IT 104 Final exam
One of the most widely used 3-D file formats for 3-D printers uses the _____ file name extension. .pdf .jpg .stl .docx
.stl
_____ is a risk mostly when working inside a computer and directly touching the circuit boards. Electrostatic discharge (ESD) Power conditioning (PC) Static conditioning (SC) Surge discharge (SD)
Electrostatic discharge (ESD)
True or False: Asymmetric encryption is also called secret key encryption. True False
FALSE
Query tools are used to design and test data tables in a database. True False
False
True or False: A database that combines relational and object-oriented database models is referred to as a combination database. True False
False
True or False: A worm is a malicious code string that attaches itself to an executable file so that the file becomes "infected." True False
False
True or False: All the businesses that sell their products and services at online shopping malls have their own online stores. True False
False
True or False: An OLAP cube structures data in a single dimension. True False
False
True or False: In deep learning, the computer learns using specific task algorithms rather than data representations. True False
False
True or False: Query tools are used to design and test data tables in a database. True False
False
A _____ cookie is created by the actual website a user visits. first-party global second-party third-party
First-Party
The abbreviation HaaS stands for _____ as a Service. Healthcare Help Hybridization Hardware
Hardware
A disaster recovery plan typically does not answer which of these questions? What storage-level appliances or drives will be used? Where will data backups be stored? What data backup procedures will be followed? How will users' identities be confirmed?
How will users' identities be confirmed?
Which of the following is not one of the popular scripting languages? Perl VBScript JavaScript Hypertext Markup Language (HTML)
Hypertext Markup Language (HTML)
Which of the following is a secure form of Hypertext Transfer Protocol (HTTP) that provides encryption for data sent through a web-based connection? Secure Sockets Layer (SSL) Transport Layer Security (TLS) Web-Based Encryption (WBE) Hypertext Transfer Protocol Secure (HTTPS)
Hypertext Transfer Protocol Secure (HTTPS)
Which of the following statements describes a Gantt chart? It's a pie chart with sections that show the various departments that will be involved in completion of a project. It uses plotted lines on a graph to show how work on a project will affect business over time. It uses vertical columns to show the costs of specific parts of a project in order from high to low. It uses horizontal bars on a timeline to show the stages and tasks in a project and the order in which they must be completed
It uses horizontal bars on a timeline to show the stages and tasks in a project and the order in which they must be completed
Which of the following statements describes a variable? It's used to perform actions in a sequence. It's a point where different actions may be performed depending on specific conditions. It allows a program to return to a previously executed instruction and repeat it. It's a data value stored in computer memory.
It's a data value stored in computer memory.
Which of the following converts general Java instructions into commands that a device or computer can understand? JavaScript Perl Swift Java virtual machine (JVM)
Java virtual machine (JVM)
_____ manufacturing involves correlating the date and time of the manufacture and delivery of a certain product to a customer's request. Just-in-time (JIT) Customer-specific (CS) On-time (OT) Supply chain (SC)
Just-in-time (JIT)
Which type of query command asks a database to return records that match specified criteria? QBE command ACCESS command SELECT command STRUCTURED command
SELECT command
Web pages are usually built with a combination of markup languages, such as Hypertext Markup Language (HTML), and _____ languages, such as JavaScript. machine code assembly applet scripting
Scripting
Which of the following is not one of the guidelines for using rapid application development (RAD) techniques? Rapidly prototype new projects to reduce redesign time. Use visual development (4GL) tools whenever possible. Approach coding with these priorities: use existing code first; buy someone else's existing code second; and write new code last. Show clients working software, not documents of how the software will work.
Show clients working software, not documents of how the software will work.
The term _____ refers to software that's delivered on demand from the cloud (the internet) via a web browser. Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Email as a Service (EaaS) Software as a Service (SaaS)
Software as a Service (SaaS)
A crash bug is one of the most dreaded types of run-time errors, because it causes a program to stop running, or crash. TRUE FALSE
TRUE
A backup appliance is a special computer system that's designed specifically for performing and storing backups. True False
True
An automated clearinghouse (ACH) is a type of automated banking network for transferring funds electronically from one account to another. True False
True
An expert system contains a knowledge base, which is a set of facts and rules about a specific complex application. True False
True
Depending on the type of business and customer needs, a company's supply chain may involve outside companies, such as a parts manufacturer or trucking company. True False
True
The terms 3-D printing and additive manufacturing refer to the same technology. True False
True
True or False: A program with style errors may run, but the errors will make the code bulkier, slower to execute, or more difficult to edit. True False
True
True or False: A single camera isn't good enough to simulate an eye; two cameras are needed to provide stereoscopic vision, which allows perception of depth and movement. True False
True
True or False: An automated clearinghouse (ACH) is a type of automated banking network for transferring funds electronically from one account to another. True False
True
True or False: An expert system contains a knowledge base, which is a set of facts and rules about a specific complex application. True False
True
True or False: Normalization is the process of structuring a database to avoid redundancy and undesirable dependencies. True False
True
True or False: The term risk refers to the likelihood of a security breach of systems or data that obtains, damages, or destroys assets. True False
True
True or False: Today, most organizations of all sizes use a computerized office information system (OIS) to manage a variety of tasks. True False
True
True or False: Visualization as a Service (VaaS) involves hiring an expert to transform data into stunning visuals. True False
True
Which of the following types of malware hides within a legitimate program or data file? a Trojan horse ransomware a boot sector virus a worm
a Trojan horse
What is a pure-play e-tailer? a company that can't sell its products and services over the web a company that sells its products and services both over the web and in bricks-and-mortar stores a company that has no bricks-and-mortar presence and therefore sells its products and services exclusively over the web a company that sells more of its products and services over the web than in bricks-and-mortar stores
a company that has no bricks-and-mortar presence and therefore sells its products and services exclusively over the web
Which of the following is not one of the elements of an effective acceptable use policy (AUP)? a policy statement that describes the computer services covered by the policy an "Acceptable Uses" section that clearly defines appropriate use a "Violations and Sanctions" section that tells users how to report violations and where to direct their questions a list of specific websites that may not be visited
a list of specific websites that may not be visited
What is a smart card? a plastic card that has all of a person's user names and passwords recorded on it a plastic card that's used to make purchases by drawing funds from a bank account a plastic card that contains a computer chip with stored information a plastic card that's used to purchase items on credit
a plastic card that contains a computer chip with stored information
What is a virtual server? a type of server that delivers content and services for a subscription fee a server that uploads backed-up data to the cloud a server accessed via a secure internet connection from the home, office, or anywhere else a server created by software rather than separate hardware
a server created by software rather than separate hardware
What is cloud storage? a saved list of songs that you can select and replay at a later time a set of programs for backing up your computer's contents a service that provides you with a set amount of file storage space in the cloud a free app for your tablet or smartphone that makes reading email easier
a service that provides you with a set amount of file storage space in the cloud
During the implementation phase of the software development life cycle (SDLC), the development team tests a(n) ______, which is a preliminary version of a software application. testing harness beta version upgrade alpha product
alpha product
Which type of data consists of letters, numbers, and sometimes special characters? Boolean alphanumeric numeric calculated
alphanumeric
Which of the following is not an example of a database object? a form a report an attribute a data filter
an attribute
What is a hologram? an interactive video that's viewable on certain types of mobile devices a type of movie that requires audience members to wear special glasses with red- and blue-colored lenses an image that's created using stereolithography and that sometimes employs robotic elements an image that's generally created by splitting laser light and that appears as a full 3-D image, either still or in motion
an image that's generally created by splitting laser light and that appears as a full 3-D image, either still or in motion
Small applications that can run on all types of computer operating systems are called functions. scripts. applets. compilers.
applets.
In a relational database, a field is called a(n) tuple. flat file. attribute. hybrid.
attribute.
People respond to audible cues about their surroundings without even thinking about them because of their _____ abilities. visual perception audio perception stereoscopic mental interface
audio perception
Public key encryption uses two encryption keys: a public encryption key, which all the _____ know, and a secret encryption key, which only the _____ know. authorized users; sender and receiver employees; customers senders; receivers managers; employees
authorized users; sender and receiver
You may not have to worry about backing up your computer at work, because many businesses have a(n) _____ that automatically backs up data files. restore system update system external storage system backup system
backup system
Many companies control employee access to secure areas using a _____, such as a voice, a fingerprint, hand geometry, facial geometry, a retinal pattern, an iris pattern, or a handwritten signature. smart card biometric identifier tracking system user name and password
biometric identifier
In the early phases of the system development process, a _____ defines the business problem and plans a solution. vendor analyst lead project manager business systems analyst software development analyst
business systems analyst
To show other users that a shared document is now available for them to check out and edit, you must _____ the document. restore replace check in check out
check in
When using the Microsoft SharePoint collaboration platform, you can _____ a document for editing. restore reserve replace check out
check out
A company with a hybrid cloud can meet spikes in demand using a technique called _____, in which the private cloud handles the average workload and the public cloud resources come online automatically to handle the extra demand or activity. cloud management supplementation cloud bursting cloud transitioning
cloud bursting
A(n) _____ operates one or more data centers, and organizations buy cloud capacity from it as needed. cloud service provider (CSP) information technology provider (ITP) network service provider (NSP) internet service provider (ISP)
cloud service provider (CSP)
The study and simulation of the human mind is called cognitive science. natural interface. cognitive discovery. behavioral science.
cognitive science.
A(n) _____ is an informational message inserted into the program source code. code editor comment bug interpreter
comment
Which type of check ensures that every required field in a record contains an entry, preventing data from being missing? completeness check range check consistency check alphanumeric check
completeness check
A can of _____ comes with a detachable thin plastic tube that allows directing the airflow precisely when cleaning inside the computer case. conditioned air compressed air system air air cleaner
compressed air
Suites of powerful applications designed specifically to help with project management, programming, user testing, and so on are referred to collectively as _____ tools. rapid application development (RAD) computer-aided software engineering (CASE) object-oriented programming (OOP) software development kit (SDK)
computer-aided software engineering (CASE)
A(n) _____ contains information about an individual's lifestyle and buying habits—information that marketers can use to effectively target buyers and sell their goods on the internet. consumer database e-commerce report consumer profile marketing strategy
consumer profile
About half of all high school students have reported being victims of _____, according to the National Crime Prevention Council. hate speech cyberbullying social media engagement pornography
cyberbullying
Microsoft Access includes a Compact & Repair database feature, as shown in this screen shot, to safeguard data and prevent data corruption. data redundancy. data updates. data integrity.
data corruption.
A system with high _____ provides more value to users than a system containing a large percentage of errors. redundancy data integrity database response time data corruption
data integrity
Which of the following terms refers to the activities performed with a database? data designing data specialization data management data processing
data processing
Numeric and alphanumeric are examples of _____, or types of information specific fields will hold. primary keys field names data types field sizes
data types
Because databases generally form the core of a company's information systems, _____—that is, operating and maintaining the database system—is an important IT function. database editing database monitoring database operations database administration
database administration
Many divisions of the US government make _____ available for free online, including through the portal Data.gov. field names metadata datasets data filters
datasets
A program that contains a(n) _____ statement, or point where different actions may be performed depending on specific conditions, will be more useful than one that simply follows a linear sequence of actions without variation. variable decision loop executable
decision
The problem of redundancy can be avoided in backing up data by using _____ software, which examines the files and doesn't back up identical copies of certain folders and files multiple times. authentication deduplication archive restoration
deduplication
Software _____ involves creating the higher-level software design and focusing on the broader planning and implementation steps for the system. development creation engineering expansion
development
Many music, video, and software distributors have focused on developing and implementing copy protection technologies called digital rights management (DRM). program copying prevention (PCP). new-age copyright management (NACM). Sony BMG
digital rights management (DRM).
When you use a(n) _____ to pay for a purchase, it automatically transfers the appropriate payment information to the retailer. virtual debit card digital wallet micropayment virtual credit card
digital wallet
Which type of database spreads data across multiple networked computers, allowing greater storage and cheap and easy expansion? operational database networked database hybrid database distributed database
distributed database
Programmers that break a large problem into several small pieces and then work on them one at a time are using the _____ approach. looping if-then linear sequence divide-and-conquer
divide-and-conquer
A password is considered strong if it's a common word, such as Password. easy to remember but hard to guess. easy to remember because it's obvious, such as a pet's name. hard to remember and easy to guess.
easy to remember but hard to guess.
One of the advantages of using _____ to exchange specially formatted business documents is that it automates repetitive business transactions, thereby lowering costs. automatic data interchange (ADI) virtual private networks (VPNs) supply chain management (SCM) electronic data interchange (EDI)
electronic data interchange (EDI)
To prevent people from spying on sensitive transactions, companies use data _____ to scramble information so it's unreadable before it's transmitted. verification corruption transmission encryption
encryption
Work-related injuries caused by stress and strain on the body, such as carpal tunnel syndrome, can be prevented by following _____ principles in the workplace. strengthening physical fitness ergonomic design efficient scheduling
ergonomic design
In which of the following environments is FORTRAN still commonly used? corporate headquarters colleges and universities factories and laboratories government agencies
factories and laboratories
Suppose an auto manufacturer wants to upgrade its existing computer-integrated manufacturing system. To determine the likely size and cost of the project, the company will conduct a _____ study. viability research practicality feasibility
feasibility
In _____, the file system saves multiple previous versions of a file. file versioning business-level public clouds conversations cloud storage
file versioning
A(n) _____ database is a traditional data file storage system that contains only one data table or file. multimedia object-oriented flat file relational
flat file
Which of the following statements describes spoofing? psychologically manipulating people into performing actions or divulging confidential information using or teaching hacking skills in order to be helpful and promote good security practices gaining entry to a secure computer system by finding a working user ID and password combination fooling another computer by pretending to send packets from a legitimate Internet Protocol (IP) address
fooling another computer by pretending to send packets from a legitimate Internet Protocol (IP) address
A well-designed _____, like the one shown in this screen shot, provides the user with questions or prompts. table form report database
form
Which of the following technologies uses a computer to create thousands or even millions of slightly varied designs and then tests and selects the best of them? cognitive science inference engine genetic algorithm data mining
genetic algorithm
People who attempt to gain access to a computer system are known as consumers. rogues. worms. hackers.
hackers.
Performing a _____ wipes out everything on your device, returning the system to the exact state it was in when you got the device. hard reset hard boot soft reset hard wipe
hard reset
Graphics designed especially for online use can contain _____, in which different hyperlinks are assigned to different spots on the graphic. modules animation placeholders hotspots
hotspots
Suppose that a hacker breaks into someone's computer and copies his or her social security number, address, and credit card information. This crime is an example of rogue hotspotting. identify theft. cyberwar. industrial espionage.
identify theft.
A(n) _____ enables the expert system to draw deductions from the rules in the knowledge base in response to user input. software robot genetic algorithm knowledge engineer inference engine
inference engine
A(n) _____ system collects, stores, and processes data that people in organizations use to manage daily and long-term operations and to create and sell various types of products. information hardware network technology
information
The cloud delivers services and stores, processes, and manages data using _____, such as servers and software, rather than _____. data centers; your local computer internet-based resources; your local computer your local computer; internet-based resources your local computer; data centers
internet-based resources; your local computer (correct)
A(n) _____ is the amount of energy required to sustain one watt for one second. joule amp ohm megawatt
joule
A database ____ can be used to identify a set of information and therefore provide a means of searching or sorting. key lock collection transaction
key
Which of the following technologies includes the use of smart medical devices, along with connected mobile apps and software, to enhance patient monitoring and healthcare? eHealth mHealth smart health smart grid
mHealth
Assembly language uses symbols and words to represent the elements of _____, making it possible for programmers to memorize them. numbers high-level programming languages engineering programming machine code
machine code
Which of the following are first-generation programming languages? assembly languages C++ and Java machine languages text-based languages
machine languages
Which of the following technologies uses sensors mounted around the skull to read the different types of waves or power spectrums the brain gives off? neural network natural interface speech recognition mental interface
mental interface
Using a(n) _____ approach to programming serves the purpose of making the code reusable and also helps in tracking down the sources of errors. modular structured object-oriented decoding
modular
A(n) _____ database uses a(n) _____ structure to organize data in three or more dimensions, as shown in this graphic. multidimensional; cube hybrid; model object-oriented; object multidimensional; block
multidimensional; cube
A(n) _____ database allows the storage of pictures, movies, sounds, and hyperlinked fields. multidimensional multimedia hybrid operational
multimedia
Imagine a computer that can read a set of news articles on any topic, understand what it has read, and write a report summarizing what it has learned. To do these things, the computer must have a machine language interface. neural network. fuzzy logic system. natural language interface.
natural language interface.
Related to perception, _____ deals with the science of moving a mobile robot through an environment. navigation locomotion dexterity hand-eye coordination
navigation
A _____, which simulates the physical workings of the human mind, is the ultimate attempt to model human intelligence. genetic algorithm neural network crossover fuzzy logic system
neural network
Cognitive computing, which is also called _____ computing, aims to mimic the functioning of the human brain through greater interconnectivity among memory, processors, and communications. neurosynaptic hybrid memory quantum core
neurosynaptic
A scripting language is a _____ language, meaning that it explains what the computer should do in English-like terms but not precisely how the computer should do it. nonprocedural assembly markup legacy programming
nonprocedural
A database that can be used by a retailer to track sales, update inventory records, and order more product is a(n) _____ database. distributed warehouse operational hybrid
operational
After an information system has been accepted and approved, _____ maintenance is performed to enhance the software to meet new requirements. preventive perfective adaptive corrective
perfective
Suppose the owner of a pet store wants to determine which brand of dog food has been the top seller over the day. Which type of system will provide this information? computerized sale (CS) system distribution logistics (DL) system point of sale (POS) system information system (IS)
point of sale (POS) system
The IT staff performs _____ maintenance to increase the reliability and ease of maintenance of an information system. perfective corrective preventive adaptive
preventive
A _____ is a statement promising that a website will protect the confidentiality of any information a customer reveals. nonviolation policy user policy privacy policy credibility policy
privacy policy
A cloud setup created for and used by a single organization is a(n) _____ cloud. internet hybrid private public
private
Searching for, finding, and purchasing materials, supplies, products, and services at the best possible prices and ensuring they are delivered in a timely manner is known as just-in-time (JIT) manufacturing. operational streamlining. procurement. supply chain management (SCM).
procurement.
Programmers use a(n) _____ to create a program. encrypted dialect programming language (correct) intelligent agent syntax
programming language
Virtual servers typically operate in a self-service fashion, allowing IT staff to add and remove new cloud services at will. This configuration or setup process is known as provisioning. virtualization. cloud computing. processing.
provisioning.
Unlike a traditional computer, which operates based on binary on/off states, a _____ computer operates based on many superpositions of states. cognitive quantum robotic neurosynaptic
quantum
To retrieve information from a database, the user generally creates a _____ and then runs it to display the results, or list of records that match the specified criteria. report primary key query record
query
Many warehouse systems use which of the following technologies to enhance inventory tracking and placement? office information system (OIS) radio frequency identification (RFID) vendor identification (VID) standard operating procedure (SOP)
radio frequency identification (RFID)
When multiple users attempt to edit an existing record in a database simultaneously, _____ prevents changes from being written to the database as a safety precaution. data corruption record locking remote access data integrity
record locking
In a(n) _____ database, fields with similar data can be connected between tables in the database, making it possible to retrieve data from the related tables. relational object-oriented flat-file operational
relational
When a company wants to hire a systems vendor or integrator, it sends out a _____ to one or more possible suppliers. project plan business system analysis request for proposal feasibility study
request for proposal
With a(n) _____, there's no need for physical hardware changes and no disruption to the app or service being delivered. scalable server network private cloud infrastructure
scalable server
A(n) _____ uses a variety of techniques to collect product information from various online merchants, enabling consumers to compare prices for a particular product or type of product. online shopping mall shopping agent online catalog e-tailer
shopping agent
A(n) _____ operation is a loosely organized team allowed to pursue extreme innovation—often operating not only outside the corporate rulebook but also in a separate location away from the main corporate campus. skunkworks top-secret research & development (R&D) elite
skunkworks
A cover that attaches with magnets to the side of a tablet and can be easily removed and replaced is called a _____ cover. plastic tablet snap smart
smart
Sensors such as power meters, voltage sensors, and fault detectors that gather data, along with digital communication capabilities that send the data to an operations center or other location, are examples of which type of technology? smart grid Bluetooth convergence internet
smart grid
The smart grid can work with a _____ to track electricity usage at a residential or commercial customer and transmit data to the energy supplier for billing and other purposes. Wi-Fi system consumer smart meter meter reader
smart meter
Performing a _____ corrects some types of errors but leaves your data and settings intact. hard reset system update soft reset reboot
soft reset
Typically larger and a bit more formal than a skunkworks, a(n) _____ occupies the forefront of research & development efforts for such companies as Alphabet Inc. and Facebook. special projects lab collaboration lab elite operations group project team
special projects lab
Which of the following technologies can be used to create more of a natural interface between humans and machines? speech recognition machine learning virtual reality neural networks
speech recognition
Chapter 10 states that a simple decision support system (DSS) can be created using a _____ program. spreadsheet word-processing database presentation
spreadsheet
A set of instructions that describes how to perform a task is referred to as a(n) standard operating procedure (SOP). data-modeling procedure (DMP). electronic data-processing procedure (EDPP). connectivity procedure (CP).
standard operating procedure (SOP).
Using the _____ technique, a programmer thinks in terms of creating groups of instructions, rather than simply executing lines one after another and writing code line by line. rapid application development (RAD) structured programming modular code object-oriented programming (OOP)
structured programming
Which device is basically an extension cord with multiple plugs on it but contains a metal oxide variable resistor that can absorb any excess power during a surge or spike, preventing it from reaching the plugged-in devices? power strip spike protector power adapter surge suppressor
surge suppressor
What is coding? a process for developing a group of programming languages at the same time an approach to problem solving the act of writing source code the cycle followed in releasing new versions of products
the act of writing source code
A(n) _____ is someone or something that can compromise or harm the assets of a business or individual. fraud threat cybercrime attack
threat
What is the purpose of performing adaptive maintenance on an information system? to identify and fix errors to increase reliability and ease of maintenance to address other environment changes to enhance the software to meet new requirements
to address other environment changes
Why does the IT staff perform corrective maintenance on an information system? to address other environment changes to enhance the software to meet new requirements to identify and fix errors to increase reliability and ease of maintenance
to identify and fix errors
The term tactile perception refers to which sense? sight taste touch hearing
touch
True or False: A program can interrupt a looping pattern by using an if-then statement based on a particular action. True False
true
True or False: Users and companies weigh how much work it takes to back up their data against how much they would suffer if they lost their data when determining an appropriate backup frequency for their systems. True False
true
A(n) _____ operates as a security-hardened version of a standard operating system (OS); it isolates OS functions and restricts unauthorized access to key areas of the OS. electronic data interchange (EDI) digital signing service (DSS) automated clearinghouse (ACH) trusted operating system (TOS)
trusted operating system (TOS)
A(n) _____ is a combination surge suppressor, power conditioner, and battery backup. uninterruptible power supply (UPS) shutdown backup device (SBD) portable power supplier (PPS) power providing device (PPD)
uninterruptible power supply (UPS)
Most computers come with a basic one-year _____ against manufacturing defects for no additional charge. breakage insurance plan premium support plan warranty extended protection plan
warranty
A large online meeting that's usually attended by 100 to 1,000 individuals is called a video link. webinar. conference. web chat.
webinar.