Name: 
 

CS-110 Intro. to CIS Review 4



Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

HTML uses codes that specify links to other documents and indicate how a Web page is displayed when viewed on the Web. What is the term for these codes?
a.
links
b.
icons
c.
keys
d.
tags
 

 2. 

Anyone can use JavaScript without purchasing a license. What is the term for this?
a.
open language
b.
machine-dependent language
c.
closed language
d.
machine-independent language
 

 3. 

Typically, which of the following is true of Web pages created with DHTML?
a.
They are less animated and responsive to user interaction.
b.
They are less animated but more responsive to user interaction.
c.
They are more animated but less responsive to user interaction.
d.
They are more animated and responsive to user interaction.
 

 4. 

Many developers use which of the following kinds of software to create sophisticated Web pages that include graphical images, video, audio, animation, and other special effects?
a.
dynamic
b.
HTML execution
c.
Web page authoring
d.
interactive HTML
 

 5. 

Which of the following consists of a series of steps programmers use to build computer programs?
a.
program management
b.
program development
c.
software application
d.
software execution
 

 6. 

Which step of program development consists of three major tasks: (1) review the requirements, (2) meet with the systems analysts and users, and (3) identify input, output, processing, and data components?
a.
Analyze Requirements
b.
Design Solution
c.
Test Solution
d.
Implement Solution
 

 7. 

In top-down design, after identifying the main routine the programmer decomposes (breaks down) the main routine into smaller sections, called which of the following?
a.
clusters
b.
modules
c.
links
d.
sources
 
 
COGNITIVE ASSESSMENT
 

 8. 

Which of the following is not true about Visual Studio?
a.
Visual Studio is Microsoft’s suite of program development tools that assist programmers in building programs for Windows
b.
Visual Basic is a complex language used only by experienced programmers.
c.
Visual Studio includes code snippets, which are prewritten code and templates.
d.
Visual C++ offers direct access to machine level memory locations.
 

 9. 

What is a visual programming language?
a.
one that enables the programmer to see the results of code as it is being written
b.
one that uses a visual or graphical interface for creating all source code
c.
one that is used to create graphics-related programs
d.
one that uses graphical objects to represent code
 

 10. 

What is a method for creating interactive Web applications designed to provide immediate response to user requests?
a.
Rails
b.
Ajax
c.
XHTML
d.
SQL
 

 11. 

With what kind of design strategy does the programmer begin with a general design an move toward a more detailed design?
a.
outlined
b.
structured
c.
bottom-up
d.
big picture
 

 12. 

What is a decentralized approach to information technology?
a.
employees are spread over a large geographical region
b.
all users have the same level of access to information and systems
c.
each node on the network is dependent on one another
d.
departments and divisions maintain their own information systems
 

 13. 

What type of computing combines servers and personal computers on a network to act as one large computer?
a.
grid
b.
cloud
c.
virtual
d.
mashup
 

 14. 

What is RAID?
a.
a multisystem integrated database
b.
a group of two or more integrated hard disks
c.
an identification system that uses radio waves
d.
a technique for storing data virtually
 

 15. 

Where is the processing for a thin client usually done?
a.
on the client’s microprocessor
b.
on a server to which the client is attached over a network
c.
on the Internet using wireless technology
d.
on a PC via a USB drive
 

 16. 

Which of the following term refers to the practice of companies choosing to send computer jobs overseas?
a.
outsourcing
b.
distancing
c.
outhousing
d.
telecommuting
 

 17. 

IT is an acronym for which of the following?
a.
Internet telecommunications
b.
information technology
c.
internal technicians
d.
innovative teachers
 

 18. 

Which of the following job titles would describe someone who directs a company’s information service and communications functions?
a.
CIO
b.
e-commerce director
c.
network administrator
d.
computer scientist
 

 19. 

Which of the following job titles would describe someone who researches, invents, and develops innovative solutions to complex software requirements or problems?
a.
CIO
b.
e-commerce director
c.
network administrator
d.
computer scientist
 

 20. 

AMD, Cisco Systems, Intel, and Motorola are all companies in which market segment?
a.
computer education
b.
IT consulting
c.
computer equipment
d.
computer service and repair
 

 21. 

According to the Business Software Alliance’s estimates, which percentage of all software installed on computers worldwide is copied illegally?
a.
18%
b.
35%
c.
48%
d.
74%
 

 22. 

You are interested in studying computers in college. You are design oriented, and like math and science. Which area should you study?
a.
computer information systems
b.
computer science
c.
management information systems
d.
computer engineering
 

 23. 

To protect their investment and intellectual property, what do IT employers often ask their employees to sign?
a.
lifetime contract
b.
injury waiver
c.
noncompete agreement
d.
loyalty statement
 

 24. 

What kind of certification exams should computer repair technicians take?
a.
application
b.
program/development
c.
security
d.
hardware
 

 25. 

In what area do the CCE and CIFI certification exams test proficiency?
a.
digital forensics
b.
security
c.
networking
d.
database systems
 

 26. 

In what area does the MCITP and OCP certification exams test proficiency?
a.
digital forensics
b.
database systems
c.
security
d.
Internet
 

 27. 

At what company is Steve Ballmer the CEO?
a.
Microsoft
b.
Apple
c.
Yahoo!
d.
Oracle
 

 28. 

What job title describes someone who installs, maintains, and repairs hardware, and installs, upgrades, and configures software?
a.
computer technician
b.
computer operator
c.
help desk specialist
d.
quality assurance specialist
 

 29. 

What type of content is found on sites such as Slashdot and The Register?
a.
IT-related jobs
b.
training for certification exams
c.
information about user groups
d.
opinions and news about technology
 

 30. 

Which of the following kinds of computing involves the use of computers in networks, such as LANs or WANs, or series of interconnected networks that encompass a variety of different operating systems, protocols, and network architectures?
a.
Enterprise
b.
Corporate
c.
Consortium
d.
Functional
 

 31. 

Which of the following are employees who are responsible for coordinating and controlling an organization’s resources?
a.
Leaders
b.
Users
c.
Managers
d.
Coordinators
 

 32. 

Which of the following is the application of human intelligence to computers?
a.
KM
b.
TP
c.
AI
d.
RI
 

 33. 

In a document management system, a central library stores all documents within a company or department. What is another name for this central library?
a.
archive
b.
glossary
c.
repository
d.
vault
 

 34. 

In a disaster recovery plan, the recovery plan specifies which of the following?
a.
information for simulating various levels of disasters and recording an organization’s ability to recover
b.
the steps to be taken immediately after a disaster strikes
c.
the actions to be taken to restore full information processing operations
d.
how a company uses backup files and equipment to resume information processing
 

 35. 

Which of the following (a job title in the technical services area of an IT department) creates visual impressions of products for advertisements and marketing materials?
a.
Graphic designer
b.
Digital forensics examiner
c.
Desktop publisher
d.
Graphics composer
 

 36. 

Which of the following (a job title in the technical services area of an IT department) maintains an organization’s Web site and creates or helps users create Web pages?
a.
Web developer
b.
Webmaster/Web administrator
c.
Web designer
d.
Web technician
 

 37. 

Compared to college or university programs, which of the following is an example of attending a trade school?
a.
time; students often complete trade school programs in a shorter time
b.
attainment; students often attain a higher degree in trade school programs
c.
proximity; students always attend trade schools at a closer location
d.
all of the above
 
 
nar003-1.jpg
 

 38. 

Technical certification programs are offered by many vendors that develop and administer the examinations to determine whether a person is qualified for certification; a Web site showing certification percentages is shown in the accompanying figure. What are these organizations called?
a.
articulating
b.
sponsoring
c.
certified
d.
beta
 

 39. 

IT certification can do all of the following EXCEPT which of the following?
a.
enhance employees’ careers
b.
provide employees with added credibility among peers and employers
c.
increase employee salaries
d.
guarantee job security
 

 40. 

Which of the following is a security certification sponsored by International Information Systems Security Certification Consortium that tests in-depth knowledge of access control methods, information systems development, cryptography, operations security, physical security, and network and Internet security?
a.
SCNP
b.
SCNA
c.
CISSP
d.
A+
 

True/False
Indicate whether the statement is true or false.
 

 1. 

Visual Studio is Microsoft's suite of program development tools that assists programmers in building programs for Windows, Windows Mobile, or operating systems that support .NET.
 

 2. 

Powerful fourth-generation languages allow database administrators to define a database and its structure.
 

 3. 

XML combines the Web page content with its format, preventing a Web browser from displaying the contents of a Web page in a form appropriate for the display device.
 

 4. 

In structured design, a programmer begins with the details and then expands toward a larger, general design.
 

 5. 

The do-while control structure normally is used when occurrence of an event is quantifiable and predictable.
 

 6. 

A logic error occurs when the code violates the syntax, or grammar, of the programming language.
 

 7. 

A decentralized approach to information technology exists when companies maintain central computers supported by a central IT department.
 

 8. 

A CIM program routes customer telephone calls to the most appropriate support person depending on the identity of the customer or responses the customer gives to prompts.
 

 9. 

Enterprise-wide systems are necessary because functional units within an enterprise have a significant need to share data among the units.
 

 10. 

An OIS supports many administrative activities.
 

 11. 

Transaction processing systems were among the first computerized systems that processed business data.
 

 12. 

In an expert system, the inference rules are the combined subject knowledge and experience of human experts.
 
 
nar002-1.jpg
 

 13. 

The complete integration provided by ERP (examples in the accompanying figure) means information is shared rapidly and management receives a more complete and timely view of an organization through the information.
 

 14. 

A data warehouse cannot be stored in a cloud computing environment.
 

 15. 

Web services include traditional user interfaces, such as a Web page.
 

 16. 

Grid computing is rarely used in research environments.
 

 17. 

A disadvantage of storage virtualization is that the storage cannot be configured quickly.
 

 18. 

In a blade server, the individual blades insert into a blade server chassis that can hold many blades.
 

 19. 

While the use of computers and the demand for computer specialists continues to decline, the number of students majoring in computer-related fields is much greater than what the industry needs.
 

 20. 

The annual base salary range for a technical writer is $73,000 to $140,000.
 

 21. 

All software companies specialize in a particular type of software.
 

 22. 

Upon completion of a trade school education, students often receive a certificate.
 

 23. 

Some graduates of trade schools receive an associate degree or higher.
 

 24. 

To ensure coursework will transfer, students should ask an advisor if the trade school has a certification agreement with a college or university.
 

 25. 

After two years of study in a CS program, students may receive an associate’s degree or certificate.
 

 26. 

The focus of the ACM is computer science and computer science education.
 

 27. 

Online certification study programs cost approximately double the price of traditional instructor-led programs.
 

 28. 

Flexible self-study programs help professionals prepare for certification at their own pace and supplement other training methods.
 

 29. 

All certifications are the same with respect to training and options.
 

 30. 

A certification represents only a small commitment in time and money.
 

Completion
Complete each statement.
 

 1. 

____________________ language instructions use a series of binary digits (1s and 0s) or a combination of numbers and letters that represent binary digits.
 

 

 2. 

____________________ is a method of developing software in which the programmer writes and implements a program in segments instead of waiting until the entire program is completed.
 

 

 3. 

Complete ____________________ languages include Java, C#, F#,C++, and the latest versions of Visual Basic.
 

 

 4. 

____________________ software equips traveling salespeople with the electronic tools they need to be more productive.
 

 

 5. 

The secure connection that a virtual private network (VPN) creates between a user’s computer and a company’s network is called a(n) ____________________ tunnel.
 

 

 6. 

With ____________________ computing, the network and server capacity may be duplicated around the world so that, for example, an outage of a single server does not affect the company's operations.
 

 

 7. 

A group of two or more integrated disks that acts like a single large hard disk is called a(n) ____________________.
 

 

 8. 

____________________, which is a main area of an IT department, analyzes, designs, develops, and implements new information technology and maintains and improves existing systems.
 

 

 9. 

____________________, which is a main area in an IT department, evaluates and integrates new technologies, administers an organization’s data resources, and supports the centralized computer operating system or servers.
 

 

 10. 

____________________, which is a main area in an IT department, assists users with using components of the information systems or answers specific questions.
 

 

 11. 

A(n) ____________________ installs, configures, and maintains LANs, WANs, intranets, and Internet systems.
 

 
 
nar004-1.jpg
 

 12. 

Entry-level jobs for graduating ____________________ students, given the credentials listed in the accompanying figure, include software engineer, network security specialist, computer hardware designer, new hardware tester, and IT consultant.
 

 

 13. 

Both ACM and AITP offer ____________________ that bring together members with shared interests, needs, knowledge, and experience.
 

 

 14. 

People who may be interested in ____________________ certification include Java programmers, Oracle database managers, programming consultants, SQL programmers, Web software developers, and XML programmers.
 

 

 15. 

People who may be interested in ____________________ certification include hardware service technicians, network consultants, network managers, network engineers, and system administrators.
 

 



 
Check Your Work     Start Over