W41-Characteristics of IT Systems-General Flashcards
Q17. Analysis of data in a database using tools which look for trends or anomalies without knowledge in advance of the meaning of the data is referred to as
a. Artificial intelligence
b. Data mining
c. Virtual reality
d. Transitory analysis
Q17. (b) data mining uses tools which look for trends or anomalies without such advance knowledge.
Q18. The most common type of primary storage in a computer is referred as
a. CMAN
b. RAM
c. ROM
d. Flash memory
Q18. (b) RAM (Random Access Memory) is the most common computer memory which can be used by programs to perform necessary tasks; RAM allows information to be stored or accessed in any order and all storage locations are equally accessible.
Q19. A set of step-by-step procedures used to accomplish a task is a(n)
a. Algorithm
b. Compilation master
c. Linux
d. Transistor
Q19. (a) an algorithm uses a step-by-step approach to accomplish a task.
Q20. Which of the following compiles a complete translation of a program in a high-level computer language before the program is run for the first time?
a. Visual Basic
b. Java
c. Algorithm
d. Compiler
Q20. (d) a compiler decodes instructions written in a higher order language and produces an assembly language program.
Q23. In a spreadsheet, each specific cell may be identified by a specific
a. Address
b. Column
c. Row
d. Diagonal
Q23. (a) each cell has an address, composed of a combination of its column and row in the spreadsheet.
Q27. Which term below describes the technology that allows multiple operating systems to run simultaneously on a single computer?
a. Client
b. Mainframe
c. Linux
d. Virtualization
Q27. (d) virtualization software allows a single computer to run multiple operating systems simultaneously.
Q28. What type of secondary storage device requires no moving parts for read/write operations?
a. Magnetic tape
b. Compact discs
c. Solid State drives
d. RAID
Q28. (c) solid state devices store data on microchips and not a medium that must move to write or read data.
Q30. The wireless input device that is used for inventory control and similar to bar-codes technology but does not require line-of sight access is
a. MICR
b RFID
c. Touch screen
d. Point-of-sale recorders
Q30. (b) as Radio Frequency Identification (RFID) tags do not need to be seen by RFID readers to work.
Q32. The online analytical processing term that represents a combination of systems that help aggregate, access, and analyze business data and assist in the business decision-making process is
a. Artificial intelligence
b. Data mart
c. Decision support system
d. Business intelligence
Q32. (d) as business intelligence is the combination of systems that help aggregate, access, and analyze business data.
As artificial intelligence deals with relatively structured decision making in many areas, not specifically business. As a data mart may be used in the process of business intelligence. As decision support system are used in a variety of business and non-business decision-making situations.
Q34. A current day instruction to a computer such as “Extract all Customers where ‘Name’ is Smith” would most likely relate to a
a. First generation programming language
b. Fourth generation programming language
c. Seventh generation programming language
d. Ninth generation programming language
Q34. (b) fourth generation programs ordinarily include instructions relatively close to human languages-such as the instruction in this question.
Q35. Several language interfaces exist in a database management system. These typically include a data definition language (DDL), a data control language (DCL), a data manipulation language (DML), and database query language (DQL). What language interface would a database administrator use to establish the structure of database tables?
a. DDL
b. DCL
c. DML
d. DQL
Q35. (a) DDL is used to define (determine) the database.
DCL is used to specify privileges and security rules. DML provides programmers with a facility to update the database. DQL is used for ad hoc queries.
Q36. Users making database queries often need to combine several tables to get the information they want. One approach to combining tables is known as
a. Joining
b. Merging
c. Projecting
d. Pointing
Q36. (a) joining is the combining of one or more tables based on matching criteria. For example, if a supplier table contains information about suppliers and a parts table contains information about parts, the two tables could be joined on supplier number (assuming both tables contained this attribute) to give information about the supplier of particular parts.
Q37. User acceptance testing is more important in an object-oriented development process than in a traditional environment because of the implications of the
a. Absence of traditional design documents
b. Lack of a tracking system for changes
c. Potential for continuous monitoring
d Inheritance of properties in hierarchies
Q37. (d) user acceptance testing is more important in object-oriented development because of the fact that all objects in a class inherit the properties of the hierarchy, which means that changes to one object may affect other objects, which increases the importance of user acceptance testing to verify correct functioning of the whole system.
Q38. A company’s management has expressed concern over the varied system architectures that the organization uses. Potential security and control concerns would include all of the following except:
a. Users may have different user ID codes and passwords to remember for the several systems that they use
b. There are difficulties in developing uniform security standards for the various platforms
c. Backup file storage administration is often decentralized
d. Having data distributed across many computers throughout the organization increases the risk that a single disaster would destroy large portions of the organization’s data
Q38. (d) the distribution of data actually decreases this risk so this would not cause a control concern; it is a potential advantage to distributed systems of various architectures versus centralized data in a single mainframe computer.
Q39. All of the following are methods for distributing a relational database across multiple servers except:
a. Snapshot (making a copy of the database for distribution)
b. Replication (creating and maintaining replica copies at multiple locations)
c. Normalization (separating the database into logical tables for easier user processing)
d. Fragmentation (separating the database into parts and distributing where they are needed)
Q39. (c) normalization is a process of database design, not distribution.