Question
click below
click below
Question
The Internet is the world’s largest WAN.
Normal Size Small Size show me how
Final cis150
Question | Answer |
---|---|
Networks can be classified according to their size and geographic scope. True or false | True |
The Internet is the world’s largest WAN. | True |
Data cannot flow over multiple networks that have different topologies. | False |
The organization that supervises Internet addressing is ARPANET. | False |
Domain name servers maintain lists of all domain names and their corresponding IP addresses. | True |
Most Internet connections are symmetrical. | False |
LANs use many of the same network technologies as the Internet. | True |
Many RFID and NFC tags contain no power source of their own and depend on the receiving device to provide the power for data exchange. | True |
File sharing poses no real security risks. | False |
On a network, which protocol is responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order, and error checking? | TCP |
Access to databases is usually open to anyone within an organization or business. | False |
In a database, a(n) __________ contains the smallest unit of meaningful information | Field |
In a relational database, relationships are specified by joining common data stored in records from different tables. | True |
The acronym ____________ refers to software that manages data stored in a database. | DBMS |
FileMaker Pro and Microsoft Access are DBMSs. | True |
In a case-sensitive database, uppercase letters are equivalent to their lowercase counterparts. | False |
The goal of normalization is to minimize data redundancy. | True |
SQL works behind the scenes as an intermediary between the database client software provided to users and the database itself. | True |
Relational databases store unstructured data. | False |
A(n) _________ database is used to collect, modify, and maintain data on a daily basis. | Operational |
A(n) _________ database is used to collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions. | Anayitcal |
Some software engineering activities overlap with the systems analysis and design activities | True |
Application programmers specialize in developing system software such as operating systems, device drivers, security modules, and communications software. | False |
The core of a computer program is a sequence of instructions. | True |
A low-level language uses command words and grammar based on human languages. | False |
Microprocessors only understand machine language, so there has to be some way to convert assembly language instructions into 1s and 0s. | True |
An API is a set of application or operating system functions that programmers can add to the programs they create. | True |
The instructions that make up a computer program are sometimes referred to as | code |
n a problem statement, you can limit complexity by making ____________. | assumptions |
A(n) _________ provides programmers with tools to build substantial sections of a program by pointing and clicking rather than typing lines of code. | VDE |
A low-level language has a low level of ___________ because it includes commands specific to a particular CPU or microprocessor family. | ABstraction |
_______________, such as BASIC, Python, Java, Prolog, and C++, make the programming process easier by replacing unintelligible strings of 1s and 0s or cryptic assembly commands with understandable commands, such as PRINT and WRITE. | High-level languages |
In 1969, computer scientists began to develop high-level languages, called ________-generation languages, which more closely= resembled human languages. | fourth |
The human-readable version of a program created in a high-level language by a programmer is called __________. | source code |
The __________ is made up of businesses that focus on digital equipment, software, communications technologies, and related services. | ict industry |
Companies are classified into economic sectors according to the types of goods and services they provide. | true |
The growth of the ICT industry has a generally upward trend. | ture |
The terms outsourcing and offshoring are the same thing. | false |
The Stuxnet virus that disabled Iranian nuclear centrifuges is an example of cyberwarfare. | true |
Transistors performed functions similar to vacuum tubes, but they were larger and more power hungry. | false |
A key feature of the Apple Lisa was its use of _______________. | :graphical user interface |
Samuel Morse developed and patented a telegraph system. | true |
Certification alone is sufficient to qualify for a job in the IT industry. | false |
Information technology law is the legal framework that applies to the collection, storage, and distribution of digital information. | true |
Whistleblowing is risky under any circumstances. | true |
Relocating of manufacturing and customer support, to lower-cost locations in other countries… | Offshoring |
First-generation computers, such as UNIVAC, stored individual bits of data, zero or one, in? | vaccuum tubes |
Stock Market Bubble refers to a sharp? In stock values that… | rise decline |
Which one is not an information industry major facet? | programing |
Which phase of PLC loss of money? | R&D |
Innovation will double transistors in an integrated circuit every 2 years without raising cost. | moores law |
The sequence of people activities resources in moving a product from vendor to customer | Supply chain |
When the system is too difficult to use which PIECES | services |
The process modifying a commercial application to reflect an organizations needs | Software customization |
Step-by-step plan to secure data and resume operations if | Disaster recovery plan |
Organization is a group of people working together to accomplish a goal. True or False? | true |
An incident in which personal data is viewed, accessed, or retrieved without authorization | data breech |
Setting incremental goals that can be achieved in a year or less is? | tatical planning |
Facts and rules are incorporated into a knowledge base system, which is manipulated by | ionference engeinnering |
Transaction processing systems, such as banking, use online processing called? | olpt |
A transaction processing system (TPS) provides a way to collect, process, store, modify or….. | cancel transactions |
System for generating statistical projections, and creating data models of various scenarios | dds |
Any organization that seeks profit by providing goods and services is called? | Business or enterprises |