Exam 4
Which of the following is NOT true about OOP languages?
A disadvantage of OOP is that you cannot reuse or modify existing objects
Which of the following is NOT true about NFC?
For successful communications, the devices must not touch or come within 6 inches of each other
Mapping, monitoring speed, and determining altitude all are uses of ______.
GPS
______ information is available when the decision maker needs it.
Accessible
______ information is error free.
Accurate
Which of the following is NOT true about web application development? Group of answer choices
HTML uses a set of codes called tags to instruct a browser how to structure content (wrong)
Which of the following is responsible for answering technology-related questions?
Help desk technician
Which of the following is NOT an advantage of the database approach?
Improved data integrity (wrong)
Which of the following is NOT true about use of unlicensed software?
In most cases, the software owner can make as many copies as desired
While working as an assistant in an IT department, you have been taking classes in information and systems security. You meet with a career counselor to discuss potential jobs. One of the jobs available at your current company is for a digital forensics analyst. What skill will you need to have to apply for the job?
Inspect electronic data to recover documents and files
While working as an assistant in an IT department, you have been taking classes in information and systems security. You meet with a career counselor to discuss potential jobs. One of the jobs available at your current company is for a network security administrator. What skill will you need to have to apply for the job?
Inspect electronic data to recover documents and files (wrong)
Which of the following is NOT an activity in the implementation phase?
Install and test the new system (wrong)
Which of the following best describes the role of a CRM specialist?
Integrates apps and data to provide an application that manages a company's relationship with customers
Which of the following is NOT one of the three general guidelines for system development?
Involve users (wrong)
______ data is stored in separate files in different departments.
Isolated
Why would a field that contains numbers have a text data type?
Because the values will not be used in calculations.
Which of the following is most likely to be used by a remote control?
Bluetooth (wrong)
Which of the following creates logs, documentation, and recovery plans based on cybersecurity threats and incidents?
Computer security incident responder
During which phase of system development would you acquire any necessary hardware and software?
Design
Which of the following MIS reports usually lists just transactions?
Detailed
WiMax and UMB are competing standards for ______.
LTE
Which of the following best defines big data?
Large-scale data sets that require advanced technologies
A city or town likely uses a(n) ______.
MAN
Which of the following is most likely to be used for mobile phone payments?
NFC
To enable a compute or device that does not have built-in networking capability, use a(n) ______.
NIC
Which of the following serves as an interface between programmers/developers and management?
Network engineer (wrong)
Which of the following best describes the role of a UX specialist?
Plans and designs software and apps that consider a user's reaction to a program and its surface
Which of the following MIS reports usually includes tables and graphs?
Summary
Which of the following is responsible for designing and developing information systems? Group of answer choices
Systems analyst
Which of the following is responsible for installing and maintaining operating system software?
Systems programmer
A(n) ______ is a third-party business that provides network services.
VAN
Which of the following jobs might use Google Cardboard to create storytelling tools?
VR engineer
______ compares data with a set of rules or values to determine if the data meets certain criteria.
Validation
______ information can be proved as correct or incorrect.
Verifiable (wrong)
You have taken a new job as a network administrator. Although you have been an IT professional within your organization for a number of years, this particular responsibility is a new one for you, so you have been studying network standards and protocols. You learn that all of the following are true about TCP/IP EXCEPT:
When a computer sends data over the Internet, the data is grouped into a single packet.
Which of the following best defines throttling?
When a network reduces upload and download speeds of high-data users at peak times
Which of the following best describes jailbreaking?
When a user makes unauthorized modifications to a device's operating system
Which of the following best defines Bluebugging?
When cyberthieves exploit Bluetooth devices that are paired.
802.11 is a series of standards to identify ______ networks.
Wi-Fi
Which of the following is NOT true about Wi-Fi networks?
Wi-Fi accesses the network in conjunction with the TCP/IP standard (wrong)
Gantt and PERT are types of ______ used to plan and schedule time relationships among project activities.
charts
A(n) ______ engineer develops AI-based machines and programs.
cognitive
Some web databases are ______ databases, where users store and share media with other registered users.
collaborative
Experian, Equifax, and Transunion are all types of ______ companies.
credit reporting
A data ______ contains data about each file in the database and each field in those files.
dictionary
A(n) ______ is the smallest unit of data a user accesses.
field
Which of the following is another term for a JAD session?
focus group
Data analysis certifications often contain the word ______ in their title.
forensics
Many programs today use ______ on a webpage as their front end.
forms
Home and small business users purchase ______ T1 lines, in which they share a connection with others.
fractional
A(n) ______ system is a set of hardware, software, data, people, and procedures that work together.
information
A(n) ______ translates and executes one instruction at a time and converts it to machine language.
interpreter
You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor. Gregor tells you that when a DBMS flags a deleted record, ______.
it is deleted logically
You have been chosen as a teaching assistant in your networking class. Your instructor asks you to prepare a presentation on network standards. You mention in your report that IrDA uses ______ to transfer data wirelessly.
light waves
Detailed analysis sometimes is called ______ design.
logical
File ______ refers to the procedures that keep data current.
maintenance
You are about to finish your degree in technology and are beginning your career search. You want to narrow down the fields in which you will look for a job. If you decide you want be involved in planning, research, development, evaluation, and integration of technology, you should look for jobs within the ______ area.
management
CAM and MRP are examples of information systems used in ______.
manufacturing
Cisco certifications that test knowledge of installing, configuring, operating, and administering ______.
networks
Which data type sometimes is called BLOB?
object
Client/server and P2P are two types of network ______.
operating systems (wrong)
A(n) ______ is an item that contains data, as well as the actions that read or process the data.
record
In a(n) ______, the DBMS uses the log to reenter changes made since the last save or backup.
retroactive backup (wrong)
A(n) ______ device initiates an instruction to transmit data, instructions, or information.
sending
The field ______ defines the maximum number of characters a field can contain.
size
A mobile ______ integrates and expands the company's initiatives for mobile users.
strategist
In some database programs, a data file is referred to as a(n) ______.
table
An RFID reader is also called a(n) ______.
transceiver
Transmission from an earth-based station to a satellite is a(n) ______.
uplink
You have been chosen to be a teaching assistant in your database course. The instructor asks you to prepare a presentation on Big Data. Data ______ is the process of presenting data graphically as charts, maps, or other pictorial formats.
visualization
Which generation was the first to introduce MMS?
2G (wrong)
Which type of system enables and manages the publishing, modification, and access of various forms of documents and other files on a network or on the web?
CMS
______ information is useful only within a specific time period.
Timely
For what purpose would a company use an extranet?
To allow customers or suppliers to access part of its intranet.
What is the purpose of ANSI and IEEE?
To propose, develop, and approve network standards
For which of the following purposes would a business use EDI?
To send bids and proposal
Which of the following is NOT true about DSSs?
A DSS uses data only from internal sources.
Which of the following best describes the function of a TPS?
A TPS captures and processes data from business activities
Which of the following is another term for transmission media?
Communications channel
______ is currently the most popular network standard for LANs.
Ethernet
Which of the following MIS reports identifies data outside of a normal condition? Group of answer choices
Exception
______ transmission often is called fixed wireless.
Microwave
You have taken a new job as a network administrator. Although you have been an IT professional within your organization for a number of years, this particular responsibility is a new one for you, so you have been studying network standards and protocols. You learn that all of the following are true about token ring networks EXCEPT:
More than one token can exist on a token ring network.
Which of the following is NOT true about technology certifications?
Most certification programs require academic coursework
Each computer or device on a network is called a(n) ______.
Node
Which of the following best describes function creep?
When a company uses the technology intended for one purpose for a different purpose
Skype and FaceTime are examples of ______ services.
VoIP
You have been chosen to be a teaching assistant in your database course. The instructor asks you to prepare a presentation on Big Data. Which of the following is NOT one of the three V's of Big Data.
Volatility
The Internet is the world's largest ______.
WAN
A(n) ______ database is a huge database used to analyze transactions.
data warehouse