Final Flashcards
Which of the following input techs has been historically used for entering text and numbers on computers?
QWERTY keyboard
Which of the following encoding formats is the standard coding for e-mail over the internet?
MIME
A _____ is a type of program that translates a program’s source cose into machine language and executes one statement at a time
interpreter
which of the following scanning techs is used by the banking industry to read data, account numbers, bank codes, and check numbers on preprinted checks?
magnetic ink character recognition
A(n) ______ occurs if a read/write head for some reason touches one of the disks in a hard drive, leading to a loss of data.
head crash
a group of inexperienced computer operators cause the loss of valuable info. this info loss can be classified as one caused due to _____
accidents
wikileaks is a famous not-for-profit whistle-blowing website. mastercard and visa stopped payments to wikileaks after a series of leaks by the site. an anon group attacked the websites of both mastercard and visa reacting to this. these attackers, who tried to protect wikileaks, can be called ______
hacktivists
which of the following terms refers to a computer, data, or network site that is designed to be enticing to crackers so as to detect, deflect, or counteract illegal activity?
honeypot
the official website of the iranian govt was made unreachable by foreign activists seeking to help the opposition parties during the 2009 iranian election protests. web sites belonging to many iranian news agencies were also made unreachable by the activists. this cyber protest is an example of a(n) ______ attack
denial of service
identify the term that represents the dubious practice of registering a domain name and then trying to sell the name for big bucks to the person, company, or organization most likely to want it.
cybersquatting
a break even analysis
identifies at what point tangible benefits equal tangible costs
which of the following is true for tangible costs?
they are relatively easy to quantify
processing logic is often expressed in ______, which is independent of the actual programming language being used
pseudocode
the total cost of ownership of a system refers to _______
the total cost of acquisition and all costs associated with use and maintenance of a system
system efficiency is the extent to which a system _____
enables people to do things faster or at lower cost
the gap between those individuals in our society who are computer literate and have access to info resources like the internet and those who do not is referred to as the _____
digital divide
info accessibility focuses on ___
defining what info a person or org has the right to obtain about others
doing things faster is associated with info systems for _____
automating
______ decisions can be programmed directly into operational info systems so sthat they can be made with little or no human intervention
structured
_____ is the process of analyzing an org’s activities to determine where value is added to products and/or services and what costs are incurred for doing so
value chain analysis
which of the following statements is true about firms pursuing a home replication strategy?
the focus their domestic customers’ needs and wants and merely export their products to generate additional sales
____ are techs, products, or services that eventually surpass the existing dominant tech or product in a market
disruptive innovations
the prediction that the number of transisters on a chip would double about every 2 years is known as _____
moores law
companies following a ____ business strategy choose to operate solely in the traditional physical markets
brick and mortar