104 final exam ATTEMPT 9

¡Supera tus tareas y exámenes ahora con Quizwiz!

True or False: Asymmetric encryption is also called secret key encryption.

FALSE

True or False: An expert system contains a knowledge base, which is a set of facts and rules about a specific complex application.

TRUE

True or False: Visualization as a Service (VaaS) involves hiring an expert to transform data into stunning visuals.

TRUE

Many companies control employee access to secure areas using a _____, such as a voice, a fingerprint, hand geometry, facial geometry, a retinal pattern, an iris pattern, or a handwritten signature. · smart card. · biometric identifier. · tracking system. · user name and password.

biometric identifier.

Which of the following is a secure form of Hypertext Transfer Protocol (HTTP) that provides encryption for data sent through a web-based connection? · Secure Sockets Layer (SSL). · Transport Layer Security (TLS). · Web-Based Encryption (WBE). · Hypertext Transfer Protocol Secure (HTTPS).

· Hypertext Transfer Protocol Secure (HTTPS).

Which of the following provides the lowest level of service? · Software as a Service (SaaS). · Platform as a Service (PaaS). · cloud service provider (CSP). · Infrastructure as a Service (IaaS).

· Infrastructure as a Service (IaaS).

Microsoft _____ is a collaboration platform that's commonly used by large corporations to set up web-based or cloud-based team collaboration spaces. · Exchange. · Exchange Online. · SharePoint. · Office 365.

· SharePoint.

Suppose that a hacker gains access to a hospital's patient records and exposes confidential medical information. The negative effects on the hospital's reputation and patient relationships that result are examples of damage to which of the following? · assets. · risk tolerance. · software. · hardware.

· assets.

A _____ attempts to gain access to a system for malicious purposes without the owner's consent. · white-hat hacker. · black-hat hacker. · terrorist. · programmer.

· black-hat hacker.

Java has _____, which means it can run on nearly any operating system. · nonprocedural language. · communication facilitation. · scripting language. · cross-platform compatibility.

· cross-platform compatibility.

About half of all high school students have reported being victims of _____, according to the National Crime Prevention Council. · hate speech. · cyberbullying. · social media engagement. · pornography.

· cyberbullying.

A location that houses a large computing operation with numerous networked servers is called a(n) · data center. · cloud computer. · service provider. · infrastructure.

· data center.

Specifications that document the details of the software that programmers will write are produced during the _____ phase of the software development life cycle (SDLC). · testing. · implementation. · design. · proposal and planning.

· design.

Sophisticated software that uses artificial intelligence techniques to model an expert's knowledge of a topics is called a(n) · quality system. · knowledge system. · expert system. · smart system.

· expert system.

Suppose an auto manufacturer wants to upgrade its existing computer-integrated manufacturing system. To determine the likely size and cost of the project, the company will conduct a _____ study. · viability. · research. · practicality. · feasibility.

· feasibility.

A database ____ can be used to identify a set of information and therefore provide a means of searching or sorting. · key. · lock. · collection. · transaction.

· key.

To be able to continue to access the information stored in a(n) _____, the programming code must be made compatible with the newer system. · data dictionary. · database management system. · integration system. · legacy database.

· legacy database.

A _____ error occurs when a program's syntax is correct, but the program instructs the computer to perform an action incorrectly. · run-time. · logic. · style. · syntax.

· logic.

Which of the following technologies includes the use of smart medical devices, along with connected mobile apps and software, to enhance patient monitoring and healthcare? · eHealth. · mHealth. · smart health. · smart grid.

· mHealth.

The response to a request for proposal (RFP) typically asks for a(n) _____, which includes an estimate of how long the project will take to complete, an outline of the steps involved, and a list of the deliverables. · feasibility study. · project plan. · outsourcing prospectus. · software development.

· project plan.

Virtual servers typically operate in a self-service fashion, allowing IT staff to add and remove new cloud services at will. This configuration or setup process is known as · provisioning. · virtualization. · cloud computing. · processing.

· provisioning.

Within a company or business, _____ is the process of creating and commercializing new technologies and products for new markets. · smart technology creation (STC). · special projects consideration (SPC). · research & development (R&D). · collaboration & communication (C&C).

· research & development (R&D).

A(n) _____ operation is a loosely organized team allowed to pursue extreme innovation—often operating not only outside the corporate rulebook but also in a separate location away from the main corporate campus. · skunkworks. · top-secret. · research & development (R&D). · elite.

· skunkworks.

Chapter 10 states that a simple decision support system (DSS) can be created using a _____ program. · spreadsheet. · word-processing. · database. · presentation.

· spreadsheet.

Online hotel and airline reservation sites use _____ databases to hold availability and pricing information. · relational. · XML. · web. · hybrid.

· web.


Conjuntos de estudio relacionados

the point chapter 53 renal/urinary function

View Set

Pharmacology Ch. 48 & 49 Drugs Affecting Coagulation & Anemia

View Set

Ch. 7 - HW (volcano case histories)

View Set