COB 204 test, Cob test, 10

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Where do we "convert our human intentions and questions about the data in a code that the database engine understands"? database application back end application query table

database application

Microsoft Access is a _______________________. front end application query knowledge center database management system

database management system

The database application, the database engine, and the database itself can be packaged into a single application called a _______________________. front end system query system knowledge center database management system

database management system

Flexible, informal, and adaptive processes that normally involve strategic and less structured managerial decisions and activities are _________ processes. structured dynamic

dynamic

A transistor is responsible for creating binary digits or "bits", always represented as a ___ or a ____. KB, MB 0, 1 a, b -1, +1

0, 1

How many exams are scheduled for this course? 1 2 3 4

3

What is the advantage of having a "quad-core" computer system over a single-core one? It makes your computer compatible with a wider variety of computer applications. It allows your computer to be connected to multiple displays. A "quad-core" enables the computer to mutlitask, i.e., to process multiple tasks or process large tasks more efficiently. A quad-core system is actually less efficient.

A "quad-core" enables the computer to mutlitask, i.e., to process multiple tasks or process large tasks more efficiently.

What does the term "quad-core" refer to? A processor or CPU RAM Storage Bits

A processor or CPU

A protocol is ____________. A device that handles the switching of voice and data in a local area network. A standard set of rules and procedures for the control of communications in a network. A communications service for the connection of devices in a local area network. The main communications channel in a wide-area network.

A standard set of rules and procedures for the control of communications in a network.

Abstract Reasoning

Ability to make and manipulate models

Systems Thinking

Ability to model components in a system

A computer is made up of which components? Computer Unit or CPU Monitor or Display Operating System All of the above

All of the above

The Five Component Framework indicates the elements of an information system. Of the options below, which is the best explanation for how organizations use it? As a checklist to make sure their information systems include all necessary elements. As a roadmap for moving work from computers to people. As a mental model for automating tasks by moving them from people to computers. This is a model used only by systems engineers.

As a mental model for automating tasks by moving them from people to computers.

PCs emerged in the 1980s and cell phones emerged in the 1990s.

Bell's law

Which of the following is "an elementary description of things, events, activities, and transactions that are recorded, classified, and stored but are not organized to convey any specific meaning." Data Information Knowledge Infrastructure

Data

________ is installed in special, read-only memory in devices like printers or communication devices. Vertical-market software Application software Firmware Operating system

Firmware

The following image was discussed in the first class and is included in the COB204 Introduction PowerPoint file uploaded into the Canvas modules. In the context of the course, the illustration represents _____________ when compared to simply the presentation of the number, "218,000,000."

Information

In the business process model below, there is an empty diamond or "decision gateway." Which of the following items would be the most appropriate for that decision gateway? Give guest a room key Reservation data is sent to database Is there a reservation in the system? Decision gateways are always blank.

Is there a reservation in the system?

Using the work of another COB 204 student -- current or former student -- as your own work is a violation of which policy? Attendance Administrative Drops JMU Honor Code Grading Errors

JMU Honor Code

Because we are inundated with data, we need to determine what is important and what we can ignore. Therefore, one of the qualities of data is __________. Accurate Timely Relevant Just barely sufficient

Just barely sufficient

"Projection: The growth in the computer systems industry will continue to grow due to more cloud computing, increase in overall employment, and increase in number of cyberattacks." In the context of this course, this statement illustrates which of the following? Data Information Knowledge Business Intelligence

Knowledge

The cost of storing data is approaching zero.

Kryder's Law

Which of the following is an example of an open source operating system? MS Office Apache MySQL Linux

Linux

A(n) _____ connects two or more devices in a limited geographical area in which multiple devices could be connected over several hundred feet and for multiple users. Local area network Wide-area network Personal area network Enterprise network Value added network

Local area network

Experimentation

Making a reasoned analysis of an opportunity

The operating system is essential for running your computer and can be thought of as the: Master program Optional software Minimum requirements Computer library

Master program

As more users gained access to the Internet, the more valuable it became.

Metcalf's Law

Which of the following is an example of an application program? Unix Linux Windows Microsoft Word

Microsoft Word

The cost of computer processing is decreasing rapidly.

Moore's Law

What is a "collection of individual data items that are stored in a highly structured way that represents a model of reality"? entity table database DBMS

database

The purpose of a ___________ is to connect a computer's or printer's circuitry to network wires. port switch router NIC

NIC

Due to substantial increased network connection speeds, we see new companies, products and platforms will emerge.

Nielson's Law

In-class activities are completed in class. Are you allowed to make up in-class activities? No, I am not allowed to make up in-class activities. Yes, I am allowed to make up in-class activities.

No, I am not allowed to make up in-class activities.

____________ and _____________ are used to match records among database records. Primary Keys, Foreign Keys Columns, Fields Reports, Queries

Primary Keys, Foreign Keys

In the image below, what does the diamond shape mean in the context of Business Process Modeling Notation? Start End Question or Decision Gateway Data

Question or Decision Gateway

In an average laptop manufactured within the past 2 years, which of the following piece of hardware is most likely to be described as 4GB? RAM CPU Hard Drive BI/OS

RAM

According to the table in the Syllabus, which of the following groups of items are typically considered Homework Assignments? Exams, Projects, Papers Business Intelligence Tests None Correct! Readings, Online Quizzes, Access Project, Sharepoint Project

Readings, Online Quizzes, Access Project, Sharepoint Project

The language used to instruct the database management system, create new tables, insert and update data, and retrieve information from across multiple tables is called _______________. DBMS BI MySQL SQL

SQL

On what day is the Final Exam for this course scheduled? Thursday, December 7 Saturday, December 9 Tuesday, December 12 There is no final exam

Saturday, December 9

Volatile storage means that data will NOT be lost when the power is shut off. data WILL be lost when the power is shut off. the data is "frozen" in place even when the power is off. data is created when the power is off.

data WILL be lost when the power is shut off.

Metadata is/are ________. codes used for server-side processing error logs of databases data that describes data data that are encrypted more important data

data that describes data

Both servers and personal computers can be virtualized. True False

True

Every record in a data table has an identical structure. True False

True

Information Systems can function across multiple organizations and groups such as suppliers and customers. True False

True

One of the most important practices around creating a relational database is structuring the data in a very coordinated way. True False

True

The 5-component framework is common to all information systems, from the smallest to the largest. True False

True

The Internet is an example of a wide-area network. True False

True

Virtualization allows one machine to have different operating systems running simultaneously. True False

True

Collaboration

Two or more people working together to achieve a common goal

If you were asked to install wire to connect computers, printers, switches and other devices in a LAN, you would probably use ________________. Coaxial cable Fiber optic UTP Telephone cable

UTP

Which of the following types of wire is also referred to as "ethernet cable"? Coaxial Unshielded Twisted Pair Fiber

Unshielded Twisted Pair

Which of the following statements is true of firmware? The software is coded differently from other software. Firmware cannot be changed or upgraded Firmware is the same as system cache. Users do not need to load firmware into a device's memory.

Users do not need to load firmware into a device's memory.

Computers that reside in different geographic locations are physically connected through a(n) ________. WAN LAN URL IP address

WAN

When should you use a database application instead of a spreadsheet application? When you have more than 60,000 rows of data that has been collected from different people. When you have multiple themes in the data and need forms, queries and reports. When the spreadsheet analysis tools are too slow. When you want to publish the data to the Web.

When you have multiple themes in the data and need forms, queries and reports.

What is one difference between RAM and hard disk storage? There is no difference. When you turn off the computer, data will disappear from RAM, but data stored on the hard disk will remain intact. One can be replaced and one cannot. One is measured in terms of GB and the other in terms of MB.

When you turn off the computer, data will disappear from RAM, but data stored on the hard disk will remain intact.

Virtualization is often used to save money. save space. reduce heat. all of the above.

all of the above

A(n) ____________ is a characteristic of an entity, for example, a name or address. table record attribute Primary Key

attribute

In a database, vertical columns are called _______________________ and horizontal rows are called __________________. attributes or fields; records records; attributes, values or fields columns; rows none of the above

attributes or fields; records

The term "open source" means that the source code of the program is ________. less stable and platform dependent available to the public available for licensing if desired available only to carefully vetted contractors

available to the public

Thin-client applications are limited by the capabilities of the ________. browser programing language hardware operating system

browser

A network of activities that generate value by transforming inputs into outputs is a(n) ___________. dynamic process information system competitive strategy business process

business process

Bits are grouped into 8-bit chunks called ________. switches strings bytes nibbles

bytes

The ________ is called the "brain" of the computer. random access memory read only memory storage hardware central processing unit

central processing unit

Business executives are always trying to find new ways to integrate information technology into business processes to sustain __________________. job security competitive advantage strategies knowledge

competitive advantage

Processes that span an organization and support activities in multiple departments are _____________ processes. enterprise inter-enterprise

enterprise

Which of the following devices is an example of a storage hardware device? printer central processing unit external hard drive random access memory

external hard drive

In Access, columns are called _______________ columns fields records files

fields

Tablets (such as iPads), SD memory cards (such a for a camera), and USB drives use solid state or _________ memory. This type of memory differs from main (RAM) memory in that it "freezes" data in place. This type of non-volatile memory allows for quick access to the data. server binary flash volatile

flash

A ________ is equivalent to 1,024 megabytes. kilobyte gigabyte terabyte megabyte

gigabyte

In the process of virtualization, one machine has the appearance of multiple machines. The "real" operating system is called the _______, which is a platform for other operating systems, which are called __________. primary; secondary virtual machine; hosts host; virtual machines non-mobile; mobile

host; virtual machines

Microsoft SQL Server, Oracle, IBM's DB2, PostgreSQL and MySQL are database systems that run in a larger server environment on your computer's desktop

in a larger server environment

A(n) _________________ exists when data are isolated in separated information systems. Enterprise systems help address this problem. dynamic process inter-enterprise silo information silo functional process

information silo

Computer hardware consists of electronic components and related gadgetry that _______, ________, _________, and store data. port, operate, serve read, write, delete create, copy, paste inputs, processes, outputs

inputs, processes, outputs

A business process includes three fundamental elements: hardware, software, procedures TSP, ERP, BI activity, decision, product inputs, resources/processing, outputs

inputs, resources/processing, outputs

Processes that span two or more independent organizations are ___________ processes. enterprise inter-enterprise

inter-enterprise

NIC stands for network ______________ card. internet intranet invisible interface

interface

A private internet that is used exclusively within an organization is called a(n) ________. Ethernet intranet cloud server

intranet

According to our textbook (Kroenke & Boyle, 10th Edition), a database is "a self-describing collection of integrated records." What makes a database "self-describing"? its file name its attributes its metadata its data

its metadata

Which of the following is an output device? monitor mouse plotter bar code scanner

plotter

The random access memory is called the ________ memory of a computer. non-volatile hard disk main only

main

Which of the following components is used during the processing stage of computing? UPC reader main memory printer bar code scanner

main memory

The CPU reads data and instructions from the __________ memory. It can access data and instructions faster from the _________, a special type of this memory. volatile, non-volatile permanent, temporary dual, quad main, cache

main, cache

Which of the following is an input hardware device? plotter mouse projector printer

mouse

A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly. database application network server

network

Microsoft Access, FileMaker Pro, and Base are database management systems that run in a larger server environment on your computer's desktop

on your computer's desktop

iOS and Android are examples of ... operating systems for mobile devices Apple operating systems operating systems for servers applications

operating systems for mobile devices

Windows 10, Mac Sierra, and Linux are all examples of ____________ enterprise resource plannng systems. social media information systems. operating systems. memory systems.

operating systems.

The five components of a an information system include hardware, software, data, procedures, and __________________ value chains people margins job skills

people

Maria creates a relational database to keep track of cars in her repair shop. She stores information about each car in the "vehicle" table, and creates a column labeled "vehicle_ID" where she stores the vehicle VIN number. The "vehicle_ID" column is referred to as a ________. primary key key attribute foreign key functionally dependent record secondary key

primary key

SQL is a(n) ________________ to build relational databases. server program application output programming language

programming language

Microsoft Word, Adobe Photoshop, and Microsoft Excel are examples of ___________ proprietary application software. server software. enterprise resource planning software. cache software.

proprietary application software.

A ____________ is a way of asking questions about our data. query report table form

query

In Access, rows are called _________ columns fields records files

records

"Multiple data tables that refer to one another in order to store lots of information about a single entity" describes a _______________ database. query relational multi-dimensional singular

relational

Which of the following likely requires a server farm? creating an Access database searching through millions of documents finding the sum of 1000 values supporting a campus network environment

searching through millions of documents/supporting a campus network environment

MIS is the management and use of information systems that help organizations achieve their __________. strategies profit ability to experiment automation

strategies

A ________ is a special-purpose computer that receives and transmits wired traffic on the LAN. codec modem switch router

switch

A client-server application that requires nothing more than a browser is called a ________. thick-client application desktop application firmware thin-client application

thin-client application

A __________ is often described as a light switch that is either on or off, or a gate that is open or closed. transistor battery BI/OS CPU

transistor

RAM is considered _________ and hard disk storage is considered ________. dual, quad non-volatile, volatile volatile, non-volatile permanent, temporary

volatile, non-volatile


Set pelajaran terkait

Chapter 3: Hitler's Foreign Policy

View Set

Chapter 26: Growth and Development of the Toddler

View Set

Legal Environment of Business Test #1 Questions

View Set

Chapter 15: Injuries to Muscles and Bones

View Set