Computer Science Exam #3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

____ is a tablet PC

Ipad

Portable media players (PMP's) are small portable devices that allow you to play digital music and video. They use a format called ____ that allow audio files to be compressed so they are small enough to be sent over the internet or stored as digital files.

MP3

Which of the following is NOT a method in which a security system tries to authenticate a user's identity?

What you need--the kind of information you are asking for

A computer crime is defined as ____.

an illegal act perpetuated against computers or telecommunications and the use of computers or telecommunications to accomplish an illegal act

When most of us used in our TV sets, we got a system of varying signal amplitude and frequency that represents picture and sound elements. This systems is called ____ TV.

analog

The ____ is the smallest unit of data the computer can store in a database.

bit

What is 1 byte of data also called?

character

A field is a unit of data consisting of one or more____.

characters

Which of the following is NOT among the errors and accidents that many afflict computer systems?

computer crimes

Digital convergence combines several industries, including:

computers and communications, consumer electronics, entertainment and mass media

A blocking program for protecting children from online objectionable adult material is ____.

cybersitter, cyber patrol, net nanny

What is the process of removing errors and inconsistencies from data called?

data cleansing

In a database management system, the ____ is a document or file that stores the data definitions and descriptions of the structure of data used in the database

data directory

Which of the following is the computer-assisted process of sifting through and analyzing vast amounts of data to extract meaning and discovering new knowledge?

data mining

The person who coordinates all activities and needs for an organization's database is the ____.

database administrator

What is the software that controls the structure of a database and access to the data?

database management system

A computer-based information system that provides a flexible tool for analysis and helps managers focus on the future is a ____ system.

decision support

Incomplete, outdated, or otherwise inaccurate data is known as ____ data.

dirty

Which of the following is NOT a tool for fighting unauthorized online use?

disaster-recovery plan

Which of the following terms describes old, obsolete electronic gadgetry?

e-waste

A power failure that disrupts a computer system is an example of a ____.

electromechanical problem

In the area of threats to computer systems, electromechanical problems are examples of ____.

errors and accidents

A variant on conventional phishing, in which a hacker or cracker sets up a Wi-Fi hotspot or access point that makes your computer think it's accessing a safe public network or your home network and then monitors your communications and steals the data that you enter into a website, is known as ____.

evil twin attack

An easy-to-use decision support system that specifically supports strategic decision making is a ____ system.

executive support

If you were in top management, which type of computer-based information system would you use?

executive support system (ESS)

A set of interactive computer programs that help users solve problems that would otherwise require the assistance of a human specialist is a ____ system.

expert

A digital camera's images are stored on ____.

flash memory cards

Digital music players, such as the iPod, use one or both of the following file storage technologies: ____ and ____.

hard-disk drive; flash memory

Which type of database model arranges fields or records in related groups whereby each child record can have only one parent record?

hierarchical database

____ TV uses a digital signal, or series of 0's and 1's, and is much clearer and less prone to interference than analog TV.

high-def (HD)

Dirty data is ____.

inaccurate, incomplete data

Which of the following is NOT a task performed by the database administrator (DBA)?

installing hardware

The Nigerian letter scam is an example of ____.

internet-related fraud

The ____ uniquely identifies a record.

key field

A digital camera's resolution is expressed in ____.

megapixels

What describes contents of a data warehouse?

metadata

Which database model was developed to improve on the hierarchical model and deal with more complex data relationships?

network

Which type of database model is similar to a hierarchical database but allows each child record to have more than one parent record?

network database

Sending emails that appear to come from a trusted source, which direct you to a website where you're asked to reveal information is called ____.

phishing

A camera, either film or digital, that automatically adjusts settings such as exposure and focus is a ____ camera.

point-and-shoot

Which of the following is NOT a function of the U.S. Computer Emergency Response Team (CERT)?

prosecuting those caught

A record (row) is a collection of related____.

records

The downside of personalization is people feel over-burned with too much choice, so that they are likely to ____.

regret their decisions, be reluctant to make decisions, have excessive expectations about their decisions

Which type of database model connects data in different files through the use of a key field?

relational database

Which of these is a program that produces an on screen on printed document form all or part of a database?

report generator

Another name for image sharpness is ____.

resolution

The quality of a song on a digital audio player is determined by its ____, the number of times a song is measured and converted to a digital value.

sampling rate

____ is a system of safeguards for protecting information technology against disasters, system failures, and unauthorized access.

security

One use of virtual reality is to build ____ to represent the behavior of physical or abstract systems and use them to train people in realistic situations.

simulators

The Apple Iphone is a cellphone with a microprocessor, display screen, memory, and built-in modem. Thus it is a ____.

smartphone

The components of an expert system include all BUT which one of these?

speech recognition

PMP's are mostly of two types--music players and media players--but much of what they can do can also be done on today's ____.

tablets, smartphones, laptops

Using a smartphone to send short messages to another smartphone or other handheld device is called ____.

text messaging

In 2009 a cracker stole more than 500,000 patient records from a state-run database and demanded ransom for the return of the records. This crime is called ____.

theft of information

In a business organization, a recorded event having to do with routine business activities is a ____.

transaction

A computer-based information system that keeps track of the transactions needed to conduct business is an ____ system.

transaction processing

The societal effects of new TV technology are that it can change ____.

when you watch TV, where you watch TV, the nature of TV programs


संबंधित स्टडी सेट्स

Financial Accounting Chpt 3 Probs

View Set

Hesi Case Study: Parkinson's Disease

View Set

Government Basic Concepts of Democracy

View Set

Cisc 115 intro to java final exam

View Set

Introduction to Business Communication

View Set