click below
click below
Normal Size Small Size show me how
Final cis150
| Question | Answer |
|---|---|
| Networks can be classified according to their size and geographic scope. True or false | True |
| The Internet is the world’s largest WAN. | True |
| Data cannot flow over multiple networks that have different topologies. | False |
| The organization that supervises Internet addressing is ARPANET. | False |
| Domain name servers maintain lists of all domain names and their corresponding IP addresses. | True |
| Most Internet connections are symmetrical. | False |
| LANs use many of the same network technologies as the Internet. | True |
| Many RFID and NFC tags contain no power source of their own and depend on the receiving device to provide the power for data exchange. | True |
| File sharing poses no real security risks. | False |
| On a network, which protocol is responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order, and error checking? | TCP |
| Access to databases is usually open to anyone within an organization or business. | False |
| In a database, a(n) __________ contains the smallest unit of meaningful information | Field |
| In a relational database, relationships are specified by joining common data stored in records from different tables. | True |
| The acronym ____________ refers to software that manages data stored in a database. | DBMS |
| FileMaker Pro and Microsoft Access are DBMSs. | True |
| In a case-sensitive database, uppercase letters are equivalent to their lowercase counterparts. | False |
| The goal of normalization is to minimize data redundancy. | True |
| SQL works behind the scenes as an intermediary between the database client software provided to users and the database itself. | True |
| Relational databases store unstructured data. | False |
| A(n) _________ database is used to collect, modify, and maintain data on a daily basis. | Operational |
| A(n) _________ database is used to collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions. | Anayitcal |
| Some software engineering activities overlap with the systems analysis and design activities | True |
| Application programmers specialize in developing system software such as operating systems, device drivers, security modules, and communications software. | False |
| The core of a computer program is a sequence of instructions. | True |
| A low-level language uses command words and grammar based on human languages. | False |
| Microprocessors only understand machine language, so there has to be some way to convert assembly language instructions into 1s and 0s. | True |
| An API is a set of application or operating system functions that programmers can add to the programs they create. | True |
| The instructions that make up a computer program are sometimes referred to as | code |
| n a problem statement, you can limit complexity by making ____________. | assumptions |
| A(n) _________ provides programmers with tools to build substantial sections of a program by pointing and clicking rather than typing lines of code. | VDE |
| A low-level language has a low level of ___________ because it includes commands specific to a particular CPU or microprocessor family. | ABstraction |
| _______________, such as BASIC, Python, Java, Prolog, and C++, make the programming process easier by replacing unintelligible strings of 1s and 0s or cryptic assembly commands with understandable commands, such as PRINT and WRITE. | High-level languages |
| In 1969, computer scientists began to develop high-level languages, called ________-generation languages, which more closely= resembled human languages. | fourth |
| The human-readable version of a program created in a high-level language by a programmer is called __________. | source code |
| The __________ is made up of businesses that focus on digital equipment, software, communications technologies, and related services. | ict industry |
| Companies are classified into economic sectors according to the types of goods and services they provide. | true |
| The growth of the ICT industry has a generally upward trend. | ture |
| The terms outsourcing and offshoring are the same thing. | false |
| The Stuxnet virus that disabled Iranian nuclear centrifuges is an example of cyberwarfare. | true |
| Transistors performed functions similar to vacuum tubes, but they were larger and more power hungry. | false |
| A key feature of the Apple Lisa was its use of _______________. | :graphical user interface |
| Samuel Morse developed and patented a telegraph system. | true |
| Certification alone is sufficient to qualify for a job in the IT industry. | false |
| Information technology law is the legal framework that applies to the collection, storage, and distribution of digital information. | true |
| Whistleblowing is risky under any circumstances. | true |
| Relocating of manufacturing and customer support, to lower-cost locations in other countries… | Offshoring |
| First-generation computers, such as UNIVAC, stored individual bits of data, zero or one, in? | vaccuum tubes |
| Stock Market Bubble refers to a sharp? In stock values that… | rise decline |
| Which one is not an information industry major facet? | programing |
| Which phase of PLC loss of money? | R&D |
| Innovation will double transistors in an integrated circuit every 2 years without raising cost. | moores law |
| The sequence of people activities resources in moving a product from vendor to customer | Supply chain |
| When the system is too difficult to use which PIECES | services |
| The process modifying a commercial application to reflect an organizations needs | Software customization |
| Step-by-step plan to secure data and resume operations if | Disaster recovery plan |
| Organization is a group of people working together to accomplish a goal. True or False? | true |
| An incident in which personal data is viewed, accessed, or retrieved without authorization | data breech |
| Setting incremental goals that can be achieved in a year or less is? | tatical planning |
| Facts and rules are incorporated into a knowledge base system, which is manipulated by | ionference engeinnering |
| Transaction processing systems, such as banking, use online processing called? | olpt |
| A transaction processing system (TPS) provides a way to collect, process, store, modify or….. | cancel transactions |
| System for generating statistical projections, and creating data models of various scenarios | dds |
| Any organization that seeks profit by providing goods and services is called? | Business or enterprises |