cs: ch 12-14 – Flashcards
75 test answers
Unlock all answers in this set
Unlock answers 75question
5.Two specific types of ____ are e-commerce systems and point-of-sale (POS) systems. a.order entry systems c.office systems b.accounting systems d.document processing systems
answer
order entry systems
Unlock the answer
question
6.____ refer to the variety of systems in place to record the details of financial transactions, such as payments and purchases. a.Accounting systems c.Order entry systems b.Payroll systems d.Transaction processing systems
answer
Accounting systems
Unlock the answer
question
7.A(n) ____ provides regular, routine, and timely information to decision makers. a.transaction processing system b.office system c.general ledger system d.management information system (MIS)
answer
management information system (MIS)
Unlock the answer
question
8. ____—sometimes called information reporting systems—evolved from transaction processing systems. a.Decision support systems (DSSs) b.Management information systems (MISs) c.Customer relationship management (CRM) systems d.Payroll systems
answer
Management information systems (MISs)
Unlock the answer
question
9. When information from an ERP or other type of internal system is exchanged between different applications (either within an organization or between organizations), it is called ____. a.ERP2 c.CRM b.EDI d.EAI
answer
EAI
Unlock the answer
question
10. Specific types of ____ systems include just-in-time (JIT) systems and inventory management systems. a.CRM c.GIS b.ERP d.SCM
answer
SCM
Unlock the answer
question
11.____ refers to the use of computers to help manage manufacturing operations and control machinery used in those processes. a.Computer-aided manufacturing (CAM)c.Enterprise architecture b.Computer-aided design (CAD) d.Product lifecycle management (PLM)
answer
Computer-aided manufacturing (CAM)
Unlock the answer
question
12. When computer systems perform in ways that would be considered intelligent if observed in humans, it is commonly referred to as ____. a.artificial intelligence (AI) c.computer-aided manufacturing (CAM) b.computer-aided design (CAD) d.neural networks
answer
artificial intelligence (AI)
Unlock the answer
question
13.____ can be built from scratch or by using an expert system shell—a skeletal system that needs to be supplied with the expert knowledge and rules to be used in the system. a.Robots c.Intelligent agents b.Neural networks d.Expert systems
answer
Expert systems
Unlock the answer
question
14.A company's ____ has primary responsibility for system development. a.chief executive officer (CEO) c.chief information officer (CIO) b.chief security officer (CSO) d.chief data officer (CDO)
answer
chief information officer (CIO)
Unlock the answer
question
15. A ____ is responsible for maintaining a large, multiuser system. a.software engineer c.vice president of information systems b.system administrator d.programmer/analyst
answer
system administrator
Unlock the answer
question
16. Each phase of the ____ produces some type of documentation to pass on to the next phase. a.system analysis c.system implementation b.system development life cycle d.system acquisition
answer
system development life cycle
Unlock the answer
question
17____ is the phase of system development in which the problem area is studied in depth and the needs of system users are assessed. a.Preliminary investigation c.System analysis b.System design d.System acquisition
answer
System analysis
Unlock the answer
question
18.The objective of ____ is to gather information about the system under study to try to ascertain what resources users need to better perform their jobs. a.data design c.data collection b.data processing d.data analysis
answer
data collection
Unlock the answer
question
19.Class diagrams and use case models are used to analyze and model ____ systems. a.procedural c.entity-related b.functional d.object-oriented
answer
object-oriented
Unlock the answer
question
20.____ focuses on specifying what the new system will look like and how it will work. a.System analysis c.System implementation b.System acquisition d.System design
answer
System design
Unlock the answer
question
21.A(n) ____ is used to describe the characteristics of data used in a database or other type of computer system. a.system flowchart c.data dictionary b.input/output design d.preliminary design
answer
data dictionary
Unlock the answer
question
22.The ____ contains a list of technical specifications for equipment, software, and services determined during the system design phase and requests that vendors propose products that meet those specifications. a.benchmark test c.request for quotation (RFQ) b.request for proposal (RFP) d.data dictionary
answer
request for proposal (RFP)
Unlock the answer
question
23.For the genomics division, Mother Goose is planning to replace the old system by the new one all at once. This is called a ____ conversion. a.phased c.parallel b.direct d.pilot
answer
direct
Unlock the answer
question
24.For the protein folding division, Mother Goose is planning to implement the new system module by module. This is called a ____ conversion. a.phased c.parallel b.direct d.pilot
answer
phased
Unlock the answer
question
25.Mary is interested in identifying the business needs of a system and ensuring the systems meet those needs. Her advisor will probably tell her to look into becoming a ____. a.database analyst c.communications analyst b.business analyst d.computer operator
answer
business analyst
Unlock the answer
question
1. Two of the most significant approaches to programming are procedural programming and ____. a. aspect-oriented programming c. function programming b. object-oriented programming d. virtual programming
answer
object-oriented programming
Unlock the answer
question
2.OOP focuses on an application's data and the ____ or processes that can be used to manipulate that data a.variables c.methods b.subprograms d.functions
answer
methods
Unlock the answer
question
3.According to IBM, ____ has yielded significant benefits in the quality of the code and the speed with which programmers can write programs. a.SDLC c.PDLC b.OOP d.AOP
answer
AOP
Unlock the answer
question
4.In the program design step of the PDLC, the specifications developed during the problem analysis step are used to develop a(n) ____ for the program. a.flowchart c.algorithm b.object d.module
answer
algorithm
Unlock the answer
question
5.Program ____ use graphic symbols and relational operators, such as < for "less than" and = for "equal to," to graphically portray the sequence of steps involved in a program. a.structure charts c.pseudocode b.flowcharts d.models
answer
flowcharts
Unlock the answer
question
6.The ____ provides a meeting point for several flowlines. a.connector symbol c.input/output symbol b.start/stop symbol d.processing symbol
answer
connector symbol
Unlock the answer
question
7.A ____ is a pattern that controls when and how the instructions in a computer program are performed. a.selection control structure c.control structure b.sequence control structure d.repetition control structure
answer
control structure
Unlock the answer
question
8.A ____ is simply a series of statements that follow one another. After the first statement has been carried out completely, the program control moves to the next statement. a.selection control structure c.control structure b.sequence control structure d.repetition control structure
answer
sequence control structure
Unlock the answer
question
9.New trends in programming such as Microsoft's ____ are helping to bridge different platforms and programming languages. a.Visual Basic c.NET framework b.ActiveX d.SQL
answer
NET framework
Unlock the answer
question
10.The first official recorded use of the word bug in the context of computing is associated with the temporary failure of the ____ computer. a.Mark II c.UNIVAC b.ENIAC d.Apple II
answer
Mark II
Unlock the answer
question
11.A(n) ____ is designed for a specific programming language and translates programs written in that language into machine language so it can be executed. a.compiler c.generator b.macro d.decoder
answer
compiler
Unlock the answer
question
12.Rather than creating a complete object module for a program, a(n) ____ reads, translates, and executes the source program one line at a time. a.compiler c.assembler b.interpreter d.generator
answer
interpreter
Unlock the answer
question
13.A(n) ____ occurs when the programmer has not followed the proper rules of the programming language being used. a.logic error c.syntax error b.assembly error d.coding error
answer
syntax error
Unlock the answer
question
14.Programmers often use temporary dummy print statements—print statements that are temporarily inserted into the code—to help locate a ____. a.syntax error c.compile-time error b.rules error d.logic error
answer
logic error
Unlock the answer
question
15.____ create the forms or screens used to input data into a program or database. a.Form generators c.Application generators b.Report generators d.Data generators
answer
Form generators
Unlock the answer
question
16.Fourth-generation languages (4GLs) are also sometimes called ____. a.procedural programming languages c.high-level languages b.very-high-level languages d.interpreted languages
answer
very-high-level languages
Unlock the answer
question
17.____ was designed as an easy-to-learn beginner's language that would work in a friendly, nonfrustrating programming environment. a.FORTRAN c.BASIC b.COBOL d.Java
answer
BASIC
Unlock the answer
question
18.The figure above shows the programming environment for ____. To test the code, choose Build. Any errors will appear in the Error window at the bottom of the program window. To run the program, click Debug. a.Visual Basic c.C b.C# d.Java
answer
Visual Basic
Unlock the answer
question
19.____ is a high-level structured programming language that has the executional efficiency of an assembly language. a.Visual Basic c.COBOL b.C d.Basic
answer
C
Unlock the answer
question
20.Java applications can be run using any operating system or Web browser that understands ____. a.Java bytecode c.Java servlets b.macros d.Java VM
answer
Java bytecode
Unlock the answer
question
21.Once a Java application has been converted to bytecode, it can be run on any platform—such as Windows, UNIX, or Mac OS—as long as the PC being used includes the ____. a.Java Virtual Code c.Java applets b.Java Virtual Machine (Java VM) d.Java servlets
answer
Java Virtual Machine (Java VM)
Unlock the answer
question
22.Java is currently one of the most popular programming languages and has replaced ____ as the programming language used for the computer science Advanced Placement exam taken by high school students to earn college credit. a.C++ c.BASIC b.Visual Basic d.C
answer
C++
Unlock the answer
question
23.Because their projects have rapidly changing characteristics, the programmers at the Rainbow Trout Company often use the ____ (XP) approach. a.expert programming c.extreme programming b.experienced programmers d.extra programmers
answer
extreme programming
Unlock the answer
question
24.To allow everyone, not just the original programmer, to understand the source code of a program, the Rainbow Trout Company follows a set of ____—a list of rules designed to standardize programming styles. a.UMLs c.RADs b.flowcharts d.coding standards
answer
coding standards
Unlock the answer
question
25.During the summer, Kelly will be writing a compiler as part of a research project. To prepare, she is learning ____, a functional language. a.C c.Visual Basic b.Java d.Scheme
answer
Scheme
Unlock the answer
question
1. Most DBMSs come bundled with a set of tools to perform a variety of necessary tasks, such as building user interfaces, creating forms and reports, and interfacing with query languages and ____ for complex applications. a. query wizards c. report generators b. programming languages d. form screens
answer
programming languages
Unlock the answer
question
2. A ____ is a collection of related fields. a. table c. column b. field d. record
answer
record
Unlock the answer
question
3. A record is a collection of fields, either a specific ____ from a single table or a collection of related fields from multiple tables. a. keyword c. column b. index d. row
answer
row
Unlock the answer
question
4. The specific field in a table that is used to identify the records in that table and relate that table to other tables is called the ____. a. composite key c. primary key b. secondary key d. primary field
answer
..primary key
Unlock the answer
question
5. Virtually all DBMSs include a ____ for easy data input and data access. a. user interface c. command interface b. line interface d. device interface
answer
user interface
Unlock the answer
question
6. A ____ is required to access data in a hierarchical database. a. user c. systems analyst b. programmer d. systems programmer
answer
programmer
Unlock the answer
question
7. Individual database tables are often referred to as ____. a. low files c. flat files b. base files d. clear files
answer
flat files
Unlock the answer
question
8. Some free or low-cost enterprise database software programs—such as the open source ____ program—are available. a. SQL c. DB2 b. Oracle d. MySQL
answer
MySQL
Unlock the answer
question
9. Data definition involves describing the properties of the data that go into each database table, specifically the ____ or columns that make up the database. a. records c. fields b. rows d. characters
answer
fields
Unlock the answer
question
10. In ____, the table field involved in the changes is locked until the changes to that field have been completed. a. column-level locking c. row-level locking b. database locking d. record-level locking
answer
column-level locking
Unlock the answer
question
11. In a typical client-server database application, the client is called the ____. a. back end c. portal b. rear end d. front end
answer
front end
Unlock the answer
question
12. With a ____, a database is located in its entirety on a single computer, such as a server or mainframe computer. a. distributed database system c. centralized database system b. star database system d. ring database system
answer
centralized database system
Unlock the answer
question
13. The ____ is the most widely used database model today. a. hierarchical database management system b. relational database management system (RDBMS) c. network database management system d. database management system (DBMS)
answer
relational database management system (RDBMS)
Unlock the answer
question
14. The process of evaluating and correcting the structures of the tables in a database to minimize data redundancy is called ____. a. normalization c. zeroing b. cyclic redundancy check d. zonification
answer
normalization
Unlock the answer
question
15. To create a query, users can either type a query using SQL or, more commonly, use the query tools built into the DBMS (such as a query design screen or query ____) to more easily build a query. a. command c. wizard b. line d. key
answer
wizard
Unlock the answer
question
16. The figure above illustrates a formatted ____, created from data contained in a database. a. report c. form b. query d. table
answer
report
Unlock the answer
question
17. Continuing to evaluate and improve the security measured used with the database is a database ____ activity. a. programming c. implementation b. design d. maintenance
answer
maintenance
Unlock the answer
question
18. The key characteristics for an OODBMS (including objects, attributes, methods, ____, polymorphism, classes, and inheritance) are similar to object-oriented programming principles. a. migration c. conversion b. adequation d. encapsulation
answer
encapsulation
Unlock the answer
question
19. With ____, data is stored in single multidimensional database structures (sometimes called data cubes). a. Online Analytical Processing (OLAP) c. MOLAP (Multidimensional OLAP) b. ROLAP (Relational OLAP) d. HOLAP (Hybrid OLAP)
answer
MOLAP (Multidimensional OLAP)
Unlock the answer
question
20. Web-based database requests are received by the Web server, which then converts the request into a database query and passes it on to the database server with the help of software called ____. a. middleware c. macros b. capsules d. applets
answer
middleware
Unlock the answer
question
21. ____ has the advantage of high compatibility with many types of databases. It is also an open-source program, available free to all users. a. JavaScript c. CGI (common gateway interface) b. PHP (PHP Hypertext Preprocessor) d. API (application program interface)
answer
PHP (PHP Hypertext Preprocessor)
Unlock the answer
question
22. Which of the following is the best certification option for James? a. CCP c. ACP b. CBIP d. CDMP
answer
ACP
Unlock the answer
question
23. James is most interested in becoming a database designer. Another name for this career choice is database ____. a. architect c. programmer b. developer d. administrator
answer
architect
Unlock the answer
question
24. The JL Group has gathered data on voting habits. In order to make sure that respondents cannot claim to have voted in more elections than is possible given their age, ____ rules can be assigned to the database tables. a. index validation c. DBA validation b. record validation d. dynamic
answer
record validation
Unlock the answer
question
25. The JL Group is in the process of creating dynamic Web pages to poll politically aware young adults. They are interested in creating scripts that are compatible with many types of databases, so they are using the ____ language. a. CGI c. COBOL b. API d. PHP
answer
PHP
Unlock the answer