Computer Science Stassi Final
In Prolog, facts can have no more than two arguments.
false
In the context of database security, intermediary servers allow users to directly access the database
false
In today's Web, most Web pages have bidirectional links.
false
Information systems can provide some or all of the data needed for strategic, tactical, but not operational planning.
false
LGAs have two rows of pins that connect the chip to a circuit board
false
MIDI files are less compact than digital audio files.
false
Modern processors follow Intel's original numbering sequence.
false
Programmers insert documentation called facts into the program code.
false
Spreadsheet software offers database capabilities for establishing relationships between different record types.
false
The file name of a specific Web page always appears first in the URL.
false
The operating systems for smartphones are radically different to those used for tablet computers
false
The order or sequence of rules in a Prolog program is usually critical.
false
The term product life cycle is frequently used to describe patterns in the way consumers adopt technology products.
false
The terms outsourcing and offshoring are the same thing
false
The use of several databases is one of ERP's major advantages.
false
To conserve space, applications that require highquality sound use low sampling rates
false
When connecting to the Internet, most Internet users connect to a Tier 1 network.
false
memory cards are typically volatile
false
programmers who work within the declarative paradigm envision a program as data objects that essentially network with each other to exchange data
false
you can specify the actual solution in the problem statement.
false
A computed ___________ is a calculation that a DBMS performs, similar to the way a spreadsheet computes a formula.
field
. ________ computers, such as UNIVAC, can be characterized by their use of vacuum tubes to store individual bits of data.
first-generation
Which of the following is a valid variable name in Python?
first_name
A(n) __________ file consists of a single, twodimensional table of data elements
flat
Expert systems are designed to deal with data that is imprecise or with problems that have more than one solution using a technique called __________.
fuzzy logic
A proprietary model called the __________ represents the position of a product during its life cycle of publicity
gartner hype cycle
Payment processing is based on an online payment __________ that authorizes credit and debit cards, PayPal, and Apple Pay transactions.
gateway
Social media are categorized into four groups: social networking, ___________ networking, content communities, and online communications
geosocial
In economics, _________ are things that can be used or consumed, whereas _________ are intangible actions performed for a consumer.
goods, services
Web pages are connected by __________ links.
hypertext
What is the term that is used to describe a computer system that could store literary documents, link them according to logical relationships, and allow readers to comment and annotate what they read?
hypertext
Which of the following is the least important characteristic of content communities?
identity
_______________ are two of the world's largest exporters of ICT services.
india and ireland
A(n) ____________ system collects, stores, and processes data to provide useful, accurate, and timely information, typically within the context of an organization.
information
Data becomes _______ when it is presented in a format that people can understand and use.
information
An instance of a class is said to be __________ (created) from the class.
instantiated
Which of the following is not a characteristic for a good problem statement?
it contains detailed descriptions of the processes and tools that need to be developed
A cryptographic ________ is a word, number, or phrase that must be known to encrypt or decrypt data.
key
Sometimes an application requests memory but never releases it, a condition called a memory ______.
leak
Which of the following is not considered to be type of database client?
local software, browsers, apps
_________ determine organizational goals and plan how to achieve those goals.
managers
Which type of network topology allows for redundant paths between devices that can be used to bypass failed devices?
mesh
A(n) _________ is a keyword that describes information, such as the content of a media element.
metadata tag
Data _________ refers to computer algorithms that analyze information to discover previously unknown and useful information, including relationships and patterns.
mining
Every organization has a goal or plan that's referred to as its ___________.
mission
The underlying structure of a database is referred to as a database _________.
model
The circles in a sociogram are referred to as sociogram ______.
nodes
________ data consists of numbers that can be used in arithmetic operations.
numeric
A class attribute defines the characteristics of a set of _______.
objects
____________ reduces the cost of goods and services by using workers and manufacturing facilities in countries with inexpensive labor.
offshoring
Many touchscreens have an _________ coating designed to repel the oils deposited by fingertips.
oleophobic
Most modern transaction processing systems use ________ processing—a realtime method in which each transaction is processed as it is entered.
online
A(n) _________ database is used to collect, modify, and maintain data on a daily basis.
operational
_________ technology divides a message into several packets that can be routed independently to their destination
packet switching
Speech recognition software analyzes the sounds of your voice and converts each word into groups of ________.
phoneme(s)
Bitmap images are formed by a grid of _____.
pixels
A(n) ________ is a program that extends a browser's ability to work with file formats
plugin
A communication ______ is a virtual end point for data entering and leaving a digital device.
port
. In a browser, _________ services can automatically complete your search requests based on previous searches.
predictive
__________ refers to a branch of data mining that analyzes current and historical data to predict future trends.
predictive analytics
Activities called ___________ involve the microprocessor receiving commands as software carries out tasks and while input arrives from the keyboard, mouse, and other devices.
processes
From the perspective of a business that creates and sells a technology product, the ____________maps the expected profitability of a product from its inception to its demise.
product life cycle
In the context of economics, ___________ is a measurement of the amount of output that is produced per unit of input.
productivity
A social media _________ is the set of information someone provides to friends, contacts, and the public.
profile
The object-oriented ________ is based on objects and classes that can be defined and manipulated by program code.
program
Which of the following is not one of the main activities associated with operational databases?
providing an executive dashboard for decision makers
When a router connects to and communicates over the Internet, it has a ________ IP address that is routable over the Internet.
public
Data __________ refers to the form in which data is stored, processed, and transmitted.
representation
System ___________ specify the operating system and minimum hardware capacities necessary for a software product to work correctly.
requirements
Which of the following feature is unique to OS X?
resource fork
Which of the following is an example of a DCE?
router, modem, hub
Which of the following is a scripting language?
ruby, perl, PHP
A Web _________ is an Internet-based computer that stores Web site content and accepts requests from browsers.
server
A virus __________ is a section of program code that contains a unique series of instructions known to be part of a malware exploit
signature
Unicode uses________ bits and provides codes for 65,000 characters
sixteen
Trojans depend on ________ to spread.
social engineering
Sociologists use social network diagrams called _________ to depict connections between people.
sociograms
A __________ document contains the text for a Web page interspersed with coding for how to display text and any additional visual or auditory elements.
source
_________ enables people to control software with spoken commands, as well as dictate text into a word processing document
speech recognition
__________ is the process by which machines produce sound that resembles spoken words.
speech synthesis
Which database tool is best for simple flat files that involve calculations?
spreadsheet software
Suppose you wanted to run a Web server or FTP server from your home. What type of IP address would you want?
static
One type of decision support system, called an executive information system, is designed to provide senior managers with information relevant to ___________ management activities such as setting policies, planning, and preparing budgets.
strategic
In programming, a sequence of characters is called a ____.
string
The term database ___________ refers to the arrangement of fields, tables, and relationships in a database.
structure
. The electronic components of most digital devices are mounted on a circuit board called a ______________.
system board, motherboard, main board
The term ________ refers to the part of a digital device that holds the system board
system unit
There are three core elements in a relational database: fields, ________, and relationships.
tables
3. Formal __________ standards make it possible to create generalized media search engines that can locate media from multiple locations.
tagging
Authors mark up HTML documents by inserting special instructions called HTML ______.
tags
If a Creative Commons license contains ND, what does that indicate?
the work must not be changed when it is redistributed or shared
Chrome OS is an example of a _________ because it depends substantially on processing and storage provided by cloud-based servers.
thin client
Which network tier forms the Internet backbone?
tier 1
. In the context of communication networks, the term __________ refers to the structure and layout of network components
topology
A(n) __________ is a word, name, symbol, or design used to identify one company and their goods from those of another company.
trademark
A(n) ___________ provides a way to collect, process, store, display, modify, or cancel transactions.
transaction processing system or TPS
In a wireless network, RF signals are sent and received by a ______________.
transceiver
. Regardless of sampling rate, digital audio file size can be reduced using audio compression techniques.
true
. In an HTML document, most tags are inserted as pairs.
true
A hard disk drive is an example of magnetic storage.
true
A multicore processor that executes more than one instruction at a time is referred to as a parallel processor.
true
A solid state drive can be used as a substitute for a hard disk drive.
true
An efficiently designed database uses computed fields whenever possible because they do not require manual data entry.
true
As a general rule, declarative programming languages are most suitable for problems that pertain to words and concepts rather than to numbers.
true
At an ecommerce site, the merchant's ecommerce application carries out only the first and last stages of the payment process.
true
AtanasoffBerry Computer is often considered the first electronic digital computer
true
Data refers to the symbols that represent people, events, things, and ideas.
true
Enterprise database applications tend to have some flexibility for customization,
true
Lossy compression throws away some of the original data during the compression process
true
Most commercial software is distributed under a singleuser license that limits use to one person at a time.
true
Most computer ads specify the speed of a microprocessor in gigahertz
true
Most spreadsheet software also includes basic data management features.
true
One of the main disadvantages of MIDI is that it cannot produce vocals
true
One of the ways that databases are classified is by their structure.
true
Password managers can generate unique passwords that have very good entropy
true
Processing is handled by the computer's central processing unit (CPU).
true
Prolog and other declarative languages were classified as fifth generation languages.
true
RAM is volatile.
true
Semiconductors are substances with properties between those of a conductor and an insulator.
true
Smartwatches are multifunction devices that can include a camera, thermometer, compass, calculator, cell phone, GPS, media player, and fitness tracker
true
Some software engineering activities overlap with the systems analysis and design activities
true
The Intel i7 microprocessor is x86 compatible.
true
The code for a computer program is based on an algorithm.
true
The most famous program in the world is a single line of code that prints "Hello Earth!" on the screen.
true
The most widespread wireless channels for communication networks are microwaves and RF signals.
true
The term instruction cycle refers to the process in which a computer executes a single instruction.
true
UDP is faster than TCP but does not perform error checking.
true
Which type of problem requires human intuition as the basis for finding a solution.
unstructured
A new version or edition of a software product is referred to as a software ___________
upgrade
It is a good idea to ________ your browser when a new version becomes available, mainly to increase security.
upgrade
The AtanasoffBerry Computer was the first computing device to use ________ instead of mechanical switches as processing circuitry.
vacuum tubes
Putting data in a variable is referred to as assigning a(n) ____ to it.
value
A(n) ____ is a named memory location that holds data specified by a programmer or entered by an end user.
variable
Early computers that held both programs and data in memory became known as ________ architecture.
von Neumann
Stuxnet is a notorious computer _______.
worm
A computer _______ is a selfreplicating, selfdistributing program designed to carry out unauthorized activity on a victim's device.
worm
The acronym IDE stands for which of the following?
Integrated Development Environment
Which of the following is not a Python syntax rule?
Strings are delineated by == symbols.
To include more than one line of comments in Python code, you must start each line with which of the following symbols?
#
Which of the following is a concatenation operator?
+
The Python programming language has a small vocabulary of how many keywords?
34
When storing data in a variable, programmers use which symbol to indicate the assignment operator?
=
As with other popular mobile operating systems, Android is designed for _______ processors.
ARM
. In business circles, the galaxy of services that revolve around customers is called ___________.
CRM or customer relationship management
. IP addresses can be assigned by a network administrator, but more commonly they are automatically assigned by
DHCP
Which of the following is NOT a format that is used for digital audio?
DOC
________ was designed to calculate trajectory tables for the U.S. Army.
ENIAC
A(n) _____ system can provide such benefits as improved overall performance by standardizing business processes based on best practices or improved access to information from a single database to an enterprise.
ERP
______ specifies a standard way to store music data for synthesizers and computers.
MIDI
_______ programming is a style of programming that focuses on using objects to design and build applications.
Object oriented
__________ is the term that describes devices that automate many industrial tasks by receiving digital commands and converting them into real-world actions such as shutting down a power grid or opening a valve in a fuel pipeline
SCADA
An information system progresses through several phases as it is developed, used, and finally retired. These phases are usually referred to as the _________.
SDLC
Which of the following i would be considered a mechanical calculator?
Schikard's calculator, pascaline, de colmar's arithmometer
On a network, which protocol is responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order, and error checking?
TCP
The ____________ is a collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called HTTP.
World Wide Web
Which of the following is NOT a type of bitmap format?
ZIP
A low-level language has a low level of ___________ because it includes commands specific to a particular CPU or microprocessor family.
abstraction
A computer program written in Python is based on a step-by-step ______.
algorithm
A calculation is based on a(n) ___________—the stepbystep process by which numbers are manipulated.
algorithm
An ecommerce ____________ is the software that handles ecommerce transactions.
application
To instruct the computer to perform a calculation, programmers use a(n) _______ expression, which contains values and operators, such as + and -.
arithmetic
Thomas de Colmar's _________ became the first massproduced mechanical calculator
arithmometer
Which type of communication protocol converts data into standard formats that can be used by applications?
arrival
In the context of database security, database ______ identifies sensitive data and database vulnerabilities in order to secure them.
assessment
In a problem statement, you can limit complexity by making ____________.
assumptions
Classes enable programmers to build objects with multiple _______ and define ways for objects to interact with each other.
attributes
The _______ number system allows digital devices to represent virtually any number simply by using 0s and 1s.
binary
Password entropy is a measure in _____ of a password's unpredictability
bits
The bandwidth of a channel that carries digital data is usually measured in ___________.
bits per second
__________ are the most commonly used database clients.
browsers
A stock market _________ refers to a sharp rise in stock values that is later followed by a sudden decline.
bubble
An operating system ensures that input and output proceed in an orderly manner, using ___________ to collect and hold data while the device is busy with other tasks.
buffers
A programming error is called a(n) ____.
bug
__________ goods are raw materials, tools, and machinery used by businesses to make consumer good
capital
_________ refers to the number of associations that can exist between two record types.
cardinality
A communication _________ is the medium used to transport information from one network device to another
channel
Which of the following is not a characteristic of a management information system?
collect display and modify transactions
A(n) _____ in Python is used by programmers to explain what the code does, but it does not show up when the program runs.
comment
A(n) ___________ converts all the statements in a program in a single batch, and the resulting collection of instructions, called ________, is placed in a new file.
compiler, object code
Data ____________ refers to any technique that recodes the data in a file so that it contains fewer bits.
compression
The bulletin board systems of the 1970s are considered to be the forerunners of _____________.
content communities
Which popular social media service is good for sharing media and information?
content community
. ____________ is designed to make a work freely available for distribution and modification under the condition that all derivative works use the same license.
copyleft
A nonprofit organization called ____________ provides a set of standardized licenses that copyright holders can use to extend the rights to use their works to others.
creative commons
Decision makers can access analytical databases using an executive __________.
dashboard
_________ refers to the symbols that represent people, events, things, and ideas
data
The type of data that a variable can hold is referred to as its
data type
A(n)________ is a program development tool that is used to find errors that may exist in a program.
debugger
The process of tracking down bugs and correcting them is called ______.
debugging
Which of the following is a Python keyword?
def, elif, else
Your ________ browser is automatically used when opening a web page or clicking on a web link.
default
. In a formatted text file, ________ signals the beginning and end of a formatting command.
delimiter(s)
____________ is distributed for free and often comes preinstalled on new devices, but it is limited in some way until you pay for it.
demoware
The number of colors available in a graphic is referred to as color _________.
depth
__________ is music, speech, and other sounds represented in binary format for use in digital devices.
digital audio
The process of converting information, such as text, numbers, photos, or music, into digital data that can be manipulated by electronic devices is called ___________.
digitization
. A subset of geosocial networking called social __________ uses geolocation to meet with people who are nearby and have similar interests.
discovery
________ technology displaces an existing business process, market, industry, or product.
disruptive
A(n) _________ is designed to deliver malicious code into a device.
dropper
Conventional wisdom tells us that strong passwords are at least _____ characters in length and include one or more uppercase letters, numbers, and symbols.
eight
Password _________ is a measure in bits of a password's unpredictability.
entropy
A(n) ___________ report contains information that is outside of normal or acceptable ranges
exception
The concept of _________ allows for the limited use of copyrighted material without obtaining permission from the copyright holder
fair use
. A filing cabinet full of folders and papers would be classified as a structured file because every document has a unique structure.
false
A DSS manipulates the data needed to make a decision as well as making a decision
false
A manual calculator implements algorithms autonomously
false
A private IP address can be used to send data over the Internet.
false
A programming language that supports the procedural paradigm is called a declarative language.
false
Agile methodologies tend to be used for large software development projects involving more than ten developers, geographically dispersed development teams, and lifecritical applications.
false
Algorithms are usually written in a format that is specific to a particular programming language
false
All remote storage is considered to be cloud storage.
false
An original message or file that has not yet been encrypted is referred to as ciphertext.
false
Between 2001 and 2014, significant gains were made in global ICT use, with the highest gains in desktop computer purchases.
false
Browser cache is another term for browser History list
false
Character data is composed of letters, symbols, and numerals that are used in calculations.
false
Component systems are currently the most popular form factor for digital devices
false
Data cannot flow over multiple networks that have different topologies
false
Data for SCM does not necessarily take into account customer demand for products.
false
Declarative languages are commonly used for production applications
false
ENIAC's memory held programs but not data
false
Generally speaking, in an objectoriented program, the objects don't interact.
false
HTML is the only markup language used on the Web.
false
HTTP is the markup language used to specify the contents of a Web page.
false