IT final

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

True or False: A database that combines relational and object-oriented database models is referred to as a combination database.

False

True or False: A worm is a malicious code string that attaches itself to an executable file so that the file becomes "infected."

False

True or False: Asymmetric encryption is also called secret key encryption.

False

True or False: Database management systems don't include security measures to protect and safeguard data, because it isn't possible for anyone to gain unauthorized access to a database.

False

True or False: In deep learning, the computer learns using specific task algorithms rather than data representations.

False

True or False: A management information system (MIS) can identify problem activity, such as an unusually high number of production errors or customer returns.

True

True or False: A program can interrupt a looping pattern by using an if-then statement based on a particular action.

True

True or False: A single camera isn't good enough to simulate an eye; two cameras are needed to provide stereoscopic vision, which allows perception of depth and movement.

True

True or False: A systems integrator is a company that specializes in installing and supporting information systems.

True

True or False: Making sure that the records entered into tables remain consistent with the relationships between the tables involves checking for referential integrity.

True

True or False: Normalization is the process of structuring a database to avoid redundancy and undesirable dependencies.

True

True or False: Plagiarism is using others' words and ideas without attributing the original creator(s) as the source.

True

A separation alarm consists of two small devices; you attach one to your computer and place the other somewhere close to you. If the two devices are separated, what will happen? a. An alarm will sound. b. You will get an email alert. c. The computer will be disabled. d. The protection lock will engage.

a. An alarm will sound.

Which of the following statements describes a power conditioner? a. It stores extra voltage in a capacitor and then discharges that voltage onto the power line when it detects a low-voltage condition. b. It allows you to change the source or condition of your power supply depending on the location or quality of the power at your PC's location. c. It handles power surges in the same way a surge suppressor does but can also power devices for a few minutes when a complete power outage occurs. d. It offers an additional power source for your tablet or PC.

a. It stores extra voltage in a capacitor and then discharges that voltage onto the power line when it detects a low-voltage condition.

Which of these statements defines the term modularity? a. It's a measurement of how well the source code is divided into individual modules. b. It's a technique that prevents data from being altered during program execution. c. It's a way of breaking a large problem into smaller, more manageable pieces. d. It's a fixed, well-defined segment of a program.

a. It's a measurement of how well the source code is divided into individual modules.

With _____, the cloud service provider (CSP) or other provider offers the client a choice of tools and services along with the physical infrastructure to build cloud infrastructure. a. Platform as a Service (PaaS) b. Infrastructure as a Service (IaaS) c. Software as a Service (SaaS) d. Email as a Service (EaaS)

a. Platform as a Service (PaaS)

You can reduce reflection from your screen and thus improve readability by putting a(n) _____ on your monitor. a. antiglare filter b. screen protector c. privacy screen d. muting display

a. antiglare filter

In _____, companies use the internet to conduct a wide range of routine business activities with other companies. a. business-to-business (B2B) electronic commerce b. mobile commerce (m-commerce) c. online shopping d. business-to-consumer (B2C) electronic commerce

a. business-to-business (B2B) electronic commerce

Chapter 8 explains that water is dangerous to a computer because it _____, which can cause _____. a. conducts electricity very well; a short circuit b. acts as a solvent; chemicals to leach out of components c. warps the motherboard; broken circuits d. causes the metal components to rust; mechanical failures

a. conducts electricity very well; a short circuit

In a genetic algorithm, the use of a(n) _____ in the selection process means that the most successful mutations are mixed to produce a new generation of "offspring." a. crossover b. mixed mutation c. adaptation d. hybrid

a. crossover

Microsoft Access includes a Compact & Repair database feature, as shown in this screen shot, to safeguard data and prevent a. data corruption. b. data redundancy. c. data updates. d. data integrity.

a. data corruption.

Unlike an operational database, a(n) _____ doesn't change or delete the information it stores on an ongoing basis. a. data warehouse b. information system c. inventory database d. distributed database

a. data warehouse

A _____ is a collection of data organized in one or more tables stored on a computer. a. database b. presentation c. spreadsheet d. document

a. database

The transfer of money over the internet is known as a(n) a. electronic funds transfer (EFT). b. electronic payment method (EPM). c. smart card transfer (SCT). d. e-commerce transfer (ECT).

a. electronic funds transfer (EFT).

Information about the structure, specifications, and purpose of each element in a database is described by the a. metadata. b. legacy data. c. secure data. d. queried data.

a. metadata.

Which form of e-commerce enables consumers to make online purchases using their smartphones, tablets, and other mobile devices? a. mobile commerce (m-commerce) b. online commerce (o-commerce) c. device commerce (d-commerce) d. smart commerce (s-commerce)

a. mobile commerce (m-commerce)

A(n) _____ database uses a(n) _____ structure to organize data in three or more dimensions, as shown in this graphic. a. multidimensional; cube b. hybrid; model c. object-oriented; object d. multidimensional; block

a. multidimensional; cube

Cognitive computing, which is also called _____ computing, aims to mimic the functioning of the human brain through greater interconnectivity among memory, processors, and communications. a. neurosynaptic b. hybrid memory c. quantum d. core

a. neurosynaptic

Customers can browse a(n) _____ to locate and purchase items online or download it and use it for offline shopping. a. online catalog b. shopping agent c. e-tailer d. personal shopper

a. online catalog

A quantum computer evaluates _____, which can represent on/off as well as a number of other probable superpositions of those states. a. qubits b. microchips c. digits d. kilobytes

a. qubits

When an unsuspecting user connects to a _____ hotspot, a hacker can use the connection to install malware on the user's device or steal his or her private information. a. rogue b. secure c. worm d. cyber

a. rogue

Chapter 10 states that a simple decision support system (DSS) can be created using a _____ program. a. spreadsheet b. word-processing c. database d. presentation

a. spreadsheet

A set of instructions that describes how to perform a task is referred to as a(n) a. standard operating procedure (SOP). b. data-modeling procedure (DMP). c. electronic data-processing procedure (EDPP). d. connectivity procedure (CP).

a. standard operating procedure (SOP).

Chapter 8 explains that water is dangerous to a computer because it _____, which can cause _____. a· conducts electricity very well; a short circuit b· acts as a solvent; chemicals to leach out of components c· warps the motherboard; broken circuits d. causes the metal components to rust; mechanical failures

a· conducts electricity very well; a short circuit

Software _____ involves creating the higher-level software design and focusing on the broader planning and implementation steps for the system. a· development b· creation c· engineering d. expansion

a· development

In _____, the user builds the query by selecting one or more tables to query, adding the fields to display in the results in a query grid, and then entering the entry to match or other criteria in applicable fields. a. Access b. Query by Example (QBE) c. SELECT d. Structured Query Language (SQL)

b. Query by Example (QBE)

_____ is the process of making sure that the data and files (and in some cases, the settings) you have in all storage locations and devices are the same. a. Uploading b. Syncing c. Sharing d. Downloading

b. Syncing

What is an online predator? a. an individual who posts dangerous information online b. an individual who uses the internet to talk young people into meeting, exchanging photos, and so forth c. an individual who lacks the judgment to leave or avoid offensive websites d. an individual who texts and sends harassing email messages and posts embarrassing photos

b. an individual who uses the internet to talk young people into meeting, exchanging photos, and so forth

Suites of powerful applications designed specifically to help with project management, programming, user testing, and so on are referred to collectively as _____ tools. a. rapid application development (RAD) b. computer-aided software engineering (CASE) c. object-oriented programming (OOP) d. software development kit (SDK)

b. computer-aided software c. engineering (CASE)

The term _____ refers to the ability to link with other programs and devices. a. wireless area network b. connectivity c. electronic data d. online management

b. connectivity

The problem of redundancy can be avoided in backing up data by using _____ software, which examines the files and doesn't back up identical copies of certain folders and files multiple times. a. authentication b. deduplication c. archive d. restoration

b. deduplication

A _____ error occurs when a program's syntax is correct, but the program instructs the computer to perform an action incorrectly. a. run-time b. logic c. style d. syntax

b. logic

Which of the following technologies includes the use of smart medical devices, along with connected mobile apps and software, to enhance patient monitoring and healthcare? a. eHealth b. mHealth c. smart health d. smart grid

b. mHealth

Using a(n) ______ allows you to keep your backup files online while keeping your primary files on your local computer. a. offline backup service b. online backup service c. online updater service d. file restoring service

b. online backup service

Programmers use a(n) _____ to create a program. a. encrypted dialect b. programming language c. intelligent agent d. syntax

b. programming language

Unlike a traditional computer, which operates based on binary on/off states, a _____ computer operates based on many superpositions of states. a. cognitive b. quantum c. robotic d. neurosynaptic

b. quantum

A _____ code provides a signal to a consumer that he or she can find out more about a product or service available online. a. fast information (FI) b. quick response (QR) c. speedy review (SR) d. rapid reply (RR)

b. quick response (QR)

A _____ contains everything a business needs to get a new information system up and running. a. systems integrator b. turnkey system c. smart system d. niche information system

b. turnkey system

The goal of _____ is to develop computers that can perform functions normally reserved for humans, such as thinking, feeling, and learning from mistakes. a· intelligent automation (IA) b· artificial intelligence (AI) c· intelligent decision making (IDM) d. intelligent supercomputers (IS)

b· artificial intelligence (AI)

A _____ is a document, service, hardware, or software that must be finished and delivered by a certain date and time to maintain the project schedule a· project plan b· deliverable c· feasibility study d. requirement

b· deliverable

A password is considered strong if it's a· a common word, such as Password. b· easy to remember but hard to guess. c· easy to remember because it's obvious, such as a pet's name. d. hard to remember and easy to guess.

b· easy to remember but hard to guess.

A well-designed _____, like the one shown in this screenshot, provides the user with questions or prompts. a· table b· form c· report d. database

b· form

Once a new information system has been designed and the plans approved, the project can move into the next stage, which is a· support. b· implementation. c· application. d. authorization.

b· implementation.

Programmers use a(n) _____ to create a program. a· encrypted dialect b· programming language c· intelligent agent d. syntax

b· programming language

Many warehouse systems use which of the following technologies to enhance inventory tracking and placement? a· office information system (OIS) b· radio frequency identification (RFID) c· vendor identification (VID) d. standard operating procedure (SOP)

b· radio frequency identification (RFID)

_____ merges augmented aspects of real and virtual worlds. a. Augmented reality b. Virtual reality c. Mixed reality d. Limited reality

c. Mixed reality

Which type of query command asks a database to return records that match specified criteria? a. QBE command b. ACCESS command c. SELECT command d. STRUCTURED command

c. SELECT command

Which of the following is not an example of a database object? a. a form b. a report c. an attribute d. a data filter

c. an attribute

Technologies such as online analytical processing (OLAP) systems can be used to generate information called _____, such as customer spending patterns and behavior. a. input and output (I/O). b. strategic data (SD). c. business intelligence (BI). d. artificial intelligence (AI).

c. business intelligence (BI).

A company with a hybrid cloud can meet spikes in demand using a technique called _____, in which the private cloud handles the average workload and the public cloud resources come online automatically to handle the extra demand or activity. a. cloud management b. supplementation c. cloud bursting d. cloud transitioning

c. cloud bursting

A(n) _____ contains information about an individual's lifestyle and buying habits—information that marketers can use to effectively target buyers and sell their goods on the internet. a. consumer database b. e-commerce report c. consumer profile d. marketing strategy

c. consumer profile

Numeric and alphanumeric are examples of _____, or types of information specific fields will hold. a. primary keys b. field names c. data types d. field sizes

c. data types

Experts in _____ focus on delivering products and materials and use various distribution management systems to track orders, shipping, billing, and so on. a. office logistics b. distribution connectivity c. distribution logistics d. business inventory

c. distribution logistics

The principles a person uses to determine right and wrong and to guide his or her choices and actions are called a. traditions. b. laws. c. ethics. d. guidelines.

c. ethics.

A(n) _____ is sometimes called a software robot, or bot. a. knowledge engineer b. artificial agent c. intelligent agent d. expert system

c. intelligent agent

Which of the following are first-generation programming languages? a. assembly languages b. C++ and Java c. machine languages d. text-based languages

c. machine languages

A database that can be used by a retailer to track sales, update inventory records, and order more product is a(n) _____ database. a. distributed b. warehouse c. operational d. hybrid

c. operational

Which of the following is not a common type of data model? a. XML b. multimedia c. personal d. object-oriented

c. personal

Suppose the owner of a pet store wants to determine which brand of dog food has been the top seller over the day. Which type of system will provide this information? a. computerized sale (CS) system b. distribution logistics (DL) system c. point of sale (POS) system d. information system (IS)

c. point of sale (POS) system

A cloud setup created for and used by a single organization is a(n) _____ cloud. a. internet b. hybrid c. private d. public

c. private

To retrieve information from a database, the user generally creates a _____ and then runs it to display the results, or list of records that match the specified criteria. a. report b. primary key c. query d. record

c. query

A collection of related fields that describe a single entity, such as a place or event, is called a a. primary key. b. data type. c. record. d. field.

c. record.

Performing a _____ corrects some types of errors but leaves your data and settings intact. a. hard reset b. system update c. soft reset d. reboot

c. soft reset

Why does the IT staff perform corrective maintenance on an information system? a. to address other environment changes b. to enhance the software to meet new requirements c. to identify and fix errors d. to increase reliability and ease of maintenance

c. to identify and fix errors

The term tactile perception refers to which sense? a. sight b. taste c. touch d. hearing

c. touch

Most computers come with a basic one-year _____ against manufacturing defects for no additional charge. a. breakage insurance plan b. premium support plan c. warranty d. extended protection plan

c. warranty

Online hotel and airline reservation sites use _____ databases to hold availability and pricing information. a. relational b. XML c. web d. hybrid

c. web

One of the most widely used 3-D file formats for 3-D printers uses the _____ file name extension. a· .pdf b· .jpg c· .stl d. .docx

c· .stl

Which of the following statements does not describe graphene? a· It's harder than a diamond. b· It can conduct electricity 1,000 times better than copper. c· It can be injection molded into a variety of complex shapes. d. It's a sheet of graphite that's one atom thick.

c· It can be injection molded into a variety of complex shapes.

A(n) _____ is sometimes called a software robot, or bot. a· knowledge engineer b· artificial agent c· intelligent agent d. expert system

c· intelligent agent

The abbreviation HaaS stands for _____ as a Service. a. Healthcare b. Help c. Hybridization d. Hardware

d. Hardware

Which of the following statements describes a variable? a· It's used to perform actions in a sequence. b· It's a point where different actions may be performed depending on specific conditions. c· It allows a program to return to a previously executed instruction and repeat it. d. It's a data value stored in computer memory.

d. It's a data value stored in computer memory.

Which of the following converts general Java instructions into commands that a device or computer can understand? a. JavaScript b. Perl c. Swift d. Java virtual machine (JVM)

d. Java virtual machine (JVM)

_____ a file means making it available from your cloud storage for viewing, editing, and downloading by other designated users. a· Uploading b· Posting c· Downloading d. Sharing

d. Sharing

Which of the following is not one of the guidelines for using rapid application development (RAD) techniques? a. Rapidly prototype new projects to reduce redesign time. b. Use visual development (4GL) tools whenever possible. c. Approach coding with these priorities: use existing code first; buy someone else's existing code second; and write new code last. d. Show clients working software, not documents of how the software will work.

d. Show clients working software, not documents of how the software will work.

Which of the following is not one of the elements of an effective acceptable use policy (AUP)? a· a policy statement that describes the computer services covered by the policy b· an "Acceptable Uses" section that clearly defines appropriate use c· a "Violations and Sanctions" section that tells users how to report violations and where to direct their questions d. a list of specific websites that may not be visited

d. a list of specific websites that may not be visited

During the implementation phase of the software development life cycle (SDLC), the development team tests a(n) ______, which is a preliminary version of a software application. a· testing harness b· beta version c· upgrade d. alpha product

d. alpha product

During the testing phase of the software development life cycle (SDLC), a(n) _____ of the program is created for testing outside the development group, and the feedback that's received can be used to improve the product before it's released to the general public. a. testing harness b. alpha product c. gold release d. beta version

d. beta version

Java has _____, which means it can run on nearly any operating system. a. nonprocedural language b. communication facilitation c. scripting language d. cross-platform compatibility

d. cross-platform compatibility

A person who plans and designs database systems is called a a. database manager. b. database creator. c. database specialist. d. database analyst.

d. database analyst.

Which type of database spreads data across multiple networked computers, allowing greater storage and cheap and easy expansion? a· operational database b· networked database c· hybrid database d. distributed database

d. distributed database

Programmers that break a large problem into several small pieces and then work on them one at a time are using the _____ approach. a. looping b. if-then c. linear sequence d. divide-and-conquer

d. divide-and-conquer

One of the advantages of using _____ to exchange specially formatted business documents is that it automates repetitive business transactions, thereby lowering costs. a. automatic data interchange (ADI) b. virtual private networks (VPNs) c. supply chain management (SCM) d. electronic data interchange (EDI)

d. electronic data interchange (EDI)

In a store or restaurant, the cash register system and supporting information system (IS) software and systems are commonly referred to as the a. distribution management system. b. electronic control system. c. product logistics system. d. electronic point of sale system.

d. electronic point of sale system.

Graphics designed especially for online use can contain _____, in which different hyperlinks are assigned to different spots on the graphic. a. modules b. animation c. placeholders d. hotspots

d. hotspots

A(n) _____ enables the expert system to draw deductions from the rules in the knowledge base in response to user input. a. software robot b. genetic algorithm c. knowledge engineer d. inference engine

d. inference engine

Assembly language uses symbols and words to represent the elements of _____, making it possible for programmers to memorize them. a· numbers b· high-level programming languages c· engineering programming d. machine code

d. machine code

A(n) _____ collects, stores, and transmits data in a shared environment. a. radio frequency identification (RFID) b. distribution logistics system (DLS) c. management information system (MIS) d. office information system (OIS)

d. office information system (OIS)

Tendinitis and carpal tunnel syndrome are two common types of a. ergonomic distress. b. repetitive distress syndromes. c. arthritis. d. repetitive stress injuries.

d. repetitive stress injuries.

Shopping agents, live chat, and electronic payment systems are all examples of _____ tools. a. support commerce (s-commerce) b· electronic commerce (e-commerce) c· online commerce (o-commerce) d. internet commerce (i-commerce)

electronic commerce (e-commerce)


Kaugnay na mga set ng pag-aaral

CH 13 (Electrolytes) & CH 14 (Shock) PrepU

View Set

Location and Function of Arm Muscles

View Set

Module 35. Social Thinking And Social Influence

View Set

Special Senses - Chapter 15 - Workbook - Exercise 24.4 - A. Structure of the Eye and Vision - 3. Interior of the Eyeball

View Set