CIS 2 – 2415 words – Flashcard
a). assistive
b). Braille text
c). accessible text
d). alternative text
a). Java applet
b). servlet
c). function
d). subroutine
Andrea does not yet have any CDs of her music, but she can still create audio files to put on her Web site using a microphone or ____ instrument.
a). WML
b). MIDI
c). WAV
d). XML
a). Adobe Flash
b). Adobe Dreamweaver
c). Adobe Fireworks
d). Adobe Contribute
a). Browser mapping
b). Browser sniffing
c). Visitor identification
d). Personalization
a). tags
b). divisions
c). identifiers
d). boxes
In the “About Us” section of the Web site, the doctor wants to include a photo of her office. The best format to save the photo in is ____.
a). JPEG
b). BMP
c). GIF
d). TIF
a). XML
b). XHTML
c). JavaScript
d). Perl
a). Drop-down menus
b). Search boxes
c). Frames
d). Site maps
a). Web site publication
b). Web site upload
c). Web site deployment
d). Web site development
a). TIF
b). BMP
c). MPEG
d). GIF
a). MP3
b). PDF
c). XML
d). CGI
a). .wmv
b). .mp3
c). .mov
d). .avi
a). .wmv
b). .mp3
c). .mov
d). .avi
a). TIF
b). BMP
c). PNG
d). PPT
Once Andrea has recorded her music in an audio file, she would need to use a ____ method to reduce the size of the file before making it available through her Web site.
a). filtering
b). streaming
c). buffering
d). compression
a). GIF
b). BMP
c). JPEG
d). TIFF
a). MDF
b). PDF
c). XHTML
d). XML
a). dial-up
b). broadband
c). microwave
d). ISDN
a). ActiveX
b). Perl
c). JavaScript
d). AJAX
a). Text
b). Content
c). Passwords
d). Code
a). storyboards
b). flowcharts
c). page layouts
d). plots
a). thumbnail image
b). button image
c). icon image
d). sample image
a). Wireless Markup Language (WML)
b). XHTML (Extensible Hypertext Markup Language)
c). XML (Extensible Markup Language)
d). Dynamic HTML (DHTML)
a). auditory learners
b). visual learners
c). manual learners
d). kinesthetic learners
a). programming language
b). scripting language
c). 4G language
d). markup language
Smith Web Design has decided to place all navigation buttons in a column on the left hand side of the page. They should create these in the ____ format.
a). JPEG
b). BMP
c). GIF
d). TIF
a). TIF
b). GIF
c). MP3
d). BMP
a). TIF
b). BMP
c). MPEG
d). GIF
a). Adobe Contribute
b). Adobe Flash
c). Adobe Dreamweaver
d). Adobe Fireworks
a). ASCII art
b). Clip art
c). Graphics art
d). Drawing art
After patients log on, they should be able to download scanned versions of their X-rays and MRIs. These images should be provided in the ____ format.
a). JPEG
b). BMP
c). GIF
d). TIF
a). AVI
b). MP3
c). PNG
d). MPEG
a). Browser mapping
b). Browser sniffing
c). Visitor identification
d). Personalization
a). Web site upload
b). Web site program
c). Web site deployment
d). Web site design
a). neutral
b). generic
c). all color
d). transparent
a). servlet
b). script
c). applet
d). plug-in
a). shopping carts
b). stock information
c). virtual reality
d). status notification
a). stored
b). archived
c). buffered
d). screened
a). Serif typefaces
b). Arial typefaces
c). Sans serif typefaces
d). Dom Casual typefaces
a). Page
b). Search
c). Site
d). Meta
a). business-to-government (B2G) model
b). person-to-person (P2P) model
c). business-to-business (B2B) model
d). intermediary hub model
a). Shopping cart abandonment
b). Customer abandonment
c). Customer turn-around
d). Window shopping
a). Privacy
b). Protection
c). Warranty
d). Security
a). shopping bots
b). shopping bags
c). shopping carts
d). e-shopping
a). Internet-transaction
b). E-commerce
c). Net-commerce
d). Net-business
a). VOD
b). SSO
c). OTP
d). URLP
Sharon has a different password for each Web site that she uses. However, she is afraid of forgetting some of these passwords and being unable to access her records. The best solution is for her to use ____.
a). shopping cart software
b). storefront software
c). banner ads
d). a digital wallet
a). Anticybersquatting
b). Online
c). Cyberbusiness
d). Trademark
a). B2B
b). B2C
c). B2G
d). C2C
a). privacy
b). trust
c). security
d). warranty
a). business model
b). customer
c). privacy
d). database
a). shopping carts
b). online stores
c). shopping bags
d). storebots
a). video-on-demand
b). video-on-disk
c). video-on-delay
d). video-on-download
a). SimpleTech
b). PayPal
c). Wal-Mart
d). eBay
John recently received a contract to print T-shirts for the US Department of Justice. This is an example of a ____ transaction.
a). B2C
b) B2B
c). B2G
d). C2C
John wants to reduce some of his day-to-day burden of inventory management and shipping. He should look into a(n) ____.
a). order-fulfillment company
b). electronic storefront
c). brick-and-mortar store
d). smart card
a). PayPal
b). PriceGrabber.com
c). SimpleTech
d). eBay
a). Web site planning
b). Web site design
c). Web site deployment
d). Web site development
a). C2C
b). B2G
c). B2B
d). B2E
a). inability to return items
b). difficulty of using credit cards
c). risk of fraud
d). inability to see merchandise
a). Site-specific smart cards
b). Site-specific electronic check accounts
c). Site-specific online payment accounts
d). Site-specific digital wallets
a). Meta tags
b). Beta tags
c). Zeta tags
d). Theta tags
a). M-Brokers
b). E-tailers
c). Shop carts
d). Brokerage sites
a). C2C
b). eCRM
c). eCMS
d). CBT
a). PayPal
b). TRUSTe
c). SimpleTech
d). Peer Impactstrategies used to perform and support e-commerce is referred to as a(n) ____.
a). Net-commerce system
b). Internet B-platform
c). e-commerce system
d). EB-platform
Recently, Sharon won a contract to photograph exhibits at the National Zoo. However, the magazine that commissioned these photos is located in a different state. Sharon can use a ____ to authenticate the validity of any contracts she signs electronically.
a). digital certificate
b). banner ad
c). digital wallet
d). permission-based ad
a). vertical
b). horizontal
c). centered
d). subscription
a). M-Brokers
b). E-tailers
c). Shop carts
d). Brokerage sites
a). Temporary
b). Virtual
c). Prepaid
d).Online
a). PriceGrabber.com
b). eBay
c). Priceline.com
d).PayPal
a). Internet merchant account
b). Net merchant account
c). Internet business account
d). Web card account
Some of John’s customers want to buy Christmas presents for their friends, but are unsure of what to select. John should encourage these customers to purchase ____ that the recipients can redeem at a later date.
a). digital wallets
b). digital gift certificates
c). smart cards
d). electronic storefronts
a). B2B
b). B2C
c). VND
d). OTP
a). behavioral targets
b). behavioral ads
c). preference ads
d). ad mining
a). B2B
b). C2C
c). B2C
d). B2G
a). Virtual Credit
b). Security Key
c). eBillme
d). eWallet
a). software engineer
b). system administrator
c). vice president of information systems
d). programmer/analyst
a). Computer-aided manufacturing (CAM)
b). Computer-aided design (CAD)
c). Enterprise architecture
d). Product lifecycle management (PLM)
a). order entry systems
b). accounting systems
c). office systems
d). document processing systems
a). Business intelligence
b). System architecture
c). Business flowchart
d). Enterprise architecture
a). System analysis
b). System acquisition
c). System implementation
d). System design
a). Intelligent
b). Knowledge
c). Central
d). Semantic
For the protein folding division, Mother Goose is planning to implement the new system module by module. This is called a ____ conversion.
a). phased
b). direct
c). parallel
d). pilot
a). benchmark test
b). request for proposal (RFP)
c). request for quotation (RFQ)
d). data dictionary
a). warranted
b). warehouse
c). wireless
d). world
a). development
b). strategic
c). middle
d). decision
a). ERP2
b). EDI
c). CRM
d). EAI
a). point-of-sale (POS) systems
b). collaborative (workgroup) computing
c). fingerprint payment systems
d). geographic information system (GIS)
a). artificial intelligence (AI)
b). computer-aided design (CAD)
c). computer-aided manufacturing (CAM)
d). neural networks
a). Accounting systems
b). Payroll systems
c). Order entry systems
d). Transaction processing systems
a). ERP
b). EDI
c). GIS
d). DSS
a). database administrator
b). application programmer
c). database analyst
d). data processing director
a). system analysis
b). system development life cycle
c). system implementation
d). system acquisition
a). Preliminary investigation
b). System design
c). System analysis
d). System acquisition
Mary wants to avoid common mistakes that individuals make when they are starting out in the IT industry. Her advisor should tell her to beware of ____.
a). honing problem solving skills
b). mastering underlying principles of technology
c). adapting to new challenges
d). focusing too much on certifications
a). phased conversion
b). direct conversion
c). parallel conversion
d). pilot conversion
a). procedures
b). functions
c). entities
d). objects
a). Decision tables
b). Feasibility reports
c). Data dictionaries
d). Entity-relationship diagrams
a). Business intelligence
b). System architecture
c). Business flowchart
d). Enterprise architecture
Mary is interested in identifying the business needs of a system and ensuring the systems meet those needs. Her advisor will probably tell her to look into becoming a ____.
a). database analyst
b). business analyst
c). communications analyst
d). computer operator
a). Customer service
b). Customer profiling
c). Personalization
d). Data mining
a). operating system
b). information system
c). device
d). utility program
a). transaction processing system
b). office system
c). general ledger system
d). management information system (MIS)
a). Operational
b). Executive
c). Middle
d). External
a). captive offshoring
b). indirect outsourcing
c). capital offshoring
d). pointed outsourcing
a). transaction processing
b). document processing
c). document management
d). office automation
a). chief executive officer (CEO)
b). chief security officer (CSO)
c). chief information officer (CIO)
d). chief data officer (CDO)
For the protein folding division, Mother Goose is planning to implement the new system module by module. This is called a ____ conversion.
a). phased
b). direct
c). parallel
d). pilot
a). neural networks
b). expert systems
c). robots
d). biometric systems
a). Expert systems
b). Intelligent agents
c). Chatterbots
d). Neural networks
a). data design
b). data processing
c). data collection
d). data analysis
a). system flowchart
b). input/output design
c). data dictionary
d). preliminary design
For the genomics division, Mother Goose is planning to replace the old system by the new one all at once. This is called a ____ conversion.
a). phased
b). direct
c). parallel
d). pilot
One of the languages that Kelley is learning is ____ an object-oriented programming language that is commonly used to write Web applications.
a). C
b). Java
c) Visual Basic
d). COBOL
a). cells
b). variables
c). objects
d). buses
a). desk
b). line
c). alpha
d). bet
a). COBOL
b). Pascal
c). BASIC
d). FORTRAN
a). compiler
b). macro
c). generator
d). decoder
a). selection control structure
b). sequence control structure
c). control structure
d). repetition control structure
a). C++
b). Visual Basic
c). BASIC
d). C
During the summer, Kelly will be writing a compiler as part of a research project. To prepare, she is learning ____, a functional language.
a). C
b). Java
c). Visual Basic
d). Scheme
a). do until
b). do while
c). if-then-else
d). case
a). repetition loop
b). coded loop
c). if-then-else loop
d). infinite loop
a). procedural programming languages
b). very-high-level languages
c). high-level languages
d). interpreted languages
a). Visual Basic
b). ActiveX
c). .NET framework
d). SQL
a). logic error
b). assembly error
c). syntax error
d). coding error
a). syntax error
b). rules error
c). compile-time error
d). logic error
a). Rapid application development (RAD)
b). Program development life cycle (PDLC)
c). Application Lifecycle Management (ALM)
d). Application software development life cycle (ASDLC)
a). Mark II
b). ENIAC
c). UNIVAC
d). Apple II
a). Comments
b). Variables
c). Bugs
d). Loops
a). Object-Oriented Programming (OOP)
b). Structured programming
c). Object Programming (OP)
d). Aspect-oriented programming (AOP)
a). application generator
b). report generator
c). form generator
d). data generator
a). SDLC
b). OOP
c). PDLC
d). AOP
a). compiler
b). interpreter
c). assembler
d). generator
a). aspect-oriented programming
b). object-oriented programming
c). function programming
d). virtual programming
To allow everyone, not just the original programmer, to understand the source code of a program, the Rainbow Trout Company follows a set of ____—a list of rules designed to standardize programming styles.
a). UMLs
b). flowcharts
c). RADs
d). coding standards
a). compiler
b). macro
c). generator
d). decoder
a). benchmark tests
b). bug tests
c). alpha tests
d). beta tests
The Rainbow Trout Company uses the ____ approach, which emphasizes teams of people working closely together, which provides for continuous learning and adaptation as the project is developed.
a). expert programming
b). rapid application development
c). agile software development
d). team development
a). COBOL
b). Pascal
c). BASIC
d). FORTRAN
a). FORTRAN
b). COBOL
c). BASIC
d). Java
a). desk
b). line
c). alpha
d). beta
One of the languages that Kelley is learning is ____ an object-oriented programming language that is commonly used to write Web applications.
a). C
b). Java
c). Visual Basic
d). COBOL
a). Program coding
b). Program design
c). Problem analysis
d). Program debugging
a). C++
b). Visual Basic
c). BASIC
d). C
During the summer, Kelly will be writing a compiler as part of a research project. To prepare, she is learning ____, a functional language.
a). C
b). Java
c). Visual Basic
d). Scheme
a). cells
b). variables
c). objects
d). buses
a). documents
b). object code
c). databases
d). source code
a). Object-Oriented Programming (OOP)
b). Structured programming
c). Object Programming (OP)
d). Aspect-oriented programming (AOP)
a). low-level languages
b). third-generation programming languages (3GLs)
c). procedural programming languages
d). interpreted languages
The Rainbow Trout Company maintains a database of clients. To search through this database, they use ____, a 4GL.
a). SQL
b). COBOL
c). C
d). Java
a). Syntax
b). Compiler
c). Logic
d). Debugging
a). Form generators
b). Report generators
c). Application generators
d). Data generators
a). Java zines
b). Java applets
c). Java bytecodes
d). Java VMs
a). FORTRAN
b). Java
c). COBOL
d). Pascal
a). Boolean
b). Character
c). String
d). Real
a). real-time organization
b). indexed organization
c). sequenced organization
d). direct organization
a). records
b). rows
c). fields
d). characters
a). column
b). row
c). table
d). record
a). Data privacy
b). Data integrity
c). Data accessibility
d). Data legibility
a). Rows
b). Fields
c). Columns
d). Tables
James is most interested in becoming a database designer. Another name for this career choice is database ____.
a). architect
b). developer
c). programmer
d). administrator
Database designers work with systems analysts and other individuals involved in ____.
a). CCP
b). DBMS
c). SDLC
d). CDMP
a). back end
b). rear end
c). portal
d). front end
a). low files
b). base files
c). flat files
d). clear files
a). query wizards
b). programming languages
c). report generators
d). form screens
a). power of two
b. prime number
c). irrational number
d). transcendental number
a). composite key
b). secondary key
c). primary key
d). primary field
The JL Group has gathered data on voting habits. In order to make sure that respondents cannot claim to have voted in more elections than is possible given their age, ____ rules can be assigned to the database tables.
a). index validation
b). record validation
c). DBA validation
d). dynamic
a). pages
b). scripting
c). conversion
d). classes
a). middleware
b). capsules
c). macros
d). applets
The employees of JL Group who use the database of the company for their daily work, without having knowledge of how the underlying database is structured, interact with the database ____.
a). using the database script
b). through the database designer
c). through the database programmer
d). using the user interface
a). Database developers
b). Database administrators (DBAs)
c). Database security officers
d). Database analysts
a). attributes
b). variables
c). traits
d). fields
a). tablet
b). keyword
c). index
d). main table
a). command
b). line
c). wizard
d). key
a). hierarchical database management system
b). relational database management system (RDBMS)
c). network database management system
d). database management system (DBMS)
a). scripts
b). JavaScripts
c). applets
d). utilities
a). format structure
b). input mask
c). data mask
d). data filter
The JL Group is in the process of creating dynamic Web pages to poll politically aware young adults. They are interested in creating scripts that are compatible with many types of databases, so they are using the ____ language.
a). CGI
b). API
c). COBOL
d). PHP
a). cell
b). field
c). table
d). record
a). distributed database system
b). star database system
c). centralized database system
d). ring database system
a). IBM DB2
b). Microsoft Access
c). Adobe Acrobat
d). Adobe Fireworks
a). form
b). query
c). macro
d). view
a). table
b). field
c). column
d). record
a). migration
b). conversion
c). normalization
d). accommodation
a). records
b). rows
c). fields
d). characters
a). report
b). query
c). form
d). table
a). normalization
b). cyclic redundancy check
c). zeroing
d). zonification
a). VBScript
b). CGI
c). PHP
d). BasicScript
relationships between the tables in the database, and so on.
a). database book
b). data dictionary
c). data box
d). data book
a). field
b). report
c). row
d). table
a). Relational
b). Object-oriented
c). Analytical
d). Multidimensional
a). Presence technology
b). Computer monitoring
c). Digital surveillance
d). Detection technology
a). mirror
b). hotspot
c). hot file
d). backup
a). personal databasing
b). identity theft
c). information piracy
d). electronic profiling
a). Computer monitoring
b). Computer surveillance
c). Multimedia surveillance
d). Video surveillance
Before providing any personal information on a shopping site, Samuel always reads the Web site’s ____.
a). protection history
b). consumer policy
c). privacy record
d). privacy policy
a). proximity cards
b). presence technology
c). face recognition
d). video cards
a). Computer monitoring
b). Computer surveillance
c). Multimedia surveillance
d). Video surveillance
a). security threads
b). watermarking
c). electronic profiling
d). microprinting
a). UPS
b). surge suppressor
c). voltage controller
d). voltage meter
In order to lessen the chances of his main e-mail address getting spam, he uses a ____ e-mail address when shopping online.
a). kill switch
b). throw-away
c). permanent
d). keylogging
a). spikes
b). interrupted power
c). system failure
d). all of the above
a). Antivirus software
b). Antispyware software
c). Antispoof software
d). Antiphish software
a). Computer monitoring
b). Video surveillance
c). Employee monitoring
d). Identity theft
a). privacy
b). patent
c). hardware theft
d). software quality
a). Surge suppressors
b). Password locks
c). Spike suppressors
d). Cable locks
Another client owns a large number of expensive electronic devices and would like to be able to recover them in case of theft. IBF advises her to attach ____ to these devices.
a). kill switches
b). surge suppressors
c). asset tags
d). keyloggers
a). piracy policy
b). security policy
c). identity policy
d). privacy policy
a). encrypted
b). locked
c). registered
d). indexed
a). 1950s
b). 1960s
c). 1970s
d). 1980s
One of their clients has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which of the following technologies would be useful in this case?
a). kill switch hard drives
b). surge suppressors
c). DataDots
d). keylogging software
a). software piracy
b). interrupted power
c). spikes
d). system failure
a). Government databases
b). Marketing databases
c). Educational databases
d). Research databases
To further protect his privacy, Samuel has decided to ____ from certain companies by instructing those companies to not to share his personal information with third parties.
a). opt out
b). disengage
c). build filters
d). block contact
a). 7 to 10 years
b). 10 years
c). 10 to 12 years
d). 12 years
a). junkie e-mail address
b). throw-away e-mail address
c). one-use e-mail address
d). second-hand e-mail address
a). Surveillance software
b). Video software
c). Computer monitoring software
d). Audio software
a). signing piracy agreements
b). opting out
c). contracting legal help
d). e-mailing them
a). security slot
b). cable anchor
c). security opening
d). user lock
a). Secured
b). Ruggedized
c). Malleable
d). Flexible
a). spoof
b). phish
c). spim
d). junk
a). buddy site
b). alternate pad
c). hot site
d). white room
a). Malleable
b). Rugged
c). Semirugged
d). Ultrarugged
a). e-mail filter
b). spam e-mail address
c). encryption scheme
d). hot site
a). pads
b). sleeves
c). pillows
d). cushions
a). recycle
b). recovery
c). repair
d). running
a). reprogrammed
b). refurbished
c). recharged
d). recycled
a). CTS
b). CVS
c). addiction to the Internet or another technology
d). sore or stiff neck
a). code of security
b). code of conduct
c). privacy policy
d). piracy policy
a). computer worms
b). Trojan horses
c). e-mail hoaxes
d). digital manipulation
a). burnout
b). CTS
c). CVS
d). RSI
a). notebook holder
b). laptop station
c).notebook stand
d). docking station
a). trademark
b). watermark
c). patent
d). copyright
a). One-handed keyboard
b). Head-pointing system with puff switch
c). Voice input system
d). Screen reader software
a). American Data Act
b). Assistive Data Act
c). American Democracy Act
d). Americans with Disabilities Act
Jill plans on publishing a book based on her experiences in order to help young entrepreneurs. To help protect her publishing rights, she should register a ____.
a). patent
b). trademark
c). copyright
d). digital watermark
a). Green Grid Alliance
b). Energy Star Alliance
c). Paperless Library
d). Extended producer responsibility
a). cybersquatting
b). digital counterfeiting
c). identity theft
d). digital manipulation
a). Middle East
b). Europe
c). Africa
d). North America
In order to prevent others from stealing her logo, Jill should get a ____.
a). patent
b). trademark
c). copyright
d). digital watermark
a). digital counterfeiting
b). identity theft
c). plagiarism
d). digital manipulation
a). one-fifth
b). one-fourth
c). one-third
d). one-half
a). copyright law
b). religion
c). vaporware
d). corporate missions
a). trademark
b). copyright
c). patent
d). intellectual ownership right
a). CEOs and CIOs
b). CEOs and CFOs
c). SOAs and DRMs
d). CCVs and DRMs
To combat his backache, Jack’s doctor advised him to ____.
a). use a footrest
b). use a lower screen resolution
c). turn down the volume when using headphones
d). use a light touch on the keyboard
Jill has poor eyesight. When proofreading her book, she can use a ____ that will read aloud whatever she has typed.
screen reader
Braille keyboard
head mouse
switch
ENERGY STAR
Eco-Label
VeriChip
Quality Flower
OX
Simputer
OLPC
InternetWorld
digital patent
digital trademark
digital watermark
digital copyright
one-fifth
one-fourth
one-third
one-half
use a footrest, if needed, to keep your feet flat on the floor
cover windows or adjust lighting to eliminate glare
rest and gently stretch your fingers and arms every 15 minutes or so
place the monitor directly in front of you
privacy filters
eye protectors
monitor filters
protection goggles
IP address
domain name
URL
Web site name
To combat his eyestrain, Jack’s doctor advised him to ____.
use a lower screen resolution
turn down the volume when using headphones
use a light touch on the keyboard