Final cis150
Help!
|
|
||||
|---|---|---|---|---|---|
| Networks can be classified according to their size and geographic scope. True or false | True
🗑
|
||||
| The Internet is the world’s largest WAN. | True
🗑
|
||||
| Data cannot flow over multiple networks that have different topologies. | False
🗑
|
||||
| The organization that supervises Internet addressing is ARPANET. | False
🗑
|
||||
| Domain name servers maintain lists of all domain names and their corresponding IP addresses. | True
🗑
|
||||
| Most Internet connections are symmetrical. | False
🗑
|
||||
| LANs use many of the same network technologies as the Internet. | True
🗑
|
||||
| Many RFID and NFC tags contain no power source of their own and depend on the receiving device to provide the power for data exchange. | True
🗑
|
||||
| File sharing poses no real security risks. | False
🗑
|
||||
| On a network, which protocol is responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order, and error checking? | TCP
🗑
|
||||
| Access to databases is usually open to anyone within an organization or business. | False
🗑
|
||||
| In a database, a(n) __________ contains the smallest unit of meaningful information | Field
🗑
|
||||
| In a relational database, relationships are specified by joining common data stored in records from different tables. | True
🗑
|
||||
| The acronym ____________ refers to software that manages data stored in a database. | DBMS
🗑
|
||||
| FileMaker Pro and Microsoft Access are DBMSs. | True
🗑
|
||||
| In a case-sensitive database, uppercase letters are equivalent to their lowercase counterparts. | False
🗑
|
||||
| The goal of normalization is to minimize data redundancy. | True
🗑
|
||||
| SQL works behind the scenes as an intermediary between the database client software provided to users and the database itself. | True
🗑
|
||||
| Relational databases store unstructured data. | False
🗑
|
||||
| A(n) _________ database is used to collect, modify, and maintain data on a daily basis. | Operational
🗑
|
||||
| A(n) _________ database is used to collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions. | Anayitcal
🗑
|
||||
| Some software engineering activities overlap with the systems analysis and design activities | True
🗑
|
||||
| Application programmers specialize in developing system software such as operating systems, device drivers, security modules, and communications software. | False
🗑
|
||||
| The core of a computer program is a sequence of instructions. | True
🗑
|
||||
| A low-level language uses command words and grammar based on human languages. | False
🗑
|
||||
| Microprocessors only understand machine language, so there has to be some way to convert assembly language instructions into 1s and 0s. | True
🗑
|
||||
| An API is a set of application or operating system functions that programmers can add to the programs they create. | True
🗑
|
||||
| The instructions that make up a computer program are sometimes referred to as | code
🗑
|
||||
| n a problem statement, you can limit complexity by making ____________. | assumptions
🗑
|
||||
| A(n) _________ provides programmers with tools to build substantial sections of a program by pointing and clicking rather than typing lines of code. | VDE
🗑
|
||||
| A low-level language has a low level of ___________ because it includes commands specific to a particular CPU or microprocessor family. | ABstraction
🗑
|
||||
| _______________, such as BASIC, Python, Java, Prolog, and C++, make the programming process easier by replacing unintelligible strings of 1s and 0s or cryptic assembly commands with understandable commands, such as PRINT and WRITE. | High-level languages
🗑
|
||||
| In 1969, computer scientists began to develop high-level languages, called ________-generation languages, which more closely= resembled human languages. | fourth
🗑
|
||||
| The human-readable version of a program created in a high-level language by a programmer is called __________. | source code
🗑
|
||||
| The __________ is made up of businesses that focus on digital equipment, software, communications technologies, and related services. | ict industry
🗑
|
||||
| Companies are classified into economic sectors according to the types of goods and services they provide. | true
🗑
|
||||
| The growth of the ICT industry has a generally upward trend. | ture
🗑
|
||||
| The terms outsourcing and offshoring are the same thing. | false
🗑
|
||||
| The Stuxnet virus that disabled Iranian nuclear centrifuges is an example of cyberwarfare. | true
🗑
|
||||
| Transistors performed functions similar to vacuum tubes, but they were larger and more power hungry. | false
🗑
|
||||
| A key feature of the Apple Lisa was its use of _______________. | :graphical user interface
🗑
|
||||
| Samuel Morse developed and patented a telegraph system. | true
🗑
|
||||
| Certification alone is sufficient to qualify for a job in the IT industry. | false
🗑
|
||||
| Information technology law is the legal framework that applies to the collection, storage, and distribution of digital information. | true
🗑
|
||||
| Whistleblowing is risky under any circumstances. | true
🗑
|
||||
| Relocating of manufacturing and customer support, to lower-cost locations in other countries… | Offshoring
🗑
|
||||
| First-generation computers, such as UNIVAC, stored individual bits of data, zero or one, in? | vaccuum tubes
🗑
|
||||
| Stock Market Bubble refers to a sharp? In stock values that… | rise decline
🗑
|
||||
| Which one is not an information industry major facet? | programing
🗑
|
||||
| Which phase of PLC loss of money? | R&D
🗑
|
||||
| Innovation will double transistors in an integrated circuit every 2 years without raising cost. | moores law
🗑
|
||||
| The sequence of people activities resources in moving a product from vendor to customer | Supply chain
🗑
|
||||
| When the system is too difficult to use which PIECES | services
🗑
|
||||
| The process modifying a commercial application to reflect an organizations needs | Software customization
🗑
|
||||
| Step-by-step plan to secure data and resume operations if | Disaster recovery plan
🗑
|
||||
| Organization is a group of people working together to accomplish a goal. True or False? | true
🗑
|
||||
| An incident in which personal data is viewed, accessed, or retrieved without authorization | data breech
🗑
|
||||
| Setting incremental goals that can be achieved in a year or less is? | tatical planning
🗑
|
||||
| Facts and rules are incorporated into a knowledge base system, which is manipulated by | ionference engeinnering
🗑
|
||||
| Transaction processing systems, such as banking, use online processing called? | olpt
🗑
|
||||
| A transaction processing system (TPS) provides a way to collect, process, store, modify or….. | cancel transactions
🗑
|
||||
| System for generating statistical projections, and creating data models of various scenarios | dds
🗑
|
||||
| Any organization that seeks profit by providing goods and services is called? | Business or enterprises
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
nguyem11