104 final exam ATTEMPT 10
True or False: A compiler is a software tool that helps programmers find errors quickly and closely examine what's happening when a program runs.
FALSE
True or False: A systems contract enables users to contact the system vendor for additional technical support and training when maintenance needs exceed in-house capabilities.
FALSE
True or False: A worm adds itself to another program and waits for the user to execute an attachment or open a file with a macro.
FALSE
True or False: An automated clearinghouse (ACH) is a type of automated banking network for transferring funds electronically from one account to another.
TRUE
Which of the following is a secure form of Hypertext Transfer Protocol (HTTP) that provides encryption for data sent through a web-based connection? · Secure Sockets Layer (SSL). · Transport Layer Security (TLS). · Web-Based Encryption (WBE). · Hypertext Transfer Protocol Secure (HTTPS).
· Hypertext Transfer Protocol Secure (HTTPS).
Which of the following statements does not describe pseudocode? · It's a useful tool for organizing the way a programmer thinks about a solution. · It involves envisioning a project in its entirety to identify the larger elements that must be handled first. · It's a formally styled natural language, not a programming language. · It's used to write algorithms.
· It involves envisioning a project in its entirety to identify the larger elements that must be handled first.
Which of the following statements describes a variable? · It's used to perform actions in a sequence. · It's a point where different actions may be performed depending on specific conditions. · It allows a program to return to a previously executed instruction and repeat it. · It's a data value stored in computer memory.
· It's a data value stored in computer memory.
With _____, the cloud service provider (CSP) or other provider offers the client a choice of tools and services along with the physical infrastructure to build cloud infrastructure. · Platform as a Service (PaaS). · Infrastructure as a Service (IaaS). · Software as a Service (SaaS). · Email as a Service (EaaS).
· Platform as a Service (PaaS).
What is a hologram? · an interactive video that's viewable on certain types of mobile devices. · a type of movie that requires audience members to wear special glasses with red- and blue-colored lenses. · an image that's created using stereolithography and that sometimes employs robotic elements. · an image that's generally created by splitting laser light and that appears as a full 3-D image, either still or in motion.
· an image that's generally created by splitting laser light and that appears as a full 3-D image, either still or in motion.
Each cloud service provider (CSP) operates with a different _____, which is a combination of software and other solutions used to run the provider's services. · infrastructure. · virtualization technology. · deployment model. · cloud management system.
· cloud management system.
Java has _____, which means it can run on nearly any operating system. · nonprocedural language. · communication facilitation. · scripting language. · cross-platform compatibility.
· cross-platform compatibility.
A database end user called a _____ types and changes database data as needed, ensuring that the contents of the database remain as up to date as possible. · data study operator. · database analyst. · data entry operator. · data personnel worker.
· data entry operator.
A password is considered strong if it's · a common word, such as Password. · easy to remember but hard to guess. · easy to remember because it's obvious, such as a pet's name. · hard to remember and easy to guess.
· easy to remember but hard to guess.
Supply chain management (SCM) is responsible for which of the following? · establishing, running, and refining the supply chain. · controlling the costs of supplies that enter the supply chain. · preventing the company from becoming interdependent on others. · achieving the company's goals at various stages in the production process
· establishing, running, and refining the supply chain.
The use of _____ technology to transmit payments electronically eliminates the labor-intensive practices and delays involved in processing checks. · payment data interchange (PDI). · financial electronic data interchange (FEDI). · financial payment option (FPO). · payment plan interchange (PPI).
· financial electronic data interchange (FEDI).
A _____ cookie is created by the actual website a user visits. · first-party. · global. · second-party. · third-party.
· first-party.
A(n) _____ database is a traditional data file storage system that contains only one data table or file. · multimedia. · object-oriented. · flat file. · relational.
· flat file.
Many errors occur because the programmer was sloppy during the programming process. Programmers refer to this sloppy way of working as _____ code. · hacking. · decoding. · compiling. · debugging.
· hacking.
A(n) _____ enables the expert system to draw deductions from the rules in the knowledge base in response to user input. · software robot. · genetic algorithm. · knowledge engineer. · inference engine.
· inference engine.
Which of the following technologies uses sensors mounted around the skull to read the different types of waves or power spectrums the brain gives off? · neural network. · natural interface. · speech recognition. · mental interface.
· mental interface.
A _____, which simulates the physical workings of the human mind, is the ultimate attempt to model human intelligence. · genetic algorithm. · neural network. · crossover. · fuzzy logic system.
· neural network.
A(n) _____ collects, stores, and transmits data in a shared environment. · radio frequency identification (RFID). · distribution logistics system (DLS). · management information system (MIS). · office information system (OIS).
· office information system (OIS).
A quantum computer evaluates _____, which can represent on/off as well as a number of other probable superpositions of those states. · qubits. · microchips. · digits. · kilobytes.
· qubits.
A _____ program can seize control of a computer until the user agrees to the attacker's demands. · hijacking. · boot sector. · ransomware. · multipartite.
· ransomware.
Deciding to play computer games all night instead of sleeping enough to perform well at work or school is an example of the unwise choices made by someone with a(n) · internet addiction. · technology focus. · technology addiction. · digital obsession.
· technology addiction.