ISYS 209 exam 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

As explained in this​ video, an inventory management program is an example of​ _____.

application software

A​ ________ is represented by a 0 or 1. Eight together make a byte​ (i.e., 00101100).

bit

Which operating system does the iPad​ use?

iOS

A server dedicated to managing HTML pages is called​ a(n):

web server

​____________________ involves determining who is responsible for actions taken.

Accountability

Which of the following statements is FALSE about business intelligence​ (BI) systems?

BI systems only support​ decision-making activities.

Which of the following involves searching for patterns and relationships among​ data?

Data mining

Which of the following is NOT a function of a data​ warehouse?

Filter data

​_______________ databases are by far the most popular type of database on the market today.

Relational

The most popular data manipulation language and method to​ "question" a database is called​ ______________.

Structured Query Language

Why are legacy systems still​ used?

They are too expensive to redesign.

According to this​ video, Linux is an example of​ _____.

​open-source software

This video describes how advertisers use​ _____ in order to display more relevant ads based on a​ user's search and browsing history.

behavioral tracking

A store printing out receipts based on your buying patterns is related to the​ trend, ___________, where technology trends raise ethical issues.

data analysis advances

A​ ________ is a​ large-capacity, high-performance computer that can process large amounts of data very rapidly.

mainframe

In a student​ database, a column called LastName would be an example of​ a(n) _____________.

attribute

Copyright is protected throughout the life of the author plus an additional​ ______ years after the​ author's death.

70

Which of the following is FALSE about techno​ stress? - answer D)

A)It causes elevated levels of drug and alcohol abuse. B)It is induced by computer use. C)It is related to high levels of job turnover in the computer industry. D) Affected people start to behave like​ computers, devoid of emotions. E)Its symptoms include​ aggravation, hostility toward​ humans, impatience, and fatigue.

Which of the following is FALSE about the U.S.​ CAN-SPAM Act of​ 2003? correct answer is C)

A. It mandates that recipients be offered a way to remove their names from email lists. B.It requires commercial email messages to display accurate subject lines. C.It outlaws unsolicited commercial messaging. D.It requires commercial email messages to identify the true senders. E.It prohibits the use of fake return addresses.

According to this​ video, the business benefits of behavioral tracking include​ _____.

A. identifying prospective customers for products or services B. delivering ads based on social media activity C. delivering ads based on demographic data D. delivering ads based on​ geo-location data ALL!

Which of the following is FALSE about the digital divide in the​ U.S.? correct answer is D

A.Wealthier and more educated people were far more likely to take advantage of newer technologies then people from less fortunate socioeconomic groups. B.It is based on how technology is being used between different socioeconomic groups. C.It could lead to a society of information haves and​ have-nots. D.It is based only on having fair access to digital technology. E.Schools in high poverty areas less likely to have computers for students.

Among the following​ statements, which one is NOT applicable to big​ data?

Big data can be processed with traditional techniques.

Which of the following adjusts copyright laws to the Internet age by making it illegal to​ make, distribute, or use devices that circumvent​ technology-based protections of copyrighted​ materials?

Digital Millennium Copyright Act

According to​ Jack's explanation of the structure of relational database​ tables, which of the following statements about columns and rows is​ true?

Each row is a unique record for one of the items in the table and each column is an attribute of the item.

Which of the following refers to the capability of a​ computer, product, or system to add additional​ features?

Expandability

United States privacy laws are largely based on the​ _________________ report.

Fair Information Practices

The ethical principle that calls for hypothetically walking in the other​ person's shoes before making a decision is called the​ ______________.

Golden Rule

Nearly 80 percent of the Internet searches conducted use​ ___________, which makes it the largest data repository in history.

Google

Which government act was enacted in 1996 to protect your medical​ records?

HIPAA

​_______________ is an upgrade to traditional HTML because it allows the addition of multimedia features​ (i.e., video) without cumbersome​ add-ons.

HTML5

Which of the following statements is NOT a characteristic of​ Hadoop?

Hadoop extracts data from multiple tables that have a relationship.

​Hitachi's new wearable device that can track office​ temperature, interactions, and even movements around the office is called​ the:

Hitachi Business Microscope​ (HBM).

What is the first step you should take in managing data for a​ firm?

Identify the data needed to run the business.

Which is the BEST description of intellectual​ property?

Intangible property created by individuals or corporations

​____________________ involves examining laws on the books that provide individuals and companies the opportunity to recover damages caused by others.

Liability

Which of the following is an example of a popular open source operating​ system?

Linux

Which is NOT a way in which NORA technology can create a detailed dossier of a​ person?

Medical records

According to the information presented in this​ video, which of the following is not an operating system​ software?

Microsoft Office

If you needed a DBMS for large commercial use on a​ mainframe, _____________ would be a viable option.

Microsoft SQL Server

Which tool enables users to view the same data in different ways using multiple​ dimensions?

OLAP

Where is a cookie that is created during a Web site visit​ stored?

On the​ visitor's computer

Which type of software is created and updated by a worldwide community of programmers and is available for​ free?

Open source

Major products including Bluemix and​ Salesforce.com's Force.com are considered​ a:

Platform as a Service​ (PaaS).

Which U.S. act restricts the information the federal government can collect and regulates what it can do with the​ information?

Privacy Act of 1974

Among the​ following, what is the best way to distinguish between reporting tools and data mining​ tools?

The complexity of techniques used

Which is TRUE of a​ multi-tiered network?

The work of the entire network is balanced over several levels of servers.

One of the characters in this video asks the​ question: "Are there any laws to keep companies from installing trackers on my​ computer?" According to his​ colleague's reply, which of the following statements describes current U.S. law regarding the information Websites can collect and how that information is​ used?

The​ Children's Online Privacy Protection Act regulates the collection of personal information on children and bans behavioral advertising to children younger than 13 years of age without parental consent.

Which model can be used to analyze the direct and indirect costs to help firms determine the actual cost of specific technology​ implementations?

Total cost of ownership​ (TCO)

The Federal Trade Commission Fair Information Practice principle of​ Notice/Awareness states​ that:

Websites must disclose their information practices before collecting data.

Which of the following is NOT a rule in an​ organization's information​ policy?

What the relationships inside the data are

According to the information presented in this​ video, a database management system​ (DBMS) is a software program for​ creating, processing, and​ _____ a database.

administering

​___________ uniquely allows for​ presentation, communication, and storage of data. It is often used to transfer data from one organization to another.

XML

A​ ________ in a database represents a single character such as a letter or number.

byte

Microsoft Azure SQL is an example of a​ _________________ database.

cloud

Based on the information in this​ video, all of the activities listed here describe behavioral tracking except​ _____.

collecting credit card data from online purchases

As the two characters describe in this​ video, all of the following are a function of operating systems software except​ _____.

creating a presentation

A location specified to include IT infrastructure such as​ storage, security, and system backup is called​ a:

data center

Software such as Sequel Server 2014 which is used to manage business data​ (i.e., inventory) is an example of​ _______________ software.

data management

According to the information presented in this​ video, a spreadsheet is great to manage information about one thing​ (e.g., items for​ sale), but a​ _____ is preferred to manage information about more than one thing​ (e.g., items for sale and suppliers of​ items).

database

The special organizational function whose responsibilities include the technical and operational aspects of managing​ data, including physical database design and​ maintenance, is called​ ________.

database administration

In this​ video, Jack describes how metadata​ _____.

describe characteristics of each field

A common approach of networking multiple computers as opposed to a single computer is​ called:

distributed processing

In a student​ database, a collection of related attributes such as​ LastName, FirstName, and​ Student# creates​ a(n) _______________.

entity

​A(n) __________ is a popular way to describe relationships​ (i.e., one-to-one,​ one-to-many) in a relational database.

entity relationship diagram

Principles of right and wrong that you use to make choices are called​ _____________.

ethics

Connecting geographically remote computers in a single network to create a​ "virtual supercomputer" is called​ ________.

grid computing

According to this​ video, behavioral tracking and targeted ads can be seen as a​ double-edge sword because​ _____.

increases in targeted ads may result in higher sales but users may perceive them as a loss of privacy

If you want to collect data​ (i.e., photos) from someone and use the​ data, you must obtain​ _____________.

informed consent

As Jack explains to​ Kate, a database is a collection of​ _____ records.

integrated

A photo you have taken of your family is considered​ ______________, and is protected by law.

intellectual property

The most common use of nonrelational database management systems is​ for__________________.

managing extremely large data sets

The data​ _______________ language would allow you to retrieve information from the database​ (i.e., using the​ SELECT, FROM, WHERE​ commands).

manipulation

Software applications that are based on combining different online software applications are​ called:

mashups

Compared to​ in-house hosting,​ cloud-based hosting​ ________.

minimizes the risk of investing in technology that will soon become obsolete

Tracking your movements without consent is most related to the​ trend, ___________, where technology trends raise ethical issues.

mobile device growth impact

When thinking about downloading and using a photo off the​ Internet, don't forget the ethical​ __________ lunch rule.

no free

Relational tables need to be​ ______________ to help avoid duplicate data.

normalized

In cloud​ computing, resources are said to be​ "pooled" because:

organizations share the same physical hardware through virtualization.

​A(n) __________ key uniquely identifies a row or record in a table.

primary

In the information​ age, the obligations that individuals and organizations have concerning rights to intellectual property fall within the moral dimension of​ ________.

property rights and obligations

In a student​ database, a row that describes the top​ student, including his or her​ LastName, FirstName, and​ StudentNumber, is an example of a​ ______________.

record

Relational databases enforce​ ______________ integrity to​ ensure, for​ instance, that a teacher​ can't be assigned to a CLASS table unless they already exist in the TEACHER table.

referential

The Windows operating system is an example of​ ______________ software.

system

The ethical principle that calls ranking alternatives before making a decision is called the​ ______________.

utilitarian principle

AccuMed is a software package used by doctors to schedule patient appointments. According to the information presented in this​ video, AccuMed is​ _____.

vertical- market software

Configuring a server to run a variety of instances of an operating system to appear like many different machines to the end user is an example​ of:

virtualization

Developing effective apps is considered a critical element to successful adoption​ of:

wearable computing.

The Apple watch is a new type of mobile digital computing​ called:

wearable computing.

Another common name for a web beacon is a​ ____________, which tracks user activities.

web bug

Disney is using​ a/an ___________ technology in the form of a wristband to help improve the guest experience by combining a​ guest's room​ key, park​ ticket, and eventually a​ vacation-planning system to make the experience more efficient with reduced wait times.

​radio-frequency identification​ (RFID)


Set pelajaran terkait

The Spinning Jenny: an invention that had an impact on Britain during the Industrial revolution

View Set

Nervous system and endocrine system

View Set

Sociology Ch 8 Race and Ethnicity as Lived Experience

View Set

PSYCHOLOGY Quiz 1/Chapter 1 Questions

View Set

FD - WHAT DOES EACH STATION HAVE

View Set