Exam 4

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following is NOT true about OOP languages?

A disadvantage of OOP is that you cannot reuse or modify existing objects

Which of the following is NOT true about NFC?

For successful communications, the devices must not touch or come within 6 inches of each other

Mapping, monitoring speed, and determining altitude all are uses of ______.

GPS

______ information is available when the decision maker needs it.

Accessible

______ information is error free.

Accurate

Which of the following is NOT true about web application development? Group of answer choices

HTML uses a set of codes called tags to instruct a browser how to structure content (wrong)

Which of the following is responsible for answering technology-related questions?

Help desk technician

Which of the following is NOT an advantage of the database approach?

Improved data integrity (wrong)

Which of the following is NOT true about use of unlicensed software?

In most cases, the software owner can make as many copies as desired

While working as an assistant in an IT department, you have been taking classes in information and systems security. You meet with a career counselor to discuss potential jobs. One of the jobs available at your current company is for a digital forensics analyst. What skill will you need to have to apply for the job?

Inspect electronic data to recover documents and files

While working as an assistant in an IT department, you have been taking classes in information and systems security. You meet with a career counselor to discuss potential jobs. One of the jobs available at your current company is for a network security administrator. What skill will you need to have to apply for the job?

Inspect electronic data to recover documents and files (wrong)

Which of the following is NOT an activity in the implementation phase?

Install and test the new system (wrong)

Which of the following best describes the role of a CRM specialist?

Integrates apps and data to provide an application that manages a company's relationship with customers

Which of the following is NOT one of the three general guidelines for system development?

Involve users (wrong)

______ data is stored in separate files in different departments.

Isolated

Why would a field that contains numbers have a text data type?

Because the values will not be used in calculations.

Which of the following is most likely to be used by a remote control?

Bluetooth (wrong)

Which of the following creates logs, documentation, and recovery plans based on cybersecurity threats and incidents?

Computer security incident responder

During which phase of system development would you acquire any necessary hardware and software?

Design

Which of the following MIS reports usually lists just transactions?

Detailed

WiMax and UMB are competing standards for ______.

LTE

Which of the following best defines big data?

Large-scale data sets that require advanced technologies

A city or town likely uses a(n) ______.

MAN

Which of the following is most likely to be used for mobile phone payments?

NFC

To enable a compute or device that does not have built-in networking capability, use a(n) ______.

NIC

Which of the following serves as an interface between programmers/developers and management?

Network engineer (wrong)

Which of the following best describes the role of a UX specialist?

Plans and designs software and apps that consider a user's reaction to a program and its surface

Which of the following MIS reports usually includes tables and graphs?

Summary

Which of the following is responsible for designing and developing information systems? Group of answer choices

Systems analyst

Which of the following is responsible for installing and maintaining operating system software?

Systems programmer

A(n) ______ is a third-party business that provides network services.

VAN

Which of the following jobs might use Google Cardboard to create storytelling tools?

VR engineer

______ compares data with a set of rules or values to determine if the data meets certain criteria.

Validation

______ information can be proved as correct or incorrect.

Verifiable (wrong)

You have taken a new job as a network administrator. Although you have been an IT professional within your organization for a number of years, this particular responsibility is a new one for you, so you have been studying network standards and protocols. You learn that all of the following are true about TCP/IP EXCEPT:

When a computer sends data over the Internet, the data is grouped into a single packet.

Which of the following best defines throttling?

When a network reduces upload and download speeds of high-data users at peak times

Which of the following best describes jailbreaking?

When a user makes unauthorized modifications to a device's operating system

Which of the following best defines Bluebugging?

When cyberthieves exploit Bluetooth devices that are paired.

802.11 is a series of standards to identify ______ networks.

Wi-Fi

Which of the following is NOT true about Wi-Fi networks?

Wi-Fi accesses the network in conjunction with the TCP/IP standard (wrong)

Gantt and PERT are types of ______ used to plan and schedule time relationships among project activities.

charts

A(n) ______ engineer develops AI-based machines and programs.

cognitive

Some web databases are ______ databases, where users store and share media with other registered users.

collaborative

Experian, Equifax, and Transunion are all types of ______ companies.

credit reporting

A data ______ contains data about each file in the database and each field in those files.

dictionary

A(n) ______ is the smallest unit of data a user accesses.

field

Which of the following is another term for a JAD session?

focus group

Data analysis certifications often contain the word ______ in their title.

forensics

Many programs today use ______ on a webpage as their front end.

forms

Home and small business users purchase ______ T1 lines, in which they share a connection with others.

fractional

A(n) ______ system is a set of hardware, software, data, people, and procedures that work together.

information

A(n) ______ translates and executes one instruction at a time and converts it to machine language.

interpreter

You recently started a new job working with databases. You receive training on maintaining the database from your boss, Gregor. Gregor tells you that when a DBMS flags a deleted record, ______.

it is deleted logically

You have been chosen as a teaching assistant in your networking class. Your instructor asks you to prepare a presentation on network standards. You mention in your report that IrDA uses ______ to transfer data wirelessly.

light waves

Detailed analysis sometimes is called ______ design.

logical

File ______ refers to the procedures that keep data current.

maintenance

You are about to finish your degree in technology and are beginning your career search. You want to narrow down the fields in which you will look for a job. If you decide you want be involved in planning, research, development, evaluation, and integration of technology, you should look for jobs within the ______ area.

management

CAM and MRP are examples of information systems used in ______.

manufacturing

Cisco certifications that test knowledge of installing, configuring, operating, and administering ______.

networks

Which data type sometimes is called BLOB?

object

Client/server and P2P are two types of network ______.

operating systems (wrong)

A(n) ______ is an item that contains data, as well as the actions that read or process the data.

record

In a(n) ______, the DBMS uses the log to reenter changes made since the last save or backup.

retroactive backup (wrong)

A(n) ______ device initiates an instruction to transmit data, instructions, or information.

sending

The field ______ defines the maximum number of characters a field can contain.

size

A mobile ______ integrates and expands the company's initiatives for mobile users.

strategist

In some database programs, a data file is referred to as a(n) ______.

table

An RFID reader is also called a(n) ______.

transceiver

Transmission from an earth-based station to a satellite is a(n) ______.

uplink

You have been chosen to be a teaching assistant in your database course. The instructor asks you to prepare a presentation on Big Data. Data ______ is the process of presenting data graphically as charts, maps, or other pictorial formats.

visualization

Which generation was the first to introduce MMS?

2G (wrong)

Which type of system enables and manages the publishing, modification, and access of various forms of documents and other files on a network or on the web?

CMS

______ information is useful only within a specific time period.

Timely

For what purpose would a company use an extranet?

To allow customers or suppliers to access part of its intranet.

What is the purpose of ANSI and IEEE?

To propose, develop, and approve network standards

For which of the following purposes would a business use EDI?

To send bids and proposal

Which of the following is NOT true about DSSs?

A DSS uses data only from internal sources.

Which of the following best describes the function of a TPS?

A TPS captures and processes data from business activities

Which of the following is another term for transmission media?

Communications channel

______ is currently the most popular network standard for LANs.

Ethernet

Which of the following MIS reports identifies data outside of a normal condition? Group of answer choices

Exception

______ transmission often is called fixed wireless.

Microwave

You have taken a new job as a network administrator. Although you have been an IT professional within your organization for a number of years, this particular responsibility is a new one for you, so you have been studying network standards and protocols. You learn that all of the following are true about token ring networks EXCEPT:

More than one token can exist on a token ring network.

Which of the following is NOT true about technology certifications?

Most certification programs require academic coursework

Each computer or device on a network is called a(n) ______.

Node

Which of the following best describes function creep?

When a company uses the technology intended for one purpose for a different purpose

Skype and FaceTime are examples of ______ services.

VoIP

You have been chosen to be a teaching assistant in your database course. The instructor asks you to prepare a presentation on Big Data. Which of the following is NOT one of the three V's of Big Data.

Volatility

The Internet is the world's largest ______.

WAN

A(n) ______ database is a huge database used to analyze transactions.

data warehouse


Set pelajaran terkait

Course Planning Assignment - Quiz

View Set

Le Maghreb-les pays et les capitales

View Set

4- Lecture Test #4: Ch 20 Urinary and 21 Fluid Balance

View Set

AWS Academy Cloud Architecting [2606] - Module 9 Knowledge Check

View Set

Computer Forensics Test 1 (Chapters 1-4) Review Guide

View Set

LA CULTURA GALLEGA EN ESPAÑA + UN VISTAZO A ESPAÑA CENTRAL

View Set

PFM final chapter 10 (purchasing and financing a home)

View Set

Personal Financial Stewardship Ch.2

View Set