it 104 final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

One of the most widely used 3-D file formats for 3-D printers uses the _____ file name extension.

.stl

For a database that stores students' grades, which of the following fields could be designated as a primary key?

StudentID

True or False: Penetration testing entails trying to hack into a system so its vulnerabilities can be identified and fixed.

TRUE

True or False: Plagiarism is using others' words and ideas without attributing the original creator(s) as the source.

TRUE

Third-party cookies are created by which of the following?

an ad on a site

Personal identification numbers, user IDs and passwords, smart cards, and biometrics are all common forms of

authentication.

Text that's been encrypted and is therefore unreadable is called

ciphertext.

The study and simulation of the human mind is called

cognitive science.

A _____ system offers much broader coverage than a computer-aided manufacturing (CAM) system.

computer-integrated manufacturing (CIM)

Chapter 8 explains that water is dangerous to a computer because it _____, which can cause _____.

conducts electricity very well; a short circuit

About half of all high school students have reported being victims of _____, according to the National Crime Prevention Council

cyberbullying

Which of these terms refers to code that's "commented out," or marked with comments to notify the compiler to skip and ignore it?

dead code

The problem of redundancy can be avoided in backing up data by using _____ software, which examines the files and doesn't back up identical copies of certain folders and files multiple times.

deduplication

The functional specification states exactly what the information system must accomplish, and the _____ specification spells out how these goals will be reached.

design

Software _____ involves creating the higher-level software design and focusing on the broader planning and implementation steps for the system.

development

Hand-eye coordination, which is related to tactile perception, is called

dexterity.

When you use a(n) _____ to pay for a purchase, it automatically transfers the appropriate payment information to the retailer.

digital wallet

Which type of database spreads data across multiple networked computers, allowing greater storage and cheap and easy expansion?

distributed database

The time during which a database system isn't available is known as

downtime

A password is considered strong if it's

easy to remember but hard to guess.

Which of the following types of systems supports strategic decision-making by facilitating the creation of high-level summary reports that executives can use to make important decisions?

executive information system (EIS)

Sophisticated software that uses artificial intelligence techniques to model an expert's knowledge of a topics is called a(n)

expert system.

In which of the following environments is FORTRAN still commonly used?

factories and laboratories

Suppose an auto manufacturer wants to upgrade its existing computer-integrated manufacturing system. To determine the likely size and cost of the project, the company will conduct a _____ study.

feasibility

A single value, such as an address, is an example of a _____ in a database.

field

Retrieving data from a database and performing some type of operation on it is called

file processing.

Which of the following statements describes spoofing?

fooling another computer by pretending to send packets from a legitimate Internet Protocol (IP) address

A well-designed _____, like the one shown in this screen shot, provides the user with questions or prompts.

form

Once the plan for a new information system has been approved, two documents are created. The _____ specification, which is usually written first, states exactly what the system must accomplish.

functional

People who attempt to gain access to a computer system are known as

hackers.

Which of the following are first-generation programming languages?

machine languages

Which of the following is an example of numeric data?

626

_____ is a high-level language that's friendlier and more natural than COBOL and FORTRAN.

BASIC

Which of the following legacy programming languages is used chiefly for business applications by large institutions and companies?

COBOL

True or False: An OLAP cube structures data in a single dimension.

FALSE

True or False: Cloud apps run from the cloud and can be used to perform various tasks with files or data stored on your hard drive

FALSE

True or False: In deep learning, the computer learns using specific task algorithms rather than data representations

FALSE

A disaster recovery plan typically does not answer which of these questions?

How will users' identities be confirmed?

Which of the following is not one of the popular scripting languages?

Hypertext Markup Language (HTML)

_____ property includes just about anything that can be created by the human mind.

Intellectual

Which of the following statements does not describe graphene?

It can be injection molded into a variety of complex shapes.

Which of the following statements does not describe a fuzzy logic system?

It demands precise yes/no or numerical information.

Which of the following statements does not describe pseudocode?

It involves envisioning a project in its entirety to identify the larger elements that must be handled first.

Which of the following statements describes a power conditioner?

It stores extra voltage in a capacitor and then discharges that voltage onto the power line when it detects a low-voltage condition.

Which of the following statements describes a Gantt chart?

It uses horizontal bars on a timeline to show the stages and tasks in a project and the order in which they must be completed

Which of the following statements does not describe an infinite loop

It's part of the program but actually has no effect on how the program runs

Which of the following statements does not describe a K-slot?

It's used to secure a desktop computer to a specific desk. (correct)

Which of the following converts general Java instructions into commands that a device or computer can understand?

Java virtual machine (JVM)

_____ requires maintaining balance within an endlessly changing set of variables, such as walking up a hill or down a flight of stairs.

Locomotion

With _____, the cloud service provider (CSP) or other provider offers the client a choice of tools and services along with the physical infrastructure to build cloud infrastructure

Platform as a Service (PaaS)

_____ design is sometimes referred to as mobile-first design because the needs of mobile devices are at the forefront.

Responsive

Which type of query command asks a database to return records that match specified criteria?

SELECT command

Microsoft _____ is a collaboration platform that's commonly used by large corporations to set up web-based or cloud-based team collaboration spaces.

SharePoint

_____ a file means making it available from your cloud storage for viewing, editing, and downloading by other designated users.

Sharing

Which of the following is not one of the guidelines for using rapid application development (RAD) techniques?

Show clients working software, not documents of how the software will work.

True or False: A crash bug is one of the most dreaded types of run-time errors, because it causes a program to stop running, or crash.

TRUE

True or False: A database designer's database management approach guides the process of developing and maintaining the database structures.

TRUE

True or False: A field name is a unique name assigned to a field.

TRUE

True or False: A management information system (MIS) can identify problem activity, such as an unusually high number of production errors or customer returns.

TRUE

True or False: A program can interrupt a looping pattern by using an if-then statement based on a particular action.

TRUE

True or False: A program with style errors may run, but the errors will make the code bulkier, slower to execute, or more difficult to edit.

TRUE

True or False: A real-time system, such as an air traffic control system, requires data with second-by-second accuracy,

TRUE

True or False: A report presents output from a data table or query in an easy-to-read format.

TRUE

True or False: A single camera isn't good enough to simulate an eye; two cameras are needed to provide stereoscopic vision, which allows perception of depth and movement.

TRUE

True or False: An automated clearinghouse (ACH) is a type of automated banking network for transferring funds electronically from one account to another.

TRUE

True or False: An expert system contains a knowledge base, which is a set of facts and rules about a specific complex application.

TRUE

True or False: Depending on the type of business and customer needs, a company's supply chain may involve outside companies, such as a parts manufacturer or trucking company.

TRUE

True or False: The gap between people who have access to computers and the internet and those who do not has been called the digital divide.

TRUE

True or False: The terms 3-D printing and additive manufacturing refer to the same technology.

TRUE

True or False: Today, most organizations of all sizes use a computerized office information system (OIS) to manage a variety of tasks.

TRUE

True or False: Users and companies weigh how much work it takes to back up their data against how much they would suffer if they lost their data when determining an appropriate backup frequency for their systems.

TRUE

rue or False: Online banking involves using a web-enabled PC or mobile device.

TRUE

_____ processing occurs when the database updates immediately for each input

Transactional

What is a pure-play e-tailer?

a company that has no bricks-and-mortar presence and therefore sells its products and services exclusively over the web

Which of the following is not one of the elements of an effective acceptable use policy (AUP)?

a list of specific websites that may not be visited

What is a smart card?

a plastic card that contains a computer chip with stored information

What is a testing harness?

a scripted set of tests that a program must pass before being considered ready for public release

What is cloud storage?

a service that provides you with a set amount of file storage space in the cloud

Before being written in a programming language, a program is first written out as a(n) _____, which is a complete list of the steps for solving a problem.

algorithm

During the implementation phase of the software development life cycle (SDLC), the development team tests a(n) ______, which is a preliminary version of a software application.

alpha product

What is an online predator?

an individual who uses the internet to talk young people into meeting, exchanging photos, and so forth

In addition to discovering meaningful patterns in data, _____ includes communicating insights about data, such as the spending behavior of a group of customers.

analytics

You can reduce reflection from your screen and thus improve readability by putting a(n) _____ on your monitor.

antiglare filter

Small applications that can run on all types of computer operating systems are called

applets

Suppose that a hacker gains access to a hospital's patient records and exposes confidential medical information. The negative effects on the hospital's reputation and patient relationships that result are examples of damage to which of the following?

assets

People respond to audible cues about their surroundings without even thinking about them because of their _____ abilities.

audio perception

The virtual first-down lines and other status lines you see on the field when watching a football game on TV are created with which of the following?

augmented reality (AR)

You may not have to worry about backing up your computer at work, because many businesses have a(n) _____ that automatically backs up data files.

backup system

During the testing phase of the software development life cycle (SDLC), a(n) _____ of the program is created for testing outside the development group, and the feedback that's received can be used to improve the product before it's released to the general public.

beta version

Many companies control employee access to secure areas using a _____, such as a voice, a fingerprint, hand geometry, facial geometry, a retinal pattern, an iris pattern, or a handwritten signature.

biometric identifier

A _____ attempts to gain access to a system for malicious purposes without the owner's consent.

black-hat hacker

For a consensus network, which of the following is intended to provide the ability to track and verify every asset transaction for security purposes

blockchain

The term _____ was originally coined by Grace Hopper, the inventor of COBOL, to refer to a computer error.

bug (

In which of the following environments is RPG commonly used?

business

Technologies such as online analytical processing (OLAP) systems can be used to generate information called _____, such as customer spending patterns and behavior.

business intelligence (BI).

In _____, companies use the internet to conduct a wide range of routine business activities with other companies.

business-to-business (B2B) electronic commerce

Which of the following languages is not used to write the code on the server that tells it what to do?

cascading style sheets (CSS)

When using the Microsoft SharePoint collaboration platform, you can _____ a document for editing.

check out

A(n) _____ operates one or more data centers, and organizations buy cloud capacity from it as needed.

cloud service provider (CSP)

Which type of check ensures that every required field in a record contains an entry, preventing data from being missing?

completeness check

Symptoms of _____ can include headaches, loss of focus, burning or tired eyes, blurred or double vision, and neck and shoulder strain.

computer vision syndrome

The use of robots in an automobile manufacturing plant is an example of a(n) _____ system.

computer-aided manufacturing (CAM)

Suites of powerful applications designed specifically to help with project management, programming, user testing, and so on are referred to collectively as _____ tools.

computer-aided software engineering (CASE)

The term _____ refers to the ability to link with other programs and devices.

connectivity

Java has _____, which means it can run on nearly any operating system.

cross-platform compatibility

In a genetic algorithm, the use of a(n) _____ in the selection process means that the most successful mutations are mixed to produce a new generation of "offspring."

crossover

A location that houses a large computing operation with numerous networked servers is called a(n)

data center.

Which of the following involves the spread of incorrect information and can have serious consequences?

data contamination

Which of the following collects the body of metadata for the entire database?

data dictionary

A database end user called a _____ types and changes database data as needed, ensuring that the contents of the database remain as up to date as possible.

data entry operator

Suppose that a manager wants to identify employees who have called in sick more than 10 days in the past year. Which of the following database management tools should he or she use to display only this data?

data filter

A system with high _____ provides more value to users than a system containing a large percentage of errors.

data integrity

A decision support system (DSS) uses _____ to simulate real-world situations and consider "what if?" scenarios

data modeling

A decision support system (DSS) uses _____ to simulate real-world situations and consider "what if?" scenarios.

data modeling

Numeric and alphanumeric are examples of _____, or types of information specific fields will hold.

data types

Using which of the following techniques ensures that users enter correct and complete data into the system?

data validation

Unlike an operational database, a(n) _____ doesn't change or delete the information it stores on an ongoing basis

data warehouse

A _____ is a collection of data organized in one or more tables stored on a computer.

database

A program that contains a(n) _____ statement, or point where different actions may be performed depending on specific conditions, will be more useful than one that simply follows a linear sequence of actions without variation.

decision

Which of the following technologies enables doctors to access patients' medical records from a single source and use online data to help with diagnosis and treatment?

eHealth

The transfer of money over the internet is known as a(n)

electronic funds transfer (EFT).

Legislation passed in 2000 broadly defined a(n) _____ to include "electronic sound, symbol, or process."

electronic signature

Records of mobile phone calls are an example of a(n) _____ in a database.

entity

Supply chain management (SCM) is responsible for which of the following?

establishing, running, and refining the supply chain

The principles a person uses to determine right and wrong and to guide his or her choices and actions are called

ethics.

When run by a program, a(n) _____ statement performs an action and then proceeds to the next statement in the sequence.

executable

A _____, which simulates the physical workings of the human mind, is the ultimate attempt to model human intelligence.

fuzzy logic system

Which of the following technologies uses a computer to create thousands or even millions of slightly varied designs and then tests and selects the best of them?

genetic algorithm

Many errors occur because the programmer was sloppy during the programming process. Programmers refer to this sloppy way of working as _____ code.

hacking

Once a new information system has been designed and the plans approved, the project can move into the next stage, which is

implementation.

A(n) _____ enables the expert system to draw deductions from the rules in the knowledge base in response to user input.

inference engine

A(n) _____ system collects, stores, and processes data that people in organizations use to manage daily and long-term operations and to create and sell various types of products.

information

A(n) _____ is sometimes called a software robot, or bot.

intelligent agent

A database ____ can be used to identify a set of information and therefore provide a means of searching or sorting.

key

A _____ error occurs when a program's syntax is correct, but the program instructs the computer to perform an action incorrectly.

logic

Which of the following technologies uses sensors mounted around the skull to read the different types of waves or power spectrums the brain gives off?

mental interface

Information about the structure, specifications, and purpose of each element in a database is described by the

metadata.

Using a(n) _____ approach to programming serves the purpose of making the code reusable and also helps in tracking down the sources of errors.

modular

A(n) _____ database uses a(n) _____ structure to organize data in three or more dimensions, as shown in this graphic.

multidimensional; cube

A(n) _____ database allows the storage of pictures, movies, sounds, and hyperlinked fields

multimedia

Using carbon _____ might make it possible to create more compact processors, which would operate much faster and conserve power.

nanotubes

Imagine a computer that can read a set of news articles on any topic, understand what it has read, and write a report summarizing what it has learned. To do these things, the computer must have a

natural language interface.

A scripting language is a _____ language, meaning that it explains what the computer should do in English-like terms but not precisely how the computer should do it.

nonprocedural

In a(n) _____ database, data is stored in the form of _____, each of which contains both the related data and the actions that might be performed.

object-oriented; objects

A(n) _____ collects, stores, and transmits data in a shared environment.

office information system (OIS)

Which of the following types of systems defines and clarifies methods of handling "what if?" questions posed to large databases?

online analytical processing (OLAP) system

A(n) _____ is a seller's website where customers can view and purchase products and services.

online store

A database that can be used by a retailer to track sales, update inventory records, and order more product is a(n) _____ database.

operational

Which of the following terms refers to the practice of hiring a consultant or other third party to handle a project?

outsourcing

Paying for online auction items and sending money to friends or family are popular uses of _____ payment systems.

person-to-person

The IT staff performs _____ maintenance to increase the reliability and ease of maintenance of an information system.

preventive

A _____ is a statement promising that a website will protect the confidentiality of any information a customer reveals.

privacy policy

A cloud setup created for and used by a single organization is a(n) _____ cloud.

private

Searching for, finding, and purchasing materials, supplies, products, and services at the best possible prices and ensuring they are delivered in a timely manner is known as

procurement.

The response to a request for proposal (RFP) typically asks for a(n) _____, which includes an estimate of how long the project will take to complete, an outline of the steps involved, and a list of the deliverables.

project plan

Virtual servers typically operate in a self-service fashion, allowing IT staff to add and remove new cloud services at will. This configuration or setup process is known as

provisioning.

Unlike a traditional computer, which operates based on binary on/off states, a _____ computer operates based on many superpositions of states.

quantum

To retrieve information from a database, the user generally creates a _____ and then runs it to display the results, or list of records that match the specified criteria.

query

Many warehouse systems use which of the following technologies to enhance inventory tracking and placement?

radio frequency identification (RFID)

A _____ program can seize control of a computer until the user agrees to the attacker's demands.

ransomware

If an address is stored in multiple data tables, it will need to be changed in all the tables if a customer moves. This is an example of which of the following?

redundancy

Within a company or business, _____ is the process of creating and commercializing new technologies and products for new markets.

research & development (R&D)

With a(n) _____, there's no need for physical hardware changes and no disruption to the app or service being delivered.

scalable server

When you shop at an e-tailer's site, you collect the items you want to buy in a virtual container called a(n)

shopping cart.

A(n) _____ operation is a loosely organized team allowed to pursue extreme innovation—often operating not only outside the corporate rulebook but also in a separate location away from the main corporate campus.

skunkworks

Sensors such as power meters, voltage sensors, and fault detectors that gather data, along with digital communication capabilities that send the data to an operations center or other location, are examples of which type of technology?

smart grid

Which of the following may be required to match the company's needs with the best technology solutions?

software engineering

Typically larger and a bit more formal than a skunkworks, a(n) _____ occupies the forefront of research & development efforts for such companies as Alphabet Inc. and Facebook.

special projects lab

Suppose a manufacturer wants to determine if one shift of workers creates better-quality products than another shift of workers. Which of the following systems will provide this information?

statistical quality control (SQC) system

Which device is basically an extension cord with multiple plugs on it but contains a metal oxide variable resistor that can absorb any excess power during a surge or spike, preventing it from reaching the plugged-in devices?

surge suppressor

Power _____ and spikes are basically the same thing: too much voltage.

surges

Deciding to play computer games all night instead of sleeping enough to perform well at work or school is an example of the unwise choices made by someone with a(n

technology addiction.

Many companies today incorporate _____ systems that combine GPS, wireless communications features, and other technologies to plan more efficient shipping routes and monitor shipment locations.

telematics

What is the purpose of performing adaptive maintenance on an information system?

to address other environment changes

business activity that's central to the nature of an enterprise, such as selling a product, is a(n)

transaction

A(n) _____ operates as a security-hardened version of a standard operating system (OS); it isolates OS functions and restricts unauthorized access to key areas of the OS.

trusted operating system (TOS)

In a relational database, each record is called a(n)

tuple.

A _____ contains everything a business needs to get a new information system up and running.

turnkey system

Which of the following is not one of the conditions of fair use?

using material that was published at least ten years ago (correct)

A large percentage of the human brain is dedicated to _____, which involves processing data coming from the eyes.

visual perception

With the _____ cloud, excess resources of computers connected to the internet are harnessed to complete a particular task, often in conjunction with other infrastructure.

volunteer

Most computers come with a basic one-year _____ against manufacturing defects for no additional charge.

warranty

A program with a single syntax error

won't work at all and will therefore be useless.


Set pelajaran terkait

French How to ask how someone is doing and responses

View Set

E.1 Analyze the development of informational passages: set 1

View Set

Chapter 9- Legal and Ethical Concerns

View Set

MIS 373 Chapter 1: Network Models

View Set