1/80
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Personnel records
These are an example of internal sources of data for an information system
Artificial intelligence
Future progress in _____ includes further development in natural language processing that should make information systems easier to use
supplier
In accordance with Porter's Five Forces model, _____ power is high when customers have fewer options and low when customers have more options
objectives
In designing a management information system, the first task is to define the system's _____ clearly
software components
Management information system's (MIS) _____ include programs developed in-house
manpower, machinery, materials, and money
The four Ms of resources are _____
information
The output of an information system is _____.
database administrator
Within the context of the various categories of IT jobs, a _____ must have knowledge and understanding of data warehouse and data-mining tools
Automated payroll
_____ is an example of transaction-processing system.
Job management
The control programs managing computer hardware and software perform the ____ function to control and prioritize tasks performed by the CPU.
Information literacy
____ is understanding the role of information in generating and using business intelligence
it's less fragile than gallium arsenide
An advantage of silicon over gallium arsenide is that:
byte
A ____ is the size of a character
it cannot emit light.
One of the major disadvantages of silicon is that:
128
ASCII defines up to ____ characters
Communication
_____ is a function performed by control programs that controls the transfer of data among parts of a computer system, such as exchange of information between the CPU and I/O devices.
SANs
Typically, ____ are used only in large enterprises because of their cost and installation complexity
data codes
Computers and communication systems use _____ to represent and transfer information between computers and network systems.
operating system (OS)
a set of programs for controlling and managing computer hardware and software
256
Extended ASCII data code allows representation of ______ characters
optical discs
CD-ROMs and DVDs are examples of _____.
Time-shared
____ OSs allow several users to use computer resources simultaneously
it is nonvolatile
ROM is different from RAM in that:
storage
____ means saving data in computer memory and retrieval is accessing data from memory
second
Transistor was the major technology used during the ____ generation of hardware
operating system
An example of a(n) _____ is UNIX
RAM
The Clipboard's contents are stored on ____.
Resource allocation
_____ is a function performed by control programs that manages computer resources, such as storage and memory.
Third-generation
_____ computer languages are machine independent and are called high-level languages
high-level
Java and C++ are ____ languages.
kernel
The supervisor program of an OS is called the ____.
Secondary memory
is nonvolatile, holds data when the computer is off or during the course of a program's operation.
Fifth-generation
IBM System z10 is an example of a ____ computer
Fourth-generation language
Which of the following computer languages is the easiest to use?
Liquid crystal display (LCD)
_____ is the most common output device for soft copy
Optical character reader
Which of the following is an input device?
redundant array of independent disks(RAID)
is an assortment of hard drives connected and setup in ways to help protect or speed up the performance of a computer's disk storage.
Data management
_____ is a function performed by control programs that controls data integrity by generating checksums to verify that data has not been corrupted or changed.
warehouse
A data ____ is a collection of data from a variety of sources used to support decision-making applications and generate business intelligence.
fragmentation
The ____ approach to setting up a distributed DBMS addresses how tables are divided among multiple locations
logical
To begin designing a relational database, you must define the ____ structure by defining each table and the fields in it
physical
The ____ view involves how data is stored on and retrieved from storage media
select
A ____ operation searches data in a table and retrieves records based on certain criteria
OLTP (online transaction processing)
____ generally uses internal data and responds in real time
Foreign Key
In a relational model, when a primary key for one table appears in another table it is called a
AND
We use the ____ operator when all conditions are required to be met
project
A ____ operation pares down a table by eliminating columns according to certain criteria
normalization
____ improves database efficiency by eliminating redundant data and ensuring that only related data is stored in a table
administration
The data ____ component is used for tasks such as backup and recovery, security, and change management
Primary Key
uniquely identifies every record in a relational database.
raw data
____ is information in its original form.
dictionary
A data ____ stores definitions, such as data types for fields, default values, and validation rules for data in each field
hierarchy
The structure and organization of data in a database is called a data ____
extraction
In a data warehouse, ____ means collecting data from a variety of sources and converting it into a format that can be used in transformation processing.
allocation
The ____ approach to setting up a distributed DBMS combines fragmentation and replication
data mining tools
Business analytics uses ____ to support decision-making activities
encapsulation
Grouping objects along with their attributes and methods into a class is called ____
data mart
A _______________ is usually a smaller version of a data warehouse, used by a single department or function
replication
The ____ approach to a distributed DBMS has each site store a copy of the data in the organization's database.
summary data
____ gives users subtotals of various categories
CRUD stands for; c
create, read, update, delete
comes from a variety of sources
Data in a data warehouse can be differentiated from data in a database in that the former ____
network
In the ____ model, each record can have multiple parent and child records
set of integrity rules
The ____ in a database model defines the boundaries of a database, such as maximum and minimum values allowed for a field
OLAP
____ uses multiple sources of information and provides multidimensional analysis.
set of operation rules
The ____ in a database model describes methods, calculations, and so forth that can be performed on data, such as updating and querying data.
digital divide
Information technology and the Internet have, in essence, resulted in two societal groups: the information rich and the information poor. This is called the ____
cybersquatting
____ is registering, selling, or using a domain name to profit from someone else's trademark
spamming
___ has created decency concerns, because these e-mails often contain explicit language or nudity
61%
What percent of emails were considered unnecessary in 2012?
copyright
Generally, ____ laws protect tangible material, such as books and drawings
illegal but ethical
You make two copies of a software package you just bought for personal use, incase the original software fails and you need a backup. This action is
green computing
_____ involves the design, manufacture, use, and disposal of computers and servers in such a way that there is minimal impact on the environment
log files
____ generated by Web server software, record a user's actions on a Web site
accountability
In the context of the important concepts regarding Web and network privacy, ____ refers to issues involving both the user's and the organization's responsibilities and liabilities.
Fair Use Doctrine
The ____ means you can use copyrighted material for certain purposes, such as quoting passages of a book in literary reviews
nonrepudiation
In the context of the important concepts regarding Web and network privacy, _____ is a method for binding all the parties to a contract
legal but unethical
A banker uses the information a client enters in a loan application to sell other financial products to this client. This action is _____
a virtual organization
Dell, Microsoft, and Unisys Corporation created a partnership to design a voting system for several U.S. states. This is an example of ____
cookies
Amazon.com uses ____ to provide customized book recommendations based on past purchases
upgrading
Clerical workers using computers for word-processing tasks is an example of job _____