IT 104 Final Exam

Ace your homework & exams now with Quizwiz!

One of the most widely used 3-D file formats for 3-D printers uses the _____ file name extension.

.stl

_____ is the use of printer-like technology to output three-dimensional objects using one of a variety of materials.

Additive Manufacturing

During the implementation phase of the software development life cycle (SDLC), the development team tests a(n) ______, which is a preliminary version of a software application.

Alpha Product

You can reduce reflection from your screen and thus improve readability by putting a(n) _____ on your monitor.

Antiglare filter

Small applications that can run on all types of computer operating systems are called

Applets

The goal of _____ is to develop computers that can perform functions normally reserved for humans, such as thinking, feeling, and learning from mistakes.

Artificial Intelligence

Suppose that a hacker gains access to a hospital's patient records and exposes confidential medical information. The negative e!ects on the hospital's reputation and patient relationships that result are examples of damage to which of the following?

Assets

People respond to audible cues about their surroundings without even thinking about them because of their _____ abilities.

Audio Perception

_____ is a high-level language that's friendlier and more natural than COBOL and FORTRAN.

BASIC

Rather than develop in-house analytics expertise, a company might use a(n) _____ provider and buy analysis tools and information.

Big Data as a Service (BDaaS)

In which of the following environments is RPG commonly used?

Business

Technologies such as online analytical processing (OLAP) systems can be used to generate information called _____, such as customer spending patterns and behavior.

Business Intelligence (BI)

The abbreviation B2C stands for which type of e-commerce?

Business to Consumer

Which of the following legacy programming languages is used chiefly for business applications by large institutions and companies?

COBOL

A company with a hybrid cloud can meet spikes in demand using a technique called _____, in which the private cloud handles the average workload and the public cloud resources come online automatically to handle the extra demand or activity.

Cloud Bursting

A(n) _____ contains information about an individual's lifestyle and buying habits—information that marketers can use to e"ectively target buyers and sell their goods on the internet.

Consumer profile

In a genetic algorithm, the use of a(n) _____ in the selection process means that the most successful mutations are mixed to produce a new generation of "offspring."

CrossOver

About half of all high school students have reported being victims of _____, according to the National Crime Prevention Council.

Cyberbullying

Text that's been encrypted and is therefore unreadable is called

CypherText

Microsoft Access includes a Compact & Repair database feature, as shown in this screen shot, to safeguard data and prevent

Data Corruption

Which of the following collects the body of metadata for the entire database?

Data Dictionary

Suppose that a manager wants to identify employees who have called in sick more than 10 days in the past year. Which of the following database management tools should he or she use to display only this data?

Data Filter

A system with high _____ provides more value to users than a system containing a large percentage of errors.

Data Integrity

Using which of the following techniques ensures that users enter correct and complete data into the system?

Data Integrity

Which of the following methods for dealing with big data involves finding patterns and relationships in order to apply an organizing structure?

Data Mining

Which of these terms refers to code that's "commented out," or marked with comments to notify the compiler to skip and ignore it?

Dead Code

A program that contains a(n) _____ statement, or point where different actions may be performed depending on specific conditions, will be more useful than one that simply follows a linear sequence of actions without variation.

Decision

The functional specification states exactly what the information system must accomplish, and the _____ specification spells out how these goals will be reached.

Design

Software _____ involves creating the higher-level software design and focusing on the broader planning and implementation steps for the system.

Development

Programmers that break a large problem into several small pieces and then work on them one at a time are using the _____ approach.

Divide and Conquer

Legislation passed in 2000 broadly defined a(n) _____ to include "electronic sound, symbol, or process."

Electronic Signature

When run by a program, a(n) _____ statement performs an action and then proceeds to the next statement in the sequence.

Executable

Sophisticated software that uses artificial intelligence techniques to model an expert's knowledge of a topics is called a(n)

Expert System

True or False: A systems contract enables users to contact the system vendor for additional technical support and training when maintenance needs exceed in-house capabilities.

FALSE

True or False: An OLAP cube structures data in a single dimension.

FALSE

True or False: In the worlds of business and technology, the term smart grid is used to refer to the merging of di"erent technologies and industries to form a newer, better product or process.

FALSE

In which of the following environments is FORTRAN still commonly used? Type: Multiple Choice

Factories and Laboratories

True or False: A database that combines relational and object-oriented database models is referred to as a combination database.

False

True or False: A worm is a malicious code string that attaches itself to an executable file so that the file becomes "infected."

False

True or False: Cloud apps run from the cloud and can be used to perform various tasks with files or data stored on your hard drive.

False

A single value, such as an address, is an example of a _____ in a database.

Field

A _____ cookie is created by the actual website a user visits.

First-Party

A well-designed _____, like the one shown in this screen shot, provides the user with questions or prompts.

Form

Performing a _____ wipes out everything on your device, returning the system to the exact state it was in when you got the device.

Hard Reset

Once a new information system has been designed and the plans approved, the project can move into the next stage, which is

Implementation

A(n) _____ system collects, stores, and processes data that people in organizations use to manage daily and long-term operations and to create and sell various types of products.

Information

_____ property includes just about anything that can be created by the human mind.

Intellectual

Which of the following statements does not describe graphene?

It can be injection molded into a variety of complex shapes.

Which of the following statements does not describe a fuzzy logic system?

It demands precise yes/no or numerical information.

Which of the following statements describes a power conditioner?

It handles power surges in the same way a surge suppressor does but can also power devices for a few minutes when a complete power outage occurs.

Which of the following statements describes a variable?

It's a data value stored in computer memory.

Which of the following statements does not describe an infinite loop?

It's part of the program but actually has no e"ect on how the program runs.

Which of the following converts general Java instructions into commands that a device or computer can understand?

Java virtual machine (JVM)

_____ manufacturing involves correlating the date and time of the manufacture and delivery of a certain product to a customer's request.

Just in Time (JIT)

_____ manufacturing involves correlating the date and time of the manufacture and delivery of a certain product to a customer's request.

Just-in-time (JIT)

Assembly language uses symbols and words to represent the elements of _____, making it possible for programmers to memorize them.

Machine Code

The IBM Watson supercomputer uses _____ to improve its performance in games of Jeopardy! played against humans.

Machine Learning

Which of the following technologies uses sensors mounted around the skull to read the di!erent types of waves or power spectrums the brain gives o!?

Mental Interface

Information about the structure, specifications, and purpose of each element in a database is described by the

MetaData

Random variations of algorithms are called

Mutations

A scripting language is a _____ language, meaning that it explains what the computer should do in English- like terms but not precisely how the computer should do it.

Nonprocedural

Customers can browse a(n) _____ to locate and purchase items online or download it and use it for o"ine shopping.

Online Catalog

A(n) _____ is a seller's website where customers can view and purchase products and services.

Online Store

Suppose the owner of a pet store wants to determine which brand of dog food has been the top seller over the day. Which type of system will provide this information?

Point of Sale (POS) system

A _____ doesn't usually damage hardware but can cause a temporary malfunction, resulting in memory storage errors that can make the operating system unexpectedly freeze up or restart.

Power Sag

Like most operating systems, Windows includes _____ features that enable you to place the computer in a low-power mode.

Power management

In _____, the user builds the query by selecting one or more tables to query, adding the fields to display in the results in a query grid, and then entering the entry to match or other criteria in applicable fields.

Query by Example (QBE)

A _____ code provides a signal to a consumer that he or she can find out more about a product or service available online.

Quick Response (QR)

_____ design is sometimes referred to as mobile-first design because the needs of mobile devices are at the forefront.

Responsive

Which of the following terms refers to a section of a program created to handle a specific group of instructions?

Routine

A mistake that occurs when an application is running is a _____ error.

Run-Time

_____ a file means making it available from your cloud storage for viewing, editing, and downloading by other designated users.

Sharing

When you shop at an e-tailer's site, you collect the items you want to buy in a virtual container called a(n

Shopping Cart

A(n) _____ operation is a loosely organized team allowed to pursue extreme innovation—often operating not only outside the corporate rulebook but also in a separate location away from the main corporate campus.

Skunkworks

A cover that attaches with magnets to the side of a tablet and can be easily removed and replaced is called a _____ cover.

Smart

Sensors such as power meters, voltage sensors, and fault detectors that gather data, along with digital communication capabilities that send the data to an operations center or other location, are examples of which type of technology?

Smart Grid

For a database that stores students' grades, which of the following fields could be designated as a primary key?

StudentID

Which device is basically an extension cord with multiple plugs on it but contains a metal oxide variable resistor that can absorb any excess power during a surge or spike, preventing it from reaching the plugged-in devices?

Surge Suppressor

A(n) _____ is a technical expert who can help plan and develop the various parts of the information system that interact with other processes.

Systems Engineer

True or False: A program can interrupt a looping pattern by using an if-then statement based on a particular action.

TRUE

True or False: A real-time system, such as an air tra!c control system, requires data with second-by- second accuracy,

TRUE

True or False: An automated clearinghouse (ACH) is a type of automated banking network for transferring funds electronically from one account to another.

TRUE

True or False: Depending on the type of business and customer needs, a company's supply chain may involve outside companies, such as a parts manufacturer or trucking company.

TRUE

True or False: Making sure that the records entered into tables remain consistent with the relationships between the tables involves checking for referential integrity.

TRUE

True or False: Normalization is the process of structuring a database to avoid redundancy and undesirable dependencies.

TRUE

True or False: Online banking involves using a web-enabled PC or mobile device.

TRUE

True or False: Plagiarism is using others' words and ideas without attributing the original creator(s) as the source.

TRUE

True or False: The quality of a virtual reality system is characterized in terms of its immersiveness.

TRUE

True or False: The term risk refers to the likelihood of a security breach of systems or data that obtains, damages, or destroys assets.

TRUE

True or False: Today, most organizations of all sizes use a computerized o!ce information system (OIS) to manage a variety of tasks.

TRUE

True or False: Users and companies weigh how much work it takes to back up their data against how much they would su!er if they lost their data when determining an appropriate backup frequency for their systems.

TRUE

True or False: Visualization as a Service (VaaS) involves hiring an expert to transform data into stunning visuals.

TRUE

Deciding to play computer games all night instead of sleeping enough to perform well at work or school is an example of the unwise choices made by someone with a(n)

Technology Addiction

Many companies today incorporate _____ systems that combine GPS, wireless communications features, and other technologies to plan more efficient shipping routes and monitor shipment locations.

Telematics

A(n) _____ is someone or something that can compromise or harm the assets of a business or individual.

Threat

True or False: Penetration testing entails trying to hack into a system so its vulnerabilities can be identified and fixed.

True

True or False: The gap between people who have access to computers and the internet and those who do not has been called the digital divide.

True

Depending on your cloud service, the _____ that's created might contain 25, 50, or more earlier versions of a file.

Version History

Most computers come with a basic one-year _____ against manufacturing defects for no additional charge.

Warranty

What is a testing harness?

a scripted set of tests that a program must pass before being considered ready for public release

What is a hologram?

an image that's generally created by splitting laser light and that appears as a full 3-D image, either still or in motion

Suppose that a hacker gains access to a hospital's patient records and exposes confidential medical information. The negative effects on the hospital's reputation and patient relationships that result are examples of damage to which of the following?

assets

The virtual first-down lines and other status lines you see on the field when watching a football game on TV are created with which of the following?

augmented reality (AR)

Public key encryption uses two encryption keys: a public encryption key, which all the _____ know, and a secret encryption key, which only the _____ know.

authorized users; sender and receiver

Having a _____ plan for the database management system (DBMS) will enable the recovery of lost data from a power interruption or equipment failure.

backup and recovery

Which of the following types of data processing takes place at a scheduled time or at a critical point in a process?

batch processing

During the testing phase of the software development life cycle (SDLC), a(n) _____ of the program is created for testing outside the development group, and the feedback that's received can be used to improve the product before it's released to the general public.

beta version

For a consensus network, which of the following is intended to provide the ability to track and verify every asset transaction for security purposes?

blockchain

The term _____ was originally coined by Grace Hopper, the inventor of COBOL, to refer to a computer error.

bug

Which of the following is not an example of cybercrime?

burglarizing a house and stealing TVs, computers, and other electronics

In _____, companies use the internet to conduct a wide range of routine business activities with other companies.

business-to-business (B2B) electronic commerce

For an end user, _____ means using a free or subscription service delivered over the internet.

cloud computing

Each cloud service provider (CSP) operates with a different _____, which is a combination of software and other solutions used to run the provider's services.

cloud management system

A(n) _____ operates one or more data centers, and organizations buy cloud capacity from it as needed.

cloud service provider (CSP)

The use of robots in an automobile manufacturing plant is an example of a(n) _____ system.

computer-aided manufacturing (CAM)

Suites of powerful applications designed specifically to help with project management, programming, user testing, and so on are referred to collectively as _____ tools.

computer-aided software engineering (CASE)

A _____ system offers much broader coverage than a computer-aided manufacturing (CAM) system.

computer-integrated manufacturing (CIM)

In a genetic algorithm, the use of a(n) _____ in the selection process means that the most successful mutations are mixed to produce a new generation of "offspring."

crossover

Which of the following methods can help reveal patterns and transitions that may be hard to see when reviewing numeric data alone?

data visualization

A person who plans and designs database systems is called a

database analyst

The problem of redundancy can be avoided in backing up data by using _____ software, which examines the files and doesn't back up identical copies of certain folders and files multiple times.

deduplication

Specifications that document the details of the software that programmers will write are produced during the _____ phase of the software development life cycle (SDLC).

design

Experts in _____ focus on delivering products and materials and use various distribution management systems to track orders, shipping, billing, and so on.

distribution logistics

The written notes that explain how a program works are referred to as

documentation

Shopping agents, live chat, and electronic payment systems are all examples of _____ tools.

electronic commerce (e-commerce)

The transfer of money over the internet is known as a(n)

electronic payment method (EPM).

To prevent people from spying on sensitive transactions, companies use data _____ to scramble information so it's unreadable before it's transmitted.

encryption

Records of mobile phone calls are an example of a(n) _____ in a database.

entity

Supply chain management (SCM) is responsible for which of the following?

establishing, running, and refining the supply chain

Once the plan for a new information system has been approved, two documents are created. The _____ specification, which is usually written first, states exactly what the system must accomplish.

functional

People who attempt to gain access to a computer system are known as

hackers

A(n) _____ enables the expert system to draw deductions from the rules in the knowledge base in response to user input.

inference engine

An alphanumeric check allows only _____ to be entered.

letters of the alphabet and digits

Related to perception, _____ deals with the science of moving a mobile robot through an environment.

locomotion

A _____ error occurs when a program's syntax is correct, but the program instructs the computer to perform an action incorrectly.

logic

Which form of e-commerce enables consumers to make online purchases using their smartphones, tablets, and other mobile devices?

mobile commerce (m-commerce)

Using a(n) _____ approach to programming serves the purpose of making the code reusable and also helps in tracking down the sources of errors.

modular

Cognitive computing, which is also called _____ computing, aims to mimic the functioning of the human brain through greater interconnectivity among memory, processors, and communications. Type: Multiple Choice

neurosynaptic

After an information system has been accepted and approved, _____ maintenance is performed to enhance the software to meet new requirements.

perfective

A _____ is a statement promising that a website will protect the confidentiality of any information a customer reveals

privacy policy

Programmers use a(n) _____ to create a program.

programming language

A collection of related fields that describe a single entity, such as a place or event, is called a

record

To restore lost data, the database administrator can do a _____ using the most recent backup, which typically contains the most recent and accurate data.

recoveryThe abbreviation B2C stands for which type of e-commerce?

If an address is stored in multiple data tables, it will need to be changed in all the tables if a customer moves. This is an example of which of the following?

redundancy

Within a company or business, _____ is the process of creating and commercializing new technologies and products for new markets.

research & development (R&D)

It may be appropriate for different assets to have different _____ levels and different types of security protection.

risk tolerance

Which of the following may be required to match the company's needs with the best technology solutions?

software engineering

A powerful form of power surge called a _____ can damage circuit boards in the computer, including the motherboard.

spike

A set of instructions that describes how to perform a task is referred to as a(n)

standard operating procedure (SOP)

The _____, or structure, of a programming language tends to be less complex than that of a human language.

syntax

Why does the IT sta! perform corrective maintenance on an information system?

to identify and fix errors

In a relational database, each record is called a(n)

tuple

A program with a single syntax error

won't work at all and will therefore be useless.


Related study sets

Chapter 13: How Cells Obtain Energy from Food- Principles of Metabolism

View Set

ATI Lower GI System Practice Questions

View Set

URR Clinical Spleen, Urinary, Vasc.

View Set

Ch. 16 - Capital Structure Decisions: The Basics

View Set

Regulations Securities Exchange Act of 1933

View Set

Financial Accounting and Standards

View Set

business management MIDTERM 2.03 quiz

View Set