BCIS 2610 Final White UNT
Terms in this set (145)
Database marketing allows companies to ____.
mine customer databases and create marketing lists
____ is a technology that allows users connected to a network to transfer money from one bank account to another.
An ATM initially connects to a(n) ____ through a network.
A(n) ____ stores data on a thin microprocessor embedded in the card.
Many businesses use a(n) ____ to send bills electronically instead of mailing their customers paper statements.
bill presentment process
Which of the following is true of telecommuting, as opposed to a standard office job?
requires more discipline and focus
Which of the following is a good tip for avoiding RSI?
Keep mouse close to the keyboard
Which of the following is an invention of the Industrial Revolution?
Which of the following is an invention of the Information Age?
________ uses computers to test product designs before the physical prototype is built
Computer-aided engineering (CAE)
Which of the following is NOT a component of an MRP system?
A(n) ____ system lets manufacturers purchase and receive componenets just before they are needed on the assembly line
Libraries use the ____ bar code to identify items.
A bar code represents data that identifies the ____.
manufacturer and item number
A(n) ____ records purchases, processes credit or debit cards, and updates inventory.
Which type of criminal database is often made available to the public?
sexually violent offenders
Computers in red-light systems perform all of the following functions EXCEPT ____.
sending an electronic message to the violator
a LoJack device is a wireless _________.
Foreign students with visas to attend U.S. schools must provide personal information to the ____ system.
A(n) ____ system helps track and manage events during a crisis.
The U.S. VISIT database currently stores all of the following types of biometric identifiers EXCEPT
iris or retinal scan
All of the following military technology use GPS except _________.
The practice of conducting polls to gauge public opinion on an issue dates back to the ____ presidency.
Which group of voters is most likely to vote, but least likely to use the Internet?
Americans age 65 or older
Which of the following is NOT true of computerized voting system?
They provide equal access to every citizen.
Which of the following was NOT used to gather the 2000 census?
optical character recognition system
The IRS allows you to do all of the following at its Web site except __________.
Have online chats with a representative.
Which of the following FBI databases contains DNA profiles?
The ______ was established to help gun dealers perform background checks.
What is the use of advanced computer technology to help health care professionals consult with each other and work together on cases, regardless of where the patients, medical professionals, and relevant clinical data are located ?
Which of the following technologies does NOT use satellite links to transmit data?
Humans have approximately 30,000 ____ that define their physical traits and many of their behaviors.
Hundreds of automatic weather stations located in ____ measure weather data and transmit it back to a data collection center
The DART system was developed to track ______.
SETI @ home relies on the concept of ____, in which the collective processing power of one or more computers is used to complete a large processing task.
The Geophysical Fluid Dynamics Laboratory (GFDL) has pioneered ____ research for two decades with the goals of better understanding weather phenomena.
Computer-based patient records are entered, stored, and maintained with the help of a(n) ____ system.
electronic medical record (EMR)
A(n) __________ is a test that records the electrical activity of the heart.
DXplain is an example of a(n) _________ system.
decision support system
Which medical Web site provides a database of reference and abstracts from the National Library of Medicine?
Which medical Web site would be most helpful in providing traveler's health information on specific destinations?
Centers for Disease Control and Prevention
What does a GlucoWatch G2 Biographer monitor?
blood sugar levels
Which of the following is NOT used in computer-aided surgery?
Computer-generated fractals use ____ to create art
A home or business photographer most likely uses the ____ type of digital camera.
In digital cameras, the image is initially focused on a chip called a(n) __________.
One group that completely opposes any manipulation of a digital image is the ____.
___ is a speical effect in which one video image is transformed into another image over the course of several frames
An animation software program can computer the positions between the top and bottom of the animation sequence in a process called ____
Computers process data as ____ that represent on and off states
A(n) ___ creates sound from digital instructions input by the user, either via a standard computer keyboard or devices resembling
Which of the following is NOT a MIDI component?
File ____ involves uploading a music file to a file-sharing network with distortion, silence, or copyright law warnings
Dancers rely on a technology called ____ to record and analyze their dance movements.
Which of the following theatre departments does NOT use CAD software?
Sculptors use ____ to digitally recreate an existing physical object.
After you have created a model for you sculpture, you can use ____ to shape your desired medium.
CNC milling machine
A light curtain and treadles are used in an electronic toll collection system to ensure that ____.
all cars are counted and billed correctly
Modern airplanes rely on ____ technology to control landing gear, spoilers, and other components of the planes.
Which of the following is still performed by human drivers on a Civis bus?
The ____ oversees all air traffic control in the United States
Sabre was the first ____ system to be widely distributed
CAPPS II is a passenger screening system that stores your ticket information in a(n) ____.
Passenger Name Record
A virtual wind tunnel relies on ____ to predict how air will flow around a vehicle
Computational Fluid Dynamics
Which of the following is NOT true of computerized car analysis?
is more expensive than physical testing
The ____ is the most powerful computer in most cars
engine control unit
Collision warning systems use ____ to detect objects.
Smart cars maintain a safe driving interval between your car and other vehicles through a(n) ____ system.
adaptive cruise control
Which of the following is NOT true of today's smart tires?
adjust tire pressure dynamically depending on where you are driving.
OnStar is an example of a(n) ____ system.
call center telematics
An electronic toll-collection system uses a ____ to store basic account information.
What is the primary objection of the courts towards legislation that limits the distribution of objectionable content?
The Government has no right to limit free speech if less restrictive measures are available
Which of the following statements is true of cyberstalking?
Cyberstalkers typically locate their victims in chat rooms, bulletin boards, or newsgroups.
Which of the following ethical viewpoints states that, if any action is not right for everyone to take, then it is not right for anyone to take?
How do news firms counter the ethical concerns over the mixing of advertising links with news stories in a user's search results?
The results pages clearly distinguished the sponsored listing from the other search results
Who receives the largest percentage of the profits made from downloading music files?
Online music provider
What service does the Web site turnintin.com provide?
appraisal of originality of a student's report
Which of the following statements is NOT true of an ethical decision?
It is universal and applies to everyone in a society
The ____ specifies that in the United States, a digital signature has the same weight as a traditional signature written on paper.
Electronic Theft Act
Which of the following statements is NOT true of digital signatures?
they can not be forged
The ____ states that advertising in any medium must be truthful and must not mislead customers.
Federal Trade Commission Act
What is the purpose of the Six/Four software program?
It gives users in countries that monitor internet access permission to connect to the internet through a secure network.
U.S. courts are not yet settled in regards to the fair use of copyright material for ____.
Which of the following is NOT a tenet of the Digital Millennium Copyright Act?
Making ISPs liable for transmitting information over the internet that violates copyright infringement
Creating a ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy
The term _____ refers to the rights of individuals and companies to control how information about them is collected and used
Collecting in-depth information about an individual is known as______
Many web site have a(an)____that discloses how the personal information you provide while visiting that web site or while completing a product registration will be used.
For online shopping, signing up for free offers, discussion groups, product registration, and other activities that typically lead to junk e-mail, use a disposable or _____.
throw-away e-mail address
By______, you instruct companies you do business with that they cannot share your personal data with third parties
______ is the use of video cameras to monitor activities of individuals, such as employees or individuals in public locations, for work - related or crime - prevention purpose.
_______ refers to companies recording of observing the action of employees while on the job
_______ programs can be used to determine if your activities are being monitored by a hacker or other unauthorized individual.
The ____ Act of 2003 implemented regulations for unsolicited e-mail mess and laid the groundwork for a federal Do Not Email Registry.
__________ displays are transparent and can emit light toward the top and bottom of the display surface; the portion of the display that does not currently have an image displayed (and the entire display device when it is off) is nearly as transparent as glass, so the user can see through the screen.
With holographic storage systems, the signal bean passes through a device called a _____ light modulator (SLM) which translates the data's 0s and 1s into a
One recent development in new technology is ____ that can remove contaminants from water sources.
A(n) _____ computer uses light, such as from laser beams or infrared beams, to perform digital computations
Power over Ethernet (POE) allow both____ power and data to be sent over standard Ethernet cables
Developed in the late 1990s, Wi-Fi is a family of wireless networking standards that use the ____IEEE standard.
The speed and distance of a Wi-Fi network depends on a variety of factors, such as the particular Wi-Fi standard and ____________.
all of the above
______ applications that exist in some form today include intelligent agents, expert systems, neural networks, and robotics.
_____ provide help or assistance for a particles application program some can detect when the user might be having trouble with the program and automatically offer appropriate advice
The _____ web is a predicted evolution of the current web in which all web content is stored in formats that are more easily read by software applications and intelligent agents
When using a(an) _______system. It's important to realize that its conclusions are based on the data and rules stored in its knowledge base, as well as the information provided by the users
_____ is the process of connecting the brain with a computer, such as implanting electrodes directly into the brain to restore lose functionality to or facilitate the communication of severely disabled individuals.
_______ is involved with the development of robotic prosthetic arms that feel, look, and perform like natural arms; which will be used by military personnel who are injured in the line of duty.
An emerging military robotic application is the ____suit which is a wearable robotic system designed to give an individual additional physical capabilities and protection.
To supplement backup procedures, businesses and other organizations should have a(n) ____
disaster recovery plan
A _____ is a collection of related Web pages linked together
Web page are viewed through a_____, software that interprets HTML code and display it as the tax and images you see on a web page.
_____ programs make web design much faster by showing you what your page will look like in a web browser as you are designing it
When you publish your site, you copy the web pages and related files from your computer to a _______.
The figure above shows an HTML page with a ____ applied.
The Web site shown in the figure above refers to CSS which stand for _____.
cascading style sheet
The view that most resembles the web site your visitors see is___ view
A ______ is an HTML element that allows visitors to send information from a
Expression Web & other web design software programs can create_____.
Both A & B
The best tools for planning your page layout are ______ and your brain.
Paper, pen or pencil
Files extension such as avi, mov, qt, mpg, and wmv belong to___ files.
The ____ site is the folder on the web server that contains your web site files once you publish them
you can add text to your web page by _____
all of the above
The inventors of the web also came up with a way to navigate from one document to another called_____
All external links must start with _____, but expression web will fill it in for you if you forget.
Computer crime is something referred to us_________.
_______ occurs whenever an individual gains access to a computer, network, file, or other resource without permission.
_____ refers to the act of breaking into another computer system.
______ the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.
_____ are flash memory drivers that are inserted into a computer to grant access to a network, supply Web site user names and passwords and provides other security features.
USB security token
______ identifies users by a particular unique biological characteristic
Biometric access system
______ uses a single secret key to both encrypt and decrypt the file or message.
Private key encryption
______ refers to acts of malicious destruction to a computer or computer resource.
A computer that is controlled by a hacker or other computer criminal is referred to as a ____
_____ is a generic term that refers to any type of malicious software
A_____ is a malicious program that masquerades as something else _usually as some type of application program.
Worms and other types of malware that are designed to take advantage of a security hole and are released at a time when no security patch to correct the problem is available are referred to as _________.
The best protection against Internet offer scans and other dot cons is _______.
____can be defined as repeated threats or harassing behavior via e-mail or another Internet communications method.
The ___ implemented in 2001, grants federal authorities expanded surveillance and intelligence-gathering powers, such as broadening their ability to obtain the real identity of Internet user and to intercept Internet communication.
USA Patriot Act
Our networked society has raised a number of ____ concerns
To ensure the data on a stolen or last computer cannot be read by an unauthorized individual ____ can be used.
Full Disk Encryption (FDE)
The data on a (an) ________USB flash memory drive cannot be accessed until the user is authenticated.
________— typically portable computer — are designed to withstand much more physical abuse than a conventional computer.
Users who want their desktop computers to remain powered up when the electricity goes off should use _____ units, as shown in the accompanying figure.
uninterruptible power supply
The ____ Act of 2003 implemented regulations for unsolicited e-mail mess and laid the groundwork for a federal Do Not Email Registry.