Name: Group: 1. This is the computer’s primary text input device. A. monitor B. mouse C. keyboard D.

floppy disk drive 2. The computer monitor’s display provides A. hard-copy output. B. permanent output. C. primary output. D. soft-copy output. 3. These computers will take over automatically should a main computer fail. A. secondary B. peripheral C. stand-alone D. backup 4. This allows a user to work with the rows and columns of data in a spreadsheet. A. database objects B. spreadsheet memory C. spreadsheet software D. database software 5. Which of the following is not a true statement with regard to IT competency? A. IT-competent people will be comfortable operating and repairing a computer system. B. IT-competent people will understand the impact of computers on society, now and in the future. C. IT-competent people will be able to make the computer work for them. D. IT-competent people will be conversant in the language of computers and information technology 6. Which of the following is NOT a correct statement regarding bits and characters? A. Bits are 1s and 0s. B. A character is usually the same as a byte in terms of data storage. C. The bit is the basic unit for human perception. D. A character is represented by a group of bits. 7. Which of the following is NOT a correct statement regarding the operating system? A. The operating system is actually a family of applications software programs. B. The operating system is the nucleus of all software activity. C. Unix, Linux, and Windows XP are popular operating systems for PCs and workstations. D. One of the operating system programs loads other operating system and applications programs to RAM as they are needed.

8. This is NOT one of the commonly used icons. A. application B. document C. utility D. shortcut 9. In a spreadsheet, the A. columns are numbered and the rows are lettered. B. rows are numbered and the columns are lettered. C. rows are sorted in ascending order and the columns are sorted in descending order. D. rows and columns are both randomized. 10. Microsoft Access allows a user to do all of the following EXCEPT: A. Generate formatted reports with subtotals and totals. B. Sort files in order of size by key fields. C. Extract and list information that meets certain conditions. D. Make inquiries.


network connection B. TCP/IP D. 13. TCP B. A. nancy_smith 21. The first thing done to set up a database table is to specify its A. smith. domain name 18.prenhall. D. With regard to the Internet. A. hyperlink C. this is important. this identifies the folder. HTML B. HTML 15. rows and columns C. availability D. cost C. B. related cells 12. placement 2 . size B.stateuniv. router name D. A. related fields B. ISP C. records. ISP C. A. ISP C. A. A.html. This is a unique name that identifies an Internet host site. home B. stateuniv. A. information service gateway D. structure. A. AOL 17. internet service provider 14. In a database. size. This sets the rules for the packaging of information into packets. Long B. C. URL 16. the user name is A. URL B. main 19. direct download C. In the URL. POP B. This is not one of the most popular ways to connect a PC to the Internet.11. related files D. This is normally the first page a user views on a Web site. C. nancy_smith@cis. 10e C. these are grouped to form records A. or presence on. URL D. Http C. prenhall relationships. cis. URL D. In the Internet address. http://www. HTP D. D. ISP 20. This is the Internet equivalent of an address. B. This is an organization that provides individuals and other organizations with access to.

HTML C. The recording surface is divided into pie-shaped segments in A. HTTP B. Floppy D. TCP/IP 32. C. HTML C. bandwidth. A. Radio signals D. fatband. clusters. C. A. baudwidth. tracks. Transceivers provide users with tremendous flexibility in the location of PCs and terminals in a network. A. 50 MB 24. 28. D. Microwave signals C. pits. router capacity. Fiber optic cable 30. B. TCP/IP 3 . B. broadband. Which of the following is NOT a correct statement with regard to wireless communication? A. narrowband. B. The number of terminals/PCs that can be linked via transceivers is limited by the frequencies allotted for this purpose. Permanent hard disks have storage capacities from about A. A. 100 GB C. This is a collective reference to the protocols that link computers on the Internet. address organization. A. disk organization. 31. On a recording surface. FTP D. Satellites B. FTP D.5-inch diskette. Fiber-optic C. One of the advantages of this data communication is that data can be transmitted from one location to any number of other locations anywhere on our planet. Transceivers link computers via multidirectional sound waves. D. the adjacent sectors are combined to form A. D. D. This is a collective reference to the protocols that link computers on the Internet. The wireless transceiver hooks into a USB or PCMCIA slot. digital convergence. C. This is the traditional 3. Transmission of these signals is line-of-sight. Satellite 29. D. track organization. cylinders. 10MB D. Jaz® C. baudband. Superdisk B. A variety of communication channels carry digital signals between computers and are rated by their A. C. B. 26. Zip® 23. 10 GB B. A channel with a low bandwidth is called A. B. C. Coaxial cable B. 27. Microwave D. HTTP B.22. sector 25.

A. sphere C. Which of the following is NOT a correct statement with regard to peer-to-peer LANs? A. fiber optic C. B. A. D. LAN B. router C. A.33. thin clients D. network address D. network modem B. A. bus B. MAN D. A. WAN C. coaxial 42. Home network 39. fortress B. This software is designed to restrict unwanted access to an organization’s network or its intranet. MAN D. 43. star D. network topology 36. digital gate 4 . and microcomputers along a common cable. Which of the following type of computers does NOT provide the foundation for local area networks? A. A. This is a network designed for a city. network format 34. Peer-to-peer LANs are more sophisticated than those that have one or more dedicated servers in support of client/server networking. This network topology permits the connection of terminals. LAN C. This is assigned to each computer system and terminal/PC in a computer network. This is NOT one of the types of cables that can be connected to the NIC. workstations B. network password B. ring D. A. triangle C. supercomputers C. A. WAN B. PCs 41. bus B. In a peer-to-peer LAN. ring B. This connects nodes in widely dispersed geographic areas. twisted pair D. This is the primary hardware/software technology used to alleviate the problems of linking incompatible networks. all PCs are equals. bus 38. C. peripheral devices. Peer-to-peer LANs are popular when small numbers of PCs are involved. node D. network router D. infrared B. This is NOT one of the basic computer network topologies. home network 40. This is a description of the possible physical connections within a network. A. star 37. network style C. Any PC can be a client to another peer PC or any PC can share its resources with its peers. network backbone C. token 35.

Hyperlink Transfer Markup Language. correctness D. timeliness D. environment B. ergonomics D. B. 53. C. D. This quality of information refers to the appropriateness of the information as input for a particular decision. hidden. 45. HyperText Master Link. D. 46. This has only recently emerged as an important consideration in fitting computers in workplace design. C. relevance B. relevance B. tactical level. A. exactness 50. timeliness C. D. A. site location 47. operational level. company size C. E-commerce transactions are safer for both merchant and consumer in the cyberworld because they are A. encrypted. matching D. encoded door D. A. organizational D. A. relevance 49. scrambled. B. correctness C. This management level determines long-term objectives and sets corporate objectives and policies to be consistent with these objectives. firewall 44. C. B. The issue with the greatest ethical overtones is the ___________ of personal information. A.C. accuracy B. A. correctness 52. tactical C. veiled. viability C. completeness B. IT-based information systems provide information for managerial decision making at all of the following levels EXCEPT the A. strategic level. completeness D. privacy 48. operational 5 . clerical level. This quality of information refers to the degree to which it is free from omissions. This quality of information refers to the time sensitivity of information. footprinting B. A. completeness C. IT has contributed more toward improving this quality of information than any of the other information qualities. HyperText Markup Language. completeness 51. HTML stands for A. computer monitoring C. timeliness D. strategic B. Hyperlink Text Master Link.

At this management level. Manual systems consist of all of the following EXCEPT: A. relevant C. EIS C. A. programming B. response to a prompt B. DP D. A. A. frequent D. people. 65. functional C. D. Which of the following is NOT a correct statement with regard to the MIS and DP system? A. DSS B. DSS 6 . integrated 60. MIS caters to the information needs of all levels of management. 58. synchronous D. online 61. requested 63. A. operational B. DES B. function-based D. This type of information system inputs results from the recording of a transaction or an event. Transactions are entered directly to the system as they occur in this type of processing. This results in the right information reaching the right decision maker at the right time in the right form. D. transaction-oriented 62. inquiry C. current B. filtering 56. This system is best at supporting decisions that involve structured problems. organizational 55. DP D. MIS C. B. sequential C. A DP system usually produces only scheduled reports. strategic C.54. DP systems tend to support all functional areas. personal judgment and intuition used in conjunction with available information provides the foundation for most decisions. This type of information system shares a common database. A. A. data. transaction-oriented D. sequential C. instruction D. software. SIP 64. batch B. C. C. redundant B. matching D. A. integrated B. tactical D. B. procedures. accuracy C. Data are said to be this if they can be accessed and manipulated by the processor. Transactions are grouped and entered consecutively in this type of processing. A. This type of system provides needed information at all levels of management. MIS has greater flexibility in meeting the information needs of management. A. source data 57.

port B. processed language. controlled language. The only language that a computer understands is A. control unit 69. ROM B. 7 .66. B. cache D. control unit 68. A. knowledge-based 67. processor. A. CPU C. You can think of this as the PC’s brain and this as the PC’s central nervous system. chips C. C. motherboard. This is a single circuit board that provides the path through which the processor communicates with memory components and peripheral devices. Ultimately. Technically speaking. processor B. integrated D. the type of processor and the amount of this placed on the motherboard define the PC’s speed and capacity. an expert system is the highest form of this system. functional B. machine language. A. A. motherboard D. RAM D. internal language. motherboard. D. decision-support C. controls 70. motherboard C. device controller.

Sign up to vote on this title
UsefulNot useful