IT 104 Final exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

One of the most widely used 3-D file formats for 3-D printers uses the _____ file name extension. .pdf .jpg .stl .docx

.stl

_____ is a risk mostly when working inside a computer and directly touching the circuit boards. Electrostatic discharge (ESD) Power conditioning (PC) Static conditioning (SC) Surge discharge (SD)

Electrostatic discharge (ESD)

True or False: Asymmetric encryption is also called secret key encryption. True False

FALSE

Query tools are used to design and test data tables in a database. True False

False

True or False: A database that combines relational and object-oriented database models is referred to as a combination database. True False

False

True or False: A worm is a malicious code string that attaches itself to an executable file so that the file becomes "infected." True False

False

True or False: All the businesses that sell their products and services at online shopping malls have their own online stores. True False

False

True or False: An OLAP cube structures data in a single dimension. True False

False

True or False: In deep learning, the computer learns using specific task algorithms rather than data representations. True False

False

True or False: Query tools are used to design and test data tables in a database. True False

False

A _____ cookie is created by the actual website a user visits. first-party global second-party third-party

First-Party

The abbreviation HaaS stands for _____ as a Service. Healthcare Help Hybridization Hardware

Hardware

A disaster recovery plan typically does not answer which of these questions? What storage-level appliances or drives will be used? Where will data backups be stored? What data backup procedures will be followed? How will users' identities be confirmed?

How will users' identities be confirmed?

Which of the following is not one of the popular scripting languages? Perl VBScript JavaScript Hypertext Markup Language (HTML)

Hypertext Markup Language (HTML)

Which of the following is a secure form of Hypertext Transfer Protocol (HTTP) that provides encryption for data sent through a web-based connection? Secure Sockets Layer (SSL) Transport Layer Security (TLS) Web-Based Encryption (WBE) Hypertext Transfer Protocol Secure (HTTPS)

Hypertext Transfer Protocol Secure (HTTPS)

Which of the following statements describes a Gantt chart? It's a pie chart with sections that show the various departments that will be involved in completion of a project. It uses plotted lines on a graph to show how work on a project will affect business over time. It uses vertical columns to show the costs of specific parts of a project in order from high to low. It uses horizontal bars on a timeline to show the stages and tasks in a project and the order in which they must be completed

It uses horizontal bars on a timeline to show the stages and tasks in a project and the order in which they must be completed

Which of the following statements describes a variable? It's used to perform actions in a sequence. It's a point where different actions may be performed depending on specific conditions. It allows a program to return to a previously executed instruction and repeat it. It's a data value stored in computer memory.

It's a data value stored in computer memory.

Which of the following converts general Java instructions into commands that a device or computer can understand? JavaScript Perl Swift Java virtual machine (JVM)

Java virtual machine (JVM)

_____ manufacturing involves correlating the date and time of the manufacture and delivery of a certain product to a customer's request. Just-in-time (JIT) Customer-specific (CS) On-time (OT) Supply chain (SC)

Just-in-time (JIT)

Which type of query command asks a database to return records that match specified criteria? QBE command ACCESS command SELECT command STRUCTURED command

SELECT command

Web pages are usually built with a combination of markup languages, such as Hypertext Markup Language (HTML), and _____ languages, such as JavaScript. machine code assembly applet scripting

Scripting

Which of the following is not one of the guidelines for using rapid application development (RAD) techniques? Rapidly prototype new projects to reduce redesign time. Use visual development (4GL) tools whenever possible. Approach coding with these priorities: use existing code first; buy someone else's existing code second; and write new code last. Show clients working software, not documents of how the software will work.

Show clients working software, not documents of how the software will work.

The term _____ refers to software that's delivered on demand from the cloud (the internet) via a web browser. Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Email as a Service (EaaS) Software as a Service (SaaS)

Software as a Service (SaaS)

A crash bug is one of the most dreaded types of run-time errors, because it causes a program to stop running, or crash. TRUE FALSE

TRUE

A backup appliance is a special computer system that's designed specifically for performing and storing backups. True False

True

An automated clearinghouse (ACH) is a type of automated banking network for transferring funds electronically from one account to another. True False

True

An expert system contains a knowledge base, which is a set of facts and rules about a specific complex application. True False

True

Depending on the type of business and customer needs, a company's supply chain may involve outside companies, such as a parts manufacturer or trucking company. True False

True

The terms 3-D printing and additive manufacturing refer to the same technology. True False

True

True or False: A program with style errors may run, but the errors will make the code bulkier, slower to execute, or more difficult to edit. True False

True

True or False: A single camera isn't good enough to simulate an eye; two cameras are needed to provide stereoscopic vision, which allows perception of depth and movement. True False

True

True or False: An automated clearinghouse (ACH) is a type of automated banking network for transferring funds electronically from one account to another. True False

True

True or False: An expert system contains a knowledge base, which is a set of facts and rules about a specific complex application. True False

True

True or False: Normalization is the process of structuring a database to avoid redundancy and undesirable dependencies. True False

True

True or False: The term risk refers to the likelihood of a security breach of systems or data that obtains, damages, or destroys assets. True False

True

True or False: Today, most organizations of all sizes use a computerized office information system (OIS) to manage a variety of tasks. True False

True

True or False: Visualization as a Service (VaaS) involves hiring an expert to transform data into stunning visuals. True False

True

Which of the following types of malware hides within a legitimate program or data file? a Trojan horse ransomware a boot sector virus a worm

a Trojan horse

What is a pure-play e-tailer? a company that can't sell its products and services over the web a company that sells its products and services both over the web and in bricks-and-mortar stores a company that has no bricks-and-mortar presence and therefore sells its products and services exclusively over the web a company that sells more of its products and services over the web than in bricks-and-mortar stores

a company that has no bricks-and-mortar presence and therefore sells its products and services exclusively over the web

Which of the following is not one of the elements of an effective acceptable use policy (AUP)? a policy statement that describes the computer services covered by the policy an "Acceptable Uses" section that clearly defines appropriate use a "Violations and Sanctions" section that tells users how to report violations and where to direct their questions a list of specific websites that may not be visited

a list of specific websites that may not be visited

What is a smart card? a plastic card that has all of a person's user names and passwords recorded on it a plastic card that's used to make purchases by drawing funds from a bank account a plastic card that contains a computer chip with stored information a plastic card that's used to purchase items on credit

a plastic card that contains a computer chip with stored information

What is a virtual server? a type of server that delivers content and services for a subscription fee a server that uploads backed-up data to the cloud a server accessed via a secure internet connection from the home, office, or anywhere else a server created by software rather than separate hardware

a server created by software rather than separate hardware

What is cloud storage? a saved list of songs that you can select and replay at a later time a set of programs for backing up your computer's contents a service that provides you with a set amount of file storage space in the cloud a free app for your tablet or smartphone that makes reading email easier

a service that provides you with a set amount of file storage space in the cloud

During the implementation phase of the software development life cycle (SDLC), the development team tests a(n) ______, which is a preliminary version of a software application. testing harness beta version upgrade alpha product

alpha product

Which type of data consists of letters, numbers, and sometimes special characters? Boolean alphanumeric numeric calculated

alphanumeric

Which of the following is not an example of a database object? a form a report an attribute a data filter

an attribute

What is a hologram? an interactive video that's viewable on certain types of mobile devices a type of movie that requires audience members to wear special glasses with red- and blue-colored lenses an image that's created using stereolithography and that sometimes employs robotic elements an image that's generally created by splitting laser light and that appears as a full 3-D image, either still or in motion

an image that's generally created by splitting laser light and that appears as a full 3-D image, either still or in motion

Small applications that can run on all types of computer operating systems are called functions. scripts. applets. compilers.

applets.

In a relational database, a field is called a(n) tuple. flat file. attribute. hybrid.

attribute.

People respond to audible cues about their surroundings without even thinking about them because of their _____ abilities. visual perception audio perception stereoscopic mental interface

audio perception

Public key encryption uses two encryption keys: a public encryption key, which all the _____ know, and a secret encryption key, which only the _____ know. authorized users; sender and receiver employees; customers senders; receivers managers; employees

authorized users; sender and receiver

You may not have to worry about backing up your computer at work, because many businesses have a(n) _____ that automatically backs up data files. restore system update system external storage system backup system

backup system

Many companies control employee access to secure areas using a _____, such as a voice, a fingerprint, hand geometry, facial geometry, a retinal pattern, an iris pattern, or a handwritten signature. smart card biometric identifier tracking system user name and password

biometric identifier

In the early phases of the system development process, a _____ defines the business problem and plans a solution. vendor analyst lead project manager business systems analyst software development analyst

business systems analyst

To show other users that a shared document is now available for them to check out and edit, you must _____ the document. restore replace check in check out

check in

When using the Microsoft SharePoint collaboration platform, you can _____ a document for editing. restore reserve replace check out

check out

A company with a hybrid cloud can meet spikes in demand using a technique called _____, in which the private cloud handles the average workload and the public cloud resources come online automatically to handle the extra demand or activity. cloud management supplementation cloud bursting cloud transitioning

cloud bursting

A(n) _____ operates one or more data centers, and organizations buy cloud capacity from it as needed. cloud service provider (CSP) information technology provider (ITP) network service provider (NSP) internet service provider (ISP)

cloud service provider (CSP)

The study and simulation of the human mind is called cognitive science. natural interface. cognitive discovery. behavioral science.

cognitive science.

A(n) _____ is an informational message inserted into the program source code. code editor comment bug interpreter

comment

Which type of check ensures that every required field in a record contains an entry, preventing data from being missing? completeness check range check consistency check alphanumeric check

completeness check

A can of _____ comes with a detachable thin plastic tube that allows directing the airflow precisely when cleaning inside the computer case. conditioned air compressed air system air air cleaner

compressed air

Suites of powerful applications designed specifically to help with project management, programming, user testing, and so on are referred to collectively as _____ tools. rapid application development (RAD) computer-aided software engineering (CASE) object-oriented programming (OOP) software development kit (SDK)

computer-aided software engineering (CASE)

A(n) _____ contains information about an individual's lifestyle and buying habits—information that marketers can use to effectively target buyers and sell their goods on the internet. consumer database e-commerce report consumer profile marketing strategy

consumer profile

About half of all high school students have reported being victims of _____, according to the National Crime Prevention Council. hate speech cyberbullying social media engagement pornography

cyberbullying

Microsoft Access includes a Compact & Repair database feature, as shown in this screen shot, to safeguard data and prevent data corruption. data redundancy. data updates. data integrity.

data corruption.

A system with high _____ provides more value to users than a system containing a large percentage of errors. redundancy data integrity database response time data corruption

data integrity

Which of the following terms refers to the activities performed with a database? data designing data specialization data management data processing

data processing

Numeric and alphanumeric are examples of _____, or types of information specific fields will hold. primary keys field names data types field sizes

data types

Because databases generally form the core of a company's information systems, _____—that is, operating and maintaining the database system—is an important IT function. database editing database monitoring database operations database administration

database administration

Many divisions of the US government make _____ available for free online, including through the portal Data.gov. field names metadata datasets data filters

datasets

A program that contains a(n) _____ statement, or point where different actions may be performed depending on specific conditions, will be more useful than one that simply follows a linear sequence of actions without variation. variable decision loop executable

decision

The problem of redundancy can be avoided in backing up data by using _____ software, which examines the files and doesn't back up identical copies of certain folders and files multiple times. authentication deduplication archive restoration

deduplication

Software _____ involves creating the higher-level software design and focusing on the broader planning and implementation steps for the system. development creation engineering expansion

development

Many music, video, and software distributors have focused on developing and implementing copy protection technologies called digital rights management (DRM). program copying prevention (PCP). new-age copyright management (NACM). Sony BMG

digital rights management (DRM).

When you use a(n) _____ to pay for a purchase, it automatically transfers the appropriate payment information to the retailer. virtual debit card digital wallet micropayment virtual credit card

digital wallet

Which type of database spreads data across multiple networked computers, allowing greater storage and cheap and easy expansion? operational database networked database hybrid database distributed database

distributed database

Programmers that break a large problem into several small pieces and then work on them one at a time are using the _____ approach. looping if-then linear sequence divide-and-conquer

divide-and-conquer

A password is considered strong if it's a common word, such as Password. easy to remember but hard to guess. easy to remember because it's obvious, such as a pet's name. hard to remember and easy to guess.

easy to remember but hard to guess.

One of the advantages of using _____ to exchange specially formatted business documents is that it automates repetitive business transactions, thereby lowering costs. automatic data interchange (ADI) virtual private networks (VPNs) supply chain management (SCM) electronic data interchange (EDI)

electronic data interchange (EDI)

To prevent people from spying on sensitive transactions, companies use data _____ to scramble information so it's unreadable before it's transmitted. verification corruption transmission encryption

encryption

Work-related injuries caused by stress and strain on the body, such as carpal tunnel syndrome, can be prevented by following _____ principles in the workplace. strengthening physical fitness ergonomic design efficient scheduling

ergonomic design

In which of the following environments is FORTRAN still commonly used? corporate headquarters colleges and universities factories and laboratories government agencies

factories and laboratories

Suppose an auto manufacturer wants to upgrade its existing computer-integrated manufacturing system. To determine the likely size and cost of the project, the company will conduct a _____ study. viability research practicality feasibility

feasibility

In _____, the file system saves multiple previous versions of a file. file versioning business-level public clouds conversations cloud storage

file versioning

A(n) _____ database is a traditional data file storage system that contains only one data table or file. multimedia object-oriented flat file relational

flat file

Which of the following statements describes spoofing? psychologically manipulating people into performing actions or divulging confidential information using or teaching hacking skills in order to be helpful and promote good security practices gaining entry to a secure computer system by finding a working user ID and password combination fooling another computer by pretending to send packets from a legitimate Internet Protocol (IP) address

fooling another computer by pretending to send packets from a legitimate Internet Protocol (IP) address

A well-designed _____, like the one shown in this screen shot, provides the user with questions or prompts. table form report database

form

Which of the following technologies uses a computer to create thousands or even millions of slightly varied designs and then tests and selects the best of them? cognitive science inference engine genetic algorithm data mining

genetic algorithm

People who attempt to gain access to a computer system are known as consumers. rogues. worms. hackers.

hackers.

Performing a _____ wipes out everything on your device, returning the system to the exact state it was in when you got the device. hard reset hard boot soft reset hard wipe

hard reset

Graphics designed especially for online use can contain _____, in which different hyperlinks are assigned to different spots on the graphic. modules animation placeholders hotspots

hotspots

Suppose that a hacker breaks into someone's computer and copies his or her social security number, address, and credit card information. This crime is an example of rogue hotspotting. identify theft. cyberwar. industrial espionage.

identify theft.

A(n) _____ enables the expert system to draw deductions from the rules in the knowledge base in response to user input. software robot genetic algorithm knowledge engineer inference engine

inference engine

A(n) _____ system collects, stores, and processes data that people in organizations use to manage daily and long-term operations and to create and sell various types of products. information hardware network technology

information

The cloud delivers services and stores, processes, and manages data using _____, such as servers and software, rather than _____. data centers; your local computer internet-based resources; your local computer your local computer; internet-based resources your local computer; data centers

internet-based resources; your local computer (correct)

A(n) _____ is the amount of energy required to sustain one watt for one second. joule amp ohm megawatt

joule

A database ____ can be used to identify a set of information and therefore provide a means of searching or sorting. key lock collection transaction

key

Which of the following technologies includes the use of smart medical devices, along with connected mobile apps and software, to enhance patient monitoring and healthcare? eHealth mHealth smart health smart grid

mHealth

Assembly language uses symbols and words to represent the elements of _____, making it possible for programmers to memorize them. numbers high-level programming languages engineering programming machine code

machine code

Which of the following are first-generation programming languages? assembly languages C++ and Java machine languages text-based languages

machine languages

Which of the following technologies uses sensors mounted around the skull to read the different types of waves or power spectrums the brain gives off? neural network natural interface speech recognition mental interface

mental interface

Using a(n) _____ approach to programming serves the purpose of making the code reusable and also helps in tracking down the sources of errors. modular structured object-oriented decoding

modular

A(n) _____ database uses a(n) _____ structure to organize data in three or more dimensions, as shown in this graphic. multidimensional; cube hybrid; model object-oriented; object multidimensional; block

multidimensional; cube

A(n) _____ database allows the storage of pictures, movies, sounds, and hyperlinked fields. multidimensional multimedia hybrid operational

multimedia

Imagine a computer that can read a set of news articles on any topic, understand what it has read, and write a report summarizing what it has learned. To do these things, the computer must have a machine language interface. neural network. fuzzy logic system. natural language interface.

natural language interface.

Related to perception, _____ deals with the science of moving a mobile robot through an environment. navigation locomotion dexterity hand-eye coordination

navigation

A _____, which simulates the physical workings of the human mind, is the ultimate attempt to model human intelligence. genetic algorithm neural network crossover fuzzy logic system

neural network

Cognitive computing, which is also called _____ computing, aims to mimic the functioning of the human brain through greater interconnectivity among memory, processors, and communications. neurosynaptic hybrid memory quantum core

neurosynaptic

A scripting language is a _____ language, meaning that it explains what the computer should do in English-like terms but not precisely how the computer should do it. nonprocedural assembly markup legacy programming

nonprocedural

A database that can be used by a retailer to track sales, update inventory records, and order more product is a(n) _____ database. distributed warehouse operational hybrid

operational

After an information system has been accepted and approved, _____ maintenance is performed to enhance the software to meet new requirements. preventive perfective adaptive corrective

perfective

Suppose the owner of a pet store wants to determine which brand of dog food has been the top seller over the day. Which type of system will provide this information? computerized sale (CS) system distribution logistics (DL) system point of sale (POS) system information system (IS)

point of sale (POS) system

The IT staff performs _____ maintenance to increase the reliability and ease of maintenance of an information system. perfective corrective preventive adaptive

preventive

A _____ is a statement promising that a website will protect the confidentiality of any information a customer reveals. nonviolation policy user policy privacy policy credibility policy

privacy policy

A cloud setup created for and used by a single organization is a(n) _____ cloud. internet hybrid private public

private

Searching for, finding, and purchasing materials, supplies, products, and services at the best possible prices and ensuring they are delivered in a timely manner is known as just-in-time (JIT) manufacturing. operational streamlining. procurement. supply chain management (SCM).

procurement.

Programmers use a(n) _____ to create a program. encrypted dialect programming language (correct) intelligent agent syntax

programming language

Virtual servers typically operate in a self-service fashion, allowing IT staff to add and remove new cloud services at will. This configuration or setup process is known as provisioning. virtualization. cloud computing. processing.

provisioning.

Unlike a traditional computer, which operates based on binary on/off states, a _____ computer operates based on many superpositions of states. cognitive quantum robotic neurosynaptic

quantum

To retrieve information from a database, the user generally creates a _____ and then runs it to display the results, or list of records that match the specified criteria. report primary key query record

query

Many warehouse systems use which of the following technologies to enhance inventory tracking and placement? office information system (OIS) radio frequency identification (RFID) vendor identification (VID) standard operating procedure (SOP)

radio frequency identification (RFID)

When multiple users attempt to edit an existing record in a database simultaneously, _____ prevents changes from being written to the database as a safety precaution. data corruption record locking remote access data integrity

record locking

In a(n) _____ database, fields with similar data can be connected between tables in the database, making it possible to retrieve data from the related tables. relational object-oriented flat-file operational

relational

When a company wants to hire a systems vendor or integrator, it sends out a _____ to one or more possible suppliers. project plan business system analysis request for proposal feasibility study

request for proposal

With a(n) _____, there's no need for physical hardware changes and no disruption to the app or service being delivered. scalable server network private cloud infrastructure

scalable server

A(n) _____ uses a variety of techniques to collect product information from various online merchants, enabling consumers to compare prices for a particular product or type of product. online shopping mall shopping agent online catalog e-tailer

shopping agent

A(n) _____ operation is a loosely organized team allowed to pursue extreme innovation—often operating not only outside the corporate rulebook but also in a separate location away from the main corporate campus. skunkworks top-secret research & development (R&D) elite

skunkworks

A cover that attaches with magnets to the side of a tablet and can be easily removed and replaced is called a _____ cover. plastic tablet snap smart

smart

Sensors such as power meters, voltage sensors, and fault detectors that gather data, along with digital communication capabilities that send the data to an operations center or other location, are examples of which type of technology? smart grid Bluetooth convergence internet

smart grid

The smart grid can work with a _____ to track electricity usage at a residential or commercial customer and transmit data to the energy supplier for billing and other purposes. Wi-Fi system consumer smart meter meter reader

smart meter

Performing a _____ corrects some types of errors but leaves your data and settings intact. hard reset system update soft reset reboot

soft reset

Typically larger and a bit more formal than a skunkworks, a(n) _____ occupies the forefront of research & development efforts for such companies as Alphabet Inc. and Facebook. special projects lab collaboration lab elite operations group project team

special projects lab

Which of the following technologies can be used to create more of a natural interface between humans and machines? speech recognition machine learning virtual reality neural networks

speech recognition

Chapter 10 states that a simple decision support system (DSS) can be created using a _____ program. spreadsheet word-processing database presentation

spreadsheet

A set of instructions that describes how to perform a task is referred to as a(n) standard operating procedure (SOP). data-modeling procedure (DMP). electronic data-processing procedure (EDPP). connectivity procedure (CP).

standard operating procedure (SOP).

Using the _____ technique, a programmer thinks in terms of creating groups of instructions, rather than simply executing lines one after another and writing code line by line. rapid application development (RAD) structured programming modular code object-oriented programming (OOP)

structured programming

Which device is basically an extension cord with multiple plugs on it but contains a metal oxide variable resistor that can absorb any excess power during a surge or spike, preventing it from reaching the plugged-in devices? power strip spike protector power adapter surge suppressor

surge suppressor

What is coding? a process for developing a group of programming languages at the same time an approach to problem solving the act of writing source code the cycle followed in releasing new versions of products

the act of writing source code

A(n) _____ is someone or something that can compromise or harm the assets of a business or individual. fraud threat cybercrime attack

threat

What is the purpose of performing adaptive maintenance on an information system? to identify and fix errors to increase reliability and ease of maintenance to address other environment changes to enhance the software to meet new requirements

to address other environment changes

Why does the IT staff perform corrective maintenance on an information system? to address other environment changes to enhance the software to meet new requirements to identify and fix errors to increase reliability and ease of maintenance

to identify and fix errors

The term tactile perception refers to which sense? sight taste touch hearing

touch

True or False: A program can interrupt a looping pattern by using an if-then statement based on a particular action. True False

true

True or False: Users and companies weigh how much work it takes to back up their data against how much they would suffer if they lost their data when determining an appropriate backup frequency for their systems. True False

true

A(n) _____ operates as a security-hardened version of a standard operating system (OS); it isolates OS functions and restricts unauthorized access to key areas of the OS. electronic data interchange (EDI) digital signing service (DSS) automated clearinghouse (ACH) trusted operating system (TOS)

trusted operating system (TOS)

A(n) _____ is a combination surge suppressor, power conditioner, and battery backup. uninterruptible power supply (UPS) shutdown backup device (SBD) portable power supplier (PPS) power providing device (PPD)

uninterruptible power supply (UPS)

Most computers come with a basic one-year _____ against manufacturing defects for no additional charge. breakage insurance plan premium support plan warranty extended protection plan

warranty

A large online meeting that's usually attended by 100 to 1,000 individuals is called a video link. webinar. conference. web chat.

webinar.


संबंधित स्टडी सेट्स

AP Psychology Chapter 4: The Developing Person

View Set

exercise preparticipation health screening

View Set

Contemp Issues In Education: Final Review

View Set

The American Pageant Study Guide Chapter 35 APUSH

View Set

Alterations in Genitourinary Function

View Set

Contract law-Chapter 1-Bilateral and Unilateral contracts

View Set

Chapter 33: Coronary Artery Disease and Coronary Syndrome

View Set

MEDICAL OFFICE MANAGEMENT TEST #3

View Set

science portion (scientific reasoning ... 7 questions on this area)

View Set

Emergency Management Chapter 1-3

View Set