IT 104-009 Final Exam Practice

Ace your homework & exams now with Quizwiz!

Which of the following types of malware hides within a legitimate program or data file? a) a Trojan horse b) ransomware c) a boot sector virus d) a worm

a) a Trojan horse

A(n) _____ is a programmer who specializes in building knowledge bases, each consisting of a set of rules that the computer will try to prove or disprove by asking a battery of questions. a) knowledge engineer b) expert system c) intelligent agent d) artificial agent

a) knowledge engineer

The use of _____ technology to transmit payments electronically eliminates the labor-intensive practices and delays involved in processing checks. a) payment data interchange (PDI) b) financial electronic data interchange (FEDI) c) financial payment option (FPO) d) payment plan interchange (PPI)

b) financial electronic data interchange (FEDI)

The cloud delivers services and stores, processes, and manages data using _____, such as servers and software, rather than _____. a) data centers; your local computer b) internet-based resources; your local computer c) your local computer; internet-based resources d) your local computer; data centers

b) internet-based resources; your local computer

A _____ error occurs when a program's syntax is correct, but the program instructs the computer to perform an action incorrectly. a) run-time b) logic c) style d) syntax

b) logic

A(n) _____ database allows the storage of pictures, movies, sounds, and hyperlinked fields. a) multidimensional b) multimedia c) hybrid d) operational

b) multimedia

Using a(n) ______ allows you to keep your backup files online while keeping your primary files on your local computer. a) offline backup service b) online backup service c) online updater service d) file restoring service

b) online backup service

Which of the following terms refers to the practice of hiring a consultant or other third party to handle a project? a) interfacing b) outsourcing c) upgrading d) translating

b) outsourcing

After an information system has been accepted and approved, _____ maintenance is performed to enhance the software to meet new requirements. a) preventive b) perfective c) adaptive d) corrective

b) perfective

The response to a request for proposal (RFP) typically asks for a(n) _____, which includes an estimate of how long the project will take to complete, an outline of the steps involved, and a list of the deliverables. a) feasibility study b) project plan c) outsourcing prospectus d) software development

b) project plan

Unlike a traditional computer, which operates based on binary on/off states, a _____ computer operates based on many superpositions of states. a) cognitive b) quantum c) robotic d) neurosynaptic

b) quantum

A _____ code provides a signal to a consumer that he or she can find out more about a product or service available online. a) fast information (FI) b) quick response (QR) c) speedy review (SR) d) rapid reply (RR)

b) quick response (QR)

When multiple users attempt to edit an existing record in a database simultaneously, _____ prevents changes from being written to the database as a safety precaution. a) data corruption b) record locking c) remote access d) data integrity

b) record locking

A(n) _____ uses a variety of techniques to collect product information from various online merchants, enabling consumers to compare prices for a particular product or type of product. a) online shopping mall b) shopping agent c) online catalog d) e-tailer

b) shopping agent

A large online meeting that's usually attended by 100 to 1,000 individuals is called a a) video link. b) webinar. c) conference. d) web chat.

b) webinar

True or False: A compiler is a software tool that helps programmers find errors quickly and closely examine what's happening when a program runs.

False

True or False: A worm adds itself to another program and waits for the user to execute an attachment or open a file with a macro.

False

True or False: A worm is a malicious code string that attaches itself to an executable file so that the file becomes "infected."

False

True or False: All the businesses that sell their products and services at online shopping malls have their own online stores.

False

True or False: Asymmetric encryption is also called secret key encryption.

False

True or False: Database management systems don't include security measures to protect and safeguard data, because it isn't possible for anyone to gain unauthorized access to a database.

False

True or False: In deep learning, the computer learns using specific task algorithms rather than data representations.

False

True or False: In the worlds of business and technology, the term smart grid is used to refer to the merging of different technologies and industries to form a newer, better product or process.

False

True or False: Query tools are used to design and test data tables in a database.

False

True or False: The transfer of a large amount of money from one person to another is referred to as a micropayment.

False

True or False: A backup appliance is a special computer system that's designed specifically for performing and storing backups.

True

True or False: A management information system (MIS) can identify problem activity, such as an unusually high number of production errors or customer returns.

True

True or False: A program can interrupt a looping pattern by using an if-then statement based on a particular action.

True

True or False: A program with style errors may run, but the errors will make the code bulkier, slower to execute, or more difficult to edit.

True

True or False: A real-time system, such as an air traffic control system, requires data with second-by-second accuracy,

True

True or False: A report presents output from a data table or query in an easy-to-read format.

True

True or False: A systems integrator is a company that specializes in installing and supporting information systems.

True

True or False: An automated clearinghouse (ACH) is a type of automated banking network for transferring funds electronically from one account to another.

True

True or False: An expert system contains a knowledge base, which is a set of facts and rules about a specific complex application.

True

True or False: Making sure that the records entered into tables remain consistent with the relationships between the tables involves checking for referential integrity.

True

True or False: Normalization is the process of structuring a database to avoid redundancy and undesirable dependencies.

True

True or False: The gap between people who have access to computers and the internet and those who do not has been called the digital divide.

True

True or False: The quality of a virtual reality system is characterized in terms of its immersiveness.

True

True or False: The task of creating a humanlike body has proved incredibly difficult in developing androids.

True

True or False: The terms 3-D printing and additive manufacturing refer to the same technology.

True

True or False: Today, most organizations of all sizes use a computerized office information system (OIS) to manage a variety of tasks.

True

True or False: Users and companies weigh how much work it takes to back up their data against how much they would suffer if they lost their data when determining an appropriate backup frequency for their systems.

True

_____ property includes just about anything that can be created by the human mind. a) Intellectual b) Industrial c) Protected d) Personal

a) Intellectual

Which of the following statements describes a power conditioner? a) It stores extra voltage in a capacitor and then discharges that voltage onto the power line when it detects a low-voltage condition. b) It allows you to change the source or condition of your power supply depending on the location or quality of the power at your PC's location. c) It handles power surges in the same way a surge suppressor does but can also power devices for a few minutes when a complete power outage occurs. d) It offers an additional power source for your tablet or PC.

a) It stores extra voltage in a capacitor and then discharges that voltage onto the power line when it detects a low-voltage condition.

_____ manufacturing involves correlating the date and time of the manufacture and delivery of a certain product to a customer's request. a) Just-in-time (JIT) b) Customer-specific (CS) c) On-time (OT) d) Supply chain (SC)

a) Just-in-time (JIT)

Before being written in a programming language, a program is first written out as a(n) _____, which is a complete list of the steps for solving a problem. a) algorithm b) variable c) function d) pseudocode

a) algorithm

A separation alarm consists of two small devices; you attach one to your computer and place the other somewhere close to you. If the two devices are separated, what will happen? a) An alarm will sound. b) You will get an email alert. c) The computer will be disabled. d) The protection lock will engage.

a) an alarm will sound

You can reduce reflection from your screen and thus improve readability by putting a(n) _____ on your monitor. a) antiglare filter b) screen protector c) privacy screen d) muting display

a) antiglare filter

Suppose that a hacker gains access to a hospital's patient records and exposes confidential medical information. The negative effects on the hospital's reputation and patient relationships that result are examples of damage to which of the following? a) assets b) risk tolerance c) software d) hardware

a) assets

Public key encryption uses two encryption keys: a public encryption key, which all the _____ know, and a secret encryption key, which only the _____ know. a) authorized users; sender and receiver b) employees; customers c) senders; receivers d) managers; employees

a) authorized users; sender and receiver

Having a _____ plan for the database management system (DBMS) will enable the recovery of lost data from a power interruption or equipment failure. a) backup and recovery b) database response c) data corruption d) normalization

a) backup and recovery

The study and simulation of the human mind is called a) cognitive science. b) natural interface. c) cognitive discovery. d) behavioral science.

a) cognitive science

Which type of check ensures that every required field in a record contains an entry, preventing data from being missing? a) completeness check b) range check c) consistency check d) alphanumeric check

a) completeness check

Symptoms of _____ can include headaches, loss of focus, burning or tired eyes, blurred or double vision, and neck and shoulder strain. a) computer vision syndrome b) repetitive vision stress c) ergonomic failure d) visual disability

a) computer vision syndrome

In a genetic algorithm, the use of a(n) _____ in the selection process means that the most successful mutations are mixed to produce a new generation of "offspring." a) crossover b) mixed mutation c) adaptation d) hybrid

a) crossover

Microsoft Access includes a Compact & Repair database feature, as shown in this screen shot, to safeguard data and prevent a) data corruption. b) data redundancy. c) data updates. d) data integrity.

a) data corruption

Suppose that a manager wants to identify employees who have called in sick more than 10 days in the past year. Which of the following database management tools should he or she use to display only this data? a) data filter b) data request c) data warehouse d) data sorter

a) data filter

A _____ is a collection of data organized in one or more tables stored on a computer. a) database b) presentation c) spreadsheet d) document

a) database

Many music, video, and software distributors have focused on developing and implementing copy protection technologies called a) digital rights management (DRM) b) program copying prevention (PCP) c) new-age copyright management (NACM) d) Sony BMG

a) digital rights management (DRM)

The transfer of money over the internet is known as a(n) a) electronic funds transfer (EFT). b) electronic payment method (EPM). c) smart card transfer (SCT). d) e-commerce transfer (ECT).

a) electronic funds transfer (EFT).

Supply chain management (SCM) is responsible for which of the following? a) establishing, running, and refining the supply chain b) controlling the costs of supplies that enter the supply chain c) preventing the company from becoming interdependent on others d) achieving the company's goals at various stages in the production process

a) establishing, running, and refining the supply chain

When run by a program, a(n) _____ statement performs an action and then proceeds to the next statement in the sequence. a) executable b) variable c) decision d) loop

a) executable

Retrieving data from a database and performing some type of operation on it is called a) file processing. b) data browsing. c) data querying. d) transaction testing.

a) file processing

In _____, the file system saves multiple previous versions of a file. a) file versioning b) business-level public clouds c) conversations d) cloud storage

a) file versioning

A _____ cookie is created by the actual website a user visits. a) first-party b) global c) second-party d) third-party

a) first-party

Performing a _____ wipes out everything on your device, returning the system to the exact state it was in when you got the device. a) hard reset b) hard boot c) soft reset d) hard wipe

a) hard reset

A business's decisions and actions often depend on the decisions and actions of others; this fundamental business characteristic is termed a) interdependence. b) internal dependence. c) intrabusiness. d) independence.

a) interdependence

A(n) _____ is the amount of energy required to sustain one watt for one second. a) joule b) amp c) ohm d) megawatt

a) joule

A database ____ can be used to identify a set of information and therefore provide a means of searching or sorting. a) key b) lock c) collection d) transaction

a) key

An alphanumeric check allows only _____ to be entered. a) letters of the alphabet and digits b) symbols such as dollar signs c) numeric data such as birth dates d) credit card numbers

a) letters of the alphabet and digits

Using a(n) _____ approach to programming serves the purpose of making the code reusable and also helps in tracking down the sources of errors. a) modular b) structured c) object-oriented d) decoding

a) modular

A(n) _____ database uses a(n) _____ structure to organize data in three or more dimensions, as shown in this graphic. a) multidimensional; cube b) hybrid; model c) object-oriented; object d) multidimensional; block

a) multidimensional; cube

Cognitive computing, which is also called _____ computing, aims to mimic the functioning of the human brain through greater interconnectivity among memory, processors, and communications. a) neurosynaptic b) hybrid memory c) quantum d) core

a) neurosynaptic

A scripting language is a _____ language, meaning that it explains what the computer should do in English-like terms but not precisely how the computer should do it. a) nonprocedural b) assembly c) markup d) legacy programming

a) nonprocedural

A range check is usually performed on _____ data, such as birth dates. a) numeric b) alphanumeric c) character d) identification

a) numeric

Customers can browse a(n) _____ to locate and purchase items online or download it and use it for offline shopping. a) online catalog b) shopping agent c) e-tailer d) personal shopper

a) online catalog

A(n) _____ is a seller's website where customers can view and purchase products and services. a) online store b) tracker c) convenience store d) e-ticket

a) online store

Virtual servers typically operate in a self-service fashion, allowing IT staff to add and remove new cloud services at will. This configuration or setup process is known as a) provisioning. b) virtualization. c) cloud computing. d) processing.

a) provisioning

A mistake that occurs when an application is running is a _____ error. a) run-time b) style c) logic d) syntax

a) run-time

A(n) _____ operation is a loosely organized team allowed to pursue extreme innovation—often operating not only outside the corporate rulebook but also in a separate location away from the main corporate campus. a) skunkworks b) top-secret c) research & development (R&D) d) elite

a) skunkworks

Typically larger and a bit more formal than a skunkworks, a(n) _____ occupies the forefront of research & development efforts for such companies as Alphabet Inc. and Facebook. a) special projects lab b) collaboration lab c) elite operations group d) project team

a) special projects lab

Which of the following technologies can be used to create more of a natural interface between humans and machines? a) speech recognition b) machine learning c) virtual reality d) neural networks

a) speech recognition

A powerful form of power surge called a _____ can damage circuit boards in the computer, including the motherboard. a) spike b) shock c) volt d) current

a) spike

Chapter 10 states that a simple decision support system (DSS) can be created using a _____ program. a) spreadsheet b) word-processing c) database d) presentation

a) spreadsheet

A set of instructions that describes how to perform a task is referred to as a(n) a) standard operating procedure (SOP). b) data-modeling procedure (DMP). c) electronic data-processing procedure (EDPP). d) connectivity procedure (CP).

a) standard operating procedure (SOP)

A(n) _____ is a technical expert who can help plan and develop the various parts of the information system that interact with other processes. a) systems engineer b) business systems analyst c) software engineer d) information technician

a) systems engineer

Which of the following is not one of the conditions of fair use? a) using material that was published at least ten years ago b) using a limited amount of protected material (such as no more than 300 words of prose and one line of poetry) c) acknowledging the source of material d) using material for a noncommercial purpose, such as in the classroom

a) using material that was published at least ten years ago

A gap or weakness in a security program that allows a threat to find a way into the system is called a a) vulnerability. b) risk. c) cybercrime. d) fraud.

a) vulnerability

For a database that stores students' grades, which of the following fields could be designated as a primary key? a) StudentName b) StudentID c) StudentGPA d) StudentAddress

b) StudentID

_____ is the process of making sure that the data and files (and in some cases, the settings) you have in all storage locations and devices are the same. a) Uploading b) Syncing c) Sharing d) Downloading

b) Syncing

_____ software can create multiple distinct operating servers that run simultaneously on a single physical server machine, effectively turning that one server into two or more. a) Server update b) Virtualization c) Syncing d) Upload

b) Virtualization

For a consensus network, which of the following is intended to provide the ability to track and verify every asset transaction for security purposes? a) cryptocurrencies b) blockchain c) encryption d) validation

b) blockchain

The term _____ was originally coined by Grace Hopper, the inventor of COBOL, to refer to a computer error. a) interpreter b) bug c) debugger d) compiler

b) bug

In which of the following environments is RPG commonly used? a) academic b) business c) math, science, and engineering d) sports

b) business

For an end user, _____ means using a free or subscription service delivered over the internet. a) multitasking b) cloud computing c) networking d) data processing

b) cloud computing

The use of robots in an automobile manufacturing plant is an example of a(n) _____ system. a) customer relationship management (CRM) b) computer-aided manufacturing (CAM) c) statistical quality control (SQC) d) online analytical processing (OLAP)

b) computer-aided manufacturing (CAM)

Suites of powerful applications designed specifically to help with project management, programming, user testing, and so on are referred to collectively as _____ tools. a) rapid application development (RAD) b) computer-aided software engineering (CASE) c) object-oriented programming (OOP) d) software development kit (SDK)

b) computer-aided software engineering (CASE)

The term _____ refers to the ability to link with other programs and devices. a) wireless area network b) connectivity c) electronic data d) online management

b) connectivity

About half of all high school students have reported being victims of _____, according to the National Crime Prevention Council. a) hate speech b) cyberbullying c) social media engagement d) pornography

b) cyberbullying

Which of the following involves the spread of incorrect information and can have serious consequences? a) data validation b) data contamination c) data integrity d) database response time

b) data contamination

A system with high _____ provides more value to users than a system containing a large percentage of errors. a) redundancy b) data integrity c) database response time d) data corruption

b) data integrity

A decision support system (DSS) uses _____ to simulate real-world situations and consider "what if?" scenarios. a) connectivity b) data modeling c) Gantt charts d) telematics

b) data modeling

A _____ is a document, service, hardware, or software that must be finished and delivered by a certain date and time to maintain the project schedule a) project plan b) deliverable c) feasibility study d) requirement

b) deliverable

When you use a(n) _____ to pay for a purchase, it automatically transfers the appropriate payment information to the retailer. a) virtual debit card b) digital wallet c) micropayment d) virtual credit card

b) digital wallet

Shopping agents, live chat, and electronic payment systems are all examples of _____ tools. a) support commerce (s-commerce) b) electronic commerce (e-commerce) c) online commerce (o-commerce) d) internet commerce (i-commerce)

b) electronic commerce (e-commerce)

Legislation passed in 2000 broadly defined a(n) _____ to include "electronic sound, symbol, or process." a) digital wallet b) electronic signature c) debit card d) smart card

b) electronic signature

Many warehouse systems use which of the following technologies to enhance inventory tracking and placement? a) office information system (OIS) b) radio frequency identification (RFID) c) vendor identification (VID) d) standard operating procedure (SOP)

b) radio frequency identification (RFID)

Which of the following may be required to match the company's needs with the best technology solutions? a) hardware engineering b) software engineering c) systems analyzing d) feasibility planning

b) software engineering

A large percentage of the human brain is dedicated to _____, which involves processing data coming from the eyes. a) mental interface b) visual perception c) natural interface d) stereoscopic vision

b) visual perception

A _____ uses or teaches hacking skills in order to be helpful and promote good security practices. a) black-hat hacker b) white-hat hacker c) terrorist d) programmer

b) white-hat hacker

Which of the following statements does not describe graphene? a) It's harder than a diamond. b) It can conduct electricity 1,000 times better than copper. c) It can be injection molded into a variety of complex shapes d) It's a sheet of graphite that's one atom thick.

c) It can be injection molded into a variety of complex shapes

_____ design is sometimes referred to as mobile-first design because the needs of mobile devices are at the forefront. a) Fluid b) Animated c) Responsive d) Static

c) Responsive

Microsoft _____ is a collaboration platform that's commonly used by large corporations to set up web-based or cloud-based team collaboration spaces. a) Exchange b) Exchange Online c) SharePoint d) Office 365

c) SharePoint

What is cloud storage? a) a saved list of songs that you can select and replay at a later time b) a set of programs for backing up your computer's contents c) a service that provides you with a set amount of file storage space in the cloud d) a free app for your tablet or smartphone that makes reading email easier

c) a service that provides you with a set amount of file storage space in the cloud

Small applications that can run on all types of computer operating systems are called a) functions. b) scripts. c) applets. d) compilers.

c) applets

In a relational database, a field is called a(n) a) tuple. b) flat file. c) attribute. d) hybrid.

c) attribute

The period during which the system is tested for errors and failures in operation is called a) niche testing. b) alpha testing. c) beta testing. d) research testing.

c) beta testing

Technologies such as online analytical processing (OLAP) systems can be used to generate information called _____, such as customer spending patterns and behavior. a) input and output (I/O). b) strategic data (SD). c) business intelligence (BI). d) artificial intelligence (AI).

c) business intelligence (BI)

In the early phases of the system development process, a _____ defines the business problem and plans a solution. a) vendor analyst b) lead project manager c) business systems analyst d) software development analyst

c) business systems analyst

Which of the following languages is not used to write the code on the server that tells it what to do? a) PHP (PHP: Hypertext Preprocessor) b) APS.NET c) cascading style sheets (CSS) d) JavaServer Pages (JSP)

c) cascading style sheets (CSS)

A _____ system offers much broader coverage than a computer-aided manufacturing (CAM) system. a) computer company production (CCP) b) computer statistical manufacturing (CSM) c) computer-integrated manufacturing (CIM) d) computer intelligence (CI)

c) computer-integrated manufacturing (CIM)

A database end user called a _____ types and changes database data as needed, ensuring that the contents of the database remain as up to date as possible. a) data study operator b) database analyst c) data entry operator d) data personnel worker

c) data entry operator

Numeric and alphanumeric are examples of _____, or types of information specific fields will hold. a) primary keys b) field names c) data types d) field sizes

c) data types

Using which of the following techniques ensures that users enter correct and complete data into the system? a) data contamination b) data integrity c) data validation d) data normalization

c) data validation

Many divisions of the US government make _____ available for free online, including through the portal Data.gov. a) field names b) metadata c) datasets d) data filters

c) datasets

Specifications that document the details of the software that programmers will write are produced during the _____ phase of the software development life cycle (SDLC). a) testing b) implementation c) design d) proposal and planning

c) design

The functional specification states exactly what the information system must accomplish, and the _____ specification spells out how these goals will be reached. a) research b) viability c) design d) hardware

c) design

The written notes that explain how a program works are referred to as a) algorithms b) debuggers c) documentation d) processes

c) documentation

A payroll-processing system that automatically triggers electronic payroll deposits for employees is an example of which of the following? a) management information system (MIS) b) data modeling and processing (DMP) c) electronic data processing (EDP) d) standard operating procedure (SOP)

c) electronic data processing (EDP)

The principles a person uses to determine right and wrong and to guide his or her choices and actions are called a) traditions b) laws c) ethics d) guidelines

c) ethics

In which of the following environments is FORTRAN still commonly used? a) corporate headquarters b) colleges and universities c) factories and laboratories d) government agencies

c) factories and laboratories

A(n) _____ database is a traditional data file storage system that contains only one data table or file. a) multimedia b) object-oriented c) flat file d) relational

c) flat file

A(n) _____ is sometimes called a software robot, or bot. a) knowledge engineer b) artificial agent c) intelligent agent d) expert system

c) intelligent agent

Which of the following are first-generation programming languages? a) assembly languages b) C++ and Java c) machine languages d) text-based languages

c) machine languages

The IBM Watson supercomputer uses _____ to improve its performance in games of Jeopardy! played against humans. a) mutations b) fuzzy logic systems c) machine learning d) neural networks

c) machine learning

Suppose the owner of a pet store wants to determine which brand of dog food has been the top seller over the day. Which type of system will provide this information? a) computerized sale (CS) system b) distribution logistics (DL) system c) point of sale (POS) system d) information system (IS)

c) point of sale (POS)

Like most operating systems, Windows includes _____ features that enable you to place the computer in a low-power mode. a) time interval b) startup routine c) power management d) power profile

c) power management

A _____ is a statement promising that a website will protect the confidentiality of any information a customer reveals. a) nonviolation policy b) user policy c) privacy policy d) credibility policy

c) privacy policy

A cloud setup created for and used by a single organization is a(n) _____ cloud. a) internet b) hybrid c) private d) public

c) private

To retrieve information from a database, the user generally creates a _____ and then runs it to display the results, or list of records that match the specified criteria. a) report b) primary key c) query d) record

c) query

A collection of related fields that describe a single entity, such as a place or event, is called a a) primary key. b) data type. c) record. d) field.

c) record

The _____, or structure, of a programming language tends to be less complex than that of a human language. a) source b) coding c) syntax d) term

c) syntax

What is the purpose of performing adaptive maintenance on an information system? a) to identify and fix errors b) to increase reliability and ease of maintenance c) to address other environment changes d) to enhance the software to meet new requirements

c) to address other environment changes

Why does the IT staff perform corrective maintenance on an information system? a) to address other environment changes b) to enhance the software to meet new requirements c) to identify and fix errors d) to increase reliability and ease of maintenance

c) to identify and fix errors

Online hotel and airline reservation sites use _____ databases to hold availability and pricing information. a) relational b) XML c) web d) hybrid

c) web

A program with a single syntax error a) will usually work but may have ongoing problems. b) will always work but may be unstable. c) won't work at all and will therefore be useless. d) will run more slowly than one without any syntax errors.

c) won't work at all and will therefore be useless.

_____ is a high-level language that's friendlier and more natural than COBOL and FORTRAN. a) C++ b) C c) C# d) BASIC

d) BASIC

Which of the following legacy programming languages is used chiefly for business applications by large institutions and companies? a) FORTRAN b) RPG c) BASIC d) COBOL

d) COBOL

Which of the following is not one of the popular scripting languages? a) Perl b) VBScript c) JavaScript d) Hypertext Markup Language (HTML)

d) Hypertext Markup Language (HTML)

Which of the following is a secure form of Hypertext Transfer Protocol (HTTP) that provides encryption for data sent through a web-based connection? a) Secure Sockets Layer (SSL) b) Transport Layer Security (TLS) c) Web-Based Encryption (WBE) d) Hypertext Transfer Protocol Secure (HTTPS)

d) Hypertext Transfer Protocol Secure (HTTPS)

Which of the following statements describes a Gantt chart? a) It's a pie chart with sections that show the various departments that will be involved in completion of a project. b) It uses plotted lines on a graph to show how work on a project will affect business over time. c) It uses vertical columns to show the costs of specific parts of a project in order from high to low. d) It uses horizontal bars on a timeline to show the stages and tasks in a project and the order in which they must be completed

d) It uses horizontal bars on a timeline to show the stages and tasks in a project and the order in which they must be completed

Which of the following converts general Java instructions into commands that a device or computer can understand? a) JavaScript b) Perl c) Swift d) Java virtual machine (JVM)

d) Java virtual machine (JVM)

_____ a file means making it available from your cloud storage for viewing, editing, and downloading by other designated users. a) Uploading b) Posting c) Downloading d) Sharing

d) Sharing

The term _____ refers to software that's delivered on demand from the cloud (the internet) via a web browser. a) Platform as a Service (PaaS) b) Infrastructure as a Service (IaaS) c) Email as a Service (EaaS) d) Software as a Service (SaaS)

d) Software as a Service (SaaS)

What does the abbreviation SQL stand for? a) Selected Query Links b) Systematic Query Language c) Specific Query Location d) Structured Query Language

d) Structured Query Language

During the testing phase of the software development life cycle (SDLC), a(n) _____ of the program is created for testing outside the development group, and the feedback that's received can be used to improve the product before it's released to the general public. a) testing harness b) alpha product c) gold release d) beta version

d) beta version

When using the Microsoft SharePoint collaboration platform, you can _____ a document for editing. a) restore b) reserve c) replace d) check out

d) check out

Each cloud service provider (CSP) operates with a different _____, which is a combination of software and other solutions used to run the provider's services. a) infrastructure b) virtualization technology c) deployment model d) cloud management system

d) cloud management system

Java has _____, which means it can run on nearly any operating system. a) nonprocedural language b) communication facilitation c) scripting language d) cross-platform compatibility

d) cross-platform compatibility

Because databases generally form the core of a company's information systems, _____—that is, operating and maintaining the database system—is an important IT function. a) database editing b) database monitoring c) database operations d) database administration

d) database administration

A person who plans and designs database systems is called a a) database manager. b) database creator. c) database specialist. d) database analyst.

d) database anaylist

Hand-eye coordination, which is related to tactile perception, is called a) balance. b) mobility. c) navigation. d) dexterity.

d) dexterity

Which type of database spreads data across multiple networked computers, allowing greater storage and cheap and easy expansion? a) operational database b) networked database c) hybrid database d) distributed database

d) distributed database

A _____ system, which includes an underlying database, enables a company to deliver products more quickly, more cheaply, and with fewer errors. a) business distribution b) retailer database c) database management d) distribution management

d) distribution management

Programmers that break a large problem into several small pieces and then work on them one at a time are using the _____ approach. a) looping b) if-then c) linear sequence d) divide-and-conquer

d) divide-and-conquer

One of the advantages of using _____ to exchange specially formatted business documents is that it automates repetitive business transactions, thereby lowering costs. a) automatic data interchange (ADI) b) virtual private networks (VPNs) c) supply chain management (SCM) d) electronic data interchange (EDI)

d) electronic data interchange (EDI)

Records of mobile phone calls are an example of a(n) _____ in a database. a) element b) data type c) field d) entity

d) entity

Which of the following types of systems supports strategic decision-making by facilitating the creation of high-level summary reports that executives can use to make important decisions? a) computer-aided system (CAS) b) important information system (IIS) c) business intelligence system (BIS) d) executive information system (EIS)

d) executive information system (EIS)

Suppose an auto manufacturer wants to upgrade its existing computer-integrated manufacturing system. To determine the likely size and cost of the project, the company will conduct a _____ study. a) viability b) research c) practicality d) feasibility

d) feasibility

Which of the following statements describes spoofing? a) psychologically manipulating people into performing actions or divulging confidential information b) using or teaching hacking skills in order to be helpful and promote good security practices c) gaining entry to a secure computer system by finding a working user ID and password combination d) fooling another computer by pretending to send packets from a legitimate Internet Protocol (IP) address

d) fooling another computer by pretending to send packets from a legitimate Internet Protocol (IP) address

Assembly language uses symbols and words to represent the elements of _____, making it possible for programmers to memorize them. a) numbers b) high-level programming languages c) engineering programming d) machine code

d) machine code

Which of the following technologies uses sensors mounted around the skull to read the different types of waves or power spectrums the brain gives off? a) neural network b) natural interface c) speech recognition d) mental interface

d) mental interface

Imagine a computer that can read a set of news articles on any topic, understand what it has read, and write a report summarizing what it has learned. To do these things, the computer must have a a) machine language interface b) neural network c) fuzzy logic system d) natural language interface

d) natural language interface

In object-oriented programming (OOP), a(n) _____ is a module. a) macro b) function c) routine d) object

d) object

A(n) _____ collects, stores, and transmits data in a shared environment. a) radio frequency identification (RFID) b) distribution logistics system (DLS) c) management information system (MIS) d) office information system (OIS)

d) office information system (OIS)

Paying for online auction items and sending money to friends or family are popular uses of _____ payment systems. a) credit account b) borrowing/lending c) person-to-business d) person-to-person

d) person-to-person

Tendinitis and carpal tunnel syndrome are two common types of a) ergonomic distress b) repetitive distress syndromes c) arthritis d) repetitive stress injuries

d) repetitive stress injuries

Within a company or business, _____ is the process of creating and commercializing new technologies and products for new markets. a) smart technology creation (STC) b) special projects consideration (SPC) c) research & development (R&D) d) collaboration & communication (C&C)

d) research & development (R&D)

Web pages are usually built with a combination of markup languages, such as Hypertext Markup Language (HTML), and _____ languages, such as JavaScript. a) machine code b) assembly c) applet d) scripting

d) scripting

Tunneling is a type of _____ technology used by virtual private networks (VPNs) in which one network sends its data via another network's connections. a) payment b) turnkey c) tracking d) security

d) security

When you shop at an e-tailer's site, you collect the items you want to buy in a virtual container called a(n) a) mobile cart. b) checkout. c) outbox. d) shopping cart.

d) shopping cart

A cover that attaches with magnets to the side of a tablet and can be easily removed and replaced is called a _____ cover. a) plastic b) tablet c) snap d) smart

d) smart

Depending on your cloud service, the _____ that's created might contain 25, 50, or more earlier versions of a file. a) storage system b) file system c) project site d) version history

d) version history


Related study sets

Mga Salitang Ginagamit sa Impormal na Komunikasyon

View Set

Psychology 1301 - DBU BEALE Test 3

View Set

Medical-Surgical: Immune and Infectious

View Set

SLE/RA Practice Questions (Test #3, Fall 2020)

View Set

Stats 201 Ch 6 Probability Questions

View Set