IT Final 3
_____ is a high-level language that's friendlier and more natural than COBOL and FORTRAN.
BASIC
True or False: A compiler is a software tool that helps programmers find errors quickly and closely examine what's happening when a program runs.
FALSE
True or False: Database management systems don't include security measures to protect and safeguard data, because it isn't possible for anyone to gain unauthorized access to a database.
FALSE
True or False: In the worlds of business and technology, the term smart grid is used to refer to the merging of different technologies and industries to form a newer, better product or process.
FALSE
Which of the following is not one of the popular scripting languages?
Hypertext Markup Language (HTML)
Which of the following is a secure form of Hypertext Transfer Protocol (HTTP) that provides encryption for data sent through a web-based connection?
Hypertext Transfer Protocol Secure (HTTPS)
What does the abbreviation SQL stand for?
Structured Query Language
True or False: A report presents output from a data table or query in an easy-to-read format.
TRUE
True or False: The term risk refers to the likelihood of a security breach of systems or data that obtains, damages, or destroys assets.
TRUE
Third-party cookies are created by which of the following?
an ad on a site
Suppose that a hacker gains access to a hospital's patient records and exposes confidential medical information. The negative effects on the hospital's reputation and patient relationships that result are examples of damage to which of the following?
assets
In a relational database, a field is called a(n)
attribute.
The period during which the system is tested for errors and failures in operation is called
beta testing.
The term _____ was originally coined by Grace Hopper, the inventor of COBOL, to refer to a computer error.
bug
A(n) _____ operates one or more data centers, and organizations buy cloud capacity from it as needed.
cloud service provider (CSP)
Java has _____, which means it can run on nearly any operating system.
cross-platform compatibility
Which of the following terms refers to the activities performed with a database?
data processing
Which of the following methods can help reveal patterns and transitions that may be hard to see when reviewing numeric data alone?
data visualization
A person who plans and designs database systems is called a
database analyst.
The problem of redundancy can be avoided in backing up data by using _____ software, which examines the files and doesn't back up identical copies of certain folders and files multiple times.
deduplication
The functional specification states exactly what the information system must accomplish, and the _____ specification spells out how these goals will be reached.
design
Hand-eye coordination, which is related to tactile perception, is called
dexterity.
In a store or restaurant, the cash register system and supporting information system (IS) software and systems are commonly referred to as the
electronic point of sale system.
Suppose an auto manufacturer wants to upgrade its existing computer-integrated manufacturing system. To determine the likely size and cost of the project, the company will conduct a _____ study.
feasibility
A single value, such as an address, is an example of a _____ in a database.
field
Which of the following statements describes spoofing?
fooling another computer by pretending to send packets from a legitimate Internet Protocol (IP) address
A well-designed _____, like the one shown in this screen shot, provides the user with questions or prompts.
form
Many errors occur because the programmer was sloppy during the programming process. Programmers refer to this sloppy way of working as _____ code.
hacking
Performing a _____ wipes out everything on your device, returning the system to the exact state it was in when you got the device.
hard reset
A(n) _____ is sometimes called a software robot, or bot.
intelligent agent
A business's decisions and actions often depend on the decisions and actions of others; this fundamental business characteristic is termed
interdependence.
A database ____ can be used to identify a set of information and therefore provide a means of searching or sorting.
key
A(n) _____ is a programmer who specializes in building knowledge bases, each consisting of a set of rules that the computer will try to prove or disprove by asking a battery of questions.
knowledge engineer
Which of the following are first-generation programming languages?
machine languages
The IBM Watson supercomputer uses _____ to improve its performance in games of Jeopardy! played against humans.
machine learning
Using carbon _____ might make it possible to create more compact processors, which would operate much faster and conserve power.
nanotubes
In _____, a person might interact with a computer by speaking or typing sentences.
natural language processing
Which of the following is not a common type of data model?
personal
The IT staff performs _____ maintenance to increase the reliability and ease of maintenance of an information system.
preventive
Unlike a traditional computer, which operates based on binary on/off states, a _____ computer operates based on many superpositions of states.
quantum
A collection of related fields that describe a single entity, such as a place or event, is called a
record.
Tendinitis and carpal tunnel syndrome are two common types of
repetitive stress injuries.
The science of _____ involves creating machines capable of independent movement and action.
robotics
A(n) _____ uses a variety of techniques to collect product information from various online merchants, enabling consumers to compare prices for a particular product or type of product.
shopping agent
Typically larger and a bit more formal than a skunkworks, a(n) _____ occupies the forefront of research & development efforts for such companies as Alphabet Inc. and Facebook.
special projects lab
A(n) _____ operates as a security-hardened version of a standard operating system (OS); it isolates OS functions and restricts unauthorized access to key areas of the OS.
trusted operating system (TOS)
Depending on your cloud service, the _____ that's created might contain 25, 50, or more earlier versions of a file.
version history
A large online meeting that's usually attended by 100 to 1,000 individuals is called a
webinar.