Cumulative Exam 2 (Modules 4-6)

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following forms of intellectual property protection requires that the property be the subject of a nondisclosure​ agreement?

Trade secret

A foreign key is a field that links to a separate table.

True

Data governance encompasses an​ organization's policies and procedures through which data can be managed as an organizational resource.

True

Most Internet businesses do very little to protect the privacy of their customers.

True

OLAP enables users to view data from different perspectives.

True

Web beacons are​ tiny, invisible software programs hidden in email messages and web pages that are used to track and report a​ user's online behavior.

True

Linux is:

an example of open-source software.

Advertisers use​ ________ in order to display more relevant ads based on a​ user's search and browsing history.

behavioral targeting

The use of multiple computers linked by a communications network for processing is​ called:

distributed processing.

CVS refers​ to:

eyestrain related to computer display screen use.

A field that uniquely identifies each record so that the record can be​ retrieved, updated, or​ sorted, is known as​ the:

key field.

Each table in a relational database has one field designated as its​ primary:

key.

In the context of data​ mining, the term associations refers​ to:

occurrences linked to a single event.

Relational databases organize data into​ two-dimensional tables​ called:

relations.

In a relational​ database, the three basic operations used to develop useful sets of data​ are:

select, project, and join.

All of the following are examples of wearable computing devices except​:

smartphones.

Microsoft Excel is an example​ of:

spreadsheet software.

A website that uses cookies to monitor and track visitors to the​ website:

stores the cookie on the​ visitor's computer or mobile device.

According to​ ________, you should take the action that produces the least harm.

the risk aversion principle

All of the following are factors in U.S. federal sentencing guidelines with respect to business executives except​:

the use of technology to commit the crime.

Which of the following types of software directs a computer to complete a specific task for an end​ user?

Application software

Which of the following is used to predict when a computer hardware system becomes​ saturated?

Capacity planning

Which of the following protects the authors of a book from having their work copied by​ others?

Copyright law

Which of the following types of software organizes and manages​ data, such as data concerned with​ inventory, customers, and​ vendors?

Data management software

​________ is a feature of​ law-governed society and involves having laws that are known and​ understood, along with the ability to appeal to higher authorities to ensure that the laws are applied correctly.

Due process

Allowing departments to make their own software and hardware purchases increases efficiency and minimizes the need for centralized support.

False

Client/server computing is the most widely used form of centralized processing.

False

Due process is a feature of political systems and allows individuals to recover damages done to them by others.

False

Software used to create an invoice is an example of systems software.

False

Text mining is the discovery of useful patterns on the web.

False

XML is limited to describing how data should be presented in the form of web​ pages, while HTML can perform​ presentation, communication, and storage of data.

False

​Today, most system software is custom built by​ in-house programmers.

False

Which of the following best describes Immanuel​ Kant's categorical​ imperative?

If an action is not right for everyone to​ take, it is not right for anyone to take.

What type of device gathers data and converts them into digital form for use by the​ computer?

Input device

Which of the following best describes the importance of creating an accurate data model for your​ business's database?

It is​ critical, as without​ one, your data may be​ inaccurate, incomplete, or difficult to retrieve.

Which of the following allows the EU to enforce GDPR requirements with​ non-EU countries?

Privacy shield agreements

The obligations that individuals and organizations have regarding the preservation of existing values and institutions fall within which of the following moral dimensions of the information​ age?

Quality of life

Which of the following occurs when muscle groups are forced through tens of thousands of repetitions under​ low-impact loads?

RSI

Which of the following is a type of logical database model that treats data as if they were stored in​ two-dimensional tables?

Relational database

​A(n) ________ is a set of​ self-contained services that communicate with each other to create a working software application.

SOA

All of the following are tools or technologies that can be used to extract information from unstructured data sets except​:

SQL queries.

Data storage in smartphones and​ tablets, as well as many​ PCs, is based on which of the following​ technologies?

SSDs

Which of the following software tools would you use to prepare a​ what-if analysis?

Spreadsheet

Which of the following can be used to analyze direct and indirect costs to help determine the actual cost of a specific technology​ implementation?

TCO model

Which of the following statements about​ client/server computing is not​ true?

The bulk of processing occurs on the client.


Set pelajaran terkait

Abeka Grade 4 - History of Our United States -Chapter 2: The Years of Conquest (Chapter Checkup)

View Set

Saunders: Developmental Stages: End of Life

View Set

Chapter 20: The Progressive Era, 1890-1920

View Set