Study Guide Final Exam Computer 101
Study Guide Final Exam Computer 101
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the
question.
1) The capacity of a communication channel is measured in ________. 1) _______
A) bit capacity B) data flow C) band rate D) bandwidth
2) In a virtualized environment, the operating system of each virtual machine is known as 2) _______
the ________ operating system.
A) client B) host C) guest D) home
3) Hard disks store and organize files using all the following, except ________. 3) _______
A) tracks B) cylinders C) paths D) sectors
6) In OOP, each ________ contains both the data and processing operations necessary to 6) _______
perform a task.
A) unstructured program B) structured program
C) content component D) object
8) IF-THEN-ELSE is also known as a ________ structure, one of the types of logic 8) _______
structures.
A) random B) loop C) selection D) sequential
9) In a communication system, which among the following convert messages into packets 9) _______
that can travel across the communication channel?
A) storage devices B) connection devices
C) secondary devices D) sending and receiving devices
10) An MIS requires a(n) ________ management system to integrate data from different 10) ______
departments.
A) decision support B) executive support
C) general ledger D) database
1
Study Guide Final Exam CIS105 F2019
11) The hard-disk's surface is scratched and some or all of the data is destroyed when there 11) ______
is a ________.
A) head crash B) track crash
C) sector crash D) cylinder crash
12) A(n) ________ support system is designed to be easy to use and allows someone to 12) ______
obtain essential information without extensive training.
A) management information B) executive
C) decision D) transaction processing
13) Before sending a large file over the Internet, you might want to use one of these 13) ______
programs.
A) Disk defragmenter B) Disk cleanup program
C) Uninstaller D) File compression program
15) Another name for Phase 5: Systems Implementation is ________. 15) ______
A) analysis B) feasibility C) development D) conversion
16) ________ programs allow you to mix text and graphics to create publications of 16) ______
professional quality.
A) Word processing B) Desktop publishing
C) Presentation D) Spreadsheet
17) ________ ports are audiovisual ports typically used to connect large monitors. 17) ______
A) S/PDIF B) MIDI C) MiniDP D) Thunderbolt
18) ________ are programs that combine a variety of visual objects to create attractive, 18) ______
visually interesting presentations.
A) Presentation software B) Spreadsheets
C) Desktop publishers D) DBMS
19) When an order comes in, the ________ activity alerts the warehouse to ship a product. 19) ______
A) decision support system B) inventory control system
C) sales order processing D) general ledger
20) The ________ of a secondary storage device indicates how much data the storage 20) ______
medium can hold.
A) capacity B) access C) memory D) storage
21) A decision support system consists of four parts: the user, system software, data, and 21) ______
________.
A) decision models B) supervisory discretion
C) management models D) general ledger analysis
2
Study Guide Final Exam CIS105 F2019
22) In a(n) ________ database, any action on one element immediately affects the elements 22) ______
related to it.
A) hierarchical B) multidimensional
C) relational D) object-oriented
23) Network interface cards (NIC) are connected through ________ on the system board. 23) ______
A) ports B) sound cards
C) expansion slots D) wireless network cards
24) A program that replicates itself and clogs computers and networks. 24) ______
A) Trojan horse B) virus
C) worm D) denial-of-service attack
25) ________ consists of programs designed to work behind the scenes to handle detailed 25) ______
operating procedures.
A) Decision support B) Internal data
C) External data D) System software
26) Activities in the program maintenance area fall under two categories: ________ and 26) ______
changing needs.
A) system flowcharts B) sample output
C) program listings D) operations
27) ________ is the process of breaking down information sent or transmitted across the 27) ______
Internet into small parts.
A) Bandwidth B) Identification C) Protocol D) Packetization
28) In a network database, a node may be reached through more than one path with the help 28) ______
of ________.
A) pointers B) connectors C) strings D) links
29) According to which law is it illegal for an owner of a commercial program to make 29) ______
backup copies for their personal use and resell or give them away?
A) Computer Fraud and Abuse Act B) The Gramm-Leach-Bliley Act
C) Digital Millennium Copyright Act D) Computer Abuse Amendments Act
30) ________ ports provide high-speed connections for external disk drives, optical disks, 30) ______
and other large secondary storage devices.
A) MiniDP B) Ethernet C) eSATA D) MIDI
31) These specialty chips are designed to improve specific computing operations such as 31) ______
displaying 3D images and encrypting data.
A) smartcards B) coprocessors C) NIC cards D) CPUs
3
Study Guide Final Exam CIS105 F2019
32) The ________ is the central node that coordinates the flow of data by sending messages 32) ______
directly between the sender and receiver nodes.
A) switch B) server C) gateway D) client
33) ________ transmits data as pulses of light through tiny tubes of glass. 33) ______
A) WiMax B) Microwave
C) Cellular D) Fiber optic cable
34) The essential features of this include identifying, sending, and receiving devices and 34) ______
breaking information into small parts for transmission across the Internet.
A) FTP B) TCP/IP C) HTTPs D) DNS
35) System ________ show the flow of input data to processing and finally to output. 35) ______
A) grids B) top-down analysis
C) flowcharts D) checklists
36) Basic activities in every accounting department, including sales order processing, 36) ______
accounts receivable, inventory and purchasing, accounts payable, and payroll, are
recorded in the ________.
A) inventory control system B) accountant's database
C) general ledger D) corporate database
37) ________ is concerned with protecting software and data from unauthorized tampering 37) ______
or damage.
A) Disaster recovery plan B) Data backup
C) Physical security D) Data security
38) ________ is the name of the process of converting from analog to digital. 38) ______
A) Optical recognition B) Modulation
C) Demodulation D) Virtualization
39) Which of the following is not a popular desktop operating system? 39) ______
A) Android B) Linux C) Windows 10 D) macOS X
40) ________ ensures that there aren't multiple sources of the same data. 40) ______
A) Reliability B) Sharing
C) Security D) Data integrity
41) Which among the following is a way to shut down an ISP or website? 41) ______
A) Trojan horses B) viruses
C) denial-of-service attack D) worms
42) In a(n) ________ database, a node may be reached through more than one path with the 42) ______
help of pointers.
A) relational B) network
C) multidimensional D) object-oriented
4
Study Guide Final Exam CIS105 F2019
44) The ________ report describes the current information system, the requirements for a 44) ______
new system, and a possible development schedule.
A) top-down analysis B) data flow
C) systems analysis D) components
45) A(n) ________ shows the relationship between input and output documents. 45) ______
A) investigation report B) checklist
C) top-down analysis D) grid chart
46) The category of operating system used for handheld devices. 46) ______
A) stand-alone B) open source C) network D) embedded
47) A(n) ________ is a program that provides modules of prewritten code. 47) ______
A) application generator B) artificial intelligence
C) machine language D) pseudocode
48) ________ of the system happens after the installation of software and hardware. 48) ______
A) Implementation B) Design analysis
C) Management studies D) Testing
50) A computer can become infected with viruses in all the following ways, except by 50) ______
________.
A) downloading software from the Internet
B) creating a new folder on your computer
C) opening attachments to email messages
D) downloading files from the web
51) ________ software is end-user software designed to accomplish a variety of tasks. 51) ______
A) System B) Application
C) Communications D) Utility
52) ________ memory uses the hard drive to substitute for RAM. 52) ______
A) Virtual B) Cache C) Hard drive D) Flash
53) Digital photographs consist of thousands of dots, or ________, that form images. 53) ______
A) rasters B) pixels C) vectors D) bitmaps
54) In the ________ database, data elements are stored in different tables, each of which 54) ______
consists of rows and columns.
A) hierarchical B) relational
C) object-oriented D) network
5
Study Guide Final Exam CIS105 F2019
55) Which of the following allows a computer to run two or more operations 55) ______
simultaneously?
A) multicore processors B) multiplexing
C) coprocessors D) binary system
56) ________ are used to quickly create a presentation by providing predesigned styles and 56) ______
layouts as well as suggested content based on the type you choose.
A) Templates B) Galleries C) Groups D) Tabs
57) This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals 57) ______
information such as usernames and passwords.
A) fake B) rogue C) virus D) worm
58) An important aspect of the preliminary investigation phase is to ________. 58) ______
A) prepare a preliminary investigation report
B) suggest alternative solutions
C) analyze the data
D) gather the data
59) ________ show the data or information flow within an information system; the data is 59) ______
traced from its origin through processing, storage, and output.
A) Data flow diagrams B) Top-down analysis methods
C) Grid charts D) System flow charts
60) The ________ approach to systems implementation is used only in cases in which the 60) ______
cost of failure or of interrupted operation is great.
A) direct B) pilot C) phased D) parallel
61) All of the following are true of DVD-ROM drives except: 61) ______
A) They can provide over two hours of high-quality video and sound comparable to
that found in motion picture theaters.
B) They are also known as erasable optical discs.
C) DVD-ROM stands for "digital versatile disc-read only memory."
D) They are a type of optical disc.
62) This version of UNIX is an open source operating system that is an alternative to 62) ______
Windows.
A) Lion B) High Sierra C) Sierra D) Linux
63) The repetition, or ________ structure, describes a process that may be repeated as long 63) ______
as a certain condition remains true.
A) loop B) random C) sequential D) selection
64) Which of the following is not a measure to protect computer security? 64) ______
A) encrypting data
B) keeping the same password on all systems consistently
6
Study Guide Final Exam CIS105 F2019
66) This process improves system performance by acting as a temporary high-speed 66) ______
holding area between a secondary storage device and the CPU.
A) RAID B) disk caching
C) data compression D) data access
67) A ________ error occurs when the programmer uses an incorrect calculation or leaves 67) ______
out a programming procedure.
A) syntax B) machine C) translation D) logic
68) Program ________ graphically present the detailed sequence of steps needed to solve a 68) ______
programming problem.
A) flowcharts B) pseudocode C) loops D) modules
69) ________ organize, analyze, and graph numeric data such as budgets and financial 69) ______
reports.
A) Presentation programs B) Databases
C) Word processors D) Spreadsheet programs
70) The range of Wi-Fi networks using microwave connections is being extended over 70) ______
greater distances using a new technology known as ________.
A) WiMax B) Bluetooth C) RAID D) broadcast
71) A typical ________ system can produce income statements and balance sheets. 71) ______
A) executive support B) management information
C) decision support D) general ledger
72) Common names for computer-based information systems are transaction processing, 72) ______
management information, ________, and executive support systems.
A) virtual support B) decision support
C) cloud information D) reflective information
73) Proofreading a printout of a program is known as desk checking or code ________. 73) ______
A) modulation B) feedback C) calculation D) review
75) ________ models assist top-level managers in long-range planning, such as stating 75) ______
company objectives or planning plant locations.
A) Operational B) Corporate C) Strategic D) Tactical
76) Organizations use the following to allow suppliers and others limited access to their 76) ______
networks.
A) extranets B) firewalls C) intranets D) proxy servers
77) Monthly sales and production reports are examples of ________ reports. 77) ______
A) on-demand B) periodic C) exception D) executive
78) When evaluating alternative systems, systems designers must consider economic 78) ______
feasibility, ________ feasibility, and operational feasibility.
A) top-down B) currency C) digital D) technical
79) ________ images are made up of geometric shapes or objects. 79) ______
A) Raster B) Pixel C) Vector D) Bitmap
80) In a Ribbon GUI, ________ are used to divide the ribbon into major activity areas. 80) ______
A) dialog boxes B) tabs C) galleries D) groups
81) Systems designers evaluate each alternative in the systems design phase for ________ 81) ______
by looking at economic, technical, and operational factors.
A) accuracy B) feasibility C) currency D) organization
82) The third phase in the systems life cycle is the systems ________ phase. 82) ______
A) implementation B) analysis
C) design D) maintenance
83) A ________ is a collection of related data—the electronic equivalent of a file cabinet. 83) ______
A) presentation B) spreadsheet C) gallery D) database
84) This operating system is designed to run only with Apple computers. 84) ______
A) macOS B) Linux C) Windows D) UNIX
85) These programs record virtually everything you do on your computer and are used by 85) ______
employers to search employee email and computer files.
A) employee-monitoring software B) freeware
C) spyware D) cookies
86) The systems design report presents the ________. 86) ______
A) costs versus the benefits B) possible development schedule
C) description of the current system D) requirements for a new system
87) All the following are commonly used units of measurement to describe memory 87) ______
capacity, except ________.
8
Study Guide Final Exam CIS105 F2019
88) Documentation written for programmers should include text and program flowcharts, 88) ______
________, and sample output as well as system flowcharts.
A) program listings B) logic errors
C) pseudocode D) syntax errors
89) ________ ports provide high-speed connections for up to seven separate devices 89) ______
connected one to another.
A) MIDI B) eSATA C) Thunderbolt D) Ethernet
90) A ________ error is a violation of the rules of the programming language. 90) ______
A) machine B) logic C) syntax D) translation
91) Storage that retains its data after the power is turned off is referred to as ________. 91) ______
A) nonvolatile storage B) sequential storage
C) volatile storage D) direct storage
92) As opposed to general-purpose applications, which are widely used in nearly every 92) ______
discipline, ________ applications are more narrowly focused.
A) electronic B) object-oriented
C) specialized D) web authoring
93) ________ languages can be run on more than one kind of computer. 93) ______
A) Assembly B) Portable
C) Task-oriented D) Machine
94) The scenario wherein many files about the same person exist across different 94) ______
departments within an organization is called data ________.
A) duplication B) repetition C) redundancy D) doubling
95) The process of coding information to make it unreadable except to those who have a 95) ______
special piece of information known as a key.
A) restriction B) security C) protection D) encryption
96) Which among the following is considered a line-of-sight communication medium? 96) ______
A) satellite B) Bluetooth
C) microwave D) broadcast radio
97) A(n) ________ decision support system is used to support collective work. 97) ______
A) executive B) supervisory C) group D) transaction
98) ________ uses standard telephone lines to provide high-speed connections. 98) ______
A) Cellular B) DSL C) Satellite D) Cable
9
Study Guide Final Exam CIS105 F2019
100) Which of the following characteristics about RAID is incorrect? 100) _____
A) highly reliable B) fast access speed
C) expanded storage capability D) one high-capacity hard disk drive
10