CS 101 Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

connect personal computers within a very limited geographical area, such as a single building.

A LAN would be used to _____.

portal

A Web ____ is a Web page that combines useful information and links and acts as an entry point to the Web

DSS

A ___ helps people make decisions by directly manipulating data, analyzing data from external sources, generating statistical projections, and creating data models of various scenarios.

Hyperlink

A ____ is an element in an electronic document—a word, a phrase, or an image—that, when clicked, opens a related document

Visualization

A basic example of ____ is the use of graphs and charts to illustrate numeric data.

modify

A feature of neural networks includes the ability to quickly ____ stored data when new information is identified.

Long Term Evolution

A fourth-generation technology called _____ is competing to become the wireless network of choice for high-speed connectivity.

analysis

A goal of systems ______ is to produce a list of requirements to help solve the problem identified in systems investigation.

Amazon.

A good example of B2C e-commerce is ____.

allows computers to share resources such as files and applications

A peer-to-peer network ______.

input

A sensor is an example of a(n) _____ device for a robot

map.

A typical example of a geographic information system is a ____.

Home

A typical setup for a ____ network would include a wireless router connected to an ISP.

ES

A(n) ____ could be used to replicate how a specialist diagnoses lung cancer.

demand

A(n) ______ MIS report is produced when there is a specific need identified by

The analog video footage must first be converted into a digital form.

After videotaping her sister's wedding with an analog video camera, Nancy decided to edit out some of the extra footage using her computer. Although she has connected her camera, with the videotape, to her computer, she finds that she cannot access the video footage. Why?

neural networks.

All of the following are AI methodologies that rely on a human to give instructions for problem solving EXCEPT ____.

comment-trolling.

All of the following are categorized Internet addictions EXCEPT ____.

.xls

All of the following are examples of graphic file formats EXCEPT for ____.

Updates

All of the following are examples of malware EXCEPT ______.

Shared

All of the following are models for cloud computing EXCEPT ______.

avoid client/server networks

All of the following are safe and vigilant behavior to ensure Internet security EXCEPT ________.

all of the above

An ISP may provide _____ services.

file

An address book is an example of a database _____.

MP3

An advantage of using a(n) ____ format is its ability to compress CD music files to one tenth their original size.

Phishing

An email with a subject heading "Urgent Security Update" that requests a username and password followed by a link to "re-login and resolve the issue" is a good example of a ____ scam.

clip art

An example of a vector graphic image is ____.

Frames

Animation uses successive ____ to create the impression of an object moving.

artificial creativity

Artists use a branch of artificial intelligence called ____ to express themselves through computers.

PAN

Bluetooth is an example of a _____ network.

EDI

Businesses first used ____ for online transactions.

m-commerce.

Buying movie tickets via cell phone is an example of ____.

within the home

Citizens of free and democratic nations expect, at the least, privacy ____.

spam

Controlling the amount of _____ we receive in our email Inbox is one way to control information overload

Data

Cookie files contain ____.

install a Web cam in an employee's home.

Corporate network administrators have the right to do all of the following EXCEPT ____.

integrity

Data ____ refers to the quality and accuracy of the data.

packets

Data ____ travel over the Internet from router to router until reaching their destinations.

hiring and training the users.

Database Administrators are responsible for all of the following areas EXCEPT ____

CAD

Designers rely on ____ software to help them build prototypes for further research and testing

1s and 0s

Digital photography captures, stores, and manipulates photographs digitally as a series of ____.

encrypted

Digitized sound can be _____ for secure communications

telecommunications.

Distributed databases connect data at different locations via ___________.

all of the above

During the creation of a database, a data dictionary can be referenced by ____ to validate data item names, access dates, and access data types .

is the amount of digital information generated about a person every day.

Each person's digital shadow ____.

easily available to every law-abiding member of a society.

Full transparency is a scenario in which surveillance and information are ____.

shipping.

Hosting companies provide all the necessary software tools to deliver e-commerce applications EXCEPT ____.

field

In a database, your first name would be categorized as a ____

ID card

In terms of an authentication protocol, the phrase "something you have" refers to a(n) _____.

Protocol

In the URL http://www.cengage.com/index.html, http is the ____.

C2C

Individual consumers use the ____ form of e-commerce in which individuals sell to other individuals on the Web.

medical research.

Informatics is widely used in the combined disciplines of computer science and ____

blogs

Interactive media typically combine all of the following EXCEPT ____.

WiMAX

Many cities have adopted ____ technology to provide faster Internet speed to its users.

users are guaranteed the safety of their photos if the server goes down

Once uploaded to an online photo album site, which of the following is NOT true?

recognize

One challenge with speech recognition software is its ability to ____ words that sound the same but have different meaning.

redundancy

One goal of normalization is to minimize data _______

machine learning

One important artificial intelligence characteristic is when a device modifies its own behavior based on its ability to learn, also known as ____.

multiplayer

Playing online Scrabble with others on the Web at any given time is an example of a _____ gaming experience

calculating pay for thousands of employees

Robots are best at performing all of the following tasks EXCEPT _________

all of the above

SQL allows users to _____ a database.

an intelligent agent

Searching the Web for the best deal on an airline flight is a good example of ____ at work.

Internet fraud

Sites such as eBay are a popular target for ____.

human resources.

Solutions that deliver improved customer service and targeted marketing support all of the following areas of an enterprise EXCEPT ____.

freely tag friends in your photos.

Some netiquette rules to consider when using social media include all of the following EXCEPT _____.

a specific industry.

The B2B electronic exchange differs from global supply management in that it focuses on ____.

Automatically setting an interview day and time

The Web supports job searches by providing all of the following EXCEPT ______.

Global Positioning Device

The introduction of ______ on cell phones was the first step towards realizing augmented reality.

Ripping

The process of transferring music from CD to MP3 or another digital audio format is called ____ a CD.

quality control

The reason on-line content cannot always be trusted is the lack of ____ on the Web.

Domain name system

The system that translates the URL you type in a browser's address box into an IP address is the ______.

RFID

The use of ____ technology to identify items for inventory may someday replace today's bar code system

data mining

Using ____, businesses can analyze inventory and costs for more efficiency

KM

Using ____, employees can share their expertise in different areas of a company to build upon its success.

flowcharts

Using symbols, ____ show the logical relationships between system components.

a flash mob

Using technology to organize a gathering at a specific time and place is an example of _____.

the cost of development.

When deciding whether to update or build a new software program, one thing to consider is the cost of maintenance versus ____.

PATRIOT ACT

Which of the following is NOT a U.S. Privacy-Protective Law?

low expense in time and money

Which of the following is NOT a benefit of an ERP system?

Workstation

Which of the following is NOT a network device?

How should the RFP for the software application be written?

Which of the following is NOT a question posed during systems investigation?

It has become easier to create a reliable online business yourself than to hire a company to do it.

Which of the following is NOT a true statement about e-commerce technologies?

Reduce data integrity

Which of the following is NOT an advantage to using a DBMS?

Web sites that provide a secure connection start with httpx instead of http

Which of the following is NOT true?

Social security number

Which of the following is an example of a primary key for a database?

Take frequent breaks

Which of the following is the best way to avoid health problems when working with computers?

It forms networks automatically when two or more devices are within range

Which of the following is true about Bluetooth?

All of the above can be used

Which of the following security measures can be used to protect a database?

Maintenance

Which stage of the SDLC lasts the longest?

Alan Turing

Who proposed a test for intelligent behavior of machines that is considered to be the early work in artificial intelligence?

Modem

With the help of a _____, devices can send signals that allow them to connect to the Internet.

a data-entry error

You enter the wrong GPS position for the start point on a trip you are about to take; this is an example of ____.

Decrypting computer archives so the data they contain is unusable if the archive is lost or compromised

You have just secured a job with a new firm that is very security conscious. You've been instructed to learn as much as possible about encryption to ensure the confidentiality of customer transactions as well as electronic communications about new research and development projects. After researching this topic, you find that encryption can be used in all of the following ways EXCEPT ______.

Ubiquitous

____ computing has led us to an era where technology is so much a part of daily existence that it is no longer noticed.

Fiber-optic

____ is a popular cable type used as network backbone by major telecommunications companies

PayPal

____ is the best-known e-cash provider

User

____ permissions provide registered users with access to the files they need, while restricting access to private resources

Batch

_____ processing involves holding a group of transactions for processing until the end of a specified period of time.

Web authoring software

_____ provides tools specifically designed to enter and format Web page text, graphics, and links.

TCP/IP

________ is the primary protocol responsible for message transmission on the Internet.


Ensembles d'études connexes

Managing Business Systems Midterm

View Set

Topic 10: Activity-Based Costing

View Set

Introduction to Business Process: Chapter 2 Quiz

View Set

Ap Gov Chapter 6 Judiciary Study Guide

View Set