IT Final 3

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

_____ is a high-level language that's friendlier and more natural than COBOL and FORTRAN.

BASIC

True or False: A compiler is a software tool that helps programmers find errors quickly and closely examine what's happening when a program runs.

FALSE

True or False: Database management systems don't include security measures to protect and safeguard data, because it isn't possible for anyone to gain unauthorized access to a database.

FALSE

True or False: In the worlds of business and technology, the term smart grid is used to refer to the merging of different technologies and industries to form a newer, better product or process.

FALSE

Which of the following is not one of the popular scripting languages?

Hypertext Markup Language (HTML)

Which of the following is a secure form of Hypertext Transfer Protocol (HTTP) that provides encryption for data sent through a web-based connection?

Hypertext Transfer Protocol Secure (HTTPS)

What does the abbreviation SQL stand for?

Structured Query Language

True or False: A report presents output from a data table or query in an easy-to-read format.

TRUE

True or False: The term risk refers to the likelihood of a security breach of systems or data that obtains, damages, or destroys assets.

TRUE

Third-party cookies are created by which of the following?

an ad on a site

Suppose that a hacker gains access to a hospital's patient records and exposes confidential medical information. The negative effects on the hospital's reputation and patient relationships that result are examples of damage to which of the following?

assets

In a relational database, a field is called a(n)

attribute.

The period during which the system is tested for errors and failures in operation is called

beta testing.

The term _____ was originally coined by Grace Hopper, the inventor of COBOL, to refer to a computer error.

bug

A(n) _____ operates one or more data centers, and organizations buy cloud capacity from it as needed.

cloud service provider (CSP)

Java has _____, which means it can run on nearly any operating system.

cross-platform compatibility

Which of the following terms refers to the activities performed with a database?

data processing

Which of the following methods can help reveal patterns and transitions that may be hard to see when reviewing numeric data alone?

data visualization

A person who plans and designs database systems is called a

database analyst.

The problem of redundancy can be avoided in backing up data by using _____ software, which examines the files and doesn't back up identical copies of certain folders and files multiple times.

deduplication

The functional specification states exactly what the information system must accomplish, and the _____ specification spells out how these goals will be reached.

design

Hand-eye coordination, which is related to tactile perception, is called

dexterity.

In a store or restaurant, the cash register system and supporting information system (IS) software and systems are commonly referred to as the

electronic point of sale system.

Suppose an auto manufacturer wants to upgrade its existing computer-integrated manufacturing system. To determine the likely size and cost of the project, the company will conduct a _____ study.

feasibility

A single value, such as an address, is an example of a _____ in a database.

field

Which of the following statements describes spoofing?

fooling another computer by pretending to send packets from a legitimate Internet Protocol (IP) address

A well-designed _____, like the one shown in this screen shot, provides the user with questions or prompts.

form

Many errors occur because the programmer was sloppy during the programming process. Programmers refer to this sloppy way of working as _____ code.

hacking

Performing a _____ wipes out everything on your device, returning the system to the exact state it was in when you got the device.

hard reset

A(n) _____ is sometimes called a software robot, or bot.

intelligent agent

A business's decisions and actions often depend on the decisions and actions of others; this fundamental business characteristic is termed

interdependence.

A database ____ can be used to identify a set of information and therefore provide a means of searching or sorting.

key

A(n) _____ is a programmer who specializes in building knowledge bases, each consisting of a set of rules that the computer will try to prove or disprove by asking a battery of questions.

knowledge engineer

Which of the following are first-generation programming languages?

machine languages

The IBM Watson supercomputer uses _____ to improve its performance in games of Jeopardy! played against humans.

machine learning

Using carbon _____ might make it possible to create more compact processors, which would operate much faster and conserve power.

nanotubes

In _____, a person might interact with a computer by speaking or typing sentences.

natural language processing

Which of the following is not a common type of data model?

personal

The IT staff performs _____ maintenance to increase the reliability and ease of maintenance of an information system.

preventive

Unlike a traditional computer, which operates based on binary on/off states, a _____ computer operates based on many superpositions of states.

quantum

A collection of related fields that describe a single entity, such as a place or event, is called a

record.

Tendinitis and carpal tunnel syndrome are two common types of

repetitive stress injuries.

The science of _____ involves creating machines capable of independent movement and action.

robotics

A(n) _____ uses a variety of techniques to collect product information from various online merchants, enabling consumers to compare prices for a particular product or type of product.

shopping agent

Typically larger and a bit more formal than a skunkworks, a(n) _____ occupies the forefront of research & development efforts for such companies as Alphabet Inc. and Facebook.

special projects lab

A(n) _____ operates as a security-hardened version of a standard operating system (OS); it isolates OS functions and restricts unauthorized access to key areas of the OS.

trusted operating system (TOS)

Depending on your cloud service, the _____ that's created might contain 25, 50, or more earlier versions of a file.

version history

A large online meeting that's usually attended by 100 to 1,000 individuals is called a

webinar.


संबंधित स्टडी सेट्स

LUOA Great Expectations: Quiz 14-15

View Set

Microbiology Final 2 (Chapter 11)

View Set

240 Vocabulary Words - Grade 3, Lesson 16, Content Words: Young Animals

View Set

HTTP and DNS Protocols Using Wireshark

View Set