88) ______
________, and sample output as well as system flowcharts.
A) program listings B) logic errors
C) pseudocode D) syntax errors

89) ________ ports provide high-speed connections for up to seven separate devices 89) ______
connected one to another.
A) MIDI B) eSATA C) Thunderbolt D) Ethernet

90) A ________ error is a violation of the rules of the programming language. 90) ______
A) machine B) logic C) syntax D) translation

91) Storage that retains its data after the power is turned off is referred to as ________. 91) ______
A) nonvolatile storage B) sequential storage
C) volatile storage D) direct storage

92) As opposed to general-purpose applications, which are widely used in nearly every 92) ______
discipline, ________ applications are more narrowly focused.
A) electronic B) object-oriented
C) specialized D) web authoring

93) ________ languages can be run on more than one kind of computer. 93) ______
A) Assembly B) Portable
C) Task-oriented D) Machine

94) The scenario wherein many files about the same person exist across different 94) ______
departments within an organization is called data ________.
A) duplication B) repetition C) redundancy D) doubling

95) The process of coding information to make it unreadable except to those who have a 95) ______
special piece of information known as a key.
A) restriction B) security C) protection D) encryption

96) Which among the following is considered a line-of-sight communication medium? 96) ______
A) satellite B) Bluetooth
C) microwave D) broadcast radio

97) A(n) ________ decision support system is used to support collective work. 97) ______
A) executive B) supervisory C) group D) transaction

98) ________ uses standard telephone lines to provide high-speed connections. 98) ______
A) Cellular B) DSL C) Satellite D) Cable

9
Study Guide Final Exam CIS105 F2019

Which of the following is not an example of secondary storage? 99) ______


99)
A) RAM B) external hard drives
C) flash drives D) RAID

100) Which of the following characteristics about RAID is incorrect? 100) _____
A) highly reliable B) fast access speed
C) expanded storage capability D) one high-capacity hard disk drive

10

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy