Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Question

Networks can be classified according to their size and geographic scope. True or false
click to flip
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't know

Question


The Internet is the world’s largest WAN.
Remaining cards (62)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Final cis150

QuestionAnswer
Networks can be classified according to their size and geographic scope. True or false True
The Internet is the world’s largest WAN. True
Data cannot flow over multiple networks that have different topologies. False
The organization that supervises Internet addressing is ARPANET. False
Domain name servers maintain lists of all domain names and their corresponding IP addresses. True
Most Internet connections are symmetrical. False
LANs use many of the same network technologies as the Internet. True
Many RFID and NFC tags contain no power source of their own and depend on the receiving device to provide the power for data exchange. True
File sharing poses no real security risks. False
On a network, which protocol is responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order, and error checking? TCP
Access to databases is usually open to anyone within an organization or business. False
In a database, a(n) __________ contains the smallest unit of meaningful information Field
In a relational database, relationships are specified by joining common data stored in records from different tables. True
The acronym ____________ refers to software that manages data stored in a database. DBMS
FileMaker Pro and Microsoft Access are DBMSs. True
In a case-sensitive database, uppercase letters are equivalent to their lowercase counterparts. False
The goal of normalization is to minimize data redundancy. True
SQL works behind the scenes as an intermediary between the database client software provided to users and the database itself. True
Relational databases store unstructured data. False
A(n) _________ database is used to collect, modify, and maintain data on a daily basis. Operational
A(n) _________ database is used to collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions. Anayitcal
Some software engineering activities overlap with the systems analysis and design activities True
Application programmers specialize in developing system software such as operating systems, device drivers, security modules, and communications software. False
The core of a computer program is a sequence of instructions. True
A low-level language uses command words and grammar based on human languages. False
Microprocessors only understand machine language, so there has to be some way to convert assembly language instructions into 1s and 0s. True
An API is a set of application or operating system functions that programmers can add to the programs they create. True
The instructions that make up a computer program are sometimes referred to as code
n a problem statement, you can limit complexity by making ____________. assumptions
A(n) _________ provides programmers with tools to build substantial sections of a program by pointing and clicking rather than typing lines of code. VDE
A low-level language has a low level of ___________ because it includes commands specific to a particular CPU or microprocessor family. ABstraction
_______________, such as BASIC, Python, Java, Prolog, and C++, make the programming process easier by replacing unintelligible strings of 1s and 0s or cryptic assembly commands with understandable commands, such as PRINT and WRITE. High-level languages
In 1969, computer scientists began to develop high-level languages, called ________-generation languages, which more closely= resembled human languages. fourth
The human-readable version of a program created in a high-level language by a programmer is called __________. source code
The __________ is made up of businesses that focus on digital equipment, software, communications technologies, and related services. ict industry
Companies are classified into economic sectors according to the types of goods and services they provide. true
The growth of the ICT industry has a generally upward trend. ture
The terms outsourcing and offshoring are the same thing. false
The Stuxnet virus that disabled Iranian nuclear centrifuges is an example of cyberwarfare. true
Transistors performed functions similar to vacuum tubes, but they were larger and more power hungry. false
A key feature of the Apple Lisa was its use of _______________. :graphical user interface
Samuel Morse developed and patented a telegraph system. true
Certification alone is sufficient to qualify for a job in the IT industry. false
Information technology law is the legal framework that applies to the collection, storage, and distribution of digital information. true
Whistleblowing is risky under any circumstances. true
Relocating of manufacturing and customer support, to lower-cost locations in other countries… Offshoring
First-generation computers, such as UNIVAC, stored individual bits of data, zero or one, in? vaccuum tubes
Stock Market Bubble refers to a sharp? In stock values that… rise decline
Which one is not an information industry major facet? programing
Which phase of PLC loss of money? R&D
Innovation will double transistors in an integrated circuit every 2 years without raising cost. moores law
The sequence of people activities resources in moving a product from vendor to customer Supply chain
When the system is too difficult to use which PIECES services
The process modifying a commercial application to reflect an organizations needs Software customization
Step-by-step plan to secure data and resume operations if Disaster recovery plan
Organization is a group of people working together to accomplish a goal. True or False? true
An incident in which personal data is viewed, accessed, or retrieved without authorization data breech
Setting incremental goals that can be achieved in a year or less is? tatical planning
Facts and rules are incorporated into a knowledge base system, which is manipulated by ionference engeinnering
Transaction processing systems, such as banking, use online processing called? olpt
A transaction processing system (TPS) provides a way to collect, process, store, modify or….. cancel transactions
System for generating statistical projections, and creating data models of various scenarios dds
Any organization that seeks profit by providing goods and services is called? Business or enterprises
Created by: nguyem11
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards