IT104 final

Ace your homework & exams now with Quizwiz!

relational database

A database that represents data as a collection of tables in which all data relationships are represented by common values in related tables

true

A real-time system, such as an air traffic control system, requires data with second-by-second accuracy. (true or false)

knowledge engineer

A(n) ____ is a programmer who specializes in building knowledge bases, each consisting of a set of rules that the computer will try to prove or disprove by asking a battery of questions

natural language processing

In ____, a person might interact with a computer by speaking or typing sentences

disk utility

Mac OS X tool that checks for hard drive errors

disk check

The Windows utility you can run to find and fix storage-related problems on a hard drive.

mobile commerce (m-commerce)

Which form of e-commerce enables consumers to make online purchases using their smartphones, tablets, and other mobile devices?

responsive

____ design is sometimes referred to as *mobile-first* design because the needs of mobile devices are at the forefront

analytics

____ includes communicating insights about data, such as the spending behavior of a group of customers

short circuit

a bad electrical connection that causes the current to flow in the wrong direction, which stops the power supply

transaction

a business activity that's central to the nature of an enterprise, such as selling a product, is a(n) _____

compressed air

a can of ____ comes with a detachable thin plastic tube that allows directing the airflow precisely when cleaning the inside of a computer case

false

a compiler is a software tool that helps programmers find errors quickly and closely examine what's happening when a program runs (true or false)

algorithm

a complete list of the steps for solving a problem in a programming language

decision support systems (DSS)

a computerized program used to support determinations, judgements, and courses of action in an organization or a business

cloud bursting

a configuration method that uses cloud computing resources whenever on-premises infrastructure reaches peak capacity

variable

a data value stored in a computer's memory

data entry operator

a database end user called a _____ types and changes database data as needed, ensuring that the contents of the database remain as up to date as possible

data modeling

a decision support system (DSS) uses ____ to simulate real-world situations and consider "what if?" scenarios

uninterruptible power supply (UPS)

a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power

how will users' identities be confirmed

a disaster recovery plan typically does **not** answer

data center

a facility that provides shared access to applications and data using a complex network, computer, and storage infrastructure, private cloud

object-oriented database

a major type of database that operates by storing data in objects rather than in tables

smart card

a plastic card that contains a computer chip with stored information

decision

a program that contains a(n) ____ statement, or point where different actions may be performed depending on specific conditions, will be more useful that one that simply follows a linear sequence of actions without variation

trojan horses

a program that does something undocumented which the programmer intended, but the user would not accept if they knew about it

scripting language

a programming language that employs a high-level construct to interpret and execute one command at a time

looping

a programming structure that repeats a sequence of instructions until a specific condition is met

hypertext transfer protocol secure (HTTPS)

a protocol that secures communication and data transfer between a user's web browser and a website

qubits

a quantum computer evaluates what? it can represent on/off as well as a number of other probable superpositions of those states

true

a real-time system, such as an air traffic control system, requires data with second-by-second accuracy (true or false)

an alarm will sound

a separation alarm consists of two small devices; you attach one to your computer and place another close to you. If the two devices are separated, what will happen?

graphene

a single sheet of carbon atoms (like one layer of graphite)

field

a single value, such as an address in a database

structured programming

a technique where a programmer thinks in terms of creating groups of instructions rather than simply executing lines one after another and writing code line by line

assembly language

a type of low-level programming language that is intended to communicate directly with a computer's hardware

rogue hotspot

a wireless access point that has been installed on a secure network without explicit authorization from a local network administrator

false

a worm adds itself to another program and waits for the user to execute an attachment or open a tile with a macro. (true or false)

office information system (OIS)

a(n) ____ collects, stores, and transmits data in a shared environment

online store

a(n) ____ is a seller's website where customers can view and purchase products and services

shopping agent

a(n) ____ uses a variety of techniques to collect product information from various online merchants, enabling consumers to compare prices for a particular product or type of product

neurosynaptic computing

aims to mimic the functioning of the human brain through grater interconnectivity among memory, processors, and communications

false

an OLAP cube structures data in a single dimension (true or false)

penetration testing

an authorizes simulated attack performed on a computer system to evaluate its security

logic error

an error that occurs when there is a fault in the logic or structure of the problem

run-time error

an error that takes place while executing a program

disaster recovery plan

an organization's method of regaining access and functionality to its IT infrastructure after events like natural disasters, cyberattacks, or business disruptions

pseudocode

an outline of the basic ideas behind how algorithms will work, an informal language that helps programmers develop algorithms

entity

anything you keep a record of in a database

false

asymmetric encryption is also called *secret key encryption* (true or false)

fuzzy logic system

attempts to simulate real-world conditions, uses deliberately vague terminology, such as very probable and reasonable, and attempts to work naturally with the user by piecing together an answer

copyright

awarded to the author or artist who created it

patent

awards ownership to the creator

management information system (MIS)

can identify problem activity, such as an unusually high number of production errors or customer returns

spreadsheet

chapter 10 states that a simple decision support system can be created using a ____ program

false

cloud apps run from the cloud and can be used to perform various tasks with files or data stored on your hard drive (true or false)

Infrastructure as a Service (IaaS)

cloud-based and pay-as-you-go services such as storage, networking, and virtualization

expert system

computer program that uses artificial intelligence technologies to simulate the judgement and behavior of a human or an organization that has expertise in a particular field

worms

computer programs that replicate functional copies of themselves, they exist as separate entities and do not attach themselves to files or programs

field

contains data about one aspect of the table subject, such as first name or email address

record

contains specific data, like information about a particular employee or a product

first-party cookies

cookies available to the domain that created it only

third-party cookies

cookies that are accessible on any website that loads the server's code

corrective maintenance

correcting software defects, errors, and faults

metadata

data that provides information about other data

query tools

database tools you can use to access data and the database catalog, create and implement SQL queries and create and manage database objects and database users.

technology addiction

deciding to play computer games all night instead of sleeping enough to perform well at work or school is an example of the unwise choices made by someone with a(n)

uses horizontal bars on a timeline to show the stages and tasks in a project and the order in which they must be completed

describe a Gantt chart.

deliverable

document, service, hardware, or software that must be finished and delivered by a certain date and time to maintain the project schedule

alpha product

during the implementation phase of the software development lift cycle (SDLC), the development team tests a(n) ____, which is a preliminary version of a software application

inference engine

enables the expert system to draw deductions from the rules in the knowledge base in response to user input

check-out

ensures that only one person is able to edit a file at a time

factories and laboratories

environment where FORTRAN is still commonly used

trademark

establishes ownership of a symbol or logo

adaptive maintenance

focuses on changing software in response to changes in the environment

perfective maintenance

focuses on features that improve the user experience through functional enhancements

deduplication

form of compression that eliminates redundant data n a subfile level, improving storage utilization

black-hat hackers

hackers motivated by malicious intent

white-hat hackers

hackers that probe cybersecurity weaknesses to *help* organizations develop stronger security

dexterity

hand-eye coordination is called

attribute

in a relational database, a field is called a(n)

electronic point of sale system

in a store or restaurant, the cash register system and supporting information system software and systems are commonly referred to as the _____.

false

in deep learning, the computer learns using specific task algorithms rather than data representation

carbon nanotubes

makes it possible to create more compact processors, which would operate faster and conserve power

preventive maintenance

makes system changes to reduce the chance of future system failure

biometric identifier

many companies control employee access to secure areas using a ____, such as voice, fingerprint, hand geometry, facial geometry, a retinal pattern, an iris pattern, or a handwritten signature

telematics

many companies today incorporate ____ systems that combine GPS, wireless communications features, and other technologies to plan more efficient shipping routes and monitor shipment locations

datasets

many divisions of the US government make ____ available for free online, including through the portal Data.gov

software engineering

may be required to match the company's needs with the best technology solutions

syntax error

mistakes in the source code such as spelling and punctuation errors, incorrect labels, etc

warranty

most computers come with a basic one-year ____ against manufacturing defects for no additional charge

mutations

multiple variations of algorithms are called

k-slot

named after the company that created and sells the lock, may be a combination lock or key-opened lock, depending on the model, connects to a laptop through a slot or hole in the side of the computer

data types

numeric and alphanumeric are examples of ____. or types of information specific fields will hold.

computer-integrated manufacturing

offers a broader coverage than a computer-aided manufacturing (CAM) system

phishing

often seen in the form of malicious emails pretending to be from credible sources to steal usernames, passwords, creditcard information, etc

database administration

operating and maintaining the database system in company's information systems

assets

patents, copyrights, customer lists, developed technologies such as computer software, licenses or franchises

audio perception

people respond to audible cues about their surroundings without even thinking about them because of their ____ abilities

business system analyst

person that gathers business requirements from various areas in the organization and translates them into functional system design specifications that can be executed by IT development teams

virus

piece of code that can be embedded in a data file that are attached to data files rather than executable programs

redundancy

portion of the total information contained in a message that can be eliminated without loss of essential information

joining process

process which matches data from fields in the specified data tables

entity

records of multiple phone calls are an example of a(an) _____ in a database

tactile perception

refers to the sense of touch

supply chain management (SCM)

responsible for establishing, running, and refining the supply chain.

encryption

security method where information is encoded and can only be accessed or decrypted by a user with the correct key

Software as a Service (SaaS)

software that is available via third-party over the internet

intelligence agent

sometimes called a software robot, or bot

multidimensional database

stores data that can be analyzed from different perspectives called dimensions

power conditioner

stores extra voltage in a capacitor then discharges that voltage onto the power line when it detects a low-voltage condition

multimedia database

stores images, audio clips, and/or video clips

computer-aided software engineering (CASE)

suites of powerful applications designed specifically to help with project management, programming, user testing, and so on are referred to collectively as _____ tools.

assets

suppose that a hacker gains access to a hospital's patient record and exposes confidential medical information. the negative effects on the hospital's reputation and patient relationships that result are examples of damage to which

computer vision syndrome

symptoms of ____ can include headaches, loss of focus, burning or tired eyes blurred or double vision, and neck and shoulder strain

point of sale (POS)

system that facilitates transactions in retail sales

eHealth

technology that enables doctors to access patients' medical records from a single source and use online data to help with diagnosis and treatment

ciphertext

text that's been encrypted and is therefore unreadable is called

hybrid cloud

the blending of two or more different types of clouds

Platform as a Service (PaaS)

the cloud service provider or other providers offers the client a choice of tools and services along with the physical infrastructure to build cloud infrastructure

denial of service attack (DoS)

the deliberate flooding of a machine or network with bogus traffic to overwhelm them and make their service unavailable

computer-aided manufacturing (CAM) systems

the manufacturing of goods controlled and automated via computer and robot

modularity

the measurement of how well the source code is divided into individual modules.

beta testing

the period during which the system is tested for errors and failures in operation is called

outsourcing

the practice of hiring a consultant or other third party to handle a project

check-in

the process of adding a new or modified item or file to a document library or a list to replace the previous version

research and development

the process of creating and commercializing new technologies and products for new markets

normalization

the process of structuring a database to avoid redundancy and undesirable dependencies

electrostatic discharge (ESD)

the release of static electricity when two objects come into contact

computer-integrated manufacturing (CIM) systems

the technique of using computers to control an entire production process

true

the terms **3-D printing** and **additive manufacturing** refer to the same technology (true or false)

a comparison of codes of ethics adopted by major organizations

the themes displayed in the graphic above were derived from (there is no graphic though)

documentation

the written notes that explains how a program works are referred to as

volunteer cloud

type of cloud where excess resources of computers connected to the internet are harnessed to complete a particular task, often in conjunction with other infrastructure

public key encryption

type of encryption that has two different keys, making one of the keys available for anyone to use

symmetric encryption

type of encryption that only requires one key to both encrypt and decrypt electronic data

trojan horse

type of malware that hides within a legitimate program or data file

online analytical processing (OLAP) system

type of system that defines and clarifies methods of handling "what if?" questions posed to large databases

modular

using a(n) ____ approach to programming serves the purpose of making the code reusable and also helps in tracking down the sources of errors.

provisioning

virtual servers typically operate in a self-service fashion, allowing IT staff to add and remove new cloud services at will, this process is known as

interdependence

when complex systems depend on other systems to be able to operate

spoofing

when fraudsters pretend to be someone or something else to win a person's trust

executable

when run by a program, a(n) ____ statement performs an action and then proceeds to the next statement in the sequence

digital wallet

when you use a(n) ____ to pay for a purchase, it automatically transfers the appropriate payment information to the retailer

object-oriented programming (OOP)

which of the following programming technique extends the modularity concept by defining each module with definite rules for interfacing and a protected set of variables?

dead code

which of these terms refers to code that's "commented out," or marked with comments to notify the compiler to skip and ignore it?

consistency check

which type of check is made against previously entered data that has already been validated?


Related study sets

Ast 115 Study guide Exam 1 Murray State

View Set

Nutrition Exam 1 Study Set (Chapters 1-4)

View Set

1125 Exam #1 Clinical Judgement & Health Information Technology

View Set

Unit 2 Progress Check Part A and B

View Set

Computer Concepts Midterm practice test

View Set

Jesus and the church ch. 3 study guide

View Set