INFM109
The purpose of a spider or web crawler is to scan across the Internet to find new web pages and index the information.
True
If you need to look for scholarly articles on software development, which websites will BEST fit your need? (Choose all that apply)
research.yahoo.com, scholar.google.com (specifically designed to filter for scholarly articles)
Which device is used to connect multiple networks together?
router
Server operating systems will often times have command line interfaces instead of graphical user interfaces.
True
Swift, Python, and Javascript are examples of the most popular programming languages in use today.
True
There are dozens of Android phone manufacturers because of the proprietary nature of the Android operating system.
False
Email has been around for a long time. Email was created for use on ARPANET in what year?
1971
Match the order of each process from the Big Data Analysis Pipeline from the below list.
1: acquisition 2: extraction, cleaning 3: integration, aggregation, representation 4: analysis & modeling 5: interpretation
Identify whether the characteristic on the left describes IPv4 or IPv6.
32-bit address (IPv4), 128-bit address (IPv6), Is written in octets (IPv4), Uses binary or Base 2 (IPv4), Uses hexadecimal or Base 16 (IPv6), Has to have a subnet mask to make sense (IPv4)
How many computers were networked on ARPANET in 1974?
60
Which two sentences describe a database accurately?
A database is a shared collection of related data used to support the activities of a particular organization, A database is as a repository of data that is defined once and then accessed by various users
In which software development methodologies is testing combined with the development process?
Agile, RAD, Lean (In SDLC, software testing is considered a separate process apart from the actual building of the software. In Agile, Lean, and RAD, testing is integrated into the development process)
Which two smart phone operating systems are seen most often?
Android, Apple
What is the name of a peer-to-peer network that provides an open, distributed record of transactions?
Blockchain
The following component performs the function of mathematical calculations and is considered "the brain" of the computer:
Central Processing Unit (CPU)
Which term best describes an attribute in a database table?
Column (From the options given, a column is the best descriptor of an attribute in a database table. For example, a table of customer information might contain columns for Customer_ID, First_Name, Last_Name, Address, City, State, Zip, Phone. Each one of these would be an attribute that describes any given customer.)
According to Michael Fourman, what is "metadata?" (Choose all that apply)
Data about data, an "electronic card" attached to each document
Explain the difference between data, information, and knowledge. Give a specific example to illustrate your discussion.
Data is the bare-bone facts of a topic. For example, a scientist studying the migration of whale will collect data to back up a hypothesis that certain species will only travel so far. Information is when data has been work through and put into some type of context. For example, research and data on whales that has been gone through can be put into a research article for others interested to read about. Knowledge is how humans believe/perceive data in a certain topic. For example, a scientist with knowledge on a particular species of whale may assist another team in their study of whale migration, to help them gain a better understanding.
Analog
Data transmission that happens over a wave
Digital
Data transmission that happens over a wire or fiber cable
How do social engineering attacks work? (Choose all that apply)
Email that says you're a winner, email that purports to be your boss or the IT department, infected email from a trusted sender, email containing an urgent request for help
Hardware requirements for desktop systems and servers are the same.
False
In the SDLC methodology, the system analysis phase includes performing a feasibility study to determine whether the project will generate enough return to justify the expense.
False
According to the Michael Fourman article, HTTP is a markup language.
False; HTML (Hypertext Markup Language) is a markup language, not HTTP. HTTP stands for Hypertext Transfer Protocol and is a communications protocol for the World Wide Web.
Microsoft Office is an example of open-source software because it can be downloaded from the Internet at no cost and its source code is freely available.
False; Microsoft Office is considered a closed-source product. Open Office is considered an open-source product and has a very similar look and feel to Microsoft Office.
Examples of third generation programming languages include Python, BASIC, Java, and SQL.
False; SQL is considered a fourth generation programming language
IBM's PC was developed with a closed architecture, it made it more difficult for competitors to develop PC "clones"
False; The IBM PC used an open architecture, making it possible for a number of "clone" manufacturers to spring up.
One major advantage of buying a software solution versus building a software solution is that there no development time needed and a solution can always be found that exactly meets the customer's needs.
False; There is no development time, but buying an already-built solution means that the customer will have to accept the functionality of the solution "as-is."
In the SDLC methodology, the programming phase is where the code actual gets written and tested.
False; testing is a separate phase in the SDLC method
Solid state drive
Fast permanent storage made up of discreet memory addresses
Which technology requires the most training to install?
Fiber optic cabling
What term BEST describes columnar data in a relational database?
Field
In the video "5 Components of Information Literacy," using Boolean search terms or requesting genealogical records are examples of which level of Information Literacy?
Find
From the list below, select the options that identify desktop operating systems. (Choose all that apply)
Mint, Ubuntu, Windows 7, Mac OSX, Windows 10
This component interconnects all other components inside a computer:
Motherboard
Using Boolean logic, which operator will give you a list of all cars that won't include Teslas?
NOT
Discuss how packet switching is an improvement over circuit switching.
Packet switching allows for different computers to send messages on the same sets of wires, as opposed to just one. With circuit switching, there had to be (hopefully) one consistent, steady connection in order to send a single message. This made it slow and tedious process that couldn't be maintained efficiently. With packet switching, multiple messages can be sent at the same time, to various computers, making it a speedier and much more efficient process.
This component is designed for short-term volatile data storage:
Random-Access Memory (RAM)
Identify five (5) of the common database models from the below list.
Relational Model, Hierarchical Model, Object-Oriented Model, Flat File Model, Network Model
In the SDLC methodology, the preliminary analysis phase includes making a determination as to whether a proposed project is worth taking on from both a technical and cost/benefit review.
True
Define the term "cloud computing."
Storing and accessing data and programs over the internet instead of on a computer's hard drive.
Explain the constraint between the three components of the Quality Triangle.
The constraint between the three components on the Quality Triangle is going to be between a project's budget, scope, and deadline . You won't be able to meet all three in a project, and as such should choose the two that you deem the most important for that particular project.
According to the Fourman article, Natural Language Processing (NLP) can be considered the "next generation" of document searching, since it involves extracting the meaning from the document contents and not simply perform a keyword search.
True
Agile development projects can be characterized as smaller projects that are not clearly defined at the beginning and include a lot of continuous interaction and feedback from the customer.
True
An example of social engineering is when you receive a phone call from the IT department asking you to confirm your password.
True
Data mining is the process of analyzing data to find previously unknown trends, patterns, and associations that can be used for decision-making. This process can be automated through the use of machine learning.
True
Even though it was invented in 1989, Hypertext Markup Language (HTML) still forms the foundation of all web pages built and used today.
True
In mobile applications, the development of app stores such as Apple's App Store and Google Play has made the development and acquisition of mobile apps a more structured and simplified process.
True; Developing, acquiring, and managing apps has been revolutionized by app stores such as Apple's App Store and Google Play. Standardized development processes and app requirements allow developers outside Apple and Google to create new apps with a built-in distribution channel.
According to Oracle, about how often are data volumes doubling?
every 24 months
What is Web 2.0? How has the evolution of Web 2.0 affect how we interact with the web?
Web 2.0 is how technology and business has continued to interact and grow, such as having interactive websites. Web 2.0 has allowed us to be much more interactive with business, since we can now do everything from purchasing their products, to interacting directly with them/other customers through comments and reviews, and has made way for a larger scope of connectivity.
Which transmission media is most susceptible to environmental variables?
Wireless
Input device
keyboards, touch screens, card readers
ipconfig
lists a computer's network configuration
Which characteristics describe advantages of fiber networking? (Choose all that apply)
long-term cost, connection quality, security
Complete the following sentence: A database management system is considered ___________________ because it contains user data as well as the characteristics (metadata) of the structure and data stored in the database.
self-describing
Hard disk drive
slower permanent storage that uses spinning platters & a write/read head
velocity
speed at which data is entered into a system and must be processed
ping
test connectivity between two networked devices
CPU
the "brains" of the computer
Motherboard
the primary circuit board in a computer
Output device
touch screen, printer, speaker
Network adapter card
usually referred to as a NIC
variety
variations in the structure of the data to be stored
The three V's of Big Data refer to which of the following?
variety, velocity, volume
IoT
represents a collection of billions of devices that collect, share data
Discuss the role of ARPA in the development of what has become the Internet.
ARPA, along with 4 colleges on the west coast, worked to build an interconnected network that would allow them to send messages to each other through computers. This network was called ARPANET. They worked in creating packet-switching, which allowed for quicker connections among the computers. As time went on, this connection of devices grew to all over the country, mainly among universities and various companies, all over various networks. Eventually, these networks were streamlined in way so all sorts of computers and devices could be connected (the Internet), and became a public commodity.
List 2 advantages and 2 disadvantages of cloud computing.
Advantages include: -No software to install or upgrades to maintain. -Available from any computer that has access to the Internet. -Can scale to a large number of users easily. -New applications can be up and running very quickly. -Services can be leased for a limited time on an as-needed basis. -Your information is not lost if your hard disk crashes or your laptop is lost or stolen. -You are not limited by the available memory or disk space on your computer. Disadvantages include: -Your information is stored on someone else's computer. -You must have Internet access to use it. -You are relying on a third-party to provide these services.
Mobile apps that are downloaded to Android phones are obtained from the App Store.
False
NoSQL databases consist of tables, rows, and columns.
False (no predefined schema)
Which 3 platforms dominate the cloud services market?
Google Cloud, Microsoft Azure, Amazon AWS
A web browser uses which protocols to communicate with a web server? (Choose the best two answers)
HHTPS, HTTP
According to "Information Systems for Business and Beyond," what are the major components of an information system? (Choose all that apply)
Hardware, software, processes, people, data
Web pages are written in HTML. What does HTML stand for?
Hypertext Markup Language
Disadvantages of cloud computing include which of the following? (Choose all that apply)
requires good Internet bandwidth and speed, ongoing costs, limited control of infrastructure, security
Bluetooth
requires the 2 connecting devices to be paired
Hubs and switches can both be used to create networks.
True
IaaS (Infrastructure as a Service) refers to using cloud-delivered infrastructure. Examples include compute services as well as storage and backup services.
True
One advantage of fiber cabling is its immunity to EMI, or electromagnetic interference.
True
The "people" part of an information system includes Tier 1 and Tier 2 help desk workers, analysts, and developers.
True
variability
changes in meaning of data based on content
Complete the following sentence: A database management system utilizes a process known as _________________ to support multiple users simultaneously.
concurrency control strategies
Big Data technologies can be used as a _____________________ method to store and process large quantities of data.
cost reduction
nslookup
replies with the IP address of a given domain name
Advantages of cloud computing include which of the following? (Choose all that apply)
accessibility & pay-per-use, minimum management & cost, data backup & recovery, reliability
According to Friedman, which three technologies came together in the 1990s to create a platform for global collaboration?
build-out of the Internet infrastructure, proliferation of the graphical user interface, introduction of workflow software
tracert
replies with the intervening "hops" between two networked devices
This term BEST describes different Linux operating systems.
flavor
The three common types of NoSQL databases are:
graph, document, key-value
This component is designed for long-term non-volatile data storage:
hard drive, HHD, hard disk
The application that gets installed on a system that will enable the user to create virtual machines inside of it is called a . (one word)
hypervisor
In the SDLC methodology, end user training and documentation take place in which phase?
implementation
Removal media
often use a USB port to connect to a PC; UBS, hard drives
What term BEST describes a field or combination of fields that are used to uniquely identify a record?
primary key
volume
quantity of data to be stored
Which characteristics describe advantages of wireless networking? (Choose all that apply)
quick installation, initial cost
What tools are used in DevOps? (Choose all that apply)
virtual infrastructure, source code repository, test automation, pipeline orchestration, configuration management, build server
This term BEST describes a computer operating system that is running inside a virtualized environment.
virtual machine
Random Access Memory
volatile storage that is erased when the power is removed
Identify 3 functional roles that a server can provide.
web server, applications server, file server
Which type of malware can spread without the user having to do anything to introduce the malware into their computer system?
worm