COB 204 test, Cob test, 10
Where do we "convert our human intentions and questions about the data in a code that the database engine understands"? database application back end application query table
database application
Microsoft Access is a _______________________. front end application query knowledge center database management system
database management system
The database application, the database engine, and the database itself can be packaged into a single application called a _______________________. front end system query system knowledge center database management system
database management system
Flexible, informal, and adaptive processes that normally involve strategic and less structured managerial decisions and activities are _________ processes. structured dynamic
dynamic
A transistor is responsible for creating binary digits or "bits", always represented as a ___ or a ____. KB, MB 0, 1 a, b -1, +1
0, 1
How many exams are scheduled for this course? 1 2 3 4
3
What is the advantage of having a "quad-core" computer system over a single-core one? It makes your computer compatible with a wider variety of computer applications. It allows your computer to be connected to multiple displays. A "quad-core" enables the computer to mutlitask, i.e., to process multiple tasks or process large tasks more efficiently. A quad-core system is actually less efficient.
A "quad-core" enables the computer to mutlitask, i.e., to process multiple tasks or process large tasks more efficiently.
What does the term "quad-core" refer to? A processor or CPU RAM Storage Bits
A processor or CPU
A protocol is ____________. A device that handles the switching of voice and data in a local area network. A standard set of rules and procedures for the control of communications in a network. A communications service for the connection of devices in a local area network. The main communications channel in a wide-area network.
A standard set of rules and procedures for the control of communications in a network.
Abstract Reasoning
Ability to make and manipulate models
Systems Thinking
Ability to model components in a system
A computer is made up of which components? Computer Unit or CPU Monitor or Display Operating System All of the above
All of the above
The Five Component Framework indicates the elements of an information system. Of the options below, which is the best explanation for how organizations use it? As a checklist to make sure their information systems include all necessary elements. As a roadmap for moving work from computers to people. As a mental model for automating tasks by moving them from people to computers. This is a model used only by systems engineers.
As a mental model for automating tasks by moving them from people to computers.
PCs emerged in the 1980s and cell phones emerged in the 1990s.
Bell's law
Which of the following is "an elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning." Data Information Knowledge Infrastructure
Data
________ is installed in special, read-only memory in devices like printers or communication devices. Vertical-market software Application software Firmware Operating system
Firmware
The following image was discussed in the first class and is included in the COB204 Introduction PowerPoint file uploaded into the Canvas modules. In the context of the course, the illustration represents _____________ when compared to simply the presentation of the number, "218,000,000."
Information
In the business process model below, there is an empty diamond or "decision gateway." Which of the following items would be the most appropriate for that decision gateway? Give guest a room key Reservation data is sent to database Is there a reservation in the system? Decision gateways are always blank.
Is there a reservation in the system?
Using the work of another COB 204 student -- current or former student -- as your own work is a violation of which policy? Attendance Administrative Drops JMU Honor Code Grading Errors
JMU Honor Code
Because we are inundated with data, we need to determine what is important and what we can ignore. Therefore, one of the qualities of data is __________. Accurate Timely Relevant Just barely sufficient
Just barely sufficient
"Projection: The growth in the computer systems industry will continue to grow due to more cloud computing, increase in overall employment, and increase in number of cyberattacks." In the context of this course, this statement illustrates which of the following? Data Information Knowledge Business Intelligence
Knowledge
The cost of storing data is approaching zero.
Kryder's Law
Which of the following is an example of an open source operating system? MS Office Apache MySQL Linux
Linux
A(n) _____ connects two or more devices in a limited geographical area in which multiple devices could be connected over several hundred feet and for multiple users. Local area network Wide-area network Personal area network Enterprise network Value added network
Local area network
Experimentation
Making a reasoned analysis of an opportunity
The operating system is essential for running your computer and can be thought of as the: Master program Optional software Minimum requirements Computer library
Master program
As more users gained access to the Internet, the more valuable it became.
Metcalf's Law
Which of the following is an example of an application program? Unix Linux Windows Microsoft Word
Microsoft Word
The cost of computer processing is decreasing rapidly.
Moore's Law
What is a "collection of individual data items that are stored in a highly structured way that represents a model of reality"? entity table database DBMS
database
The purpose of a ___________ is to connect a computer's or printer's circuitry to network wires. port switch router NIC
NIC
Due to substantial increased network connection speeds, we see new companies, products and platforms will emerge.
Nielson's Law
In-class activities are completed in class. Are you allowed to make up in-class activities? No, I am not allowed to make up in-class activities. Yes, I am allowed to make up in-class activities.
No, I am not allowed to make up in-class activities.
____________ and _____________ are used to match records among database records. Primary Keys, Foreign Keys Columns, Fields Reports, Queries
Primary Keys, Foreign Keys
In the image below, what does the diamond shape mean in the context of Business Process Modeling Notation? Start End Question or Decision Gateway Data
Question or Decision Gateway
In an average laptop manufactured within the past 2 years, which of the following piece of hardware is most likely to be described as 4GB? RAM CPU Hard Drive BI/OS
RAM
According to the table in the Syllabus, which of the following groups of items are typically considered Homework Assignments? Exams, Projects, Papers Business Intelligence Tests None Correct! Readings, Online Quizzes, Access Project, Sharepoint Project
Readings, Online Quizzes, Access Project, Sharepoint Project
The language used to instruct the database management system, create new tables, insert and update data, and retrieve information from across multiple tables is called _______________. DBMS BI MySQL SQL
SQL
On what day is the Final Exam for this course scheduled? Thursday, December 7 Saturday, December 9 Tuesday, December 12 There is no final exam
Saturday, December 9
Volatile storage means that data will NOT be lost when the power is shut off. data WILL be lost when the power is shut off. the data is "frozen" in place even when the power is off. data is created when the power is off.
data WILL be lost when the power is shut off.
Metadata is/are ________. codes used for server-side processing error logs of databases data that describes data data that are encrypted more important data
data that describes data
Both servers and personal computers can be virtualized. True False
True
Every record in a data table has an identical structure. True False
True
Information Systems can function across multiple organizations and groups such as suppliers and customers. True False
True
One of the most important practices around creating a relational database is structuring the data in a very coordinated way. True False
True
The 5-component framework is common to all information systems, from the smallest to the largest. True False
True
The Internet is an example of a wide-area network. True False
True
Virtualization allows one machine to have different operating systems running simultaneously. True False
True
Collaboration
Two or more people working together to achieve a common goal
If you were asked to install wire to connect computers, printers, switches and other devices in a LAN, you would probably use ________________. Coaxial cable Fiber optic UTP Telephone cable
UTP
Which of the following types of wire is also referred to as "ethernet cable"? Coaxial Unshielded Twisted Pair Fiber
Unshielded Twisted Pair
Which of the following statements is true of firmware? The software is coded differently from other software. Firmware cannot be changed or upgraded Firmware is the same as system cache. Users do not need to load firmware into a device's memory.
Users do not need to load firmware into a device's memory.
Computers that reside in different geographic locations are physically connected through a(n) ________. WAN LAN URL IP address
WAN
When should you use a database application instead of a spreadsheet application? When you have more than 60,000 rows of data that has been collected from different people. When you have multiple themes in the data and need forms, queries and reports. When the spreadsheet analysis tools are too slow. When you want to publish the data to the Web.
When you have multiple themes in the data and need forms, queries and reports.
What is one difference between RAM and hard disk storage? There is no difference. When you turn off the computer, data will disappear from RAM, but data stored on the hard disk will remain intact. One can be replaced and one cannot. One is measured in terms of GB and the other in terms of MB.
When you turn off the computer, data will disappear from RAM, but data stored on the hard disk will remain intact.
Virtualization is often used to save money. save space. reduce heat. all of the above.
all of the above
A(n) ____________ is a characteristic of an entity, for example, a name or address. table record attribute Primary Key
attribute
In a database, vertical columns are called _______________________ and horizontal rows are called __________________. attributes or fields; records records; attributes, values or fields columns; rows none of the above
attributes or fields; records
The term "open source" means that the source code of the program is ________. less stable and platform dependent available to the public available for licensing if desired available only to carefully vetted contractors
available to the public
Thin-client applications are limited by the capabilities of the ________. browser programing language hardware operating system
browser
A network of activities that generate value by transforming inputs into outputs is a(n) ___________. dynamic process information system competitive strategy business process
business process
Bits are grouped into 8-bit chunks called ________. switches strings bytes nibbles
bytes
The ________ is called the "brain" of the computer. random access memory read only memory storage hardware central processing unit
central processing unit
Business executives are always trying to find new ways to integrate information technology into business processes to sustain __________________. job security competitive advantage strategies knowledge
competitive advantage
Processes that span an organization and support activities in multiple departments are _____________ processes. enterprise inter-enterprise
enterprise
Which of the following devices is an example of a storage hardware device? printer central processing unit external hard drive random access memory
external hard drive
In Access, columns are called _______________ columns fields records files
fields
Tablets (such as iPads), SD memory cards (such a for a camera), and USB drives use solid state or _________ memory. This type of memory differs from main (RAM) memory in that it "freezes" data in place. This type of non-volatile memory allows for quick access to the data. server binary flash volatile
flash
A ________ is equivalent to 1,024 megabytes. kilobyte gigabyte terabyte megabyte
gigabyte
In the process of virtualization, one machine has the appearance of multiple machines. The "real" operating system is called the _______, which is a platform for other operating systems, which are called __________. primary; secondary virtual machine; hosts host; virtual machines non-mobile; mobile
host; virtual machines
Microsoft SQL Server, Oracle, IBM's DB2, PostgreSQL and MySQL are database systems that run in a larger server environment on your computer's desktop
in a larger server environment
A(n) _________________ exists when data are isolated in separated information systems. Enterprise systems help address this problem. dynamic process inter-enterprise silo information silo functional process
information silo
Computer hardware consists of electronic components and related gadgetry that _______, ________, _________, and store data. port, operate, serve read, write, delete create, copy, paste inputs, processes, outputs
inputs, processes, outputs
A business process includes three fundamental elements: hardware, software, procedures TSP, ERP, BI activity, decision, product inputs, resources/processing, outputs
inputs, resources/processing, outputs
Processes that span two or more independent organizations are ___________ processes. enterprise inter-enterprise
inter-enterprise
NIC stands for network ______________ card. internet intranet invisible interface
interface
A private internet that is used exclusively within an organization is called a(n) ________. Ethernet intranet cloud server
intranet
According to our textbook (Kroenke & Boyle, 10th Edition), a database is "a self-describing collection of integrated records." What makes a database "self-describing"? its file name its attributes its metadata its data
its metadata
Which of the following is an output device? monitor mouse plotter bar code scanner
plotter
The random access memory is called the ________ memory of a computer. non-volatile hard disk main only
main
Which of the following components is used during the processing stage of computing? UPC reader main memory printer bar code scanner
main memory
The CPU reads data and instructions from the __________ memory. It can access data and instructions faster from the _________, a special type of this memory. volatile, non-volatile permanent, temporary dual, quad main, cache
main, cache
Which of the following is an input hardware device? plotter mouse projector printer
mouse
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly. database application network server
network
Microsoft Access, FileMaker Pro, and Base are database management systems that run in a larger server environment on your computer's desktop
on your computer's desktop
iOS and Android are examples of ... operating systems for mobile devices Apple operating systems operating systems for servers applications
operating systems for mobile devices
Windows 10, Mac Sierra, and Linux are all examples of ____________ enterprise resource plannng systems. social media information systems. operating systems. memory systems.
operating systems.
The five components of a an information system include hardware, software, data, procedures, and __________________ value chains people margins job skills
people
Maria creates a relational database to keep track of cars in her repair shop. She stores information about each car in the "vehicle" table, and creates a column labeled "vehicle_ID" where she stores the vehicle VIN number. The "vehicle_ID" column is referred to as a ________. primary key key attribute foreign key functionally dependent record secondary key
primary key
SQL is a(n) ________________ to build relational databases. server program application output programming language
programming language
Microsoft Word, Adobe Photoshop, and Microsoft Excel are examples of ___________ proprietary application software. server software. enterprise resource planning software. cache software.
proprietary application software.
A ____________ is a way of asking questions about our data. query report table form
query
In Access, rows are called _________ columns fields records files
records
"Multiple data tables that refer to one another in order to store lots of information about a single entity" describes a _______________ database. query relational multi-dimensional singular
relational
Which of the following likely requires a server farm? creating an Access database searching through millions of documents finding the sum of 1000 values supporting a campus network environment
searching through millions of documents/supporting a campus network environment
MIS is the management and use of information systems that help organizations achieve their __________. strategies profit ability to experiment automation
strategies
A ________ is a special-purpose computer that receives and transmits wired traffic on the LAN. codec modem switch router
switch
A client-server application that requires nothing more than a browser is called a ________. thick-client application desktop application firmware thin-client application
thin-client application
A __________ is often described as a light switch that is either on or off, or a gate that is open or closed. transistor battery BI/OS CPU
transistor
RAM is considered _________ and hard disk storage is considered ________. dual, quad non-volatile, volatile volatile, non-volatile permanent, temporary
volatile, non-volatile