BSAT 303
service-oriented
A _____ architecture is a software architecture perspective that focuses on the development, use, and reuse of small self-contained blocks of code to meet all the application software needs of an organization.
Web log
A _____ consists of one line of information for every visitor to a Web site and is usually stored on a Web server.
data dictionary
A _____ contains the logical structure for the information in a database.
digital dashboard
A _____ displays key information gathered from several sources on a computer screen in a format tailored to the needs and wants of an individual knowledge worker.
database
A _____ is a collection of information that you organize and access according to the logical structure of that information.
hardware key logger
A _____ is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.
cookie
A _____ is a small file that contains information about you and your Web activities, which a Web site you visit places on your computer.
data mart
A _____ is a subset of a data warehouse in which only a focused portion of the data warehouse information is kept.
worm
A _____ is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic.
CTO (chief technology officer)
A _____ is primarily responsible for overseeing both the underlying IT infrastructure within an organization and the user-facing technologies (such as CRM systems).
Smartphone
A _____ is really a mobile phone integrated into a handheld computer.
clickstream
A _____ records information about you during a Web surfing session such as what Web sites you visited, how long you were there, what ads you looked at, and what you bought.
the logical structure for the information in a database.
A data dictionary contains:
is used to convince people of the worth of a proposed system.
A selling prototype:
waterfall methodology
A sequential, activity-based process in which one phase of the SDLC is followed by another, from planning through implementation is known as the _____.
Web page
A specific portion of a clothing Web site deals with winter wear. This particular portion of the Web Site is known as a ____.
structured
A(n) _____ decision involves processing a certain kind of information in a specified way so that you will always get the right answer.
HTML document
A(n) _____ is a file that contains your Web site content and HTML formatting instructions.
intersection relationship
A(n) _____ is a relation you create to eliminate a many-to-many relationship.
neural network
A(n) _____ is an artificial intelligence system that is capable of finding and differentiating patterns.
genetic algorithm
A(n) _____ is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem.
firewall
A(n) _____ is hardware and/or software that protects a computer or network from intruders.
computer virus
A(n) _____ is software that is written with malicious intent to cause annoyance or damage.
data-mining agent
A(n) _____ operates in a data warehouse discovering information.
expert
A(n) _____ system, also called a knowledge-based system, is an artificial intelligence system that applies reasoning capabilities to reach a conclusion.
it is software you don't want hidden inside software you do want.
Adware is a type of Trojan horse software, meaning that:
search engine optimization
An important subset of Web analytics is _____, which improves the visibility of a Web site through the use of tags and key terms found by search engines.
a relation you create to eliminate a many-to-many relationship.
An intersection relation is:
enforce referential integrity
As a general rule, when establishing relationships between a primary and foreign key, you should turn on _____ to protect your database from inconsistent data.
open-source
B-Quant, a double-entry bookkeeping software, is created and maintained by a distributed network of engineers, software developers, and users, each making contributions to the source code that is publicly available and free of charge. B-Quant is an example of _____ software.
<li>
Before each item in a list, what tag would you need?
Biometric Scanners
BioNext, a genomics research facility, uses scanners that are used to scan some human physical attributes like fingerprints or irises for security purposes. BioNext is using ____.
integrity constraints
By defining the logical structure of information in a relational database, you're also developing _____, which are rules that help ensure the quality of the information.
foreign primary
By turning on the enforcement of referential integrity option, your DBMS will make sure that when you enter a _____ key in a relation it matches one of the _____ keys in the other relation.
.edu
Carl Hoffman Business School is an academic institution. Which of the following TLDs is applicable for its Web site address? Refer: Figure B.3
recurring
Deciding how much inventory to carry and deciding at what price to sell the inventory are examples of _____ decisions.
clustering
Discovering groups of entities (like customers) that are in some way or another "similar," without using any a priori and known structures is known as _____.
maintenance
During the _____ phase of the SDLC, you monitor and support the new system to ensure it continues to meet the business goals.
loading
ETL is a three-step process that includes extraction, transformation, and _____.
populating
Entering information into an Access table is referred to as _____ it.
user interface management
For Excel, the _____ component includes things like buttons, menu options, formulas and functions, your ability to enter information into cells, and even your ability to manipulate a table by switching the row and column orientations.
255 characters
For text fields, which of the following is the default field size?
specify the content and format of your Web site.
HTML allows you to:
foreign
If a student's ID was also present in a relation that stored enrollment information, this field in the enrollment relation would be called a(n) _____ key.
Query-by-example
If you needed to identify inventory items whose stock was running low, which Access tool could help you find the answer?
Use the <br> tag
If you want to align your image to the right of the screen and do not want your text to appear to the left of it, what would you need to do?
Height and width
If you want to change the size of your image, what parameters(s) should you use?
Graphics
If you want to edit photos and remove "red eye" from them, you would choose the _____ category of personal productivity software.
<ol>
If you want to start a numbered list, what tag would you use in your Web document?
datasheet view
In Access, a report can be created using either Design View or the ____.
table
In a database management system, the word relation is also called a(n) _____ or file.
primary key
In a relational database, a _____ is a field, or group of fields in some cases, that uniquely describes each record.
foreign
In a relational database, a _____ key is a primary key of one file that appears in another file.
web browsers
Internet Explorer, Netscape, and Firefox are examples of ____.
Web site
KeepFit is a manufacturer of sports merchandise. You can visit a specific location on the Web and order merchandise from KeepFit. This specific location is KeepFit's ____.
.net
Margaret Sullivan is a TLD expert and a domain name consultant. Which of the following domains is she likely to suggest to her clients who want to start Internet companies?
generation
Microsoft Access's application _____ subsystem is used to create reports and input forms.
social networking site
Milieu is a Web site that allows you to post personal information about yourself, create a network, and share content photos and videos. Milieu is an example of a(n) ____.
slice and dice
Multidimensional analysis (MDA) tools are _____ techniques that allow you to view multidimensional information from different perspectives.
random access memory
On investigating a technical fault in his computer, Max finds out that a temporary holding area of information is affected and needs to be changed. Max needs to change the _____ of his computer.
Create the data dictionary
Once the structure of the database has been created, what is the next step?
supercomputers
Organizations such as NASA and the National Weather Service that are heavily involved in research and "number crunching" and require computers with high processing speed, are most likely to employ which of the following computers?
TCP/IP
Ralph, an Internet user, frequently downloads screensavers from the Web. In downloading the files from an ftp server, Ralph uses both ftp and ____.
Boolean operator
Ramona wants information about Golden Eagle Resorts in Utah on the Web. However, she wants to exclude results containing golden eagles (birds) found in Utah. She can use a _____ to refine her search.
Image Scanner
Sebastian, a student of digital art, is planning to buy a scanner that can capture images, photos, text, and artwork that already exist on paper. Which of the following types of scanners satisfies Sebastian's requirements?
multifunction printer
Simon is planning to buy an output device for his home that can scan, copy, fax, and print. Which of the following devices best satisfies Simon's requirement?
web 2.0
Social networking sites like Facebook are examples of the dynamic application of ____.
Presentation
Stefanie is preparing for a class lecture that requires her to create and edit information that will appear in electronic slides. Which of the following categories of personal productivity software is best suited to Stefanie's needs?
/ol,li
The <_____> tag ends the numbered list, and you use the <_____> tag for each item in the list.
extreme programming methodology
The _____ breaks a project into tiny phases and developers cannot continue on to the next phase until the current phase is complete.
data management
The _____ component of a decision support system (DSS) performs the functions of storing and maintaining information and also that of giving you access to information you want your DSS to use.
model management
The _____ component of a decision support system consists of a wide variety of statistical and analytical tools, techniques, and models.
technical architecture
The _____ defines the hardware, software, and telecommunications equipment required to run the system.
agile
The _____ methodology, a form of XP, aims for customer satisfaction through early and continuous delivery of useful software components.
data definition subsystem
The _____ of a DBMS helps you create and maintain the data dictionary and define the structure of the files in a database.
logical
The _____ view of information focuses on how a knowledge worker needs to arrange and access information to meet her/his particular business needs.
Maintenance
The activity of providing an environment to support system changes is part of which of the following SDLC phases?
Database Management Systems
The competitive advantage for many people seeking employment is knowledge in which of the following software packages?
biomimicry
The concept of learning from ecosystems and adapting their characteristics to human and organizational situations is called _____.
helps you add, change, and delete information in a database.
The data manipulation subsystem of a DBMS:
Arabic
The default numbering for numbered lists is ____.
hypercube
The multidimensional representation of information in a data warehouse is referred to as a _____.
Set the project scope
The planning phase of SDLC involves which of the following activities?
composite primary key
The primary key fields from the two original relations become foreign keys in the intersection relation. When combined, the two foreign keys make up the _____ for the intersection relation.
two dimensional table
The term relation, in relational database, often describes each _____ in the relational model.
bold
The three most commonly used basic HTML formatting tags are ____, underline, and italics.
Data sheet View Design View
There are two main ways to create the data dictionary for e relation: in ______; and in ____.
Design View
To change the structure of a relation (table or file), what needs to be open in Microsoft Access?
bodybackground
To use an image and create a textured background, you use the <_____> tag.
tests individual pieces of code for a system.
Unit testing:
Underline, bold, and italics
What are the three most commonly used basic HTML formatting tags?
.htm and .html
What file extension(s) can you use for your Web documents?
A specific portion of a Web site that deals with a certain topic
What is a Web page?
It is a point on the Internet where several connections converge.
What is a network access point?
Defining entity classes and primary keys
What is the first step in designing and building a database?
A report is designed for human consumption
What is the fundamental difference between tables (or queries) and reports?
Relational database
What is the most popular type of database?
<font color>
What tag would you use in your HTML document to change the color of your text?
<body background = "filename.extension">
What tag would you use to add a textured background to your Web site?
Radio Waves
What type of transmission does WiFi use?
Further grouping
When generating a report, _____ lets you specify groups within the top grouping
truncated
When viewing a report where information in a field has been cut off, it is said to be ____.
Web browser software
When you are using a software that allows you to surf the Web, you are using a(n) ____.
M:1
When you drag and drop a foreign key onto a primary key, what does Microsoft Access assumes the relationship is?
As a separate file in your Web space
Where should an image be stored before it appears in your Web site?
USB port
Which of the following allows you to connect as many as 127 devices to a single port on your computer?
Plotter
Which of the following creates the output by moving a pen across the surface of a piece of paper?
Project plan
Which of the following defines the what, when, and who questions of systems development including all activities to be performed, the individuals, or resources, who will perform the activities, and the time required to complete each activity?
Web browser software
Which of the following enables you to surf the Web?
Whaling
Which of the following fraudulent techniques targets senior business executives, government leaders, and other types of high-profile individuals?
Microsoft Access
Which of the following helps you develop databases and use the information stored in them?
Search engine
Which of the following helps you find Web sites with the information you want?
E-R diagram
Which of the following is a graphic method of representing entity classes and their relationships?
Composite primary key
Which of the following is a key that consists of the primary key fields from two intersecting relations (files)?
Data warehouse
Which of the following is a logical collection of information, gathered from many different operational databases, used to create business intelligence that supports business analysis activities and decision-making tasks?
Trackball
Which of the following is a pointing device?
White-hat hackers
Which of the following is a term for knowledgeable computer users who test the vulnerability of systems so that protective measures may be taken?
Encryption
Which of the following is a term for scrambling the contents of a file so that you can't read it without having the right interpretation key?
it encourages active end user participation
Which of the following is an advantage of prototyping?
Josh has created an online service through which people can send short text-based messages to each other.
Which of the following is an example of microblogging?
Minicomputer
Which of the following is designed to meet the computing needs of several people simultaneously in a small to medium-size business environment?
Links to systems information
Which of the following is not one of the three types of commonly used links?
edu
Which of the following is the TLD of the URL, http:// www.uts.edu.au?
Onshore outsourcing
Which of the following is the process of engaging another company in the same country for services?
It splits the telephone line to facilitate voice communications and Internet connectivity parallely.
Which of the following is true about a DSL modem?
It provides e-mail services and accounts.
Which of the following is true about a mail server?
Podcasting
Which of the following provides you with broadcasts of audio and video files?
Systems development life cycle
Which of the following refers to a structured step-by-step approach for developing information systems and includes seven key phases and numerous activities within each phase?
Spam
Which of the following refers to unsolicited e-mail (electronic junk mail) from businesses that advertise goods and services?
Deleting fields which establish relationships to other tables
Which of the following tasks do you need to be careful of, when making changes to the information in any of the relations (tables or files) of the database structure?
Operating System Software
Which of the following types of software controls your application software and manages how your hardware devices work together?
dotted line
Which symbol should you use in an E-R diagram to show the relationship between a student and the courses they are currently enrolled in?
circle
Which symbol would you use in an E-R diagram to show that a student may or may not enroll in a course?
CPU lock
While repairing a faulty CPU, Igor discovers that a sliver of quartz that beats at regular intervals in response to an electrical charge is damaged. Which of the following represents the damaged part of the CPU that Igor is repairing?
Phishing
____ is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
pyware
____ is malicious software that collects information about you and your computer and reports it to someone without your permission.
Tabs
_____ allow you to have multiple Web sites open at the same time.
Heading tags
_____ are HTML tags that make certain information, such as titles, stand out on your Web site.
Business requirements
_____ are the detailed set of end-user requests that the system must meet to be successful.
Pixels
_____ are the smallest display elements on a screen.
Ethics
_____ can be defined as the principles and standards that guide our behavior toward other people.
Query-by-example tools
_____ help you graphically design the answer to a question.
Plunge
_____ implementation discards the old system completely and immediately uses the new system.
Artificial Intelligence
_____ include(s) tools such as neural networks and fuzzy logic to form the basis of "information discovery" and build business intelligence in OLAP.
Predictive analytics
_____ is a highly computational data-mining technology that uses information and business intelligence to build a predictive model for a given business application.
Fuzzy logic
_____ is a mathematical method of handling imprecise or subjective information.
Text analytics
_____ is a process of using statistical, artificial intelligence, and linguistic techniques to convert information content in sources such as surveys, e-mails, blogs, and social media into structured information.
Key logger
_____ is a program that, when installed on a computer, records every keystroke and mouse click.
Notepad
_____ is a simple and easy-to-use version of Microsoft Word.
SQL
_____ is a standardized fourth-generation query language found in most DBMSs.
Swarm intelligence
_____ is the collective behavior of groups of simple agents that are capable of devising solutions to problems as they arise, eventually leading to coherent global patterns.
Outsourcing
_____ is the delegation of specific work to a third party for a specified length of time, at a specified cost, and at a specified level of service.
Touchpad
_____ is the little dark rectangle that you use to move the cursor with your finger, often found on notebook computers.
Summarization
_____ is the most basic, yet often the most powerful, form of data mining.
Prototyping
_____ is the process of building a model that demonstrates the features of a proposed product, service, or system.
Privacy
_____ is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
Artificial intelligence
_____ is the science of making machines imitate human thinking and behavior.
Web space
_____ is the storage area where you keep your Web site.
Pirated software
_____ is the unauthorized use, duplication, distribution, or sale of copyrighted software.
Scope creep
_____ occurs when the scope of the project increases beyond its original intentions.
Intellectual property
_____ refer(s) to intangible creative work that is embodied in physical form.
Geographic information system
_____ refers to a decision support system designed specifically to analyze spatial information.
friendly fraud
_____ refers to instances of identity theft where the victims knew the person who stole their identity.
statistical
_____ tools help you apply various mathematical models to the information stored in a data warehouse to discover new information, such as the performance of regression analysis to determine the effect of one variable on another.
Integration testing
_____ verifies that separate systems can work together.
primary
defaults to identifying the first field in a relation as the _____ key.
flash memory cards
xD Picture Cards, SD cards, and CF Cards are examples of which of the following?