Computer Science Stassi Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

In Prolog, facts can have no more than two arguments.

false

In the context of database security, intermediary servers allow users to directly access the database

false

In today's Web, most Web pages have bidirectional links.

false

Information systems can provide some or all of the data needed for strategic, tactical, but not operational planning.

false

LGAs have two rows of pins that connect the chip to a circuit board

false

MIDI files are less compact than digital audio files.​

false

Modern processors follow Intel's original numbering sequence.

false

Programmers insert documentation called facts into the program code.

false

Spreadsheet software offers database capabilities for establishing relationships between different record types.

false

The file name of a specific Web page always appears first in the URL.

false

The operating systems for smartphones are radically different to those used for tablet computers

false

The order or sequence of rules in a Prolog program is usually critical.

false

The term product life cycle is frequently used to describe patterns in the way consumers adopt technology products.

false

The terms outsourcing and offshoring are the same thing

false

The use of several databases is one of ERP's major advantages.​

false

To conserve space, applications that require highquality sound use low sampling rates

false

When connecting to the Internet, most Internet users connect to a Tier 1 network.

false

memory cards are typically volatile

false

programmers who work within the declarative paradigm envision a program as data objects that essentially network with each other to exchange data

false

you can specify the actual solution in the problem statement.​

false

A computed ___________ is a calculation that a DBMS performs, similar to the way a spreadsheet computes a formula.

field

. ​________ computers, such as UNIVAC, can be characterized by their use of vacuum tubes to store individual bits of data.

first-generation

Which of the following is a valid variable name in Python​?

first_name

A(n) __________ file consists of a single, twodimensional table of data elements

flat

Expert systems are designed to deal with data that is imprecise or with problems that have more than one solution using a technique called __________.​

fuzzy logic

A proprietary model called the __________ represents the position of a product during its life cycle of publicity

gartner hype cycle

Payment processing is based on an online payment __________ that authorizes credit and debit cards, PayPal, and Apple Pay transactions.

gateway

Social media are categorized into four groups: social networking, ___________ networking, content communities, and online communications

geosocial

In economics, _________ are things that can be used or consumed, whereas _________ are intangible actions performed for a consumer.

goods, services

Web pages are connected by __________ links.

hypertext

What is the term that is used to describe a computer system that could store literary documents, link them according to logical relationships, and allow readers to comment and annotate what they read?​

hypertext

Which of the following is the least important characteristic of content communities?

identity

_______________ are two of the world's largest exporters of ICT services.

india and ireland

A(n) ____________ system collects, stores, and processes data to provide useful, accurate, and timely information, typically within the context of an organization.

information

Data becomes _______ when it is presented in a format that people can understand and use.

information

An instance of a class is said to be __________ (created) from the class.​

instantiated

Which of the following is not a characteristic for a good problem statement?

it contains detailed descriptions of the processes and tools that need to be developed

A cryptographic ________ is a word, number, or phrase that must be known to encrypt or decrypt data.

key

Sometimes an application requests memory but never releases it, a condition called a memory ______.​

leak

Which of the following is not considered to be type of database client?

local software, browsers, apps

_________ determine organizational goals and plan how to achieve those goals.

managers

Which type of network topology allows for redundant paths between devices that can be used to bypass failed devices?

mesh

A(n) _________ is a keyword that describes information, such as the content of a media element.​

metadata tag

Data _________ refers to computer algorithms that analyze information to discover previously unknown and useful information, including relationships and patterns.

mining

Every organization has a goal or plan that's referred to as its ___________.​

mission

The underlying structure of a database is referred to as a database _________.​

model

​The circles in a sociogram are referred to as sociogram ______.

nodes

________ data consists of numbers that can be used in arithmetic operations.​

numeric

A class attribute defines the characteristics of a set of _______.

objects

​____________ reduces the cost of goods and services by using workers and manufacturing facilities in countries with inexpensive labor.

offshoring

Many touchscreens have an _________ coating designed to repel the oils deposited by fingertips.​

oleophobic

Most modern transaction processing systems use ________ processing—a realtime method in which each transaction is processed as it is entered.

online

A(n) _________ database is used to collect, modify, and maintain data on a daily basis.​

operational

_________ technology divides a message into several packets that can be routed independently to their destination

packet switching

Speech recognition software analyzes the sounds of your voice and converts each word into groups of ________.​

phoneme(s)

Bitmap images are formed by a grid of _____.

pixels

A(n) ________ is a program that extends a browser's ability to work with file formats

plugin

A communication ______ is a virtual end point for data entering and leaving a digital device.​

port

. In a browser, _________ services can automatically complete your search requests based on previous searches.

predictive

__________ refers to a branch of data mining that analyzes current and historical data to predict future trends.

predictive analytics

Activities called ___________ involve the microprocessor receiving commands as software carries out tasks and while input arrives from the keyboard, mouse, and other devices.​

processes

From the perspective of a business that creates and sells a technology product, the ____________maps the expected profitability of a product from its inception to its demise.

product life cycle

In the context of economics, ___________ is a measurement of the amount of output that is produced per unit of input.

productivity

A social media _________ is the set of information someone provides to friends, contacts, and the public.​

profile

The object-oriented ________ is based on objects and classes that can be defined and manipulated by program code.​

program

Which of the following is not one of the main activities associated with operational databases?

providing an executive dashboard for decision makers

When a router connects to and communicates over the Internet, it has a ________ IP address that is routable over the Internet.

public

Data __________ refers to the form in which data is stored, processed, and transmitted.

representation

System ___________ specify the operating system and minimum hardware capacities necessary for a software product to work correctly.​

requirements

Which of the following feature is unique to OS X?

resource fork

Which of the following is an example of a DCE?

router, modem, hub

Which of the following is a scripting language?

ruby, perl, PHP

A Web _________ is an Internet-based computer that stores Web site content and accepts requests from browsers.

server

A virus __________ is a section of program code that contains a unique series of instructions known to be part of a malware exploit

signature

Unicode uses________ bits and provides codes for 65,000 characters

sixteen

​Trojans depend on ________ to spread.

social engineering

Sociologists use social network diagrams called _________ to depict connections between people.

sociograms

A __________ document contains the text for a Web page interspersed with coding for how to display text and any additional visual or auditory elements.

source

_________ enables people to control software with spoken commands, as well as dictate text into a word processing document

speech recognition

__________ is the process by which machines produce sound that resembles spoken words.

speech synthesis

Which database tool is best for simple flat files that involve calculations?

spreadsheet software

Suppose you wanted to run a Web server or FTP server from your home. What type of IP address would you want?​

static

One type of decision support system, called an executive information system, is designed to provide senior managers with information relevant to ___________ management activities such as setting policies, planning, and preparing budgets.​

strategic

In programming, a sequence of characters is called a ____.​

string

The term database ___________ refers to the arrangement of fields, tables, and relationships in a database.​

structure

. The electronic components of most digital devices are mounted on a circuit board called a ______________.

system board, motherboard, main board

The term ________ refers to the part of a digital device that holds the system board

system unit

There are three core elements in a relational database: fields, ________, and relationships.

tables

3. Formal __________ standards make it possible to create generalized media search engines that can locate media from multiple locations.

tagging

Authors mark up HTML documents by inserting special instructions called HTML ______.​

tags

If a Creative Commons license contains ND, what does that indicate?​

the work must not be changed when it is redistributed or shared

​Chrome OS is an example of a _________ because it depends substantially on processing and storage provided by cloud-based servers.

thin client

Which network tier forms the Internet backbone?

tier 1

. In the context of communication networks, the term __________ refers to the structure and layout of network components

topology

A(n) __________ is a word, name, symbol, or design used to identify one company and their goods from those of another company.

trademark

A(n) ___________ provides a way to collect, process, store, display, modify, or cancel transactions.​

transaction processing system or TPS

In a wireless network, RF signals are sent and received by a ______________.

transceiver

. Regardless of sampling rate, digital audio file size can be reduced using audio compression techniques.

true

. ​In an HTML document, most tags are inserted as pairs.

true

A hard disk drive is an example of magnetic storage.​

true

A multicore processor that executes more than one instruction at a time is referred to as a parallel processor.

true

A solid state drive can be used as a substitute for a hard disk drive.​

true

An efficiently designed database uses computed fields whenever possible because they do not require manual data entry.

true

As a general rule, declarative programming languages are most suitable for problems that pertain to words and concepts rather than to numbers.

true

At an ecommerce site, the merchant's ecommerce application carries out only the first and last stages of the payment process.

true

AtanasoffBerry Computer is often considered the first electronic digital computer

true

Data refers to the symbols that represent people, events, things, and ideas.​

true

Enterprise database applications tend to have some flexibility for customization,

true

Lossy compression throws away some of the original data during the compression process

true

Most commercial software is distributed under a singleuser license that limits use to one person at a time.

true

Most computer ads specify the speed of a microprocessor in gigahertz

true

Most spreadsheet software also includes basic data management features.

true

One of the main disadvantages of MIDI is that it cannot produce vocals

true

One of the ways that databases are classified is by their structure.

true

Password managers can generate unique passwords that have very good entropy

true

Processing is handled by the computer's central processing unit (CPU).​

true

Prolog and other declarative languages were classified as fifth generation languages.​

true

RAM is volatile.​

true

Semiconductors are substances with properties between those of a conductor and an insulator.​

true

Smartwatches are multifunction devices that can include a camera, thermometer, compass, calculator, cell phone, GPS, media player, and fitness tracker

true

Some software engineering activities overlap with the systems analysis and design activities

true

The Intel i7 microprocessor is x86 compatible.​

true

The code for a computer program is based on an algorithm.

true

The most famous program in the world is a single line of code that prints "Hello Earth!" on the screen.​

true

The most widespread wireless channels for communication networks are microwaves and RF signals.​

true

The term instruction cycle refers to the process in which a computer executes a single instruction.

true

​UDP is faster than TCP but does not perform error checking.

true

Which type of problem requires human intuition as the basis for finding a solution.

unstructured

A new version or edition of a software product is referred to as a software ___________

upgrade

It is a good idea to ________ your browser when a new version becomes available, mainly to increase security.​

upgrade

The AtanasoffBerry Computer was the first computing device to use ________ instead of mechanical switches as processing circuitry.

vacuum tubes

Putting data in a variable is referred to as assigning a(n) ____ to it.

value

A(n) ____ is a named memory location that holds data specified by a programmer or entered by an end user.​

variable

​Early computers that held both programs and data in memory became known as ________ architecture.

von Neumann

Stuxnet is a notorious computer _______.

worm

​A computer _______ is a selfreplicating, selfdistributing program designed to carry out unauthorized activity on a victim's device.

worm

The acronym IDE stands for which of the following?

​Integrated Development Environment

Which of the following is not a Python syntax rule?​

​Strings are delineated by == symbols.

To include more than one line of comments in Python code, you must start each line with which of the following symbols?

#

Which of the following is a concatenation operator?

+

The Python programming language has a small vocabulary of how many keywords?

34

When storing data in a variable, programmers use which symbol to indicate the assignment operator?​

=

As with other popular mobile operating systems, Android is designed for _______ processors.

ARM

. In business circles, the galaxy of services that revolve around customers is called ___________.​

CRM or customer relationship management

. IP addresses can be assigned by a network administrator, but more commonly they are automatically assigned by

DHCP

Which of the following is NOT a format that is used for digital audio?

DOC

​________ was designed to calculate trajectory tables for the U.S. Army.

ENIAC

A(n) _____ system can provide such benefits as improved overall performance by standardizing business processes based on best practices or improved access to information from a single database to an enterprise.

ERP

______ specifies a standard way to store music data for synthesizers and computers.​

MIDI

_______ programming is a style of programming that focuses​ on using objects to design and build applications.

Object oriented

​__________ is the term that describes devices that automate many industrial tasks by receiving digital commands and converting them into real-world actions such as shutting down a power grid or opening a valve in a fuel pipeline

SCADA

An information system progresses through several phases as it is developed, used, and finally retired. These phases are usually referred to as the _________.

SDLC

Which of the following i would be considered a mechanical calculator?

Schikard's calculator, pascaline, de colmar's arithmometer

On a network, which protocol is responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order, and error checking?​

TCP

The ____________ is a collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called HTTP.

World Wide Web

Which of the following is NOT a type of bitmap format?

ZIP

A low-level language has a low level of ___________ because it includes commands specific to a particular CPU or microprocessor family.

abstraction

A computer program written in Python is based on a step-by-step ______.

algorithm

​A calculation is based on a(n) ___________—the stepbystep process by which numbers are manipulated.

algorithm

An ecommerce ____________ is the software that handles ecommerce transactions.

application

​To instruct the computer to perform a calculation, programmers use a(n) _______ expression, which contains values and operators, such as + and -.

arithmetic

Thomas de Colmar's _________ became the first massproduced mechanical calculator

arithmometer

Which type of communication protocol converts data into standard formats that can be used by applications?

arrival

In the context of database security, database ______ identifies sensitive data and database vulnerabilities in order to secure them.

assessment

In a problem statement, you can limit complexity by making ____________.

assumptions

Classes enable programmers to build objects with multiple _______ and define ways for objects to interact with each other.​

attributes

The _______ number system allows digital devices to represent virtually any number simply by using 0s and 1s.​

binary

Password entropy is a measure in _____ of a password's unpredictability

bits

The bandwidth of a channel that carries digital data is usually measured in ___________.​

bits per second

__________ are the most commonly used database clients.

browsers

A stock market _________ refers to a sharp rise in stock values that is later followed by a sudden decline.

bubble

An operating system ensures that input and output proceed in an orderly manner, using ___________ to collect and hold data while the device is busy with other tasks.

buffers

A programming error is called a(n) ____.​

bug

​__________ goods are raw materials, tools, and machinery used by businesses to make consumer good

capital

_________ refers to the number of associations that can exist between two record types.

cardinality

A communication _________ is the medium used to transport information from one network device to another

channel

Which of the following is not a characteristic of a management information system?

collect display and modify transactions

A(n) _____ in Python is used by programmers to explain what the code does, but it does not show up when the program runs.

comment

A(n) ___________ converts all the statements in a program in a single batch, and the resulting collection of instructions, called ________, is placed in a new file.​

compiler, object code

Data ____________ refers to any technique that recodes the data in a file so that it contains fewer bits.

compression

The bulletin board systems of the 1970s are considered to be the forerunners of _____________.

content communities

Which popular social media service is good for sharing media and information?​

content community

. ​____________ is designed to make a work freely available for distribution and modification under the condition that all derivative works use the same license.

copyleft

A nonprofit organization called ____________ provides a set of standardized licenses that copyright holders can use to extend the rights to use their works to others.

creative commons

Decision makers can access analytical databases using an executive __________.​

dashboard

_________ refers to the symbols that represent people, events, things, and ideas

data

The type of data that a variable can hold is referred to as its

data type

A(n)________ is a program development tool that is used to find errors that may exist in a program.​

debugger

The process of tracking down bugs and correcting them is called ______.​

debugging

Which of the following is a Python keyword?​

def, elif, else

Your ________ browser is automatically used when opening a web page or clicking on a web link.

default

. In a formatted text file, ________ signals the beginning and end of a formatting command.

delimiter(s)

____________ is distributed for free and often comes preinstalled on new devices, but it is limited in some way until you pay for it.

demoware

The number of colors available in a graphic is referred to as color _________.

depth

__________ is music, speech, and other sounds represented in binary format for use in digital devices.

digital audio

The process of converting information, such as text, numbers, photos, or music, into digital data that can be manipulated by electronic devices is called ___________.​

digitization

. ​A subset of geosocial networking called social __________ uses geolocation to meet with people who are nearby and have similar interests.

discovery

________ technology displaces an existing business process, market, industry, or product.

disruptive

​A(n) _________ is designed to deliver malicious code into a device.

dropper

​Conventional wisdom tells us that strong passwords are at least _____ characters in length and include one or more uppercase letters, numbers, and symbols.

eight

Password _________ is a measure in bits of a password's unpredictability.

entropy

A(n) ___________ report contains information that is outside of normal or acceptable ranges

exception

The concept of _________ allows for the limited use of copyrighted material without obtaining permission from the copyright holder

fair use

. A filing cabinet full of folders and papers would be classified as a structured file because every document has a unique structure.

false

A DSS manipulates the data needed to make a decision as well as making a decision

false

A manual calculator implements algorithms autonomously

false

A private IP address can be used to send data over the Internet.

false

A programming language that supports the procedural paradigm is called a declarative language.​

false

Agile methodologies tend to be used for large software development projects involving more than ten developers, geographically dispersed development teams, and lifecritical applications.​

false

Algorithms are usually written in a format that is specific to a particular programming language

false

All remote storage is considered to be cloud storage.

false

An original message or file that has not yet been encrypted is referred to as ciphertext.

false

Between 2001 and 2014, significant gains were made in global ICT use, with the highest gains in desktop computer purchases.

false

Browser cache is another term for browser History list

false

Character data is composed of letters, symbols, and numerals that are used in calculations.​

false

Component systems are currently the most popular form factor for digital devices

false

Data cannot flow over multiple networks that have different topologies

false

Data for SCM does not necessarily take into account customer demand for products.​

false

Declarative languages are commonly used for production applications

false

ENIAC's memory held programs but not data

false

Generally speaking, in an objectoriented program, the objects don't interact.​

false

HTML is the only markup language used on the Web.​

false

HTTP is the markup language used to specify the contents of a Web page.

false


Ensembles d'études connexes

2.4- Three types of chemical bonds are ionic, covalent, and hydrogen

View Set

MS CH. 33 Management of Non-Malignant Blood Disorders

View Set

Pharm Adap Quiz: Ch. 49 Immunizing Drugs

View Set

Sherpath: Drugs Used In The Management Of Specific Neurodegenerative Disorders

View Set