IT final exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

Suites of powerful applications designed specifically to help with project management, programming, user testing, and so on are referred to collectively as _____ tools. rapid application development (RAD) computer-aided software engineering (CASE) object-oriented programming (OOP) software development kit (SDK)

(CASE)

One of the most widely used 3-D file formats for 3-D printers uses the _____ file name extension. .pdf .jpg .stl .docx

.stl

Which of the following is an example of numeric data? 1234 Main Street TRUE 626 December 8, 2021

626

Using which of the following techniques ensures that users enter correct and complete data into the system? data contamination data integrity data validation data normalization

Data validation

When you use a(n) _____ to pay for a purchase, it automatically transfers the appropriate payment information to the retailer. virtual debit card digital wallet micropayment virtual credit card

Digital wallet

True or False: A worm adds itself to another program and waits for the user to execute an attachment or open a file with a macro.

FALSe

True or False: Query tools are used to design and test data tables in a database.

False

True or False: The transfer of a large amount of money from one person to another is referred to as a micropayment.

False! micro means small silly!!

Which of the following statements does not describe a K-slot? It's used to secure a desktop computer to a specific desk. It's named after the company that created and sells the lock. It may be a combination lock or key-opened lock, depending on the model. It connects to a laptop through a slot or hole in the side of the computer.

It connects to a laptop through a slot or hole in the side of the computer.

A _____ error occurs when a program's syntax is correct, but the program instructs the computer to perform an action incorrectly. run-time logic style syntax

Logic

A(n) _____ collects, stores, and transmits data in a shared environment. radio frequency identification (RFID) distribution logistics system (DLS) management information system (MIS) office information system (OIS)

OIS

When a company wants to hire a systems vendor or integrator, it sends out a _____ to one or more possible suppliers. project plan business system analysis request for proposal feasibility study

Request for proposal

Which type of query command asks a database to return records that match specified criteria? QBE command ACCESS command SELECT command STRUCTURED command

SELECT command

A set of instructions that describes how to perform a task is referred to as a(n) standard operating procedure (SOP). data-modeling procedure (DMP). electronic data-processing procedure (EDPP). connectivity procedure (CP).

SOP

What does the abbreviation SQL stand for? Selected Query Links Systematic Query Language Specific Query Location Structured Query Language

Structured query language

Which of the following statements does not describe virus signatures? They are enabled by default in web browsers and scan web pages for suspicious signs. Only viruses with known signatures can be detected by antivirus programs. To protect against them, antivirus programs must be updated regularly. They are telltale strings of characters that can be used to identify particular viruses.

They are enabled by default in web browsers and scan web pages for suspicious signs.

True or False: A field name is a unique name assigned to a field.

True

True or False: A program can interrupt a looping pattern by using an if-then statement based on a particular action

True

True or False: A program with style errors may run, but the errors will make the code bulkier, slower to execute, or more difficult to edit.

True

True or False: A systems contract enables users to contact the system vendor for additional technical support and training when maintenance needs exceed in-house capabilities.

True

True or False: A systems integrator is a company that specializes in installing and supporting information systems.

True

True or False: Normalization is the process of structuring a database to avoid redundancy and undesirable dependencies.

True

True or False: Online banking involves using a web-enabled PC or mobile device.

True

True or False: Penetration testing entails trying to hack into a system so its vulnerabilities can be identified and fixed.

True

True or False: Visualization as a Service (VaaS) involves hiring an expert to transform data into stunning visuals.

True

Which of the following is not one of the elements of an effective acceptable use policy (AUP)? a policy statement that describes the computer services covered by the policy an "Acceptable Uses" section that clearly defines appropriate use a "Violations and Sanctions" section that tells users how to report violations and where to direct their questions a list of specific websites that may not be visited

a list of septic websites that may not be visited

Third-party cookies are created by which of the following? the site you are visiting an ad on a site your marketing profile your browser's settings

an ad on a site

In a relational database, a field is called a(n) tuple. flat file. attribute. hybrid.

attribute

Personal identification numbers, user IDs and passwords, smart cards, and biometrics are all common forms of authentication. deduplication. accessibility. recovery.

authentication

Many companies control employee access to secure areas using a _____, such as a voice, a fingerprint, hand geometry, facial geometry, a retinal pattern, an iris pattern, or a handwritten signature. smart card biometric identifier tracking system user name and password

biometric identifier

In the early phases of the system development process, a _____ defines the business problem and plans a solution. vendor analyst lead project manager business systems analyst software development analyst

business systems analyst

Text that's been encrypted and is therefore unreadable is called corrupted text. ciphertext. verified text. encoded text.

cipher text

A company with a hybrid cloud can meet spikes in demand using a technique called _____, in which the private cloud handles the average workload and the public cloud resources come online automatically to handle the extra demand or activity. cloud management supplementation cloud bursting cloud transitioning

cloud bursting

A(n) _____ is an informational message inserted into the program source code. code editor comment bug interpreter

comment

Which type of check ensures that every required field in a record contains an entry, preventing data from being missing? completeness check range check consistency check alphanumeric check

completeness check

Which type of check is made against previously entered data that has already been validated? referential integrity check consistency check normalization check range check

consistency check

A(n) _____ contains information about an individual's lifestyle and buying habits—information that marketers can use to effectively target buyers and sell their goods on the internet. consumer database e-commerce report consumer profile marketing strategy

consumer profile

_____ involves moving through a database file, examining each record, and looking for information. Data browsing Transaction testing Online searching File processing

data browsing

Microsoft Access includes a Compact & Repair database feature, as shown in this screen shot, to safeguard data and prevent data corruption. data redundancy. data updates. data integrity.

data corruption

A database end user called a _____ types and changes database data as needed, ensuring that the contents of the database remain as up to date as possible. data study operator database analyst data entry operator data personnel worker

data entry opertor

Suppose that a manager wants to identify employees who have called in sick more than 10 days in the past year. Which of the following database management tools should he or she use to display only this data? data filter data request data warehouse data sorter

data filter

Which of the following methods for dealing with big data involves finding patterns and relationships in order to apply an organizing structure? analytics data mining data visualization modeling

data mining

A program that contains a(n) _____ statement, or point where different actions may be performed depending on specific conditions, will be more useful than one that simply follows a linear sequence of actions without variation. variable decision loop executable

decision

hopping agents, live chat, and electronic payment systems are all examples of _____ tools. support commerce (s-commerce) electronic commerce (e-commerce) online commerce (o-commerce) internet commerce (i-commerce)

e-commerce

Which of the following technologies enables doctors to access patients' medical records from a single source and use online data to help with diagnosis and treatment? smart meter smart health smart grid eHealth

eHealth

Records of mobile phone calls are an example of a(n) _____ in a database. element data type field entity

entity

When run by a program, a(n) _____ statement performs an action and then proceeds to the next statement in the sequence. executable variable decision loop

executable

Which of the following types of systems supports strategic decision-making by facilitating the creation of high-level summary reports that executives can use to make important decisions? computer-aided system (CAS) important information system (IIS) business intelligence system (BIS) executive information system (EIS)

executive information system (EIS)

A(n) _____ database is a traditional data file storage system that contains only one data table or file. multimedia object-oriented flat file relational

flat file

A well-designed _____, like the one shown in this screen shot, provides the user with questions or prompts. table form report database

form

Which of the following technologies uses a computer to create thousands or even millions of slightly varied designs and then tests and selects the best of them? cognitive science inference engine genetic algorithm data mining

genetic algorithm

The abbreviation HaaS stands for _____ as a Service. Healthcare Help Hybridization Hardware

hardware

Suppose that a hacker breaks into someone's computer and copies his or her social security number, address, and credit card information. This crime is an example of rogue hotspotting. identify theft. cyberwar. industrial espionage.

identify theft

A(n) _____ enables the expert system to draw deductions from the rules in the knowledge base in response to user input. software robot genetic algorithm knowledge engineer inference engine

inference engine

A(n) _____ system collects, stores, and processes data that people in organizations use to manage daily and long-term operations and to create and sell various types of products. information hardware network technology

information

A database ____ can be used to identify a set of information and therefore provide a means of searching or sorting. key lock collection transaction

key

An alphanumeric check allows only _____ to be entered. letters of the alphabet and digits symbols such as dollar signs numeric data such as birth dates credit card numbers

letters of the alphabet and digits

Which of the following are first-generation programming languages? assembly languages C++ and Java machine languages text-based languages

machine languages

The IBM Watson supercomputer uses _____ to improve its performance in games of Jeopardy! played against humans. mutations fuzzy logic systems machine learning neural networks

machine learning

Information about the structure, specifications, and purpose of each element in a database is described by the metadata. legacy data. secure data. queried data.'

meta data

A(n) _____ database allows the storage of pictures, movies, sounds, and hyperlinked fields. multidimensional multimedia hybrid operational

multimedia

In _____, a person might interact with a computer by speaking or typing sentences. virtual reality fuzzy logic systems neural networks natural language processing

natural language processing

Cognitive computing, which is also called _____ computing, aims to mimic the functioning of the human brain through greater interconnectivity among memory, processors, and communications. neurosynaptic hybrid memory quantum core

neursynaptic

A database that can be used by a retailer to track sales, update inventory records, and order more product is a(n) _____ database. distributed warehouse operational hybrid

operational database

After an information system has been accepted and approved, _____ maintenance is performed to enhance the software to meet new requirements. preventive perfective adaptive corrective

perfective

A cloud setup created for and used by a single organization is a(n) _____ cloud. internet hybrid private public

private

Unlike a traditional computer, which operates based on binary on/off states, a _____ computer operates based on many superpositions of states. cognitive quantum robotic neurosynaptic

quantum

A _____ code provides a signal to a consumer that he or she can find out more about a product or service available online. fast information (FI) quick response (QR) speedy review (SR) rapid reply (RR)

quick response (QR)

A mistake that occurs when an application is running is a _____ error. run-time style logic syntax

run-time

Which of the following types of data processing takes place at a scheduled time or at a critical point in a process? up-to-date processing transaction processing scheduled processing batch processing

schedules processing

Tunneling is a type of _____ technology used by virtual private networks (VPNs) in which one network sends its data via another network's connections. payment turnkey tracking security

security

A(n) _____ uses a variety of techniques to collect product information from various online merchants, enabling consumers to compare prices for a particular product or type of product. online shopping mall shopping agent online catalog e-tailer

shopping agent

When you shop at an e-tailer's site, you collect the items you want to buy in a virtual container called a(n) mobile cart. checkout. outbox. shopping cart.

shopping cart

A(n) _____ operation is a loosely organized team allowed to pursue extreme innovation—often operating not only outside the corporate rulebook but also in a separate location away from the main corporate campus. skunkworks top-secret research & development (R&D) elite

skunkworks

Which of the following technologies can be used to create more of a natural interface between humans and machines? speech recognition machine learning virtual reality neural networks

speech recognition

The _____, or structure, of a programming language tends to be less complex than that of a human language. source coding syntax term

syntax

What is coding? a process for developing a group of programming languages at the same time an approach to problem solving the act of writing source code the cycle followed in releasing new versions of products

the act oof writing source code

What is the purpose of performing adaptive maintenance on an information system? to identify and fix errors to increase reliability and ease of maintenance to address other environment changes to enhance the software to meet new requirements

to address other environment changes

A business activity that's central to the nature of an enterprise, such as selling a product, is a(n) electronic exchange. connection. information system. transaction.

transaction

A _____ contains everything a business needs to get a new information system up and running. systems integrator turnkey system smart system niche information systemt

turnkey system

Most computers come with a basic one-year _____ against manufacturing defects for no additional charge. breakage insurance plan premium support plan warranty extended protection plan

warranty

A program with a single syntax error will usually work but may have ongoing problems. will always work but may be unstable. won't work at all and will therefore be useless. will run more slowly than one without any syntax errors.

won't work at all and will therefore be useless.


Conjuntos de estudio relacionados

Fundamentals of Multinational Finance 6th Edition - Chapter 5

View Set

Contemporary World Issues B | Module 5 | Lesson 4: Quiz: "Globalization - The Good and the Bad"

View Set

Morfema, lexema; prefijo y sufijo

View Set

NCLEX questions therapeutic communication

View Set

ATI Exam 2 (GI, Immune, Respiratory)

View Set

ch.3 Database Systems, Data Warehouses, and Data Marts

View Set