GMU IT 104 Final Exam

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

One of the most widely used 3-D file formats for 3-D printers uses the _____ file name extension. .stl .pdf .jpg .std

.stl

_____ is the use of printer-like technology to output three-dimensional objects using one of a variety of materials. system printer project manufacturing software printer Additive manufacturing

Additive manufacturing

_____ involves moving through a database file, examining each record, and looking for information. web surfing web browsing data mining Data browsing

Data browsing

True or False: A worm adds itself to another program and waits for the user to execute an attachment or open a file with a macro.

FALSE

True or False: In the worlds of business and technology, the term smart grid is used to refer to the merging of different technologies and industries to form a newer, better product or process.

FALSE

A disaster recovery plan typically does not answer which of these questions? How to restore data and systems How will users' identities be confirmed? How to increase profitability after a disaster How to communicate with stakeholders

How will users' identities be confirmed?

Which of the following statements does not describe graphene? It's harder than a diamond It's a sheet of graphite that's one atom thick It can be injection molded into a variety of complex shapes.

It can be injection molded into a variety of complex shapes.

Which of the following statements describes a power conditioner? It stores extra voltage in a capacitor and then discharges that voltage onto the power line when it detects a low-voltage condition. it discharges voltage into the power supply that is stored in software. it stores electricity in combines which then transports voltage into the fuel injector it discharges power into the power cap which transfers voltage into the spacers

It stores extra voltage in a capacitor and then discharges that voltage onto the power line when it detects a low-voltage condition.

Which of the following converts general Java instructions into commands that a device or computer can understand? javascript Java virtual machine (JVM) hyper text markup language (HTML) machine language (ML)

Java virtual machine (JVM)

_____ design is sometimes referred to as mobile-first design because the needs of mobile devices are at the forefront. development documented Responsive Supply

Responsive

_____ a file means making it available from your cloud storage for viewing, editing, and downloading by other designated users. emailing sharing duplicating copying

Sharing

True or False: A backup appliance is a special computer system that's designed specifically for performing and storing backups.

TRUE

True or False: A program can interrupt a looping pattern by using an if-then statement based on a particular action.

TRUE

True or False: A program with style errors may run, but the errors will make the code bulkier, slower to execute, or more difficult to edit.

TRUE

True or False: An expert system contains a knowledge base, which is a set of facts and rules about a specific complex application.

TRUE

True or False: Normalization is the process of structuring a database to avoid redundancy and undesirable dependencies.

TRUE

True or False: Online banking involves using a web-enabled PC or mobile device.

TRUE

True or False: Penetration testing entails trying to hack into a system so its vulnerabilities can be identified and fixed.

TRUE

True or False: The term risk refers to the likelihood of a security breach of systems or data that obtains, damages, or destroys assets.

TRUE

Which of the following statements does not describe virus signatures? antivirus software that stores all the data on known types of viruses They are enabled by default in web browsers and scan web pages for suspicious signs. snippet of malicious code that indicated that a file was infected by a specific virus

They are enabled by default in web browsers and scan web pages for suspicious signs.

Which of the following types of malware hides within a legitimate program or data file? worm hacker a Trojan horse ransomeware

a Trojan horse

Which type of data consists of letters, numbers, and sometimes special characters? syntax code programming alphanumeric

alphanumeric

Third-party cookies are created by which of the following? the user the website an ad on a site the company

an ad on a site

In addition to discovering meaningful patterns in data, _____ includes communicating insights about data, such as the spending behavior of a group of customers. algorithm analytics data mining analyzation

analytics

The virtual first-down lines and other status lines you see on the field when watching a football game on TV are created with which of the following? artificial intelligence (AI) augmented reality (AR) virtual reality (VR) Spacial reality (SR)

augmented reality (AR)

During the testing phase of the software development life cycle (SDLC), a(n) _____ of the program is created for testing outside the development group, and the feedback that's received can be used to improve the product before it's released to the general public. beta version Cloud service provider Backup system testing harness

beta version

Many companies control employee access to secure areas using a _____, such as a voice, a fingerprint, hand geometry, facial geometry, a retinal pattern, an iris pattern, or a handwritten signature. physical recognition bio scanner finger print recognition biometric identifier

biometric identifier

For a consensus network, which of the following is intended to provide the ability to track and verify every asset transaction for security purposes? algorithm chainmail blockchain asset block

blockchain

Technologies such as online analytical processing (OLAP) systems can be used to generate information called _____, such as customer spending patterns and behavior. business intelligence (BI). Business outsourcing (BO) business analytics (BA) bioframe algorithm (BA)

business intelligence (BI).

The abbreviation B2C stands for which type of e-commerce? buyer-to-consumer business-to-constipation business-to-company business-to-consumer

business-to-consumer

A(n) _____ operates one or more data centers, and organizations buy cloud capacity from it as needed. cloud service provider (CSP) Public cloud Cloud computing Platform

cloud service provider (CSP)

The study and simulation of the human mind is called mental science cognitive study behavioral science cognitive science.

cognitive science.

Symptoms of _____ can include headaches, loss of focus, burning or tired eyes, blurred or double vision, and neck and shoulder strain. risk tolerance computer vision syndrome technology addiction screen brightness

computer vision syndrome

Chapter 8 explains that water is dangerous to a computer because it _____, which can cause _____. get on technology; hurt combuter conducts electricity very well; a short circuit damages hardware; wire malfunctions causes the software to crash

conducts electricity very well; a short circuit

The term _____ refers to the ability to link with other programs and devices. sharability copy connectivity Outsourcing

connectivity

A location that houses a large computing operation with numerous networked servers is called a(n) data center. business center beta center data specelization

data center.

Which of the following collects the body of metadata for the entire database? Expert system data dictionary Gantt chart Systems integrator

data dictionary

Suppose that a manager wants to identify employees who have called in sick more than 10 days in the past year. Which of the following database management tools should he or she use to display only this data? data eliminator data extractor data filter data aranger

data filter

A system with high _____ provides more value to users than a system containing a large percentage of errors. data mining data integrity Functional specification Turnkey systems

data integrity

Which of the following methods for dealing with big data involves finding patterns and relationships in order to apply an organizing structure? data syntax data mining data support data revelation

data mining

A decision support system (DSS) uses _____ to simulate real-world situations and consider "what if?" scenarios. data planning data modeling Feasibility study Outsourcing

data modeling

Which of the following terms refers to the activities performed with a database? data analyzing data processing data management data planning

data processing

Using which of the following techniques ensures that users enter correct and complete data into the system? data implementation data validation data correction data testion

data validation

Because databases generally form the core of a company's information systems, _____—that is, operating and maintaining the database system—is an important IT function. database administration database manager system developer software engineer

database administration

A person who plans and designs database systems is called a database manager database creator database analyst database planner

database analyst

Which of these terms refers to code that's "commented out," or marked with comments to notify the compiler to skip and ignore it? transfer code dead code live code beta code

dead code

Specifications that document the details of the software that programmers will write are produced during the _____ phase of the software development life cycle (SDLC). specification development design documentation

design

When you use a(n) _____ to pay for a purchase, it automatically transfers the appropriate payment information to the retailer. credit card commerce digital wallet online debit coin commerce

digital wallet

Which type of database spreads data across multiple networked computers, allowing greater storage and cheap and easy expansion? Quick response database data center distributed database attributed database

distributed database

The written notes that explain how a program works are referred to as design documentation development implementation

documentation

A retail company that carries out electronic commerce is sometimes referred to as a(n) e-procurement e-tailer e-agent in-store retailer

e-tailer.

Which of the following technologies enables doctors to access patients' medical records from a single source and use online data to help with diagnosis and treatment? Disk Check Biometric identifier Public key encryption eHealth

eHealth

Shopping agents, live chat, and electronic payment systems are all examples of _____ tools. digital wallet online payment electronic commerce (e-commerce) online commerce (o-commerce)

electronic commerce (e-commerce)

One of the advantages of using _____ to exchange specially formatted business documents is that it automates repetitive business transactions, thereby lowering costs. electronic commerce (e-commerce) electronic data interchange (EDI) Electronic data processing (EDP) Office information systems (OIS)

electronic data interchange (EDI)

The transfer of money over the internet is known as a(n) electronic funds transfer (EFT). information upload data (IUD) system transfer design (STD) commerce fund transfer (CFT)

electronic funds transfer (EFT).

Legislation passed in 2000 broadly defined a(n) _____ to include "electronic sound, symbol, or process." sound signature electronic processor electronic signature electronic commerce

electronic signature

Work-related injuries caused by stress and strain on the body, such as carpal tunnel syndrome, can be prevented by following _____ principles in the workplace. ergonomic design visual design mental perception physical recitation

ergonomic design

The principles a person uses to determine right and wrong and to guide his or her choices and actions are called Feasibility maturity ethics design principles

ethics

Sophisticated software that uses artificial intelligence techniques to model an expert's knowledge of a topics is called a(n) E-tailer expert system. Procurement trusted system.

expert system.

In which of the following environments is FORTRAN still commonly used? colleges business and stores factories and laboratories government agencies

factories and laboratories

Retrieving data from a database and performing some type of operation on it is called Business intelligence file upload Project plan file processing

file processing

Once the plan for a new information system has been approved, two documents are created. The _____ specification, which is usually written first, states exactly what the system must accomplish. functional Design Implementation data

functional

Which of the following technologies uses a computer to create thousands or even millions of slightly varied designs and then tests and selects the best of them? genetic algorithm system analyst radio frequency identification gnatt chart

genetic algorithm

People who attempt to gain access to a computer system are known as worms hackers turnkey expert system

hackers

Many errors occur because the programmer was sloppy during the programming process. Programmers refer to this sloppy way of working as _____ code. programming worm hacking threat

hacking

Once a new information system has been designed and the plans approved, the project can move into the next stage, which is design integration implementation planning

implementation

A(n) _____ enables the expert system to draw deductions from the rules in the knowledge base in response to user input. Supply chain inference engine Support contract knowledge engine

inference engine

A(n) _____ is sometimes called a software robot, or bot. E-tailer online friend intelligent agent software agent

intelligent agent

The cloud delivers services and stores, processes, and manages data using _____, such as servers and software, rather than _____. internet-based resources; your local computer Statistical quality control; System development Business intelligence; Knowledge base Deliverables; Outsourcing

internet-based resources; your local computer

A(n) _____ is the amount of energy required to sustain one watt for one second. watt juole sourin conductivity

joule

_____ manufacturing involves correlating the date and time of the manufacture and delivery of a certain product to a customer's request. right-on-time (ROT) just-on-time (JOT) just-in-time (JIT) right-on-time-connectivity (ROTC)

just-in-time (JIT)

A database ____ can be used to identify a set of information and therefore provide a means of searching or sorting. Encryption key Privacy policy Digital divide

key

A(n) _____ is a programmer who specializes in building knowledge bases, each consisting of a set of rules that the computer will try to prove or disprove by asking a battery of questions. software engineer knowledge engineer data miner software developer

knowledge engineer

To be able to continue to access the information stored in a(n) _____, the programming code must be made compatible with the newer system. software database program database legacy database data database

legacy database

Which of the following are first-generation programming languages? syntax alpha product natural language machine languages

machine languages

Which form of e-commerce enables consumers to make online purchases using their smartphones, tablets, and other mobile devices? mobile commerce (m-commerce) Electronic data commerce (d-commerce) screen commerce (s-commerce) shopping commerce (s-commerce)

mobile commerce (m-commerce)

In _____, a person might interact with a computer by speaking or typing sentences. biometric processor voiceover natural language processing sound deliverable

natural language processing

In object-oriented programming (OOP), a(n) _____ is a module. knowledge project planning object

object

The IT staff performs _____ maintenance to increase the reliability and ease of maintenance of an information system. corrective preventive edition support

preventive

Searching for, finding, and purchasing materials, supplies, products, and services at the best possible prices and ensuring they are delivered in a timely manner is known as expert system knowledge base procurement beta testing

procurement.

Programmers use a(n) _____ to create a program. code ganatt chart proposal plan programming language

programming language

A _____ program can seize control of a computer until the user agrees to the attacker's demands. worm hacker ransomware Support contract

ransomware

Within a company or business, _____ is the process of creating and commercializing new technologies and products for new markets. Planning implementation correction & establishment (C&E) research & development (R&D)

research & development (R&D)

It may be appropriate for different assets to have different _____ levels and different types of security protection. risk tolerance threat security identity

risk tolerance

Which of the following terms refers to a section of a program created to handle a specific group of instructions? routine planning processing implementation

routine

Tunneling is a type of _____ technology used by virtual private networks (VPNs) in which one network sends its data via another network's connections. hacking security threat digital

security

A(n) _____ uses a variety of techniques to collect product information from various online merchants, enabling consumers to compare prices for a particular product or type of product. shopping cart online agent shopping agent web agent

shopping agent

The smart grid can work with a _____ to track electricity usage at a residential or commercial customer and transmit data to the energy supplier for billing and other purposes. electrical meter smart meter odometer data meter

smart meter

Which of the following may be required to match the company's needs with the best technology solutions? knowledge engineer computer engineer software engineering data analyst

software engineering

A powerful form of power surge called a _____ can damage circuit boards in the computer, including the motherboard. power trip socket power strip spike

spike

Which device is basically an extension cord with multiple plugs on it but contains a metal oxide variable resistor that can absorb any excess power during a surge or spike, preventing it from reaching the plugged-in devices? power strip outlet extender surge suppressor power extension

surge suppressor

The _____, or structure, of a programming language tends to be less complex than that of a human language. code syntax program language design specification

syntax

A(n) _____ is a technical expert who can help plan and develop the various parts of the information system that interact with other processes. systems processor Expert system Business systems analyst Support contract systems engineer

systems engineer

Deciding to play computer games all night instead of sleeping enough to perform well at work or school is an example of the unwise choices made by someone with a(n) computer vision syndrome technology ethics technology addiction. screen time

technology addiction.

A(n) _____ is someone or something that can compromise or harm the assets of a business or individual. vulnerability threat risk short circuit

threat

The term tactile perception refers to which sense? sight sound touch smell (pee-yew)

touch

A(n) _____ operates as a security-hardened version of a standard operating system (OS); it isolates OS functions and restricts unauthorized access to key areas of the OS. supply operating chain (SOP) trusted operating system (TOS) Electronic data interchange (EDI) Testing harness system (THS)

trusted operating system (TOS)

A gap or weakness in a security program that allows a threat to find a way into the system is called a threat worm vulnerability. Feasibility

vulnerability.

Most computers come with a basic one-year _____ against manufacturing defects for no additional charge. year plan warranty business cover smart cover

warranty

Online hotel and airline reservation sites use _____ databases to hold availability and pricing information. integration deliverable special web

web


Kaugnay na mga set ng pag-aaral

Statistics Chapter 8, stats ch 9, Stats Chapter 10

View Set

Organizational Behavior: Chapter 18

View Set

Chapter 4: The Spanish-American War

View Set

RE174 Ch 3 Duties & Responsibilities of Licensees

View Set

IB Biology Topic 6 Human Physiology

View Set

Homeowners: Section II Liability Coverage

View Set