Busy. Please wait.

Forgot Password?

Don't have an account?  Sign up 

show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.

By signing up, I agree to StudyStack's Terms of Service and Privacy Policy.

Already a StudyStack user? Log In

Reset Password
Enter the email address associated with your account, and we'll email you a link to reset your password.

Remove ads
Don't know (0)
Know (0)
remaining cards (0)
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
restart all cards

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how


A person who creates documentation for programming projects is a ____. technical writer
A goal of normalization is to minimize data ____. redundancy
Which of the following should be considered when reviewing a vendor’s request for proposal (RFP)? all the above
Which of the following is NOT a factor to consider when deciding what is the best data management tool to use? web compatability
A goal of the ____ phase of the SDLC is to produce a list of requirements for a new or revised information system. analysis
The IT industry includes which of the following? all the above
The data accessed by data mining and other analysis techniques is often stored in a _______. data warehousing
Which of the following is an example of a primary key for a database? social security number
Software engineers tend to focus on program ____. designing
Three key concepts ensure good quality of service from a computer system. They include all of the following EXCEPT ____. cost
John is considering getting a college degree in the IT field. He is interested in advancement opportunities when he graduates. You should advise him that it would be best to get at least a ____ degree. bachelors
Through the generations of development of computers, which of the following is NOT a characteristic of what computers have become? less dependable
The traditional approach to programming uses a(n) ____ paradigm. procedural
Which phase of the SDLC is the longest? maintenance
A sensor is an example of a(n) ______ device for a robot. input
Which of the following is NOT an advantage of telecommuting? data security
The first commercially successful computer was the ____. UNIVAC
In the Planning Phase of the SDLC, a(n) ____ is assigned to analyze and develop the information system. project team
Considering AI (machines) and humans (the brain), which of the following is FALSE? we know how brain work and we can simulate that in a computer
The ____ paradigm attempts to describe a problem without specifying exactly how to arrive at a solution. declarative
Among the steps you can take to avoid security problems is ____. Question 21 answers keep your firewall updated and activated
Computers characterized by their use of integrated circuits are considered ____ generation. third
A ____ error occurs when the rules of the programming language are not followed. syntax
Data ____ means that data are separate from the programs used to manipulate the data. independence
Methods of expressing algorithms include all of the following EXCEPT ________ algorithm code
They want to avoid the risks of a direct conversion to a new information system because they have no backup for their current system. Which type of conversion would allow them to continue to use the old system during the conversion process? parallel conversion
Jane knows she must implement a step-by-step plan that describes the methods her business will use to secure data against disaster, and the guidelines that will be used to recover lost data if a disaster occurs. She will have to create a(n) ____. disaster recovery plan
Who proposed a test for intelligent behavior of machines that is considered to be the early work in artificial intelligence? Alan Turing
The figure shown above represents computer and software marketing channels. In that figure, Box C represents ____. Question 29 answers mail-order suppliers
A(n) _______ could be used to replicate how a specialist diagnoses lung cancer. expert system
___________ is the study of safe and efficient work environments. Erogonomics
Which of the following is NOT a guideline for creating a template for reports? present as much information as possible
A table's ____ order is the order in which records are stored on disk. sort
As a manager, you are responsible for managing inventory. Every month you receive a low inventory report that lists stock items that have fallen below a minimum reorder point. This report is a type of ____. exception report
A ____ language uses command words and grammar based on human language. high-level
A common threat to the data stored on a corporate information system is an act of war, which includes all of the following EXCEPT ____. human error
SQL allows users to______ a database. all the above
In the world of databases, a(n) ____ refers to a collection of data fields. record
____ help(s) programmers apply rigorous logical and mathematical models to software design. formal methods
Neural networks are used in AI to improve the computer’s ability to perform ______ tasks. recognition
Criminals have become sophisticated in the use of all of the following EXCEPT ____ to access data stored on personal computers. ATM's
A ____ control structure tells a computer what to do in a step by step manner. sequence
The electronic device used to decode messages encrypted by the Germans was the ____. COLOSSUS
Which of the following database models excels in representing items that have slightly different attributes? object
Antivirus software is an example of a ____ security measure. detection activity
A(n) ____ helps people make decisions by directly manipulating data, analyzing data from external sources, generating statistical projections, and creating data models of various scenarios. DSS
Robots are best for performing all of the following activities EXCEPT ___________. calculating pay for thousands of employees.
Object-oriented languages that are popular today include ____. all the above
A ____ breaks a complex task into a series of subtasks. Work Breakdown Structure (WBS)
Which of the following suggestions is NOT considered good advice for reducing the risk of career repercussions if you want to be a whistleblower? Go right to the top of the chain of command.
Created by: deardenm