GMU IT 104 Final Exam
One of the most widely used 3-D file formats for 3-D printers uses the _____ file name extension. .stl .pdf .jpg .std
.stl
_____ is the use of printer-like technology to output three-dimensional objects using one of a variety of materials. system printer project manufacturing software printer Additive manufacturing
Additive manufacturing
_____ involves moving through a database file, examining each record, and looking for information. web surfing web browsing data mining Data browsing
Data browsing
True or False: A worm adds itself to another program and waits for the user to execute an attachment or open a file with a macro.
FALSE
True or False: In the worlds of business and technology, the term smart grid is used to refer to the merging of different technologies and industries to form a newer, better product or process.
FALSE
A disaster recovery plan typically does not answer which of these questions? How to restore data and systems How will users' identities be confirmed? How to increase profitability after a disaster How to communicate with stakeholders
How will users' identities be confirmed?
Which of the following statements does not describe graphene? It's harder than a diamond It's a sheet of graphite that's one atom thick It can be injection molded into a variety of complex shapes.
It can be injection molded into a variety of complex shapes.
Which of the following statements describes a power conditioner? It stores extra voltage in a capacitor and then discharges that voltage onto the power line when it detects a low-voltage condition. it discharges voltage into the power supply that is stored in software. it stores electricity in combines which then transports voltage into the fuel injector it discharges power into the power cap which transfers voltage into the spacers
It stores extra voltage in a capacitor and then discharges that voltage onto the power line when it detects a low-voltage condition.
Which of the following converts general Java instructions into commands that a device or computer can understand? javascript Java virtual machine (JVM) hyper text markup language (HTML) machine language (ML)
Java virtual machine (JVM)
_____ design is sometimes referred to as mobile-first design because the needs of mobile devices are at the forefront. development documented Responsive Supply
Responsive
_____ a file means making it available from your cloud storage for viewing, editing, and downloading by other designated users. emailing sharing duplicating copying
Sharing
True or False: A backup appliance is a special computer system that's designed specifically for performing and storing backups.
TRUE
True or False: A program can interrupt a looping pattern by using an if-then statement based on a particular action.
TRUE
True or False: A program with style errors may run, but the errors will make the code bulkier, slower to execute, or more difficult to edit.
TRUE
True or False: An expert system contains a knowledge base, which is a set of facts and rules about a specific complex application.
TRUE
True or False: Normalization is the process of structuring a database to avoid redundancy and undesirable dependencies.
TRUE
True or False: Online banking involves using a web-enabled PC or mobile device.
TRUE
True or False: Penetration testing entails trying to hack into a system so its vulnerabilities can be identified and fixed.
TRUE
True or False: The term risk refers to the likelihood of a security breach of systems or data that obtains, damages, or destroys assets.
TRUE
Which of the following statements does not describe virus signatures? antivirus software that stores all the data on known types of viruses They are enabled by default in web browsers and scan web pages for suspicious signs. snippet of malicious code that indicated that a file was infected by a specific virus
They are enabled by default in web browsers and scan web pages for suspicious signs.
Which of the following types of malware hides within a legitimate program or data file? worm hacker a Trojan horse ransomeware
a Trojan horse
Which type of data consists of letters, numbers, and sometimes special characters? syntax code programming alphanumeric
alphanumeric
Third-party cookies are created by which of the following? the user the website an ad on a site the company
an ad on a site
In addition to discovering meaningful patterns in data, _____ includes communicating insights about data, such as the spending behavior of a group of customers. algorithm analytics data mining analyzation
analytics
The virtual first-down lines and other status lines you see on the field when watching a football game on TV are created with which of the following? artificial intelligence (AI) augmented reality (AR) virtual reality (VR) Spacial reality (SR)
augmented reality (AR)
During the testing phase of the software development life cycle (SDLC), a(n) _____ of the program is created for testing outside the development group, and the feedback that's received can be used to improve the product before it's released to the general public. beta version Cloud service provider Backup system testing harness
beta version
Many companies control employee access to secure areas using a _____, such as a voice, a fingerprint, hand geometry, facial geometry, a retinal pattern, an iris pattern, or a handwritten signature. physical recognition bio scanner finger print recognition biometric identifier
biometric identifier
For a consensus network, which of the following is intended to provide the ability to track and verify every asset transaction for security purposes? algorithm chainmail blockchain asset block
blockchain
Technologies such as online analytical processing (OLAP) systems can be used to generate information called _____, such as customer spending patterns and behavior. business intelligence (BI). Business outsourcing (BO) business analytics (BA) bioframe algorithm (BA)
business intelligence (BI).
The abbreviation B2C stands for which type of e-commerce? buyer-to-consumer business-to-constipation business-to-company business-to-consumer
business-to-consumer
A(n) _____ operates one or more data centers, and organizations buy cloud capacity from it as needed. cloud service provider (CSP) Public cloud Cloud computing Platform
cloud service provider (CSP)
The study and simulation of the human mind is called mental science cognitive study behavioral science cognitive science.
cognitive science.
Symptoms of _____ can include headaches, loss of focus, burning or tired eyes, blurred or double vision, and neck and shoulder strain. risk tolerance computer vision syndrome technology addiction screen brightness
computer vision syndrome
Chapter 8 explains that water is dangerous to a computer because it _____, which can cause _____. get on technology; hurt combuter conducts electricity very well; a short circuit damages hardware; wire malfunctions causes the software to crash
conducts electricity very well; a short circuit
The term _____ refers to the ability to link with other programs and devices. sharability copy connectivity Outsourcing
connectivity
A location that houses a large computing operation with numerous networked servers is called a(n) data center. business center beta center data specelization
data center.
Which of the following collects the body of metadata for the entire database? Expert system data dictionary Gantt chart Systems integrator
data dictionary
Suppose that a manager wants to identify employees who have called in sick more than 10 days in the past year. Which of the following database management tools should he or she use to display only this data? data eliminator data extractor data filter data aranger
data filter
A system with high _____ provides more value to users than a system containing a large percentage of errors. data mining data integrity Functional specification Turnkey systems
data integrity
Which of the following methods for dealing with big data involves finding patterns and relationships in order to apply an organizing structure? data syntax data mining data support data revelation
data mining
A decision support system (DSS) uses _____ to simulate real-world situations and consider "what if?" scenarios. data planning data modeling Feasibility study Outsourcing
data modeling
Which of the following terms refers to the activities performed with a database? data analyzing data processing data management data planning
data processing
Using which of the following techniques ensures that users enter correct and complete data into the system? data implementation data validation data correction data testion
data validation
Because databases generally form the core of a company's information systems, _____—that is, operating and maintaining the database system—is an important IT function. database administration database manager system developer software engineer
database administration
A person who plans and designs database systems is called a database manager database creator database analyst database planner
database analyst
Which of these terms refers to code that's "commented out," or marked with comments to notify the compiler to skip and ignore it? transfer code dead code live code beta code
dead code
Specifications that document the details of the software that programmers will write are produced during the _____ phase of the software development life cycle (SDLC). specification development design documentation
design
When you use a(n) _____ to pay for a purchase, it automatically transfers the appropriate payment information to the retailer. credit card commerce digital wallet online debit coin commerce
digital wallet
Which type of database spreads data across multiple networked computers, allowing greater storage and cheap and easy expansion? Quick response database data center distributed database attributed database
distributed database
The written notes that explain how a program works are referred to as design documentation development implementation
documentation
A retail company that carries out electronic commerce is sometimes referred to as a(n) e-procurement e-tailer e-agent in-store retailer
e-tailer.
Which of the following technologies enables doctors to access patients' medical records from a single source and use online data to help with diagnosis and treatment? Disk Check Biometric identifier Public key encryption eHealth
eHealth
Shopping agents, live chat, and electronic payment systems are all examples of _____ tools. digital wallet online payment electronic commerce (e-commerce) online commerce (o-commerce)
electronic commerce (e-commerce)
One of the advantages of using _____ to exchange specially formatted business documents is that it automates repetitive business transactions, thereby lowering costs. electronic commerce (e-commerce) electronic data interchange (EDI) Electronic data processing (EDP) Office information systems (OIS)
electronic data interchange (EDI)
The transfer of money over the internet is known as a(n) electronic funds transfer (EFT). information upload data (IUD) system transfer design (STD) commerce fund transfer (CFT)
electronic funds transfer (EFT).
Legislation passed in 2000 broadly defined a(n) _____ to include "electronic sound, symbol, or process." sound signature electronic processor electronic signature electronic commerce
electronic signature
Work-related injuries caused by stress and strain on the body, such as carpal tunnel syndrome, can be prevented by following _____ principles in the workplace. ergonomic design visual design mental perception physical recitation
ergonomic design
The principles a person uses to determine right and wrong and to guide his or her choices and actions are called Feasibility maturity ethics design principles
ethics
Sophisticated software that uses artificial intelligence techniques to model an expert's knowledge of a topics is called a(n) E-tailer expert system. Procurement trusted system.
expert system.
In which of the following environments is FORTRAN still commonly used? colleges business and stores factories and laboratories government agencies
factories and laboratories
Retrieving data from a database and performing some type of operation on it is called Business intelligence file upload Project plan file processing
file processing
Once the plan for a new information system has been approved, two documents are created. The _____ specification, which is usually written first, states exactly what the system must accomplish. functional Design Implementation data
functional
Which of the following technologies uses a computer to create thousands or even millions of slightly varied designs and then tests and selects the best of them? genetic algorithm system analyst radio frequency identification gnatt chart
genetic algorithm
People who attempt to gain access to a computer system are known as worms hackers turnkey expert system
hackers
Many errors occur because the programmer was sloppy during the programming process. Programmers refer to this sloppy way of working as _____ code. programming worm hacking threat
hacking
Once a new information system has been designed and the plans approved, the project can move into the next stage, which is design integration implementation planning
implementation
A(n) _____ enables the expert system to draw deductions from the rules in the knowledge base in response to user input. Supply chain inference engine Support contract knowledge engine
inference engine
A(n) _____ is sometimes called a software robot, or bot. E-tailer online friend intelligent agent software agent
intelligent agent
The cloud delivers services and stores, processes, and manages data using _____, such as servers and software, rather than _____. internet-based resources; your local computer Statistical quality control; System development Business intelligence; Knowledge base Deliverables; Outsourcing
internet-based resources; your local computer
A(n) _____ is the amount of energy required to sustain one watt for one second. watt juole sourin conductivity
joule
_____ manufacturing involves correlating the date and time of the manufacture and delivery of a certain product to a customer's request. right-on-time (ROT) just-on-time (JOT) just-in-time (JIT) right-on-time-connectivity (ROTC)
just-in-time (JIT)
A database ____ can be used to identify a set of information and therefore provide a means of searching or sorting. Encryption key Privacy policy Digital divide
key
A(n) _____ is a programmer who specializes in building knowledge bases, each consisting of a set of rules that the computer will try to prove or disprove by asking a battery of questions. software engineer knowledge engineer data miner software developer
knowledge engineer
To be able to continue to access the information stored in a(n) _____, the programming code must be made compatible with the newer system. software database program database legacy database data database
legacy database
Which of the following are first-generation programming languages? syntax alpha product natural language machine languages
machine languages
Which form of e-commerce enables consumers to make online purchases using their smartphones, tablets, and other mobile devices? mobile commerce (m-commerce) Electronic data commerce (d-commerce) screen commerce (s-commerce) shopping commerce (s-commerce)
mobile commerce (m-commerce)
In _____, a person might interact with a computer by speaking or typing sentences. biometric processor voiceover natural language processing sound deliverable
natural language processing
In object-oriented programming (OOP), a(n) _____ is a module. knowledge project planning object
object
The IT staff performs _____ maintenance to increase the reliability and ease of maintenance of an information system. corrective preventive edition support
preventive
Searching for, finding, and purchasing materials, supplies, products, and services at the best possible prices and ensuring they are delivered in a timely manner is known as expert system knowledge base procurement beta testing
procurement.
Programmers use a(n) _____ to create a program. code ganatt chart proposal plan programming language
programming language
A _____ program can seize control of a computer until the user agrees to the attacker's demands. worm hacker ransomware Support contract
ransomware
Within a company or business, _____ is the process of creating and commercializing new technologies and products for new markets. Planning implementation correction & establishment (C&E) research & development (R&D)
research & development (R&D)
It may be appropriate for different assets to have different _____ levels and different types of security protection. risk tolerance threat security identity
risk tolerance
Which of the following terms refers to a section of a program created to handle a specific group of instructions? routine planning processing implementation
routine
Tunneling is a type of _____ technology used by virtual private networks (VPNs) in which one network sends its data via another network's connections. hacking security threat digital
security
A(n) _____ uses a variety of techniques to collect product information from various online merchants, enabling consumers to compare prices for a particular product or type of product. shopping cart online agent shopping agent web agent
shopping agent
The smart grid can work with a _____ to track electricity usage at a residential or commercial customer and transmit data to the energy supplier for billing and other purposes. electrical meter smart meter odometer data meter
smart meter
Which of the following may be required to match the company's needs with the best technology solutions? knowledge engineer computer engineer software engineering data analyst
software engineering
A powerful form of power surge called a _____ can damage circuit boards in the computer, including the motherboard. power trip socket power strip spike
spike
Which device is basically an extension cord with multiple plugs on it but contains a metal oxide variable resistor that can absorb any excess power during a surge or spike, preventing it from reaching the plugged-in devices? power strip outlet extender surge suppressor power extension
surge suppressor
The _____, or structure, of a programming language tends to be less complex than that of a human language. code syntax program language design specification
syntax
A(n) _____ is a technical expert who can help plan and develop the various parts of the information system that interact with other processes. systems processor Expert system Business systems analyst Support contract systems engineer
systems engineer
Deciding to play computer games all night instead of sleeping enough to perform well at work or school is an example of the unwise choices made by someone with a(n) computer vision syndrome technology ethics technology addiction. screen time
technology addiction.
A(n) _____ is someone or something that can compromise or harm the assets of a business or individual. vulnerability threat risk short circuit
threat
The term tactile perception refers to which sense? sight sound touch smell (pee-yew)
touch
A(n) _____ operates as a security-hardened version of a standard operating system (OS); it isolates OS functions and restricts unauthorized access to key areas of the OS. supply operating chain (SOP) trusted operating system (TOS) Electronic data interchange (EDI) Testing harness system (THS)
trusted operating system (TOS)
A gap or weakness in a security program that allows a threat to find a way into the system is called a threat worm vulnerability. Feasibility
vulnerability.
Most computers come with a basic one-year _____ against manufacturing defects for no additional charge. year plan warranty business cover smart cover
warranty
Online hotel and airline reservation sites use _____ databases to hold availability and pricing information. integration deliverable special web
web