CIS

¡Supera tus tareas y exámenes ahora con Quizwiz!

wiki

A _________ is a collaborative Web application that provides tools that enable contributors to post, read, and modify content.

True

A copyright holder has total control over how a work may be used.

graphical user interface

A key feature of the Apple Lisa was its use of _______________.

Analytical

A(n) _________ database is used to collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions.

Operational

A(n) _________ database is used to collect, modify, and maintain data on a daily basis

code of ethics

A(n) _________ is a set of guidelines designed to help professionals thread their way through a sometimes tangled web of ethical on-the-job decisions.

single level, multi level

A(n) _________ sort uses one field, to arrange records. A(n) _________ sort arranges information by more than one field.

False

Access to databases is usually open to anyone within an organization or business.

False

Certification alone is sufficient to qualify for a job in the IT industry.

True

Companies are classified into economic sectors according to the types of goods and services they provide.

True

Crowdsourcing is based on contributions from groups of individuals, but it differs from collaborative work

False

Data cannot flow over multiple networks that have different topologies.

True

Domain name servers maintain lists of all domain names and their corresponding IP addresses.

True

Enterprise database applications tend to have some flexibility for customization,

False

File sharing poses no real security risks.

True

FileMaker Pro and Microsoft Access are DBMSs.

False

In a case-sensitive database, uppercase letters are equivalent to their lowercase counterparts.

Field

In a database, a(n) __________ contains the smallest unit of meaningful information

True

In a relational database, relationships are specified by joining common data stored in records from different tables.

goods, services

In economics, _________ are things that can be used or consumed, whereas _________ are intangible actions performed for a consumer.

True

Information technology law is the legal framework that applies to the collection, storage, and distribution of digital information.

True

LANs use many of the same network technologies as the Internet.

True

Many RFID and NFC tags contain no power source of their own and depend on the receiving device to provide the power for data exchange.

False

Most Internet connections are symmetrical.

True

Networks can be classified according to their size and geographic scope.

False

Relational databases store unstructured data.

True

SQL works behind the scenes as an intermediary between the database client software provided to users and the database itself.

True

Samuel Morse developed and patented a telegraph system.

True

Social media sites, such as Wikipedia, YouTube, and Flickr, are examples of content communities.

True

The Internet is the world's largest WAN.

True

The Stuxnet virus that disabled Iranian nuclear centrifuges is an example of cyberwarfare.

ICT Industry

The __________ is made up of businesses that focus on digital equipment, software, communications technologies, and related services.

DBMS

The acronym ____________ refers to software that manages data stored in a database.

Fair use

The concept of _________ allows for the limited use of copyrighted material without obtaining permission from the copyright holder.

True

The goal of normalization is to minimize data redundancy.

True

The growth of the ICT industry has a generally upward trend.

False

The organization that supervises Internet addressing is ARPANET.

False

The terms outsourcing and offshoring are the same thing.

False

Transistors performed functions similar to vacuum tubes, but they were larger and more power hungry.

ICANN

What organization is the top-level authority for supervising domain name requests?

Digital millennium copyright act

Which of the following information technology laws makes it illegal to circumvent copy-protection technologies, such as those used to prevent unauthorized copying of software CDs, music CDs, and movie DVDs?

Computers that run OS X replacing computers that run Windows 8.

Which of the following would not be considered a disruptive technology?

Blog

Which term is used to describe an online, personal journal in the form of a web page that contains posts on one or more topics which are usually displayed in reverse chronological order?

PAN

Which type of network connects smart devices or consumer electronics within a range of about 30 feet (10 meters) and without the use of wires or cables.

WAN

Which type of network cover a large geographical area and usually consists of several smaller networks, which might use different computer platforms and network technologies.

False

While users can view content, they cannot post any content on YouTube

True

Whistleblowing is risky under any circumstances.

Packet Switching

_________ technology divides a message into several packets that can be routed independently to their destination.

Third

_________-party apps are external programs that interact with social networking services.

Social media

__________ are online services that facilitate communication and interaction among people who want to share information

Geosocial

___________ networking provides a platform for users to carry out interactions based on their current locations.


Conjuntos de estudio relacionados

Sadlier Vocabulary Workshop Level D Units 4 - 6 synonyms

View Set

6.12.3 Find Configuration Information 1

View Set

Chapter 3: Interests and Estates

View Set

Pharmacology (hematologic system)

View Set

Chapter 5: Interviewing and Interrogation

View Set

10. hét - Monetáris politika és infláció

View Set