FINAL exam prep questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

fueled

open source is ________

enterprise resource planning

refers to a software package that integrates the many functions of a business, such as accounting, finance, inventory management, and human resources.

open source software

refers to software that is free and where anyone to look at and potentially modify the code

html

refers to the language used to create and format Web pages.

EDI

set of standards for exchanging messages containing formatted data between computer applications.

embedded systems

software (often on firmware) designed to make physical products and devices "smarter" by doing things like sharing usage information, helping diagnose problems, indicating maintenance schedules, providing alerts, or enabling devices to take orders from other systems is referred to as ________

web services

software systems designed to support interoperable machine-to-machine interaction over a network.

semiconductors

substances that are capable of enabling as well as inhibiting the flow of electricity

marginal cost

the cost of producing an additional unit of a product

Linux

the flagship OSS product is the _______ operating system

personal computers

the third wave of computing was characterized by the introduction of __________

html

used to create and format web pages

random access memory

what is an example of volatile memory?

megabyte

1 ________ = 1 billion bytes

quadrillion

1 petabyte = 1 _________ bytes

e

1. Which of the following statements is a valid reason for chip manufacturers to carry minimal inventory? a) Rising transportation costs greatly increase the costs of manufacturing and make moving inventory between locations highly expensive. b) Chip manufacturers maintain low inventories to hedge the move of semiconductor technology away from silicon-based chips. c) The potential physical and electronic damage to silicon chips if left unused for extended periods of time deters manufacturers from maintaining higher inventories. d) Chip manufacturers leverage the higher costs of chip-based products to their advantage by keeping supply low compared to demand. e)Products with a significant chip-based component rapidly fall in value and can cause huge losses when overproduced.

web hosting service

A firm that provides hardware and services to run Web sites of others is known as a(n) _____.

corporate espionage

A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for?

white hat hacker

A(n) _____ is someone who uncovers computer weaknesses and reveals them to manufacturers or system owners, without exploiting these vulnerabilities.

cybersquatting

Acquiring a domain name to extort a firm, individual, product, or trademark holder

cyberwarfare

An attack on the US power grid by terrorists or a foreign power is indicative of: a. DDoS attacks.

data harvesters

Cyber criminals who infiltrate systems and collect data for illegal resale are called _____.

to power internet's most popular websites

LAMP stack of open source products is used ....

second wave

Moore's Law kicked in during the 1970s for the ________, and minicomputers were a hit

the invention of graphical web browsing

One of the factors that accelerated the development of the Internet during the 1990s was:

business intelligence

Systems that use data created by other systems to provide reporting and analysis for organizational decision making are called _____ systems

microprocessor

The ________ is the part of a computer that executes the instructions of a computer program

uniform source locator

The address one types into a Web browser is also known as a:

cache poisoning

The exploit referred to as __________ allowed hackers to leverage vulnerability in DNS software to redirect users to sites they did not request

marginal cost is effectively zero

The software business is extremely profitable compared to the hardware business because

hacker

The term _____originallyreferred to a particularly skilled programmer.

struggle to manage their value chain efficiently

What are the implications for firms that do not have common database systems with consistent formats across their enterprise?

XML

Which technology is being used to replace the older EDI for specifying data standards?

multiple computers assigned to their host names

________ ensures that the load of requests to their sites do not overwhelm a single computer.

flash memory

________ is a nonvolatile, chip-based storage, often used in mobile phones, cameras, and MP3 players

desktop software

________ refers to applications installed on a personal computer, typically to support tasks performed by a single user

applications

___________ perform the work that users and firms are directly interested in accomplishing and can be thought of as places where a user's real work is done

cache

a temporary storage space used to speed computing tasks

firmware

control software store on NONVOLATILE memory chips

domain name service (DNS)

distributed database that allows users to communicate with other computers by mapping host and domain names to IP addresses of computers

DNS

ensures that the service continues functioning even if one name server goes down

MS Word

example of an application software

inventory tracking

function likely to be performed by enterprise software


Set pelajaran terkait

Passpoint - Endocrine and Metabolic Disorders

View Set

Biology Chapter 5: Membrane Transport

View Set

Bailey Sociology: Quiz #12 (Ch. 16: Education)

View Set

Chapter 4-Applications of the Cognitive Schema Concept in Understanding How Consumers React to Products, Brands, and Marketing Agents

View Set

AP Calc FUN chart + particle motion justifications

View Set