Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

COMPUTER SCI m3

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
A person who creates documentation for programming projects is a ____.   technical writer  
🗑
A goal of normalization is to minimize data ____.   redundancy  
🗑
Which of the following should be considered when reviewing a vendor’s request for proposal (RFP)?   all the above  
🗑
Which of the following is NOT a factor to consider when deciding what is the best data management tool to use?   web compatability  
🗑
A goal of the ____ phase of the SDLC is to produce a list of requirements for a new or revised information system.   analysis  
🗑
The IT industry includes which of the following?   all the above  
🗑
The data accessed by data mining and other analysis techniques is often stored in a _______.   data warehousing  
🗑
Which of the following is an example of a primary key for a database?   social security number  
🗑
Software engineers tend to focus on program ____.   designing  
🗑
Three key concepts ensure good quality of service from a computer system. They include all of the following EXCEPT ____.   cost  
🗑
John is considering getting a college degree in the IT field. He is interested in advancement opportunities when he graduates. You should advise him that it would be best to get at least a ____ degree.   bachelors  
🗑
Through the generations of development of computers, which of the following is NOT a characteristic of what computers have become?   less dependable  
🗑
The traditional approach to programming uses a(n) ____ paradigm.   procedural  
🗑
Which phase of the SDLC is the longest?   maintenance  
🗑
A sensor is an example of a(n) ______ device for a robot.   input  
🗑
Which of the following is NOT an advantage of telecommuting?   data security  
🗑
The first commercially successful computer was the ____.   UNIVAC  
🗑
In the Planning Phase of the SDLC, a(n) ____ is assigned to analyze and develop the information system.   project team  
🗑
Considering AI (machines) and humans (the brain), which of the following is FALSE?   we know how brain work and we can simulate that in a computer  
🗑
The ____ paradigm attempts to describe a problem without specifying exactly how to arrive at a solution.   declarative  
🗑
Among the steps you can take to avoid security problems is ____. Question 21 answers   keep your firewall updated and activated  
🗑
Computers characterized by their use of integrated circuits are considered ____ generation.   third  
🗑
A ____ error occurs when the rules of the programming language are not followed.   syntax  
🗑
Data ____ means that data are separate from the programs used to manipulate the data.   independence  
🗑
Methods of expressing algorithms include all of the following EXCEPT ________   algorithm code  
🗑
They want to avoid the risks of a direct conversion to a new information system because they have no backup for their current system. Which type of conversion would allow them to continue to use the old system during the conversion process?   parallel conversion  
🗑
Jane knows she must implement a step-by-step plan that describes the methods her business will use to secure data against disaster, and the guidelines that will be used to recover lost data if a disaster occurs. She will have to create a(n) ____.   disaster recovery plan  
🗑
Who proposed a test for intelligent behavior of machines that is considered to be the early work in artificial intelligence?   Alan Turing  
🗑
The figure shown above represents computer and software marketing channels. In that figure, Box C represents ____. Question 29 answers   mail-order suppliers  
🗑
A(n) _______ could be used to replicate how a specialist diagnoses lung cancer.   expert system  
🗑
___________ is the study of safe and efficient work environments.   Erogonomics  
🗑
Which of the following is NOT a guideline for creating a template for reports?   present as much information as possible  
🗑
A table's ____ order is the order in which records are stored on disk.   sort  
🗑
As a manager, you are responsible for managing inventory. Every month you receive a low inventory report that lists stock items that have fallen below a minimum reorder point. This report is a type of ____.   exception report  
🗑
A ____ language uses command words and grammar based on human language.   high-level  
🗑
A common threat to the data stored on a corporate information system is an act of war, which includes all of the following EXCEPT ____.   human error  
🗑
SQL allows users to______ a database.   all the above  
🗑
In the world of databases, a(n) ____ refers to a collection of data fields.   record  
🗑
____ help(s) programmers apply rigorous logical and mathematical models to software design.   formal methods  
🗑
Neural networks are used in AI to improve the computer’s ability to perform ______ tasks.   recognition  
🗑
Criminals have become sophisticated in the use of all of the following EXCEPT ____ to access data stored on personal computers.   ATM's  
🗑
A ____ control structure tells a computer what to do in a step by step manner.   sequence  
🗑
The electronic device used to decode messages encrypted by the Germans was the ____.   COLOSSUS  
🗑
Which of the following database models excels in representing items that have slightly different attributes?   object  
🗑
Antivirus software is an example of a ____ security measure.   detection activity  
🗑
A(n) ____ helps people make decisions by directly manipulating data, analyzing data from external sources, generating statistical projections, and creating data models of various scenarios.   DSS  
🗑
Robots are best for performing all of the following activities EXCEPT ___________.   calculating pay for thousands of employees.  
🗑
Object-oriented languages that are popular today include ____.   all the above  
🗑
A ____ breaks a complex task into a series of subtasks.   Work Breakdown Structure (WBS)  
🗑
Which of the following suggestions is NOT considered good advice for reducing the risk of career repercussions if you want to be a whistleblower?   Go right to the top of the chain of command.  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: deardenm