Name: 
 

CS110 Intro to CIS Review 3



Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

Some services use which of the following terms to refer separately to the capability of sending video clips?
a.
video circuiting
b.
video posting
c.
video messaging
d.
video spotting
 
 
nar001-1.jpg
 

 2. 

As illustrated in the accompanying figure, on what kind of network must all of the computers and devices (nodes) on the network connect to a central device?
a.
bus network
b.
ring network
c.
star network
d.
token ring network
 

 3. 

Which of the following is a network standard that specifies no central computer or device on the network should control when data can be transmitted?
a.
Ethernet
b.
Telnet
c.
IEEE
d.
Gopher
 

 4. 

Which of the following is true of DSL?
a.
It uses a modem that sends digital data and information from a computer to a DSL line.
b.
It is much slower than dial-up service.
c.
It uses a line that is shared with other users in the neighborhood.
d.
all of the above
 

 5. 

For best performance of a communications channel, which of the following should be true?
a.
bandwidth and latency should be low
b.
bandwidth should be low and latency high
c.
bandwidth should be high and latency low
d.
bandwidth and latency should be high
 

 6. 

Which of the following is a wireless transmission medium that distributes radio signals through the air over long distances?
a.
Mobile transmission
b.
Optical resolution
c.
Bandless transmission
d.
Broadcast radio
 

 7. 

Which of the following is an earth-based reflective dish that contains the antenna, transceivers, and other equipment necessary for microwave communications?
a.
domestic carrier
b.
interstellar transport
c.
microwave station
d.
planetary dish
 
 
COGNITIVE ASSESSMENT
 

 8. 

What communications type enables real-time typed conversation among two or more people that takes place on a computer connected to a network?
a.
e-mail
b.
FTP
c.
chat room
d.
newsgroup
 

 9. 

Which of the following statements best describes the Ethernet network standard?
a.
no central computer or device on the network should control when data can be transmitted
b.
describes rules for dividing messages into small pieces, called packets
c.
computers and devices on the network share or pass a special signal in an undirectional manner and in a preset order
d.
computers on a network cannot communicate unless they share the same form of translation
 

 10. 

You love to take pictures of your family. What standard do you use to print pictures directly from your camera?
a.
USB
b.
WBA
c.
IBW
d.
UWB
 

 11. 

Which of the following best describes DSL connections?
a.
transmits at fast speeds on existing standard copper telephone wiring; popular for small business or home user
b.
uses long-distance digital telephone lines to carry multiple signals over a single line; only medium to large companies can afford them
c.
uses fiber-optic cable to provide extremely high-speed Internet access to a user’s physical, permanent location
d.
a service that carries voice, data, video, and multimedia at a high speed; used by telephone networks and the Internet
 

 12. 

Which of the following is not one of the qualities associated with identifying the value of information?
a.
accurate
b.
verifiable
c.
useful
d.
expensive
 

 13. 

Which of the following statements about data types is not true?
a.
Yes/No fields can be used to create a field with True or False options.
b.
AutoNumber data types assign numbers automatically to each record.
c.
Text data types are used for lengthy memos.
d.
Object data types are used for photos, audio, video, or documents stored as bitmaps.
 

 14. 

Which of the following is not considered a part of file maintenance?
a.
adding a record to a database
b.
modifying data in a record
c.
the creation of a new database
d.
deleting records from a database
 

 15. 

What is a more user-friendly interface some users use instead of interacting directly with a DBMS?
a.
a front end
b.
a user environment
c.
a home page
d.
a data file
 

 16. 

Which of the following statements is not true about the database approach?
a.
The database approach allows nontechnical users to access and maintain data.
b.
Databases require more memory, storage, and processing power than file processing systems.
c.
A disadvantage to the database appreoach is isolated data.
d.
The database approach increases the data’s integrity.
 

 17. 

Which of the following statements best describes a form?
a.
a window on the screen that provides areas for entering or modifying data in a database
b.
a formatted, printable retrieval of specific data
c.
a screen that enables a database user to add or delete tables
d.
the opening screen in a DBMS in which the user logs in to achieve authorization to modify or retrieve data
 

 18. 

While working with a database, you encounter a wizard. What best describes the purpose of a wizard?
a.
guides you through the steps of creating a database object
b.
the database creator and administrator
c.
a screen in which you enter or modify data
d.
the instructions that control how the data in the database is connected
 

 19. 

Which of the following statements is not true about e-forms?
a.
The E stands for electronic.
b.
E-forms are used to send entered data across a network or the Internet.
c.
The capability of creating e-forms is rare in a DBMS.
d.
E-forms generally use a means to secure the data while it is transported across the network.
 

 20. 

Which term does a user of a relational database use to refer to a file?
a.
row
b.
table
c.
column
d.
relation
 

 21. 

Which of the following best describes the term, cybercrime?
a.
online or Internet-based illegal acts
b.
any illegal act involving a computer
c.
a type of gaming software that simulates criminal acts
d.
using the Internet to apprehend and prosecute criminals
 

 22. 

Define the term, zombie.
a.
a program that performs a repetitive task on a network
b.
spam sent via e-mail to spread viruses or commit a distributed denial of service attack
c.
a group of compromised computers connected to a network that attacks other networks
d.
a computer whose owner is unaware that the computer is being controlled remotely by an outsider
 

 23. 

What is an EULA intended to do?
a.
license software for individual use
b.
outline computer activities for which the computer and network may or may not be used
c.
contract with an outside organization to provide security and recovery services for a network
d.
establish a network of computers, such as a homegroup
 

 24. 

Define social engineering as it pertains to computers.
a.
creating consumer and personal profiles by tracking Web site history and electronic purchases
b.
compiling data from multiple computer users in order to make predictions about computer trends
c.
filtering Internet content to targeted users based on their personal preferences
d.
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
 

 25. 

Which of the following terms best describes a decision-making body in an organization?
a.
a project team
b.
information managers
c.
a steering committee
d.
team leaders
 

 26. 

Your project manager realizes the team won’t be able to meet the original project deadline, so she extends the deadline. What process is she using?
a.
reactive planning
b.
change management
c.
revised delivery
d.
difference scheduling
 

 27. 

Which of the following tools identifies data stores, processes, sources, and data flow?
a.
DFD
b.
ERD
c.
PD
d.
FTP
 

 28. 

What does a benchmark test evaluate?
a.
the costs to modify or replace an information system
b.
the efficiency of an information system
c.
the performance of hardware or software
d.
the flow of data in a proposed information system
 

 29. 

Which of the following terms is used to describe a working model of a proposed system?
a.
a prototype
b.
a mockup
c.
a flowchart
d.
a data model
 
 
nar003-1.jpg
 

 30. 

In the database pictured in the accompanying figure, which of the following is a combination of one or more related characters or bytes and is the smallest unit of data a user accesses?
a.
field
b.
member
c.
record
d.
identifier
 

 31. 

Which of the following is a number(s) or character(s) that is appended to or inserted into a primary key field?
a.
check digit
b.
index
c.
insertion ordinal
d.
integer
 
 
nar004-1.jpg
 

 32. 

Most DBMSs include a feature, as shown in the accompanying figure, which has a graphical user interface to assist users with retrieving data. What is this feature called?
a.
QBA
b.
SQL
c.
QBE
d.
schema
 

 33. 

A checkout clerk with this level of privileges to the e-mail addresses in a discount warehouse database could view the addresses but not change them. What is this level of privileges called?
a.
read-only
b.
write-only
c.
full-update
d.
no access
 

 34. 

In a log, a DBMS places which of the following?
a.
a copy of a record prior to a change
b.
the actual change to a record
c.
a copy of a record after a change
d.
all of the above
 

 35. 

In a relational database, such as that pictured in the accompanying figure, which of the following is a connection within the data?
a.
table
b.
column
c.
row
d.
relationship
 

 36. 

Which of the following is an item that contains data, as well as the actions that read or process the data?
a.
object
b.
hyperlink
c.
action link
d.
event
 

 37. 

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
a.
computer security risk
b.
information liability
c.
technical terrorism
d.
network compromise
 

 38. 

Which of the following software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system breaches?
a.
Violation assessment
b.
Password authentication
c.
Intrusion detection
d.
Traffic management
 

 39. 

Which of the following kinds of certificate is a notice that guarantees a user or Web site is legitimate?
a.
assigned
b.
secure
c.
protected
d.
digital
 

 40. 

What is the term for the prolonged malfunction of a computer?
a.
dynamic collapse
b.
online hash
c.
processor spike
d.
system failure
 

 41. 

Which of the following terms means in a location separate from the computer site?
a.
Offscope
b.
Offshore
c.
Offline
d.
Offsite
 

 42. 

Which of the following copies all of the files in a computer?
a.
full backup
b.
incremental backup
c.
differential backup
d.
selective backup
 

 43. 

Which of the following is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints?
a.
DoS
b.
ISP
c.
PGP
d.
RSI
 

 44. 

Which of the following 1988 laws regulates the use of government data to determine the eligibility of individuals for federal benefits?
a.
Electronic Communications Privacy Act (ECPA)
b.
Fair Credit Reporting Act
c.
Computer Fraud and Abuse Act
d.
Computer Matching and Privacy Protection Act
 

 45. 

Which of the following measures how well a proposed system will work?
a.
Operational feasibility
b.
Technical feasibility
c.
Schedule feasibility
d.
Economic feasibility
 

 46. 

Which of the following combines the data with the processes that act on that data into a single unit, called an object?
a.
object modeling
b.
value indexing
c.
content data proposing
d.
mapping
 

 47. 

During which of the following phases does a systems analyst identify the required programs and the relationship among each program, as well as input, output, and database specifications?
a.
storage design
b.
database design
c.
program design
d.
input and output design
 

 48. 

Which of the following is true of an integration test?
a.
verifies that each individual program works by itself
b.
verifies that all programs in an application work together properly
c.
verifies that an application works with other applications
d.
is performed by end-users and verifies that the new system works with actual data
 

 49. 

Which of the following consists of running the old system alongside the new system for a specified time?
a.
Phased conversion
b.
Direct conversion
c.
Parallel conversion
d.
Pilot conversion
 

 50. 

The purpose of which of the following is to determine whether a system is inefficient at any point?
a.
performance monitoring
b.
post-implementation system review
c.
expectation review subphase
d.
security phase
 

True/False
Indicate whether the statement is true or false.
 

 1. 

On a client/server network, the client sometimes is called a host computer.
 

 2. 

A recent Ethernet standard, called Fast Ethernet, has a data transfer rate of 10 Mbps, ten times faster than the original standard.
 

 3. 

With TCP/IP, each packet contains data as well as the recipient (destination), origin (sender), and the sequence information used to reassemble the data at the destination.
 

 4. 

Using a dial-up line to connect computers costs more than making a regular telephone call.
 

 5. 

Similar to an ISDN modem, a DSL modem is the same as the modem used for dial-up connections.
 

 6. 

With FTTP service, an optical terminal at your business receives the signals and transfers them to a router connected to a computer.
 

 7. 

Telephone networks, the Internet, and other networks with large amounts of traffic use ATM.
 

 8. 

ISDN and DSL modems are typically installed inside the PC.
 

 9. 

Only small networks use routers.
 

 10. 

A phoneline network is a network that uses the same lines that bring electricity into the house.
 

 11. 

Fiber-optic cables have the capability of carrying significantly more signals than wire cables.
 

 12. 

For radio transmissions, a transmitter is needed to send the broadcast radio signal and a receiver to accept it.
 

 13. 

Verifiable information can be proven as correct or incorrect.
 

 14. 

When users modify data in a database, they make changes to multiple files instead of one file.
 

 15. 

Query By Example uses a graphical user interface that assists users with retrieving data.
 

 16. 

E-forms seldom use a means to secure data while it is transported across a network.
 

 17. 

A DBMS provides a variety of techniques to restore a database to a usable form in case it is damaged or destroyed.
 

 18. 

With a distributed database, the data is accessible through a variety of servers.
 

 19. 

Any illegal act involving a computer generally is referred to as a computer security crime.
 

 20. 

Some security systems for notebook computers shut down the computer and sound an alarm if the computer moves outside a specified distance.
 

 21. 

To promote a better understanding of software piracy problems and, if necessary, to take legal action, a number of major worldwide software companies formed the BSA.
 

 22. 

Digital signatures often are used to ensure that an imposter is not participating in an Internet transaction.
 

 23. 

Computer addiction is an untreatable illness.
 
 
nar005-1.jpg
 

 24. 

In order to safeguard personal information, you should not reply to messages like those shown in the accompanying figure for any reason.
 

 25. 

To remove spyware, users need to obtain a special program that can detect and delete it.
 

 26. 

Although the system development life cycle contains a set of three phases, several ongoing activities take place during the entire process.
 

 27. 

Standards are often implemented using a data dictionary.
 

 28. 

When reviewing project requests, projects that receive the lowest priority are those mandated by management or some other governing body.
 

 29. 

During input and output design, the inputs always are designed first because they help define the requirements for the outputs.
 

 30. 

In developing a computer security plan, the CSO should recognize that some degree of risk is unavoidable.
 

Completion
Complete each statement.
 

 1. 

____________________ is a computer phrase that points out that the accuracy of a computer’s output depends on the accuracy of its input.
 

 

 2. 

In a database, a(n) ____________________ contains records, a record contains fields, and a field is made up of characters.
 

 

 3. 

____________________ is a common data type that consists of lengthy text entries.
 

 

 4. 

When a DBMS flags a deleted record, the record is deleted ____________________ because the DBMS will not process it.
 

 

 5. 

If the lowest annual fee at a discount warehouse is $20.25 and the highest is $55.50, a(n) ____________________ on the Annual Fee field ensures it is a value between $20.25 and $55.50.
 

 

 6. 

A(n) ____________________ is a separate area of a hard disk that holds an infected file until the infection can be removed.
 

 

 7. 

A(n) ____________________ attack is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail.
 

 

 8. 

A(n) ____________________ is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
 

 
 
nar006-1.jpg
 

 9. 

When users purchase software, a(n) ____________________ license agreement like the one in the accompanying figure does not permit users to install the software on a network or to give copies to friends and colleagues.
 

 

 10. 

____________________ is the process of converting readable data into unreadable characters to prevent unauthorized access.
 

 

 11. 

The ____________________ becomes the first item in the project notebook.
 

 

 12. 

During the ____________________ phase, four major activities are performed: (1) review and approve the project requests, (2) prioritize project requests, (3) allocate resources to approved projects, and (4) form a project development team for each approved project.
 

 

 13. 

The ____________________ phase consists of two major activities: (1) conduct a preliminary investigation and (2) perform detailed analysis.
 

 

 14. 

The purpose of the ____________________ study is to determine the exact nature of a problem or improvement and decide whether it is worth pursuing.
 

 
 
nar007-1.jpg
 

 15. 

In a diagram such as the one pictured in the accompanying figure, a(n) ____________________ shows the input or output of information into or out from a process.
 

 

 16. 

A top level DFD (data flow diagram) identifies only the ____________________ process.
 

 

 17. 

Although used in all types of business modeling, the ____________________ has been adopted as a standard notation for object modeling.
 

 
 
nar008-1.jpg
 

 18. 

In the accompanying figure, a(n) ____________________ is drawn as a stick figure that connects to each function with an arrow.
 

 

 19. 

As shown in the accompanying figure, a(n) ____________________ diagram graphically shows how actors interact with an information system.
 

 

 20. 

In a diagram such as the one shown in the accompanying figure, the concept of lower levels taking over methods and attributes of higher levels is called ____________________.
 

 



 
Check Your Work     Start Over