ITE 100 Chapters 10,11,12 Final Exam
A MAN typically includes one or more WANs like those shown in the accompanying figure, but covers a smaller geographic area than a LAN. True Or False?
False
A common reason to change a record is to update old data with new data. True Or False?
True
A data model defines how users view the organization of data True or False
True
Each higher level of data consists of one or more items from the lower level. True Or False
True
IBM, Microsoft, Novell, RedHat, Sun, and others offer certifications that test knowledge of their operating systems. True Or False?
True
Some mobile users have a wireless modem that uses a mobile phone provider's network to connect to the Internet wirelessly from a computer or other mobile device. True Or False?
True
Users connected to a network have access to software on the network. True Or False?
True
An ____________ is communications device that connects multiple computers together and transmit data to it's correct destination on a network. A. modem B. router C. firewall D. packet sniffer
{B} router
An __________ device initiates an instruction to transmit data, instructions, or information. A. receiving B. sending C. transmission D. analog
{B} sending
An MIS report that consolidates data with totals, tables or graphs is called an _____________ report. A. exception report B. summary C. detailed D. criteria
{B} summary
The PMP certification tests knowledge of __________. A. personal Mobile Plans B. tasks required during system development C. hardware repair D. acess control methods, cryptography, and more
{B} tasks required during system development
You can report ___________ software use to the BSA using its confidential hotline. A. buggy B. unlicensed C. corrupt D. productivity
{B} unlicensed
An extended__________ might include replacing parts that break, accidental damage, or replacing worn parts. A. copyright B. warranty C. license D. protection
{B} warrenty
FTTP stands for Fiber to the ___________ A. Proxy B. protocol C. premisees D. platform
{C}
______________ information has meaning to the person who receives. A. Timely B. Verifiable C. Useful D. Accessible
{C}
In a database which of the following is a connection within the data? . a. row b. column c. relationship d. table
{C} relationship
On The Largest scale,__________ along the Internet Backbone forward data packets to their destination using the fastest available path. A. access points B. signal boosters C. routers D. digital modems
{C} routers
A communications __________is a space station that receives microwave signals from an Earth- based station, amplifies the signals, and broadcasts the signals back to Earth A. asteroid B. galaxy C. satellite D. meteor
{C} satellite
A __________ is a special series of bits that function like a ticket. A. bus B. ring C. token D. star
{C} token
An _________processing system captures and processes data from day- to-day business activities. A. information B. sales C. transaction D. data
{C} transaction
The communications channel on which, data, instructions, or information travel is called _______ me-dia A. digital B. transportation C. transmission D. service
{C} transmission
An ___________ specifies a website's appearance using technologies such as HTML5, java script, and CSS A. UX designer B. app developer C. web designer D. CRM specialist
{C} web designer
An ________ is a type of PAN {Personal Area Network} that wirelessly connects sensors worn by, carried, implanted in or attached to a human. A. LAN B. WAN C. MAN D. BAN
{D} BAN {Body Area Network}
Publishing entities, such as new services, use the capabilities of an ____________ to keep websites and web feeds up to date. A. DMS {Document Managemeny System} B. TPS {Transaction Processing System} C. MIS {Management Information System} D. CMS {Content Management}
{D} CMS
Database software is often called an _____________ A. SQL B. QBE C. OOP D. DBMS
{D} DBMS
___________Is the collection and summarization of data, information, and deliverables A. JAD {Joint Application Design} B. System analysis C. Conversion D. Documentation
{D} Documentation
_____________ is a special formatting language that software developers use to format documents for display on the web. A. RSS { Web feed} B. XML {Extensible Markup Language} C. Script D. HTML { Hypertext Markup Language
{D} HTML
____________ is an example of a popular application software certification. A. A+ B. Red-hat C. Novell D. Microsoft Office Specialist
{D} Microsoft Office Specialist
A request for specific data from the database is called a _______________. A. form B. report C. log D. query
{D} Query
An __________ expert writes develops content and website layouts so that they will appear at the beginning of search results. A. UX {User Expirence} B. analytics C. CRM {Customer Relationship Management } D. SEO {Search Engineer Optimization Expert}
{D} SEO
Which network type connects each computer and device to a central device? A. a core network B. a bus network C. a ring network D. a star network
{D} Star network
A mobile _________integrates and expands a company's initiatives for mobile users. A. designer B. operator C. strategist D. analyst
{D} Strategist
Main users of ________ lines include large corporations, phone companies, and ISP's connecting to the internet backbone. A. T2 B. T1 C. T4 D. T3
{D} T3
________ has been adopted as the network standard for Internet communications. Thus, all hosts on the Internet follow the rules defined in this standard. A. IrDA B. Eternet C. FTP D. TCP/ IP
{D} TCP/ IP
____________ describes rules for dividing messages into small pieces and provided addresses, detected errors, sequencing; and regulating the flow of messages along the network. A. IrDA B. Ethernet C. FTP D. TCP/ IP
{D} TCP/ IP
Skype and Face time are examples of ___________ services. A. SMS B. MMS C. data plan D. VoIP
{D} VoIP
The CISSP certification tests of knowledge of __________. A. personal mobile plans B. tasks required during system development C. hardware repair D. acess control methods, cryptography, and more
{D} access control methods, cryptography, and more
An ____________test measures the performance of hardware or software A. accessibility B. feasibility C. accessibility D. bench mark
{D} bench mark
An ___________ is a collection of data in an organized manner that allows, access, retrieval, and use of that data. A. application B. forms C. DBMS D. database
{D} database
A ___________ support system uses data from internal and external sources to help users analyze information. A. representational B. data C. multi-dimensional D. decision
{D} decision
In project management , an ___________ is any tangable item, such as a chart or program file A. Object B. app C. output D. deliverable
{D} deliverable
Most businesses use a standard, such as ______________, that defines how business documents transit across transmission media. A. electronic funds transfer {EFT} B. electronic standards submission C. electronic values exchange D. electronic data interchange
{D} electronic data interchange
A ______________answers employee's hardware, software, and networking questions in an informal setting. A. computer repair technician B.digital forensic analyst C. corporate trainer D. held desk specialist
{D} held desk specialist
The server on a client/ server network is sometimes called the _________ computer. A. client B. node C. peer D. host
{D} host
An _____________ translates and executes one instruction at a time. A. machine language B. OOP C. compiler D.interpreter
{D} interpreter
An _______________ is an internet network that uses internet technologies. A. Internet B. botnet C. extranet D. intranet
{D} intranet
____________ refers to hacking into operating systems of Apple's Iphones and ipads A. rooting B. invading C. offshoring D. jail-breaking
{D} jail breaking
An __________ information system generates accurate, timely, and organized information so users can make decisions, supervise activities and progress. A. enterprise B. administrative C. criteria D. management
{D} management
A high-speed network that connects local area networks in a city or town and handles the bulk of communication activity across that region is called a _______________. A. wireless LAN B. wide area network {WAN} C. value-added network {VAN} D. metropolitan area network {MAN}
{D} metropolitan area network {MAN}
With IDSL, the same phone line can carry three or more signals at once through the same line, using a technique called ____________. A. splitting B. fragmenting C. piggybacking D. multiplexing
{D} multiplexing
Cisco, Novell, and Sun offer ________ certifications. A. Software B. digital lieracy C. media D. networking
{D} networking
An _____________ is a standard that outlines characteristics of how two devices communicate on a net-work A. network license B. communication channel C. intranet D. protocol
{D} protocol
An ________is a group Of related fields A. Set B. cell C. report D. record
{D} record
A network ________ administrator configures routers and firewalls, and specifies web protocols and enterprise technology. A. cloud B. program C. technology D. security
{D} security
Each programming language has its own ____________, or rules, for writing the instructions. A. guidelines B. dialect C. code D. syntax
{D} syntax
Through an antenna, an RFID reader, also called a ___________, reads the radio signals and transfers the information to a computer or communicating device A. switch B. packet C. transponder D. transceiver
{D} transceiver
Many programs perform a ___________ check that analyzes data either as you enter the data or after you enter it, to help ensure that it is correct. A. redundancy B. processor C. verification D. validity
{D} validity
Peer To Peer networks are ideal for ___________. A. enterprises B. large businesses C. mid-sized businesses D. very small businesses and home users
{D} very small businesses and home users
Your certification tested you in administering, selling, and deploying Google Apps. What is this called? a. Google Apps Certified Specialist b. Google Apps Management Professional c. Google Apps Technician d. Google Apps Consultant
{a} Google Apps Certified Specialist
A user of a database such as that pictured in the accompanying figure refers to a file as what? a. table b. column c. row d. relationship
{a} table
Which of the following is a network standard that specifies no central computer or device on the network should control when data can be transmitted? a. Gopher b. Ethernet c. IEEE d. Telnet
{b} Ethernet
Which of the following privileges for data involve establishing who can enter new data, change existing data, delete unwanted data, and view data? a. viewing b. access c. writing d. reading
{b} acess
Programs that analyze data from internal and external sources to help users analyze information. A. data B. online C. virtual D. enterprise
{b} online
Which of the following is the maximum transfer transmission rate for communications satellites? a.2.56 Mbps b.2.56 Gbps c.25 Gbps d. 2.56 Tbps
{d} 2.56 Tbps
Which of the following is the data transfer rate equivalent to one million bits per second? a. Tbps b. Gbps c. Pbps d. Mbps
{d} Mbps
Most DBMSs include a feature, as shown in the middle image within the accompanying figure, which has a graphical user interface to assist users with retrieving data. What is this feature called? a. QBA b. schema c. SQL d. QBE
{d} QBE
It is good practice to back up and wipe all data before turning over your computer or device to an IT or computer repair technician. True Or False?
true
Some experts predict that _________ eventually will become the internet standard for data transmission A. ATM B. Fractional T1 C. DSL D. ISDN
{ATM} Asynchronous Transfer Mode
An MIS report that identifies data outside of a data outside of a normal condition is called a _________ report. A. exception B. summary C. detailed D. criteria
{A}
Which generation of cellular transmissions added MMS {Multi Media Messaging Service} ? A. 2G B. 1 G C. 4G D. 3G
{A} 2G
____________ is an example of a popular hardware certification . A. A+ B. RedHat C. Novell D. Microsoft Office specialist
{A} A+
_____________ refers to a large scale data sets that require advanced technologies beyond the capabilities of typical database software A. Big data B. Multidimensional C. Data mining D. distributed
{A} Big Data
Dice And Monster are examples of _____________. A. Career planning websites B. online social networks C. alumni networks D. network administrator certifications
{A} Career planning websites
Some web databases are ____________ databases, where uses store and share photo's and other personal media with registered users. A. Collaborative B. Social networking C. repository D. circulation
{A} Collaborative
A CRM {Customer Relationship Management} system is used by ________ department. A. customer service B. human resources C. marketing D. manufacturing
{A} Customer Service
Some __________installations include a dial tone, providing users with both voice and data communication. A. DSL B. ISDN C. ATM D. T1
{A} DSL {Digital Subscriber line}
________________ currently is the most popular network standard for LANs because it is relatively inexpensive and easy to install and maintain. A. Ethernet B. Bluetooth C. Token Ring D. RFID
{A} Ethernet
Which of the following statements is not true of Wi-Fi? a. Even if two products are Wi-Fi Certified, they must share the same platform in order to communicate. b. When a Wi-Fi network accesses the Internet, it works in conjunction with the TCP/IP network standard. c. In open or outdoor areas free from interference, computers or devices should be within 300 feet of each other to be able to communicate. d. Wi-Fi sometimes is referred to as wireless Ethernet.
{A} Even if two products are Wi-Fi Certified, they must share the same platform in order to communicate.
Devices equipped with __________ports transfer data at rates from 115 Kbps {Thousand bits per second} to 4 Mbps between their ports A. IrDA B. Bluetooth C. Ethernet D. TCP/IP
{A} IrDA
The set of activities used to build an information system is referred to as the system is referred to as the system development _____________ A. life cycle B. phase loop C. application process D. project management
{A} Life Cycle
A ____________is a sample of the input or output that contain actual data A. mockup B. benchmark C. proof of concept D. logical design
{A} Mockup
Which of the following statements is NOT true about multidimensional databases? a. Most multidimensional databases use a standard query language. b. The number of dimensions in a multidimensional database varies. c. A multidimensional database can consolidate data much faster than a relational database. d. Nearly every multidimensional database has a dimension of time.
{A} Most multidimensional databases use a standard query language.
With a __________ the vendor selects the products that meet specific requirements and then quotes the price A. RFQ {Request For Quotation} B. RFP { Request For Preposal} C. RFI { Request For Information D. RFO
{A} RFQ {Request For Quotation}
In a ___________, the DBMS uses the log to undo any changes made to the database during a certain period. A. roll back B. rollfoward C. continuous back up D. partial back up
{A} Roll back
When a Wi-Fi network access the internet, it works in conjunction with the ________network standard. A. TCP/IP B. RFID C. Blue Tooth D. token ring
{A} TCP/IP
An ____________re-seller is an organization that purchases produces from manufactures and then resells these products to the public. A. value added {VAR} B. feasability C. prototype D. system buyer
{A} Value added
A central communications device that allows computers and devices to transfer data wirelessly among themselves is called a _____________. A. wireless access point B. network interface card C. router D. digital modem
{A} Wireless access point
An _____________test is preformed by end users and checks the new system to ensure that it works with actual data. A. acceptance B. systems C. unit D. integration
{A} acceptance
A cloud _________identifies businesses, requirements, strategies and solutions for Cloud storage and services that meet a company's goals or needs. A. architect B. programmer C. technition D. developer.
{A} arcitect
_______________ intelligence is the application of human intelligence to computers. A. artificial B. literacy C. simulated D. personified
{A} artificial
With _____________, data transfers between devices at rate up to 3 Mbps A. Bluetooth B. TCP/IP C. 802.11 D. Ethernet
{A} bluetooth
Three types of ___________ modems are cable modems, DSL modems, and ISDN modems A. broadband B. analog C. dial up D. open-source
{A} broadband
_____________ radio is a wireless transmission media that distributes radio signals through the air over long distances A. broadcast B. IR C. Ethernet D. Microwave
{A} broadcast
A number or character that is appended to or inserted in a primary key value is called a ____________. A. check digit B. primary key C. key field D. data type
{A} check digit
A huge database that stores and manages the data required to analyze historical and current transactions is called a _________. A. data warehouse B. groupware databases C. data mine D. multi dimensional database
{A} data warehouse
Many technologies equipment manufacturers include ___________ software with their computers and devices that assist technicians in identifying problems. A. diagnostic B. service C. collaborative D. productivity
{A} diagnostic
_____________ is a measure of how suitable the development of system development of a system will be to the organization. A. feasibility B. accessible C. Logical design D. benchmark testing
{A} feasibility
A digital _________examiner collects and analyzes evidence found on computers, networks, and mobile devices, and data bases. A. forensics B. analysis C. detective D. information
{A} forensics
Obtaining an advanced certification in which of the following implies that you have achieved a standard of competence in assessing a company's hardware needs? a. hardware b. forensics c. firewall d. software
{A} hardware
An _________ or switch is a device that provides a central point for cables in a network A. hub B. packet C. access point D. router
{A} hub
An __________ app features native apps and mobile web apps. A. hybrid B. platform C. technical D. OS
{A} hybrid
An ____________system is a set of hardware, software, data, people and procedures that work together A. information B. hybrid C. enterprise D. integrated
{A} information
IT {_______________technology} staff are responsible for ensuring and all the computer operations, mobile devices, and networks run smoothly. A. information B. implementation C. internal D. internet
{A} information
Network___________ software constantly assess the status of a network and sends an email or text message usually to the network administrator when it detects a problem A. monitoring B. license C. traffic D. architecture
{A} monitoring
A ___________ is a collection of computers and devices connected together via communications devices and transmission media. A. network B. hub C. client D. server
{A} network
The advantages of using a network include _______. A. sharing hardware B. updating hardware C. testing software D. developing software
{A} sharing hardware
_____________ are sets of rules and procedures an organization expects employees to accept and follow A. standards B. syntax C. OOPs D. Models
{A} standards
The data __________specifies the kind of data a field can contain and how that field is used A. type B. size C. character D. format
{A} type
Careers in the _________ field include designing and fabricating chips and test internal components A. informational technology B. technology equipment C. technology service D. software development
{B}
_____________ supports faster transfer rates when receiving data when sending data A. ATM B. ADSL C. Dial-up D. ISDN
{B} ADSL
An ___________management system allows for storage and management of a company's presentations, spreadsheets, and more. A. Product B. Documents C. content D. output
{B} Documents
________________ is another term for JAD session A. conference call B. Focus Group C. Benchmark Test D. Protype
{B} Focus Group
An ____________ is a navigation system built into many mobile devices. A. satellite B. GPS C. radio D. VoIP
{B} GPS
One popular use of WiFi network standard is in ________that offer mobile the ability to connect to the internet with their WiFi enabled wireless computer and devices. A. online meetings B. hot spots C. packet sniffers D. global positioning system
{B} Hot spots
____________ is a protocol, based on RFID, that defines how a network uses close-range radio signals to communicate between two devices or objects equipped with technology. A. TCP/IP B. NFC C. Ethernet D. Wi-FI
{B} NFC
An __________ chart analyzes the time required to complete a task. A. Gantt B. PERT {Program Evaluation Review Technique} C. pie D. clock
{B} PERT
__________________ conversion consists of running the old system alongside the new system A. Duplicate B. Parallel C.Phased D. Direct
{B} Parallel
____________________, or duplication of data, can lead to errors, and wastes storage space. A. Isolation B. Redundandancy C. Verification D. Consistency
{B} Redundancy
The most popular T- carrier line is the __________ line. A. T2 B. T1 C. T4 D. T3
{B} T1
_______________ information can be proven as correct or incorrect. A. Timely B. Verifiable C. Useful D. Accessible
{B} Verifiable
The configuration of computers, devices, and media in a network is sometimes called the network _____________. A. blueprint B. architecture C. map D. plan
{B} architecture
With ____________ processing, the computer collects data over time and processes all transactions later, as a group. A. staggered B. batch C. online D. Off-line
{B} batch
In the ASCII coding scheme, each byte represents a single A. field B. character C. pixel D. format
{B} character
Which of the following is a transmission media on which data, instructions, or information travel? a. communications flow b. communications channel c. communications path d. communications route
{B} communications channel
Digital ___________ lines include cable television, DSL, ISDN lines, FTTP, T-carrier lines, and ATM. A. open source lines B. dedicated C. token ring D. proprietary
{B} dedicated
A __________ modem is a communications device that converts digital signals to analog signals to analog signals and ana-log signals to digital signals, so that data can travel along an analog phone line A. cable B. dial-up C. ISDN D. DSL
{B} dial-up
Which of the following cable types is faster, has a larger capacity, is smaller, and costs more than others? A. twisted pair B. fiber-optic C. IR D. Coaxial
{B} fiber-optic
You use __________ to retrieve and maintain the data in a database A. report writers B. forms C. backups D. data models
{B} forms
A program that generally has a more user-friendly interface than a DBMS is called ____________. A. back end B. front end C. repository D. form
{B} front end
An _____________is the combined subject understanding and experiences of human experts. A. artificial intelligence application B. knowledge base C. inference rules D. information literacy
{B} knowledge base
A data ___________consists of rules and standards that define how the database organizes the data. A. back up B. model C. log D. plan
{B} model
An __________ app is written for mobile devices running a particular mobile phone operating system. A. hybrid B. native C. technical D. OS
{B} native
Each computer or device on a local area network, called a ___________, often shares resources such as printers, large hard drives and programs A. switch B. node C. hub D. packet
{B} node
An electrical disturbance that can degrade communications is called ____________. A. static B. noise C. interference D. commotion
{B} noise
An Item that contains data, as well as the actions that read or process the data, is called an ______________ A. hyper-cube B. object C. query D. CGI script
{B} object
Java, C ++, and the latest of Visual basic are all examples of ____________programming languages a. Interpretive B. object oriented Programming {OOP} C. machine D. procedural
{B} object oriented Programming
When a company sends jobs overseas, the practice is called _________. A. cloud management B. offshoring C. foreign consulting D. global distribution
{B} offshoring
LinkedIn is an example of an _______________ A. web administrator tool B. online social network C. alumni networks D. network administrator certifications
{B} online social network
The field that uniquely identifies each record in a file is called a ______________ key. A. validity B. primary C. ID D. composite
{B} primary
A data directory is sometimes called a _____________ A. data warehouse B. repository C. data mine D. report generator
{B} repository
Which of the following are typically hired based on expertise and provides technology services to his or her clients?
IT
Which of the following kinds of cable consists of a single copper wire surrounded by at least three layers: an insulating material, a woven or braided metal, and a plastic outer coating?
coaxiel cable
Who inspects electronic data to recover documents and files from data storage devices that may have been damaged or deleted?
digital forensic analyst
An application generator is a program that creates source code or machine code from a specification of the required functionality. true or false?
true
Career counselors and experienced alumni can help you prepare for and secure an interview in your chosen field. True Or False?
true
Data analysis certifications focus on the discovery, collection, and analysis of evidence on computers and networks. True Or False?
true
Photo identification is a form of which type of information?
verifyable
Which of the following is FALSE about corporate trainers? A. the high demand for corporate trainers has led to a shortage of qualified college instructors B. Corporate trainers teach employees how to preform technology- related activities C. Corporations usually require a stronger educational background for trainers than educational institutions. D. Many large companies use their own training departments
{C} Corporations usually require a stronger educational background for trainers than educational institutions.
____________ is sometimes called logical design. A. Function Creep B. Benchmark Testing C. Detailed Analysis D. System development
{C} Detailed analysis
__________________ Resources Planning integrates MRP {Manufacturing Require Planning} II with the information flow across an organization to manage and coordinate ongoing activities. A. Service B. Integration C. Enterprise D. Product
{C} Enterprise {ERP}
____________ occurs when one activity has led to another that was not planned originally A. change management B. project escalation C. Feature creep D. JAD
{C} Feature creep
Which of the following is NOT one of the advantages to the database approach? A. shared B. improved data integrity C. Isolation D. Reduced development time
{C} Isolation
___________ is an example of a firm that produces and sells many types of software for both computers and mobile devices. A. BSA B. Cisco C. Microsoft D. A +
{C} Microsoft
IBM, Microsoft, and RedHat offer certifications that test knowledge of their ____________. A. firewalls B. hardware C. operating systems D. applications.
{C} Operating systems
________________is a protocol that defines how a network uses radio signals to communication with a tag placed in or attached to an object, an animal or person. A. IrDA B. Bluetooth C. RFID D. TCP/IP
{C} RFID
Web developers write small programs called _________ to addinteractivity to the webpage. A. XML B. multimedia C. scripts D. RSS
{C} Scripts
At distances of about 33 feet, __________data transfer rate for 110 Mbps. At closer distances, such as about 6.5 feet, the transfer rate is at least 480 Mbps. A. Bluetooth B. Wi-Fi C. UWB D. IrDA
{C} UWB {Ultra Wide Band}
An ___________ provider is a third party business that provides services such as EDI, storage or email A. Intranet B. Internet Service Providers C. Value-added network D. digital data provider
{C} Value-added network
The amount of data, instructions, and information that can travel over transmission media sometimes is called the _____________. A. routing ability B. storage capability C. bandwidth D. broadband
{C} bandwidth
The Yes/No data type is also called the ___________ data type. A. memo B. Text C. Boolean D. AutoNumber
{C} boolean
An ______________ verifies that a required field contains data A. range check B. consistency C. completeness D. alphanumeric
{C} completeness
A ____________ check ensures that data in two related fields is logical and in the correct format. A. Style B. completeness C. consistency D. common sense
{C} consistency
An ____________ management system enables and manages the publishing , modification and access of files A. Product B. documents C. content D. output
{C} content
An MIS report that usually just lists transactions is called an _____________ report. A. exception B. batch C. detailed D. criteria
{C} detailed
The data in a ___________database exists in many separate locations throughout a network or the Inter-net A. collaborative B. multidementional C. distributed D. object oriented.
{C} distributed
An ___________ system is an information system that can imitate human reasoning and decision making. A. human B. simulation C. expert D. knowledge
{C} expert system
To prevent unauthorized users from accessing files and computers, many routers are protected by built in __________. A. bridge B. hub C. firewall D. switch
{C} firewall
A typical enterprise consists of a wide variety of departments, centers, and division - collectively known as ________ units. A. distinct B. organizational C. functional D. work
{C} functional
There ___________ are a set of logical applied when a user describes a situation to an expert system. A. artificial intelligence applications B. knowledge bases C. inference rules D. information literacy standards
{C} inference rules
Information ________prepares students, employees, and citizens to manage information so that they can be knowledgeable decision makers. A. management B. processing C. literacy D. evaluation
{C} literacy
An ________ administrator installs, configures, and maintains LAN, WANs, and more. A. Internet B. Database C. Network D. Social media
{C} network
A 4GL {Fourth Generation Language} is an __________language that enables users and software developers to access data data in databases A. classic B. interpretive C. non procedural D. procedural
{C} non procedural
With _____________transaction processing, the computer processes each transaction as it is entered. A. staggered B. batch C. online D. off-line
{C} online
With an _______________ language, a software developer writes instructions using English- like words A. compiler B. object-oritented C. procedural D. machine
{C} procedural
A ______________is a working model of the proposed system's essential functionality A. mockup B. benchmark C. prototype D. logical design
{C} prototype
A ____________ consists of simple, English-Like statements that allow users to specify the data they want to display, print, update or delete A. front end B. data dictionary C. query language D. report writer
{C} query language