CIS 1 Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

2

2

3

3

4

4

5

5

Because smartphone are computers and have many of the same security risks as computers you should have

Antivirus Software

In step in which the old IT system is converted to the new IT system is called the

Implementation step

The step in which the old IT system is converted to the new IT system is called the system

Implementation step of the SDLC

The roles of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an organization's IS typically falls to the

Information Systems (information technology) Security manager

Computer hardware and software that an organization uses to increase it performance is referred to as its

Information Technology System

Because Object-C was difficult to write in, Apple developed

Swift

The first step in the program development life cycle is

"Defining the problem"

The bandwidth required by streaming video offered by companies like Hulu and Netflix made

Unlimited Data Plans

AJAX stands for Asynchronous JavaScript and

XML

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ___

administrator

The second step of the SDLC process involves collecting data about existing hardware and software, analyzing this data, and preparing specifications for the system. This is called the system ___ step.

analysis

Large database, often called data banks, that cover particular subjects are referred to as

commercial database

A program that takes an entire program, check the source code for errors, and converts it into machine language is a ___ .

compiler

Stubhub uses a

complex database

A deliberate misuse of computers and networks via the internet that uses malicious code to modify the normal operations of a computer of network is called a

cyberattack

The third step of the SDLC has 3 phases, specifically, developing several system proposals, selecting the most feasible proposal, and reporting on the selected system to be developed. This step is called the system ___ step.

design

The "G" in 3g and 4g stands for

generation

A category of cyber terrorism that focuses on hacking computer systems for politically or socially motivated purposes is

hacktivism

Overheating, humidity, and magnetic fields can cause

hardware

Forms structure data input to help ensure data

integrity

The reliability and the accuracy of the information in a database is referred to as data

integrity

A virus written in a specific language and placed within a document or spreadsheet is called a

macro virus

Malware is short for

malicious software

In a relational database, ab important field that contains a unique value that identifies reach record as individual is the

primary key

After your phone's analog-digital converter chip changes the sound of your voice to a digital signal, the signal is enhanced by a digital signal ___

processor

In a relational database, such as Microsoft Access, a collection of related fields in a data file is called a

record

A type of malware that is triggered each time you boot your computer is called a

rootkit

Computer viruses typically must be

run

Amateur

script kiddies

Stored in temporary memory,

session cookies

Software that collects information about your internet surfing habits and behaviors is called

spyware

Because smartphones are easily misplaced or , it's good to have an app such as "Where's My Droid?"

stolen

Because of the significant costs of data packages and other smartphone expenses, calling and

texting charges tend to be

A programming design that breaks down a problem into a series of tasks is called

top-down programming

Based on current trends, it's likely that future apps will be more engaging and include more

video

The 3rd generation programming language that most students learned when most computers used MS DOS was

BASIC

When referring to management information systems, ESS stands for

Executive Support System

MMS

Multimedia Messages Service

JSON stands for JavaScript ______________ Notation

Object

The process used to develop and maintain an IT system is referred to as the SDLC. SDLC stands for the

System Development Life Cycle

Because it can store virtually unlimited amounts of data that can be shared across networks, and because the data can be kept far more accurately, a

database

A DBMS maximizes the benefits a database can provide DBMS stands for

Database Management System

The small computer within your phone that enhances the sound quality of your call is called a

Digital Signal Processor

The programming element above represents a

LOOP

The final step in the SDLC has two phases, a system audit and an evaluation phase. This final step is referred to as ___ the system.

Maintaining

When referring to buisness information technology, MIS stand for

Management Information System

Stored on a user's hard drive, a type of cookie that collects information about user preferences, password and username information, IP address, and data on web surfing behavior is referred to as a

Persistent cookie

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the information system

Program manager

Converting a task into commands that a computer can use to perform the task is called ___ .

Programming

Instructions that allow a computer to be used are written using specific symbols, letters and numbers known as

Programming language or code

The shorthand that programmers use while building an algorithm is called

Pseudocode

The manufacturer of the Galaxy smartphone and the Note is

Samsung


Conjuntos de estudio relacionados

Auditing and Evaluation, Management Services, Musculoskeletal System

View Set

HIT II: Neurologic Function (PART 2)

View Set

маркетинг лекція 2

View Set

Chapter 12: Using Mobile Computers

View Set

abeka 8th grade english reading quiz c

View Set

chapter 26 : The fetal spine and muskuloskeletal system

View Set

Chapter 1: Psychiatric Mental Health Nursing and Evidence-Based Practice

View Set