INFM109

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The purpose of a spider or web crawler is to scan across the Internet to find new web pages and index the information.

True

If you need to look for scholarly articles on software development, which websites will BEST fit your need? (Choose all that apply)

research.yahoo.com, scholar.google.com (specifically designed to filter for scholarly articles)

Which device is used to connect multiple networks together?

router

Server operating systems will often times have command line interfaces instead of graphical user interfaces.

True

Swift, Python, and Javascript are examples of the most popular programming languages in use today.

True

There are dozens of Android phone manufacturers because of the proprietary nature of the Android operating system.

False

Email has been around for a long time. Email was created for use on ARPANET in what year?

1971

Match the order of each process from the Big Data Analysis Pipeline from the below list.

1: acquisition 2: extraction, cleaning 3: integration, aggregation, representation 4: analysis & modeling 5: interpretation

Identify whether the characteristic on the left describes IPv4 or IPv6.

32-bit address (IPv4), 128-bit address (IPv6), Is written in octets (IPv4), Uses binary or Base 2 (IPv4), Uses hexadecimal or Base 16 (IPv6), Has to have a subnet mask to make sense (IPv4)

How many computers were networked on ARPANET in 1974?

60

Which two sentences describe a database accurately?

A database is a shared collection of related data used to support the activities of a particular organization, A database is as a repository of data that is defined once and then accessed by various users

In which software development methodologies is testing combined with the development process?

Agile, RAD, Lean (In SDLC, software testing is considered a separate process apart from the actual building of the software. In Agile, Lean, and RAD, testing is integrated into the development process)

Which two smart phone operating systems are seen most often?

Android, Apple

What is the name of a peer-to-peer network that provides an open, distributed record of transactions?

Blockchain

The following component performs the function of mathematical calculations and is considered "the brain" of the computer:

Central Processing Unit (CPU)

Which term best describes an attribute in a database table?

Column (From the options given, a column is the best descriptor of an attribute in a database table. For example, a table of customer information might contain columns for Customer_ID, First_Name, Last_Name, Address, City, State, Zip, Phone. Each one of these would be an attribute that describes any given customer.)

According to Michael Fourman, what is "metadata?" (Choose all that apply)

Data about data, an "electronic card" attached to each document

Explain the difference between data, information, and knowledge. Give a specific example to illustrate your discussion.

Data is the bare-bone facts of a topic. For example, a scientist studying the migration of whale will collect data to back up a hypothesis that certain species will only travel so far. Information is when data has been work through and put into some type of context. For example, research and data on whales that has been gone through can be put into a research article for others interested to read about. Knowledge is how humans believe/perceive data in a certain topic. For example, a scientist with knowledge on a particular species of whale may assist another team in their study of whale migration, to help them gain a better understanding.

Analog

Data transmission that happens over a wave

Digital

Data transmission that happens over a wire or fiber cable

How do social engineering attacks work? (Choose all that apply)

Email that says you're a winner, email that purports to be your boss or the IT department, infected email from a trusted sender, email containing an urgent request for help

Hardware requirements for desktop systems and servers are the same.

False

In the SDLC methodology, the system analysis phase includes performing a feasibility study to determine whether the project will generate enough return to justify the expense.

False

According to the Michael Fourman article, HTTP is a markup language.

False; HTML (Hypertext Markup Language) is a markup language, not HTTP. HTTP stands for Hypertext Transfer Protocol and is a communications protocol for the World Wide Web.

Microsoft Office is an example of open-source software because it can be downloaded from the Internet at no cost and its source code is freely available.

False; Microsoft Office is considered a closed-source product. Open Office is considered an open-source product and has a very similar look and feel to Microsoft Office.

Examples of third generation programming languages include Python, BASIC, Java, and SQL.

False; SQL is considered a fourth generation programming language

IBM's PC was developed with a closed architecture, it made it more difficult for competitors to develop PC "clones"

False; The IBM PC used an open architecture, making it possible for a number of "clone" manufacturers to spring up.

One major advantage of buying a software solution versus building a software solution is that there no development time needed and a solution can always be found that exactly meets the customer's needs.

False; There is no development time, but buying an already-built solution means that the customer will have to accept the functionality of the solution "as-is."

In the SDLC methodology, the programming phase is where the code actual gets written and tested.

False; testing is a separate phase in the SDLC method

Solid state drive

Fast permanent storage made up of discreet memory addresses

Which technology requires the most training to install?

Fiber optic cabling

What term BEST describes columnar data in a relational database?

Field

In the video "5 Components of Information Literacy," using Boolean search terms or requesting genealogical records are examples of which level of Information Literacy?

Find

From the list below, select the options that identify desktop operating systems. (Choose all that apply)

Mint, Ubuntu, Windows 7, Mac OSX, Windows 10

This component interconnects all other components inside a computer:

Motherboard

Using Boolean logic, which operator will give you a list of all cars that won't include Teslas?

NOT

Discuss how packet switching is an improvement over circuit switching.

Packet switching allows for different computers to send messages on the same sets of wires, as opposed to just one. With circuit switching, there had to be (hopefully) one consistent, steady connection in order to send a single message. This made it slow and tedious process that couldn't be maintained efficiently. With packet switching, multiple messages can be sent at the same time, to various computers, making it a speedier and much more efficient process.

This component is designed for short-term volatile data storage:

Random-Access Memory (RAM)

Identify five (5) of the common database models from the below list.

Relational Model, Hierarchical Model, Object-Oriented Model, Flat File Model, Network Model

In the SDLC methodology, the preliminary analysis phase includes making a determination as to whether a proposed project is worth taking on from both a technical and cost/benefit review.

True

Define the term "cloud computing."

Storing and accessing data and programs over the internet instead of on a computer's hard drive.

Explain the constraint between the three components of the Quality Triangle.

The constraint between the three components on the Quality Triangle is going to be between a project's budget, scope, and deadline . You won't be able to meet all three in a project, and as such should choose the two that you deem the most important for that particular project.

According to the Fourman article, Natural Language Processing (NLP) can be considered the "next generation" of document searching, since it involves extracting the meaning from the document contents and not simply perform a keyword search.

True

Agile development projects can be characterized as smaller projects that are not clearly defined at the beginning and include a lot of continuous interaction and feedback from the customer.

True

An example of social engineering is when you receive a phone call from the IT department asking you to confirm your password.

True

Data mining is the process of analyzing data to find previously unknown trends, patterns, and associations that can be used for decision-making. This process can be automated through the use of machine learning.

True

Even though it was invented in 1989, Hypertext Markup Language (HTML) still forms the foundation of all web pages built and used today.

True

In mobile applications, the development of app stores such as Apple's App Store and Google Play has made the development and acquisition of mobile apps a more structured and simplified process.

True; Developing, acquiring, and managing apps has been revolutionized by app stores such as Apple's App Store and Google Play. Standardized development processes and app requirements allow developers outside Apple and Google to create new apps with a built-in distribution channel.

According to Oracle, about how often are data volumes doubling?

every 24 months

What is Web 2.0? How has the evolution of Web 2.0 affect how we interact with the web?

Web 2.0 is how technology and business has continued to interact and grow, such as having interactive websites. Web 2.0 has allowed us to be much more interactive with business, since we can now do everything from purchasing their products, to interacting directly with them/other customers through comments and reviews, and has made way for a larger scope of connectivity.

Which transmission media is most susceptible to environmental variables?

Wireless

Input device

keyboards, touch screens, card readers

ipconfig

lists a computer's network configuration

Which characteristics describe advantages of fiber networking? (Choose all that apply)

long-term cost, connection quality, security

Complete the following sentence: A database management system is considered ___________________ because it contains user data as well as the characteristics (metadata) of the structure and data stored in the database.

self-describing

Hard disk drive

slower permanent storage that uses spinning platters & a write/read head

velocity

speed at which data is entered into a system and must be processed

ping

test connectivity between two networked devices

CPU

the "brains" of the computer

Motherboard

the primary circuit board in a computer

Output device

touch screen, printer, speaker

Network adapter card

usually referred to as a NIC

variety

variations in the structure of the data to be stored

The three V's of Big Data refer to which of the following?

variety, velocity, volume

IoT

represents a collection of billions of devices that collect, share data

Discuss the role of ARPA in the development of what has become the Internet.

ARPA, along with 4 colleges on the west coast, worked to build an interconnected network that would allow them to send messages to each other through computers. This network was called ARPANET. They worked in creating packet-switching, which allowed for quicker connections among the computers. As time went on, this connection of devices grew to all over the country, mainly among universities and various companies, all over various networks. Eventually, these networks were streamlined in way so all sorts of computers and devices could be connected (the Internet), and became a public commodity.

List 2 advantages and 2 disadvantages of cloud computing.

Advantages include: -No software to install or upgrades to maintain. -Available from any computer that has access to the Internet. -Can scale to a large number of users easily. -New applications can be up and running very quickly. -Services can be leased for a limited time on an as-needed basis. -Your information is not lost if your hard disk crashes or your laptop is lost or stolen. -You are not limited by the available memory or disk space on your computer. Disadvantages include: -Your information is stored on someone else's computer. -You must have Internet access to use it. -You are relying on a third-party to provide these services.

Mobile apps that are downloaded to Android phones are obtained from the App Store.

False

NoSQL databases consist of tables, rows, and columns.

False (no predefined schema)

Which 3 platforms dominate the cloud services market?

Google Cloud, Microsoft Azure, Amazon AWS

A web browser uses which protocols to communicate with a web server? (Choose the best two answers)

HHTPS, HTTP

According to "Information Systems for Business and Beyond," what are the major components of an information system? (Choose all that apply)

Hardware, software, processes, people, data

Web pages are written in HTML. What does HTML stand for?

Hypertext Markup Language

Disadvantages of cloud computing include which of the following? (Choose all that apply)

requires good Internet bandwidth and speed, ongoing costs, limited control of infrastructure, security

Bluetooth

requires the 2 connecting devices to be paired

Hubs and switches can both be used to create networks.

True

IaaS (Infrastructure as a Service) refers to using cloud-delivered infrastructure. Examples include compute services as well as storage and backup services.

True

One advantage of fiber cabling is its immunity to EMI, or electromagnetic interference.

True

The "people" part of an information system includes Tier 1 and Tier 2 help desk workers, analysts, and developers.

True

variability

changes in meaning of data based on content

Complete the following sentence: A database management system utilizes a process known as _________________ to support multiple users simultaneously.

concurrency control strategies

Big Data technologies can be used as a _____________________ method to store and process large quantities of data.

cost reduction

nslookup

replies with the IP address of a given domain name

Advantages of cloud computing include which of the following? (Choose all that apply)

accessibility & pay-per-use, minimum management & cost, data backup & recovery, reliability

According to Friedman, which three technologies came together in the 1990s to create a platform for global collaboration?

build-out of the Internet infrastructure, proliferation of the graphical user interface, introduction of workflow software

tracert

replies with the intervening "hops" between two networked devices

This term BEST describes different Linux operating systems.

flavor

The three common types of NoSQL databases are:

graph, document, key-value

This component is designed for long-term non-volatile data storage:

hard drive, HHD, hard disk

The application that gets installed on a system that will enable the user to create virtual machines inside of it is called a . (one word)

hypervisor

In the SDLC methodology, end user training and documentation take place in which phase?

implementation

Removal media

often use a USB port to connect to a PC; UBS, hard drives

What term BEST describes a field or combination of fields that are used to uniquely identify a record?

primary key

volume

quantity of data to be stored

Which characteristics describe advantages of wireless networking? (Choose all that apply)

quick installation, initial cost

What tools are used in DevOps? (Choose all that apply)

virtual infrastructure, source code repository, test automation, pipeline orchestration, configuration management, build server

This term BEST describes a computer operating system that is running inside a virtualized environment.

virtual machine

Random Access Memory

volatile storage that is erased when the power is removed

Identify 3 functional roles that a server can provide.

web server, applications server, file server

Which type of malware can spread without the user having to do anything to introduce the malware into their computer system?

worm


संबंधित स्टडी सेट्स

Homeostasis & Cell Transport Study Island

View Set

Principles of Management (Ch 6, 7, 8, 9) (only thorugh 6.2 for now)

View Set

Group and Business Life Insurance Policies

View Set