Business 230- Exam #2 (Questions)
Optimization
A statistical process that find the way to make a design, system, or decision as effective as possible, for example, finding the values of controllable variables that determine maximal productivity or minimal waste.
Access point
A wireless ____ is the devices that all nodes connect to in order communicate wirelessly.
Program flowcharts
Identify the programming tools that uses symbols to show the sequence of steps needed to solve a programming problem.
Office automation system
In an office environment, many organizations set up a(n) ______ to perform various operations such as word processing, accounting, document management, or communications.
Volume
In terms of big data, what includes the scale of data?
Veracity
In terms of big data, what includes the uncertainty of data, including biases, noise and abnormalities?
True
In the data analysis step, the idea is to learn how information currently flows and to pinpoint why it is not flowing properly.
Sequential
In this logic structure, one program statement follows another.
Systems implementation
In this phase of the systems life cycle, the new information system is installed, and people are trained to use it.
True
Most desktop computers require an internal or external wireless adapter to connect to ta wireless access point.
Cyberterrorism
No form of hacking is as dangerous as ______, which is an attack against against a country that seeks to create large-scale chaos and damage to a country's infrastructure.
True
One of the items to be defined in the program specification is the program's objectives.
False
Organizations create an extranet in order to allow their systems to have access to the rest of the internet.
True
Periodic evaluation is part of the system maintenance phase of the systems life cycle.
False
Prediction is a statistical process that finds the way to make a design, system, or decision as effective as possible, for example, finding the values of controllable variables that determine maximal productivity or minimal waste.
Distributed computing
Processes and managers algorithms across many machines in a computing environment
Program specification document
Program objectives, desired outputs, needed inputs, and processing requirements are all recorded in this.
False
Programming is simply typing words into a computer
False
Pseudocode graphically presents the detailed sequence of steps needed to solve a programming problem.
True
Pseudocode is an outline of the logic of the program you would like to write.
False
Regression is a prediction based on time-series information
False
Regression is a statement about what will happen or might happen in the future such a future sales or employee turnover.
True
Regression is a statistical process for estimating the relationships among variables. It includes many techniques for modeling and analyzing several variables when the focus is on the relationship between a dependent variable and one or more independent variables.
In terms of big data what is volume?
Scale of data
True
The DO WHILE loop means that the loop statements will be executed as long as a certain condition exists.
True
The four common characteristics of big data are variety, veracity, volume, velocity.
Program
The list of instructions for the computer to follow to process data into information.
Media
The means used to link together parts of a computer network are referred to as network
True
The network that connects the computers in a school's study center or library is considered a LAN.
True
The organizational can switch to the old system if the new system fails in the parallel conversion approach.
Program specification
The program's objectives, outputs, inputs, and processing requirements are determined during in this step.
True
The report at the end of the program design step typically consists of pseudocode, flowcharts, and logic structures.
True
The top-down analysis method breaks components into smaller components to make each component easier to analyze and deal with.
True
The wireless access points that are used in homes contain integrated routers, as do the devices that ISPs typically provide for internet connectivity.
Automated design tools
These tools are used in system analysis to evaluate alternative hardware and software solutions.
Documentation
This consists of written descriptions and procedures about a program and how to use it.
Pseudocode
This is an outline of the logic of the program you will write.
Beta testing
This is testing a program by a select group of potential users.
Logic
This type of error could be the result of the programmer making an incorrect calculation.
Object-oriented
This type of software development focuses less on the procedures and more on defining the relationships between previously defined procedures.
True
Top-down program designs is used to identify the program's processing steps after the outputs and inputs have been determined.
In terms of big data what is veracity?
Uncertainty of data, including biases, noise, and abnormalities.
What are the two main objectives associated with data mining?
Uncovering trends and patterns
In terms of big data, what includes different forms of structured and unstructured data?
Variety
True
Variety includes different forms of structured and unstructured data.
False
Velocity includes different forms of structured and unstructured data.
True
Velocity includes the analysis of streaming data as it travels around the Internet.
True
Veracity includes the uncertainty of data including biases, noise, and abnormalities.
False
Very few tools are available to assist system analysts and end users in analyzing data.
False
Estimation determines which things go together.
True
A network allows users to communicate and share information between computers and various devices.
Prediction
A statement about what will happen or might happen in the future such as future sales or employee turnover.
Fiber- optic
A ____ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.
Program
A ____ is a list of instructions for the computer to follow to accomplish the task of processing data into information.
Trojan horse
A ____ is a program that disguises itself as an interesting, useful, desirable program in order to gain access to your system.
Virus
A _____ is a type of malware that is attached to a host file and has the ability to replicate or copy, itself.
Bridge
A _____ is device that connects two LANs or two segments of the same LAN.
System
A collection of activities and elements organized to accomplish a goal.
False
A condition must be met before a sequential structure can proceed to the next statement.
True
Advanced analytics focuses on forecasting future trends and producing insights using sophisticated quantitative methods, including statistics, descriptive and predictive data mining, simulation, and optimization.
False
Affinity determines values for an unknown continuous variable behavior or estimated future value.
False
An organization chart shows where the hardware is located within the organization.
In terms of big data what is velocity?
Analysis of streaming data as it travels around the Internet.
Maintenance
As much as 75 percent of the total lifetime cost for an application program is spent on this.
True
Big data is a collection of large, complex data sets, including structured and unstructured data, that cannot be analyzed using traditional database methods and tools.
System implementation
During which phase of the systems life cycle are users trained to use new system?
True
CASE stands for "Computer-Aided Software Engineering"
False
Classification segments a heterogeneous population of more homogeneous subgroups.
True
Coding is only one of the six steps of programming.
Zombies
Computers which are under the external control of a hacker are know as ____.
False
DO WHILE is an example of a sequential structure.
True
Data-mining tools use a variety of techniques to find patterns and relationships in large volumes of information that predict future behavior and guide decision making.
In terms of big data, what is variety?
Different forms of structured and unstructured data.
False
Distributed computing focuses on forecasting future trends and producing insights using sophisticated quantitative methods, including statistics, descriptive and predictive data mining, simulation, and optimization.
True
Distributed computing processes and manages algorithms across many machines in a computing environment.
True
Volume includes the scale of data.
False
Volume includes the uncertainty of data, including biases, noise, and abnormalities.
Advanced analytics
What focuses on forecasting future trends and producing insights using sophisticated quantitative methods including statistics, descriptive and predictive data mining, simulation, and optimization?
Data artist
What is a business analytics specialist who uses visual tools to help people understand complex data?
Outliner
What is a data value that is numerically distant from most of the other data points in a set of data?
The training requirements for users
What would not be described in the systems analysis report?
Classification
Which of the following forms of data mining assigns records to one of a predefined set of classes?
CASE
Which of the following refers to tools that are used to provide some assistance in designing, coding, and testing software?
Attenuation
____ refers to the loss of intensity and clarity of the data signal being transmitted.
Coaxial
_____ cable consists of a single copper wire that is surrounded by insulation and a wire mesh shield.
Wireless
_____ networks use radio signals that travel through the air to transmit data.
Big data
a collection of large, complex data sets, including structured and unstructured data, that cannot be analyzed using traditional database methods and tools.