Computer Science Exam #3
____ is a tablet PC
Ipad
Portable media players (PMP's) are small portable devices that allow you to play digital music and video. They use a format called ____ that allow audio files to be compressed so they are small enough to be sent over the internet or stored as digital files.
MP3
Which of the following is NOT a method in which a security system tries to authenticate a user's identity?
What you need--the kind of information you are asking for
A computer crime is defined as ____.
an illegal act perpetuated against computers or telecommunications and the use of computers or telecommunications to accomplish an illegal act
When most of us used in our TV sets, we got a system of varying signal amplitude and frequency that represents picture and sound elements. This systems is called ____ TV.
analog
The ____ is the smallest unit of data the computer can store in a database.
bit
What is 1 byte of data also called?
character
A field is a unit of data consisting of one or more____.
characters
Which of the following is NOT among the errors and accidents that many afflict computer systems?
computer crimes
Digital convergence combines several industries, including:
computers and communications, consumer electronics, entertainment and mass media
A blocking program for protecting children from online objectionable adult material is ____.
cybersitter, cyber patrol, net nanny
What is the process of removing errors and inconsistencies from data called?
data cleansing
In a database management system, the ____ is a document or file that stores the data definitions and descriptions of the structure of data used in the database
data directory
Which of the following is the computer-assisted process of sifting through and analyzing vast amounts of data to extract meaning and discovering new knowledge?
data mining
The person who coordinates all activities and needs for an organization's database is the ____.
database administrator
What is the software that controls the structure of a database and access to the data?
database management system
A computer-based information system that provides a flexible tool for analysis and helps managers focus on the future is a ____ system.
decision support
Incomplete, outdated, or otherwise inaccurate data is known as ____ data.
dirty
Which of the following is NOT a tool for fighting unauthorized online use?
disaster-recovery plan
Which of the following terms describes old, obsolete electronic gadgetry?
e-waste
A power failure that disrupts a computer system is an example of a ____.
electromechanical problem
In the area of threats to computer systems, electromechanical problems are examples of ____.
errors and accidents
A variant on conventional phishing, in which a hacker or cracker sets up a Wi-Fi hotspot or access point that makes your computer think it's accessing a safe public network or your home network and then monitors your communications and steals the data that you enter into a website, is known as ____.
evil twin attack
An easy-to-use decision support system that specifically supports strategic decision making is a ____ system.
executive support
If you were in top management, which type of computer-based information system would you use?
executive support system (ESS)
A set of interactive computer programs that help users solve problems that would otherwise require the assistance of a human specialist is a ____ system.
expert
A digital camera's images are stored on ____.
flash memory cards
Digital music players, such as the iPod, use one or both of the following file storage technologies: ____ and ____.
hard-disk drive; flash memory
Which type of database model arranges fields or records in related groups whereby each child record can have only one parent record?
hierarchical database
____ TV uses a digital signal, or series of 0's and 1's, and is much clearer and less prone to interference than analog TV.
high-def (HD)
Dirty data is ____.
inaccurate, incomplete data
Which of the following is NOT a task performed by the database administrator (DBA)?
installing hardware
The Nigerian letter scam is an example of ____.
internet-related fraud
The ____ uniquely identifies a record.
key field
A digital camera's resolution is expressed in ____.
megapixels
What describes contents of a data warehouse?
metadata
Which database model was developed to improve on the hierarchical model and deal with more complex data relationships?
network
Which type of database model is similar to a hierarchical database but allows each child record to have more than one parent record?
network database
Sending emails that appear to come from a trusted source, which direct you to a website where you're asked to reveal information is called ____.
phishing
A camera, either film or digital, that automatically adjusts settings such as exposure and focus is a ____ camera.
point-and-shoot
Which of the following is NOT a function of the U.S. Computer Emergency Response Team (CERT)?
prosecuting those caught
A record (row) is a collection of related____.
records
The downside of personalization is people feel over-burned with too much choice, so that they are likely to ____.
regret their decisions, be reluctant to make decisions, have excessive expectations about their decisions
Which type of database model connects data in different files through the use of a key field?
relational database
Which of these is a program that produces an on screen on printed document form all or part of a database?
report generator
Another name for image sharpness is ____.
resolution
The quality of a song on a digital audio player is determined by its ____, the number of times a song is measured and converted to a digital value.
sampling rate
____ is a system of safeguards for protecting information technology against disasters, system failures, and unauthorized access.
security
One use of virtual reality is to build ____ to represent the behavior of physical or abstract systems and use them to train people in realistic situations.
simulators
The Apple Iphone is a cellphone with a microprocessor, display screen, memory, and built-in modem. Thus it is a ____.
smartphone
The components of an expert system include all BUT which one of these?
speech recognition
PMP's are mostly of two types--music players and media players--but much of what they can do can also be done on today's ____.
tablets, smartphones, laptops
Using a smartphone to send short messages to another smartphone or other handheld device is called ____.
text messaging
In 2009 a cracker stole more than 500,000 patient records from a state-run database and demanded ransom for the return of the records. This crime is called ____.
theft of information
In a business organization, a recorded event having to do with routine business activities is a ____.
transaction
A computer-based information system that keeps track of the transactions needed to conduct business is an ____ system.
transaction processing
The societal effects of new TV technology are that it can change ____.
when you watch TV, where you watch TV, the nature of TV programs