The Office, Procedures and Technology Chapter 3 Test 1

Similar documents
It is the process of sharing data, programs, and information between two or more computers.

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks

Communications and Networks The McGraw-Hill Companies, Inc. All rights reserved.

Data Communications. Course Design Data Communications. Pre/Post Test (80 Questions/80 Points) Upon Request None No No No

Lecture #25: Networks and Communications. Communication and Networks. What will we learn?

Discovering Computers Chapter 9 Communications and Networks

Lecture 8 Winter 2006 Enterprise and Personal Communications Networks

Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

COMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory )

INTERNET. Intranet & Networking

Network fundamentals IB Computer Science. Content developed by Dartford Grammar School Computer Science Department

Objectives Overview. Chapter 9 Networks and Communications. Discovering Computers Instructor: Imran Khalil MSc-IT 1 st semester Fall 2016

Computer Networks. Computer Networks. Telecommunication Links. CMPUT101 Introduction to Computing - Spring Chapter 12: Computer Networks 1

Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer

8 9 Before: Computers are categorized into three main categories from least to most powerful: microcomputers minicomputers mainframe computers Today:

Installing Your Multifunction to Your Network for the First Time. PIXMA MX350 / PIXMA MX870 Mac OS

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

توصيف مقرر دراسي Description Course

Pengantar Teknologi Informasi dan Teknologi Hijau. Suryo Widiantoro, ST, MMSI, M.Com(IS)

Which one of the following terms describes the physical components of a computer system?

Architecture. Outline. Review - Alibris. Announcements. What is Architecture? TIM 50 - Business Information Systems. How do you architect a solution?

PRINCE GEORGE'S COMMUNITY COLLEGE OFFICE OF INSTRUCTION MASTER COURSE SYLLABUS

Networks. Computer Technology

Chapter 9. Introduction. Communications

Computer Skills Revision. By: Rana Hammady

ITP 140 Mobile Applications Technologies. Networks

Name: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question.

Supporting Networked Computers

Privacy Policy Personal identification information Non-personal identification information Web browser cookies

Solved MCQ of Computer networking. Set-1

Review: Networking Fall Final

N04/5/COMSC/SP1/ENG/TZ0/XX COMPUTER SCIENCE STANDARD LEVEL PAPER 1. Monday 15 November 2004 (afternoon) 1 hour 15 minutes INSTRUCTIONS TO CANDIDATES

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

Entry Level Assessment Blueprint Computer Technology

Technology in Action. Chapter Topics. Participation Question. Participation Question 8/17/11. Chapter 7 Networking: Connecting Computing Devices

The Internet Advanced Research Projects Agency Network (ARPANET) How the Internet Works Transport Control Protocol (TCP)

Cisco Cisco Sales Expert. Practice Test. Version

Fundamentals of Information Systems, Seventh Edition

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

Unit A: Computer and Internet Basics

Technology in Action

Available Instructor Resources Resource File Name Found

INTRODUCTION TO ICT.

CompTIA Network+ Course

Remote Access Techniques and Issues

COMMUNICATIONS AND NETWORKS

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

The Features and Uses of Computer Networking. Unit 11 Task 1

2) A is any device connected to a network such as a computer, printer, or game console. A) packet B) node C) NOS D) NIC

Chapter 9 Introduction to Networks

Connection to the OS32C

Using the AETA Remote Access service

Exam Name: SMB Solutions for Account Managers (SMBAM)

E-companion. Quiz for IT-knowledge

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS

Information Technology (IT)

Topic 4 Transfer of Data in ICT Systems

SAMPLE PAGES. Unit 12.1 Information and Communication Systems Topic 2: Networking. What is a network? Network node

Computers: Tools for an Information Age. Chapter 7 Networking: Computer Connections

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

UNIQUE IAS ACADEMY-COMPUTER QUIZ-15

RAKUNA s PRIVACY POLICY

Data Communication and Network. Introducing Networks

Computer Communication Networks Lecture No. 1

DATA SHEET VANGUARD AUTHENTICATORTM KEY FEATURES:

Networking. Prof. Abdul Hameed

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Computer Networks and the internet. Daniel Graham Ph.D

Chapter 4: Communication Technology. Solutions

3. How is technology used to serve our advertisements on other Sites that you visit and what choices do you have?

8. NETWORKING. 8.1 Introduction

CHAPTER 8 NETWORKS: COMMUNICATING AND SHARING RESOURCES

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

Networks: Communicating and Sharing Resources

Computers Are Your Future Tenth Edition

ITP 140 Mobile Applications Technologies. Networks

Types of Computer Networks. ICS 614: Computer Networks Concepts and Principles 11

Chapter. 6.1 Copyright 2011 Pearson Education, Inc. publishing as Prentice Hall

Chapter by Prentice Hall

SALES LEAD MULTIPLIER INC. PRIVACY POLICY

Which one of the following terms describes the physical components of a computer system?

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers

Communications and Networks

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

ITEC 3800 Data Communication and Network. Introducing Networks

Resource:

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter Ten. From Internet to Information Superhighway

Computer Networks. Cables Radio signals (wireless/wifi) Telephone lines Satellite links (Long distance)

Introduction to Computer Science (I1100) Networks. Chapter 6

INFORMATION COMUNICATION TECHNOLOGY SKS 1362

Introduction to Computers Chapter1

2) Increasingly, voice, video, and data communications are all based on Internet technology. 2) Answer: True False

Course Title: Introduction to Information Technology Course no: CSC-101 Full Marks: Credit hours: 3 Pass Marks:

3050 Integrated Communications Platform

Chapter 6 The Internet

Chapter 5. System Software. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Transcription:

Chapter 3 Test 1 True/False Name Indicate whether the statement is true or false by writing T or F on the line below the statement. 1. Information is essential only to companies that manufacture products. 2. For information to be valuable, it must be current and accurate. 3. Uncoordinated procedures and files can be an obstacle to managing information. 4. The personal computer is the most common piece of equipment that is found in almost all offices. 5. Mainframe computers are large, multipurpose machines with very high processing speeds. 6. Application software contains programs that control the operation of computers and provide the means for communicating with devices connected to computers, such as printers. 7. With a LAN, several computer users can share data files, software, and equipment such as scanners and printers. 8. Electronic data interchange allows the exchange of data between companies that may or may not have compatible computer or network systems. 9. A receiving clerk scanning bar code labels on incoming packages is an example of how people access information in a marketing information system. 10. Relational databases allow the user to link data from a number of database tables to find information or generate reports.

Chapter 3 Test 2 11. A firewall provides easy access for outsiders who want to access a company s intranet. 12. A Web site s privacy policy discusses how customer data will be used. 13. Web browser software provides navigation and search tools to help users find topics and locations on the World Wide Web. 14. Cookies are icons, such as a smiley face, that users sometime place in e-mail messages. 15. As ecommerce continues to grow, companies will need to adapt to new ways of acquiring, using, and sharing information. Multiple Choice Write the letter of the choice that correctly completes the statement or answers the question on the line below the question. 16. A common form of information is a. numbers b. text c. image d. voice e. all of the above 17. Information processing involves a. input b. processing c. output d. storage e. all of the above

Chapter 3 Test 3 18. Converting paper documents to pictures stored and displayed via computer is called a. electronic imaging b. electronic mail c. instant messaging 19. Personal computers are a part of which of the three major categories of computers? a. minicomputers b. microcomputers c. mainframe computers 20. The type of software that contains programs that control the operation of a computer and provide the means for communicating with devices connected to it is called a. utility software b. application software c. communications software d. operating system software e. both a and c 21. A group of connected computers that are close to each other, usually within several hundred feet, is called a. a wide area network b. an Internet c. a local area network d. a microwave transmission 22. Which of the following is a type of transmission carrier? a. fiber-optic cable b. twisted-pair cable c. coaxial cable d. all of the above e. none of the above

Chapter 3 Test 4 23. Software and hardware designed to prevent unauthorized users from gaining access to a computer or network are called a. browsers b. ethernets c. firewalls d. both a and b 24. Which of the following is a type of transmission connection an organization may choose for communicating on a wide area network? a. microwave transmissions b. direct dial lines c. dedicated lines d. satellite communications e all of the above 25. Typical network security measures include which of the following? a. data scans b. use of passwords c. data encryption d. all of the above 26. An information system that enables a business to record business transactions and report financial information is called a. a product information system b. an accounting information system c. both a and b 27. The process in which a software program searches for significant patterns in data is referred to as a. data mining b. data demographics c. data system

Chapter 3 Test 5 28. An information system is composed of which of the following? a. information technology and resources b. procedures used to process information c. people d. all of the above 29. A giant network of computers and smaller networks that spans the globe is called the a. Internet b. extranet c. intranet 30. Privacy of customer data is an area of concern related to a. ecommerce b. choosing a transmission carrier c. designing HTML documents Matching Match each term with the correct definition or description below. Write the letter of the term on the line below its definition or description. a. computer virus b. e-mail c. extranet d. hardware e. information processing f. Internet service provider g. overhead h. relational database i. sales channel j. software 31. Method of marketing products such as through retail stores or catalogs 32. Putting facts or numbers into a meaningful and useful form

Chapter 3 Test 6 33. The physical parts of a computer or related equipment 34. Programs containing instructions for a computer 35. A destructive program loaded onto a computer and run without the user s knowledge 36. A company that sells users access to the Internet 37. Business costs not directly related to a product or service sold 38. A software program that allows the user to link data from a number of database files or tables to find information or generate reports 39. An information network like an intranet, but partially available to select outside users 40. The electronic transfer of messages using computers and software