IT 104 Final Exam Study Cards
One of the most widely used 3-D file formats for 3-D printers uses the _____ file name extension. .pdf .jpg .stl .docx
.stl
Which of the following is an example of numeric data? 1234 Main Street TRUE 626 December 8, 2021
626
Which of the following is not one of the elements of an effective acceptable use policy (AUP)? a policy statement that describes the computer services covered by the policy an "Acceptable Uses" section that clearly defines appropriate use a "Violations and Sanctions" section that tells users how to report violations and where to direct their questions a list of specific websites that may not be visited
A list of specific websites that may not be visited
What is a virtual server? a type of server that delivers content and services for a subscription fee a server that uploads backed-up data to the cloud a server accessed via a secure internet connection from the home, office, or anywhere else a server created by software rather than separate hardware
A server created by software rather than separate hardware
Which of the following types of malware hides within a legitimate program or data file? a Trojan horse ransomware a boot sector virus a worm
A trojan horse
Which type of data consists of letters, numbers, and sometimes special characters? Boolean alphanumeric numeric calculated
Alphanumeric
What is a hologram? an interactive video that's viewable on certain types of mobile devices a type of movie that requires audience members to wear special glasses with red- and blue-colored lenses an image that's created using stereolithography and that sometimes employs robotic elements an image that's generally created by splitting laser light and that appears as a full 3-D image, either still or in motion
An image that's generally created by splitting laser light and that appears as a full 3-D image, either still or in motion
Suppose that a hacker gains access to a hospital's patient records and exposes confidential medical information. The negative effects on the hospital's reputation and patient relationships that result are examples of damage to which of the following? assets risk tolerance software hardware
Assets
The virtual first-down lines and other status lines you see on the field when watching a football game on TV are created with which of the following? augmented reality (AR) virtual reality (VR) liquid crystal display (LCD) video teleconference (VTC)
Augmented reality
You may not have to worry about backing up your computer at work, because many businesses have a(n) _____ that automatically backs up data files. restore system update system external storage system backup system
Backup system
_____ is a high-level language that's friendlier and more natural than COBOL and FORTRAN. C++ C C# BASIC
Basic
Which of the following types of data processing takes place at a scheduled time or at a critical point in a process? up-to-date processing transaction processing scheduled processing batch processing
Batch Processing
For a consensus network, which of the following is intended to provide the ability to track and verify every asset transaction for security purposes? cryptocurrencies blockchain encryption validation
Blockchain
The term _____ was originally coined by Grace Hopper, the inventor of COBOL, to refer to a computer error. interpreter bug debugger compiler
Bug
In _____, companies use the internet to conduct a wide range of routine business activities with other companies. business-to-business (B2B) electronic commerce mobile commerce (m-commerce) online shopping business-to-consumer (B2C) electronic commerce
Business-to-business (B2B) electronic commerce
The abbreviation B2C stands for which type of e-commerce? buyer-to-company business-to-consumer business-to-client bidder-to-closer
Business-to-consumer
Which of the following legacy programming languages is used chiefly for business applications by large institutions and companies? FORTRAN RPG BASIC COBOL
COBOL
To show other users that a shared document is now available for them to check out and edit, you must ____ the document. Restore Replace Check in Check out
Check in
A _____ system offers much broader coverage than a computer-aided manufacturing (CAM) system. computer company production (CCP) computer statistical manufacturing (CSM) computer-integrated manufacturing (CIM) computer intelligence (CI)
Computer-integrated manufacturing (CIM)
Which type of check is made against previously entered data that has already been validated? referential integrity check consistency check normalization check range check
Consistency Check
Java has _____, which means it can run on nearly any operating system. nonprocedural language communication facilitation scripting language cross-platform compatibility
Cross-platform compatibility
In a genetic algorithm, the use of a(n) _____ in the selection process means that the most successful mutations are mixed to produce a new generation of "offspring." crossover mixed mutation adaptation hybrid
Crossover
Which of the following collects the body of metadata for the entire database? data collection metadata glossary data dictionary legacy database
Data Dictionary
Which of the following methods can help reveal patterns and transitions that may be hard to see when reviewing numeric data alone? data browsing data mining analytics data visualization
Data Visualization
A database end user called a _____ types and changes database data as needed, ensuring that the contents of the database remain as up to date as possible. data study operator database analyst data entry operator data personnel worker
Data entry operator
Suppose that a manager wants to identify employees who have called in sick more than 10 days in the past year. Which of the following database management tools should he or she use to display only this data? data filter data request data warehouse data sorter
Data filter
A system with high _____ provides more value to users than a system containing a large percentage of errors. redundancy data integrity database response time data corruption
Data integrity
Which of the following terms refers to the activities performed with a database? data designing data specialization data management data processing
Data processing
Which type of database spreads data across multiple networked computers, allowing greater storage and cheap and easy expansion? operational database networked database hybrid database distributed database
Distributed database
A password is considered strong if it's a common word, such as Password. easy to remember but hard to guess. easy to remember because it's obvious, such as a pet's name. hard to remember and easy to guess.
Easy to remember hard to guess
Legislation passed in 2000 broadly defined a(n) _____ to include "electronic sound, symbol, or process." digital wallet electronic signature debit card smart card
Electronic signature
Which of the following types of systems supports strategic decision-making by facilitating the creation of high-level summary reports that executives can use to make important decisions? computer-aided system (CAS) important information system (IIS) business intelligence system (BIS) executive information system (EIS)
Executive information system (EIS)
Sophisticated software that uses artificial intelligence techniques to model an expert's knowledge of a topics is called a(n) quality system. knowledge system. expert system. smart system.
Expert system
True or False: A compiler is a software tool that helps programmers find errors quickly and closely examine what's happening when a program runs.
False
True or False: Query tools are used to design and test data tables in a database.
False
In _____, the file system saves multiple previous versions of a file. file versioning business-level public clouds conversations cloud storage
File versioning
A _____ cookie is created by the actual website a user visits. first-party global second-party third-party
First-party
Suppose that a hacker breaks into someone's computer and copies his or her social security number, address, and credit card information. This crime is an example of rogue hotspotting. identify theft. cyberwar. industrial espionage.
Identity theft
Which of the following statements does not describe pseudocode? It's a useful tool for organizing the way a programmer thinks about a solution. It involves envisioning a project in its entirety to identify the larger elements that must be handled first. It's a formally styled natural language, not a programming language. It's used to write algorithms.
It involves envisioning a project in its entirety to identify the larger elements that must be handled first
Which of the following statements describes a power conditioner? It stores extra voltage in a capacitor and then discharges that voltage onto the power line when it detects a low-voltage condition. It allows you to change the source or condition of your power supply depending on the location or quality of the power at your PC's location. It handles power surges in the same way a surge suppressor does but can also power devices for a few minutes when a complete power outage occurs. It offers an additional power source for your tablet or PC.
It stores extra voltage in a capacitor and then discharges that voltage onto the power line when it detects a low-voltage condition
Which of the following statements describes a Gantt chart? It's a pie chart with sections that show the various departments that will be involved in completion of a project. It uses plotted lines on a graph to show how work on a project will affect business over time. It uses vertical columns to show the costs of specific parts of a project in order from high to low. It uses horizontal bars on a timeline to show the stages and tasks in a project and the order in which they must be completed
It uses horizontal bars on a timeline to show the stages and tasks in a project and the order in which they must be completed
Which of the following statements describes a variable? It's used to perform actions in a sequence. It's a point where different actions may be performed depending on specific conditions. It allows a program to return to a previously executed instruction and repeat it. It's a data value stored in computer memory.
It's a data value stored in computer memory
Which of the following statements does not describe an infinite loop? It's a type of run-time error. It causes a program to perform the same set of instructions over and over, without any way of stopping. It causes the computer to lock up or freeze. It's part of the program but actually has no effect on how the program runs.
It's part of the program but actually has no effect on how the program runs
Which of the following statements does not describe a K-slot? It's used to secure a desktop computer to a specific desk. It's named after the company that created and sells the lock. It may be a combination lock or key-opened lock, depending on the model. It connects to a laptop through a slot or hole in the side of the computer.
Its used to secure a desktop computer to a specific desk
A(n) _____ is a programmer who specializes in building knowledge bases, each consisting of a set of rules that the computer will try to prove or disprove by asking a battery of questions. knowledge engineer expert system intelligent agent artificial agent
Knowledge engineer
Assembly language uses symbols and words to represent the elements of _____, making it possible for programmers to memorize them. numbers high-level programming languages engineering programming machine code
Machine code
A(n) _____ database uses a(n) _____ structure to organize data in three or more dimensions, as shown in this graphic. multidimensional; cube hybrid; model object-oriented; object multidimensional; block
Multidimensional; cube
A(n) _____ database allows the storage of pictures, movies, sounds, and hyperlinked fields. multidimensional multimedia hybrid operational
Multimedia
Imagine a computer that can read a set of news articles on any topic, understand what it has read, and write a report summarizing what it has learned. To do these things, the computer must have a machine language interface. neural network. fuzzy logic system. natural language interface.
Natural language interface
In _____, a person might interact with a computer by speaking or typing sentences. virtual reality fuzzy logic systems neural networks natural language processing
Natural language processing
Related to perception, _____ deals with the science of moving a mobile robot through an environment. navigation locomotion dexterity hand-eye coordination
Navigation
A range check is usually performed on _____ data, such as birth dates. alphanumeric numeric character identification
Numeric
Which of the following types of systems defines and clarifies methods of handling "what if?" questions posed to large databases? expert system (ES) executive information (EI) system business intelligence (BI) system online analytical processing (OLAP) system
Online analytical processing (OLAP) system
Using a(n) ______ allows you to keep your backup files online while keeping your primary files on your local computer. offline backup service online backup service online updater service file restoring service
Online backup service
Customers can browse a(n) _____ to locate and purchase items online or download it and use it for offline shopping. online catalog shopping agent e-tailer personal shopper
Online catalog
A database that can be used by a retailer to track sales, update inventory records, and order more product is a(n) _____ database. distributed warehouse operational hybrid
Operational
Which of the following is not a common type of data model? XML multimedia personal object-oriented
Personal
With _____, the cloud service provider (CSP) or other provider offers the client a choice of tools and services along with the physical infrastructure to build cloud infrastructure. Platform as a Service (PaaS) Infrastructure as a Service (IaaS) Software as a Service (SaaS) Email as a Service (EaaS)
Platform as a service (PaaS)
A _____ doesn't usually damage hardware but can cause a temporary malfunction, resulting in memory storage errors that can make the operating system unexpectedly freeze up or restart. power conditioner battery backup surge suppressor power sag
Power sag
The IT staff performs _____ maintenance to increase the reliability and ease of maintenance of an information system. perfective corrective preventive adaptive
Preventive
A _____ is a statement promising that a website will protect the confidentiality of any information a customer reveals. nonviolation policy user policy privacy policy credibility policy
Privacy policy
A cloud setup created for and used by a single organization is a(n) _____ cloud. internet hybrid private public
Private
Programmers use a(n) _____ to create a program. encrypted dialect programming language intelligent agent syntax
Programming language
The response to a request for proposal (RFP) typically asks for a(n) _____, which includes an estimate of how long the project will take to complete, an outline of the steps involved, and a list of the deliverables. feasibility study project plan outsourcing prospectus software development
Project plan
A quantum computer evaluates _____, which can represent on/off as well as a number of other probable superpositions of those states. qubits microchips digits kilobytes
Qubits
When multiple users attempt to edit an existing record in a database simultaneously, _____ prevents changes from being written to the database as a safety precaution. data corruption record locking remote access data integrity
Record locking
Which type of query command asks a database to return records that match specified criteria? QBE command ACCESS command SELECT command STRUCTURED command
SELECT command
A cover that attaches with magnets to the side of a tablet and can be easily removed and replaced is called a _____ cover. plastic tablet snap smart
Smart
The smart grid can work with a _____ to track electricity usage at a residential or commercial customer and transmit data to the energy supplier for billing and other purposes. Wi-Fi system consumer smart meter meter reader
Smart Meter
Sensors such as power meters, voltage sensors, and fault detectors that gather data, along with digital communication capabilities that send the data to an operations center or other location, are examples of which type of technology? smart grid Bluetooth convergence internet
Smart grid
A set of instructions that describes how to perform a task is referred to as a(n) standard operating procedure (SOP). data-modeling procedure (DMP). electronic data-processing procedure (EDPP). connectivity procedure (CP).
Standard operating procedure (SOP)
_____ is the process of making sure that the data and files (and in some cases, the settings) you have in all storage locations and devices are the same. Uploading Syncing Sharing Downloading
Syncing
The _____, or structure, of a programming language tends to be less complex than that of a human language. source coding syntax term
Syntax
A(n) _____ is a technical expert who can help plan and develop the various parts of the information system that interact with other processes. systems engineer business systems analyst software engineer information technician
Systems engineer
A business activity that's central to the nature of an enterprise, such as selling a product, is a(n) electronic exchange. connection. information system. transaction.
Transaction
True or False: A backup appliance is a special computer system that's designed specifically for performing and storing backups.
True
True or False: A crash bug is one of the most dreaded types of run-time errors, because it causes a program to stop running, or crash.
True
True or False: A database designer's database management approach guides the process of developing and maintaining the database structures.
True
True or False: A report presents output from a data table or query in an easy-to-read format.
True
True or False: A single camera isn't good enough to simulate an eye; two cameras are needed to provide stereoscopic vision, which allows perception of depth and movement.
True
True or False: A systems integrator is a company that specializes in installing and supporting information systems.
True
True or False: Cloud apps run from the cloud and can be used to perform various tasks with files or data stored on your hard drive.
True
True or False: Making sure that the records entered into tables remain consistent with the relationships between the tables involves checking for referential integrity.
True
True or False: Penetration testing entails trying to hack into a system so its vulnerabilities can be identified and fixed.
True
True or False: ' A program can interrupt a looping pattern by using an if-then statement based on a particular action.
True
A(n) _____ is a combination surge suppressor, power conditioner, and battery backup. uninterruptible power supply (UPS) shutdown backup device (SBD) portable power supplier (PPS) power providing device (PPD)
Uninterruptible power supply (UPS)
A gap or weakness in a security program that allows a threat to find a way into the system is called a vulnerability. risk. cybercrime. fraud.
Vulnerability
Online hotel and airline reservation sites use _____ databases to hold availability and pricing information. relational XML web hybrid
Web
A large online meeting that's usually attended by 100 to 1,000 individuals is called a video link. webinar. conference. web chat.
Webinar
Public key encryption uses two encryption keys: a public encryption key, which all the _____ know, and a secret encryption key, which only the _____ know. authorized users; sender and receiver employees; customers senders; receivers managers; employees
authorized users; sender and receiver
The cloud delivers services and stores, processes, and manages data using _____, such as servers and software, rather than _____. data centers; your local computer internet-based resources; your local computer your local computer; internet-based resources your local computer; data centers
internet-based resources; your local computer