Question | Answer |
A person who creates documentation for programming projects is a ____. | technical writer |
A goal of normalization is to minimize data ____. | redundancy |
Which of the following should be considered when reviewing a vendor’s request for proposal (RFP)? | all the above |
Which of the following is NOT a factor to consider when deciding what is the best data management tool to use? | web compatability |
A goal of the ____ phase of the SDLC is to produce a list of requirements for a new or revised information system. | analysis |
The IT industry includes which of the following? | all the above |
The data accessed by data mining and other analysis techniques is often stored in a _______. | data warehousing |
Which of the following is an example of a primary key for a database? | social security number |
Software engineers tend to focus on program ____. | designing |
Three key concepts ensure good quality of service from a computer system. They include all of the following EXCEPT ____. | cost |
John is considering getting a college degree in the IT field. He is interested in advancement opportunities when he graduates. You should advise him that it would be best to get at least a ____ degree. | bachelors |
Through the generations of development of computers, which of the following is NOT a characteristic of what computers have become? | less dependable |
The traditional approach to programming uses a(n) ____ paradigm. | procedural |
Which phase of the SDLC is the longest? | maintenance |
A sensor is an example of a(n) ______ device for a robot. | input |
Which of the following is NOT an advantage of telecommuting? | data security |
The first commercially successful computer was the ____. | UNIVAC |
In the Planning Phase of the SDLC, a(n) ____ is assigned to analyze and develop the information system. | project team |
Considering AI (machines) and humans (the brain), which of the following is FALSE? | we know how brain work and we can simulate that in a computer |
The ____ paradigm attempts to describe a problem without specifying exactly how to arrive at a solution. | declarative |
Among the steps you can take to avoid security problems is ____.
Question 21 answers | keep your firewall updated and activated |
Computers characterized by their use of integrated circuits are considered ____ generation. | third |
A ____ error occurs when the rules of the programming language are not followed. | syntax |
Data ____ means that data are separate from the programs used to manipulate the data. | independence |
Methods of expressing algorithms include all of the following EXCEPT ________ | algorithm code |
They want to avoid the risks of a direct conversion to a new information system because they have no backup for their current system. Which type of conversion would allow them to continue to use the old system during the conversion process? | parallel conversion |
Jane knows she must implement a step-by-step plan that describes the methods her business will use to secure data against disaster, and the guidelines that will be used to recover lost data if a disaster occurs. She will have to create a(n) ____. | disaster recovery plan |
Who proposed a test for intelligent behavior of machines that is considered to be the early work in artificial intelligence? | Alan Turing |
The figure shown above represents computer and software marketing channels. In that figure, Box C represents ____.
Question 29 answers | mail-order suppliers |
A(n) _______ could be used to replicate how a specialist diagnoses lung cancer. | expert system |
___________ is the study of safe and efficient work environments. | Erogonomics |
Which of the following is NOT a guideline for creating a template for reports? | present as much information as possible |
A table's ____ order is the order in which records are stored on disk. | sort |
As a manager, you are responsible for managing inventory. Every month you receive a low inventory report that lists stock items that have fallen below a minimum reorder point. This report is a type of ____. | exception report |
A ____ language uses command words and grammar based on human language. | high-level |
A common threat to the data stored on a corporate information system is an act of war, which includes all of the following EXCEPT ____. | human error |
SQL allows users to______ a database. | all the above |
In the world of databases, a(n) ____ refers to a collection of data fields. | record |
____ help(s) programmers apply rigorous logical and mathematical models to software design. | formal methods |
Neural networks are used in AI to improve the computer’s ability to perform ______ tasks. | recognition |
Criminals have become sophisticated in the use of all of the following EXCEPT ____ to access data stored on personal computers. | ATM's |
A ____ control structure tells a computer what to do in a step by step manner. | sequence |
The electronic device used to decode messages encrypted by the Germans was the ____. | COLOSSUS |
Which of the following database models excels in representing items that have slightly different attributes? | object |
Antivirus software is an example of a ____ security measure. | detection activity |
A(n) ____ helps people make decisions by directly manipulating data, analyzing data from external sources, generating statistical projections, and creating data models of various scenarios. | DSS |
Robots are best for performing all of the following activities EXCEPT ___________. | calculating pay for thousands of employees. |
Object-oriented languages that are popular today include ____. | all the above |
A ____ breaks a complex task into a series of subtasks. | Work Breakdown Structure (WBS) |
Which of the following suggestions is NOT considered good advice for reducing the risk of career repercussions if you want to be a whistleblower? | Go right to the top of the chain of command. |