104 final exam ATTEMPT 9
True or False: Asymmetric encryption is also called secret key encryption.
FALSE
True or False: An expert system contains a knowledge base, which is a set of facts and rules about a specific complex application.
TRUE
True or False: Visualization as a Service (VaaS) involves hiring an expert to transform data into stunning visuals.
TRUE
Many companies control employee access to secure areas using a _____, such as a voice, a fingerprint, hand geometry, facial geometry, a retinal pattern, an iris pattern, or a handwritten signature. · smart card. · biometric identifier. · tracking system. · user name and password.
biometric identifier.
Which of the following is a secure form of Hypertext Transfer Protocol (HTTP) that provides encryption for data sent through a web-based connection? · Secure Sockets Layer (SSL). · Transport Layer Security (TLS). · Web-Based Encryption (WBE). · Hypertext Transfer Protocol Secure (HTTPS).
· Hypertext Transfer Protocol Secure (HTTPS).
Which of the following provides the lowest level of service? · Software as a Service (SaaS). · Platform as a Service (PaaS). · cloud service provider (CSP). · Infrastructure as a Service (IaaS).
· Infrastructure as a Service (IaaS).
Microsoft _____ is a collaboration platform that's commonly used by large corporations to set up web-based or cloud-based team collaboration spaces. · Exchange. · Exchange Online. · SharePoint. · Office 365.
· SharePoint.
Suppose that a hacker gains access to a hospital's patient records and exposes confidential medical information. The negative effects on the hospital's reputation and patient relationships that result are examples of damage to which of the following? · assets. · risk tolerance. · software. · hardware.
· assets.
A _____ attempts to gain access to a system for malicious purposes without the owner's consent. · white-hat hacker. · black-hat hacker. · terrorist. · programmer.
· black-hat hacker.
Java has _____, which means it can run on nearly any operating system. · nonprocedural language. · communication facilitation. · scripting language. · cross-platform compatibility.
· cross-platform compatibility.
About half of all high school students have reported being victims of _____, according to the National Crime Prevention Council. · hate speech. · cyberbullying. · social media engagement. · pornography.
· cyberbullying.
A location that houses a large computing operation with numerous networked servers is called a(n) · data center. · cloud computer. · service provider. · infrastructure.
· data center.
Specifications that document the details of the software that programmers will write are produced during the _____ phase of the software development life cycle (SDLC). · testing. · implementation. · design. · proposal and planning.
· design.
Sophisticated software that uses artificial intelligence techniques to model an expert's knowledge of a topics is called a(n) · quality system. · knowledge system. · expert system. · smart system.
· expert system.
Suppose an auto manufacturer wants to upgrade its existing computer-integrated manufacturing system. To determine the likely size and cost of the project, the company will conduct a _____ study. · viability. · research. · practicality. · feasibility.
· feasibility.
A database ____ can be used to identify a set of information and therefore provide a means of searching or sorting. · key. · lock. · collection. · transaction.
· key.
To be able to continue to access the information stored in a(n) _____, the programming code must be made compatible with the newer system. · data dictionary. · database management system. · integration system. · legacy database.
· legacy database.
A _____ error occurs when a program's syntax is correct, but the program instructs the computer to perform an action incorrectly. · run-time. · logic. · style. · syntax.
· logic.
Which of the following technologies includes the use of smart medical devices, along with connected mobile apps and software, to enhance patient monitoring and healthcare? · eHealth. · mHealth. · smart health. · smart grid.
· mHealth.
The response to a request for proposal (RFP) typically asks for a(n) _____, which includes an estimate of how long the project will take to complete, an outline of the steps involved, and a list of the deliverables. · feasibility study. · project plan. · outsourcing prospectus. · software development.
· project plan.
Virtual servers typically operate in a self-service fashion, allowing IT staff to add and remove new cloud services at will. This configuration or setup process is known as · provisioning. · virtualization. · cloud computing. · processing.
· provisioning.
Within a company or business, _____ is the process of creating and commercializing new technologies and products for new markets. · smart technology creation (STC). · special projects consideration (SPC). · research & development (R&D). · collaboration & communication (C&C).
· research & development (R&D).
A(n) _____ operation is a loosely organized team allowed to pursue extreme innovation—often operating not only outside the corporate rulebook but also in a separate location away from the main corporate campus. · skunkworks. · top-secret. · research & development (R&D). · elite.
· skunkworks.
Chapter 10 states that a simple decision support system (DSS) can be created using a _____ program. · spreadsheet. · word-processing. · database. · presentation.
· spreadsheet.
Online hotel and airline reservation sites use _____ databases to hold availability and pricing information. · relational. · XML. · web. · hybrid.
· web.