Computer Science 102 Final Study 1
Given the following table called Students, how many records would be returned using the following SQL database query? SELECT Student ID FROM Students WHERE Financial Aid = Yes AND GPA > 3.0 3 4 5 7
3
Where is a multi-user database typically located? A central computer server The desktop computer of the database administrator A laptop computer which is used by multiple users A desktop computer of one of the employees A USB flash drive that is passed around the office
A central computer server
The federal agency that oversees consumer protection of privacy and deceptive or unfair business practices is the _____. Financial Services Modernization (FSM) Fair Credit Reporting (FCR) Online Privacy Protection (OPP) Federal Trade Commission (FTC) Privacy by Design (PBD)
Federal Trade Commission (FTC)
From an employee perspective, which of the following is NOT a benefit of telecommuting? Financial savings on clothes, fuel, and parking fees Feelings of isolation and loneliness Time saved from not having to commute Ability to control and manage one's schedule better
Feelings of isolation and loneliness
What does the G in GIS stand for? Geographic Global Geologic Graphical
Geographic
What does a computerized system help us do in regards to managing payroll? It helps ensure accuracy, as well as tax filing. It helps us figure out the worth of employees. It helps us find the tax loop holes. It helps us create additional jobs.
It helps ensure accuracy, as well as tax filing.
Why would a chain of grocery stores want to implement ERP? It will be less expensive than their legacy system. It will improve access to data that will assist their decisions on stocking levels. Cashiers can implement it themselves without assistance from management. Implementation will be fast and non-disruptive.
It will improve access to data that will assist their decisions on stocking levels.
The process of finding, gathering, assessing, organizing, and sharing information is known as what? Information management Knowledge management Information technology Knowledge technology
Knowledge management
The acronym MAM stands for? Mobile Application Monitoring Mobile Application Management Miscellaneous Article Management Multiple Article Monitoring
Mobile Application Management
Who developed PERT? Henry Gantt Marines Air Force Navy
Navy
Which of the following is an example of a cybercrime? Identity theft Software piracy Network intrusions All of the responses are correct.
Network intrusions Software piracy Identity theft All of the responses are correct.
How likely is it that MIT had an effect on LISP being used in artificial intelligence? Impossible Unlikely Only Slightly Possible None of the answers are correct
None of the answers are correct
What happens during the classification step? The information is organized. The information is gathered from within the company. The information is given to departments within the company. The information is collaborated.
The information is organized.
Why do some businesses have multiple social media accounts on the same social media site? To keep employees busy with posting content To give the impression that the company is larger than it is So each employee can have an account To differentiate among different departments
To differentiate among different departments
What is an electronic spreadsheet? a tool for basic data analysis based on formulas that define relationships among the data software that helps organize and analyze data an information system to report financial transactions computer systems to store large amounts of data
a tool for basic data analysis based on formulas that define relationships among the data
E-commerce is _____. using computers to promote to consumers the internet pathway to consumers the buying and selling of products or services over electronic systems such as the Internet financial budgeting for promotional plans using the internet to manage production
the buying and selling of products or services over electronic systems such as the Internet
The process component of an information system should include _____. the list of users who will have access to the system the steps for entering information into the system the types of hardware the system will use the software the system will use
the steps for entering information into the system
The process of an expert machine having the abilities to analyze and map relationships in an unfamiliar or random data set is _____ supervised artificial intelligence unsupervised software intelligence supervised machine learning unsupervised machine learning
unsupervised machine learning
Brenda needs a _____ in order to see images on her computer screen. video card sound card network connection hard drive
video card
Jonas spends his time intentionally breaching security to break into personal or e-commerce retailers computers for malicious purposes. Jonas is _____. a hacker violating privacy a slacker not a criminal
violating privacy
_____ is used to plug peripherals into the system unit. A flash drive A USB port A video card An audio card
A USB port
In addition to network security operators, who might be involved with network security? Construction engineers Locksmiths Lawyers All of the answers are correct.
All of the answers are correct.
Which of the following is a characteristic of e-commerce? Handled electronically. Uses a computer network. Involves the buying and selling of goods and services. All of the answers are correct.
All of the answers are correct.
Bill is the new Chief Technology Officer at Z Corp. He plans to use _____ to prevent theft and protect the integrity of Z Corps. data. anti virus software system security monitors biometric security firewalls All of these are correct.
All of these are correct.
What would be the benefits to a chain of grocery stores from using a database? Store inventory data would be available and up to the minute. Top management can easily track each stores sales. Each stores data could be available to other stores. All of these are correct. Multiple users could access store data at the same time.
All of these are correct.
An e-commerce model that involves a transaction directly between a business and a supplier is known as what? E-distribution Industry consortium Exchange E-procurement None of the answers are correct.
E-distribution
Which of the following below is NOT an example of an operating system ? Microsoft Windows 10 Android family of operating systems LINUX Microsoft Office 2016
Microsoft Office 2016
Which programming paradigm uses classes? Object-oriented Procedural Classical Functional Class-oriented
Object-oriented
Which of the following are NOT a method to deliver network security? Hardware appliance Over the telephone Software Cloud service
Over the telephone
Which of the following is false about packets? Packets are small bundles of data. Packets contain headers and footers of information. Packets contain only headers of information. Packets travel in multiple paths in order to reach their destination faster Packets are arranged back together based on instructions and protocols.
Packets contain only headers of information.
Which is NOT a stage of project management? Participation Execution Initiation Close
Participation
Computer software is _____. soft code access code executed on a software program hard code programming code executed on a computer processor
programming code executed on a computer processor
A chain of grocery stores wants to increase its sales and market share. The processes in its information system should _____. provide daily information on the total hours worked by cashiers provide up-to-the-minute inventory information to avoid stock outs provide daily information on accounts payable balances provide up-to-the-minute information for cash on hand
provide up-to-the-minute inventory information to avoid stock outs
Which of the following is NOT one reason to implement an HRIS? ensure personnel managers have access to employee information to make informed decisions increase human resources personnel productivity put all of your employees' information out to the general public using public servers in the cloud decrease costs related to managing human resources
put all of your employees' information out to the general public using public servers in the cloud
When you delete files and shortcuts on your computer, they end up in the _____. deleted file folder hard drive recycle bin garbage can
recycle bin
Which of the following is NOT a typical approach to sharing knowledge within an organization? A Wikipedia search Policies, procedures, and guidelines Communities of practice Meeting software Collaborative software
A Wikipedia search
Choose the software that replicates itself into computer programs and performs some type of harmful activity. A computer virus Spyware A phishing scam Malware
A computer virus
Which of these is an example of a B2C transaction? A government agency buys computers from newegg.com. A consumer buys a computer from newegg.com. Newegg.com buys computers an individual made himself. Newegg.com buys computers from Lenovo. A consumer buys a computer from his brother.
A consumer buys a computer from newegg.com.
Which picture of a storage device is often used as a 'Save' icon in many programs? A compact disc A USB flash drive A hard drive A floppy disk
A floppy disk
Which of the following describes a virtual team? A group of employees who collaborate while physically in different parts of the same building A group of employees who collaborate while on flexible work schedules A group of employees who communicate using top-of-the-line technology A group of employees who collaborate while physically in different geographic locations
A group of employees who collaborate while physically in different geographic locations
A summary of current expenses for an ongoing project is an example of what product of the MIS system? A report A workflow A data stream A document
A report
What is knowledge management? Explicit knowledge from employees Job shadowing another person within the company Transferring written information into verbal information within an organization A series of steps that include identifying, collecting, storing, and sharing explicit, implicit and tacit information
A series of steps that include identifying, collecting, storing, and sharing explicit, implicit and tacit information
The knowledge management strategy used to capture information obtained from observations, perception and feedback from team members after a project is complete is called a(n) _____. After action review Techno-centric theory Job shadow Knowledge mapping
After action review
Which of the following is part of business intelligence (BI)? Key performance indicators Automated monitoring Dashboards All of the answers are correct
All of the answers are correct
C2C e-commerce offers buyers and sellers _____. direct interaction with each other commerce in new and used goods lower costs and higher profits All of the answers are correct.
All of the answers are correct.
What type of information system is predictive analytics typically a part of? Business Intelligence System Decision Support System Management Information System Expert System
Business Intelligence System
How would an auto manufacturer implement a process regarding engineering? By restructuring senior management roles and responsibilities By determining the most efficient order for attaching doors, trunk and hood to the frame By supervisors strictly enforcing the TQM steps on the assembly line By organizing workers into teams By giving each supervisor authority over more employees and tasks
By determining the most efficient order for attaching doors, trunk and hood to the frame
How would a dog-grooming service gain a competitive advantage ? By being open during business hours By specializing in certain types of dogs, like large breeds By using the same grooming tools as competitors By matching competitors service times By organizational restructuring
By specializing in certain types of dogs, like large breeds
Which of the following is NOT a step in the business intelligence (BI) software process? Make sure all data is correct. Train all users. Develop the best possible reports. Know what you want to achieve and what the end goals are. Change your pricing strategy to increase profits
Change your pricing strategy to increase profits
The database administrator has already set permissions for several people to use the system. Three of the users need to be able to use the database at the same time. What function does the administrator need to set? Concurrency Security Backup and recovery Integrity User permissions
Concurrency
In the abbreviations B2C and C2C, what does the 'C' stand for? Client Customers Companies Consumers
Consumers
What is the difference between data and information? They pretty much mean the same thing Data are digital while information is analog Data are basic values or facts, while information consists of organized data used to answer question or solve problems Computers store data while the human brain stores information
Data are basic values or facts, while information consists of organized data used to answer question or solve problems
What is the difference between data mining and OLAP? Data mining uses analytical tools that are used to uncover relationships in the data while OLAP uses the data to find the answers to a specific question. Data mining uses historical data while OLAP uses predictions. Data mining uses basic summaries of tabular data while OLAP uses statistical analysis of tabular data. Data mining uses internal data sources while OLAP uses internal and external data sources. Data mining is a type of database while OLAP is a type of information system.
Data mining uses analytical tools that are used to uncover relationships in the data while OLAP uses the data to find the answers to a specific question.
Which of these floods a server with requests? Sniffer Man in the middle Data manipulation Denial of Service
Denial of Service
Which of the following transmits purchase orders between computers using a standard message format? barcodes RFID EDI ERP
EDI
What best describes computer memory? ROM CPU Electronic storage Virtual information
Electronic storage
Which of the following network security threats concerns unexplained failures? Faults Malicious Use Tampering Unauthorized Access
Faults
Businesses use targeted marketing for all of the following reasons EXCEPT? Target customers based on preferences Hiring employees Send advertisements customized to the customer's likes Predict consumer preferences and behavior
Hiring employees
What is the first step in software prototyping? Develop the prototype Identify initial requirements Evolutionary Beta testing
Identify initial requirements
Which of the following BEST describes business analytics? It's the practice of systematic exploration of an organization's data with emphasis on statistical analysis. It's the financial practice of using information based on forecasting. It's the practice by which the popularity of a business is determined. All of the answers are correct.
It's the practice of systematic exploration of an organization's data with emphasis on statistical analysis.
Which of the following is not considered a form of fraud? Stealing credit card numbers. Making purchases charged to someone else without their knowledge or approval. Running up debt in someone else's name. Tricking someone into providing their social security number. Merchants collecting private data on customers for marketing use.
Merchants collecting private data on customers for marketing use.
Which of the following is NOT a characteristic of LISP? Oldest computer language in existence Designed by John McCarthy Created in 1958 Operates on data and programs
Oldest computer language in existence
In regards to Web 2.0, which option below lists the three forms of connectivity? People to business, offline services, users and software applications People to people, offline services, users and software applications People to business, online services, users and software applications People to people, online services, and users and software applications
People to people, online services, and users and software applications
Which of the following is NOT an advantage of video conferencing? It allows hiring managers to meet with out-of-area candidates Hiring managers are able to interview more candidates in less time Additional features allow screensharing between hiring managers and applicants Persons hired through video feed earn more money than those hired in person
Persons hired through video feed earn more money than those hired in person
The use of software without a license is called _____. File-sharing Scamming Hacking Piracy
Piracy
In the digital world, precautionary steps taken to protect computing resources against cybercrime is called _____. Espionage Security Fraud Identity theft
Security
What is business-to-consumer e-commerce? Selling to individuals online Selling to another business online Selling items at a brick and mortar store Meeting with customers in person
Selling to individuals online
Which of the following is not typically a benefit for consumers of shareware? Low cost Personalized support Try it before you buy it Snazzy packaging
Snazzy packaging
In LISP and artificial intelligence, self-modifying programs are: Unwise Dangerous Undesirable Sought-after
Sought-after
Which of the following is NOT a Scrum role? Product Owner Team Scrum Master Sprint Scheduler
Sprint Scheduler
Which of these sources of software are not normally associated with spyware? Peer-to-peer file sharing sites Browser toolbar sites Shady software vendors Store-bought software
Store-bought software
What is tacit knowledge, and why is it important in knowledge management practices? Tacit knowledge is information that is hard to capture in a tangible form. It is important in knowledge management because necessary information may exist in the minds of experts that is necessary to document for others to learn. Tacit knowledge is information in tangible written form important in knowledge management for use on Share Point websites. Tacit knowledge is implicit knowledge, and it is important because it is in written form and can be used in corporate training. Tacit knowledge is information gained by job shadowing and is important because leaders can use the information from tacit knowledge to increase revenue.
Tacit knowledge is information that is hard to capture in a tangible form. It is important in knowledge management because necessary information may exist in the minds of experts that is necessary to document for others to learn.
In regard to globalization, which of the following statements about the advances in information technology is TRUE? Technology allows companies to communicate more easily with people worldwide and for innovations to spread Technology allows companies to keep jobs on their home soil Technology allows companies to insource, thus expanding their businesses Technology has impacted import/export laws
Technology allows companies to communicate more easily with people worldwide and for innovations to spread
Which of the following is NOT part of the hardware services and software services management function of the operating system ? The ability of the computer to enable the data transfer speed between the USB memory stick and the USB port to be adjusted automatically The ability to restrict the execution of supervisory commands only to authorized or admin users The ability to ensure that appropriate software instructions can only be executed within the allowable context The ability of the computer to raise an alert when a word is wrongly spelt by a user when using a word processor
The ability of the computer to raise an alert when a word is wrongly spelt by a user when using a word processor
Which of these is a key performance indicator for a region consisting of 10 cell phone stores? A list of all of the store managers How many new phone models will be available next month The percentage of the monthly sales quota achieved to date The utilities expense at each store How many stores were open at the start of the month
The percentage of the monthly sales quota achieved to date
What is requirements gathering? The process of gathering specifications from the client to determine requirements for the project The process of designing the code The process of implementing the code The process of designing the software
The process of gathering specifications from the client to determine requirements for the project
What happens during the design stage? The software/product is designed based on the customer requirements. The code is deployed. The customer tests the product in stores. The codes are tested.
The software/product is designed based on the customer requirements.
Why would a company want to implement Total Quality Management or TQM? To determine the lowest cost method of producing its products To improve customer satisfaction To maximize its revenues To be better corporate citizens of the community To re engineer all processes within the company
To improve customer satisfaction
Which of the following is NOT a reason why companies downsize? To cut costs To increase efficiency To reorganize jobs To increase morale
To increase morale
Which of the following is the main purpose of job design? To increase worker motivation and production To increase lay offs To incorporate user-friendly technology To eliminate boring tasks
To increase worker motivation and production
If you are a victim of identity theft, which of the following is not an action you should take? File a police report. Track down the criminal and confront him or her. Keep records of all transactions. Alert the major credit reporting agencies. Hire a lawyer.
Track down the criminal and confront him or her.
The only real way to avoid most adware is to: Unplug your computer from the Internet Use an alias when you go online Only give your email address to people you trust Avoid going online during peak times
Unplug your computer from the Internet
_____ uses encrypted data before it is sent over a public network VPN WAN SAN MAN
VPN
A high score in a video game may change over time. Where is this value stored for the program to work with? Variable Control and output Loop Conditional
Variable
Why do websites have a privacy policy? Websites need to advise visitors not to pass on copyrighted information found on those websites. Visitors need to know what happens to their information after they share it. Websites have public pages and private pages, and this lists which pages are private. Visitors are overly trusting, and a privacy policy helps remind visitors to be more suspicious.
Visitors need to know what happens to their information after they share it.
Which of the following is NOT a component of e-commerce hardware infrastructure? Encryption Devices Web Analytics Servers Firewalls
Web Analytics
In what type of interview situation would it be preferable to utilize video conferencing rather than a telephone interview? When the interviewers want to view and compare notes later about the appearance of the candidate When the company is close to making a hiring decision and wants to save time interviewing new candidates When the interviewee needs to share their screen and provide a demonstration of their capabilities When the interviewer needs to ask a standardized list of questions in every interview
When the interviewee needs to share their screen and provide a demonstration of their capabilities
When Angela buys a new smartphone that uses retina scanning instead of a password, the phone is using _____ security. anti virus encryption biometric anti spyware system
biometric
Which of the following is NOT a major component in information systems? people process technology budget
budget
Processes in an information system should align with _____. technology employees company goals network communication
company goals
What term is similar to e-business but focuses specifically on buying and selling? e-economy e-world e-company e-commerce
e-commerce
An important element of any agile method is _____. frequent testing user training all-night coding sessions the choice of coding language
frequent testing
The best way a business can protect its customers from fraud is to _____. use spyware hire policemen as store greeters have a secure checkout process belong to as many networks as possible use only third party cookies
have a secure checkout process
The main function of a computer hardware engineer is to _____. create websites drive systems invent new technology Maintain the hardware of an organization make software developer's idea a reality
invent new technology
BIOS is an example of _____. machine-level software early programming code hardware-level applications operating-level software
machine-level software
What is forecasting useful for? describing how weather is formed making an educated estimate based on past patterns and trends describing how big data analytics works describing how much information can be used to predict the future
making an educated estimate based on past patterns and trends
In information technology (IT), it is important to _____ in order to build business-to-business connections. give feedback even out network evolve
network
Your _____ has/have become as important as your wallet in this world and you must be ready to protect it. keys driver's license smartphone address
smartphone
What is an information system? software that helps organize and analyze data computer systems to store large amounts of data software to solve complex problems by following the reasoning of an expert software to perform statistical analysis on data
software that helps organize and analyze data
A small computer program gets stored on a user's hard drive. The program then collects the user's habits and transmits that information to a third party, all without the user's consent. From this description, the small program is _____. employee Internet management (EIM) software spyware a system utility a webcam
spyware