Study sets, textbooks, questions
Upgrade to remove ads
Intro to CIS Final Exam
Terms in this set (300)
Which general purpose programming language is used to develop applications for Google's Android smartphone?
Are used to grade standardized tests, including the SAT and GMAT tests, and to record votes in elections.
Optical mark recognition (OMR) systems
Hardware utilization can be improved by logically dividing the resources of a single physical server to create multiple logical servers. This approach is known as.
Polly is putting in a request that new software be purchased for the members of her department and has to specify the number of client access licenses required, which is equal to the number of devices that will access the new software at one time. Which type of end user license is being purchased?
Suppose you wish to run two different operating systems on one server. You can accomplish this by using.
Compared with the traditional licensing model in which users purchase and install software, SaaS
offers less expensive upgrades and new releases
The component of a computer that provides the CPU with a working storage area for program instructions and date is called the
Which type of data center offers the highest and most predictable level of performance through redundant hardware, power related devices, and alternate power sources?
What is typically the greatest barrier to acceptance of open-source software in large commercial organizations?
concerns about software support
The use of middleware to connect disparate systems has evolved into an approach for developing software and systems called
service oriented architecture
Device provides data and instructions to the computer and receives results from it
Monte's employer provides SaaS applications for its staff to use for their daily job functions. This means that
Monte can sign in to use these applications from any computer or device
Is a computer employed by many users to perform a specific task, such as running network or Internet applications?
IS professionals at PKO Bank Polski S.A. use an approach where they logically divide the resources of a physical server to reduce hardware related costs, cut unscheduled downtime for applications, and the reduce the time spent on problem solving. What strategy do they use?
Julian has chosen to use open source to help run his small business. He believes it is often more reliable and secure than commercial software because
open-source software bugs are detected and fixed more quickly
is an open-source operating system whose source code is freely available to everyone.
New cars come with onboard computer systems that control antilock brakes, air bag development, fuel injections, etc. They run operating system software known as.
an embedded operating system
Operating virtual servers requires software to control the host processor and resources, allocate necessary resources to virtual machines, and prevent virtual machines from disrupting each other. What type of software performs these functions?
When choosing from various types of flat panel displays choose an _______ for the lowest power consumption.
organic light-emitting diode (OLED) display
CPU clock speed is the predetermined rate at which the processor
produces a series of electronic pulses
One of the disadvantages of proprietary software is that
it can take a long time and significant resources to develop the required software features
3D printing is
used to make solid objects from filaments or powder
The Assembly and C programming languages are used to build software that controls a computer's hardware, known as?
All of the following are examples of activates performed by an operating system except
providing work processing capabilities to users
Is the use of collection of computers, often owned by many people of different organizations, to work in a coordinated manner to solve a common problem?
Which of the goals of green computing, if implemented successfully, would be the best practice for reducing the hazards posed by e-waste in the United States?
reduce the use of hazardous material
When a business wishes to move away from hosting it own applications, a solution that offers many advantages in to use?
software as a service
Carson's supervisor has asked him to review a variety of portable computers for possible purchase for their company's employees. Which of the following should Carson not consider buying?
Currently, though many different programming languages are used. most software is developed using?
an integrated development environment
One advantage of proprietary software versus off-the-shelf software is that?
the software provides a company with a competitive advantage by solving problems in a unique manner
Leticia's open-source word processing application is not working properly. How can she get help troubleshooting the problem?
post her question to an Internet discussion area
Expedia, Inc. is a travel company that has developed an online payment function with huge number of features. This payment function has been subdivided into a series of much smaller and more logical like sets of microservices. Expedia, Inc.?
can quickly add new microservices to provide new services for their payment function as needed
IBM's first 64-bit enterprise operating system, is capable of handling very heavy workloads
Tim is a software developer who codes using a higher-level language utilizing a compiler. Which is true of Tim's programs?
the compiler translates the programs into a machine language
An information system that operates in the ________ sphere of influence supports teamwork between two or more people who work together to achieve a common goal, regardless of where those team members live.
Application software includes a wide range of built-in functions for statistical, financial, logical, databases, graphics, and date and time calculations?
Server virtualization offers significant cost saving because
it increases the total operating capacity of each physical server
All of the following are examples of someone using personal productivity software expect?
Callie entering a customer's order into a restaurant's ordering system
In the data center for Mark's company, one server is dedicated to each application. In contrast, the data center for Jack's company uses virtualized servers. Which statement would you expect to be true?
jack's company pays for fewer software licenses
The simultaneous execution of two or more instructions at once by a computer is known as?
Which of the following is not one of the common purposes of utility programs?
Is an approach concerned with the efficient and environmentally responsible design, manufacture, operation, and disposal of IS-related products?
When Peter purchases software
he is acquiring a license to use it on his computer
As part of a team that develops software using the SOA approach, Josie is helping to write an API set. Why is this an important task?
It can help manage security, enforce corporate strategies, and control mobile content streaming.
One of the advantages of off-the-shelf software is that?
the initial cost is lower because the software firm can spread the development costs over many customers
A firm that models, simulates, and analyzes large amount of data quickly by using computers to execute the same task on multiple processors simultaneously is employing?
Which of the following strategies is the least effective way to implement green computing?
export used electronics to companies in underdeveloped countries
A type of memory whose contents are not lost if the power is turned off or interrupted is said to be?
A SaaS provider such as Oracle or SAP manages service levels and availability. This is advantageous because?
it allows SaaS customers to increase the number of users without expanding thier communications
Traditional data centers require huge amounts of energy because?
they constantly run powerful air-conditioning systems
Which statement about maintaining accurate and complete data is true?
Data cleansing may involve standardizing data
Raw facts such as a social security number or catalog item number for a shirt are known as?
Allie has noticed that people at her company spend a lot of time researching the reasons for a correcting error in the date they must use for their job functions. Usually when mistake is discovered, it has already been propagated into multiple places, requiring a considerable clean-up effect. Allie realizes that improving the quality of the data at her firm would change this situation by?
Each attribute in a relational database model can be constrained to a range of allowable values called a?
Julie is a non-IS employee who is responsible for, among other tasks, creating and maintaining consistent reference data and master data definitions and for analyzing data for quality. Coworkers consult with Julie to find out what data to use to answer a business question. Julie is a?
A key purpose of data normalization is to eliminate.
Because SQL databases confirm to ACID properties?
their database transactions are processed reliably
To ensure reliability and integrity, SQL databases conform to four specific properties. Which of the following is not one of those four properties?
How does data normalization improve the performance of relational databases?
by reducing their required storage space
Why is cleansing data so that it is accurate, complete, and relevant important to an organization's sucess?
information derived from the data is used in decision making
At Coast-to-Coast Moving and Van Lines, Ryan is responsible for managing the flow of the company's data, from initial acquisition of new data to deletion of old, outdated. Ryan is involved in?
data lifecycle management
Mike chooses a DaaS arrangement for his small business because itreduces costs. Why is DaaS less costly then the traditional alternative?
no in house database installation, maintenance, or monitoring
A consultant hired to evaluate Blue Street Bank's business processes and controls judges that they are haphazard and incomplete. Bess, an executive at the bank, wisely says that?
they must establish more rigorous management practices to govern their data
Which of the following tools is a special purpose programming language for accessing and manipulating data stored in a relational database that many programmers can readily understand and use?
Which component if the data hierarchy is ranked just below the database and represents a collection of similar entities?
One method of data cleansing is to
cross check data items against a validated data set
Rigorous management processes are need to govern data in order to ?
support haphazard or incomplete business processes
Is a collection of instructions and commands used to define and describe data and relationships in a specific database?
data definition language
Ryliegh knows that it is crucial to ensure that key business decisions are made using high-quality data. She argues that this one reason why her firm should invest in?
improved data management
Haley needs to query her firm's databases, Jeff need to generate a report for his next project status meeting, and Karen needs to make some modifications to update the data in the databases. Which of the following tools can they all use to complete their current task?
data manipulation language
A data governance team puts in place a set of controls and audit procedures in order to?
ensure ongoing compliance with organizational data policies and government regulations
When john uses his organization's SQL databases, records are locked when he initiates a transaction to prevent other transactions from modifying them until his transaction either succeeds or fails. This maintains data?
Is a characteristic or set of characteristics in a record that uniquely identifies the record.
What is the term for the awareness and understanding that are required to define relationships among raw facts by organizing and processing them?
Because Airbnb needs to support a rapid growth in its number of users but prefers to hire a service to organize and configure its information systems infrastructure it relies on an?
database as a service
Billing errors, even small ones, can make customers quite upset. Therefore, maintaining high quality data with regards to product pricing, discounts, and sales taxes benefits business most directly by?
increasing customer satisfaction
Which statement accurately describes a data governance team?
it defines processes for protecting data from cyberattacks, inadvertent destruction, or theft
A DaaS arrangement can be especially cost effective for business that?
have a fluctuating needs for database storage capacity
An important responsibility of the data governance team is to?
specify who is accountable for each portion or aspect of the data
Which of the following statements is ture of database?
it helps companies analyze information to identify new market opportunites
Mark creates a new relational database table that includes only five of the seven columns in the existing products table. This action is known as?
Penelope decided to enroll in Amazon Relational Database Service (Amazon RDS), which allows her to set up and operate her choice of MySQL, Microsoft SQl, Oracle, or Postagre SQL databases in the cloud. What kind of service is Amazon RDS?
database as a service
One thing the document and content management, data warehousing, business intelligence, and reference and master data management have in common have in common is that they are functions of?
When rules and relationships are set up to organize raw facts, creating value beyond that of those individual facts, this produces?
High quality data can increase sales by facilitating cross selling which involves
inviting customers to purchase an item related to what they are primarily interested in
Brenda uses SQL database that confirms to ACID properties at her job. She is happy to know this guarantees
After Lindy's team improves their department's data management by implementing rigorous data management processes
the quality of thier data improves as well
eliminates redundancy and ensures data dependencies are sensible
Which of the following DBMS elements can be represented in a visual diagram or defined by a DDL
Molly's company is having problems with their data integrity because multiple database users sometimes access and alter a record at the same time. A database management system could eliminate these problems by implementing
Walter mention to his manager that it would simplify the maintenance of their firms relational data if changes me to the data attributes in a single table would automatically be made throughout the database. What would be the best advice?
Is an approach that starts by investigating the general data and information needs of an organization at the strategic level and then examines more specific data and information needs for the functional areas and departments within the organization
enterprise data modeling
Because of Felicity's job title she has broader authorization to access, use, and update company data then Charity, a colleague with a different job title. Who developed the standards that define their authorization levels?
data governance team
Within a SQL database, achieving the property of atomicity means that attributes?
are values that have no component parts
A DaaS arrangement?
reduces hardware, software, and staffing related costs for the client
One factor driving the need for data management is the need to meet external regulation designed to?
manage risk associated with the mistreatment of financial data
Data quality mangement, data architecture management, and data development are three of the many functions of?
Kyle works for National Sporting Goods, where he manages critical data elements, such as identifying and acquiring new data sources, creating consistent reference data, and analyzing data for quality. Kyle is a _______.
Which process consists of one application program following a logical access path (LAP) and then a DBMS following a physical access path (PAP)?
What integrated set of functions defines the processes by which data is obtained, certified fit for use, stored, secured, and processed in such a way as to ensure that the accessibility, reliability, and timeliness of the data meet the needs of the data users within an organization?
During the load phase of the ETL process, _____.
the data is checked against the constraints defined in the database schema
Which of the following is NOT a recognized BI and analytics technique?
Online transaction processing
Which of the following is NOT a component required for effective BI and analytics?
process for obtaining data, certifying it is fit for use, and storing it securly
Which of these analysis methods describes neural computing?
historical data is examined for patterns that are then used to make predictions
Suppose you have access to quantitative data on populations by ZIP code and crime rates. You wish to determine if there is a relationship between the two variables and display the results in a graph. Which BI tool will be most useful?
data visualization tool
Which step of the ETL process has the goal of collecting source data from all the desired sources and converting it into a single format suitable for processing?
One of the goals of business intelligence is to _________.
present the results of analysis in an easy to understand manner
The use of in-memory databases for processing big data has become feasible in recent years, thanks to _____.
the increase in RAM capacities
One key difference between a relational database and a NoSQL database is _____.
the way data storage and retrieval are modeled
A hospital system that wants to utilize big data can use HIPAA regulations to help them _____.
identify which data need to be protected from unauthorized access
Jan is using her firm's data warehouse. If she is starting from monthly sales data, and wishes to get weekly sales data, she should use the ___ feature.
The purpose of business intelligence is to _____.
support improved decision making
From which vendor is the BI product Business Objects available?
You are to advise XYZ Corporation so that their BI and analytics efforts are fruitful. Which among the following is the most crucial advice of all?
management must have a strong commitment to data driven decision making
Why is an effective ETL process essential to data warehousing?
Dirty data can result in incorrect or misleading statistics used for decision making
Which is a true statement regarding self-service BI and analytics?
a well-managed program allows technology professional to retain ultimate data governance
To identify and make predictions about various alternative scenarios, a manager would use _______.
Some people are alarmed that big data applications allow organizations to develop extensive profiles of individuals without their knowledge or consent. This represents which type of concern related to big data?
What does Hadoop's Map procedure from its MapReduce program do?
filters and sorts
Which of the following events is an example of a transformation that might occur during the second stage of the ETL process?
a sales district is substituted for a customer's street address
Donna is a member of a team trying to select the best type of database for a business problem. If the database must handle a variety of data, she would like to store the data on a group of servers, and the data structures must be very flexible, what would you suggest?
A NoSQL database would likely be a better fit than relational database
Data scientists are a necessary component to ensure an organization's business intelligence and analytics efforts are effective because they _____.
pull together knowledge of the business and data analytics tools and techniques
Jerome recommends that his company's IS team consider moving from a database on secondary storage to an in-memory database because the in-memory database would provide _____.
faster access to data
One challenge presented by the volume of big data is that _____.
business users can have a hard time finding the information they need to make decisions
Suppose your employer has four manufacturing units, each with its own data operations. They are considering using BI and analytics tools. Which of the following is a valid recommendation regarding the BI and analytics initiative?
ensure that an effective company wide data management program including data governance is in place
What determines the size of words in a word cloud?
frequency of occurrence of the word in source documents
What open-source software framework includes several software modules that provide a means for storing and processing extremely large data sets, organized into two primary components?
____ is the last phase of the six-phase CRISP-DM method.
Which of the following is NOT considered a component of business intelligence?
data transaction processing
Hadoop processes data using a Java-based system called _____.
Which of the following is IBM's BI product?
Cognos business intelligence
Between 2017 and 2025, _____.
the volume of data in the digital universe is expected to grow tenfold
Graph NoSQL databases _____.
are well suited for analyzing interconnections
Which statement about Hadoop is correct?
Hadoop's HDFS divides data into subset and distributes them onto different servers
Self-service BI and analytics can exacerbate problems by _____.
removing checks and balances on data preparation and use
A _____ is a subset of a data warehouse that is used by small- and medium-sized businesses and departments within large companies to support decision making.
The Amazon DynamoDB and Oracle NoSQL Database products both support which data storage and retrieval models?
document and key value
Barry's job responsibilities include helping maintain a large database that holds business information from over a dozen source systems, covering all aspects of his company's processes, products, and customers. This database contains not only enterprise data but also data from other organizations. Barry works with a(n) _____.
Mollie has observed that her company's leadership lack a strong commitment to data-driven decision making. As a result, when she learns that her company will be initiating a business intelligence and analytics program, she anticipates that _____.
her company will miss out on the real value of their BI and analytics
Because they must deal with large quantities of data from so many different sources, IS employees at financial institutions may be at increased risk of failing to comply with government regulations designed to prevent money laundering, such as the _____.
bank security act
A database system that stores the entire database in random access memory is known as a(n) _____.
in memory database
Jamie's corporation comes under scrutiny by the media when former employees allege that the IS department failed to correctly identify which data needed protection from unauthorized access. These accusers say that this organization is not ensuring its big data is _____.
Once customer orders are organized into queues based on product ID, the component of the Hadoop software that performs a summary operation, such as determining how frequently each product was ordered, is the _____.
A well-designed series of rules or algorithms is a key component of which stage of the ETL process?
Which statement regarding processing task completion using Hadoop's MapReduce program is correct?
MapReduce employs a JobTracker residing on the master server and TaskTrackers residing on other servers
One difference between NoSQL and relational databases is that _____.
NoSQL datebases have greater horizontal sealing capabilty
Which of the following is the LEAST essential characteristic for success as a data scientist?
business leadership skills
An important role of the data scientist is to _____.
communicate his or her findings to organizational leaders
During which step of the ETL process can data that fails to meet expected patterns or values be rejected to help clean up "dirty data"?
Which of the following is a potential disadvantage of self-service analytics?
it can lead to over spreading on unapproved data sources and business analytics tools
Which of the following factors is the same for an organization's intranet and extranet?
Liesel is an entrepreneur, and she'd like to publish a Web site for her small business. Liesel _____.
can use hosting services
One reason AT&T and Verizon have plans to expand their 5G networks is that _____.
they can support many more devices at one time than 4G networks
Marcus is a developer hired to write code that dynamically pulls data from a database stored on a host computer in order to customize Web site content for individual users. He is engaged in _____.
server side programming
Web servers must be programmed to _____.
recieve and process user requests
Which statement about 4G wireless communications is correct?
eventually 4G will make worldwide roaming as well as universal access possible
Why is managing a typical large network in today's current network environment a labor-intensive and error-prone effort?
network devices must each be configured individually
Corporate intranets _____.
allow all sorts of documents to be converted to electronic form for employee access
What very short-range wireless connectivity technology enables exchange of data over a few inches of space between two devices, such as a smartphone and point-of-sale terminal?
near field communication (NFC)
Banks monitor their automated teller machines from a central location, which receives status messages over the machines' network, using a form of _____.
network management software
Preston wants to build some HTML and image files promoting his business and place them on a Web server. He wants to _____.
create a Web Site
A network built using Web technologies that links selected resources of a company's internal corporate network with its suppliers, customers, or other business partners is called a(n) _____.
The World Wide Web uses the _____ Protocol for transmitting content.
Joan's organization has just set up a corporate intranet. In order to use the intranet effectively, most likely Joan _____.
can rely on her familiarity with Internet technology
Hannah needs to create a Web site to advertise her catering services. Which of the following statements is FALSE?
Hannah must set up a server computer before publishing her Web site
Matthew is a developer who uses a combination of programming languages to create and run programs for the Web. He has access to a rich library of code for building XML Web applications, which he often finds helpful. Matthew develops Web services using _____.
the .Net platform
Stacey is developing code that will enable users of her software to display the customized text and images sent by Web servers as Web pages. She is engaged in _____.
client side programming
Compared with 4G networks, 5G networks _____.
transmit more data
Which of the following is used to create a program that runs on a Web server and deals with generation of the content of a Web page to satisfy an end-user's request?
server side programming
The four major U.S. wireless network operators have expanded their 4G networks using a standard for wireless communications for mobile phones based on packet switching. This standard is known as _____.
long term evolution
As Frida is using a company database application, her computer transfers information securely by encapsulating traffic in IP packets and sending them over the Internet. Frida _____.
is likely logged in to her company's intranet
The World Wide Web uses a networking approach wherein many end-user computing devices request and receive services from host computers on the network, which is known as _____.
When ProMedica's data centers, which consisted of some 3,500 servers and numerous hubs, switches, and routers, were networked together and managed as one, this health care organization needed to change their network architecture. To make these network and data center changes faster, easier, and less risky, ProMedica avoided having to physically change all their network devices by implementing _____.
software defined networking
In a typical network, routing and switching of data and enabling access to applications are performed by hundreds or thousands of _____.
When Web site developers choose to use a modular approach to Web design, which of the following languages do they use to define the design and layout of Web pages?
In a _____, all network devices are connected to a common backbone that serves as a shared communications medium.
Early 5G users should be aware that their coverage may be limited compared with 4G coverage, at least initially. Why will 5G networks likely be less widespread at first?
more cell towers will need to be installed
The ancestor of the Internet was _____.
_____ is the standard page description language for Web pages.
Hypertext Markup Language (HTML)
Which of the following is a markup language for defining the visual design of a Web page or group of pages?
Cascading style sheets (CSS)
Phil is preparing to publish a Web site he just created and researches his options. He learns that _____.
some Web hosts offer domain name registration services
Popular tools for creating Web pages and managing Web sites _____.
can auto generate code for Web pages
Which piece of network hardware keeps a record of the MAC address of all devices connected to it and uses this information to direct data packets to the appropriate port?
_____ consists of server and client software, the Hypertext Transfer Protocol (HTTP), standards, and markup languages that combine to deliver information and services over the Internet.
Which of the following systems can help identify your current geolocation?
When a Web developer combines two or more Web applications into a new service, such as displaying the origin location of a Twitter post using Google Maps or overlaying Flickr photos of geographic locations within Google Maps, this is known as _____.
_____ is a communication standard that enables computers to route communications traffic from one network to another as needed.
the internet protocol (IP)
A _____ is a valuable tool that enables a user to find information on the Web by specifying words or phrases known as keywords, which are related to a topic of interest.
Which type of network device directs data packets to other networks until each packet reaches its destination, and thus forms the Internet backbone?
Which of the following statements is true of network-management software?
with network-management software a manager on a networked personal computer can scan for viruses
Which of the following is a widely-used server-side programming language?
An internal corporate network built using Internet and World Wide Web standards and products is known as a(n) _____.
Which of the following is a widely-used client-side programming language?
How does software-defined networking reduce both the risk of human error and overall network support and operations costs?
it automates configurations policy management, and other tasks
The area covered by one or more interconnected wireless access points is commonly called a(n) _____.
_____ is a social networking site designed to help its members develop a professional network.
A _____ is a telecommunications network that connects users and their computers in a geographical area that spans a campus or a city.
metropolitan area network (MAN)
Pauline is coding a Web page using HTML. What can she use to place a photo, graphic, audio file, or movie on a Web page?
a tag enclosed in angle brackets
What are the popular avenues for publishing a Web site once it has been built?
ISPs, free sites, and Web hosting services
Web pages are connected to each other using specially denoted text or graphics on each page that, when clicked, open a new Web page containing related content. These are called _____.
Emily researches private clouds while working on a proposal to move her organization to the cloud. She learns that _____.
a private cloud if often comparable in cost to or less expensive than an on-premises environment
Josie is excited to learn that a 5G network is being installed in her area. She recognizes that _____.
this will increase mobile data transfer speeds
Autonomous vehicles will rely on 5G for their _____.
Ryan's power goes out while he is watching his favorite sport, but comes back on within 10 minutes. This is because his electrical utilities provider used sensor data to predict when a local power line was about to fail and took quick corrective action. This is an example of which benefit of the application of IoT to an organization?
improved customer service and experience
Pharmaceutical companies can use battery-powered sensors and either 4G or 5G connectivity to monitor their products for damaging temperature changes during shipment. What type of IoT application is this?
connect and monitor
Rosie, an office manager, recommends that her company transition to the public cloud because the office building is located in a tornado-prone area and has experienced property damage several times in the past as a result. She reasons that this move will _____.
guarantee continuity of operations even if the office is damaged by a tornado
Don's company has contracted with a service provider to receive a computing platform for all employees, complete with an operating system, database services, and a Web server. Don develops applications using tools delivered by the service provider. What type of service has Don's company signed up for?
Compology's dumpster-monitoring software uses data from garbage container sensors plus external data to determine when dumpsters need service and alert sanitation workers so they can take preemptive action. Which type of IoT application is this?
predict and adapt
An organization using a public cloud allows the service provider to store their data in a remote location, possibly on the same storage device as other organizations' data. This results in which key concern with the public cloud?
inadequate data security
Why are advances in 5G technology expected to influence the IoT?
5G enables many devices to transmit data quickly to the cloud
How can IoT devices minimize downtime in a manufacturing plant?
by predicting equipment failures and scheduling preventative maintenance
A common reason an organization chooses a private rather than a public cloud environment is _____.
concerns about data security
Security is a serious issue with IoT applications because _____.
they can expose internal systems to hacking, viruses, and malware
Which statement about the influence of the IoT on cities or city planning is FALSE?
Athens, Greece was named the first smart city in Europe because of it efficient public transportation system
How does 5G technology compare with 4G technology?
5G uses millimeter wave
In which common approach to cloud computing does a service provider organization own and manage the infrastructure for client organizations that access slices of shared resources?
What is the Internet of Things?
a network of physical objects embedded with sensors, processors, software, and network connectivity capability
Which statement about data security in the public cloud is true?
clients of public cloud computing services must rely on service providers to safeguard their data
Thomas owns a small Web services company and currently owns and maintains all his own computing hardware. He plans to develop and test a new service offering that will require his computing capacity to double or triple quickly if it proves successful. How might transitioning to the public cloud help Thomas with this situation?
flexible computing capacity that can adjusted continually
Tesla and Google have been pioneers in developing IoT devices that analyze data from the cloud and from on-board cameras and sensors to determine when to speed up, slow down, change lanes, or turn while moving. What are these devices called?
What must a networked device possess to truly belong to the IoT?
an IP address
One benefit of the cloud computing option known as software as a service is _____.
lower cost compared with licensing needs applications
Harold's city government uses data from sensors combined with artificial intelligence to improve the local infrastructure and efficiently manage traffic lights, water supplies, and energy usage. Harold _____.
lives in a smart city
J.T.'s new refrigerator is part of the IoT. In the user manual, he reads that his fridge collects data on temperatures and compressor operation. Assuming J.T. sets up his fridge's Internet connection, where does the data from J.T.'s refrigerator end up?
the manufacturer's operational historical database
Can hackers who gain access to an organization's IoT cause physical damage?
yes, by tampering with critical infrastructure
Sensors inside IoT wearable devices typically collect information such as _____.
location and heart rate
Examples of the application of the IoT to improve customer service and experience include _____.
mobile card readers and smart trackers
Annie, who works for a banking organization, recommends that her employers utilize the IoT in the form of video surveillance cameras and smart locks. Which business benefit of the IoT does Annie probably think they will gain from this change?
safety of the premises and their physical and digital asserts
As a result of the analysis of aggregated sensor data, an IoT device may receive _____.
updates, alerts, or even automatic adjustments
Owen's firm runs their critical applications in a public cloud. Recently, their launch of a new product resulted in a surge of customer orders, but they were unable to ramp up their computing capacity fast enough, and some customer's experienced problems. This demonstrates which common issue with public cloud computing?
wide variations in performance over time
Why do cloud computing service arrangements often pose challenges for organizations that are transitioning to the cloud?
cloud computing arrangements are rigid and inflexible
One drawback with relying on IoT applications to maintain the safety of critical systems is that _____.
a poor or absent network or problems as they occur
Mavis asks her mobile carrier's representative how the upcoming rollout of 5G technology will affect smartphones that can use it. The representative explains that smartphones that operate on 5G networks will _____.
support enhanced augmented and virtual reality experiences
After Rosie's company enters into a contract with a public cloud service provider and transitions to the cloud, they discover that they need greater computing capacity than they expected. To address this, they must _____.
request that the service provider increase their capacity incurring a higher monthly fee
Which IoT devices can be used to improve workplace safety in mining, heavy industries, and construction?
safety helmets and wristbands embedded with sensors
Suppose a business wishes to have access to servers and storage devices, but does not want to buy them. The business prefers to have their own employees install and maintain the computing platform and application software. What is their best choice?
cloud computing infrastructure as a service
A single-tenant cloud computing environment is also known as a(n) _____.
Which benefit of public cloud computing results when service providers operate multiple data centers distributed geographically and save multiple copies of data on different machines?
Which type of cloud computing environment is most suitable for an organization that wants to run applications with stringent compliance requirements on-premises while running applications with fluctuating capacity needs on a service provider's cloud?
Mavis's company migrated its infrastructure and data to a public cloud last year, and have endured several periods of decreased or interrupted performance since then. Mavis is frustrated because the company's leadership is unwilling to change cloud providers. Mavis's company has most likely fallen prey to _____.
vendor lock in
Smart cars _____.
have sensors that monitor objects in the car's blind spots and at the front and rear of the car
Why is Jan, a marketing analyst, advocating for her company's collection of more data from IoT devices?
Jan hopes to use the data to predict consumer preferences and forecast trends
_____ refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web browser.
Clara has a device that responds to her voice commands by reviewing her calendar appointments, performing search queries, and playing streaming music. This is an example of a(n) _____.
Which of the following takes automation to a deep, broad level--one where interconnectivity between various devices exists in a way it never did before?
internet of things
Reagan's firm has not had to make large investments in computer or networking hardware or in personnel to maintain the hardware because they use public cloud computing. Reagan recognizes that this demonstrates which key benefit of public cloud computing?
Eleanor realizes that the data coming from two of her firm's IoT devices is incomplete and includes inconsistent values. What is the most likely cause of this problem?
Retailers can automatically monitor customers while they are shopping, analyze trends, and send them customized offers by using streaming data from sensors that detect the customers' behavior. What type of IoT application is this?
control and react
The way consumers and large enterprises use the IoT is evolving because of advances in _____.
James entered into a public cloud computing arrangement without reviewing the standard contract carefully. What problem is he most likely to face as a result?
unexpected cloud service costs
Drones that deliver packages, unmanned home vacuum cleaners, and toy dogs that entertain children are all examples of _____.
In the automotive industry, the fast-paced automated environment often requires that machines determine their direction of movement using new-generation _____.
NASA's Intelligent Flight Control System, which helps pilots land planes that have been damaged or experienced major system failures, relies on which technology?
An artificial neural network _____.
learns each time it processes some input
Which of the following statements about the current use of robots in pharmacies is accurate?
they can receive orders for intravenous medications and deliver them
Since the early 1800s, automation has often aroused workers' fears about _____.
Data is collected and input into an artificial neural network and then _____.
filtered through networked connections that have a value associated with them
_____ are people and groups who use and benefit from expert systems, even if they have had no previous training in computers or expert systems.
Which statement about types of machine learning is FALSE?
we see supervised learning in practice when we regularly use an online search engine
Which of the following technologies is a combination of mechanical engineering, computer science, AI, and machine learning?
What is SCARA?
a type of industrial robot
Which 1960s innovation combining mechanical engineering and computer science could perform tasks that involved arranging simple objects and planning routes, and was shown to be able to perceive and reason about its environment?
Examples of machine learning-based applications used to lower costs and improve operations in the auto insurance industry include _____.
chatbots and driver performance monitoring applications
Which of the following statements about unsupervised learning is accurate?
unsupervised learning requires an unlabeled training data set
Which of the most common types of industrial robot takes up a smaller footprint and moves in straight lines?
Surgeons can wear specialized goggles to view a patient's body with images overlaid as well as vital signs information during surgery. What technology enables this?
Manufacturing, healthcare, gaming, and logistics are several areas where we are beginning to see practical applications of _____.
In supervised learning, how does the machine learn?
by playing a new game every day
How are machine learning and artificial intelligence different?
in machine learning, the process runs through an artificial neural network
The approach used to train artificial neural networks is similar to the process of _____.
learning to ride a bicycle
A _____ is a conditional statement that links conditions to actions or outcomes.
Doctor Green enters his patient's symptoms and test results into a medical expert system, and the system concludes the patient has as defective heart valve. The _____ allows Dr. Green to understand how the system arrived at its diagnosis.
Sophisticated computer systems require an extension of understanding visual images. This is called a _____ system.
Which type of machine learning is used to train autonomous cars to drive?
In an expert system, the _____ is the component that delivers the expert advice.
The goal of unsupervised learning is for the machine to _____.
train itself to learn from the input and be in a mode of continuous improvement
In 1977, a patient moved a cursor across a screen using only electrical signals from his brain, and an account of this event was published as the first successful experiment with _____.
a brain computer interface
Advanced vision systems help manufacturing plants work efficiently because _____.
Manufacuring processes can be manually controlled
Advanced brain computer interface research has developed _____.
a prosthetic limb that can perceive both touch and pain
Humans can make decisions based on the data that is input through our senses because that data is filtered through _____.
When a computer answers your phone call to a utility company and asks you to tell it why you are calling, that computer is using _____.
natural language processing
An artificial neural network uses the feedback it receives to _____.
weight its connections
Supervised learning requires _____.
a known set of data that is labeled or tagged
Dialects, slang, and the context of speech are examples of which challenge associated with natural language processing?
the difference between how computer listen and humans speak
What overall strategy is used to train artificial neural network programs?
A genetic algorithm is an approach to solving problems based on the _____.
theory of evolution
One of the most common applications for Cartesian robots is for _____.
When Percy visits Spain, he uses an online translator to help him interpret signs because he knows very little Spanish. This handy tool is an example of a common application of _____.
natural language processing
Which statement about machine learning is true?
both the cybersecurity industry and the hackers they combat now utilize machine learning
According to experts, what organizational practice will allow the growth of AI to create new jobs?
upskilling the workforce
_____ systems can superimpose images and data over a person's view of the real world.
Which statement about industrial robots is true?
they are designed to achieve the maintain speed, accuracy, and safety
Top career options in AI include becoming _____.
a data scientist, who analyzes large data sets of follow patterns and find trends
Mavis receives an e-mail announcing that her employer will be selecting employees from each department for upskilling and providing an application for those who are interested. What does this mean?
Mavis should apply if she would like to advance her career by gaining new skills
The part of machine learning that allows computers to understand, analyze, manipulate, and generate natural language for processing is most specifically called _____.
natural language processing
The _____ stores all relevant information, data, rules, cases, and relationships that an expert system uses.
What is the da Vinci system?
a set of robotics assisted surgery instruments
What is the first step in the training process for an artificial neural network?
input is given
What is machine learning?
the abiltiy of a computer to learn without having a programmer change the software for every scenario
Reinforcement learning _____.
emulates the trail-and-error method through which humans learn
Sets with similar terms
IS 383 Chapter 2 (UNLV)
is ch 2
Exam 2 BADM 2301
ISYS CH 4,5,6
Other sets by this creator
Biology Final Exam
Bio Final Exam
Bio Final Exam
Bio exam 6
Recommended textbook solutions
Chemistry for Engineering Students
Lawrence S. Brown, Thomas A. Holme
Chemical Reaction Engineering
Advanced Engineering Mathematics
Fundamentals of Engineering Economic Analysis
David Besanko, Mark Shanley, Scott Schaefer