CS 101 Final
connect personal computers within a very limited geographical area, such as a single building.
A LAN would be used to _____.
portal
A Web ____ is a Web page that combines useful information and links and acts as an entry point to the Web
DSS
A ___ helps people make decisions by directly manipulating data, analyzing data from external sources, generating statistical projections, and creating data models of various scenarios.
Hyperlink
A ____ is an element in an electronic document—a word, a phrase, or an image—that, when clicked, opens a related document
Visualization
A basic example of ____ is the use of graphs and charts to illustrate numeric data.
modify
A feature of neural networks includes the ability to quickly ____ stored data when new information is identified.
Long Term Evolution
A fourth-generation technology called _____ is competing to become the wireless network of choice for high-speed connectivity.
analysis
A goal of systems ______ is to produce a list of requirements to help solve the problem identified in systems investigation.
Amazon.
A good example of B2C e-commerce is ____.
allows computers to share resources such as files and applications
A peer-to-peer network ______.
input
A sensor is an example of a(n) _____ device for a robot
map.
A typical example of a geographic information system is a ____.
Home
A typical setup for a ____ network would include a wireless router connected to an ISP.
ES
A(n) ____ could be used to replicate how a specialist diagnoses lung cancer.
demand
A(n) ______ MIS report is produced when there is a specific need identified by
The analog video footage must first be converted into a digital form.
After videotaping her sister's wedding with an analog video camera, Nancy decided to edit out some of the extra footage using her computer. Although she has connected her camera, with the videotape, to her computer, she finds that she cannot access the video footage. Why?
neural networks.
All of the following are AI methodologies that rely on a human to give instructions for problem solving EXCEPT ____.
comment-trolling.
All of the following are categorized Internet addictions EXCEPT ____.
.xls
All of the following are examples of graphic file formats EXCEPT for ____.
Updates
All of the following are examples of malware EXCEPT ______.
Shared
All of the following are models for cloud computing EXCEPT ______.
avoid client/server networks
All of the following are safe and vigilant behavior to ensure Internet security EXCEPT ________.
all of the above
An ISP may provide _____ services.
file
An address book is an example of a database _____.
MP3
An advantage of using a(n) ____ format is its ability to compress CD music files to one tenth their original size.
Phishing
An email with a subject heading "Urgent Security Update" that requests a username and password followed by a link to "re-login and resolve the issue" is a good example of a ____ scam.
clip art
An example of a vector graphic image is ____.
Frames
Animation uses successive ____ to create the impression of an object moving.
artificial creativity
Artists use a branch of artificial intelligence called ____ to express themselves through computers.
PAN
Bluetooth is an example of a _____ network.
EDI
Businesses first used ____ for online transactions.
m-commerce.
Buying movie tickets via cell phone is an example of ____.
within the home
Citizens of free and democratic nations expect, at the least, privacy ____.
spam
Controlling the amount of _____ we receive in our email Inbox is one way to control information overload
Data
Cookie files contain ____.
install a Web cam in an employee's home.
Corporate network administrators have the right to do all of the following EXCEPT ____.
integrity
Data ____ refers to the quality and accuracy of the data.
packets
Data ____ travel over the Internet from router to router until reaching their destinations.
hiring and training the users.
Database Administrators are responsible for all of the following areas EXCEPT ____
CAD
Designers rely on ____ software to help them build prototypes for further research and testing
1s and 0s
Digital photography captures, stores, and manipulates photographs digitally as a series of ____.
encrypted
Digitized sound can be _____ for secure communications
telecommunications.
Distributed databases connect data at different locations via ___________.
all of the above
During the creation of a database, a data dictionary can be referenced by ____ to validate data item names, access dates, and access data types .
is the amount of digital information generated about a person every day.
Each person's digital shadow ____.
easily available to every law-abiding member of a society.
Full transparency is a scenario in which surveillance and information are ____.
shipping.
Hosting companies provide all the necessary software tools to deliver e-commerce applications EXCEPT ____.
field
In a database, your first name would be categorized as a ____
ID card
In terms of an authentication protocol, the phrase "something you have" refers to a(n) _____.
Protocol
In the URL http://www.cengage.com/index.html, http is the ____.
C2C
Individual consumers use the ____ form of e-commerce in which individuals sell to other individuals on the Web.
medical research.
Informatics is widely used in the combined disciplines of computer science and ____
blogs
Interactive media typically combine all of the following EXCEPT ____.
WiMAX
Many cities have adopted ____ technology to provide faster Internet speed to its users.
users are guaranteed the safety of their photos if the server goes down
Once uploaded to an online photo album site, which of the following is NOT true?
recognize
One challenge with speech recognition software is its ability to ____ words that sound the same but have different meaning.
redundancy
One goal of normalization is to minimize data _______
machine learning
One important artificial intelligence characteristic is when a device modifies its own behavior based on its ability to learn, also known as ____.
multiplayer
Playing online Scrabble with others on the Web at any given time is an example of a _____ gaming experience
calculating pay for thousands of employees
Robots are best at performing all of the following tasks EXCEPT _________
all of the above
SQL allows users to _____ a database.
an intelligent agent
Searching the Web for the best deal on an airline flight is a good example of ____ at work.
Internet fraud
Sites such as eBay are a popular target for ____.
human resources.
Solutions that deliver improved customer service and targeted marketing support all of the following areas of an enterprise EXCEPT ____.
freely tag friends in your photos.
Some netiquette rules to consider when using social media include all of the following EXCEPT _____.
a specific industry.
The B2B electronic exchange differs from global supply management in that it focuses on ____.
Automatically setting an interview day and time
The Web supports job searches by providing all of the following EXCEPT ______.
Global Positioning Device
The introduction of ______ on cell phones was the first step towards realizing augmented reality.
Ripping
The process of transferring music from CD to MP3 or another digital audio format is called ____ a CD.
quality control
The reason on-line content cannot always be trusted is the lack of ____ on the Web.
Domain name system
The system that translates the URL you type in a browser's address box into an IP address is the ______.
RFID
The use of ____ technology to identify items for inventory may someday replace today's bar code system
data mining
Using ____, businesses can analyze inventory and costs for more efficiency
KM
Using ____, employees can share their expertise in different areas of a company to build upon its success.
flowcharts
Using symbols, ____ show the logical relationships between system components.
a flash mob
Using technology to organize a gathering at a specific time and place is an example of _____.
the cost of development.
When deciding whether to update or build a new software program, one thing to consider is the cost of maintenance versus ____.
PATRIOT ACT
Which of the following is NOT a U.S. Privacy-Protective Law?
low expense in time and money
Which of the following is NOT a benefit of an ERP system?
Workstation
Which of the following is NOT a network device?
How should the RFP for the software application be written?
Which of the following is NOT a question posed during systems investigation?
It has become easier to create a reliable online business yourself than to hire a company to do it.
Which of the following is NOT a true statement about e-commerce technologies?
Reduce data integrity
Which of the following is NOT an advantage to using a DBMS?
Web sites that provide a secure connection start with httpx instead of http
Which of the following is NOT true?
Social security number
Which of the following is an example of a primary key for a database?
Take frequent breaks
Which of the following is the best way to avoid health problems when working with computers?
It forms networks automatically when two or more devices are within range
Which of the following is true about Bluetooth?
All of the above can be used
Which of the following security measures can be used to protect a database?
Maintenance
Which stage of the SDLC lasts the longest?
Alan Turing
Who proposed a test for intelligent behavior of machines that is considered to be the early work in artificial intelligence?
Modem
With the help of a _____, devices can send signals that allow them to connect to the Internet.
a data-entry error
You enter the wrong GPS position for the start point on a trip you are about to take; this is an example of ____.
Decrypting computer archives so the data they contain is unusable if the archive is lost or compromised
You have just secured a job with a new firm that is very security conscious. You've been instructed to learn as much as possible about encryption to ensure the confidentiality of customer transactions as well as electronic communications about new research and development projects. After researching this topic, you find that encryption can be used in all of the following ways EXCEPT ______.
Ubiquitous
____ computing has led us to an era where technology is so much a part of daily existence that it is no longer noticed.
Fiber-optic
____ is a popular cable type used as network backbone by major telecommunications companies
PayPal
____ is the best-known e-cash provider
User
____ permissions provide registered users with access to the files they need, while restricting access to private resources
Batch
_____ processing involves holding a group of transactions for processing until the end of a specified period of time.
Web authoring software
_____ provides tools specifically designed to enter and format Web page text, graphics, and links.
TCP/IP
________ is the primary protocol responsible for message transmission on the Internet.