Exam 5: Computing and Communications Resources
Exam 1: Introduction to Information Systems78 Questions
Exam 2: Information Systems for Competitive Advantage80 Questions
Exam 3: Using Information Technology to Engage in Electronic Commerce78 Questions
Exam 4: System Users and Developers80 Questions
Exam 5: Computing and Communications Resources80 Questions
Exam 6: Database Management Systems79 Questions
Exam 7: Systems Development80 Questions
Exam 8: Information in Action80 Questions
Exam 9: Information Security80 Questions
Exam 10: Ethical Implications of Information Technology80 Questions
Exam 11: Decision Support Systems79 Questions
Exam 12: Everyday Technology Skills20 Questions
Exam 13: Web/HTML Project Using Microsoft FrontPage20 Questions
Exam 14: Web/HTML Project Using Notepad20 Questions
Exam 15: Web/HTML Student Survey20 Questions
Exam 16: Web/HTML Book Purchase20 Questions
Exam 17: Spreadsheet Basics20 Questions
Exam 18: Spreadsheets with Data Capture - Vacation Choice20 Questions
Exam 19: Spreadsheets with Data Capture - Movie Ticket Purchase20 Questions
Exam 20: Database Forms and Reports20 Questions
Exam 21: Database Queries - Customer Database20 Questions
Exam 22: Database Queries - Inventory Database20 Questions
Exam 23: Reports Based on Queries20 Questions
Select questions type
People who try to break into computer systems in order to gather information, deny the owner access to his or her computer resources, delete files, or otherwise disrupt the use of the microcomputer by its owner are called:
(Multiple Choice)
4.9/5
(40)
The key feature of today's personal computing devices is their mobility.
(True/False)
4.9/5
(42)
A cell phone is considered to be a smart phone when it performs tasks typically associated with microcomputers.
(True/False)
4.9/5
(36)
When a business has its own programmers to write application software, the software is called custom application software.
(True/False)
4.8/5
(36)
Which computer component is a device that captures data by a manual or electronic method and transmits the data to storage or memory?
(Multiple Choice)
4.9/5
(42)
____________performs certain fundamental tasks that all users of a particular computer require.
(Essay)
4.9/5
(31)
A cable modem connects to the fiber optics cable provided by a cable TV provider to a computer for Internet access.
(True/False)
4.8/5
(28)
Name the major computer components and provide a brief description of each.
(Essay)
4.8/5
(38)
A packet is a piece of the total data to be communicated, combined with the address of the destination computer, the sending computer, and other control information.
(True/False)
5.0/5
(40)
The type of modem that connects most home computers to the Internet is the:
(Multiple Choice)
4.7/5
(30)
Word size determines how many characters can be moved in a single cycle of the processor.
(True/False)
4.8/5
(38)
A small computer program that monitors what you are doing with your computer resources is called:
(Multiple Choice)
4.9/5
(42)
____________is software anyone can use for free and change it to meet their particular needs.
(Essay)
4.8/5
(35)
What is a common standard for encrypting data over a wireless home network?
(Multiple Choice)
4.9/5
(38)
Mainframe computers support hundreds or thousands of simultaneous users and operations.
(True/False)
4.9/5
(37)
If two peer computers try to send data at the same time, a data transmission crash occurs.
(True/False)
4.9/5
(36)
Showing 21 - 40 of 80
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)