cs: ch 12-14 – Flashcards

Unlock all answers in this set

Unlock answers
question
Managers are usually classified into three categories: executive, ____, and operational. a. development c.middle b. strategic d. decision
answer
middle
question
2. ____ spend a great deal of time on long-range planning and use information systems to make strategic decisions, although their decision making process tends to be fairly unstructured. a. Middle managers c. Supervisional managers b. Operational managers d. Executive managers
answer
Executive managers
question
3. To help store, organize, and retrieve documents once they have been created in or converted to an electronic format, ____ systems can be used. a.transaction processing c.document management b.document processing d.office automation
answer
document management
question
4.The various types of communications systems in place in many organizations include e-mail, messaging, online conferencing, ____, and telecommuting. a.point-of-sale (POS) systems c.fingerprint payment systems b.collaborative (workgroup) computing d.geographic information system (GIS)
answer
collaborative (workgroup) computing
question
5.Two specific types of ____ are e-commerce systems and point-of-sale (POS) systems. a.order entry systems c.office systems b.accounting systems d.document processing systems
answer
order entry systems
question
6.____ refer to the variety of systems in place to record the details of financial transactions, such as payments and purchases. a.Accounting systems c.Order entry systems b.Payroll systems d.Transaction processing systems
answer
Accounting systems
question
7.A(n) ____ provides regular, routine, and timely information to decision makers. a.transaction processing system b.office system c.general ledger system d.management information system (MIS)
answer
management information system (MIS)
question
8. ____—sometimes called information reporting systems—evolved from transaction processing systems. a.Decision support systems (DSSs) b.Management information systems (MISs) c.Customer relationship management (CRM) systems d.Payroll systems
answer
Management information systems (MISs)
question
9. When information from an ERP or other type of internal system is exchanged between different applications (either within an organization or between organizations), it is called ____. a.ERP2 c.CRM b.EDI d.EAI
answer
EAI
question
10. Specific types of ____ systems include just-in-time (JIT) systems and inventory management systems. a.CRM c.GIS b.ERP d.SCM
answer
SCM
question
11.____ refers to the use of computers to help manage manufacturing operations and control machinery used in those processes. a.Computer-aided manufacturing (CAM)c.Enterprise architecture b.Computer-aided design (CAD) d.Product lifecycle management (PLM)
answer
Computer-aided manufacturing (CAM)
question
12. When computer systems perform in ways that would be considered intelligent if observed in humans, it is commonly referred to as ____. a.artificial intelligence (AI) c.computer-aided manufacturing (CAM) b.computer-aided design (CAD) d.neural networks
answer
artificial intelligence (AI)
question
13.____ can be built from scratch or by using an expert system shell—a skeletal system that needs to be supplied with the expert knowledge and rules to be used in the system. a.Robots c.Intelligent agents b.Neural networks d.Expert systems
answer
Expert systems
question
14.A company's ____ has primary responsibility for system development. a.chief executive officer (CEO) c.chief information officer (CIO) b.chief security officer (CSO) d.chief data officer (CDO)
answer
chief information officer (CIO)
question
15. A ____ is responsible for maintaining a large, multiuser system. a.software engineer c.vice president of information systems b.system administrator d.programmer/analyst
answer
system administrator
question
16. Each phase of the ____ produces some type of documentation to pass on to the next phase. a.system analysis c.system implementation b.system development life cycle d.system acquisition
answer
system development life cycle
question
17____ is the phase of system development in which the problem area is studied in depth and the needs of system users are assessed. a.Preliminary investigation c.System analysis b.System design d.System acquisition
answer
System analysis
question
18.The objective of ____ is to gather information about the system under study to try to ascertain what resources users need to better perform their jobs. a.data design c.data collection b.data processing d.data analysis
answer
data collection
question
19.Class diagrams and use case models are used to analyze and model ____ systems. a.procedural c.entity-related b.functional d.object-oriented
answer
object-oriented
question
20.____ focuses on specifying what the new system will look like and how it will work. a.System analysis c.System implementation b.System acquisition d.System design
answer
System design
question
21.A(n) ____ is used to describe the characteristics of data used in a database or other type of computer system. a.system flowchart c.data dictionary b.input/output design d.preliminary design
answer
data dictionary
question
22.The ____ contains a list of technical specifications for equipment, software, and services determined during the system design phase and requests that vendors propose products that meet those specifications. a.benchmark test c.request for quotation (RFQ) b.request for proposal (RFP) d.data dictionary
answer
request for proposal (RFP)
question
23.For the genomics division, Mother Goose is planning to replace the old system by the new one all at once. This is called a ____ conversion. a.phased c.parallel b.direct d.pilot
answer
direct
question
24.For the protein folding division, Mother Goose is planning to implement the new system module by module. This is called a ____ conversion. a.phased c.parallel b.direct d.pilot
answer
phased
question
25.Mary is interested in identifying the business needs of a system and ensuring the systems meet those needs. Her advisor will probably tell her to look into becoming a ____. a.database analyst c.communications analyst b.business analyst d.computer operator
answer
business analyst
question
1. Two of the most significant approaches to programming are procedural programming and ____. a. aspect-oriented programming c. function programming b. object-oriented programming d. virtual programming
answer
object-oriented programming
question
2.OOP focuses on an application's data and the ____ or processes that can be used to manipulate that data a.variables c.methods b.subprograms d.functions
answer
methods
question
3.According to IBM, ____ has yielded significant benefits in the quality of the code and the speed with which programmers can write programs. a.SDLC c.PDLC b.OOP d.AOP
answer
AOP
question
4.In the program design step of the PDLC, the specifications developed during the problem analysis step are used to develop a(n) ____ for the program. a.flowchart c.algorithm b.object d.module
answer
algorithm
question
5.Program ____ use graphic symbols and relational operators, such as < for "less than" and = for "equal to," to graphically portray the sequence of steps involved in a program. a.structure charts c.pseudocode b.flowcharts d.models
answer
flowcharts
question
6.The ____ provides a meeting point for several flowlines. a.connector symbol c.input/output symbol b.start/stop symbol d.processing symbol
answer
connector symbol
question
7.A ____ is a pattern that controls when and how the instructions in a computer program are performed. a.selection control structure c.control structure b.sequence control structure d.repetition control structure
answer
control structure
question
8.A ____ is simply a series of statements that follow one another. After the first statement has been carried out completely, the program control moves to the next statement. a.selection control structure c.control structure b.sequence control structure d.repetition control structure
answer
sequence control structure
question
9.New trends in programming such as Microsoft's ____ are helping to bridge different platforms and programming languages. a.Visual Basic c.NET framework b.ActiveX d.SQL
answer
NET framework
question
10.The first official recorded use of the word bug in the context of computing is associated with the temporary failure of the ____ computer. a.Mark II c.UNIVAC b.ENIAC d.Apple II
answer
Mark II
question
11.A(n) ____ is designed for a specific programming language and translates programs written in that language into machine language so it can be executed. a.compiler c.generator b.macro d.decoder
answer
compiler
question
12.Rather than creating a complete object module for a program, a(n) ____ reads, translates, and executes the source program one line at a time. a.compiler c.assembler b.interpreter d.generator
answer
interpreter
question
13.A(n) ____ occurs when the programmer has not followed the proper rules of the programming language being used. a.logic error c.syntax error b.assembly error d.coding error
answer
syntax error
question
14.Programmers often use temporary dummy print statements—print statements that are temporarily inserted into the code—to help locate a ____. a.syntax error c.compile-time error b.rules error d.logic error
answer
logic error
question
15.____ create the forms or screens used to input data into a program or database. a.Form generators c.Application generators b.Report generators d.Data generators
answer
Form generators
question
16.Fourth-generation languages (4GLs) are also sometimes called ____. a.procedural programming languages c.high-level languages b.very-high-level languages d.interpreted languages
answer
very-high-level languages
question
17.____ was designed as an easy-to-learn beginner's language that would work in a friendly, nonfrustrating programming environment. a.FORTRAN c.BASIC b.COBOL d.Java
answer
BASIC
question
18.The figure above shows the programming environment for ____. To test the code, choose Build. Any errors will appear in the Error window at the bottom of the program window. To run the program, click Debug. a.Visual Basic c.C b.C# d.Java
answer
Visual Basic
question
19.____ is a high-level structured programming language that has the executional efficiency of an assembly language. a.Visual Basic c.COBOL b.C d.Basic
answer
C
question
20.Java applications can be run using any operating system or Web browser that understands ____. a.Java bytecode c.Java servlets b.macros d.Java VM
answer
Java bytecode
question
21.Once a Java application has been converted to bytecode, it can be run on any platform—such as Windows, UNIX, or Mac OS—as long as the PC being used includes the ____. a.Java Virtual Code c.Java applets b.Java Virtual Machine (Java VM) d.Java servlets
answer
Java Virtual Machine (Java VM)
question
22.Java is currently one of the most popular programming languages and has replaced ____ as the programming language used for the computer science Advanced Placement exam taken by high school students to earn college credit. a.C++ c.BASIC b.Visual Basic d.C
answer
C++
question
23.Because their projects have rapidly changing characteristics, the programmers at the Rainbow Trout Company often use the ____ (XP) approach. a.expert programming c.extreme programming b.experienced programmers d.extra programmers
answer
extreme programming
question
24.To allow everyone, not just the original programmer, to understand the source code of a program, the Rainbow Trout Company follows a set of ____—a list of rules designed to standardize programming styles. a.UMLs c.RADs b.flowcharts d.coding standards
answer
coding standards
question
25.During the summer, Kelly will be writing a compiler as part of a research project. To prepare, she is learning ____, a functional language. a.C c.Visual Basic b.Java d.Scheme
answer
Scheme
question
1. Most DBMSs come bundled with a set of tools to perform a variety of necessary tasks, such as building user interfaces, creating forms and reports, and interfacing with query languages and ____ for complex applications. a. query wizards c. report generators b. programming languages d. form screens
answer
programming languages
question
2. A ____ is a collection of related fields. a. table c. column b. field d. record
answer
record
question
3. A record is a collection of fields, either a specific ____ from a single table or a collection of related fields from multiple tables. a. keyword c. column b. index d. row
answer
row
question
4. The specific field in a table that is used to identify the records in that table and relate that table to other tables is called the ____. a. composite key c. primary key b. secondary key d. primary field
answer
..primary key
question
5. Virtually all DBMSs include a ____ for easy data input and data access. a. user interface c. command interface b. line interface d. device interface
answer
user interface
question
6. A ____ is required to access data in a hierarchical database. a. user c. systems analyst b. programmer d. systems programmer
answer
programmer
question
7. Individual database tables are often referred to as ____. a. low files c. flat files b. base files d. clear files
answer
flat files
question
8. Some free or low-cost enterprise database software programs—such as the open source ____ program—are available. a. SQL c. DB2 b. Oracle d. MySQL
answer
MySQL
question
9. Data definition involves describing the properties of the data that go into each database table, specifically the ____ or columns that make up the database. a. records c. fields b. rows d. characters
answer
fields
question
10. In ____, the table field involved in the changes is locked until the changes to that field have been completed. a. column-level locking c. row-level locking b. database locking d. record-level locking
answer
column-level locking
question
11. In a typical client-server database application, the client is called the ____. a. back end c. portal b. rear end d. front end
answer
front end
question
12. With a ____, a database is located in its entirety on a single computer, such as a server or mainframe computer. a. distributed database system c. centralized database system b. star database system d. ring database system
answer
centralized database system
question
13. The ____ is the most widely used database model today. a. hierarchical database management system b. relational database management system (RDBMS) c. network database management system d. database management system (DBMS)
answer
relational database management system (RDBMS)
question
14. The process of evaluating and correcting the structures of the tables in a database to minimize data redundancy is called ____. a. normalization c. zeroing b. cyclic redundancy check d. zonification
answer
normalization
question
15. To create a query, users can either type a query using SQL or, more commonly, use the query tools built into the DBMS (such as a query design screen or query ____) to more easily build a query. a. command c. wizard b. line d. key
answer
wizard
question
16. The figure above illustrates a formatted ____, created from data contained in a database. a. report c. form b. query d. table
answer
report
question
17. Continuing to evaluate and improve the security measured used with the database is a database ____ activity. a. programming c. implementation b. design d. maintenance
answer
maintenance
question
18. The key characteristics for an OODBMS (including objects, attributes, methods, ____, polymorphism, classes, and inheritance) are similar to object-oriented programming principles. a. migration c. conversion b. adequation d. encapsulation
answer
encapsulation
question
19. With ____, data is stored in single multidimensional database structures (sometimes called data cubes). a. Online Analytical Processing (OLAP) c. MOLAP (Multidimensional OLAP) b. ROLAP (Relational OLAP) d. HOLAP (Hybrid OLAP)
answer
MOLAP (Multidimensional OLAP)
question
20. Web-based database requests are received by the Web server, which then converts the request into a database query and passes it on to the database server with the help of software called ____. a. middleware c. macros b. capsules d. applets
answer
middleware
question
21. ____ has the advantage of high compatibility with many types of databases. It is also an open-source program, available free to all users. a. JavaScript c. CGI (common gateway interface) b. PHP (PHP Hypertext Preprocessor) d. API (application program interface)
answer
PHP (PHP Hypertext Preprocessor)
question
22. Which of the following is the best certification option for James? a. CCP c. ACP b. CBIP d. CDMP
answer
ACP
question
23. James is most interested in becoming a database designer. Another name for this career choice is database ____. a. architect c. programmer b. developer d. administrator
answer
architect
question
24. The JL Group has gathered data on voting habits. In order to make sure that respondents cannot claim to have voted in more elections than is possible given their age, ____ rules can be assigned to the database tables. a. index validation c. DBA validation b. record validation d. dynamic
answer
record validation
question
25. The JL Group is in the process of creating dynamic Web pages to poll politically aware young adults. They are interested in creating scripts that are compatible with many types of databases, so they are using the ____ language. a. CGI c. COBOL b. API d. PHP
answer
PHP
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New