Fundamentals of Computer Information Systems Final Exam

advertisement

Fundamentals of Computer Information Systems

Final Exam

Please do not write on this paper

Mark “a” for true or “b” for false on scantron

1.

Three commonly used input devices are the monitor, printer, and speakers.

2.

Both the processor and memory are chips on the motherboard.

3.

A hard disk provides much less storage capacity than a floppy disk.

4.

Without software, hardware is useless: hardware needs the instructions provided by software to process data into information.

5.

Before a computer can run any operating system, application software must be loaded from the hard disk into the computer's memory.

6.

The CPU has little impact on overall computing power and has no affect on most of a computer's operations.

7.

A laptop computer houses almost all of its electronic components in the system unit.

8.

A computer's speed sometimes is measured in MIPS, which stands for million instructions per second.

9.

Intel is the leading manufacturer of processors.

10.

A higher system clock speed means the CPU can process fewer instructions per second than the same CPU with a lower clock speed.

11.

The operating system, which remains in memory while the computer is running, allows communication with the computer and other software, such as application software.

12.

The contents of volatile memory are not lost when power is removed from the computer.

13.

Instead of buying an entirely new computer, some processors can be upgraded to increase their performance.

14.

A monochrome monitor displays text, graphics, and video information in color.

15.

A computer processes output into input.

16.

The quality of a monitor's display depends largely on its resolution, dot pitch, and refresh rate.

17.

A higher resolution monitor causes images to display larger on the screen.

18.

The higher the clock speed the faster the processor - but also the more expensive the computer.

19.

Properly designed business programs should contain infinite loops.

20.

Most symbols on a program flowchart are connected by dotted lines that show the direction of the program.

21.

Graphics play a minor role in multimedia because people are less visually oriented than ever.

22.

Like audio files, video files require very small amounts of storage space.

23.

Information is processed into data.

24.

Although accurate data guarantees accurate information, it is possible to produce accurate information from erroneous data.

25.

A database is a group of related data files.

26.

Some activities in the system development life cycle (SDLC) may be performed at the same time, while other activities are performed sequentially.

27.

The system development life cycle can be grouped into five major phases: planning, analysis, design, implementation, and support.

28.

System software serves as the interface between the user, the application software, and the computer's hardware.

29.

A computer can function without an operating system.

30.

An operating system usually is stored on the computer's hard disk.

31.

A telecommuter often works at home and connects to the main office's network using a personal computer equipped with communications software and a communications device.

32.

Videoconferencing allows participants to collaborate as if they were in the same room.

33.

Wireless transmission use cable and other tangible (touchable) materials to send communications signals.

34.

Coaxial cable is insulated less heavily than twisted-pair cable, and thus is more susceptible to noise.

35.

Although each network that constitutes the Internet is owned by a public or private organization, a single organization owns and controls the Internet.

36.

Computers manipulate and organize data into information.

37.

While the World Wide Web was developed in the late 1960s, the Internet came into existence less than a decade ago - in the early 1990s.

38.

Printing requirements vary greatly among users.

Choose the most correct answer and enter on scantron

39.

Some level of computer ___________, or a knowledge and understanding of computers and their uses, is essential to be successful in today's world. a.

repair b.

literacy c.

programming d.

development

40. Computer hardware components include __________. e.

input and output devices f.

a system unit g.

storage and communications devices h.

all of the above

41. Because it controls most of a computer's operations, the __________ often is referred to as the brains of a computer. a.

random access memory (RAM) b.

central processing unit (CPU) c.

digital video disk (DVD) d.

disk operating system (DOS)

42.

__________ holds data, instructions, and information for future use. a.

Storage b.

Input c.

Processing d.

Output

43.

A modem is a(n) __________. a.

small, handheld input device that contains at least one button b.

communications device that enables computers to communicate via telephone lines c.

storage device that stores data using microscopic pits created by laser light d.

output device that looks like a television screen and displays text or graphics

44.

The computing principle known as __________ points out that the accuracy of a computer's output depends on the accuracy of the input. a.

what you see is what you get (WYSIWYG) b.

for what it's worth (FWIW) c.

garbage in, garbage out (GIGO) d.

nothing ventured, nothing gained (NVNG)

45.

A(n) __________ is a rectangular area of the screen that is used to display a program, data, and/or information. a.

menu b.

icon c.

window d.

command

46.

With __________, if typed text extends beyond the right page margin, the word processing software automatically positions the text at the beginning of the next line. a.

scrolling b.

wordwrap c.

replace d.

import

47.

The CPU contains __________. a.

input devices and output devices b.

the control unit and the arithmetic/logic unit c.

main memory and storage devices d.

all of the above

48.

Clock speed, the speed at which a processor executes instructions, is measured in

__________, which equates to one million ticks of the system clock. a.

kilobytes (KB) b.

milliseconds (ms) c.

megahertz (MHz) d.

nanoseconds (ns)

49.

The __________ is a coding scheme used primarily on mainframe computers. a.

American Standard Code for Information Interchange (ASCII) b.

Universal System Code for Data Exchange (USCDE) c.

Extended Binary Coded Decimal Interchange Code (EBCDIC) d.

Contracted Unit Coded Hexadecimal Transaction Code (CUCHTC)

50.

A __________ is equal to approximately one million bytes. a.

dekabyte (abbreviated DB or D) b.

centibyte (abbreviated CB) c.

kilobyte (abbreviated KB or K) d.

megabyte (abbreviated MB)

51.

__________ is an example of volatile memory. a.

RAM b.

CMOS c.

ROM d.

all of the above

52.

In most computers, the word size is __________ the bus width. a.

the same as b.

greater than c.

less than d.

either greater than or less than

53.

A pointer often takes any of the following shapes except a(n) __________. a.

block arrow b.

I-beam c.

smiley face d.

pointing hand

54.

Common pointing devices include all of the following except the __________. a.

scanner and digital camera b.

mouse and light pen c.

trackball and pointing stick d.

touchpad and touch screen

55.

A __________ is similar to a copy machine except that it creates a file of the document instead of a paper copy. a.

scanner b.

touchpad c.

graphics tablet d.

bitmap

56.

A(n) __________ device commonly is used to scan test, survey, or questionnaire answer sheets, matching their patterns of light against a master document. a.

optical character recognition (OCR) b.

optical mark recognition (OMR) c.

magnetic-ink character recognition (MICR) d.

image processing system recognition (IPSR)

57.

Retail and grocery stores use the __________ type of bar code. a.

Postal Numeric Encoding Technique (POSTNET) b.

Universal Product Code (UPC) c.

European Article Numbering (EAN) d.

all of the above

58.

__________ is used almost exclusively by the banking industry for check processing. a.

Optical character recognition (OCR) b.

Optical mark recognition (OMR) c.

Magnetic-ink character recognition (MICR) d.

Image processing system recognition (IPSR)

59.

All of the following are commonly used output devices except __________. a.

display devices and printers b.

pointing devices and keyboards c.

data projectors and speakers d.

facsimile machines and headsets

60.

The goal of ergonomics is to incorporate __________ into the design of items in the workplace. a.

beauty, originality, and creativity b.

mediocrity, cost-effectiveness, and economy c.

comfort, efficiency, and safety d.

simplicity, precision, and clarity

61.

__________ output is a quality of print acceptable for business letters. a.

Letter quality (LQ) b.

Near letter quality (NLQ) c.

Draft quality (DQ) d.

Near draft quality (NDQ)

62.

All of the following are types of nonimpact printers except __________ printers. a.

dot-matrix b.

ink-jet c.

laser d.

thermal

63.

Plotters and large-format printers are used primarily in such fields as __________ and are very costly. a.

engineering b.

drafting c.

graphics art d.

all of the above

64.

Two commonly used audio output devices are __________. a.

keyboards and microphones b.

speakers and headsets c.

monitors and printers d.

floppy disks and CD-ROMs

65.

Storage devices can function as sources of __________. a.

input and processing b.

output and processing c.

input and output d.

all of the above

66.

Before a new floppy disk can be written on, it must be __________. a.

formatted b.

tracked c.

partitioned d.

cached

67.

All of the following are guidelines for proper care of floppy disks except

__________. a.

do not open the disk's shutter or touch the recording surface b.

do not keep the disk in a storage tray when not in use c.

do not eat, smoke, or drink near a disk d.

do not expose the disk to excessive heat, sunlight, or cold

68.

The Internet is used to __________. a.

access information, news, research, and educational material b.

send or receive messages from other connected users c.

meet and converse with people around the world in discussion groups or chat rooms d.

all of the above

69.

The two types of system software are __________. a.

operating systems and utility programs b.

operating systems and application programs c.

information systems and utility programs d.

information systems and application programs

70.

Early operating systems were __________. a.

single user b.

multitasking c.

multiuser d.

multiprocessing

71.

Networks, minicomputers, mainframes, and supercomputers allow hundreds to thousands of people to be connected at the same time, and thus are __________. a.

single user b.

multitasking c.

multiuser d.

multiprocessing

72.

In the case of print spooling, the __________ holds the information waiting to print while the printer prints at its own rate. a.

buffer b.

kernel c.

driver d.

registry

73.

A data communications model consists of a __________. a.

sending device and receiving device b.

communications device c.

communications channel d.

all of the above

74.

Fiber-optic cable has all of the following advantages over cables that use wire except

__________. a.

the capability of carrying significantly more signals b.

less susceptibility to noise (interference) from other devices c.

lower costs and easier installation and maintenance d.

better security for signals during transmission

75.

A __________ is a network that connects computers in a limited geographical area, such as a school computer laboratory, office, or group of buildings. a.

local area network (LAN) b.

regional area network (RAN) c.

wide area network (WAN) d.

multiple area network (MAN)

76.

A __________ is a network topology designed so a cable forms a loop, with all computers and devices arranged along the loop. a.

bus network b.

star network c.

cab network d.

ring network

77.

A __________ is a network topology in which all of the devices connect to a central computer. a.

bus network b.

star network c.

cab network d.

ring network

78.

A student record would use __________ as a key field because it uniquely identifies each student. a.

Student ID b.

Last Name c.

State d.

Birthdate

79.

The database approach has all of the following advantages except __________. a.

improved data integrity b.

increased data redundancy c.

reduced development time d.

easier reporting

80.

Valuable information is __________ information, which means that it has an age suited to its use. a.

timely b.

verifiable c.

meaningful d.

cost-effective

81.

__________ include(s) the highest management positions in an organization. a.

Executive management b.

Middle management c.

Operational management d.

Nonmanagement employees

82.

__________ are the liaison between the users and the programmers; that is, they convert user requests into technical specifications. a.

Systems analysts b.

Network administrators c.

Vendors d.

Steering committees

83.

With __________ conversion, the user stops using the old system and begins using the new system on a certain date. a.

parallel b.

pilot c.

phased d.

direct

84.

A sequence control structure __________. a.

shows a single action or one action sequentially followed by another b.

tells the program which action to take, based on a certain condition c.

collects data or instructions from other parts of a program d.

performs one or more actions over again as long as a certain condition is met

85.

Poorly designed programs that frequently jumped from one section of code to another often were called __________ code. a.

sauerkraut b.

macaroni c.

spaghetti d.

marzipan

86.

__________ graphically shows the logic in a solution algorithm, using solid lines to show the direction of the program. a.

A Nassi-Schneiderman (N-S) chart b.

A program flowchart c.

Object code d.

Pseudocode

87.

The process of locating and correcting syntax and logic errors in a computer program is called __________. a.

debugging b.

detailing c.

deflecting d.

debating

88.

Naval officer Grace Hopper, a pioneer in computer programming, was a prime developer of the __________ language. a.

BASIC b.

FORTRAN c.

COBOL d.

RPG

89.

With __________, presentations can be created that combine text, graphics, animation, and audio and video clips. a.

PowerPoint b.

Excel c.

Access d.

Internet Explorer

90.

A typical __________ is a self-service structure equipped with computer hardware and software. a.

kiosk b.

digital camera c.

scanner d.

data projector

91.

The increased use of __________ has accelerated the spread of computer viruses by allowing individuals to share files - and any related viruses - more easily than ever. a.

networks b.

the Internet c.

e-mail d.

all of the above

92.

A __________ virus is a virus that hides within or is designed to look like a legitimate program. a.

macro b.

Trojan horse c.

file d.

boot sector

Download