CIS 110 Review #3 Mult Choice

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is a general guideline for developers? Group activities into phases Involve users Define the standards/rules Create system proposal

Define the standards/rules

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely? Cyber bullying Ergonomics Technology addiction Repetitive strain

Ergonomics

Which generation language provides a graphical environment in which the programmer uses a combination of English-like instructions, graphics, icons, and symbols to create code Machine Assembly Procedural Fourth generation

Fourth generation language

What is primary difference between HTML5 and adobe flash types of web animations? HTML5 does not need user to download additional plug-in software HTML5 needs user to download additional plug-in software Adobe flash static graphics, HTML5 can be used to create 3D Adobe flash incorporates HTML5 and is more efficient

HTML5 does not need user to download additional plug-in software

Frame-by-Frame Animation term? Sampling In-betweening Virtual Reality Rendering

In-betweening

Why would company investigate insider from credit card security breach? Insiders cause disruption and panic Insiders create threats after incidents at their places of employment Insiders change contents to make political statement Insiders lack knowledge of computers

Insiders create threats after incidents at their places of employment

____refers to unique and original works Copyright Intellectual property License agreement Digital rights management

Intellectual property

What is best practice of privacy? Saving personal info as email draft Keeping SSN hidden in locked box at home Posting location Throwing away bank statements

Keeping SSN hidden in locked box at home

Isabel: message from FBI saying she needs to pay for data Hacker put a trojan Worm has infected Ransom ware Ignore message

Ransom ware

You can monitor and protect your financial data all but? Being cautious on social media Requesting credit report Querying unfamiliar purchases Throwing away financial documents

Requesting credit report

Which commonly used programming language is used to manage, access, and search for database content? Java C++ SQL HTML

SQL

Jack: Does have smartTV but streams on his TV, what could he use? Joystick TV stick computer stimulated, 3d environment HoloLens Headset

TV stick

What is a digital certificate? Key to unlock information into readable format Used to verify users identity Process of scrambling information Combine multiple types of authentication

Technology used to verify a users identity

What facilitates bundling of video, audio, codec, and subtitles into single package? Inbetweening Compression Video container Sampling

Video container

Ian: version on computer no longer support, what to do? Visit company website and install latest Restart application Troubleshoot by replacing operating system Delete program

Visit company website and install latest

______programs and features are often integrated in video editing virtual reality computer aided tech audio editing simulation

audio-editing

what to prevent illegal distribution access controls intellectual property rights digital rights management license agreement

digital rights management

Emma: What software did she download? Worm trojan Spam Ransomware

trojan

A video that is shared millions of times is original viral fake concurrent

viral


Conjuntos de estudio relacionados

UH Manoa — PH 420 (M. Tagorda) — WEEK 7 : Social-Cognitive Theory

View Set

The Stress Emotions: Anger, Fear, and Joy/ Stress Prone Personality Traits

View Set

RN Pharmacology Online Practice 2019 A

View Set

A&P Ch.1 Introduction to the Human Body

View Set