A backup |
Your database was damage due to hardware failure. What can you use to restore it? |
Column |
a user of a database such as that pictured in the accompanying figure refers to a field as what? |
Data dictionary |
A DBMS uses which of the following to perform validation checks? |
Data types |
include: 1) yes/no fields can be used to create a field with true or false options 2) autonumber data types assigned numbers automatically to each record 3) object data types are used for photos, audio, or video. |
OODB (object oriented database) |
which the following Stores Data in objects? |
Validation |
what is the process of comparing data with a set of rules for values to find out if the data is correct? |
Redundancy |
each department has its own files, so the same data might be stored in multiple files. |
Backup |
with regard to an entire database, they should be done on a regular basis. |
Database |
a collection of data organized in a manner that allows access, retrieval, and use of that data. |
Database wizard |
the instructions that control how the data in the database is connected |
Data integrity |
identifies the quality of data in a database |
In a database |
each row has a primary key and each column has a unique name |
In the relationships |
in a relational database, where does the only data redundancy exist? |
Relationship |
a user of a database such as that pictured in the accompanying figure refers to a record as what? |
GI GO (garbage in garbage out) |
this term refers to data integrity |
Home Network |
home users connecting multiple computers and devices together into a system. |
Peer to peer Networks |
1) each computer has the full responsibilities and capabilities 2) they are simple, inexpensive networks that typically connect fewer than 10 computers 3) each Computer Stores files on its own storage device |
System |
kind of software that consists of the programs that control or maintain the operations of a computer and its devices. |
RFI D |
this network uses radio signals to communicate with radio tag placed in or attach to an object, animal, or person. |
Podcast |
an _____is an audio file distributed to downloads or feeds. |
Blog |
______ is an informal web site of time-stamped articles written in a journal format. |
Social network |
______ is a web site where members share interest, ideas, and information. |
Source |
if you are sending an E-mail message from your lab talk to a classmate, the laptop is the______. |
Wiki |
______is an collaboration website that people use to communicate with each other. |
Star network |
kind of network in which all the computers and devices (nodes) connect to a central device. |
Desktop operating systems |
include 1) windows 2) OS X 3) chrome OS |
Bandwidth |
the amount of data, instructions, and information that can travel over a communications channel |
NIC (network interface card) |
computers need this hardware to connect to a network |
I S P |
company that offers Internet access to individuals and businesses |
Router |
this device connects two or more networks and directs the flow in remission along the network. |
Peer-to-peer |
Network Technology best suited to networks of 10 or fewer commuters and each computer is equal to others and maintains its own operating system and application software |
PAN |
lewd two is a technology often used in this type of network |
Version 3.1 |
windows did not become popular until ____was released in 1992 |
Disk cleanup |
to delete unnecessary files on a hard disk use ________ software. |
Update |
and operating system change that fixes Bugs, improves security, or enhances features is called _____. |
Operating system |
the ____ determines whether you can run two programs at the same time or connect a computer to a network. |
DOS (disk operating system) |
the first personal computer operating system was named _____. |
Latency |
the time it takes a signal to travel from one location to another on a network. |
Two types of Systems Software |
include 1) operating systems and 2) tools that enable you to perform maintenance tasks |
Multi user |
networks, servers, mainframes, and supercomputers allow hundreds to thousands of users to connect at the same time, and thus their operating systems are referred to as _______. |
Allow hundreds of thousands to connect |
networks, servers, mainframes, supercomputers |
Queue |
where multiple documents lineup in the printer |
Client/server |
network architecture in which one or more high-powered computers provide resources or services to other computers on the network |
Extranet |
type of network that allows an organization to permit outsiders, like customers or suppliers, to access part of its network. |
VPN (virtual private network) |
a private, secure path crossed a public network (usually the Internet). |
Intranet |
a private corporate network for use by employees to coordinate emails and communications. |
Single user/single tasking |
kind of operating system that allows only one user to run one program or app any time |
Embedded |
Electronic Devices such as card readers use ______ operating systems |
Network |
a server, also called a ______, operating system is a multi user operating system because it controls a central computer that can support many users |
Mobile |
operating system that has features similar to a desktop operating system, but is simpler and significantly smaller. |
Multipurpose |
UNIX is called an ____________ operating system because it can run on a desktop PC or a server |
Personal four desktop |
operating systems installed on a single computer are called ________ operating systems. |
Phases |
system development life cycles often group many activities into larger categories called _____. |
Traditional system development phases |
1) planning 2) analysis 3) design 4) implementation 5) support and security |
IT consultant |
a professional who is hired based on expertise in a specialized area of computers, including service and advice. |
Operational feasibility |
measures how well the proposed system will work |
Direct conversion |
+a user stops using the old system and began using the new system on a certain date. +Disadvantages of this kind of conversion is that it’s extremely whiskey and can disrupt operations seriously if the new system does not work correctly the first time. |
Advantage of customs software |
it matches and organizations requirements exactly |
Detailed design |
during this phase a systems analyst carefully designs every menu, screen, am report specified in the requirement. |
Phased conversion |
in this conversion each location converts to a new system at a separate time |
System development life cycle |
set of phrases that developers use to build an information system |
Scope creeep |
during_________ one activity leads to another that was not originally planned |
Design |
consists of two major activities: 1) if necessary, acquire hardware and software and 2) develop all of the details of the new or modified information system |
information systems |
a collection of hardware, software, data, people, and procedures that work together to produce quality information |
Project request |
in large companies, users write a formal request for a new or modified information system this is called a _______. |
True |
client-side and server-side are types of scripts |
True 1 |
accessing a web database requires a browser to run software to assess the database, but it does not require a special type of database |
False |
HTML five does not support modern web media |
False 1 |
the trend is for mobile browsers and web sites to rely on the use of plug-ins such as flash even more heavily in the future |
False 2 |
displaying data from a web database by creating web pages on demand, retrieving the most current data, is called static web publishing |
CIS 150 Final (FROM QUIZZES)
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price