cs: ch 12-14

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

21.Once a Java application has been converted to bytecode, it can be run on any platform—such as Windows, UNIX, or Mac OS—as long as the PC being used includes the ____. a.Java Virtual Code c.Java applets b.Java Virtual Machine (Java VM) d.Java servlets

Java Virtual Machine (Java VM)

20.Java applications can be run using any operating system or Web browser that understands ____. a.Java bytecode c.Java servlets b.macros d.Java VM

Java bytecode

19. With ____, data is stored in single multidimensional database structures (sometimes called data cubes). a. Online Analytical Processing (OLAP) c. MOLAP (Multidimensional OLAP) b. ROLAP (Relational OLAP) d. HOLAP (Hybrid OLAP)

MOLAP (Multidimensional OLAP)

8. ____—sometimes called information reporting systems—evolved from transaction processing systems. a.Decision support systems (DSSs) b.Management information systems (MISs) c.Customer relationship management (CRM) systems d.Payroll systems

Management information systems (MISs)

10.The first official recorded use of the word bug in the context of computing is associated with the temporary failure of the ____ computer. a.Mark II c.UNIVAC b.ENIAC d.Apple II

Mark II

8. Some free or low-cost enterprise database software programs—such as the open source ____ program—are available. a. SQL c. DB2 b. Oracle d. MySQL

MySQL

9.New trends in programming such as Microsoft's ____ are helping to bridge different platforms and programming languages. a.Visual Basic c.NET framework b.ActiveX d.SQL

NET framework

4. The specific field in a table that is used to identify the records in that table and relate that table to other tables is called the ____. a. composite key c. primary key b. secondary key d. primary field

..primary key

22. Which of the following is the best certification option for James? a. CCP c. ACP b. CBIP d. CDMP

ACP

3.According to IBM, ____ has yielded significant benefits in the quality of the code and the speed with which programmers can write programs. a.SDLC c.PDLC b.OOP d.AOP

AOP

17.____ was designed as an easy-to-learn beginner's language that would work in a friendly, nonfrustrating programming environment. a.FORTRAN c.BASIC b.COBOL d.Java

BASIC

10. Specific types of ____ systems include just-in-time (JIT) systems and inventory management systems. a.CRM c.GIS b.ERP d.SCM

SCM

25.During the summer, Kelly will be writing a compiler as part of a research project. To prepare, she is learning ____, a functional language. a.C c.Visual Basic b.Java d.Scheme

Scheme

2. ____ spend a great deal of time on long-range planning and use information systems to make strategic decisions, although their decision making process tends to be fairly unstructured. a. Middle managers c. Supervisional managers b. Operational managers d. Executive managers

Executive managers

13.____ can be built from scratch or by using an expert system shell—a skeletal system that needs to be supplied with the expert knowledge and rules to be used in the system. a.Robots c.Intelligent agents b.Neural networks d.Expert systems

Expert systems

15.____ create the forms or screens used to input data into a program or database. a.Form generators c.Application generators b.Report generators d.Data generators

Form generators

6.The ____ provides a meeting point for several flowlines. a.connector symbol c.input/output symbol b.start/stop symbol d.processing symbol

connector symbol

7.A ____ is a pattern that controls when and how the instructions in a computer program are performed. a.selection control structure c.control structure b.sequence control structure d.repetition control structure

control structure

18.The objective of ____ is to gather information about the system under study to try to ascertain what resources users need to better perform their jobs. a.data design c.data collection b.data processing d.data analysis

data collection

21.A(n) ____ is used to describe the characteristics of data used in a database or other type of computer system. a.system flowchart c.data dictionary b.input/output design d.preliminary design

data dictionary

23.For the genomics division, Mother Goose is planning to replace the old system by the new one all at once. This is called a ____ conversion. a.phased c.parallel b.direct d.pilot

direct

3. To help store, organize, and retrieve documents once they have been created in or converted to an electronic format, ____ systems can be used. a.transaction processing c.document management b.document processing d.office automation

document management

18. The key characteristics for an OODBMS (including objects, attributes, methods, ____, polymorphism, classes, and inheritance) are similar to object-oriented programming principles. a. migration c. conversion b. adequation d. encapsulation

encapsulation

12.Rather than creating a complete object module for a program, a(n) ____ reads, translates, and executes the source program one line at a time. a.compiler c.assembler b.interpreter d.generator

interpreter

14.Programmers often use temporary dummy print statements—print statements that are temporarily inserted into the code—to help locate a ____. a.syntax error c.compile-time error b.rules error d.logic error

logic error

17. Continuing to evaluate and improve the security measured used with the database is a database ____ activity. a. programming c. implementation b. design d. maintenance

maintenance

7.A(n) ____ provides regular, routine, and timely information to decision makers. a.transaction processing system b.office system c.general ledger system d.management information system (MIS)

management information system (MIS)

2.OOP focuses on an application's data and the ____ or processes that can be used to manipulate that data a.variables c.methods b.subprograms d.functions

methods

Managers are usually classified into three categories: executive, ____, and operational. a. development c.middle b. strategic d. decision

middle

20. Web-based database requests are received by the Web server, which then converts the request into a database query and passes it on to the database server with the help of software called ____. a. middleware c. macros b. capsules d. applets

middleware

14. The process of evaluating and correcting the structures of the tables in a database to minimize data redundancy is called ____. a. normalization c. zeroing b. cyclic redundancy check d. zonification

normalization

19.Class diagrams and use case models are used to analyze and model ____ systems. a.procedural c.entity-related b.functional d.object-oriented

object-oriented

1. Two of the most significant approaches to programming are procedural programming and ____. a. aspect-oriented programming c. function programming b. object-oriented programming d. virtual programming

object-oriented programming

5.Two specific types of ____ are e-commerce systems and point-of-sale (POS) systems. a.order entry systems c.office systems b.accounting systems d.document processing systems

order entry systems

24.For the protein folding division, Mother Goose is planning to implement the new system module by module. This is called a ____ conversion. a.phased c.parallel b.direct d.pilot

phased

6. A ____ is required to access data in a hierarchical database. a. user c. systems analyst b. programmer d. systems programmer

programmer

1. Most DBMSs come bundled with a set of tools to perform a variety of necessary tasks, such as building user interfaces, creating forms and reports, and interfacing with query languages and ____ for complex applications. a. query wizards c. report generators b. programming languages d. form screens

programming languages

2. A ____ is a collection of related fields. a. table c. column b. field d. record

record

24. The JL Group has gathered data on voting habits. In order to make sure that respondents cannot claim to have voted in more elections than is possible given their age, ____ rules can be assigned to the database tables. a. index validation c. DBA validation b. record validation d. dynamic

record validation

13. The ____ is the most widely used database model today. a. hierarchical database management system b. relational database management system (RDBMS) c. network database management system d. database management system (DBMS)

relational database management system (RDBMS)

16. The figure above illustrates a formatted ____, created from data contained in a database. a. report c. form b. query d. table

report

22.The ____ contains a list of technical specifications for equipment, software, and services determined during the system design phase and requests that vendors propose products that meet those specifications. a.benchmark test c.request for quotation (RFQ) b.request for proposal (RFP) d.data dictionary

request for proposal (RFP)

3. A record is a collection of fields, either a specific ____ from a single table or a collection of related fields from multiple tables. a. keyword c. column b. index d. row

row

8.A ____ is simply a series of statements that follow one another. After the first statement has been carried out completely, the program control moves to the next statement. a.selection control structure c.control structure b.sequence control structure d.repetition control structure

sequence control structure

13.A(n) ____ occurs when the programmer has not followed the proper rules of the programming language being used. a.logic error c.syntax error b.assembly error d.coding error

syntax error

15. A ____ is responsible for maintaining a large, multiuser system. a.software engineer c.vice president of information systems b.system administrator d.programmer/analyst

system administrator

16. Each phase of the ____ produces some type of documentation to pass on to the next phase. a.system analysis c.system implementation b.system development life cycle d.system acquisition

system development life cycle

16.Fourth-generation languages (4GLs) are also sometimes called ____. a.procedural programming languages c.high-level languages b.very-high-level languages d.interpreted languages

very-high-level languages

15. To create a query, users can either type a query using SQL or, more commonly, use the query tools built into the DBMS (such as a query design screen or query ____) to more easily build a query. a. command c. wizard b. line d. key

wizard

18.The figure above shows the programming environment for ____. To test the code, choose Build. Any errors will appear in the Error window at the bottom of the program window. To run the program, click Debug. a.Visual Basic c.C b.C# d.Java

Visual Basic

25.Mary is interested in identifying the business needs of a system and ensuring the systems meet those needs. Her advisor will probably tell her to look into becoming a ____. a.database analyst c.communications analyst b.business analyst d.computer operator

business analyst

12. With a ____, a database is located in its entirety on a single computer, such as a server or mainframe computer. a. distributed database system c. centralized database system b. star database system d. ring database system

centralized database system

14.A company's ____ has primary responsibility for system development. a.chief executive officer (CEO) c.chief information officer (CIO) b.chief security officer (CSO) d.chief data officer (CDO)

chief information officer (CIO)

24.To allow everyone, not just the original programmer, to understand the source code of a program, the Rainbow Trout Company follows a set of ____—a list of rules designed to standardize programming styles. a.UMLs c.RADs b.flowcharts d.coding standards

coding standards

4.The various types of communications systems in place in many organizations include e-mail, messaging, online conferencing, ____, and telecommuting. a.point-of-sale (POS) systems c.fingerprint payment systems b.collaborative (workgroup) computing d.geographic information system (GIS)

collaborative (workgroup) computing

10. In ____, the table field involved in the changes is locked until the changes to that field have been completed. a. column-level locking c. row-level locking b. database locking d. record-level locking

column-level locking

11.A(n) ____ is designed for a specific programming language and translates programs written in that language into machine language so it can be executed. a.compiler c.generator b.macro d.decoder

compiler

6.____ refer to the variety of systems in place to record the details of financial transactions, such as payments and purchases. a.Accounting systems c.Order entry systems b.Payroll systems d.Transaction processing systems

Accounting systems

19.____ is a high-level structured programming language that has the executional efficiency of an assembly language. a.Visual Basic c.COBOL b.C d.Basic

C

22.Java is currently one of the most popular programming languages and has replaced ____ as the programming language used for the computer science Advanced Placement exam taken by high school students to earn college credit. a.C++ c.BASIC b.Visual Basic d.C

C++

11.____ refers to the use of computers to help manage manufacturing operations and control machinery used in those processes. a.Computer-aided manufacturing (CAM)c.Enterprise architecture b.Computer-aided design (CAD) d.Product lifecycle management (PLM)

Computer-aided manufacturing (CAM)

9. When information from an ERP or other type of internal system is exchanged between different applications (either within an organization or between organizations), it is called ____. a.ERP2 c.CRM b.EDI d.EAI

EAI

25. The JL Group is in the process of creating dynamic Web pages to poll politically aware young adults. They are interested in creating scripts that are compatible with many types of databases, so they are using the ____ language. a. CGI c. COBOL b. API d. PHP

PHP

21. ____ has the advantage of high compatibility with many types of databases. It is also an open-source program, available free to all users. a. JavaScript c. CGI (common gateway interface) b. PHP (PHP Hypertext Preprocessor) d. API (application program interface)

PHP (PHP Hypertext Preprocessor)

17____ is the phase of system development in which the problem area is studied in depth and the needs of system users are assessed. a.Preliminary investigation c.System analysis b.System design d.System acquisition

System analysis

20.____ focuses on specifying what the new system will look like and how it will work. a.System analysis c.System implementation b.System acquisition d.System design

System design

4.In the program design step of the PDLC, the specifications developed during the problem analysis step are used to develop a(n) ____ for the program. a.flowchart c.algorithm b.object d.module

algorithm

23. James is most interested in becoming a database designer. Another name for this career choice is database ____. a. architect c. programmer b. developer d. administrator

architect

12. When computer systems perform in ways that would be considered intelligent if observed in humans, it is commonly referred to as ____. a.artificial intelligence (AI) c.computer-aided manufacturing (CAM) b.computer-aided design (CAD) d.neural networks

artificial intelligence (AI)

23.Because their projects have rapidly changing characteristics, the programmers at the Rainbow Trout Company often use the ____ (XP) approach. a.expert programming c.extreme programming b.experienced programmers d.extra programmers

extreme programming

9. Data definition involves describing the properties of the data that go into each database table, specifically the ____ or columns that make up the database. a. records c. fields b. rows d. characters

fields

7. Individual database tables are often referred to as ____. a. low files c. flat files b. base files d. clear files

flat files

5.Program ____ use graphic symbols and relational operators, such as < for "less than" and = for "equal to," to graphically portray the sequence of steps involved in a program. a.structure charts c.pseudocode b.flowcharts d.models

flowcharts

11. In a typical client-server database application, the client is called the ____. a. back end c. portal b. rear end d. front end

front end

5. Virtually all DBMSs include a ____ for easy data input and data access. a. user interface c. command interface b. line interface d. device interface

user interface


Ensembles d'études connexes

TEXTBOOK: Ch. 5: Analyzing the Industry and Market

View Set

Vocabulary Workshop Level E Unit 8 - Synonyms and antonyms

View Set

Vocabulary Workshop Level C Unit 6 sentences

View Set

Ch 7 on-the-job training methods

View Set

Adult, Child, and Baby First Aid/ CPR/ AED: Choking

View Set

web development unit quiz & test

View Set