IT 104 Final Exam
One of the most widely used 3-D file formats for 3-D printers uses the _____ file name extension.
.stl
_____ is the use of printer-like technology to output three-dimensional objects using one of a variety of materials.
Additive Manufacturing
During the implementation phase of the software development life cycle (SDLC), the development team tests a(n) ______, which is a preliminary version of a software application.
Alpha Product
You can reduce reflection from your screen and thus improve readability by putting a(n) _____ on your monitor.
Antiglare filter
Small applications that can run on all types of computer operating systems are called
Applets
The goal of _____ is to develop computers that can perform functions normally reserved for humans, such as thinking, feeling, and learning from mistakes.
Artificial Intelligence
Suppose that a hacker gains access to a hospital's patient records and exposes confidential medical information. The negative e!ects on the hospital's reputation and patient relationships that result are examples of damage to which of the following?
Assets
People respond to audible cues about their surroundings without even thinking about them because of their _____ abilities.
Audio Perception
_____ is a high-level language that's friendlier and more natural than COBOL and FORTRAN.
BASIC
Rather than develop in-house analytics expertise, a company might use a(n) _____ provider and buy analysis tools and information.
Big Data as a Service (BDaaS)
In which of the following environments is RPG commonly used?
Business
Technologies such as online analytical processing (OLAP) systems can be used to generate information called _____, such as customer spending patterns and behavior.
Business Intelligence (BI)
The abbreviation B2C stands for which type of e-commerce?
Business to Consumer
Which of the following legacy programming languages is used chiefly for business applications by large institutions and companies?
COBOL
A company with a hybrid cloud can meet spikes in demand using a technique called _____, in which the private cloud handles the average workload and the public cloud resources come online automatically to handle the extra demand or activity.
Cloud Bursting
A(n) _____ contains information about an individual's lifestyle and buying habits—information that marketers can use to e"ectively target buyers and sell their goods on the internet.
Consumer profile
In a genetic algorithm, the use of a(n) _____ in the selection process means that the most successful mutations are mixed to produce a new generation of "offspring."
CrossOver
About half of all high school students have reported being victims of _____, according to the National Crime Prevention Council.
Cyberbullying
Text that's been encrypted and is therefore unreadable is called
CypherText
Microsoft Access includes a Compact & Repair database feature, as shown in this screen shot, to safeguard data and prevent
Data Corruption
Which of the following collects the body of metadata for the entire database?
Data Dictionary
Suppose that a manager wants to identify employees who have called in sick more than 10 days in the past year. Which of the following database management tools should he or she use to display only this data?
Data Filter
A system with high _____ provides more value to users than a system containing a large percentage of errors.
Data Integrity
Using which of the following techniques ensures that users enter correct and complete data into the system?
Data Integrity
Which of the following methods for dealing with big data involves finding patterns and relationships in order to apply an organizing structure?
Data Mining
Which of these terms refers to code that's "commented out," or marked with comments to notify the compiler to skip and ignore it?
Dead Code
A program that contains a(n) _____ statement, or point where different actions may be performed depending on specific conditions, will be more useful than one that simply follows a linear sequence of actions without variation.
Decision
The functional specification states exactly what the information system must accomplish, and the _____ specification spells out how these goals will be reached.
Design
Software _____ involves creating the higher-level software design and focusing on the broader planning and implementation steps for the system.
Development
Programmers that break a large problem into several small pieces and then work on them one at a time are using the _____ approach.
Divide and Conquer
Legislation passed in 2000 broadly defined a(n) _____ to include "electronic sound, symbol, or process."
Electronic Signature
When run by a program, a(n) _____ statement performs an action and then proceeds to the next statement in the sequence.
Executable
Sophisticated software that uses artificial intelligence techniques to model an expert's knowledge of a topics is called a(n)
Expert System
True or False: A systems contract enables users to contact the system vendor for additional technical support and training when maintenance needs exceed in-house capabilities.
FALSE
True or False: An OLAP cube structures data in a single dimension.
FALSE
True or False: In the worlds of business and technology, the term smart grid is used to refer to the merging of di"erent technologies and industries to form a newer, better product or process.
FALSE
In which of the following environments is FORTRAN still commonly used? Type: Multiple Choice
Factories and Laboratories
True or False: A database that combines relational and object-oriented database models is referred to as a combination database.
False
True or False: A worm is a malicious code string that attaches itself to an executable file so that the file becomes "infected."
False
True or False: Cloud apps run from the cloud and can be used to perform various tasks with files or data stored on your hard drive.
False
A single value, such as an address, is an example of a _____ in a database.
Field
A _____ cookie is created by the actual website a user visits.
First-Party
A well-designed _____, like the one shown in this screen shot, provides the user with questions or prompts.
Form
Performing a _____ wipes out everything on your device, returning the system to the exact state it was in when you got the device.
Hard Reset
Once a new information system has been designed and the plans approved, the project can move into the next stage, which is
Implementation
A(n) _____ system collects, stores, and processes data that people in organizations use to manage daily and long-term operations and to create and sell various types of products.
Information
_____ property includes just about anything that can be created by the human mind.
Intellectual
Which of the following statements does not describe graphene?
It can be injection molded into a variety of complex shapes.
Which of the following statements does not describe a fuzzy logic system?
It demands precise yes/no or numerical information.
Which of the following statements describes a power conditioner?
It handles power surges in the same way a surge suppressor does but can also power devices for a few minutes when a complete power outage occurs.
Which of the following statements describes a variable?
It's a data value stored in computer memory.
Which of the following statements does not describe an infinite loop?
It's part of the program but actually has no e"ect on how the program runs.
Which of the following converts general Java instructions into commands that a device or computer can understand?
Java virtual machine (JVM)
_____ manufacturing involves correlating the date and time of the manufacture and delivery of a certain product to a customer's request.
Just in Time (JIT)
_____ manufacturing involves correlating the date and time of the manufacture and delivery of a certain product to a customer's request.
Just-in-time (JIT)
Assembly language uses symbols and words to represent the elements of _____, making it possible for programmers to memorize them.
Machine Code
The IBM Watson supercomputer uses _____ to improve its performance in games of Jeopardy! played against humans.
Machine Learning
Which of the following technologies uses sensors mounted around the skull to read the di!erent types of waves or power spectrums the brain gives o!?
Mental Interface
Information about the structure, specifications, and purpose of each element in a database is described by the
MetaData
Random variations of algorithms are called
Mutations
A scripting language is a _____ language, meaning that it explains what the computer should do in English- like terms but not precisely how the computer should do it.
Nonprocedural
Customers can browse a(n) _____ to locate and purchase items online or download it and use it for o"ine shopping.
Online Catalog
A(n) _____ is a seller's website where customers can view and purchase products and services.
Online Store
Suppose the owner of a pet store wants to determine which brand of dog food has been the top seller over the day. Which type of system will provide this information?
Point of Sale (POS) system
A _____ doesn't usually damage hardware but can cause a temporary malfunction, resulting in memory storage errors that can make the operating system unexpectedly freeze up or restart.
Power Sag
Like most operating systems, Windows includes _____ features that enable you to place the computer in a low-power mode.
Power management
In _____, the user builds the query by selecting one or more tables to query, adding the fields to display in the results in a query grid, and then entering the entry to match or other criteria in applicable fields.
Query by Example (QBE)
A _____ code provides a signal to a consumer that he or she can find out more about a product or service available online.
Quick Response (QR)
_____ design is sometimes referred to as mobile-first design because the needs of mobile devices are at the forefront.
Responsive
Which of the following terms refers to a section of a program created to handle a specific group of instructions?
Routine
A mistake that occurs when an application is running is a _____ error.
Run-Time
_____ a file means making it available from your cloud storage for viewing, editing, and downloading by other designated users.
Sharing
When you shop at an e-tailer's site, you collect the items you want to buy in a virtual container called a(n
Shopping Cart
A(n) _____ operation is a loosely organized team allowed to pursue extreme innovation—often operating not only outside the corporate rulebook but also in a separate location away from the main corporate campus.
Skunkworks
A cover that attaches with magnets to the side of a tablet and can be easily removed and replaced is called a _____ cover.
Smart
Sensors such as power meters, voltage sensors, and fault detectors that gather data, along with digital communication capabilities that send the data to an operations center or other location, are examples of which type of technology?
Smart Grid
For a database that stores students' grades, which of the following fields could be designated as a primary key?
StudentID
Which device is basically an extension cord with multiple plugs on it but contains a metal oxide variable resistor that can absorb any excess power during a surge or spike, preventing it from reaching the plugged-in devices?
Surge Suppressor
A(n) _____ is a technical expert who can help plan and develop the various parts of the information system that interact with other processes.
Systems Engineer
True or False: A program can interrupt a looping pattern by using an if-then statement based on a particular action.
TRUE
True or False: A real-time system, such as an air tra!c control system, requires data with second-by- second accuracy,
TRUE
True or False: An automated clearinghouse (ACH) is a type of automated banking network for transferring funds electronically from one account to another.
TRUE
True or False: Depending on the type of business and customer needs, a company's supply chain may involve outside companies, such as a parts manufacturer or trucking company.
TRUE
True or False: Making sure that the records entered into tables remain consistent with the relationships between the tables involves checking for referential integrity.
TRUE
True or False: Normalization is the process of structuring a database to avoid redundancy and undesirable dependencies.
TRUE
True or False: Online banking involves using a web-enabled PC or mobile device.
TRUE
True or False: Plagiarism is using others' words and ideas without attributing the original creator(s) as the source.
TRUE
True or False: The quality of a virtual reality system is characterized in terms of its immersiveness.
TRUE
True or False: The term risk refers to the likelihood of a security breach of systems or data that obtains, damages, or destroys assets.
TRUE
True or False: Today, most organizations of all sizes use a computerized o!ce information system (OIS) to manage a variety of tasks.
TRUE
True or False: Users and companies weigh how much work it takes to back up their data against how much they would su!er if they lost their data when determining an appropriate backup frequency for their systems.
TRUE
True or False: Visualization as a Service (VaaS) involves hiring an expert to transform data into stunning visuals.
TRUE
Deciding to play computer games all night instead of sleeping enough to perform well at work or school is an example of the unwise choices made by someone with a(n)
Technology Addiction
Many companies today incorporate _____ systems that combine GPS, wireless communications features, and other technologies to plan more efficient shipping routes and monitor shipment locations.
Telematics
A(n) _____ is someone or something that can compromise or harm the assets of a business or individual.
Threat
True or False: Penetration testing entails trying to hack into a system so its vulnerabilities can be identified and fixed.
True
True or False: The gap between people who have access to computers and the internet and those who do not has been called the digital divide.
True
Depending on your cloud service, the _____ that's created might contain 25, 50, or more earlier versions of a file.
Version History
Most computers come with a basic one-year _____ against manufacturing defects for no additional charge.
Warranty
What is a testing harness?
a scripted set of tests that a program must pass before being considered ready for public release
What is a hologram?
an image that's generally created by splitting laser light and that appears as a full 3-D image, either still or in motion
Suppose that a hacker gains access to a hospital's patient records and exposes confidential medical information. The negative effects on the hospital's reputation and patient relationships that result are examples of damage to which of the following?
assets
The virtual first-down lines and other status lines you see on the field when watching a football game on TV are created with which of the following?
augmented reality (AR)
Public key encryption uses two encryption keys: a public encryption key, which all the _____ know, and a secret encryption key, which only the _____ know.
authorized users; sender and receiver
Having a _____ plan for the database management system (DBMS) will enable the recovery of lost data from a power interruption or equipment failure.
backup and recovery
Which of the following types of data processing takes place at a scheduled time or at a critical point in a process?
batch processing
During the testing phase of the software development life cycle (SDLC), a(n) _____ of the program is created for testing outside the development group, and the feedback that's received can be used to improve the product before it's released to the general public.
beta version
For a consensus network, which of the following is intended to provide the ability to track and verify every asset transaction for security purposes?
blockchain
The term _____ was originally coined by Grace Hopper, the inventor of COBOL, to refer to a computer error.
bug
Which of the following is not an example of cybercrime?
burglarizing a house and stealing TVs, computers, and other electronics
In _____, companies use the internet to conduct a wide range of routine business activities with other companies.
business-to-business (B2B) electronic commerce
For an end user, _____ means using a free or subscription service delivered over the internet.
cloud computing
Each cloud service provider (CSP) operates with a different _____, which is a combination of software and other solutions used to run the provider's services.
cloud management system
A(n) _____ operates one or more data centers, and organizations buy cloud capacity from it as needed.
cloud service provider (CSP)
The use of robots in an automobile manufacturing plant is an example of a(n) _____ system.
computer-aided manufacturing (CAM)
Suites of powerful applications designed specifically to help with project management, programming, user testing, and so on are referred to collectively as _____ tools.
computer-aided software engineering (CASE)
A _____ system offers much broader coverage than a computer-aided manufacturing (CAM) system.
computer-integrated manufacturing (CIM)
In a genetic algorithm, the use of a(n) _____ in the selection process means that the most successful mutations are mixed to produce a new generation of "offspring."
crossover
Which of the following methods can help reveal patterns and transitions that may be hard to see when reviewing numeric data alone?
data visualization
A person who plans and designs database systems is called a
database analyst
The problem of redundancy can be avoided in backing up data by using _____ software, which examines the files and doesn't back up identical copies of certain folders and files multiple times.
deduplication
Specifications that document the details of the software that programmers will write are produced during the _____ phase of the software development life cycle (SDLC).
design
Experts in _____ focus on delivering products and materials and use various distribution management systems to track orders, shipping, billing, and so on.
distribution logistics
The written notes that explain how a program works are referred to as
documentation
Shopping agents, live chat, and electronic payment systems are all examples of _____ tools.
electronic commerce (e-commerce)
The transfer of money over the internet is known as a(n)
electronic payment method (EPM).
To prevent people from spying on sensitive transactions, companies use data _____ to scramble information so it's unreadable before it's transmitted.
encryption
Records of mobile phone calls are an example of a(n) _____ in a database.
entity
Supply chain management (SCM) is responsible for which of the following?
establishing, running, and refining the supply chain
Once the plan for a new information system has been approved, two documents are created. The _____ specification, which is usually written first, states exactly what the system must accomplish.
functional
People who attempt to gain access to a computer system are known as
hackers
A(n) _____ enables the expert system to draw deductions from the rules in the knowledge base in response to user input.
inference engine
An alphanumeric check allows only _____ to be entered.
letters of the alphabet and digits
Related to perception, _____ deals with the science of moving a mobile robot through an environment.
locomotion
A _____ error occurs when a program's syntax is correct, but the program instructs the computer to perform an action incorrectly.
logic
Which form of e-commerce enables consumers to make online purchases using their smartphones, tablets, and other mobile devices?
mobile commerce (m-commerce)
Using a(n) _____ approach to programming serves the purpose of making the code reusable and also helps in tracking down the sources of errors.
modular
Cognitive computing, which is also called _____ computing, aims to mimic the functioning of the human brain through greater interconnectivity among memory, processors, and communications. Type: Multiple Choice
neurosynaptic
After an information system has been accepted and approved, _____ maintenance is performed to enhance the software to meet new requirements.
perfective
A _____ is a statement promising that a website will protect the confidentiality of any information a customer reveals
privacy policy
Programmers use a(n) _____ to create a program.
programming language
A collection of related fields that describe a single entity, such as a place or event, is called a
record
To restore lost data, the database administrator can do a _____ using the most recent backup, which typically contains the most recent and accurate data.
recoveryThe abbreviation B2C stands for which type of e-commerce?
If an address is stored in multiple data tables, it will need to be changed in all the tables if a customer moves. This is an example of which of the following?
redundancy
Within a company or business, _____ is the process of creating and commercializing new technologies and products for new markets.
research & development (R&D)
It may be appropriate for different assets to have different _____ levels and different types of security protection.
risk tolerance
Which of the following may be required to match the company's needs with the best technology solutions?
software engineering
A powerful form of power surge called a _____ can damage circuit boards in the computer, including the motherboard.
spike
A set of instructions that describes how to perform a task is referred to as a(n)
standard operating procedure (SOP)
The _____, or structure, of a programming language tends to be less complex than that of a human language.
syntax
Why does the IT sta! perform corrective maintenance on an information system?
to identify and fix errors
In a relational database, each record is called a(n)
tuple
A program with a single syntax error
won't work at all and will therefore be useless.