BCIS FINAL EXAM – Flashcards
Unlock all answers in this set
Unlock answersquestion
Database marketing allows companies to ____.
answer
mine customer databases and create marketing lists
question
A_ is a technology that allows users connected to a network to transfer money from one bank account to another.
answer
EFT
question
An ATM initially connects to a(n) __ through a network.
answer
host processor
question
A_ stores data on a thin microprocessor embedded in the card.
answer
smart card
question
Many businesses use a(n) __ to send bills electronically instead of mailing their customers paper statements.
answer
bill presentment process
question
Which of the following is true of telecommuting, as opposed to a standard office job?
answer
requires more discipline and focus
question
Which of the following is a good tip for avoiding RSI?
answer
Keep the mouse close to the keyboard
question
Which of the following is an invention of the Industrial Revolution?
answer
telegraph
question
Which of the following is an invention of the Information Age?
answer
transistor
question
____uses computers to test product designs before the physical prototype is built.
answer
Computer-aided engineering (CAE)
question
Which of the following is NOT a component of an MRP system?
answer
financial analysis
question
A(n) ____ system lets manufacturers purchase and receive components just before they are needed on the assembly line.
answer
just-in-time manufacturing
question
Libraries use the ____ bar code to identify items.
answer
Codabar
question
A bar code represents data that identifies the ____.
answer
manufacturer and item number
question
A(n) ____ records purchases, processes credit or debit cards, and updates inventory.
answer
point-of-sale system
question
Which type of criminal database is often made available to the public?
answer
sexually violent offenders
question
Computers in red-light systems perform all of the following functions EXCEPT ____.
answer
sending an electronic message to the violator
question
A LoJack device is a wireless ____.
answer
audio-frequency transceiver
question
Foreign students with visas who attend U.S. schools must provide personal information to the ____ system.
answer
SEVIS
question
A(n) ____ system helps track and manage events during a crisis.
answer
Web-based collaboration
question
The U.S. visit database currently stores all of the following types of biometric identifiers EXCEPT ____.
answer
iris or retinal scans
question
All of the following military technologies use GPS EXCEPT ____.
answer
computer simulations
question
The practice of conducting polls to gauge public opinion on an issue dates back to the ____ presidency.
answer
Kennedy
question
Which group of voters is most likely to vote, but least likely to use the Internet?
answer
Americans age 65 or older
question
Which of the following is NOT true of computerized voting systems?
answer
They provide equal access to every citizen
question
Which of the following was NOT used to gather data in Census 2000?
answer
the Internet
question
The IRS allows you to do all of the following at its Web site EXCEPT ____.
answer
have online chats with an IRS representative
question
Which of the following FBI databases contains DNA profiles?
answer
CODIS
question
The ____ was established to help gun dealers perform background checks.
answer
NICS
question
What is the use of advanced computer technology to help health care professionals consult with each other and work together on cases, regardless of where the patients, medical professionals, and relevant clinical data are located.
answer
telemedicine
question
Which of the following technologies does NOT use satellite links to transmit data?
answer
automatic weather stations
question
Humans have approximately 30,000 ____ that define their physical traits and many of their behaviors.
answer
genes
question
Hundreds of automatic weather stations located in ____ measure weather data and transmit it back to a data collection center.
answer
Antarctica
question
The DART system was developed to track ___.
answer
earthquakes
question
SETI at home relies on the concept of ____, in which the collective processing power of one or more computers is used to complete a large processing task.
answer
distributed computing
question
The Geophysical Fluid Dynamics Laboratory (GFDL) has pioneered ____ research for two decades with the goals of better understanding weather phenomena.
answer
computer modeling
question
Computer-based patient records are entered, stored, and maintained with the help of a(n) ____ system.
answer
electronic medical record (EMR)
question
A(n) ____ is a test that records the electrical activity of the heart.
answer
EKG
question
DXplain is an example of a(n) ____ system.
answer
decision support system
question
Which medical Web site provides a database of reference and abstracts from the National Library of Medicine?
answer
MEDLINEplus
question
Which medical Web site would be most helpful in providing traveler's health information on specific destinations?
answer
Centers for Disease Control and Prevention
question
What does a GlucoWatch G2 Biographer monitor?
answer
blood sugar levels
question
Which of the following is NOT used in computer-aided surgery?
answer
haptic feedback
question
Computer-generated fractals use ____ to create art.
answer
mathematical formulas
question
A home or business photographer most likely uses the ____ type of digital camera.
answer
point-and-shoot
question
In digital cameras, the image is initially focused on a chip called a(n) ____.
answer
charge-coupled device
question
One group that completely opposes any manipulation of a digital image is the ____.
answer
NPPA
question
____ is a special effect in which one video image is transformed into another image over the course of several frames
answer
morphing
question
An animation software program can computer the positions between the top and bottom of the animation sequence in a process called ____.
answer
tweening
question
Computers process data as ____ that represent on and off states.
answer
bits
question
A(n) ___ creates sound from digital instructions input by the user, either via a standard computer keyboard or devices resembling
answer
synthesizer
question
Which of the following is NOT a MIDI component?
answer
sequencer
question
File ____ involves uploading a music file to a file-sharing network with distortion, silence, or copyright law warnings.
answer
sequencing
question
Dancers rely on a technology called ____ to record and analyze their dance movements.
answer
motion capture
question
Which of the following theatre departments does NOT use CAD software?
answer
box office
question
Sculptors use ____ to digitally recreate an existing physical object.
answer
3-D scanning
question
After you have created a model for your sculpture, you can use ____ to shape your desired medium.
answer
CNC milling machines
question
A light curtain and treadles are used in an electronic toll collection system to ensure that ____.
answer
all cars are counted and billed correctly
question
Modern airplanes rely on ____ technology to control landing gear, spoilers, and other components of the planes.
answer
fly-by-wire
question
Which of the following is still performed by human drivers on a Civis bus?
answer
braking
question
The ____ oversees all air traffic control in the United States.
answer
ATSCC (Air Traffic Control System Command Center)
question
Sabre was the first ____ system to be widely distributed.
answer
GDS
question
CAPPS II is a passenger screening system that stores your ticket information in a(n) ____.
answer
Passenger Name Record
question
A virtual wind tunnel relies on ____ to predict how air will flow around a vehicle.
answer
computational fluid dynamics
question
Which of the following is NOT true of computerized car analysis?
answer
is more expensive than physical testing
question
The ____ is the most powerful computer in most cars.
answer
engine control unit
question
Collision warning systems use ____ to detect objects.
answer
radar
question
Smart cars maintain a safe driving interval between your car and other vehicles through a(n) ____ system.
answer
adaptive cruise control
question
Which of the following is NOT true of today's smart tires?
answer
adjust tire pressure dynamically, depending on where you are driving
question
OnStar is an example of a(n) ____ system.
answer
call center telematics
question
An electronic toll-collection system uses a ____ to store basic account information.
answer
transponder
question
What is the primary objection of the courts towards legislation that limits the distribution of objectionable content?
answer
The government has no right to limit free speech if less restrictive measures are available.
question
Which of the following statements is true of cyberstalking?
answer
Cybertalkers typically locate their victims in chat rooms, bulletin boards, or newsgroups.
question
Which of the following ethical viewpoints states that, if any action is not right for everyone to take, then it is not right for anyone to take?
answer
universal law
question
How do news firms counter the ethical concerns over the mixing of advertising links with news stories in a user's search results?
answer
The results pages clearly distinguish the sponsored listings from the other search results.
question
Who receives the largest percentage of the profits made from downloading music files?
answer
online music provider
question
What service does the Web site turnintin.com provide?
answer
appraisal of the originality of a student's report
question
Which of the following statements is NOT true of an ethical decision?
answer
It is universal and applies to everyone in a society.
question
The ____ specifies that in the United States, a digital signature has the same weight as a traditional signature written on paper.
answer
Digital Millennium Act
question
Which of the following statements is NOT true of digital signatures?
answer
They cannot be forged
question
The ____ states that advertising in any medium must be truthful and must not mislead customers.
answer
Federal Trade Commission Act
question
What is the purpose of the Six/Four software program?
answer
It gives users in countries that monitor Internet access permission to connect to the Internet through a secure network.
question
U.S. courts are not yet settled in regards to the fair use of copyright material for ____.
answer
format-shifting
question
Which of the following is NOT a tenet of the Digital Millennium Copyright Act?
answer
Making ISPs liable for transmitting information over the Internet that violates copyright infringement.
question
Which of the following protections does the Copyright Term Extension Act provide?
answer
Extends the duration of copyright for individual and corporate works.
question
The green color of the Address bar in the accompanying figure indicates that the site is using a valid ____ SSL certificate.
answer
EV
question
Repeated threats or other harassment carried out online between adults is referred to as ____.
answer
cyberstalking
question
The ____, implemented in 2001, grants federal authorities expanded surveillance and intelligence-gathering powers, such as broadening their ability to obtain the real identity of Internet users and to intercept Internet communications.
answer
USA Patriot Act
question
The ____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.
answer
Homeland Security Act of 2002
question
Computer crime is sometimes referred to as ____.
answer
cybercrime
question
To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.
answer
codes of conduct
question
____ refers to the act of breaking into a computer or network.
answer
hacking
question
According to a recent study, the total cost per data breach in ____ is $5.4 million—the highest of any country.
answer
the United States
question
Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.
answer
war driving
question
The term ____ refers to accessing someone else's unsecured Wi-Fi network from the hacker's current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business).
answer
Wi-Fi piggybacking
question
____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.
answer
passwords
question
____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems.
answer
possessed object
question
Increasingly, USB security keys, also called USB security ____—USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features—are being used.
answer
tokens
question
____ identify users by a particular unique biological characteristic.
answer
Biometric access systems
question
A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.
answer
firewall
question
____ uses a single secret key to both encrypt and decrypt the file or message.
answer
Private key encryption
question
Some Web-based encrypted e-mail systems—such as the popular free ____ service—require both the sender and recipient to have accounts through that system.
answer
Hushmail
question
A ____ provides a secure private tunnel from the user's computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network.
answer
virtual private network
question
____ software can control which devices can be connected to an employee's computer.
answer
Data-leakage prevention
question
____ includes any acts of malicious destruction to a computer or computer resource.
answer
computer sabotage
question
A computer that is controlled by a hacker or other computer criminal is referred to as a ____.
answer
bot
question
____ is a generic term that refers to any type of malicious software.
answer
Malware
question
A computer ____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.
answer
virus
question
Like a computer virus, a ____ is a malicious program designed to cause damage.
answer
computer worm
question
A ____ is a malicious program that masquerades as something else—usually as some type of application program.
answer
trojan horse
question
A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network.
answer
worm
question
One emerging type of Trojan horse is called a ____-Access Trojan.
answer
remote
question
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.
answer
threat definitions
question
A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____.
answer
dot cons
question
____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities—usually to buy products or services in that person's name.
answer
Identify theft
question
____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive.
answer
Identify theft
question
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.
answer
typosquatting
question
____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.
answer
Framing
question
The best protection against many dot cons is ____.
answer
common sense
question
When a digitally signed document is received, the recipient's computer uses the sender's ____ key to verify the digital signature.
answer
public
question
Our networked society has raised a number of ____ concerns.
answer
privacy
question
New security risks are revealed all the time. For instance, it was recently discovered that data from some unencrypted smart meters can be accessed from nearly ____ away, enabling would-be burglars to monitor homes to see if they are occupied based on electricity usage within the homes.
answer
1,000 feet
question
Although many of us may prefer not to think about it, ____—the complete malfunction of a computer system—and other types of computer-related disasters do happen.
answer
system failure
question
To facilitate using a computer lock, nearly all computers today come with a ____—a small opening built into the system unit case designed for computer locks.
answer
security slot
question
____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object.
answer
Cable locks
question
____ systems encrypt everything stored on the drive (the operating system, application programs, data, temporary files, and so forth) automatically without any user interaction.
answer
FDE
question
The data on the ____ USB flash drive shown in the accompanying figure cannot be accessed until the user enters the appropriate PIN.
answer
encrypted
question
Some software tools are not designed to prevent hardware from being stolen; instead, they are designed to aid in its ____.
answer
recovery
question
____ devices are designed to withstand much more physical abuse than conventional devices.
answer
Ruggedized
question
Laptop ____ protect portable computers from scratches and other damage when they are carried in a conventional briefcase or bag.
answer
pads
question
____ are designed to withstand falls from three feet or more onto concrete, extreme temperature ranges, wet conditions, and use while being bounced around over rough terrain in a vehicle.
answer
Rugged
question
Users who want their desktop computers to remain powered up when the electricity goes off should use a(n) ____, as shown in the accompanying figure.
answer
UPS
question
____ are small programs that take care of software-specific problems, or bugs, such as security holes.
answer
Patches
question
To supplement backup procedures, businesses and other organizations should have a(n) ____.
answer
diaster recovery plan
question
Creating a ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy.
answer
backup
question
A(n) ____ is an alternate location equipped with the computers, cabling, desks, and other equipment necessary to keep a business's operations going.
answer
hot site
question
To prevent the counterfeiting of U.S. currency, the Treasury Department releases new currency designs every ____.
answer
7 to 10 years
question
The term ____ refers to the rights of individuals and companies to control how information about them is collected and used.
answer
information privacy
question
____ are used for marketing purposes, such as sending advertisements that fit each individual's interests or trying to sign people up over the phone for some type of service.
answer
Marketing databases
question
A marketing activity that can be considered a privacy risk is ____.
answer
electronic profiling
question
Collecting in-depth information about an individual is known as ____.
answer
electronic profiling
question
Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.
answer
privacy policy
question
When spam is sent via IM it is called ____.
answer
spim
question
For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or ____.
answer
throw-away e-mail address
question
One common way to deal with spam that makes it to your computer is to use a(n) ____.
answer
e-mail filter
question
By ____, you instruct companies you do business with that they cannot share your personal data with third parties.
answer
opting out
question
To ____ means to request that you be included in marketing activities or that your information be shared with other companies.
answer
opt in
question
____ is used specifically for the purpose of recording keystrokes or otherwise monitoring someone's computer activity.
answer
Computer monitoring software
question
____ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work-related or crime-prevention purposes.
answer
Video surveillance
question
____ cameras are increasingly being installed in schools in the United States and other countries to enable administrators to monitor both teacher and student activities.
answer
Video surveillance
question
____ refers to companies recording or observing the actions of employees while on the job.
answer
Employee monitoring
question
For monitoring the physical locations of employees, video cameras can be used, but another possibility is the use of ____.
answer
video cards
question
____ refers to the ability of one computing device (a desktop computer, portable computer, or smartphone, for example) on a network (such as the Internet or a mobile phone network) to identify another device on the same network and determine its status.
answer
Presence technology
question
____ programs can be used to detect and remove some types of illegal computer monitoring and spyware software.
answer
Antispyware software
question
The ____ implements regulations for unsolicited e-mail messages and lays the groundwork for a federal Do Not E-Mail Registry.
answer
CAN-SPAM act
question
A ____________is a pocket-sized device that typically connects to a smartphone or portable computer to enable the device to display an image on a wall.
answer
pico projector
question
One of the key enhancements in the newest Bluetooth specification known as _____________ is low energy, which enables small devices to run for years on a single button-sized battery.
answer
Bluetooth Smart
question
____ mobile payments use RFID to facilitate communication between devices, including transferring payment information, receipts, boarding passes, and other information wirelessly between payment terminals and mobile phones.
answer
Near Field Communications (NFC)
question
Typically, 3D chips are created by layering individual ____ wafers on top of one another with a special machine that uses cameras to align the wafers properly.
answer
silicon
question
____ chips have a special coating that changes its physical state when heat is applied.
answer
PRAM
question
A __________ usually projects the image from a mobile device to a display screen built into the glasses via a wireless connection.
answer
wearable display
question
____ displays are transparent; the portion of the display that does not currently have an image displayed (and the entire display device when it is off) is nearly as transparent as glass, so the user can see through the screen
answer
TLED
question
Designed initially for mobile phones and other portable devices, an IMOD screen is essentially a complex mirror that uses ____ light to display images.
answer
external
question
To record data, holographic storage systems split the light from a blue laser beam into two beams-a ____ beam whose angle determines the address used to store data at that particular location on the storage medium and a signal beam that contains the data.
answer
reference
question
With holographic storage systems, the signal beam passes through a device called a ____ light modulator (SLM), which translates the data's 0s and 1s into a hologram.
answer
spatial
question
Today's holographic storage systems typically consist of a holographic drive and removable recordable holographic discs, with current capacities ranging from 300 GB to ____ GB per cartridge.
answer
500
question
Most people agree that nanotechnology involves creating computer components, machines, and other structures that are less than ____ nanometers in size.
answer
100
question
The wall of a single-walled carbon nanotube is only one carbon atom thick and the tube diameter is approximately ____ times smaller than a human hair.
answer
10,000
question
One recent development in new technology is ____ that can remove contaminants from water sources.
answer
electroparticles
question
A(n) ____ computer uses light, such as from laser beams or infrared beams, to perform digital computations.
answer
optical
question
While some researchers are working on developing an all-optical computer, others believe that a mix of optical and electronic components, referred to as an ____ computer, may be the best bet for the future.
answer
opto-electronic
question
One new improvement to videoconferencing technology to make it more closely mimic a real-time meeting environment is ____ videoconferencing.
answer
telepresence
question
Power over Ethernet (PoE) allows both ____ power and data to be sent over standard Ethernet cables.
answer
electrical
question
Developed in the late 1990s, Wi-Fi (for wireless fidelity) is a family of wireless networking standards that use the IEEE standard ____.
answer
802.11
question
The speed and distance of a Wi-Fi network depends on a variety of factors, such as the particular Wi-Fi standard and ____.
answer
-the number of solid objects between the access point and PC (walls, doors) -interference from devices using radio frequencies (baby monitors, microwave ovens) -the hardware being used
question
In general, Wi-Fi is designed for data transfers between ____ feet indoors.
answer
100 to 300
question
____ is one of the Wi-Fi standards most widely used today.
answer
802.11g
question
____ applications that exist in some form today include intelligent agents, expert systems, neural networks, and robotics.
answer
artificial intelligence
question
Self-driving cars, like Google's autonomous cars, are essentially __________.
answer
robotic cars
question
The ____ Web is a predicted evolution of the current Web in which all Web content is stored in formats that are more easily read by software applications and intelligent agents.
answer
semantic
question
One example of a neural network is a(n) ____ system that uses cameras to inspect objects and make determinations-for example, the systems that check products for defects at manufacturing plants.
answer
vision
question
When using a(n) ____ system, it is important to realize that its conclusions are based on the data and rules stored in its knowledge base, as well as the information provided by the users.
answer
expert
question
A(n) ____ network, like the one used by the technology in the accompanying figure, is designed to emulate the brain's pattern-recognition process in order to recognize patterns in data and make more progressive leaps in associations and predictions than conventional computer systems.
answer
neural
question
____ is the process of connecting the brain with a computer, such as implanting electrodes directly into the brain to restore lost functionality to or facilitate the communications of severely disabled individuals.
answer
BCI
question
Privacy-rights advocates worry that the ____ could someday be used by the government to track citizens.
answer
VeriChip
question
Home monitoring systems designed for the home include ______________ .
answer
??? a. home health monitoring systems b. smart door locks c. smart thermostats d. all of the above
question
Telesurgery is a form of robot-assisted surgery, in which a robot controlled by a physician operates on the patient, and which typically uses ____ to give the human surgeon an extremely close view of the surgical area.
answer
cameras
question
____ is involved with the development of robotic prosthetic arms that feel, look, and perform like natural arms, which will be used by military personnel who are injured in the line of duty.
answer
DARPA
question
An emerging military robotic application is the ____ suit, which is a wearable robotic system designed to give an individual additional physical capabilities and protection.
answer
exoskeleton
question
Telesurgery is typically ____ than normal surgery.
answer
-less invasive -more precise