CIS 1 Final
2
2
3
3
4
4
5
5
Because smartphone are computers and have many of the same security risks as computers you should have
Antivirus Software
In step in which the old IT system is converted to the new IT system is called the
Implementation step
The step in which the old IT system is converted to the new IT system is called the system
Implementation step of the SDLC
The roles of ensuring an organization's sensitive information is kept safe, keeping an organization's networks secure, and developing security measures for an organization's IS typically falls to the
Information Systems (information technology) Security manager
Computer hardware and software that an organization uses to increase it performance is referred to as its
Information Technology System
Because Object-C was difficult to write in, Apple developed
Swift
The first step in the program development life cycle is
"Defining the problem"
The bandwidth required by streaming video offered by companies like Hulu and Netflix made
Unlimited Data Plans
AJAX stands for Asynchronous JavaScript and
XML
Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ___
administrator
The second step of the SDLC process involves collecting data about existing hardware and software, analyzing this data, and preparing specifications for the system. This is called the system ___ step.
analysis
Large database, often called data banks, that cover particular subjects are referred to as
commercial database
A program that takes an entire program, check the source code for errors, and converts it into machine language is a ___ .
compiler
Stubhub uses a
complex database
A deliberate misuse of computers and networks via the internet that uses malicious code to modify the normal operations of a computer of network is called a
cyberattack
The third step of the SDLC has 3 phases, specifically, developing several system proposals, selecting the most feasible proposal, and reporting on the selected system to be developed. This step is called the system ___ step.
design
The "G" in 3g and 4g stands for
generation
A category of cyber terrorism that focuses on hacking computer systems for politically or socially motivated purposes is
hacktivism
Overheating, humidity, and magnetic fields can cause
hardware
Forms structure data input to help ensure data
integrity
The reliability and the accuracy of the information in a database is referred to as data
integrity
A virus written in a specific language and placed within a document or spreadsheet is called a
macro virus
Malware is short for
malicious software
In a relational database, ab important field that contains a unique value that identifies reach record as individual is the
primary key
After your phone's analog-digital converter chip changes the sound of your voice to a digital signal, the signal is enhanced by a digital signal ___
processor
In a relational database, such as Microsoft Access, a collection of related fields in a data file is called a
record
A type of malware that is triggered each time you boot your computer is called a
rootkit
Computer viruses typically must be
run
Amateur
script kiddies
Stored in temporary memory,
session cookies
Software that collects information about your internet surfing habits and behaviors is called
spyware
Because smartphones are easily misplaced or , it's good to have an app such as "Where's My Droid?"
stolen
Because of the significant costs of data packages and other smartphone expenses, calling and
texting charges tend to be
A programming design that breaks down a problem into a series of tasks is called
top-down programming
Based on current trends, it's likely that future apps will be more engaging and include more
video
The 3rd generation programming language that most students learned when most computers used MS DOS was
BASIC
When referring to management information systems, ESS stands for
Executive Support System
MMS
Multimedia Messages Service
JSON stands for JavaScript ______________ Notation
Object
The process used to develop and maintain an IT system is referred to as the SDLC. SDLC stands for the
System Development Life Cycle
Because it can store virtually unlimited amounts of data that can be shared across networks, and because the data can be kept far more accurately, a
database
A DBMS maximizes the benefits a database can provide DBMS stands for
Database Management System
The small computer within your phone that enhances the sound quality of your call is called a
Digital Signal Processor
The programming element above represents a
LOOP
The final step in the SDLC has two phases, a system audit and an evaluation phase. This final step is referred to as ___ the system.
Maintaining
When referring to buisness information technology, MIS stand for
Management Information System
Stored on a user's hard drive, a type of cookie that collects information about user preferences, password and username information, IP address, and data on web surfing behavior is referred to as a
Persistent cookie
The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the information system
Program manager
Converting a task into commands that a computer can use to perform the task is called ___ .
Programming
Instructions that allow a computer to be used are written using specific symbols, letters and numbers known as
Programming language or code
The shorthand that programmers use while building an algorithm is called
Pseudocode
The manufacturer of the Galaxy smartphone and the Note is
Samsung