MT CS103
_____ is the process by which virtual private networks (VPNs) transfer information by encapsulating traffic in Internet Protocol (IP) packets over the Internet. [FITB]
Tunneling
Harrison works at a nationally known grocery store chain. He is analyzing sales data from the past five years to determine which low-selling products should be discontinued. Harrison is most likely a(n) ________.
data scientist
Kyle works for National Sporting Goods, where he manages critical data elements, such as identifying and acquiring new data sources, creating consistent reference data, and analyzing data for quality. Kyle is a _______.
data steward
Which of the following theories explains how a new idea or product gains acceptance and spreads through a specific population or subset of an organization?
diffusion of innovation theory
Laptops are a good example of _____ because they are gradually displacing desktop computers due to new and better performance characteristics. [FITB]
disruptive innovation
The Uniform Resource Locator (URL) www.cengage.com is an example of a(n) _____ that identifies the Internet host site.
domain name
Starting from monthly sales data, if you wish to get weekly sales data, use the ___ feature.
drill down
In the _____ process, all of the data from various sources is converted into a single format suitable for processing.
extract
A universal serial bus (USB) _____ drive is one example of a commonly used solid state secondary storage device (SSD). [FITB]
flash
A clothing store chain tracks the sale of each product at each location. Managers use this information to calculate the organization's profits, to track inventory needs, and to determine which styles and fabrics are the most popular among its customers. This is an example of quality information that is ___________.
flexible
Clock speed of the central processing unit (CPU) is often measured in billions of cycles per second also known as _____. [FITB]
gigahertz
The ethical imperative that "care must be taken when recycling or destroying electronic devices to avoid contaminating the environment" is associated with _____. [FITB]
green computing
A(n) _____ is a direct access storage device that is used to store and retrieve data from rapidly rotating disks coated with magnetic material. [FITB]
hard disk drive (HDD)
Together, bits, characters, fields, records, files, and databases form the ______. [FITB]
hierarchy of data
Suppose you are assigned to manage a virtual team. Which of the following will you NOT do?
hold team meetings regularly - whether the team members like it or not
Of the five categories of innovation adopters, _______ are always the first to try new products and ideas. [FITB]
innovators
According to the diffusion innovation theory, _____ are the risk takers, always the first to try new products and ideas.
innovators
Network management software is a system software that controls the computer systems and devices on a network and allows them to communicate with each other.
False
Organizations can collect many types of data from a wide variety of sources, but typically they only collect structured data that fits neatly into traditional relational database management systems.
False
Solid state storage devices (SSDs) store data in hard disk drives or optical media rather than memory chips.
False
The Transmission Control Protocol (TCP) is responsible for managing IP addresses and Internet domain names.
False
The activities that lead to getting the right product into the right consumer's hands in the right quantity at the right time at the right cost are known as value chain management.
False
Massively parallel processing systems are a form of multiprocessing that speeds processing by linking hundreds or thousands of processors to operate at the same time.
True
One of the primary roles of a senior IS manager is to communicate with other areas of the organization to determine changing business needs.
True
Secondary storage can store large amounts of data, instructions, and information more permanently than allowed with main memory.
True
Some of the key factors in database design are content, access, structure, archiving, and security.
True
The information systems operations group is responsible for the day-to-day running of IS hardware to process the organization's information systems workload.
True
The operating system's application programming interface (API) provides software developers with tools they use to build application software without needing to understand the inner workings of the operating system and hardware.
True
Two of the major challenges business users face when using big data are finding the information they need to make decisions and knowing that the data they have is valid.
True
When you use your lab computer to access a printer, you are using the local area network (LAN).
True
Your friend has a Mac that runs OS X. If she needs to run a Windows app on it, she can set it to run Windows also.
True
The relational model describes data using a standard tabular format; all data elements are placed in three-dimensional tables called relations, which are the logical equivalent of files.
False
Thin client computers are a type of portable single-user computers.
False
Which of the following statements is NOT true about a mainframe computer?
A single computer with a single user is typical of a mainframe computer.
Two sets of fields can have a common primary key.
False
Businesses and organizations that manage a local area network (LAN) connect to the Internet via a Web browser.
False
_____ is the term used to describe enormous and complex data collections that traditional data management software, hardware, and analysis processes are incapable of handling.
Big data
__________ programming language is the precursor to languages such as C++, C#, and Java. [FITB]
C
Information is simply a collection of raw facts such as an employee number or the total hours worked in a week.
False
______ use basic graphical symbols to show an organization of and relationships between data. [FITB]
Entity-relationship (ER) diagrams
_____ is a markup language designed to transport and store data on the Web.
Extensible Markup Language (XML)
A collection of data fields that are all related to one object, activity, or individual is called a file.
False
A liquid crystal display (LCD) functions by exciting organic compounds with electric current to produce bright and sharp images.
False
An attribute is a general class of people, places, or things for which data is collected, stored, and maintained.
False
Bioprinting, which uses 3D printers to build human parts and organs from actual human cells, is widely considered to be unethical.
False
_____ is a visa program that allows skilled employees from foreign lands into the United States.
H-1B
_______ is an open-source software framework that includes several software modules that provide a means for storing and processing extremely large data sets. [FITB]
Hadoop
Which of the following statements is true of a database?
It helps companies analyze information to open new market opportunities.
_____ is a popular programming language for client-side applications that enable a user to create interactive Web pages that respond to user actions. [FITB]
JavaScript
_____ are used in standardized tests, including the SAT and GMAT tests, and to record votes in elections.
Optical mark recognition (OMR) systems
If you wish to develop expertise in database management, you must learn popular language known as ______. [FITB]
SQL
________ is the term used to describe the information systems and solutions built and deployed by departments other than the information systems department. [FITB]
Shadow IT
Most operating systems support virtual memory which allocates space on the hard disk to supplement the immediate, functional memory capacity of RAM.
True
_____ is a special-purpose programming language for accessing and manipulating data stored in a relational database.
Structured Query Language (SQL)
As the difference among computer manufacturers in the areas of price and performance narrows, support for green computing is emerging as a new business strategy for these companies to distinguish themselves from the competition.
True
Carlos is working with an existing database, but he wants to eliminate some of the columns in the table to create a new, more streamlined database. He will use projection to create his new database.
True
_____ is a communication standard that enables computers to route communications traffic from one network to another as needed.
The Internet Protocol (IP)
Data represents real-world things including raw facts such as image and audio data.
True
If "color" is an attribute, then "green" is a data item.
True
4G will deliver 3 to 20 times the speed of 3G networks for mobile devices.
True
A database must reflect the business processes of an organization.
True
A relational model splits the information up into many two dimensional data structures.
True
An operating system is a set of programs that controls the computer hardware and acts as an interface with applications.
True
An organization's technology infrastructure includes all of the hardware, software, databases, networks, people, and procedures that are configured to collect, manipulate, store, and process data into information.
True
_____ works by swapping programs or parts of programs between memory and one or more disk drives. [FITB]
Virtual memory
In terms of information systems, Wikipedia would be an example of _________.
a group IS
A(n) _____ is a Website that people can create and use to write about their observations, experiences, and opinions on a wide range of topics. [FITB]
blog
A(n) _____ is a defect in a computer program that keeps it from performing as its users expect it to perform [FITB]
bug
In a _____, all network devices are connected to a common backbone that serves as a shared communications medium.
bus network
According to Leavitt's theory, _______ in one aspect of the information system element will necessitate changes in other elements also. [FITB]
change
"Kaizen" is the Japanese word for _________. [FITB]
continuous improvement
The position of a _____ is a non-technical position responsible for defining and implementing consistent principles for setting data standards and data definitions that apply across all the databases in an organization.
data administrator
The _____ is a specific language, provided with a database management system (DBMS) that allows users to access and modify the data, to make queries, and to generate reports.
data manipulation language (DML)
In a relational database model, _____ involves combining two or more tables. [FITB]
joining
Which of the following types of credit cards is currently diminishing in popularity and being replaced by the other three types?
magnetic stripe
The component of a computer that provides the CPU with a working storage area for program instructions and data is called the __________.
main memory
Social journalism or citizen journalism ________.
may not be as reliable as mainstream media sources
A _____ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a city.
metropolitan area network (MAN)
A type of memory whose contents are not lost if the power is turned off or interrupted is said to be _____.
nonvolatile
For each type of IS (personal, group, enterprise), there are _____ that must be in place to ensure successful implementation and use of the system. [FITB]
organizational complements
In a supply chain, _____ involve the transformation, movement, and storage of supplies and raw materials.
physical flows
Web _____ such as Adobe Flash and Real Player, provide additional features to standard Web sites. [FITB]
plug-ins
Organizations that run hundreds or even thousands of servers in a server farm are naturally concerned about _____, which is why they're looking for low-cost, renewable energy sources. [FITB]
power usage
Kendra is taking a class in Finance and she has been asked to give a speech about a case study in which she's been working. She wants to create a set of slides containing a summary of her study notes that she will project on a screen while she's speaking. Which type of personal application software should she use to create her slides?
presentation graphics
The action of including only some columns for output while retrieving data is known as ____.
projecting
To keep information beyond reach of unauthorized users is to keep the information _____.
secure
Lara recently purchased the Microsoft Office Suite for her own use on her laptop. She has not really purchased the software but rather a ____. [FITB]
single-user license
Providing value to a _____ is the primary goal of any organization.
stakeholder
A(n) _____ is a professional in a developmental group of an information systems department who assists in choosing and configuring hardware and software, matching technology to users' needs, monitoring and testing the system in operation, and troubleshooting problems after implementation. [FITB]
systems analyst
The ancestor of the Internet was _____.
the ARPANET
A _____ is a low-cost, centrally managed computer with no internal or external attached drives for data storage with limited capabilities.
thin client
Domain names must always have at least _____ parts, with each part separated by a dot (period).
two
The first stage of Lewin's change model, _____, means ceasing old habits and creating a climate that is receptive to change. [FITB]
unfreezing
Most of the data that an organization must deal with is _____ data, meaning that it is not organized in any predefined manner. [FITB]
unstructured
If your home air conditioner has an IP address, it is part of the ____.
Internet of Things