it 104 final
One of the most widely used 3-D file formats for 3-D printers uses the _____ file name extension.
.stl
For a database that stores students' grades, which of the following fields could be designated as a primary key?
StudentID
True or False: Penetration testing entails trying to hack into a system so its vulnerabilities can be identified and fixed.
TRUE
True or False: Plagiarism is using others' words and ideas without attributing the original creator(s) as the source.
TRUE
Third-party cookies are created by which of the following?
an ad on a site
Personal identification numbers, user IDs and passwords, smart cards, and biometrics are all common forms of
authentication.
Text that's been encrypted and is therefore unreadable is called
ciphertext.
The study and simulation of the human mind is called
cognitive science.
A _____ system offers much broader coverage than a computer-aided manufacturing (CAM) system.
computer-integrated manufacturing (CIM)
Chapter 8 explains that water is dangerous to a computer because it _____, which can cause _____.
conducts electricity very well; a short circuit
About half of all high school students have reported being victims of _____, according to the National Crime Prevention Council
cyberbullying
Which of these terms refers to code that's "commented out," or marked with comments to notify the compiler to skip and ignore it?
dead code
The problem of redundancy can be avoided in backing up data by using _____ software, which examines the files and doesn't back up identical copies of certain folders and files multiple times.
deduplication
The functional specification states exactly what the information system must accomplish, and the _____ specification spells out how these goals will be reached.
design
Software _____ involves creating the higher-level software design and focusing on the broader planning and implementation steps for the system.
development
Hand-eye coordination, which is related to tactile perception, is called
dexterity.
When you use a(n) _____ to pay for a purchase, it automatically transfers the appropriate payment information to the retailer.
digital wallet
Which type of database spreads data across multiple networked computers, allowing greater storage and cheap and easy expansion?
distributed database
The time during which a database system isn't available is known as
downtime
A password is considered strong if it's
easy to remember but hard to guess.
Which of the following types of systems supports strategic decision-making by facilitating the creation of high-level summary reports that executives can use to make important decisions?
executive information system (EIS)
Sophisticated software that uses artificial intelligence techniques to model an expert's knowledge of a topics is called a(n)
expert system.
In which of the following environments is FORTRAN still commonly used?
factories and laboratories
Suppose an auto manufacturer wants to upgrade its existing computer-integrated manufacturing system. To determine the likely size and cost of the project, the company will conduct a _____ study.
feasibility
A single value, such as an address, is an example of a _____ in a database.
field
Retrieving data from a database and performing some type of operation on it is called
file processing.
Which of the following statements describes spoofing?
fooling another computer by pretending to send packets from a legitimate Internet Protocol (IP) address
A well-designed _____, like the one shown in this screen shot, provides the user with questions or prompts.
form
Once the plan for a new information system has been approved, two documents are created. The _____ specification, which is usually written first, states exactly what the system must accomplish.
functional
People who attempt to gain access to a computer system are known as
hackers.
Which of the following are first-generation programming languages?
machine languages
Which of the following is an example of numeric data?
626
_____ is a high-level language that's friendlier and more natural than COBOL and FORTRAN.
BASIC
Which of the following legacy programming languages is used chiefly for business applications by large institutions and companies?
COBOL
True or False: An OLAP cube structures data in a single dimension.
FALSE
True or False: Cloud apps run from the cloud and can be used to perform various tasks with files or data stored on your hard drive
FALSE
True or False: In deep learning, the computer learns using specific task algorithms rather than data representations
FALSE
A disaster recovery plan typically does not answer which of these questions?
How will users' identities be confirmed?
Which of the following is not one of the popular scripting languages?
Hypertext Markup Language (HTML)
_____ property includes just about anything that can be created by the human mind.
Intellectual
Which of the following statements does not describe graphene?
It can be injection molded into a variety of complex shapes.
Which of the following statements does not describe a fuzzy logic system?
It demands precise yes/no or numerical information.
Which of the following statements does not describe pseudocode?
It involves envisioning a project in its entirety to identify the larger elements that must be handled first.
Which of the following statements describes a power conditioner?
It stores extra voltage in a capacitor and then discharges that voltage onto the power line when it detects a low-voltage condition.
Which of the following statements describes a Gantt chart?
It uses horizontal bars on a timeline to show the stages and tasks in a project and the order in which they must be completed
Which of the following statements does not describe an infinite loop
It's part of the program but actually has no effect on how the program runs
Which of the following statements does not describe a K-slot?
It's used to secure a desktop computer to a specific desk. (correct)
Which of the following converts general Java instructions into commands that a device or computer can understand?
Java virtual machine (JVM)
_____ requires maintaining balance within an endlessly changing set of variables, such as walking up a hill or down a flight of stairs.
Locomotion
With _____, the cloud service provider (CSP) or other provider offers the client a choice of tools and services along with the physical infrastructure to build cloud infrastructure
Platform as a Service (PaaS)
_____ design is sometimes referred to as mobile-first design because the needs of mobile devices are at the forefront.
Responsive
Which type of query command asks a database to return records that match specified criteria?
SELECT command
Microsoft _____ is a collaboration platform that's commonly used by large corporations to set up web-based or cloud-based team collaboration spaces.
SharePoint
_____ a file means making it available from your cloud storage for viewing, editing, and downloading by other designated users.
Sharing
Which of the following is not one of the guidelines for using rapid application development (RAD) techniques?
Show clients working software, not documents of how the software will work.
True or False: A crash bug is one of the most dreaded types of run-time errors, because it causes a program to stop running, or crash.
TRUE
True or False: A database designer's database management approach guides the process of developing and maintaining the database structures.
TRUE
True or False: A field name is a unique name assigned to a field.
TRUE
True or False: A management information system (MIS) can identify problem activity, such as an unusually high number of production errors or customer returns.
TRUE
True or False: A program can interrupt a looping pattern by using an if-then statement based on a particular action.
TRUE
True or False: A program with style errors may run, but the errors will make the code bulkier, slower to execute, or more difficult to edit.
TRUE
True or False: A real-time system, such as an air traffic control system, requires data with second-by-second accuracy,
TRUE
True or False: A report presents output from a data table or query in an easy-to-read format.
TRUE
True or False: A single camera isn't good enough to simulate an eye; two cameras are needed to provide stereoscopic vision, which allows perception of depth and movement.
TRUE
True or False: An automated clearinghouse (ACH) is a type of automated banking network for transferring funds electronically from one account to another.
TRUE
True or False: An expert system contains a knowledge base, which is a set of facts and rules about a specific complex application.
TRUE
True or False: Depending on the type of business and customer needs, a company's supply chain may involve outside companies, such as a parts manufacturer or trucking company.
TRUE
True or False: The gap between people who have access to computers and the internet and those who do not has been called the digital divide.
TRUE
True or False: The terms 3-D printing and additive manufacturing refer to the same technology.
TRUE
True or False: Today, most organizations of all sizes use a computerized office information system (OIS) to manage a variety of tasks.
TRUE
True or False: Users and companies weigh how much work it takes to back up their data against how much they would suffer if they lost their data when determining an appropriate backup frequency for their systems.
TRUE
rue or False: Online banking involves using a web-enabled PC or mobile device.
TRUE
_____ processing occurs when the database updates immediately for each input
Transactional
What is a pure-play e-tailer?
a company that has no bricks-and-mortar presence and therefore sells its products and services exclusively over the web
Which of the following is not one of the elements of an effective acceptable use policy (AUP)?
a list of specific websites that may not be visited
What is a smart card?
a plastic card that contains a computer chip with stored information
What is a testing harness?
a scripted set of tests that a program must pass before being considered ready for public release
What is cloud storage?
a service that provides you with a set amount of file storage space in the cloud
Before being written in a programming language, a program is first written out as a(n) _____, which is a complete list of the steps for solving a problem.
algorithm
During the implementation phase of the software development life cycle (SDLC), the development team tests a(n) ______, which is a preliminary version of a software application.
alpha product
What is an online predator?
an individual who uses the internet to talk young people into meeting, exchanging photos, and so forth
In addition to discovering meaningful patterns in data, _____ includes communicating insights about data, such as the spending behavior of a group of customers.
analytics
You can reduce reflection from your screen and thus improve readability by putting a(n) _____ on your monitor.
antiglare filter
Small applications that can run on all types of computer operating systems are called
applets
Suppose that a hacker gains access to a hospital's patient records and exposes confidential medical information. The negative effects on the hospital's reputation and patient relationships that result are examples of damage to which of the following?
assets
People respond to audible cues about their surroundings without even thinking about them because of their _____ abilities.
audio perception
The virtual first-down lines and other status lines you see on the field when watching a football game on TV are created with which of the following?
augmented reality (AR)
You may not have to worry about backing up your computer at work, because many businesses have a(n) _____ that automatically backs up data files.
backup system
During the testing phase of the software development life cycle (SDLC), a(n) _____ of the program is created for testing outside the development group, and the feedback that's received can be used to improve the product before it's released to the general public.
beta version
Many companies control employee access to secure areas using a _____, such as a voice, a fingerprint, hand geometry, facial geometry, a retinal pattern, an iris pattern, or a handwritten signature.
biometric identifier
A _____ attempts to gain access to a system for malicious purposes without the owner's consent.
black-hat hacker
For a consensus network, which of the following is intended to provide the ability to track and verify every asset transaction for security purposes
blockchain
The term _____ was originally coined by Grace Hopper, the inventor of COBOL, to refer to a computer error.
bug (
In which of the following environments is RPG commonly used?
business
Technologies such as online analytical processing (OLAP) systems can be used to generate information called _____, such as customer spending patterns and behavior.
business intelligence (BI).
In _____, companies use the internet to conduct a wide range of routine business activities with other companies.
business-to-business (B2B) electronic commerce
Which of the following languages is not used to write the code on the server that tells it what to do?
cascading style sheets (CSS)
When using the Microsoft SharePoint collaboration platform, you can _____ a document for editing.
check out
A(n) _____ operates one or more data centers, and organizations buy cloud capacity from it as needed.
cloud service provider (CSP)
Which type of check ensures that every required field in a record contains an entry, preventing data from being missing?
completeness check
Symptoms of _____ can include headaches, loss of focus, burning or tired eyes, blurred or double vision, and neck and shoulder strain.
computer vision syndrome
The use of robots in an automobile manufacturing plant is an example of a(n) _____ system.
computer-aided manufacturing (CAM)
Suites of powerful applications designed specifically to help with project management, programming, user testing, and so on are referred to collectively as _____ tools.
computer-aided software engineering (CASE)
The term _____ refers to the ability to link with other programs and devices.
connectivity
Java has _____, which means it can run on nearly any operating system.
cross-platform compatibility
In a genetic algorithm, the use of a(n) _____ in the selection process means that the most successful mutations are mixed to produce a new generation of "offspring."
crossover
A location that houses a large computing operation with numerous networked servers is called a(n)
data center.
Which of the following involves the spread of incorrect information and can have serious consequences?
data contamination
Which of the following collects the body of metadata for the entire database?
data dictionary
A database end user called a _____ types and changes database data as needed, ensuring that the contents of the database remain as up to date as possible.
data entry operator
Suppose that a manager wants to identify employees who have called in sick more than 10 days in the past year. Which of the following database management tools should he or she use to display only this data?
data filter
A system with high _____ provides more value to users than a system containing a large percentage of errors.
data integrity
A decision support system (DSS) uses _____ to simulate real-world situations and consider "what if?" scenarios
data modeling
A decision support system (DSS) uses _____ to simulate real-world situations and consider "what if?" scenarios.
data modeling
Numeric and alphanumeric are examples of _____, or types of information specific fields will hold.
data types
Using which of the following techniques ensures that users enter correct and complete data into the system?
data validation
Unlike an operational database, a(n) _____ doesn't change or delete the information it stores on an ongoing basis
data warehouse
A _____ is a collection of data organized in one or more tables stored on a computer.
database
A program that contains a(n) _____ statement, or point where different actions may be performed depending on specific conditions, will be more useful than one that simply follows a linear sequence of actions without variation.
decision
Which of the following technologies enables doctors to access patients' medical records from a single source and use online data to help with diagnosis and treatment?
eHealth
The transfer of money over the internet is known as a(n)
electronic funds transfer (EFT).
Legislation passed in 2000 broadly defined a(n) _____ to include "electronic sound, symbol, or process."
electronic signature
Records of mobile phone calls are an example of a(n) _____ in a database.
entity
Supply chain management (SCM) is responsible for which of the following?
establishing, running, and refining the supply chain
The principles a person uses to determine right and wrong and to guide his or her choices and actions are called
ethics.
When run by a program, a(n) _____ statement performs an action and then proceeds to the next statement in the sequence.
executable
A _____, which simulates the physical workings of the human mind, is the ultimate attempt to model human intelligence.
fuzzy logic system
Which of the following technologies uses a computer to create thousands or even millions of slightly varied designs and then tests and selects the best of them?
genetic algorithm
Many errors occur because the programmer was sloppy during the programming process. Programmers refer to this sloppy way of working as _____ code.
hacking
Once a new information system has been designed and the plans approved, the project can move into the next stage, which is
implementation.
A(n) _____ enables the expert system to draw deductions from the rules in the knowledge base in response to user input.
inference engine
A(n) _____ system collects, stores, and processes data that people in organizations use to manage daily and long-term operations and to create and sell various types of products.
information
A(n) _____ is sometimes called a software robot, or bot.
intelligent agent
A database ____ can be used to identify a set of information and therefore provide a means of searching or sorting.
key
A _____ error occurs when a program's syntax is correct, but the program instructs the computer to perform an action incorrectly.
logic
Which of the following technologies uses sensors mounted around the skull to read the different types of waves or power spectrums the brain gives off?
mental interface
Information about the structure, specifications, and purpose of each element in a database is described by the
metadata.
Using a(n) _____ approach to programming serves the purpose of making the code reusable and also helps in tracking down the sources of errors.
modular
A(n) _____ database uses a(n) _____ structure to organize data in three or more dimensions, as shown in this graphic.
multidimensional; cube
A(n) _____ database allows the storage of pictures, movies, sounds, and hyperlinked fields
multimedia
Using carbon _____ might make it possible to create more compact processors, which would operate much faster and conserve power.
nanotubes
Imagine a computer that can read a set of news articles on any topic, understand what it has read, and write a report summarizing what it has learned. To do these things, the computer must have a
natural language interface.
A scripting language is a _____ language, meaning that it explains what the computer should do in English-like terms but not precisely how the computer should do it.
nonprocedural
In a(n) _____ database, data is stored in the form of _____, each of which contains both the related data and the actions that might be performed.
object-oriented; objects
A(n) _____ collects, stores, and transmits data in a shared environment.
office information system (OIS)
Which of the following types of systems defines and clarifies methods of handling "what if?" questions posed to large databases?
online analytical processing (OLAP) system
A(n) _____ is a seller's website where customers can view and purchase products and services.
online store
A database that can be used by a retailer to track sales, update inventory records, and order more product is a(n) _____ database.
operational
Which of the following terms refers to the practice of hiring a consultant or other third party to handle a project?
outsourcing
Paying for online auction items and sending money to friends or family are popular uses of _____ payment systems.
person-to-person
The IT staff performs _____ maintenance to increase the reliability and ease of maintenance of an information system.
preventive
A _____ is a statement promising that a website will protect the confidentiality of any information a customer reveals.
privacy policy
A cloud setup created for and used by a single organization is a(n) _____ cloud.
private
Searching for, finding, and purchasing materials, supplies, products, and services at the best possible prices and ensuring they are delivered in a timely manner is known as
procurement.
The response to a request for proposal (RFP) typically asks for a(n) _____, which includes an estimate of how long the project will take to complete, an outline of the steps involved, and a list of the deliverables.
project plan
Virtual servers typically operate in a self-service fashion, allowing IT staff to add and remove new cloud services at will. This configuration or setup process is known as
provisioning.
Unlike a traditional computer, which operates based on binary on/off states, a _____ computer operates based on many superpositions of states.
quantum
To retrieve information from a database, the user generally creates a _____ and then runs it to display the results, or list of records that match the specified criteria.
query
Many warehouse systems use which of the following technologies to enhance inventory tracking and placement?
radio frequency identification (RFID)
A _____ program can seize control of a computer until the user agrees to the attacker's demands.
ransomware
If an address is stored in multiple data tables, it will need to be changed in all the tables if a customer moves. This is an example of which of the following?
redundancy
Within a company or business, _____ is the process of creating and commercializing new technologies and products for new markets.
research & development (R&D)
With a(n) _____, there's no need for physical hardware changes and no disruption to the app or service being delivered.
scalable server
When you shop at an e-tailer's site, you collect the items you want to buy in a virtual container called a(n)
shopping cart.
A(n) _____ operation is a loosely organized team allowed to pursue extreme innovation—often operating not only outside the corporate rulebook but also in a separate location away from the main corporate campus.
skunkworks
Sensors such as power meters, voltage sensors, and fault detectors that gather data, along with digital communication capabilities that send the data to an operations center or other location, are examples of which type of technology?
smart grid
Which of the following may be required to match the company's needs with the best technology solutions?
software engineering
Typically larger and a bit more formal than a skunkworks, a(n) _____ occupies the forefront of research & development efforts for such companies as Alphabet Inc. and Facebook.
special projects lab
Suppose a manufacturer wants to determine if one shift of workers creates better-quality products than another shift of workers. Which of the following systems will provide this information?
statistical quality control (SQC) system
Which device is basically an extension cord with multiple plugs on it but contains a metal oxide variable resistor that can absorb any excess power during a surge or spike, preventing it from reaching the plugged-in devices?
surge suppressor
Power _____ and spikes are basically the same thing: too much voltage.
surges
Deciding to play computer games all night instead of sleeping enough to perform well at work or school is an example of the unwise choices made by someone with a(n
technology addiction.
Many companies today incorporate _____ systems that combine GPS, wireless communications features, and other technologies to plan more efficient shipping routes and monitor shipment locations.
telematics
What is the purpose of performing adaptive maintenance on an information system?
to address other environment changes
business activity that's central to the nature of an enterprise, such as selling a product, is a(n)
transaction
A(n) _____ operates as a security-hardened version of a standard operating system (OS); it isolates OS functions and restricts unauthorized access to key areas of the OS.
trusted operating system (TOS)
In a relational database, each record is called a(n)
tuple.
A _____ contains everything a business needs to get a new information system up and running.
turnkey system
Which of the following is not one of the conditions of fair use?
using material that was published at least ten years ago (correct)
A large percentage of the human brain is dedicated to _____, which involves processing data coming from the eyes.
visual perception
With the _____ cloud, excess resources of computers connected to the internet are harnessed to complete a particular task, often in conjunction with other infrastructure.
volunteer
Most computers come with a basic one-year _____ against manufacturing defects for no additional charge.
warranty
A program with a single syntax error
won't work at all and will therefore be useless.