CS 101 Midterm 3 questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

8. A computer system with a knowledge base that can automatically make suggestions or decisions. This is called ____. a. Expert System b. DSS c. TPS d. MIS

a. Expert System

Which attribute would make the best primary key? a. Social security number b. Last name c. First name d. Age

a. Social security number

10. A system used to scan purchases at the point of sale would be considered a(n) ____ type of business information system. a. TPS b. DSS c. MIS d. ERP System

a. TPS

A traditional approach to data management means that ____. a. data files are created individually by each application b. data files are placed into objects c. data files are managed by the DBMS d. no data files are used

a. data files are created individually by each application

A DBMS is a(n) ____. a. interface between the database and application programs b. data repository c. knowledge base d. unique group of records

a. interface between the database and application programs

The most popular database model currently in use is the ____. a. relational model b. hierarchical model c. network model d. object model

a. relational model

Which of the following is NOT an advantage of the database approach to data management? a. Reduced data redundancy b. Data and program dependence c. Framework for program development d. Better overall protection of the data

b. Data and program dependence

A ____ provides a detailed description of all data used in the database. a. network model b. data dictionary c. data model d. schema

b. data dictionary

A(n) ____ is a generalized class of people, places, or things for which data is collected, stored, and maintained. a. record b. entity c. attribute d. file

b. entity

The ____ data model follows a treelike structure. a. distributed b. hierarchical c. network d. relational

b. hierarchical

12. A collection of related data fields is called a ____. a. byte b. record c. character d. bit

b. record

A file is a collection of related ____. A. characters B. fields C. tables D. records

D. records

Which of the following systems mimics human thinking? A) Artificial intelligence B) Intelligent agent C) Bot D) Database management system

A) Artificial intelligence

Which of the following is not one of the four types of database access? A) Compressed B) Distributed C) Individual D) Public E) Shared

A) Compressed Feedback: Correct: A) Compressed. Compressed is an adjective used to refer to data.

Which function in an organization plans for information resources? A) Data administration B) Database administration C) Knowledge Management D) Information Management

A) Data administration

What part of the database stores information about the data? A) Data dictionary B) Data depository C) Data warehouse D) Administrative data systems

A) Data dictionary

Which AI system will continue to analyze a problem until it finds the best solution? A) Genetic algorithm B) Neural network C) Intelligent agent D) Expert system

A) Genetic algorithm

Which AI system will work for you to find information on the internet? A) Intelligent agent B) Neural network C) Genetic algorithm D) Expert system

A) Intelligent agent

Which method of database recovery involves frequent simultaneous copying of the database to maintain two or more complete copies of the database? A) Mirroring B) Reprocessing C) Rollback D) Rollforward E) None of the above

A) Mirroring

What database key uniquely identifies a record within a table? A) Primary key B) Foreign key C) Secondary key D) Relational key

A) Primary key

Which of the following is NOT a component of security? A) availability B) disaster recovery plans C) encryption D) identification and access E) protection of software and data

A) availability

Which of the following is not a component of an expert system? A. Speech recognition B. knowledge base C. inference engine D. user interface

A. Speech recognition

If you were in operations, which type of computer based information system would you use? A. TPS B. MIS C. DSS D. ESS

A. TPS

Which of the following is not true of the traditional approach to information processing? A. There is common sharing of data among the various applications B. It is file-oriented C. Programs are dependent on the files D. It is inflexible E. All of the above are true

A. There is common sharing of data among the various applications

One of the following is NOT an objective of Phase 4 of the SDLC, system development. Which one? A. convert files to the new system B. acquire software C. acquire hardware D. test the system E. address the make-or-buy decision

A. convert files to the new system

_____ involves reading a program to make sure that it is error free and the logic works. A. desk checking B. debugging C. beta testing D. alpha testing

A. desk checking

Which of these methods or means is used to safeguard computer systems? A. facial recognition B. zombie C. adware D. worms E. Internet2

A. facial recognition

Java is a(n) ______. A. object-oriented programming language B. natural language C. markup language D. low-level language

A. object-oriented programming language

The ____ manager makes low-level decisions by following well-defined set of routine procedures A. operational B. tactical C. strategic D. executive

A. operational

The data storage hierarchy consists of: A) Bits, bytes, records, fields, files, and databases B) Bits, bytes, fields, records, files, and databases C) Bytes, bits, fields, records, files, and databases D) Characters, fields, records, files, and databases E) None of the above

B) Bits, bytes, fields, records, files, and databases

Which function in an organization manages information resources? A) Data administration B) Database administration C) Knowledge Management D) Information Management

B) Database administration

Which AI system provides a diagnosis to a specific problem? A) Intelligent agent B) Expert system C) Geographical information system D) Data mining system

B) Expert system

What database key links one table to another? A) Primary key B) Foreign key C) Secondary key D) Relational key

B) Foreign key

Which type of database organization allows a child record to have more than one parent record? A) Hierarchical B) Network C) Object-oriented D) Relational E) None of the above

B) Network Feedback: Solution: B) Network. Hierarchical databases also have the concept of parent and child records, but in hierarchical databases, a child record can have only one parent record.

What is a hybrid of a machine and an organism? A) artificial intelligence B) cyborg C) robot D) simulation device E) none of the above

B) cyborg Feedback: cyborg. A number of cyborgs, with electronic heart pacemakers, artificial joints, and implanted corneal lenses, are in existence today.

What would you call an interactive computer program that helps solve problems that would otherwise require the assistance of a human expert? A) artificial life B) expert system C) robot D) simulator E) Turing test

B) expert system Feedback: Expert systems are designed to be users' assistants to help them perform their jobs more easily.

The ___ test is used to determine if computers have achieved the level of human intelligence. A. Gunter B. Turning C. Singularity D. Rationality

B. Turning

A ___ is the smallest unit of data a computer can store in a database A. character B. bit C. field D. byte

B. bit

Which of the following is NOT an example of a computer crime? A. theft of time and service B. entering incorrect data C. pirating software D. online service fraud

B. entering incorrect data

One use of virtual reality is to build ___ and use them to train people in realistic situations. A. robotics B. simulators C. strong AL D. intelligent agents

B. simulators

What are the rules called that limit how data is entered into a database? A) Data restrictions B) Controls C) Constraints D) Database checks

C) Constraints

What are .bas, .doc, and .htm examples of? A) Databases B) Domains C) Extensions D) Protocols E) None of the above

C) Extensions

Generally, AI systems analyze imprecise and subjective information. This information is called _____. A) Blurred data B) Inclusive information C) Fuzzy logic D) Dirty data

C) Fuzzy logic

Which AI system finds and identifies patterns; for instance; in the words you use? A) Expert system B) Intelligent system C) Neural network D) Fuzzy logic

C) Neural network

Which method of database recovery involves undoing unwanted changes to the database, such as undoing a partially completed transaction interrupted by a power failure? A) Mirroring B) Reprocessing C) Rollback D) Rollforward E) None of the above

C) Rollback

What is the study of ways for computers to recognize and understand human language? A) artificial intelligence B) expert system C) natural language processing D) speech recognition E) Turing test

C) natural language processing Feedback: This is the study of ways for computers to recognize and understand human language.

What uses physical electronic devices or software to mimic the neurological structure of the human brain? A) artificial life B) cyborgs C) neural networks D) simulation devices E) none of the above

C) neural networks Feedback: neural networks. Neural networks use physical electronic devices or software to mimic the neurological structure of the human brain.

Which of the following is NOT a suggestion for preventing virus attacks? A) delete all email messages from strangers B) install an antivirus software on the computer C) open any mail attachments if the source is known D) scan the system regularly E) update the antivirus software regularly

C) open any mail attachments if the source is known Feedback: open any mail attachments if the source is known. Don't open an email attachment without knowing what it is. A virus could be present in the mail.

What would you call an automatic device that performs functions ordinarily executed by human beings or that operates with what appears to be almost human intelligence? A) computer B) inference engine C) robot D) simulation device E) none of the above

C) robot Feedback: robot. A robot is an automatic device that performs functions ordinarily executed by human beings or that operates with what appears to be almost human intelligence.

Which approach to artificial intelligence claims that computers can be made to think on a level that is at least equal to humans and possibly even be conscious of themselves? A) automated virtual representatives B) artificial life C) strong AI D) weak AI E) none of the above

C) strong AI Feedback: strong AI. Strong AI makes the claim that computers can be made to think on a level that is at least equal to humans and possibly even be conscious of themselves.

What are programs that help a database to be maintained by creating, editing, and deleting data? A. information manager B. data dictionary C. DBMS utilities D. report generator

C. DBMS utilities

A computer-based IS that provides a flexible tool for analysis and helps managers focus on the future is____. A. TPS B. MIS C. DSS D. ESS

C. DSS

One of the following activities is not an objective of Phase 1 of the SDLC, preliminary investigation. Which one? A. conduct preliminary analysis B. describe cost and benefits C. acquire new software and hardware D. submit a preliminary plan E. propose alternative solutions

C. acquire new software and hardware (CHECK ANSWER)

Which of these may be a felony? A. natural hazards B. profile theft C. cyberbullying D. software bug E. procedural errors

C. cyberbullying

Which of the following levels is not a management level? A. strategic B. tactical C. hierarchical D. operational E. all of these are management levels

C. hierarchical

Dirty data is ___ A. virus infected B. worm infected C. inaccurate, incomplete data D. stolen data

C. inaccurate, incomplete data

High level languages are converted into machine language and executed immediately using a(n) A. assembler B. compiler C. interpreter D. desk checker

C. interpreter

There are four basic ways of converting from an old system to a new system; which of these is not one of them? A. parallel B. direct C. preliminary D. pilot E. phased

C. preliminary

The ____ manager is concerned with long-range planning and decisions. A. operational B. tactical C. strategic D. principle

C. strategic

Which of the following areas of study is not included in AL? A. pattern recognition B. fuzzy logic C. transaction processing system D. natural language processing E. robotics

C. transaction processing system

Which of the following qualities are necessary for information to be "good'? A. concise B. complete C. verifiable D. current E. all of these

E. all of these

Which of the following describes old, obsolete electronic gadgetry? A. dirty data B. zombies C. e-dump D. e-waste

D. e-waste

Which of the following is a subset of a data warehouse? A) Relational database B) OLAP C) Intelligent Agent D) Data mart

D) Data mart

What type of a database is multidimensional, providing layers to tables? A) Multidimensional B) Network C) Hierarchical D) Data warehouse

D) Data warehouse

What is the final outcome of the data mining process? A) Data cleansing B) Data fusion C) Data sources D) Data warehouse E) Meta-data

D) Data warehouse Feedback: Solution: D) Data warehouse. The data warehouse is the result of gathering the data from several sources, fusing it together, cleansing it, and then combining the resulting data and meta-data.

Which of the following systems helps you with making a decision about a non-structured problem? A) Artificial intelligence B) Neural network C) Genetic algorithm D) Decision support system

D) Decision support system

What do you create when you need to pose a question to the database? A) Inquiry B) Rule C) Question D) Query

D) Query

Which type of database stores data in two-dimensional tables? A) Network B) Hierarchical C) Table D) Relational

D) Relational

Which of the following is NOT a level of the data storage hierarchy? A. bit B. byte C. record D. metadata

D. metadata

Which feature of a DBMS allows producing an on-screen or printed document from all or part of a database? A) access security B) data dictionary C) data recovery D) report generator E) utilities

D) report generator

What is defined as the development and study of machines that can perform work normally done by people? A) artificial Life B) microcomputing C) neural networks D) robotics E) none of the above

D) robotics Feedback: robotics. Robotics is the development and study of machines that can perform work normally done by people.

What is the abbreviation used for a software package that permits the users to create, retrieve and maintain records in a database? A. DASD B. FMS C. EMMS D. DBMS E. None of the above

D. DBMS

If you were in top management, which type of computer based information system would you use? A. TPS B. MIS C. DSS D. ESS

D. ESS

What is the six-phase problem-solving procedure for examining an information system and improving it? A. prototyping B. SDLC C. DATA flow diagram D. System analysis and design

D. System analysis and design

Third-generation programming languages include all the following languages except which one? A. FORTRAN B. BASIC C. COBOL D. XML E. C

D. XML

What is the first step in programming A. Documentation B. Coding the program C. designing the program D. clarify defining the program

D. clarify defining the program

Which of these is NOT a 4th generation (very high level) programming language? A. report generator B. query language C. application generator D. compiler

D. compiler

What is the process of removing errors and inconsistencies from data called? A. data manipulation B. data buffing C. data polishing D. data cleansing

D. data cleansing

Which of the following database models relates, or connects, data in different files through the use of a key, or common data element? A. hierarchical B. network C. object- oriented D. relational E. offline

D. relational

What is used to determine whether a computer possesses "intelligence" or "self-awareness?" A) genetic algorithms B) natural language processing C) pattern recognition D) simulator E) Turing test

E) Turing test Feedback: This test is intended to determine whether a computer possesses intelligence or self-awareness.

Which of the following is not an advantage of the data-base approach? A. elimination of the data redundancy B. ability to associate related data C. increased security D. program/data independence E. All of the above are advantages

E. All of the above are advantages

Which of these is an example of advance - fee fraud? A. zombie b. botnet c. phish D. evil twin attach E. Nigerian letter scam

E. Nigerian letter scam

All these are website markup or scripting languages except which one? A. Flash B. JavaScript C. HTML D. XML E. Visual BASIC

E. Visual BASIC

The most common type of computer criminal is a(n) A) Cracker B) Employee C) Hacker D) Professional E) None of the above

Feedback: Correct: B) Employee. One expert estimates that 75-80% of computer crime happens from the inside.

Individuals who infiltrate the files of the Social Security Administration are examples of: A) Hackers B) Information thieves C) Professional criminals D) Software pirates E) White-hat hackers

Feedback: Correct: B) Information thieves. Credit-card information is another target of information thieves.

The altering of data so that it is not usable unless the changes are undone is: A) Biometrics B) Compression C) Encryption D) Ergonomics E) None of the above

Feedback: Correct: C) Encryption.

Which area of AI is popular in helping consumers find online bargains? A) A-life B) Cyborgs C) Expert systems D) Genetic algorithms E) Neural networks

Feedback: Correct: C) Expert systems.

Which area of AI is relevant when analyzing the question of how long most people will wait for an elevator before getting antsy? A) A-life B) Expert systems C) Fuzzy logic D) Genetic algorithms E) Neural networks

Feedback: Correct: C) Fuzzy logic. The Otis Elevator Company, using fuzzy logic, determined that people would wait for an elevator for about a minute and a half.

Which area of AI is exemplified by drug implant systems such as those used with diabetic patients? A) A-life B) Expert systems C) Genetic algorithms D) Virtual reality E) Cyborg

Feedback: Correct: E) cyborg.

Incomplete, outdated, or otherwise inaccurate data is called: A) Dirty data B) Environmental blight C) Software bugs D) Techno-blight E) None of the above

Feedback: Solution: A) Dirty data.

Which area of AI research is composed of three parts-knowledge base, inference engine, and user interface? A) Expert system B) Fuzzy logic C) Natural language processing D) Neural network E) None of the above

Feedback: Solution: A) Expert system.

Which type of worm or virus is set to go off at a certain date and time? A) Logic bomb B) Macro virus C) Multipartite virus D) Trojan horse E) None of the above

Feedback: Solution: A) Logic bomb.

The cooperative university/business program to enable high-end users to quickly and reliably move huge amounts of data is: A) ICANN B) Internet2 C) NGI D) NII E) VBNS

Feedback: Solution: B) Internet2. The purpose of Internet2 is to enable a kind of "virtual university" via advancing videoconferencing, research, and academic collaboration.

Which of the following is a very popular query language? A) HTML B) Java C) SQL D) Visual Basic E) XML

Feedback: Solution: C) SQL (Structured Query Language). SQL is pronounced as "sequel."

Which area of AI is utilized by U. S. Postal service mail sorters when they read aloud an incomplete address, and are given a reply of the correct ZIP code? A) A-life B) Expert systems C) Genetic algorithms D) Natural language processing E) Virtual reality

Feedback: Solution: D) Natural language processing.

Which area of AI research projects a person into a sensation of three-dimensional space? A) Genetic algorithms B) Neural networks C) Robotics D) Virtual reality E) None of the above

Feedback: Solution: D) Virtual reality.

Which area of AI would utilize a head-mounted display? A) A-life B) Cyborgs C) Neural networks D) Virtual reality E) None of the above

Feedback: Solution: D) Virtual reality. The head-mounted display has two small video display screens, one for each eye, to create a sense of three-dimensionality.

Which area of AI is used by banks to spot irregularities in purchasing patterns within an individual account, which are often an indication of a stolen credit card? A) A-life B) Cyborgs C) Expert systems D) Genetic algorithms E) Neural networks

Feedback: Solution: E) Neural networks

Which type of worm or virus covertly places illegal destructive instructions in the middle of a legitimate program so that once you run the program, it can go to work? A) File virus B) Logic virus C) Macro virus D) Multipartite virus E) None of the above

Feedback: Solution: E) None of the above. The Trojan horse is the type of virus that covertly places illegal instructions in the middle of a legitimate program.

Which type of software is best used with specific questions to verify hypotheses? A) Data cleansing tools B) Data fusion tools C) Intelligent agents D) Multidimensional-analysis tools E) Query-and-reporting tools

Feedback: Solution: E) Query-and-reporting tools. Examples are Focus Reporter and Esperant.

Which feature of a DBMS allows the user to create, edit, and monitor data input? A) Access security B) Data dictionary C) Data recovery D) Report generator E) Utilities

Feedback: Solution: E) Utilities. Database utilities are programs that allow you to maintain the database.

Which of the following deals with the science of measuring individual body characteristics? A) antivirus software B) biometrics C) encryption D) hacking E) security

Feedback: biometrics. Biometric devices authenticate a person's identity by verifying his or her physical characteristics.

Which of the following is NOT an environmental problem caused by the digital age? A) disposal problems B) electricity demand C) environmental blight D) manufacturing by-products E) possible risks of nanotechnology

Feedback: electricity demand. The estimated electricity demand of computers is just 3 % of the total demand.

Which of the following is a kind of virus that attaches itself to files with extensions such as .com or .exe? A) file virus B) logic bomb C) macro virus D) multipartite virus E) Trojan horse

Feedback: file virus. File viruses start working when the program is run.

What term is used to denote a person who breaks into a computer system just for the challenge of it? A) cracker B) hacker C) script kiddie D) terrorist E) white-hat criminal

Feedback: hacker. In the positive meaning of the word, hackers are people who enjoy programming languages and computer systems.

Which of the following is a mental-health problem linked to information technology? A) alcoholism B) depression C) isolation D) suicidal tendencies E) none of the above

Feedback: isolation. Overuse of internet tends to isolate users from society, which affects their sense of well-being.

Which of the following is an impediment to productivity? A) cyber crime B) information C) misuse of technology D) security procedures E) training

Feedback: misuse of technology. Misuse of technology is estimated to be one of the major reasons for loss of productivity.

Which of the following is a hybrid virus that infects both file and boot sectors? A) boot-sector virus B) file virus C) macro virus D) multipartite virus E) Trojan virus

Feedback: multipartite virus. The multipartite virus infects both the files and the boot sectors, which makes it difficult to detect.

Which of the following is NOT a problem chemical in PC waste? A) cadmium B) chromium C) lead D) mercury E) nitrogen

Feedback: nitrogen. Nitrogen is an inert gas.

What are devices that represent the behavior of physical or abstract systems? A) artificial life B) cyborgs C) robots D) simulators E) none of the above

Feedback: simulators. Simulators are devices that represent the behavior of physical or abstract systems.

Which of the following is not an advantage of a DBMS? a. file sharing b reduced data redundancy c. increased data redundancy d. improved data integrity e. increased security

c. increased data redundancy

11. A(n) ____ is a set of integrated programs capable of managing a company's vital business operations for an entire multisite, global organization. a. TPS b. DSS c. workflow system d. ERP System

d. ERP System

9. An organized collection of people, procedures, software, databases, and devices used to provide routine information to managers and decision makers. a. Expert System b. ERP System c. TSP d. MIS

d. MIS


Set pelajaran terkait

Sadlier Vocabulary Level B, Unit 11

View Set

Imperialism in Africa Assignment and Quiz

View Set

DMS210-Suspect Abdominal Aortic Aneurysm-Study Questions

View Set

InQuizitive Chapter 16: Fiscal Policy

View Set

Chapter 8: Valuation of Inventories

View Set

Nutrition Exam 2 (Chapters 6,8,9,11,12,13,14)

View Set