PDF Download
FREE AND STUDY GAMES ABOUT TECHNOLOGY FINAL
EXAM QUESTIONS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -120 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation Question 1: These databases store not only data but also instructions to manipulate the data.
Answer:
Object-oriented Question 2: ________ is a high-frequency transmission medium that has a single solid-copper core.
Answer:
Coaxial cable Question 3: Programs used to secretly record an individual's activities on the Internet are called
________.
Answer:
spyware Question 4: This type of network strategy uses central servers to coordinate and supply services to other nodes on the network
Answer:
Client/server
Question 5: Common names for computer-based information systems are transaction
processing, management information, ________, and executive support systems.
Answer:
decision support Question 6: System ________ show the flow of input data to processing and finally to output.
Answer:
flowcharts
Question 7: ________-level information flow is primarily vertical.
Answer:
Supervisory Question 8: Analysis tools that support viewing all or selected parts of data, querying the database, and generating reports include query-by-example as well as a specialized programming language called ________.
Answer:
SQL Question 9: Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.
Answer:
Privacy mode Question 10: In this type of database, the data and the DBMS are stored either on the user's hard-disk drive or on a LAN file server.
Answer:
Individual Question 11: As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the ________.
Answer:
firewall
Question 12: A(n) ________ database, sometimes called a data cube, allows data to be viewed as a cube having three or more sides and consists of cells.
Answer:
multidimensional Question 13: The use of the Internet to send or post content intended to hurt or embarrass another person.
Answer:
Cyberbullying Question 14: A(n) ________ is a private network that connects more than one organization.
Answer:
extranet
Question 15: Identify the sixth phase of the systems life cycle.
Answer:
Systems maintenance Question 16: In a communication system, which among the following convert messages into packets that can travel across the communication channel?
Answer:
Connection devices Question 17: During which phase of the systems life cycle are users trained to use the new system?
Answer:
Systems implementation Question 18: This lists the assets, liabilities, and the equity of an organization
Answer:
Balance sheet Question 19: When an order comes in, the ________ activity alerts the warehouse to ship a product.
Answer:
sales order processing
Question 20: Using this type of communications channel, several users can simultaneously use a single connection for high-speed data transfer.
Answer:
Broadband Question 21: This subsystem defines the logical structure of the database by using a data dictionary or schema.
Answer:
Data definition Question 22: This is the final step of the systems implementation phase of the systems life cycle.
Answer:
Train users Question 23: Which system is a type of artificial intelligence that uses a database, containing facts and rules, to provide assistance to users?
Answer:
Expert system Question 24: The ________ of a secondary storage device indicates how much data the storage medium can hold.
Answer:
capacity Question 25: _______ improves hard-disk performance by anticipating data needs and reducing time to access data from secondary storage.
Answer:
Disk caching Question 26: In this database model, the fields or records are structured in nodes
Answer:
Hierarchical