Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
117 Cards in this Set
- Front
- Back
The vast industry involving the gathering and selling of personal data is
|
Information reselling
|
|
One proposed law requiring employers to alert employees during monitoring with some sort of audible or visual signals was passed to prevent the abuse of which program?
|
Snoopware
|
|
Programs that are deposited on a user's hard drive when they visit a Web site are called
|
Cookies
|
|
A wide range of programs used to secretly record an individual's activities on the Internet is called
|
spyware
|
|
Which one of the following is the most likely program to be used by investigators having a few leads on potential suspects' internet activities?
|
keystroke logger
|
|
This type of computer criminal creates and shares programs designed to gain unauthorized access to computer systems.
|
crackers
|
|
Which of the following is not malware?
|
spy doctor
|
|
A program that fills a computer system with self-replicating information thus clogging the system is called a
|
worm
|
|
Free computer games and free screen saver programs are typical carriers of
|
trojan horses
|
|
Which among the following is the most effective way to ensure the shutting down of an ISP or a Web site?
|
denial of service attack
|
|
Theft can take many forms – of hardware, of software, of data, of computer time. White-collar computer crime frequently involves the theft of
|
data
|
|
According to which of the following laws is it illegal for an owner of a program to make backup copies for their personal use and resell or give them away?
|
digital millennium copyright act
|
|
Corporations often use this to prevent copyright violations.
|
digital rights management (DRM)
|
|
A device that protects against a sudden increase in electrical power is a(n)
|
surge protector
|
|
A common way to protect information being sent over a network, when long distance is involved, is
|
encrypting
|
|
A _____ acts as a security buffer between a company's private network and all external networks.
|
firewall
|
|
In a scenario where the city power shuts down, and backup supplies of electricity are insufficient, the most beneficial tool for a large firm involved in the completion of several important deadlines in such a situation would be a/an
|
disaster recovery plan
|
|
The most important procedure to protect software and data is to
|
make frequent backups of data and store them in remote locations.
|
|
_____ is concerned with protecting software and data from unauthorized tampering or damage.
|
data security
|
|
There are three primary privacy issues: accuracy, property, and
|
access
|
|
This law gives you the right to look at your personal records held by government agencies:
|
freedom of information act
|
|
It is highly likely that each one of us has an electronic profile created by information resellers. (t/f)
|
True
|
|
Spy removal programs are designed to detect and remove cookies, Web bugs, and monitoring software.
(t/f) |
true
|
|
Biometric scanning devices use fingerprint and iris scanners.
(t/f) |
true
|
|
Cutting and pasting material from a Web site directly into your own report or paper without giving proper credit to the original source is unethical.(t/f)
|
true
|
|
_____ system helps supervisors by generating databases that act as the foundation for the other information systems.
|
transaction processing
|
|
Which of the following refers to a system that summarizes the detailed data of the transaction processing systems in standard reports for middle-level managers?
|
management information system (MIS)
|
|
Management Information Systems are used by
|
middle management
|
|
Which among the following presents information in the most highly summarized form?
|
executive support system (ESS)
|
|
A transaction processing system is also sometimes referred to as a
|
data processing system
|
|
The _____ keeps records of the number of each kind of part or finished good in the warehouse.
|
inventory control system
|
|
Regional managers can compare their sales reports with that of the others by using
|
periodic reports
|
|
A sales report that shows that certain items are selling significantly above or below marketing department forecasts is an example of this type of report.
|
exception
|
|
This report is used to analyze data and its reports do not have a fixed format.
|
decision support system
|
|
This decision model controls the work of the organization, such as financial planning and sales promotion planning.
|
tactical model
|
|
These systems often can be organized to retrieve information from databases outside the company.
|
executive support system (ESS)
|
|
_____ are used in managing documents, communication and scheduling.
|
office automaton systems
|
|
Project resources can be scheduled, planned and controlled using
|
project manager programs
|
|
CAD/CAM would be most useful in what industry?
|
auto manufacturing
|
|
Top-level managers need information both from within the organization and from outside. (t/f)
|
true
|
|
The management information system records day-to-day transactions, such as customer orders, bills, inventory levels, and production output. (t/f)
|
false
|
|
There are three basic decision models used in a GDSS: operational, strategic, and financial.(t/f)
|
false
|
|
Knowledge workers use specialized information systems called KWS to create information in their area of expertise. (t/f)
|
true
|
|
Demand reports need not be produced periodically. (t/f)
|
true
|
|
The executive support system helps top-level managers oversee the company's operations and develop strategic plans. (t/f)
|
true
|
|
Which view of data deals with how the data is actually formatted and located?
|
physical view
|
|
A data field represents a(n)
|
attribute
|
|
Collectively, a person's name, address, and age would be called a
|
record
|
|
A _____ in different tables can be used to integrate the data in a database.
|
key field
|
|
A credit card bill that is processed at one shot - say the end of the month - is an example of
|
batch processing
|
|
Having several instances of the same data is called
|
data redundancy
|
|
If Mr. Smith's bike has been sent to his new address, but the bill to his old one, it can most likely be attributed to a
|
lack of data integrity
|
|
The data manipulation subsystem can use query-by-example as well as
|
SQL
|
|
The feature of describing the entry field in a data dictionary form as 'text' is characteristic of
|
data definition subsystem
|
|
This type of database is organized into many tables with common data items (key fields) linking the tables to one another.
|
relational
|
|
_____ databases store not only data but also instructions to manipulate the data.
|
object-oriented
|
|
A common operational database is a type of
|
shared database
|
|
If all the data in a database is not physically located in one place, it would be a(n)
|
distributed database
|
|
Information collected by an organization from a variety of external and internal databases is stored in special type of database called a
|
data warehouse
|
|
The logical view of data focuses on meanings and content of the data. (t/f)
|
true
|
|
A record is a collection of related tables. (t/f)
|
false
|
|
Database tables can be related or connected to other tables by common key fields. (t/f)
|
true
|
|
The ATM works on the principle of real-time processing. (t/f)
|
true
|
|
A nationwide airline reservation system is an example of this type of database model.
|
hierarchical model
|
|
A network database can utilize ____, special connections between nodes that allow multiple connections between records.
|
pointers
|
|
In the object-oriented database model, this term is the equivalent to a field in a relational model.
|
attributes
|
|
This commercial database offers news and information on legal, public records, and business issues.
|
LexisNexis
|
|
Data redundancy results due to lack of data integrity. (t/f)
|
false
|
|
The company database may be stored on a mainframe and managed by a database administrator.
(t/f) |
true
|
|
A collection of activities and elements organized to accomplish a goal. This is the definition of
|
system
|
|
In this phase of the systems life cycle, the new information system is installed and adapted to the new system, and people are trained to use it.
|
systems implementation
|
|
In this phase of the systems life cycle, new or alternative information systems are designed.
|
systems design
|
|
A recent survey by Money magazine determined that out of 100 widely-held jobs, the top job classification, based on salary, prestige, and security, was a
|
computer engineer
|
|
In the preliminary investigation phase of the systems life cycle, which one of the following tasks would not be included?
|
gathering the data
|
|
In order to obtain financing for the analysis phase, the systems analyst must
|
prepare a preliminary investigation report
|
|
The relationship between input and output documents is shown by
|
grid chart
|
|
Which of the following is used to show the rules that apply to a decision when one or more conditions apply?
|
decision table
|
|
These tools are also called computer-aided software engineering (CASE) tools. They are used in system analysis to evaluate alternative hardware and software solutions.
|
automated design tools
|
|
Which among the following would not be described in the systems analysis report?
|
training requirements for users
|
|
The final task in the design phase of the systems life cycle is to
|
write a systems design report
|
|
The first step in the systems design phase is to
|
design alternative systems
|
|
The costs versus the benefits of designs and the outlines of their effects is presented in the
|
systems design report
|
|
During which phase of the systems life cycle are users trained to use the new system?
|
systems implementation
|
|
The first step in implementing a new system is to determine the
|
conversion type
|
|
Problems arising in this approach would spell disaster.
|
direct approach
|
|
This implementation approach is preferred when there are many people in an organization performing similar operations.
|
pilot
|
|
The final step of the implementation phase of the systems life cycle is to
|
train the users
|
|
Identify the sixth phase of the systems life cycle.
|
systems maintenance
|
|
Determining whether the new procedures are actually furthering productivity is part of the
|
systems audit phase
|
|
Although the development time is shorter, it is sometimes more difficult to manage the project and to control costs with
|
prototyping
|
|
In the testing phase of the systems life cycle, processed information is evaluated to see whether the results are correct. (t/f)
|
true
|
|
The organization can switch to the old system if the new system fails in the parallel approach. (t/f)
|
true
|
|
Periodic evaluation is part of the systems maintenance phase of the systems life cycle. (t/f)
|
true
|
|
Programming is part of the phase ____ of the systems life cycle.
|
systems development
|
|
Program definition or program analysis is another name for
|
program specification
|
|
Program objectives, desired outputs, needed inputs, and processing requirements are all recorded in the
|
program specifications document
|
|
The program's processing steps are grouped into logically-related programming statements called
|
modules
|
|
This is like making a summary of the program before it is written.
|
pseudocode
|
|
Identify the programming tool that uses linked symbols to show the sequence of steps needed to solve a programming problem.
|
flowchart
|
|
The logic structure used to perform a series of statements one after the other is called
|
concatenation
|
|
The outcome of the decision determines which of the two paths to follow in this logic structure.
|
IF-THEN-ELSE
|
|
The _____ structure involves repeating a sequence until a certain condition remains true.
|
loop
|
|
Which of the following is not necessary for a good program?
|
It should contain colorful graphics and an interesting user interface.
|
|
Eliminating errors in a program is also called _____ the program.
|
debugging
|
|
A(n) _____ error could be the result of the programmer making an incorrect calculation.
|
logic
|
|
This is usually the final step in testing a program.
|
beta testing
|
|
In programming, _____ consists of written descriptions and procedures about a program and how to use it.
|
documentation
|
|
Which of the following refers to tools that are used to design, code, and test software?
|
CASE
|
|
Object-oriented programming
|
is a process in which a program is organized into objects.
|
|
Which among the following varies according to the make of the computer?
|
machine languages
|
|
These languages use abbreviations and mnemonics that make it easier for humans to understand.
|
assembly
|
|
Languages designed to express the logic that can solve general problems are called _____.
|
procedural languages
|
|
A compiler performs the following function:
|
converts source code into machine language code
|
|
An interpreter performs the following function:
|
converts the procedural language one statement at a time
|
|
Computer programmers create and test new software programs. They do not update and repair existing programs. (t/f)
|
false
|
|
Program maintenance involves ensuring that current programs are operating error-free, efficiently, and effectively. (t/f)
|
false
|
|
One of the items to be defined in the program specification is the program's objectives. (t/f)
|
true
|