IT104 final
relational database
A database that represents data as a collection of tables in which all data relationships are represented by common values in related tables
true
A real-time system, such as an air traffic control system, requires data with second-by-second accuracy. (true or false)
knowledge engineer
A(n) ____ is a programmer who specializes in building knowledge bases, each consisting of a set of rules that the computer will try to prove or disprove by asking a battery of questions
natural language processing
In ____, a person might interact with a computer by speaking or typing sentences
disk utility
Mac OS X tool that checks for hard drive errors
disk check
The Windows utility you can run to find and fix storage-related problems on a hard drive.
mobile commerce (m-commerce)
Which form of e-commerce enables consumers to make online purchases using their smartphones, tablets, and other mobile devices?
responsive
____ design is sometimes referred to as *mobile-first* design because the needs of mobile devices are at the forefront
analytics
____ includes communicating insights about data, such as the spending behavior of a group of customers
short circuit
a bad electrical connection that causes the current to flow in the wrong direction, which stops the power supply
transaction
a business activity that's central to the nature of an enterprise, such as selling a product, is a(n) _____
compressed air
a can of ____ comes with a detachable thin plastic tube that allows directing the airflow precisely when cleaning the inside of a computer case
false
a compiler is a software tool that helps programmers find errors quickly and closely examine what's happening when a program runs (true or false)
algorithm
a complete list of the steps for solving a problem in a programming language
decision support systems (DSS)
a computerized program used to support determinations, judgements, and courses of action in an organization or a business
cloud bursting
a configuration method that uses cloud computing resources whenever on-premises infrastructure reaches peak capacity
variable
a data value stored in a computer's memory
data entry operator
a database end user called a _____ types and changes database data as needed, ensuring that the contents of the database remain as up to date as possible
data modeling
a decision support system (DSS) uses ____ to simulate real-world situations and consider "what if?" scenarios
uninterruptible power supply (UPS)
a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power
how will users' identities be confirmed
a disaster recovery plan typically does **not** answer
data center
a facility that provides shared access to applications and data using a complex network, computer, and storage infrastructure, private cloud
object-oriented database
a major type of database that operates by storing data in objects rather than in tables
smart card
a plastic card that contains a computer chip with stored information
decision
a program that contains a(n) ____ statement, or point where different actions may be performed depending on specific conditions, will be more useful that one that simply follows a linear sequence of actions without variation
trojan horses
a program that does something undocumented which the programmer intended, but the user would not accept if they knew about it
scripting language
a programming language that employs a high-level construct to interpret and execute one command at a time
looping
a programming structure that repeats a sequence of instructions until a specific condition is met
hypertext transfer protocol secure (HTTPS)
a protocol that secures communication and data transfer between a user's web browser and a website
qubits
a quantum computer evaluates what? it can represent on/off as well as a number of other probable superpositions of those states
true
a real-time system, such as an air traffic control system, requires data with second-by-second accuracy (true or false)
an alarm will sound
a separation alarm consists of two small devices; you attach one to your computer and place another close to you. If the two devices are separated, what will happen?
graphene
a single sheet of carbon atoms (like one layer of graphite)
field
a single value, such as an address in a database
structured programming
a technique where a programmer thinks in terms of creating groups of instructions rather than simply executing lines one after another and writing code line by line
assembly language
a type of low-level programming language that is intended to communicate directly with a computer's hardware
rogue hotspot
a wireless access point that has been installed on a secure network without explicit authorization from a local network administrator
false
a worm adds itself to another program and waits for the user to execute an attachment or open a tile with a macro. (true or false)
office information system (OIS)
a(n) ____ collects, stores, and transmits data in a shared environment
online store
a(n) ____ is a seller's website where customers can view and purchase products and services
shopping agent
a(n) ____ uses a variety of techniques to collect product information from various online merchants, enabling consumers to compare prices for a particular product or type of product
neurosynaptic computing
aims to mimic the functioning of the human brain through grater interconnectivity among memory, processors, and communications
false
an OLAP cube structures data in a single dimension (true or false)
penetration testing
an authorizes simulated attack performed on a computer system to evaluate its security
logic error
an error that occurs when there is a fault in the logic or structure of the problem
run-time error
an error that takes place while executing a program
disaster recovery plan
an organization's method of regaining access and functionality to its IT infrastructure after events like natural disasters, cyberattacks, or business disruptions
pseudocode
an outline of the basic ideas behind how algorithms will work, an informal language that helps programmers develop algorithms
entity
anything you keep a record of in a database
false
asymmetric encryption is also called *secret key encryption* (true or false)
fuzzy logic system
attempts to simulate real-world conditions, uses deliberately vague terminology, such as very probable and reasonable, and attempts to work naturally with the user by piecing together an answer
copyright
awarded to the author or artist who created it
patent
awards ownership to the creator
management information system (MIS)
can identify problem activity, such as an unusually high number of production errors or customer returns
spreadsheet
chapter 10 states that a simple decision support system can be created using a ____ program
false
cloud apps run from the cloud and can be used to perform various tasks with files or data stored on your hard drive (true or false)
Infrastructure as a Service (IaaS)
cloud-based and pay-as-you-go services such as storage, networking, and virtualization
expert system
computer program that uses artificial intelligence technologies to simulate the judgement and behavior of a human or an organization that has expertise in a particular field
worms
computer programs that replicate functional copies of themselves, they exist as separate entities and do not attach themselves to files or programs
field
contains data about one aspect of the table subject, such as first name or email address
record
contains specific data, like information about a particular employee or a product
first-party cookies
cookies available to the domain that created it only
third-party cookies
cookies that are accessible on any website that loads the server's code
corrective maintenance
correcting software defects, errors, and faults
metadata
data that provides information about other data
query tools
database tools you can use to access data and the database catalog, create and implement SQL queries and create and manage database objects and database users.
technology addiction
deciding to play computer games all night instead of sleeping enough to perform well at work or school is an example of the unwise choices made by someone with a(n)
uses horizontal bars on a timeline to show the stages and tasks in a project and the order in which they must be completed
describe a Gantt chart.
deliverable
document, service, hardware, or software that must be finished and delivered by a certain date and time to maintain the project schedule
alpha product
during the implementation phase of the software development lift cycle (SDLC), the development team tests a(n) ____, which is a preliminary version of a software application
inference engine
enables the expert system to draw deductions from the rules in the knowledge base in response to user input
check-out
ensures that only one person is able to edit a file at a time
factories and laboratories
environment where FORTRAN is still commonly used
trademark
establishes ownership of a symbol or logo
adaptive maintenance
focuses on changing software in response to changes in the environment
perfective maintenance
focuses on features that improve the user experience through functional enhancements
deduplication
form of compression that eliminates redundant data n a subfile level, improving storage utilization
black-hat hackers
hackers motivated by malicious intent
white-hat hackers
hackers that probe cybersecurity weaknesses to *help* organizations develop stronger security
dexterity
hand-eye coordination is called
attribute
in a relational database, a field is called a(n)
electronic point of sale system
in a store or restaurant, the cash register system and supporting information system software and systems are commonly referred to as the _____.
false
in deep learning, the computer learns using specific task algorithms rather than data representation
carbon nanotubes
makes it possible to create more compact processors, which would operate faster and conserve power
preventive maintenance
makes system changes to reduce the chance of future system failure
biometric identifier
many companies control employee access to secure areas using a ____, such as voice, fingerprint, hand geometry, facial geometry, a retinal pattern, an iris pattern, or a handwritten signature
telematics
many companies today incorporate ____ systems that combine GPS, wireless communications features, and other technologies to plan more efficient shipping routes and monitor shipment locations
datasets
many divisions of the US government make ____ available for free online, including through the portal Data.gov
software engineering
may be required to match the company's needs with the best technology solutions
syntax error
mistakes in the source code such as spelling and punctuation errors, incorrect labels, etc
warranty
most computers come with a basic one-year ____ against manufacturing defects for no additional charge
mutations
multiple variations of algorithms are called
k-slot
named after the company that created and sells the lock, may be a combination lock or key-opened lock, depending on the model, connects to a laptop through a slot or hole in the side of the computer
data types
numeric and alphanumeric are examples of ____. or types of information specific fields will hold.
computer-integrated manufacturing
offers a broader coverage than a computer-aided manufacturing (CAM) system
phishing
often seen in the form of malicious emails pretending to be from credible sources to steal usernames, passwords, creditcard information, etc
database administration
operating and maintaining the database system in company's information systems
assets
patents, copyrights, customer lists, developed technologies such as computer software, licenses or franchises
audio perception
people respond to audible cues about their surroundings without even thinking about them because of their ____ abilities
business system analyst
person that gathers business requirements from various areas in the organization and translates them into functional system design specifications that can be executed by IT development teams
virus
piece of code that can be embedded in a data file that are attached to data files rather than executable programs
redundancy
portion of the total information contained in a message that can be eliminated without loss of essential information
joining process
process which matches data from fields in the specified data tables
entity
records of multiple phone calls are an example of a(an) _____ in a database
tactile perception
refers to the sense of touch
supply chain management (SCM)
responsible for establishing, running, and refining the supply chain.
encryption
security method where information is encoded and can only be accessed or decrypted by a user with the correct key
Software as a Service (SaaS)
software that is available via third-party over the internet
intelligence agent
sometimes called a software robot, or bot
multidimensional database
stores data that can be analyzed from different perspectives called dimensions
power conditioner
stores extra voltage in a capacitor then discharges that voltage onto the power line when it detects a low-voltage condition
multimedia database
stores images, audio clips, and/or video clips
computer-aided software engineering (CASE)
suites of powerful applications designed specifically to help with project management, programming, user testing, and so on are referred to collectively as _____ tools.
assets
suppose that a hacker gains access to a hospital's patient record and exposes confidential medical information. the negative effects on the hospital's reputation and patient relationships that result are examples of damage to which
computer vision syndrome
symptoms of ____ can include headaches, loss of focus, burning or tired eyes blurred or double vision, and neck and shoulder strain
point of sale (POS)
system that facilitates transactions in retail sales
eHealth
technology that enables doctors to access patients' medical records from a single source and use online data to help with diagnosis and treatment
ciphertext
text that's been encrypted and is therefore unreadable is called
hybrid cloud
the blending of two or more different types of clouds
Platform as a Service (PaaS)
the cloud service provider or other providers offers the client a choice of tools and services along with the physical infrastructure to build cloud infrastructure
denial of service attack (DoS)
the deliberate flooding of a machine or network with bogus traffic to overwhelm them and make their service unavailable
computer-aided manufacturing (CAM) systems
the manufacturing of goods controlled and automated via computer and robot
modularity
the measurement of how well the source code is divided into individual modules.
beta testing
the period during which the system is tested for errors and failures in operation is called
outsourcing
the practice of hiring a consultant or other third party to handle a project
check-in
the process of adding a new or modified item or file to a document library or a list to replace the previous version
research and development
the process of creating and commercializing new technologies and products for new markets
normalization
the process of structuring a database to avoid redundancy and undesirable dependencies
electrostatic discharge (ESD)
the release of static electricity when two objects come into contact
computer-integrated manufacturing (CIM) systems
the technique of using computers to control an entire production process
true
the terms **3-D printing** and **additive manufacturing** refer to the same technology (true or false)
a comparison of codes of ethics adopted by major organizations
the themes displayed in the graphic above were derived from (there is no graphic though)
documentation
the written notes that explains how a program works are referred to as
volunteer cloud
type of cloud where excess resources of computers connected to the internet are harnessed to complete a particular task, often in conjunction with other infrastructure
public key encryption
type of encryption that has two different keys, making one of the keys available for anyone to use
symmetric encryption
type of encryption that only requires one key to both encrypt and decrypt electronic data
trojan horse
type of malware that hides within a legitimate program or data file
online analytical processing (OLAP) system
type of system that defines and clarifies methods of handling "what if?" questions posed to large databases
modular
using a(n) ____ approach to programming serves the purpose of making the code reusable and also helps in tracking down the sources of errors.
provisioning
virtual servers typically operate in a self-service fashion, allowing IT staff to add and remove new cloud services at will, this process is known as
interdependence
when complex systems depend on other systems to be able to operate
spoofing
when fraudsters pretend to be someone or something else to win a person's trust
executable
when run by a program, a(n) ____ statement performs an action and then proceeds to the next statement in the sequence
digital wallet
when you use a(n) ____ to pay for a purchase, it automatically transfers the appropriate payment information to the retailer
object-oriented programming (OOP)
which of the following programming technique extends the modularity concept by defining each module with definite rules for interfacing and a protected set of variables?
dead code
which of these terms refers to code that's "commented out," or marked with comments to notify the compiler to skip and ignore it?
consistency check
which type of check is made against previously entered data that has already been validated?