cs: ch 12-14
21.Once a Java application has been converted to bytecode, it can be run on any platform—such as Windows, UNIX, or Mac OS—as long as the PC being used includes the ____. a.Java Virtual Code c.Java applets b.Java Virtual Machine (Java VM) d.Java servlets
Java Virtual Machine (Java VM)
20.Java applications can be run using any operating system or Web browser that understands ____. a.Java bytecode c.Java servlets b.macros d.Java VM
Java bytecode
19. With ____, data is stored in single multidimensional database structures (sometimes called data cubes). a. Online Analytical Processing (OLAP) c. MOLAP (Multidimensional OLAP) b. ROLAP (Relational OLAP) d. HOLAP (Hybrid OLAP)
MOLAP (Multidimensional OLAP)
8. ____—sometimes called information reporting systems—evolved from transaction processing systems. a.Decision support systems (DSSs) b.Management information systems (MISs) c.Customer relationship management (CRM) systems d.Payroll systems
Management information systems (MISs)
10.The first official recorded use of the word bug in the context of computing is associated with the temporary failure of the ____ computer. a.Mark II c.UNIVAC b.ENIAC d.Apple II
Mark II
8. Some free or low-cost enterprise database software programs—such as the open source ____ program—are available. a. SQL c. DB2 b. Oracle d. MySQL
MySQL
9.New trends in programming such as Microsoft's ____ are helping to bridge different platforms and programming languages. a.Visual Basic c.NET framework b.ActiveX d.SQL
NET framework
4. The specific field in a table that is used to identify the records in that table and relate that table to other tables is called the ____. a. composite key c. primary key b. secondary key d. primary field
..primary key
22. Which of the following is the best certification option for James? a. CCP c. ACP b. CBIP d. CDMP
ACP
3.According to IBM, ____ has yielded significant benefits in the quality of the code and the speed with which programmers can write programs. a.SDLC c.PDLC b.OOP d.AOP
AOP
17.____ was designed as an easy-to-learn beginner's language that would work in a friendly, nonfrustrating programming environment. a.FORTRAN c.BASIC b.COBOL d.Java
BASIC
10. Specific types of ____ systems include just-in-time (JIT) systems and inventory management systems. a.CRM c.GIS b.ERP d.SCM
SCM
25.During the summer, Kelly will be writing a compiler as part of a research project. To prepare, she is learning ____, a functional language. a.C c.Visual Basic b.Java d.Scheme
Scheme
2. ____ spend a great deal of time on long-range planning and use information systems to make strategic decisions, although their decision making process tends to be fairly unstructured. a. Middle managers c. Supervisional managers b. Operational managers d. Executive managers
Executive managers
13.____ can be built from scratch or by using an expert system shell—a skeletal system that needs to be supplied with the expert knowledge and rules to be used in the system. a.Robots c.Intelligent agents b.Neural networks d.Expert systems
Expert systems
15.____ create the forms or screens used to input data into a program or database. a.Form generators c.Application generators b.Report generators d.Data generators
Form generators
6.The ____ provides a meeting point for several flowlines. a.connector symbol c.input/output symbol b.start/stop symbol d.processing symbol
connector symbol
7.A ____ is a pattern that controls when and how the instructions in a computer program are performed. a.selection control structure c.control structure b.sequence control structure d.repetition control structure
control structure
18.The objective of ____ is to gather information about the system under study to try to ascertain what resources users need to better perform their jobs. a.data design c.data collection b.data processing d.data analysis
data collection
21.A(n) ____ is used to describe the characteristics of data used in a database or other type of computer system. a.system flowchart c.data dictionary b.input/output design d.preliminary design
data dictionary
23.For the genomics division, Mother Goose is planning to replace the old system by the new one all at once. This is called a ____ conversion. a.phased c.parallel b.direct d.pilot
direct
3. To help store, organize, and retrieve documents once they have been created in or converted to an electronic format, ____ systems can be used. a.transaction processing c.document management b.document processing d.office automation
document management
18. The key characteristics for an OODBMS (including objects, attributes, methods, ____, polymorphism, classes, and inheritance) are similar to object-oriented programming principles. a. migration c. conversion b. adequation d. encapsulation
encapsulation
12.Rather than creating a complete object module for a program, a(n) ____ reads, translates, and executes the source program one line at a time. a.compiler c.assembler b.interpreter d.generator
interpreter
14.Programmers often use temporary dummy print statements—print statements that are temporarily inserted into the code—to help locate a ____. a.syntax error c.compile-time error b.rules error d.logic error
logic error
17. Continuing to evaluate and improve the security measured used with the database is a database ____ activity. a. programming c. implementation b. design d. maintenance
maintenance
7.A(n) ____ provides regular, routine, and timely information to decision makers. a.transaction processing system b.office system c.general ledger system d.management information system (MIS)
management information system (MIS)
2.OOP focuses on an application's data and the ____ or processes that can be used to manipulate that data a.variables c.methods b.subprograms d.functions
methods
Managers are usually classified into three categories: executive, ____, and operational. a. development c.middle b. strategic d. decision
middle
20. Web-based database requests are received by the Web server, which then converts the request into a database query and passes it on to the database server with the help of software called ____. a. middleware c. macros b. capsules d. applets
middleware
14. The process of evaluating and correcting the structures of the tables in a database to minimize data redundancy is called ____. a. normalization c. zeroing b. cyclic redundancy check d. zonification
normalization
19.Class diagrams and use case models are used to analyze and model ____ systems. a.procedural c.entity-related b.functional d.object-oriented
object-oriented
1. Two of the most significant approaches to programming are procedural programming and ____. a. aspect-oriented programming c. function programming b. object-oriented programming d. virtual programming
object-oriented programming
5.Two specific types of ____ are e-commerce systems and point-of-sale (POS) systems. a.order entry systems c.office systems b.accounting systems d.document processing systems
order entry systems
24.For the protein folding division, Mother Goose is planning to implement the new system module by module. This is called a ____ conversion. a.phased c.parallel b.direct d.pilot
phased
6. A ____ is required to access data in a hierarchical database. a. user c. systems analyst b. programmer d. systems programmer
programmer
1. Most DBMSs come bundled with a set of tools to perform a variety of necessary tasks, such as building user interfaces, creating forms and reports, and interfacing with query languages and ____ for complex applications. a. query wizards c. report generators b. programming languages d. form screens
programming languages
2. A ____ is a collection of related fields. a. table c. column b. field d. record
record
24. The JL Group has gathered data on voting habits. In order to make sure that respondents cannot claim to have voted in more elections than is possible given their age, ____ rules can be assigned to the database tables. a. index validation c. DBA validation b. record validation d. dynamic
record validation
13. The ____ is the most widely used database model today. a. hierarchical database management system b. relational database management system (RDBMS) c. network database management system d. database management system (DBMS)
relational database management system (RDBMS)
16. The figure above illustrates a formatted ____, created from data contained in a database. a. report c. form b. query d. table
report
22.The ____ contains a list of technical specifications for equipment, software, and services determined during the system design phase and requests that vendors propose products that meet those specifications. a.benchmark test c.request for quotation (RFQ) b.request for proposal (RFP) d.data dictionary
request for proposal (RFP)
3. A record is a collection of fields, either a specific ____ from a single table or a collection of related fields from multiple tables. a. keyword c. column b. index d. row
row
8.A ____ is simply a series of statements that follow one another. After the first statement has been carried out completely, the program control moves to the next statement. a.selection control structure c.control structure b.sequence control structure d.repetition control structure
sequence control structure
13.A(n) ____ occurs when the programmer has not followed the proper rules of the programming language being used. a.logic error c.syntax error b.assembly error d.coding error
syntax error
15. A ____ is responsible for maintaining a large, multiuser system. a.software engineer c.vice president of information systems b.system administrator d.programmer/analyst
system administrator
16. Each phase of the ____ produces some type of documentation to pass on to the next phase. a.system analysis c.system implementation b.system development life cycle d.system acquisition
system development life cycle
16.Fourth-generation languages (4GLs) are also sometimes called ____. a.procedural programming languages c.high-level languages b.very-high-level languages d.interpreted languages
very-high-level languages
15. To create a query, users can either type a query using SQL or, more commonly, use the query tools built into the DBMS (such as a query design screen or query ____) to more easily build a query. a. command c. wizard b. line d. key
wizard
18.The figure above shows the programming environment for ____. To test the code, choose Build. Any errors will appear in the Error window at the bottom of the program window. To run the program, click Debug. a.Visual Basic c.C b.C# d.Java
Visual Basic
25.Mary is interested in identifying the business needs of a system and ensuring the systems meet those needs. Her advisor will probably tell her to look into becoming a ____. a.database analyst c.communications analyst b.business analyst d.computer operator
business analyst
12. With a ____, a database is located in its entirety on a single computer, such as a server or mainframe computer. a. distributed database system c. centralized database system b. star database system d. ring database system
centralized database system
14.A company's ____ has primary responsibility for system development. a.chief executive officer (CEO) c.chief information officer (CIO) b.chief security officer (CSO) d.chief data officer (CDO)
chief information officer (CIO)
24.To allow everyone, not just the original programmer, to understand the source code of a program, the Rainbow Trout Company follows a set of ____—a list of rules designed to standardize programming styles. a.UMLs c.RADs b.flowcharts d.coding standards
coding standards
4.The various types of communications systems in place in many organizations include e-mail, messaging, online conferencing, ____, and telecommuting. a.point-of-sale (POS) systems c.fingerprint payment systems b.collaborative (workgroup) computing d.geographic information system (GIS)
collaborative (workgroup) computing
10. In ____, the table field involved in the changes is locked until the changes to that field have been completed. a. column-level locking c. row-level locking b. database locking d. record-level locking
column-level locking
11.A(n) ____ is designed for a specific programming language and translates programs written in that language into machine language so it can be executed. a.compiler c.generator b.macro d.decoder
compiler
6.____ refer to the variety of systems in place to record the details of financial transactions, such as payments and purchases. a.Accounting systems c.Order entry systems b.Payroll systems d.Transaction processing systems
Accounting systems
19.____ is a high-level structured programming language that has the executional efficiency of an assembly language. a.Visual Basic c.COBOL b.C d.Basic
C
22.Java is currently one of the most popular programming languages and has replaced ____ as the programming language used for the computer science Advanced Placement exam taken by high school students to earn college credit. a.C++ c.BASIC b.Visual Basic d.C
C++
11.____ refers to the use of computers to help manage manufacturing operations and control machinery used in those processes. a.Computer-aided manufacturing (CAM)c.Enterprise architecture b.Computer-aided design (CAD) d.Product lifecycle management (PLM)
Computer-aided manufacturing (CAM)
9. When information from an ERP or other type of internal system is exchanged between different applications (either within an organization or between organizations), it is called ____. a.ERP2 c.CRM b.EDI d.EAI
EAI
25. The JL Group is in the process of creating dynamic Web pages to poll politically aware young adults. They are interested in creating scripts that are compatible with many types of databases, so they are using the ____ language. a. CGI c. COBOL b. API d. PHP
PHP
21. ____ has the advantage of high compatibility with many types of databases. It is also an open-source program, available free to all users. a. JavaScript c. CGI (common gateway interface) b. PHP (PHP Hypertext Preprocessor) d. API (application program interface)
PHP (PHP Hypertext Preprocessor)
17____ is the phase of system development in which the problem area is studied in depth and the needs of system users are assessed. a.Preliminary investigation c.System analysis b.System design d.System acquisition
System analysis
20.____ focuses on specifying what the new system will look like and how it will work. a.System analysis c.System implementation b.System acquisition d.System design
System design
4.In the program design step of the PDLC, the specifications developed during the problem analysis step are used to develop a(n) ____ for the program. a.flowchart c.algorithm b.object d.module
algorithm
23. James is most interested in becoming a database designer. Another name for this career choice is database ____. a. architect c. programmer b. developer d. administrator
architect
12. When computer systems perform in ways that would be considered intelligent if observed in humans, it is commonly referred to as ____. a.artificial intelligence (AI) c.computer-aided manufacturing (CAM) b.computer-aided design (CAD) d.neural networks
artificial intelligence (AI)
23.Because their projects have rapidly changing characteristics, the programmers at the Rainbow Trout Company often use the ____ (XP) approach. a.expert programming c.extreme programming b.experienced programmers d.extra programmers
extreme programming
9. Data definition involves describing the properties of the data that go into each database table, specifically the ____ or columns that make up the database. a. records c. fields b. rows d. characters
fields
7. Individual database tables are often referred to as ____. a. low files c. flat files b. base files d. clear files
flat files
5.Program ____ use graphic symbols and relational operators, such as < for "less than" and = for "equal to," to graphically portray the sequence of steps involved in a program. a.structure charts c.pseudocode b.flowcharts d.models
flowcharts
11. In a typical client-server database application, the client is called the ____. a. back end c. portal b. rear end d. front end
front end
5. Virtually all DBMSs include a ____ for easy data input and data access. a. user interface c. command interface b. line interface d. device interface
user interface