Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Final cis150

        Help!  

Question
Answer
Networks can be classified according to their size and geographic scope. True or false   True  
🗑
The Internet is the world’s largest WAN.   True  
🗑
Data cannot flow over multiple networks that have different topologies.   False  
🗑
The organization that supervises Internet addressing is ARPANET.   False  
🗑
Domain name servers maintain lists of all domain names and their corresponding IP addresses.   True  
🗑
Most Internet connections are symmetrical.   False  
🗑
LANs use many of the same network technologies as the Internet.   True  
🗑
Many RFID and NFC tags contain no power source of their own and depend on the receiving device to provide the power for data exchange.   True  
🗑
File sharing poses no real security risks.   False  
🗑
On a network, which protocol is responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order, and error checking?   TCP  
🗑
Access to databases is usually open to anyone within an organization or business.   False  
🗑
In a database, a(n) __________ contains the smallest unit of meaningful information   Field  
🗑
In a relational database, relationships are specified by joining common data stored in records from different tables.   True  
🗑
The acronym ____________ refers to software that manages data stored in a database.   DBMS  
🗑
FileMaker Pro and Microsoft Access are DBMSs.   True  
🗑
In a case-sensitive database, uppercase letters are equivalent to their lowercase counterparts.   False  
🗑
The goal of normalization is to minimize data redundancy.   True  
🗑
SQL works behind the scenes as an intermediary between the database client software provided to users and the database itself.   True  
🗑
Relational databases store unstructured data.   False  
🗑
A(n) _________ database is used to collect, modify, and maintain data on a daily basis.   Operational  
🗑
A(n) _________ database is used to collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions.   Anayitcal  
🗑
Some software engineering activities overlap with the systems analysis and design activities   True  
🗑
Application programmers specialize in developing system software such as operating systems, device drivers, security modules, and communications software.   False  
🗑
The core of a computer program is a sequence of instructions.   True  
🗑
A low-level language uses command words and grammar based on human languages.   False  
🗑
Microprocessors only understand machine language, so there has to be some way to convert assembly language instructions into 1s and 0s.   True  
🗑
An API is a set of application or operating system functions that programmers can add to the programs they create.   True  
🗑
The instructions that make up a computer program are sometimes referred to as   code  
🗑
n a problem statement, you can limit complexity by making ____________.   assumptions  
🗑
A(n) _________ provides programmers with tools to build substantial sections of a program by pointing and clicking rather than typing lines of code.   VDE  
🗑
A low-level language has a low level of ___________ because it includes commands specific to a particular CPU or microprocessor family.   ABstraction  
🗑
_______________, such as BASIC, Python, Java, Prolog, and C++, make the programming process easier by replacing unintelligible strings of 1s and 0s or cryptic assembly commands with understandable commands, such as PRINT and WRITE.   High-level languages  
🗑
In 1969, computer scientists began to develop high-level languages, called ________-generation languages, which more closely= resembled human languages.   fourth  
🗑
The human-readable version of a program created in a high-level language by a programmer is called __________.   source code  
🗑
The __________ is made up of businesses that focus on digital equipment, software, communications technologies, and related services.   ict industry  
🗑
Companies are classified into economic sectors according to the types of goods and services they provide.   true  
🗑
The growth of the ICT industry has a generally upward trend.   ture  
🗑
The terms outsourcing and offshoring are the same thing.   false  
🗑
The Stuxnet virus that disabled Iranian nuclear centrifuges is an example of cyberwarfare.   true  
🗑
Transistors performed functions similar to vacuum tubes, but they were larger and more power hungry.   false  
🗑
A key feature of the Apple Lisa was its use of _______________.   :graphical user interface  
🗑
Samuel Morse developed and patented a telegraph system.   true  
🗑
Certification alone is sufficient to qualify for a job in the IT industry.   false  
🗑
Information technology law is the legal framework that applies to the collection, storage, and distribution of digital information.   true  
🗑
Whistleblowing is risky under any circumstances.   true  
🗑
Relocating of manufacturing and customer support, to lower-cost locations in other countries…   Offshoring  
🗑
First-generation computers, such as UNIVAC, stored individual bits of data, zero or one, in?   vaccuum tubes  
🗑
Stock Market Bubble refers to a sharp? In stock values that…   rise decline  
🗑
Which one is not an information industry major facet?   programing  
🗑
Which phase of PLC loss of money?   R&D  
🗑
Innovation will double transistors in an integrated circuit every 2 years without raising cost.   moores law  
🗑
The sequence of people activities resources in moving a product from vendor to customer   Supply chain  
🗑
When the system is too difficult to use which PIECES   services  
🗑
The process modifying a commercial application to reflect an organizations needs   Software customization  
🗑
Step-by-step plan to secure data and resume operations if   Disaster recovery plan  
🗑
Organization is a group of people working together to accomplish a goal. True or False?   true  
🗑
An incident in which personal data is viewed, accessed, or retrieved without authorization   data breech  
🗑
Setting incremental goals that can be achieved in a year or less is?   tatical planning  
🗑
Facts and rules are incorporated into a knowledge base system, which is manipulated by   ionference engeinnering  
🗑
Transaction processing systems, such as banking, use online processing called?   olpt  
🗑
A transaction processing system (TPS) provides a way to collect, process, store, modify or…..   cancel transactions  
🗑
System for generating statistical projections, and creating data models of various scenarios   dds  
🗑
Any organization that seeks profit by providing goods and services is called?   Business or enterprises  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: nguyem11