BSAT 303

Ace your homework & exams now with Quizwiz!

service-oriented

A _____ architecture is a software architecture perspective that focuses on the development, use, and reuse of small self-contained blocks of code to meet all the application software needs of an organization.

Web log

A _____ consists of one line of information for every visitor to a Web site and is usually stored on a Web server.

data dictionary

A _____ contains the logical structure for the information in a database.

digital dashboard

A _____ displays key information gathered from several sources on a computer screen in a format tailored to the needs and wants of an individual knowledge worker.

database

A _____ is a collection of information that you organize and access according to the logical structure of that information.

hardware key logger

A _____ is a hardware device that captures keystrokes on their journey from the keyboard to the motherboard.

cookie

A _____ is a small file that contains information about you and your Web activities, which a Web site you visit places on your computer.

data mart

A _____ is a subset of a data warehouse in which only a focused portion of the data warehouse information is kept.

worm

A _____ is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other Internet traffic.

CTO (chief technology officer)

A _____ is primarily responsible for overseeing both the underlying IT infrastructure within an organization and the user-facing technologies (such as CRM systems).

Smartphone

A _____ is really a mobile phone integrated into a handheld computer.

clickstream

A _____ records information about you during a Web surfing session such as what Web sites you visited, how long you were there, what ads you looked at, and what you bought.

the logical structure for the information in a database.

A data dictionary contains:

is used to convince people of the worth of a proposed system.

A selling prototype:

waterfall methodology

A sequential, activity-based process in which one phase of the SDLC is followed by another, from planning through implementation is known as the _____.

Web page

A specific portion of a clothing Web site deals with winter wear. This particular portion of the Web Site is known as a ____.

structured

A(n) _____ decision involves processing a certain kind of information in a specified way so that you will always get the right answer.

HTML document

A(n) _____ is a file that contains your Web site content and HTML formatting instructions.

intersection relationship

A(n) _____ is a relation you create to eliminate a many-to-many relationship.

neural network

A(n) _____ is an artificial intelligence system that is capable of finding and differentiating patterns.

genetic algorithm

A(n) _____ is an artificial intelligence system that mimics the evolutionary, survival-of-the-fittest process to generate increasingly better solutions to a problem.

firewall

A(n) _____ is hardware and/or software that protects a computer or network from intruders.

computer virus

A(n) _____ is software that is written with malicious intent to cause annoyance or damage.

data-mining agent

A(n) _____ operates in a data warehouse discovering information.

expert

A(n) _____ system, also called a knowledge-based system, is an artificial intelligence system that applies reasoning capabilities to reach a conclusion.

it is software you don't want hidden inside software you do want.

Adware is a type of Trojan horse software, meaning that:

search engine optimization

An important subset of Web analytics is _____, which improves the visibility of a Web site through the use of tags and key terms found by search engines.

a relation you create to eliminate a many-to-many relationship.

An intersection relation is:

enforce referential integrity

As a general rule, when establishing relationships between a primary and foreign key, you should turn on _____ to protect your database from inconsistent data.

open-source

B-Quant, a double-entry bookkeeping software, is created and maintained by a distributed network of engineers, software developers, and users, each making contributions to the source code that is publicly available and free of charge. B-Quant is an example of _____ software.

<li>

Before each item in a list, what tag would you need?

Biometric Scanners

BioNext, a genomics research facility, uses scanners that are used to scan some human physical attributes like fingerprints or irises for security purposes. BioNext is using ____.

integrity constraints

By defining the logical structure of information in a relational database, you're also developing _____, which are rules that help ensure the quality of the information.

foreign primary

By turning on the enforcement of referential integrity option, your DBMS will make sure that when you enter a _____ key in a relation it matches one of the _____ keys in the other relation.

.edu

Carl Hoffman Business School is an academic institution. Which of the following TLDs is applicable for its Web site address? Refer: Figure B.3

recurring

Deciding how much inventory to carry and deciding at what price to sell the inventory are examples of _____ decisions.

clustering

Discovering groups of entities (like customers) that are in some way or another "similar," without using any a priori and known structures is known as _____.

maintenance

During the _____ phase of the SDLC, you monitor and support the new system to ensure it continues to meet the business goals.

loading

ETL is a three-step process that includes extraction, transformation, and _____.

populating

Entering information into an Access table is referred to as _____ it.

user interface management

For Excel, the _____ component includes things like buttons, menu options, formulas and functions, your ability to enter information into cells, and even your ability to manipulate a table by switching the row and column orientations.

255 characters

For text fields, which of the following is the default field size?

specify the content and format of your Web site.

HTML allows you to:

foreign

If a student's ID was also present in a relation that stored enrollment information, this field in the enrollment relation would be called a(n) _____ key.

Query-by-example

If you needed to identify inventory items whose stock was running low, which Access tool could help you find the answer?

Use the <br> tag

If you want to align your image to the right of the screen and do not want your text to appear to the left of it, what would you need to do?

Height and width

If you want to change the size of your image, what parameters(s) should you use?

Graphics

If you want to edit photos and remove "red eye" from them, you would choose the _____ category of personal productivity software.

<ol>

If you want to start a numbered list, what tag would you use in your Web document?

datasheet view

In Access, a report can be created using either Design View or the ____.

table

In a database management system, the word relation is also called a(n) _____ or file.

primary key

In a relational database, a _____ is a field, or group of fields in some cases, that uniquely describes each record.

foreign

In a relational database, a _____ key is a primary key of one file that appears in another file.

web browsers

Internet Explorer, Netscape, and Firefox are examples of ____.

Web site

KeepFit is a manufacturer of sports merchandise. You can visit a specific location on the Web and order merchandise from KeepFit. This specific location is KeepFit's ____.

.net

Margaret Sullivan is a TLD expert and a domain name consultant. Which of the following domains is she likely to suggest to her clients who want to start Internet companies?

generation

Microsoft Access's application _____ subsystem is used to create reports and input forms.

social networking site

Milieu is a Web site that allows you to post personal information about yourself, create a network, and share content photos and videos. Milieu is an example of a(n) ____.

slice and dice

Multidimensional analysis (MDA) tools are _____ techniques that allow you to view multidimensional information from different perspectives.

random access memory

On investigating a technical fault in his computer, Max finds out that a temporary holding area of information is affected and needs to be changed. Max needs to change the _____ of his computer.

Create the data dictionary

Once the structure of the database has been created, what is the next step?

supercomputers

Organizations such as NASA and the National Weather Service that are heavily involved in research and "number crunching" and require computers with high processing speed, are most likely to employ which of the following computers?

TCP/IP

Ralph, an Internet user, frequently downloads screensavers from the Web. In downloading the files from an ftp server, Ralph uses both ftp and ____.

Boolean operator

Ramona wants information about Golden Eagle Resorts in Utah on the Web. However, she wants to exclude results containing golden eagles (birds) found in Utah. She can use a _____ to refine her search.

Image Scanner

Sebastian, a student of digital art, is planning to buy a scanner that can capture images, photos, text, and artwork that already exist on paper. Which of the following types of scanners satisfies Sebastian's requirements?

multifunction printer

Simon is planning to buy an output device for his home that can scan, copy, fax, and print. Which of the following devices best satisfies Simon's requirement?

web 2.0

Social networking sites like Facebook are examples of the dynamic application of ____.

Presentation

Stefanie is preparing for a class lecture that requires her to create and edit information that will appear in electronic slides. Which of the following categories of personal productivity software is best suited to Stefanie's needs?

/ol,li

The <_____> tag ends the numbered list, and you use the <_____> tag for each item in the list.

extreme programming methodology

The _____ breaks a project into tiny phases and developers cannot continue on to the next phase until the current phase is complete.

data management

The _____ component of a decision support system (DSS) performs the functions of storing and maintaining information and also that of giving you access to information you want your DSS to use.

model management

The _____ component of a decision support system consists of a wide variety of statistical and analytical tools, techniques, and models.

technical architecture

The _____ defines the hardware, software, and telecommunications equipment required to run the system.

agile

The _____ methodology, a form of XP, aims for customer satisfaction through early and continuous delivery of useful software components.

data definition subsystem

The _____ of a DBMS helps you create and maintain the data dictionary and define the structure of the files in a database.

logical

The _____ view of information focuses on how a knowledge worker needs to arrange and access information to meet her/his particular business needs.

Maintenance

The activity of providing an environment to support system changes is part of which of the following SDLC phases?

Database Management Systems

The competitive advantage for many people seeking employment is knowledge in which of the following software packages?

biomimicry

The concept of learning from ecosystems and adapting their characteristics to human and organizational situations is called _____.

helps you add, change, and delete information in a database.

The data manipulation subsystem of a DBMS:

Arabic

The default numbering for numbered lists is ____.

hypercube

The multidimensional representation of information in a data warehouse is referred to as a _____.

Set the project scope

The planning phase of SDLC involves which of the following activities?

composite primary key

The primary key fields from the two original relations become foreign keys in the intersection relation. When combined, the two foreign keys make up the _____ for the intersection relation.

two dimensional table

The term relation, in relational database, often describes each _____ in the relational model.

bold

The three most commonly used basic HTML formatting tags are ____, underline, and italics.

Data sheet View Design View

There are two main ways to create the data dictionary for e relation: in ______; and in ____.

Design View

To change the structure of a relation (table or file), what needs to be open in Microsoft Access?

bodybackground

To use an image and create a textured background, you use the <_____> tag.

tests individual pieces of code for a system.

Unit testing:

Underline, bold, and italics

What are the three most commonly used basic HTML formatting tags?

.htm and .html

What file extension(s) can you use for your Web documents?

A specific portion of a Web site that deals with a certain topic

What is a Web page?

It is a point on the Internet where several connections converge.

What is a network access point?

Defining entity classes and primary keys

What is the first step in designing and building a database?

A report is designed for human consumption

What is the fundamental difference between tables (or queries) and reports?

Relational database

What is the most popular type of database?

<font color>

What tag would you use in your HTML document to change the color of your text?

<body background = "filename.extension">

What tag would you use to add a textured background to your Web site?

Radio Waves

What type of transmission does WiFi use?

Further grouping

When generating a report, _____ lets you specify groups within the top grouping

truncated

When viewing a report where information in a field has been cut off, it is said to be ____.

Web browser software

When you are using a software that allows you to surf the Web, you are using a(n) ____.

M:1

When you drag and drop a foreign key onto a primary key, what does Microsoft Access assumes the relationship is?

As a separate file in your Web space

Where should an image be stored before it appears in your Web site?

USB port

Which of the following allows you to connect as many as 127 devices to a single port on your computer?

Plotter

Which of the following creates the output by moving a pen across the surface of a piece of paper?

Project plan

Which of the following defines the what, when, and who questions of systems development including all activities to be performed, the individuals, or resources, who will perform the activities, and the time required to complete each activity?

Web browser software

Which of the following enables you to surf the Web?

Whaling

Which of the following fraudulent techniques targets senior business executives, government leaders, and other types of high-profile individuals?

Microsoft Access

Which of the following helps you develop databases and use the information stored in them?

Search engine

Which of the following helps you find Web sites with the information you want?

E-R diagram

Which of the following is a graphic method of representing entity classes and their relationships?

Composite primary key

Which of the following is a key that consists of the primary key fields from two intersecting relations (files)?

Data warehouse

Which of the following is a logical collection of information, gathered from many different operational databases, used to create business intelligence that supports business analysis activities and decision-making tasks?

Trackball

Which of the following is a pointing device?

White-hat hackers

Which of the following is a term for knowledgeable computer users who test the vulnerability of systems so that protective measures may be taken?

Encryption

Which of the following is a term for scrambling the contents of a file so that you can't read it without having the right interpretation key?

it encourages active end user participation

Which of the following is an advantage of prototyping?

Josh has created an online service through which people can send short text-based messages to each other.

Which of the following is an example of microblogging?

Minicomputer

Which of the following is designed to meet the computing needs of several people simultaneously in a small to medium-size business environment?

Links to systems information

Which of the following is not one of the three types of commonly used links?

edu

Which of the following is the TLD of the URL, http:// www.uts.edu.au?

Onshore outsourcing

Which of the following is the process of engaging another company in the same country for services?

It splits the telephone line to facilitate voice communications and Internet connectivity parallely.

Which of the following is true about a DSL modem?

It provides e-mail services and accounts.

Which of the following is true about a mail server?

Podcasting

Which of the following provides you with broadcasts of audio and video files?

Systems development life cycle

Which of the following refers to a structured step-by-step approach for developing information systems and includes seven key phases and numerous activities within each phase?

Spam

Which of the following refers to unsolicited e-mail (electronic junk mail) from businesses that advertise goods and services?

Deleting fields which establish relationships to other tables

Which of the following tasks do you need to be careful of, when making changes to the information in any of the relations (tables or files) of the database structure?

Operating System Software

Which of the following types of software controls your application software and manages how your hardware devices work together?

dotted line

Which symbol should you use in an E-R diagram to show the relationship between a student and the courses they are currently enrolled in?

circle

Which symbol would you use in an E-R diagram to show that a student may or may not enroll in a course?

CPU lock

While repairing a faulty CPU, Igor discovers that a sliver of quartz that beats at regular intervals in response to an electrical charge is damaged. Which of the following represents the damaged part of the CPU that Igor is repairing?

Phishing

____ is a technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.

pyware

____ is malicious software that collects information about you and your computer and reports it to someone without your permission.

Tabs

_____ allow you to have multiple Web sites open at the same time.

Heading tags

_____ are HTML tags that make certain information, such as titles, stand out on your Web site.

Business requirements

_____ are the detailed set of end-user requests that the system must meet to be successful.

Pixels

_____ are the smallest display elements on a screen.

Ethics

_____ can be defined as the principles and standards that guide our behavior toward other people.

Query-by-example tools

_____ help you graphically design the answer to a question.

Plunge

_____ implementation discards the old system completely and immediately uses the new system.

Artificial Intelligence

_____ include(s) tools such as neural networks and fuzzy logic to form the basis of "information discovery" and build business intelligence in OLAP.

Predictive analytics

_____ is a highly computational data-mining technology that uses information and business intelligence to build a predictive model for a given business application.

Fuzzy logic

_____ is a mathematical method of handling imprecise or subjective information.

Text analytics

_____ is a process of using statistical, artificial intelligence, and linguistic techniques to convert information content in sources such as surveys, e-mails, blogs, and social media into structured information.

Key logger

_____ is a program that, when installed on a computer, records every keystroke and mouse click.

Notepad

_____ is a simple and easy-to-use version of Microsoft Word.

SQL

_____ is a standardized fourth-generation query language found in most DBMSs.

Swarm intelligence

_____ is the collective behavior of groups of simple agents that are capable of devising solutions to problems as they arise, eventually leading to coherent global patterns.

Outsourcing

_____ is the delegation of specific work to a third party for a specified length of time, at a specified cost, and at a specified level of service.

Touchpad

_____ is the little dark rectangle that you use to move the cursor with your finger, often found on notebook computers.

Summarization

_____ is the most basic, yet often the most powerful, form of data mining.

Prototyping

_____ is the process of building a model that demonstrates the features of a proposed product, service, or system.

Privacy

_____ is the right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.

Artificial intelligence

_____ is the science of making machines imitate human thinking and behavior.

Web space

_____ is the storage area where you keep your Web site.

Pirated software

_____ is the unauthorized use, duplication, distribution, or sale of copyrighted software.

Scope creep

_____ occurs when the scope of the project increases beyond its original intentions.

Intellectual property

_____ refer(s) to intangible creative work that is embodied in physical form.

Geographic information system

_____ refers to a decision support system designed specifically to analyze spatial information.

friendly fraud

_____ refers to instances of identity theft where the victims knew the person who stole their identity.

statistical

_____ tools help you apply various mathematical models to the information stored in a data warehouse to discover new information, such as the performance of regression analysis to determine the effect of one variable on another.

Integration testing

_____ verifies that separate systems can work together.

primary

defaults to identifying the first field in a relation as the _____ key.

flash memory cards

xD Picture Cards, SD cards, and CF Cards are examples of which of the following?


Related study sets

Accounting for Non-accounting Majors-Chapter 1 Role of Accounting in Business

View Set