Shared Flashcard Set

Details

Final Review
Chapter 9-12
424
Computer Science
Undergraduate 1
12/06/2010

Additional Computer Science Flashcards

 


 

Cards

Term

In the ASCII and EBCDIC coding schemes, each byte represents a single ____, which can be a number, letter, punctuation mark, or other symbol.

Definition

Character

 

Term
Users can instruct the DBMS to ____ the results of a query.
Definition

 

Store

 

Display

 

Print

Term
A ____ allows users to design a report on the screen, retrieve data into the report design, and then display or print the report like the one shown in Figure 9-1.
Definition
report generator

Term
____ backup is a backup plan in which all data is backed up whenever a change is made.
Definition
Continuous

Term
For each field, a data dictionary can store ____.
Definition

field type 

field size 
   validation rules

Term
Data ____ determine(s) the quality of the data.
Definition
Integrity
Term

 T/F

A person must be trained in programming languages to learn a query language.
Definition
False
Term
A user of a relational database refers to a record as a(n) ____.
Definition
Row
Term

 T/F 

Most information is important only to certain people or groups of people.

 

Definition
True
Term

T/F 

The data in a key field is not unique to a specific record.
Definition
False
Term

 

 

T/F

The field size defines the minimum number of characters a field can contain.
Definition

 

 

 

False

Term

 

 

 

____ information has meaning to the person who receives it.
Definition

 

 

 

Useful

Term

 

 

T/F

An alphabetic check performed on the data in Figure 9-3 would ensure that users enter only alphabetic or numeric data into a field.

Definition

 

 

 

False

Term

 

 

Because it is used to generate information, most companies realize that _____ is one of their more valuable assets

Definition

 

 

Data

Term
T/F
When users modify data in a database using the database approach, they must make changes to all files instead of just one file.
Definition

 

 

False

Term
When a program flags a deleted record, ____.
Definition

 

 

 

the program places an asterisk or some other character at the beginning of the record to flag it

Term

 

 

 

A ____ consists of simple, English-like statements that allow users to specify the data to display, print, or store

Definition

 

 

 

query language

Term

 

 

A DBMS that creates a log usually provides a(n) ____.
Definition

 

 

 

 

Recovery Utility

Term
T/F
Data in file processing systems is more vulnerable than data in a database.
Definition

 

 

 

 

False

Term
A(n) ____ is a request for specific data from the database.
Definition

 

 

 

 

Query

Term

 

 

 

____ information should give more value than it costs to produce.

Definition

 

 

 

 

Cost Effective

Term

 

 

 

A data entry ____ is a window on the screen that provides areas for entering or changing data in a database.

Definition

 

 

 

Form

Term

 

 

 

A(n) ____ is a huge database that stores and manages the data required to analyze historical and current transactions.

Definition

 

 

 

Data Warehouse

Term

 

 

 

 

Data ____ identifies the quality of the data.

Definition

 

 

 

Integrity

Term

 

 

 

In small companies, one person often is both the DA and ____.

Definition

 

 

 

DBA

Term

 

 

 

Programs use a variety of techniques to manage ____ records.

Definition

 

 

 

Deleted

Term

 

 

 

The database approach increases the data's ____ by reducing the possibility of introducing inconsistencies.

Definition

 

 

 

Integrity

Term

 

 

 

The field ____ defines the maximum number of characters a field can contain.

Definition

 

 

 

Size

Term

 

 

 

You can fill in a(n) ____ on a Web page in order to access data in a Web database

Definition

 

 

 

Form

Term
____ data wastes resources such as storage space and people's time.
Definition
Duplicating
Term

____ information can lead to incorrect decisions.

 

Definition
Inaccurate
Term
A database uses a variety of characteristics, such as field size and ____, to define each field.
Definition
Data Type
Term
Database software is often called a ____.
Definition
Database Management System
Term
Each row has a(n) ____ and each column has a unique name.
Definition
 Primary Key
Term
Most DBMSs include a ____ feature that has a graphical user interface to assist users with retrieving data.
Definition
Query by Example
Term
Much of the information on the Web exists in ____.
Definition
Databases
Term
Programs that maintain inactive data for an extended period commonly ____ records
Definition
Flag
Term
The database ____ and administrators are responsible for managing and coordinating all database activities.
Definition
Analysts
Term

 

 

T/F

A person needs a solid programming background to learn a query language.

Definition

 

 

 

 

False

Term

 

 

 

T/F

Computers process information in a database into data.

Definition

 

 

 

False

Term

 

 

 

T/F

Databases require less memory, storage, and processing power than file processing systems.

Definition

 

 

 

False

Term

 

 

T/F

File maintenance refers to the procedures that keep data current.

Definition

 

 

 

True

Term

 

 

T/F

In addition to accessing information, users provide information to Web databases.

Definition

 

 

 

True

Term

 

 

T/F

Most information loses its value with time.

Definition

 

 

 

True

Term

 

 

 

T/F

Nearly every multidimensional database has a dimension of time.

Definition

 

 

 

True

Term

 

 

 

T/F

The primary key specifies the kind of data a field can contain and how the field is used.

Definition

 

 

 

False

Term

 

 

 

T/F

The role of coordinating the use of the database belongs to the database users.

Definition

 

 

 

False

Term

 

 

T/F

 

Software users with a EULA like the one in Figure 10-4 may make as many backup copies of the software as they want

Definition

 

 

 

False

Term

 

 

 

Which of the following is not true of intrusion detection software?
Definition

 

 

 

It is inexpensive

Term

 

 

 

All of the following are common ways computers become infected with malware, except ____.
Definition

 

 

 

installing a software package from a CD

Term

 

 

 

The term, ____, refers to online or Internet-based illegal acts.
Definition

 

 

 

Cybercrime

Term

 

 

 

____________________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
Definition

 

 

 

Spoofing

Term

 

 

T/F

With a license agreement like the one shown in Figure 10-4, the user becomes the owner of the software

Definition

 

 

 

False

Term

 

 

 

A(n) ____________________ protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.
Definition

 

 

 

antivirus program

Term

 

 

 

If an antivirus program cannot remove an infection, it often ____.
Definition

 

 

 

quarantines the infected file

Term

 

 

 

A ____ is a separate area of a hard disk that holds the infected file until the infection can be removed.
Definition

 

 

 

Quarantine

Term

 

 

 

T/F

A digital certificate is an encrypted code attached to an electronic message to verify the identity of the message sender

Definition

 

 

 

False

Term

 

 

 

A(n) ____ is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.
Definition

 

 

 

Backup

Term

 

 

 

A cyberextortionist is someone who uses the Internet or a network to destroy or damage computers

Definition

 

 

 

False

Term

 

 

 

A(n) ____________________ has the same intent as a cracker but does not have the technical skills and knowledge.
Definition

 

 

 

Script Kiddie

Term

 

 

 

_____ is a server outside a company’s network that controls which communications pass into the company’s network.
Definition

 

 

 

Proxy Server

Term

 

 

 

As shown in Figure 10-2, many Web sites require a user to enter a(n) ____________________, which is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user.
Definition

 

 

 

User Name

Term

 

 

T/F

To access a wireless network, perpetrators must be in the range of the wireless network.
Definition

 

 

True

 

Term

 

 

 

T/F

Electrical power variation is one of the least common causes of system failure.
Definition

 

 

 

False

Term

 

 

 

A(n) ____ is a program that hides within or looks like a legitimate program.
Definition

 

 

 

Trojan Horse

Term

 

 

 

As shown in Figure 10-5, an unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once is called ____.
Definition

 

 

 

Spam

Term

 

 

 

Many systems implement access controls using a two-phase process called ____.
Definition

 

 

 

identification and authentication

Term
____ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
Definition
Ergonomics
Term
____ is Internet junk mail
Definition
Spam
Term
___ use computer automated tools to assist them with guessing passwords.
Definition
Hackers
Term
A wireless access point (WAP) should be configured so it does not broadcast a network ____.
Definition
Name
Term
A(n) ____, also called a virus definition, is a known specific pattern of virus code.
Definition
Virus Signature
Term
Hardware ____ is the act of defacing or destroying computer equipment.
Definition
Vandalism
Term
If your computer connects to the Internet, also be sure to have protection for your ____, telephone lines, DSL lines, Internet cable lines, and network lines.
Definition
Modem
Term
The single-user license agreement is also called a(n) ____-user license agreement
Definition
End
Term
____ is inflammation of the nerve that connects the forearm to the palm of the wrist.
Definition
CTS
Term
____ is not permitted under a single-user license agreement.
Definition
Exporting Software
Term
A(n) ____ is a private combination of characters associated with the user name that allows access to certain computer resources.
Definition
Password
Term
A(n) ____ is a separate area of a hard disk that holds the infected file until the infection can be removed.
Definition
Quarantine
Term
If power fails, an uninterruptible power supply (UPS), uses batteries to provide electricity for ____.
Definition
A limited amount of time
Term
In ____, perpetrators attempt to connect to wireless networks via their notebook computer while driving a vehicle through areas they suspect have a wireless network
Definition
War Driving
Term
Some mini-security systems ____ the computer and sound an alarm if the computer moves outside a specified distance.
Definition
Shut Down
Term
Web ____ software is a program that restricts access to specified Web sites.
Definition
Filtering
Term

T/F

A personal identification number (PIN) is a numeric user name

Definition
False
Term

T/F

A virus, worm, and Trojan horse are capable of self-replicating to other computers.

Definition
False
Term

T/F

An 802.11i network uses more sophisticated encryption techniques than both WPA and WEP.

Definition
True
Term

T/F

Green computing involves reducing the electricity and environmental waste while using a computer.

Definition
True
Term

T/F

In an attempt to prevent software piracy, Microsoft and other manufacturers have incorporated a PIN process into many of its consumer products

Definition
False
Term

T/F

No surge protectors are 100 percent effective.

Definition
True
Term

T/F

Passwords, possessed objects, and biometrics do not prevent theft, but render the computer useless if it is stolen.

Definition
True
Term

T/F

Some Web sites use cookies to store users' passwords, so they do not need to enter it every time they log in to the Web site.

Definition
True
Term
____ was developed by Sun Microsystems.
Definition
Java
Term
____________________ is the process of planning, scheduling, and then controlling the activities during the development cycle.
Definition
Project Management
Term
A ____ committee is a decision-making body in a company.
Definition
Steering
Term
____ is a programming language designed for business applications.
Definition
COBOL
Term
T/F
The machine language version that results from compiling a 3GL is called source code.
Definition
False
Term
T/F
In a procedural language, the programmer uses a series of English-like words to write instructions.
Definition
True
Term
____________________ include anyone for whom the system is being built.
Definition
Users
Term
____________________ is mass-produced, copyrighted, or prewritten software available for purchase.
Definition
Packaged Software
Term
T/F
Instead of updating only changes to the Web page, Ajax refreshes entire Web pages.
Definition
False
Term
Detailed analysis involves ____.
Definition
    studying how the current system works 
    recommending a solution 
    determining the users’ needs
Term
A(n) ____________________ summarizes in writing all the safeguards that are in place to protect a company’s information assets.
Definition
Computer Security Plan
Term
The first step in acquiring necessary hardware and software is to ____.
Definition
Identify technical specifications
Term
One application of XML is the RSS 2.0 specification.
Definition
True
Term
The purpose of the ____ phase illustrated in Figure 11-1 is to construct, or build, the new or modified system and then deliver it to the users.
Definition
Implementation
Term
With object-oriented languages, an object represents a real ____.
Definition
      place 
    event 
    person 
    transaction
 
Term
T/F
The translation process for 3GL source programs is fairly simple.
Definition
False
Term

T/F

C++ includes all the elements of the C language plus it has additional features for working with objects.
Definition
True
Term
System development illustrated in Figure 11-1 should include ____.
Definition
All of the Above
Term
____ is a complete object-oriented language.
Definition
   Java 
   C# 
   C++
Term
A(n) ____________________ is a working model of the proposed system.
Definition
Prototype
Term
____ is a query language that allows users to manage, update, and retrieve data in a relational DBMS.
Definition
SQL
Term
____ separates the Web page content from its format, allowing the Web browser to display the contents of a Web page in a form appropriate for the display device
Definition
XML
Term
A(n) ____ chart is a bar chart that uses horizontal bars to show project phases or activities.
Definition
Gantt
Term
A(n) ____ is a meaningful name that identifies a storage location.
Definition
Symbolic Address
Term
A(n) ____ is an item that can contain both data and procedures that read or manipulate the data.
Definition
Object
Term
Each time someone identifies errors in or improvements to a program and requests program modifications, the ____ Requirements step begins again.
Definition
Analyze
Term
Many programmers refer to a repetition control structure construct as a(n) ____.
Definition
loop
Term
System ____ involves modifying or expanding an existing information system.
Definition
enhancement
Term
____ is an example of an object-oriented programming language.
Definition
Java
Term
____ tools are user-friendly programs designed to assist both programmers and users in creating programs.
Definition
Program Development
Term
All of the following activities occur during the analysis phase of the system development cycle, except ____.
Definition
Soliciting vender proposals
Term
Cost/benefit feasibility is also called ____ feasibility.
Definition
economic
Term
The action(s) in a(n) ____ control structure always will execute at least once.
Definition
do-until
Term
The following are Web page authoring programs, except for ____.
Definition
visual studio
Term
The program development cycle begins at the start of the ____ phase in the system development cycle.
Definition
implementation
Term
To convert the assembly language source program into machine language, programmers use a program called a(n) ____.
Definition
assembler
Term

T/F

A case control structure could be used to determine the price of a beverage based on which of four possible beverage sizes was purchased.

Definition
True
Term

T/F

An important concept in RAD is the use of prebuilt components.

Definition
True
Term

T/F

Documentation is best left until the end of the development cycle.

Definition
False
Term

T/F

During the implementation phase, the parallel conversion method consists of running the old system alongside the new system for a specified time.

Definition
True
Term

T/F

HTML is a programming language.

Definition
False
Term

T/F

Programmers must convert an assembly language program into machine language before the computer can execute the program.

Definition
True
Term

T/F

The program development cycle guides computer programmers through the development of a program.

Definition
True
Term

T/F

You usually create a macro in one of two ways: (1) code the macro or (2) download the macro.

Definition
False
Term
A(n) ____ chart is a bar chart that uses horizontal bars to show project phases or activities.
Definition
Grantt
Term
The following are Web page authoring programs, except for ____.
Definition
Visual Studio
Term

T/F

During the implementation phase, the parallel conversion method consists of running the old system alongside the new system for a specified time.

Definition
True
Term
To convert the assembly language source program into machine language, programmers use a program called a(n) ____.
Definition
Assembler
Term
System ____ involves modifying or expanding an existing information system.
Definition
Enhancement
Term
____ tools are user-friendly programs designed to assist both programmers and users in creating programs.
Definition
Program Development
Term

T/F

The program development cycle guides computer programmers through the development of a program.

Definition
True
Term
A(n) ____ is a meaningful name that identifies a storage location
Definition
Symbolic Address
Term

T/F

A case control structure could be used to determine the price of a beverage based on which of four possible beverage sizes was purchased

Definition
True
Term
Each time someone identifies errors in or improvements to a program and requests program modifications, the ____ Requirements step begins again.
Definition
Analyze
Term

T/F

Documentation is best left until the end of the development cycle.

Definition
False
Term

T/F

An important concept in RAD is the use of prebuilt components

Definition
True
Term
___ includes several types of applications and technologies for acquiring, storing, analyzing, and providing access to information to help users make more sound business decisions.
Definition
BI
Term
____ is the process of collecting data from the Internet as a source for the data warehouse
Definition
Web Farming
Term
A(n) ____ program routes customer telephone calls to the most appropriate support person depending on the identity of the customer or responses the customer gives to prompts.
Definition
CIM
Term
AI has a variety of capabilities, including ____
Definition
   logical reasoning
    speech recognition
    creative responses
Term
___, or on demand computing, allows companies to use the processing power sitting idle in a network located somewhere else in the world.
Definition
Utility computing
Term
CAM production equipment includes software-controlled ____ machines.
Definition
drilling
    welding
    lathe
Term

T/F

Accounting software helps managers budget, forecast, and analyze

Definition
False
Term
____ occurs when retailers use the Web to sell their products and services
Definition
e-retail
Term

T/F

Publishing entities, such as news services, use CRM systems to keep Web sites up-to-date.

Definition
False
Term
Typical ____ software includes word processing, spreadsheet, database, presentation graphics, e-mail, Web browser, etc.
Definition
OIS
Term
A(n) ____ creates three basic types of reports: detailed, summary, and exception
Definition
MIS
Term

T/F

 

At a large company, a system like the ones in Figure 12-3 may take four to six weeks to implement and cost thousands of dollars.
Definition
False
Term

____ allows large organizations to manage and store information and data using devices geared for heavy use, maximum availability, and maximum efficiency.
Definition
Enterprise Hardware
Term
Two popular platforms for building and running Web services like the kind shown in Figure 12-6 are the Sun Microsystems EE platform and the Microsoft ____ platform.
Definition
.NET
Term

T/F
A workflow is a program that assists in the management and tracking of all the activities in a business process from start to finish.
Definition
False
Term

The ____ management activity involves measuring performance and, if necessary, taking corrective action.
Definition
Controlling
Term

 

As shown in Figure 12-6, a special type of decision support system, called a(n) ____, supports the strategic information needs of executive management.
Definition
EIS
Term

____ software manages the day-to-day interactions with customers, such as telephone calls, e-mail interactions, Web interactions, and instant messaging sessions.
Definition
CIM
Term

T/F
Information systems that more easily share information with other information systems are said to be public.
Definition
False
Term
____ uses computers to test product designs.
Definition
CAE
Term
Definition
Managers
Term
____ components allow for a functioning component to automatically take over the tasks of a similar component that fails.
Definition
Redundant
Term
___ uses computers to integrate the many different operations of the manufacturing process.
Definition
CIM
Term
A full backup is sometimes called a(n) ____ backup
Definition
Archival
Term
Make sure that the Web site address begins with ____ rather than http:// whenever you are viewing or transmitting personal financial information on a Web site.
Definition
https:///
Term
The two components of expert systems are knowledge base and ____ rules
Definition
Interference
Term
To provide assurance that the disaster recovery plan is complete, it should be ____.
Definition
tested
Term
Web ____ is the process of collecting data from the Internet as a source for the data warehouse.
Definition
farming
Term
____ is an approach to information management that uses software to help monitor and control processes related to production
Definition
MRP
Term
Definition
full
Term
Definition
hot
Term
E-retail is also called ____.
Definition
e-tail
Term
Definition
operational management
Term
Definition
batch
Term
The secure connection created over the Internet between the user's computer and the company 's network is called a(n) ____ tunnel.
Definition
VPN
Term
Definition
mirroring
Term

T/F

Definition
True
Term

T/F

A shopping bot is a Web site that searches the Internet for the best price on a product or service in which you are interested

Definition
True
Term

T/F

A system that has an uptime of 99.99 percent is nonfunctional for about one day per year.

Definition
False
Term

T/F

Definition
False
Term

T/F

Most traditional enterprises are organized in a hierarchical manner.

Definition
True
Term

T/F

Definition
False
Term

T/F

To prepare for disaster recovery, a company should create an independent disaster preparedness unit.

Definition
False
Term

T/F

Web services do not include traditional user interfaces, such as a Web page.

Definition
True
Term
____ manages one or more human resources functions
Definition
HRIS
Term
A(n) ____ creates three basic types of reports: detailed, summary, and exception
Definition
MLS
Term
____ uses a computer and special software to aid in product design.
Definition
CAD
Term
Using ____, engineers can test the design of a car or bridge before it is built.
Definition
CAE
Term

T/F

Strategic decisions typically are given to operational management.

Definition
False
Term
___ is the process of collecting data from the Internet as a source for the data warehouse
Definition
Web Farming
Term
A Web farm is a collection of every action that users make as they move through a Web site.
Definition
False
Term
____ is a system in which all data is backed up whenever a change is made.
Definition
Continuous Data Protection
Term

Using blade servers allows an organization to fit 16 or more blades in the physical space occupied by a single server.
Definition
true
Term
CMS provides security controls for content, such as ____.
Definition
[image]    on which content a user is allowed to operate
[image]    who is allowed to modify content
[image]    who is allowed to add content
[image]    who is allowed to view content
Term

Blade servers require more maintenance and use more energy than other types of servers.
Definition
False
Term
Responsible for converting raw materials into physical products. [image] I. manufacturing [image]  
With MIS, the kind of report that usually lists just transactions. [image] G. detailed [image]   
With MIS, the kind of report that identifies data outside of a normal condition. [image] H. exception [image]   
Often includes searching capabilities or a link to a search engine. [image] J. portal [image]   
Software applications such as these kinds of programs store and access data in a data warehouse. [image] F. ERP [image]  
With MIS, the kind of report that lists high-level information without the details [image] D. summary [image]   
A Web site that searches the Internet for the best price on a product or service. [image] C. shopping bot [image]  
Allows components, such as a RAID or hard disk or power supplies, to be replaced while the rest of the system continues to perform its tasks. [image] E. hot-swapping [image]  
Kind of backup copies only the files that have changed since the last full backup. [image] A. differential [image]   
A separate facility that mirrors the systems and operations of the critical site. [image] B. hot site [image]  
Definition
Term

A(n) ____ is an information system that generates accurate, timely, and organized information, so managers and other users can make decisions, solve problems, supervise activities, and track progress.
Definition
MIS
Term
With an OIS, users ____ and publish Web pages.
Definition
[image]    create documents
[image]    schedule appointments
[image]    send messages
[image]    browse the Web
Term

The ____ manages core activities.
Definition
COO
Term
____ is the use of computers to control production equipment like that shown in Figure 12-4.
Definition
CAM
Term

A CIM system automates and manages much of the communications between employees and the business.
Definition
False
Term
A(n) ____ is an information system that enables employees to perform tasks using computers and other electronic devices, instead of manually.
Definition
OIS
Term
A typical enterprise consists of hundreds of individual operating entities called ____.
Definition
managers
Term

A disaster recovery test plan specifies the actions to be taken to restore full processing operations.
Definition
False
Term
The ____ management activity involves establishing goals and objectives.
Definition
planning
Term

In an expert system, the knowledge base consists of a set of logical judgments that are applied to the inference rules each time a user describes a situation to the expert system.
Definition
False
Term
As shown in Figure 12-3, ____ provides centralized, integrated software applications to help manage and coordinate the ongoing activities of an enterprise, including manufacturing and distribution, accounting, finance, sales, product planning, and human resources.
Definition
ERP
Term
The systems in Figure 12-3 help to better manage the global nature of many enterprises.
Definition
True
Term
In a typical enterprise, ____ is the functional unit that is responsible for developing ideas into a product that can be used by customers.
Definition
engineering
Term
As shown in Figure 12-1, some ____ programs allow the salesperson to upload information to the central office at the end of the day or the end of the week.
Definition
SFA
Term
____ uses computers to integrate the many different operations of the manufacturing process as shown in Figure 12-4.
Definition
CIM
Term
One disadvantage of online trading is that the transaction fees tend to be higher than with a traditional trading arrangement.
Definition
False
Term
Middle management usually is given the job of making strategic decisions.
Definition
False
Term
In the computer profession, how data is classified. [image] A. hierarchy [image]   
True or False values can be stored in this data type. [image] I. Yes/No [image]  
While a user is working with a database, this resides in the memory of the computer. [image] J. DBMS [image]  
Can be less complex than a database. [image] G. file processing system [image]
A data dictionary may include these for each field. [image] F. validation rules [image]   
Well-designed examples of this should validate data as it is entered. [image] H. form [image] 
Some DBMSs have their own one of these built in. [image] D. backup utility [image]   
A database typically is based on this. [image] E. data model
In a relational database, this exists in the common columns that relate tables. [image] C. data redundancy
No standard query language exists for this kind of database. [image] B. multidimensional [image]  
Definition
Term
A developer of a relational database refers to a file as a
Definition
relation
Term
A user of a relational database refers to a file as
Definition
table
Term
Many programs perform a ____, as on the data in Figure 9-3, that analyzes entered data to ensure that it is correct.
Definition
validity check
Term
information is available when the decision maker needs it.
Definition
accessable
Term
Companies that use databases do not require security settings for access control.
Definition
false
Term
is an item that contains data, as well as the actions that read or process the data.
Definition
object
Term
A developer of a relational database refers to a record as a(n) ____.
Definition
tuple
Term
Each record in a file like the one in Figure 9-2 contains the same fields, but each field contains different data
Definition
true
Term
A data ____ contains data about each file in the database and each field within those files.
Definition
dictionary
Term
Were it to be performed on the data in Figure 9-3, a(n) ____ check would verify that a required field contains data.
Definition
completeness
Term

A smaller version of a data warehouse is a data mart, which contains a database that helps a specific group or department make decisions.
Definition
True
Term
The data in a database usually is shared over a network by the entire organization.
Definition
True
Term
One reason users change a record in a file like the one in Figure 9-2 is to update old data with new data.
Definition
True
Term
A database stores most data in a single file.
Definition
True
Term
Most DBMSs allow different levels of access privileges to be identified for each field in the database.
Definition
True
Term
With a ____, users create a computerized database; add, change, and delete data; sort and retrieve data; and create forms and reports from the data.
Definition
DBMS
Term

____ is a computing phrase that points out the accuracy of a computer’s output depends on the accuracy of the input.
Definition
GIGO
Term
A user of a relational database refers to a record as a column.
Definition
False
Term
Each query language has its own ____.
Definition

grammer

vocabulary

Term
A database administrator _____.
Definition
all of the above
Term
Which of the following data types stores lengthy text entries?
Definition
Memo
Term
A(n) ____ check performed on the data in Figure 9-3 would test the data in two or more associated fields to ensure that the relationship is logical.
Definition
consistency
Term
A user of a relational database refers to a field as a(n) ____.
Definition
column
Term
Which of the following DBMSs will run only on a server or mainframe?
Definition
Adabas
Term
Which of the following data types stores photographs, audio, video, or a document created in another program?
Definition
object
Term
Information is ____.
Definition
[image]    organized
[image]    useful
[image]    meaningful
Term

File maintenance procedures include ____.
Definition
All of the above
Term
A check digit cannot be used to confirm the accuracy of a primary key value.
Definition
False
Term
Social engineers can obtain information by ____.
Definition
All of the above
Term
A(n) ____________________ is the prolonged malfunction of a computer.
Definition
system failure
Term
Companies should review successful access attempts for irregularities.
Definition
true
Term

Currently, more than ____ known viruses, worms, and Trojan horse programs exist.
Definition
180,000
Term
A(n) ____________________ is the destructive event or prank malware is intended to deliver.
Definition
payload
Term
Software ____ is the unauthorized and illegal duplication of copyrighted software.
Definition
piracy
Term
Intellectual property (IP) covers ____.
Definition
[image]    art
[image]    ideas
[image]    processes
Term
A person breaking into a computer laboratory and smashing computers is an example of _____.
Definition
hardware vandalism
Term
If you disable cookie use, you will not be able to use many of the e-commerce Web sites.
Definition
true
Term
As shown in Figure 10-1, a ____ is hardware and/or software that protects a network’s resources from intrusion by users on another network such as the Internet.
Definition
firewall
Term
Viruses and worms cannot deliver their payload when a user simply previews a message without opening it.
Definition
false
Term

A(n) ____________________ is someone who uses e-mail as a vehicle for extortion.
Definition
cybertextortionist
Term
A(n) _____ attempts to remove Internet junk mail like the kind shown in Figure 10-5 before it reaches a user’s inbox.
Definition
anti-spam program
Term

Hardware thieves often target notebook computers of company executives.
Definition
True
Term
Computer forensics analysis involves the examination of ____.
Definition
[image]    computer media
[image]    servers
[image]    data and log files
[image]    networks
Term
An encryption key often uses a combination of encryption methods.
Definition
true
Term
A(n) ____ is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action.
Definition
cracker
Term
Most systems require that users select their own passwords, such as the one shown in Figure 10-2.
Definition
true
Term
Which method of encryption inserts characters between existing characters?
Definition
expansion
Term
A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of _____.
Definition
information theft
Term
____________________ is the act of stealing computer equipment.
Definition
hardware theft
Term
A ____ is a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission.
Definition
virus
Term
The most recent network security standard, ____, conforms to the government’s security standards and uses more sophisticated encryption techniques.
Definition
802.11i
Term
In its simplest form, a(n) ____ is a programmed formula that is used to decrypt ciphertext.
Definition
encryption key
Term

Wireless access poses additional security risks.
Definition
true
Term
A(n) ____________________ uses special electrical components to provide a stable current flow to the computer and other electronic equipment.
Definition
surge protector
Term
Adware is a program that displays an online advertisement in a banner or pop-up window on ____.
Definition

e-mail

web pages

Term
Which of the following is an example of a possessed object?
Definition
badges and keys
Term
If a password like the one shown in Figure 10-2 is 4 characters long, the average time it would take a computer to discover the password is ____.
Definition
1 second
Term
As shown in Figure 10-2, many Web sites require a user to enter a(n) _________________________, which is a private combination of characters associated with a user name that allows access to certain computer resources.
Definition
password
Term
A(n) ____ attack is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail.
Definition
DoS
Term
Any illegal act involving a computer generally is referred to as a(n) ____________________.
Definition
computer crime
Term
Hackers use computer automated tools to assist them with guessing passwords like the one shown in Figure 10-2.
Definition
true
Term
A ____ is an authorized person or company that issues and verifies digital certificates.
Definition
CA
Term
A(n) ____________________ is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
Definition
computer security risk
Term
Issues with copyright law led to the development of ____, a strategy designed to prevent illegal distribution of movies, music, and other digital content.
Definition
DRM
Term
If a shorter password were in use in Figure 10-2, it would provide greater security than a longer one.
Definition
false
Term
___ is the process of converting readable data into unreadable characters to prevent unauthorized access.
Definition
Encryption
Term

____ is a scam, similar to phishing, where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing.
Definition
pharming
Term
As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
Definition
social engineering
Term
Most antivirus programs do not provide updated virus signature files for users.
Definition
False
Term
Viruses and worms cannot deliver their payload when a user simply previews a message without opening it.
Definition
False
Term
Shrink-wrapped software from major developers does not need to be scanned for infections.
Definition
false
Term
In applications that allow users to write ____, the security level should be set so the application warns users that a document they are attempting to open contains a macro.
Definition
macro
Term
____ can lead to system failure.
Definition
all of the above
Term
The term, unauthorized access, refers to the use of a computer or its data for unapproved or possibly illegal activities.
Definition
false
Term
A ____ is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
Definition
back door
Term
Copyright law gives the public fair use to copyrighted material.
Definition
true
Term
One of the FBI’s top three priorities. [image] A. cybercrime [image]  
Malware that does not replicate itself to other computers. [image] F. Trojan horse [image]  
Programmers writing malware usually test the programs to ensure they can deliver this. [image] B. payload [image] 
An assault whose purpose is to disrupt computer access for an Internet service such as the Web or e-mail. [image] C. denial of service attack [image]  
The phase of access control verifies that an individual is a valid user. [image] G. identification [image]  
The most common form of software theft. [image] H. software piracy [image] 
Some of these kinds of schemes direct users to a phony Web site or a pop-up window that looks like a Web site. [image] I. phishing [image] 
Many businesses use this to limit employee’s Web access. [image] J. content filtering
The largest job-related injury and illness problem in the United States today. [image] E. RSI [image]  
Involves reducing the electricity and environmental waste while using a computer. [image] D. green computing [image]  
Definition
Term
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
Definition
RSI
Term
A virus hoax often is in the form of a(n) ____.
Definition
chain letter
Term
If computer equipment is networked, a single power disturbance can damage multiple systems.
Definition
true
Term
____________________ automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies network administrators of suspicious behavior patterns or system breaches, including violations of firewalls like the ones in Figure 10-1.
Definition
intrusion detection software
Term
Employee monitoring involves the use of computers to observe, record, and review an employee’s ____.
Definition
[image]    e-mail messages
[image]    keyboard activity
[image]    Web sites visited
Term

____________________ refers to the right of individuals and companies to deny or restrict the collection and use of information about them.
Definition
information privacy
Term

A(n) ____________________ is someone who uses the Internet or network to destroy or damage computers for political reasons.
Definition
cyberterrorist
Term
A virus ____ is a known specific pattern of virus code.
Definition
definition
Term
____________________ occurs when someone steals personal or confidential information
Definition
information theft
Term
____ are good choices for home user backups.
Definition
[image]    CD-RWs
[image]    DVD+RWs
Term
____________________ occurs when someone steals software media, intentionally erases programs, or illegally copies a program.
Definition
software theft
Term
A ____ is a program that copies itself repeatedly, for example in memory or in a network, using up resources and possibly shutting down the computer or network.
Definition
worm
Term

A DoS attack is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
Definition
false
Term
A ____ control structure tells the program which action to take, based on a certain condition.
Definition
selection
Term

An RFP uses a standard form to request information about a product or service.
Definition
False
Term

____________________is a special formatting language that programmers use to format documents for display on the Web.
Definition
HTML
Term
System development cycles like the one illustrated in Figure 11-1 often organize activities by grouping them into larger categories called ____.
Definition
phases
Term
Which of the following is not a scripting language?
Definition
RPG
Term

In a ____ each location converts at a separate time.
Definition
Phased Conversion
Term
A major benefit of OOP is the ability to ____.
Definition
reuse and modify existing objects.
Term
A(n) ____ is a company that purchases products from manufacturers and then resells these products to the public — offering additional services with the product.
Definition
VAR
Term
The horizontal axis of a Gantt chart like the one in Figure 11-4 represents ____.
Definition
time
Term
____ are sets of rules and procedures a company expects employees to accept and follow.
Definition
standards
Term
Detailed design specifications should be reviewed only by the senior systems analyst and members of the project team.
Definition
false
Term
A(n) ____ program is the program that contains the language instructions, or code, to be converted.
Definition
source
Term
A(n) ____________________ is a program that creates source code or machine code from a specification of the required functionality.
Definition
application generator
Term
Which is not a major activity of detailed analysis?
Definition
prioritize project results
Term

Which of the following elements of an information system must be kept secure from threats both inside and outside the enterprise?
Definition
all of the above
Term
A ____ is a set of words, symbols, and codes that enables a programmer to communicate instructions to a computer.
Definition
programming language
Term
A programmer must convert machine language into assembly language before the computer can execute the program.
Definition
false
Term
The ____________________ shown in Figure 11-1 is a set of activities used to build an information system.
Definition
system development cycle
Term

The two types of programming languages are low-level and high-level.
Definition
true
Term

With parallel conversion, the user stops using the old system and begins using the new system on a certain date.
Definition
false
Term
With ____, the user stops using the old system and begins using the new system on a certain date.
Definition
direct conversion
Term
Machine language instructions use symbolic instruction codes.
Definition
false
Term
____________________ is the collection and summarization of data and information.
Definition
documentation
Term
Application generators most often are bundled with or are included as part of a DBMS.
Definition
true
Term
The main disadvantage of compiled programs is that they do not run as fast as interpreted programs.
Definition
false
Term
Which is not a phase of the system development cycle?
Definition
debugging
Term
Supports the daily, short-term, and long range activities of users. [image] A. information system [image]  
Moderates a JAD session. [image] I. systems analyst [image]  
Triggers the first phase of the system development cycle. [image] H. project request [image]  
Reviewing and approving project requests is a major activity of this phase. [image] B. planning [image]  
Another name for the preliminary investigation. [image] G. feasibility study [image]  
Type of market software that meets the needs of many different types of companies. [image] C. horizontal [image]   
When this phase is complete and still deemed feasible, the project enters the implementation phase. [image] D. design [image]  
During this phase, the systems analyst monitors performance of the new or modified information system. [image] F. support [image]  
An important responsibility of this role is to develop a computer security plan. [image] J. CSO [image]  
A powerful program development RAD tool best-suited for Web-based and large-scale enterprise object-oriented applications. [image] E. PowerBuilder [image]  
Definition
Term
A(n) ____________________ is a set of components that interact to achieve a common goal.
Definition
system
Term

____ is a method of creating interactive Web applications designed to provide immediate response to user requests.
Definition
Ajax
Term

Program development is an ongoing process within system development.
Definition
true
Term
As shown in Figure 11-5, ____ sessions are a series of lengthy, structured, group meetings in which users and IT professionals work together to design or develop an application.
Definition
JAD
Term
C programs run on almost any type of computer with any operating system.
Definition
true
Term
With a ____, only one location in the company uses the new system.
Definition
Pilot Conversion
Term
Benchmark tests measure the performance of hardware; they are not used for evaluating software.
Definition
false
Term

____ conversion consists of running the old system alongside the new system for a specified time.
Definition
parallel
Term
To convert an assembly language source program into machine language, programmers use a program called a(n) ____.
Definition
assembeler
Term
Typically, Web pages created with DHTML are more animated and responsive to user interaction.
Definition
true
Term
____ language, known as the first generation of programming languages, is the only language the computer directly recognizes.
Definition
machine
Term
For each system development project, a company usually forms a project team to work on the project from beginning to end.
Definition
true
Term
A(n) ____________________ is a language that uses a visual or graphical interface for creating all source code.
Definition
visual programming language
Term
The ____ programming language was originally designed for writing system software, as shown in Figure 11-2.
Definition
C
Term
The ____ phase of the cycle illustrated in Figure 11-1 for a project begins when the steering committee receives a project request.
Definition
planning
Term
Users must be involved throughout the system development cycle shown in Figure 11-1.
Definition
true
Term
Which is not a document type that analysts use to summarize the hardware and software requirements for potential vendors?
Definition
RFF
Term
____ feasibility measures how well the proposed system will work.
Definition
operational
Term
Application software developed by the user or at the user’s request is called ____ software.
Definition
custom
Term
____ is a measure of how suitable the development of a system will be to the company.
Definition
feasability
Term

A layout chart is more technical than a mockup and contains programming-like notations for data items.
Definition
true
Term

____________________ is a method of developing software, in which the programmer writes and implements a program in segments instead of waiting until the entire program is completed.
Definition
RAD
Term
Companies today often have a(n) ____________________ who is responsible for physical security of a company’s property and also is in charge of securing computer resources.
Definition
Chief Security Officer
Term
A developer of a relational database refers to a field as a(n) ____.
Definition
Attribute
Term
____ information has an age suited to its use.
Definition
Timely
Term
A Web database usually resides on a database server.
Definition
True
Term
A(n) ____ is a database that stores data in objects.
Definition
OODB
Term
Which of the following statements is not true of file processing systems?
Definition
the records in one file relate to the records in other files
Term
Databases require more processing power than file processing systems.
Definition
True
Term
A data model defines how the operating system actually arranges the data on the disk.
Definition
False
Term
All object-oriented databases support object query language (OQL).
Definition
False
Term
Most DBMS include a(n) ____ feature, like the one in Figure 9-5, which has a graphical user interface to assist users with retrieving data.
Definition
QBE
Term
Some operating systems, such as Windows Vista, include personal firewalls like the ones shown in Figure 10-1.
Definition
True
Term
All networked and online computer users should implement a ____ like the one shown in Figure 10-1.
Definition
firewall solution
Term
A(n) ____ device like the one in Figure 10-3 authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that then is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.
Definition
biometric
Term
Spam is a program placed on a computer without the user’s knowledge that secretly collects information about the user.
Definition
false
Term
Most system development cycles like the one illustrated in Figure 11-1 consist of five phases.
Definition
true
Term
The purpose of the ____ phase illustrated in Figure 11-1 is to provide ongoing assistance for an information system and its users after the system is implemented.
Definition
operation, support, and security
Term
Examples of ____ include Mindscript and Prograph.
Definition
visual programming
Term
Programs that analyze data, such as those in a DSS, sometimes are called online transaction processing programs.
Definition
False
Term
A(n) ____ helps users analyze data and make decisions.
Definition
DSS
Term
As depicted in Figure 12-7, the secure connection created over the Internet between the user’s computer and the company’s network is called a VPN ____.
Definition
tunnel
Term
Web services as shown in Figure 12-6 include traditional user interfaces, such as a Web page.
Definition
False
Term
A RAID server often is called a storage appliance because it is a piece of equipment with only one function — to provide additional storage.
Definition
False
Term
As shown in Figure 12-1, some ____ programs allow the salesperson to upload information to the central office at the end of the day or the end of the week.
Definition
SFA
Term
The simplest RAID storage design is called imaging.
Definition
false
Term
An expert system consists of two main components: ____.
Definition
a knowledge base and inference rules
Term
____ provides easy exchange of information among business applications, reduces the need for human intervention in processes, and utilizes software to automate processes wherever possible.
Definition
BPA
Term
____ allows users to pay bills from their computer.
Definition
Online Banking
Term
In e-retail, merchants sell products and services directly to a buyer.
Definition
False
Term
One type of marketing information system is a market research system, which stores and analyzes data gathered from ____.
Definition
    demographics 
    surveys
Term
____ includes a set of activities that enterprises perform to optimize their business processes.
Definition
Business process management
Term
____ is an approach to information management in a manufacturing environment like the one in Figure 12-4 that uses software to help monitor and control processes related to production.
Definition
MRP
Term
MRP focuses on issues related to inventory of parts and forecasting future demand so materials needed for manufacturing (an industry depicted in Figure 12-4) can be on hand when they are needed.
Definition
True
Term
Many companies elevate the importance of IT by including a(n) ____ executive position that reports to the CEO.
Definition
CIO
Term
For a backup plan to be successful, the company must back up all critical resources.
Definition
True
Term
A(n) ____ is an information system that captures and processes data from day-to-day business activities.
Definition
TPS
Term
More complex DBMSs maintain a(n) ____, which is a listing of activities that change the contents of the database.
Definition
log
Term
Accurate information is error free.
Definition
True
Term
Database software often is called a ____.
Definition
database management system
Term
____ is a query language, an example of which is shown in Figure 9-4, that allows users to manage, update, and retrieve data.
Definition
SQL
Term
To protect themselves from software piracy, software manufacturers issue a(n) ____________________ like the one shown in Figure 10-4, which gives users the right to use the software.
Definition
license agreement
Term
____________________ are the moral guidelines that govern the use of computers and information systems.
Definition
computer ethics
Term
Some network computer security systems can track the location of a stolen notebook computer.
Definition
true
Term
____ is a basic control structure.
Definition
    Sequence 
    Repetition 
    Selection
Term
A major benefit of OOP is the ability to ____.
Definition
reuse and modify existing objects
Term
A(n) ____________________ is a publication available on the Web.
Definition
   e-zine
 electronic magazine
Term
As shown in Figure 11-3, in large companies, users write a formal request for a new or modified information system, which is called a request for system services, or ____________________.
Definition
project request
Term
One of the first steps in the development of e-commerce was ____, which originally was created to eliminate paperwork and increase response time in business interactions.
Definition
EDI
Term
With batch processing, the computer processes each transaction as it is entered.
Definition
False
Term
Sharing data from multiple, separate files is complicated and usually requires the experience of a computer programmer.
Definition
True
Term
With a selective backup, users decide which folders and files to include in a backup.
Definition
True
Term
The ____ phase of the development cycle illustrated in Figure 11-1 consists of two major activities: (1) if necessary, acquire hardware and software and (2) develop all the details of the new or modified information system.
Definition
design
Term
An integration test verifies that all programs in an application work with other applications.
Definition
true
Term
Programmers use a(n) ____________________ to implement objects in a program.
Definition
object-oriented (OOP) programming language
Term
A symbolic address is a meaningful name that identifies a storage location.
Definition
true
Term
The ____ phase of the cycle illustrated in Figure 11-1 consists of two major activities: (1) conduct a preliminary investigation and (2) perform detailed analysis.
Definition
analysis
Term
Which is not a major activity of the planning phase, shown in Figure 11-1?
Definition
study how the current system works
Term
The purpose of the ____________________ is to assess the feasibility of each alternative solution and then recommend the most feasible solution for the project.
Definition
system proposal
Term
With parallel conversion, the user stops using the old system and begins using the new system on a certain date.
Definition
false
Term
A ____ is a defined process that identifies the specific set of steps involved in completing a particular project or business process.
Definition
 workflow
Term
Many companies elevate the importance of IT by including a(n) ____ executive position that reports to the CEO.
Definition
CIO
Term
A ____ is an individual business activity, such as a deposit, payment, order, or reservation.
Definition
transaction
Supporting users have an ad free experience!