ITE 100 Chapters 10,11,12 Final Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

A MAN typically includes one or more WANs like those shown in the accompanying figure, but covers a smaller geographic area than a LAN. True Or False?

False

A common reason to change a record is to update old data with new data. True Or False?

True

A data model defines how users view the organization of data True or False

True

Each higher level of data consists of one or more items from the lower level. True Or False

True

IBM, Microsoft, Novell, RedHat, Sun, and others offer certifications that test knowledge of their operating systems. True Or False?

True

Some mobile users have a wireless modem that uses a mobile phone provider's network to connect to the Internet wirelessly from a computer or other mobile device. True Or False?

True

Users connected to a network have access to software on the network. True Or False?

True

An ____________ is communications device that connects multiple computers together and transmit data to it's correct destination on a network. A. modem B. router C. firewall D. packet sniffer

{B} router

An __________ device initiates an instruction to transmit data, instructions, or information. A. receiving B. sending C. transmission D. analog

{B} sending

An MIS report that consolidates data with totals, tables or graphs is called an _____________ report. A. exception report B. summary C. detailed D. criteria

{B} summary

The PMP certification tests knowledge of __________. A. personal Mobile Plans B. tasks required during system development C. hardware repair D. acess control methods, cryptography, and more

{B} tasks required during system development

You can report ___________ software use to the BSA using its confidential hotline. A. buggy B. unlicensed C. corrupt D. productivity

{B} unlicensed

An extended__________ might include replacing parts that break, accidental damage, or replacing worn parts. A. copyright B. warranty C. license D. protection

{B} warrenty

FTTP stands for Fiber to the ___________ A. Proxy B. protocol C. premisees D. platform

{C}

______________ information has meaning to the person who receives. A. Timely B. Verifiable C. Useful D. Accessible

{C}

In a database which of the following is a connection within the data? . a. row b. column c. relationship d. table

{C} relationship

On The Largest scale,__________ along the Internet Backbone forward data packets to their destination using the fastest available path. A. access points B. signal boosters C. routers D. digital modems

{C} routers

A communications __________is a space station that receives microwave signals from an Earth- based station, amplifies the signals, and broadcasts the signals back to Earth A. asteroid B. galaxy C. satellite D. meteor

{C} satellite

A __________ is a special series of bits that function like a ticket. A. bus B. ring C. token D. star

{C} token

An _________processing system captures and processes data from day- to-day business activities. A. information B. sales C. transaction D. data

{C} transaction

The communications channel on which, data, instructions, or information travel is called _______ me-dia A. digital B. transportation C. transmission D. service

{C} transmission

An ___________ specifies a website's appearance using technologies such as HTML5, java script, and CSS A. UX designer B. app developer C. web designer D. CRM specialist

{C} web designer

An ________ is a type of PAN {Personal Area Network} that wirelessly connects sensors worn by, carried, implanted in or attached to a human. A. LAN B. WAN C. MAN D. BAN

{D} BAN {Body Area Network}

Publishing entities, such as new services, use the capabilities of an ____________ to keep websites and web feeds up to date. A. DMS {Document Managemeny System} B. TPS {Transaction Processing System} C. MIS {Management Information System} D. CMS {Content Management}

{D} CMS

Database software is often called an _____________ A. SQL B. QBE C. OOP D. DBMS

{D} DBMS

___________Is the collection and summarization of data, information, and deliverables A. JAD {Joint Application Design} B. System analysis C. Conversion D. Documentation

{D} Documentation

_____________ is a special formatting language that software developers use to format documents for display on the web. A. RSS { Web feed} B. XML {Extensible Markup Language} C. Script D. HTML { Hypertext Markup Language

{D} HTML

____________ is an example of a popular application software certification. A. A+ B. Red-hat C. Novell D. Microsoft Office Specialist

{D} Microsoft Office Specialist

A request for specific data from the database is called a _______________. A. form B. report C. log D. query

{D} Query

An __________ expert writes develops content and website layouts so that they will appear at the beginning of search results. A. UX {User Expirence} B. analytics C. CRM {Customer Relationship Management } D. SEO {Search Engineer Optimization Expert}

{D} SEO

Which network type connects each computer and device to a central device? A. a core network B. a bus network C. a ring network D. a star network

{D} Star network

A mobile _________integrates and expands a company's initiatives for mobile users. A. designer B. operator C. strategist D. analyst

{D} Strategist

Main users of ________ lines include large corporations, phone companies, and ISP's connecting to the internet backbone. A. T2 B. T1 C. T4 D. T3

{D} T3

________ has been adopted as the network standard for Internet communications. Thus, all hosts on the Internet follow the rules defined in this standard. A. IrDA B. Eternet C. FTP D. TCP/ IP

{D} TCP/ IP

____________ describes rules for dividing messages into small pieces and provided addresses, detected errors, sequencing; and regulating the flow of messages along the network. A. IrDA B. Ethernet C. FTP D. TCP/ IP

{D} TCP/ IP

Skype and Face time are examples of ___________ services. A. SMS B. MMS C. data plan D. VoIP

{D} VoIP

The CISSP certification tests of knowledge of __________. A. personal mobile plans B. tasks required during system development C. hardware repair D. acess control methods, cryptography, and more

{D} access control methods, cryptography, and more

An ____________test measures the performance of hardware or software A. accessibility B. feasibility C. accessibility D. bench mark

{D} bench mark

An ___________ is a collection of data in an organized manner that allows, access, retrieval, and use of that data. A. application B. forms C. DBMS D. database

{D} database

A ___________ support system uses data from internal and external sources to help users analyze information. A. representational B. data C. multi-dimensional D. decision

{D} decision

In project management , an ___________ is any tangable item, such as a chart or program file A. Object B. app C. output D. deliverable

{D} deliverable

Most businesses use a standard, such as ______________, that defines how business documents transit across transmission media. A. electronic funds transfer {EFT} B. electronic standards submission C. electronic values exchange D. electronic data interchange

{D} electronic data interchange

A ______________answers employee's hardware, software, and networking questions in an informal setting. A. computer repair technician B.digital forensic analyst C. corporate trainer D. held desk specialist

{D} held desk specialist

The server on a client/ server network is sometimes called the _________ computer. A. client B. node C. peer D. host

{D} host

An _____________ translates and executes one instruction at a time. A. machine language B. OOP C. compiler D.interpreter

{D} interpreter

An _______________ is an internet network that uses internet technologies. A. Internet B. botnet C. extranet D. intranet

{D} intranet

____________ refers to hacking into operating systems of Apple's Iphones and ipads A. rooting B. invading C. offshoring D. jail-breaking

{D} jail breaking

An __________ information system generates accurate, timely, and organized information so users can make decisions, supervise activities and progress. A. enterprise B. administrative C. criteria D. management

{D} management

A high-speed network that connects local area networks in a city or town and handles the bulk of communication activity across that region is called a _______________. A. wireless LAN B. wide area network {WAN} C. value-added network {VAN} D. metropolitan area network {MAN}

{D} metropolitan area network {MAN}

With IDSL, the same phone line can carry three or more signals at once through the same line, using a technique called ____________. A. splitting B. fragmenting C. piggybacking D. multiplexing

{D} multiplexing

Cisco, Novell, and Sun offer ________ certifications. A. Software B. digital lieracy C. media D. networking

{D} networking

An _____________ is a standard that outlines characteristics of how two devices communicate on a net-work A. network license B. communication channel C. intranet D. protocol

{D} protocol

An ________is a group Of related fields A. Set B. cell C. report D. record

{D} record

A network ________ administrator configures routers and firewalls, and specifies web protocols and enterprise technology. A. cloud B. program C. technology D. security

{D} security

Each programming language has its own ____________, or rules, for writing the instructions. A. guidelines B. dialect C. code D. syntax

{D} syntax

Through an antenna, an RFID reader, also called a ___________, reads the radio signals and transfers the information to a computer or communicating device A. switch B. packet C. transponder D. transceiver

{D} transceiver

Many programs perform a ___________ check that analyzes data either as you enter the data or after you enter it, to help ensure that it is correct. A. redundancy B. processor C. verification D. validity

{D} validity

Peer To Peer networks are ideal for ___________. A. enterprises B. large businesses C. mid-sized businesses D. very small businesses and home users

{D} very small businesses and home users

Your certification tested you in administering, selling, and deploying Google Apps. What is this called? a. Google Apps Certified Specialist b. Google Apps Management Professional c. Google Apps Technician d. Google Apps Consultant

{a} Google Apps Certified Specialist

A user of a database such as that pictured in the accompanying figure refers to a file as what? a. table b. column c. row d. relationship

{a} table

Which of the following is a network standard that specifies no central computer or device on the network should control when data can be transmitted? a. Gopher b. Ethernet c. IEEE d. Telnet

{b} Ethernet

Which of the following privileges for data involve establishing who can enter new data, change existing data, delete unwanted data, and view data? a. viewing b. access c. writing d. reading

{b} acess

Programs that analyze data from internal and external sources to help users analyze information. A. data B. online C. virtual D. enterprise

{b} online

Which of the following is the maximum transfer transmission rate for communications satellites? a.2.56 Mbps b.2.56 Gbps c.25 Gbps d. 2.56 Tbps

{d} 2.56 Tbps

Which of the following is the data transfer rate equivalent to one million bits per second? a. Tbps b. Gbps c. Pbps d. Mbps

{d} Mbps

Most DBMSs include a feature, as shown in the middle image within the accompanying figure, which has a graphical user interface to assist users with retrieving data. What is this feature called? a. QBA b. schema c. SQL d. QBE

{d} QBE

It is good practice to back up and wipe all data before turning over your computer or device to an IT or computer repair technician. True Or False?

true

Some experts predict that _________ eventually will become the internet standard for data transmission A. ATM B. Fractional T1 C. DSL D. ISDN

{ATM} Asynchronous Transfer Mode

An MIS report that identifies data outside of a data outside of a normal condition is called a _________ report. A. exception B. summary C. detailed D. criteria

{A}

Which generation of cellular transmissions added MMS {Multi Media Messaging Service} ? A. 2G B. 1 G C. 4G D. 3G

{A} 2G

____________ is an example of a popular hardware certification . A. A+ B. RedHat C. Novell D. Microsoft Office specialist

{A} A+

_____________ refers to a large scale data sets that require advanced technologies beyond the capabilities of typical database software A. Big data B. Multidimensional C. Data mining D. distributed

{A} Big Data

Dice And Monster are examples of _____________. A. Career planning websites B. online social networks C. alumni networks D. network administrator certifications

{A} Career planning websites

Some web databases are ____________ databases, where uses store and share photo's and other personal media with registered users. A. Collaborative B. Social networking C. repository D. circulation

{A} Collaborative

A CRM {Customer Relationship Management} system is used by ________ department. A. customer service B. human resources C. marketing D. manufacturing

{A} Customer Service

Some __________installations include a dial tone, providing users with both voice and data communication. A. DSL B. ISDN C. ATM D. T1

{A} DSL {Digital Subscriber line}

________________ currently is the most popular network standard for LANs because it is relatively inexpensive and easy to install and maintain. A. Ethernet B. Bluetooth C. Token Ring D. RFID

{A} Ethernet

Which of the following statements is not true of Wi-Fi? a. Even if two products are Wi-Fi Certified, they must share the same platform in order to communicate. b. When a Wi-Fi network accesses the Internet, it works in conjunction with the TCP/IP network standard. c. In open or outdoor areas free from interference, computers or devices should be within 300 feet of each other to be able to communicate. d. Wi-Fi sometimes is referred to as wireless Ethernet.

{A} Even if two products are Wi-Fi Certified, they must share the same platform in order to communicate.

Devices equipped with __________ports transfer data at rates from 115 Kbps {Thousand bits per second} to 4 Mbps between their ports A. IrDA B. Bluetooth C. Ethernet D. TCP/IP

{A} IrDA

The set of activities used to build an information system is referred to as the system is referred to as the system development _____________ A. life cycle B. phase loop C. application process D. project management

{A} Life Cycle

A ____________is a sample of the input or output that contain actual data A. mockup B. benchmark C. proof of concept D. logical design

{A} Mockup

Which of the following statements is NOT true about multidimensional databases? a. Most multidimensional databases use a standard query language. b. The number of dimensions in a multidimensional database varies. c. A multidimensional database can consolidate data much faster than a relational database. d. Nearly every multidimensional database has a dimension of time.

{A} Most multidimensional databases use a standard query language.

With a __________ the vendor selects the products that meet specific requirements and then quotes the price A. RFQ {Request For Quotation} B. RFP { Request For Preposal} C. RFI { Request For Information D. RFO

{A} RFQ {Request For Quotation}

In a ___________, the DBMS uses the log to undo any changes made to the database during a certain period. A. roll back B. rollfoward C. continuous back up D. partial back up

{A} Roll back

When a Wi-Fi network access the internet, it works in conjunction with the ________network standard. A. TCP/IP B. RFID C. Blue Tooth D. token ring

{A} TCP/IP

An ____________re-seller is an organization that purchases produces from manufactures and then resells these products to the public. A. value added {VAR} B. feasability C. prototype D. system buyer

{A} Value added

A central communications device that allows computers and devices to transfer data wirelessly among themselves is called a _____________. A. wireless access point B. network interface card C. router D. digital modem

{A} Wireless access point

An _____________test is preformed by end users and checks the new system to ensure that it works with actual data. A. acceptance B. systems C. unit D. integration

{A} acceptance

A cloud _________identifies businesses, requirements, strategies and solutions for Cloud storage and services that meet a company's goals or needs. A. architect B. programmer C. technition D. developer.

{A} arcitect

_______________ intelligence is the application of human intelligence to computers. A. artificial B. literacy C. simulated D. personified

{A} artificial

With _____________, data transfers between devices at rate up to 3 Mbps A. Bluetooth B. TCP/IP C. 802.11 D. Ethernet

{A} bluetooth

Three types of ___________ modems are cable modems, DSL modems, and ISDN modems A. broadband B. analog C. dial up D. open-source

{A} broadband

_____________ radio is a wireless transmission media that distributes radio signals through the air over long distances A. broadcast B. IR C. Ethernet D. Microwave

{A} broadcast

A number or character that is appended to or inserted in a primary key value is called a ____________. A. check digit B. primary key C. key field D. data type

{A} check digit

A huge database that stores and manages the data required to analyze historical and current transactions is called a _________. A. data warehouse B. groupware databases C. data mine D. multi dimensional database

{A} data warehouse

Many technologies equipment manufacturers include ___________ software with their computers and devices that assist technicians in identifying problems. A. diagnostic B. service C. collaborative D. productivity

{A} diagnostic

_____________ is a measure of how suitable the development of system development of a system will be to the organization. A. feasibility B. accessible C. Logical design D. benchmark testing

{A} feasibility

A digital _________examiner collects and analyzes evidence found on computers, networks, and mobile devices, and data bases. A. forensics B. analysis C. detective D. information

{A} forensics

Obtaining an advanced certification in which of the following implies that you have achieved a standard of competence in assessing a company's hardware needs? a. hardware b. forensics c. firewall d. software

{A} hardware

An _________ or switch is a device that provides a central point for cables in a network A. hub B. packet C. access point D. router

{A} hub

An __________ app features native apps and mobile web apps. A. hybrid B. platform C. technical D. OS

{A} hybrid

An ____________system is a set of hardware, software, data, people and procedures that work together A. information B. hybrid C. enterprise D. integrated

{A} information

IT {_______________technology} staff are responsible for ensuring and all the computer operations, mobile devices, and networks run smoothly. A. information B. implementation C. internal D. internet

{A} information

Network___________ software constantly assess the status of a network and sends an email or text message usually to the network administrator when it detects a problem A. monitoring B. license C. traffic D. architecture

{A} monitoring

A ___________ is a collection of computers and devices connected together via communications devices and transmission media. A. network B. hub C. client D. server

{A} network

The advantages of using a network include _______. A. sharing hardware B. updating hardware C. testing software D. developing software

{A} sharing hardware

_____________ are sets of rules and procedures an organization expects employees to accept and follow A. standards B. syntax C. OOPs D. Models

{A} standards

The data __________specifies the kind of data a field can contain and how that field is used A. type B. size C. character D. format

{A} type

Careers in the _________ field include designing and fabricating chips and test internal components A. informational technology B. technology equipment C. technology service D. software development

{B}

_____________ supports faster transfer rates when receiving data when sending data A. ATM B. ADSL C. Dial-up D. ISDN

{B} ADSL

An ___________management system allows for storage and management of a company's presentations, spreadsheets, and more. A. Product B. Documents C. content D. output

{B} Documents

________________ is another term for JAD session A. conference call B. Focus Group C. Benchmark Test D. Protype

{B} Focus Group

An ____________ is a navigation system built into many mobile devices. A. satellite B. GPS C. radio D. VoIP

{B} GPS

One popular use of WiFi network standard is in ________that offer mobile the ability to connect to the internet with their WiFi enabled wireless computer and devices. A. online meetings B. hot spots C. packet sniffers D. global positioning system

{B} Hot spots

____________ is a protocol, based on RFID, that defines how a network uses close-range radio signals to communicate between two devices or objects equipped with technology. A. TCP/IP B. NFC C. Ethernet D. Wi-FI

{B} NFC

An __________ chart analyzes the time required to complete a task. A. Gantt B. PERT {Program Evaluation Review Technique} C. pie D. clock

{B} PERT

__________________ conversion consists of running the old system alongside the new system A. Duplicate B. Parallel C.Phased D. Direct

{B} Parallel

____________________, or duplication of data, can lead to errors, and wastes storage space. A. Isolation B. Redundandancy C. Verification D. Consistency

{B} Redundancy

The most popular T- carrier line is the __________ line. A. T2 B. T1 C. T4 D. T3

{B} T1

_______________ information can be proven as correct or incorrect. A. Timely B. Verifiable C. Useful D. Accessible

{B} Verifiable

The configuration of computers, devices, and media in a network is sometimes called the network _____________. A. blueprint B. architecture C. map D. plan

{B} architecture

With ____________ processing, the computer collects data over time and processes all transactions later, as a group. A. staggered B. batch C. online D. Off-line

{B} batch

In the ASCII coding scheme, each byte represents a single A. field B. character C. pixel D. format

{B} character

Which of the following is a transmission media on which data, instructions, or information travel? a. communications flow b. communications channel c. communications path d. communications route

{B} communications channel

Digital ___________ lines include cable television, DSL, ISDN lines, FTTP, T-carrier lines, and ATM. A. open source lines B. dedicated C. token ring D. proprietary

{B} dedicated

A __________ modem is a communications device that converts digital signals to analog signals to analog signals and ana-log signals to digital signals, so that data can travel along an analog phone line A. cable B. dial-up C. ISDN D. DSL

{B} dial-up

Which of the following cable types is faster, has a larger capacity, is smaller, and costs more than others? A. twisted pair B. fiber-optic C. IR D. Coaxial

{B} fiber-optic

You use __________ to retrieve and maintain the data in a database A. report writers B. forms C. backups D. data models

{B} forms

A program that generally has a more user-friendly interface than a DBMS is called ____________. A. back end B. front end C. repository D. form

{B} front end

An _____________is the combined subject understanding and experiences of human experts. A. artificial intelligence application B. knowledge base C. inference rules D. information literacy

{B} knowledge base

A data ___________consists of rules and standards that define how the database organizes the data. A. back up B. model C. log D. plan

{B} model

An __________ app is written for mobile devices running a particular mobile phone operating system. A. hybrid B. native C. technical D. OS

{B} native

Each computer or device on a local area network, called a ___________, often shares resources such as printers, large hard drives and programs A. switch B. node C. hub D. packet

{B} node

An electrical disturbance that can degrade communications is called ____________. A. static B. noise C. interference D. commotion

{B} noise

An Item that contains data, as well as the actions that read or process the data, is called an ______________ A. hyper-cube B. object C. query D. CGI script

{B} object

Java, C ++, and the latest of Visual basic are all examples of ____________programming languages a. Interpretive B. object oriented Programming {OOP} C. machine D. procedural

{B} object oriented Programming

When a company sends jobs overseas, the practice is called _________. A. cloud management B. offshoring C. foreign consulting D. global distribution

{B} offshoring

LinkedIn is an example of an _______________ A. web administrator tool B. online social network C. alumni networks D. network administrator certifications

{B} online social network

The field that uniquely identifies each record in a file is called a ______________ key. A. validity B. primary C. ID D. composite

{B} primary

A data directory is sometimes called a _____________ A. data warehouse B. repository C. data mine D. report generator

{B} repository

Which of the following are typically hired based on expertise and provides technology services to his or her clients?

IT

Which of the following kinds of cable consists of a single copper wire surrounded by at least three layers: an insulating material, a woven or braided metal, and a plastic outer coating?

coaxiel cable

Who inspects electronic data to recover documents and files from data storage devices that may have been damaged or deleted?

digital forensic analyst

An application generator is a program that creates source code or machine code from a specification of the required functionality. true or false?

true

Career counselors and experienced alumni can help you prepare for and secure an interview in your chosen field. True Or False?

true

Data analysis certifications focus on the discovery, collection, and analysis of evidence on computers and networks. True Or False?

true

Photo identification is a form of which type of information?

verifyable

Which of the following is FALSE about corporate trainers? A. the high demand for corporate trainers has led to a shortage of qualified college instructors B. Corporate trainers teach employees how to preform technology- related activities C. Corporations usually require a stronger educational background for trainers than educational institutions. D. Many large companies use their own training departments

{C} Corporations usually require a stronger educational background for trainers than educational institutions.

____________ is sometimes called logical design. A. Function Creep B. Benchmark Testing C. Detailed Analysis D. System development

{C} Detailed analysis

__________________ Resources Planning integrates MRP {Manufacturing Require Planning} II with the information flow across an organization to manage and coordinate ongoing activities. A. Service B. Integration C. Enterprise D. Product

{C} Enterprise {ERP}

____________ occurs when one activity has led to another that was not planned originally A. change management B. project escalation C. Feature creep D. JAD

{C} Feature creep

Which of the following is NOT one of the advantages to the database approach? A. shared B. improved data integrity C. Isolation D. Reduced development time

{C} Isolation

___________ is an example of a firm that produces and sells many types of software for both computers and mobile devices. A. BSA B. Cisco C. Microsoft D. A +

{C} Microsoft

IBM, Microsoft, and RedHat offer certifications that test knowledge of their ____________. A. firewalls B. hardware C. operating systems D. applications.

{C} Operating systems

________________is a protocol that defines how a network uses radio signals to communication with a tag placed in or attached to an object, an animal or person. A. IrDA B. Bluetooth C. RFID D. TCP/IP

{C} RFID

Web developers write small programs called _________ to addinteractivity to the webpage. A. XML B. multimedia C. scripts D. RSS

{C} Scripts

At distances of about 33 feet, __________data transfer rate for 110 Mbps. At closer distances, such as about 6.5 feet, the transfer rate is at least 480 Mbps. A. Bluetooth B. Wi-Fi C. UWB D. IrDA

{C} UWB {Ultra Wide Band}

An ___________ provider is a third party business that provides services such as EDI, storage or email A. Intranet B. Internet Service Providers C. Value-added network D. digital data provider

{C} Value-added network

The amount of data, instructions, and information that can travel over transmission media sometimes is called the _____________. A. routing ability B. storage capability C. bandwidth D. broadband

{C} bandwidth

The Yes/No data type is also called the ___________ data type. A. memo B. Text C. Boolean D. AutoNumber

{C} boolean

An ______________ verifies that a required field contains data A. range check B. consistency C. completeness D. alphanumeric

{C} completeness

A ____________ check ensures that data in two related fields is logical and in the correct format. A. Style B. completeness C. consistency D. common sense

{C} consistency

An ____________ management system enables and manages the publishing , modification and access of files A. Product B. documents C. content D. output

{C} content

An MIS report that usually just lists transactions is called an _____________ report. A. exception B. batch C. detailed D. criteria

{C} detailed

The data in a ___________database exists in many separate locations throughout a network or the Inter-net A. collaborative B. multidementional C. distributed D. object oriented.

{C} distributed

An ___________ system is an information system that can imitate human reasoning and decision making. A. human B. simulation C. expert D. knowledge

{C} expert system

To prevent unauthorized users from accessing files and computers, many routers are protected by built in __________. A. bridge B. hub C. firewall D. switch

{C} firewall

A typical enterprise consists of a wide variety of departments, centers, and division - collectively known as ________ units. A. distinct B. organizational C. functional D. work

{C} functional

There ___________ are a set of logical applied when a user describes a situation to an expert system. A. artificial intelligence applications B. knowledge bases C. inference rules D. information literacy standards

{C} inference rules

Information ________prepares students, employees, and citizens to manage information so that they can be knowledgeable decision makers. A. management B. processing C. literacy D. evaluation

{C} literacy

An ________ administrator installs, configures, and maintains LAN, WANs, and more. A. Internet B. Database C. Network D. Social media

{C} network

A 4GL {Fourth Generation Language} is an __________language that enables users and software developers to access data data in databases A. classic B. interpretive C. non procedural D. procedural

{C} non procedural

With _____________transaction processing, the computer processes each transaction as it is entered. A. staggered B. batch C. online D. off-line

{C} online

With an _______________ language, a software developer writes instructions using English- like words A. compiler B. object-oritented C. procedural D. machine

{C} procedural

A ______________is a working model of the proposed system's essential functionality A. mockup B. benchmark C. prototype D. logical design

{C} prototype

A ____________ consists of simple, English-Like statements that allow users to specify the data they want to display, print, update or delete A. front end B. data dictionary C. query language D. report writer

{C} query language


Conjuntos de estudio relacionados

Chapter 13 Viruses, Chapter 5 Microbiology 2500, Chapter 4 Microbiology 2500, Micro 8 Microbial Genetics, Micro 6 Microbial Growth

View Set

Service Management 11- Managing Capacity and Demand

View Set

LESSON 12 READING WITH THE FINGERTIPS

View Set

Wong, Ch. 16, ADHD (and one on bee sting....)

View Set

Synovial joints (freely Movable joint)

View Set

Beckers World of the Cell: chapter 4a, multiple choice

View Set