Computer Science Final!

the physical address assigned each network adapter is called its ___.
MAC
a data ___ is a large-scale electronic repository of data that contains and organizes all of an organizations data in one place
warehouse
a loop decision point consists of three features: an initial value, a set of actions to be performed, and a(n) ___.
test condition
a ____ is a group of related data that can be stores, sorted, organized, and queried.
database
a ___ is a set of rules for how information and communication are exchanged
protocol
a ___ keeps your computer safe by determining who is trying to access it.
firewall
a ___ network can contain servers as well as individual computers
client/server
a ___ sends data between 2 networks
router
a ___ sends data from one collision domain to another
bridge
a ___ uses the internet communications infrastructure to build a secure and private network
VPN
a(n) ____ address is temporary IP address that is assigned from an available pool of IP addresses
dynamic
a(n)___ address is a unique number that identifies a computer, server, or device connected to the internet
IP
a(n)____ address is the address that external entities use when communicating to your network
IP
a(n)___ is a way of retrieving information from one or more tables that defines a particular subset of data
query
a(n)___ is designed to improve communications and help employees complete their routine tasks.
OSS
a(n)___ server is a heavily secured server located between a company’s secure internal network and its firewall
bastion host
a(n)___ server tracks who is logging on to the network as well as which services on the network are available to each user.
authentication
an integrated development environment (IDE) is a ____.
collection of tools that helps programmers write and test their programs
an IP address that does not change and is usually assigned manually by a network administrator is called a ___ address.
static
configuring an account to disable itself after a set of number of login attempts using invalid password is a method of countering a ___.
brute force attack
data staging consists of all of the following steps, EXCEPT ___.
mining the data
data ____ensures that the data contained in a database is accurate and reliable
integrity
if a school keeps two lists, one for student registration and one for student financial information, both containing name and address information, this is an example of data ____.
redundancy
in a transaction-processing system (TPS), if the TPS database can be queried and updated while the transaction is taking place, this is called ____ processing.
real time
in a ___network, data collisions can occur fairly easily because the network is essentially composed of a single cable
bus
in a ____ network, each node connected to the network communicates directly with every other node
peer-to-peer
in an Ethernet network, the signal that is sent to indicate a signal collision is called a ___ signal.
jam
in public-key encryption, the two keys- one for coding and one for decoding- are known as ___.
a key pair
IPV6 was needed when IPV4 ____.
no longer had
management information systems (MIS) provided reports called ___ reports, which show conditions that are unusual or need attention from users of the system
exception
ring networks use the ___ method to avoid data collisions
token
SQL is an example of a ___.
4GL
the capability of moving a completed programming solution easily from one type of computer to another is known as ___.
portability
the computers in a lab on a floor of a building would be connected using a ____.
LAN
the first-generation language is ___.
machine language
the main path of the internet along which data travel the fastest is known as the Internet ____.
backbone
the main suite of protocols used on the internet is ___.
TCP/IP
the process that converts program code into machine language is called ___.
compilation
the set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n) ___.
algorithm
the Siri personal assistant application on Apple’s iPhone 5s is an example of a ___.
NLP
the ____ is responsible for the Internet’s domain system and allocation of IP addresses
ICANN
translating an algorithm into a programming language is called ___.
coding
what is the first step of the system development life cycle (SDLC)?
problem and opportunity
which of the following information is NOT contained in a packet?
size in bytes of packet
which of the following is NOT a common network topology?
cluster
which of the following is NOT a likely primary key?
date of birth
which of the following is the most commonly used client/server network topology?
star
which of the following provides a visual representation of the patterns of an algorithm?
flowchart
which protocol is used when sending files as attachments by email?
MIME
___ databases are the most frequently used electronic databases.
relational
___ is the branch of computer science that attempts to create computers that think like humans
artificial intelligence
_____ is the process of translating a task into a series of commands that a computer will use to perform the task
programming
___ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table.
referential integrity
___ permits two or more people to communicate over the Internet in real time.
instant messaging
T or F: data-flow diagrams trace all data in an information system from the point at which data enter the system to their final resting places.
true
T or F:one IDE can often be configured to support many different languages
true
T or F:an employee’s ID number, name, company position, address, city, state, and zip code make up a record
true
T or F:employees’ last names would usually make an appropriate primary-key field
false
T or F:a database schema defines the name, data type, and length of each field in the database
true
T or F:in a client/server network, each node communicates directly with every other node on the network
false
T or F:a compiler translates the source code into an intermediate form, line by line
false
T or F:in an active topology, each node helps to move through a network
true
T or F:MAC addresses and IP addresses are the same thing
false
T or F:IPv6 uses 6 groups of 16-bit numbers
false
T or F:LinkedIn is one of the most popular instant messaging services
false
T or F:file transfer protocol (FTP_ is used to transmit email messages across the Internet
false
matching: 4GL
SQL
matching: 2GL
assembly language
matching: 5GL
PROLOG
matching: 1GL
machine language
matching: can be answered in only two ways (for example, yes/no)
binary decision
matching: managing what a program should do if input data are invalid
error handling
matching: translates source code line by line into an intermediate form
interpreter
matching: text-based approach to documenting an algorithm
pseudocode
matching:a field that has value unique to each record
primary key
matching: a collection of related data that can be stored, sorted, organized, and queried
databased
matching: a category of information in a database
field
matching: provides manager with timely and accurate information
management information system (MIS)
matching: communicates with computer systems using a natural spoken or written language
natural language processing (NLP)
matching: assists employees in day-to-day tasks and communication
office support system (OSS)
matching: helps managers develop solutions for specific problems
decision support system (DSS)
matching: computer system designed to attract unauthorized users
honey pot
matching: set of common rules that control communications among network devices
protocol
matching: device that absorbs a signal so that it is not reflected back
terminator
matching: special type of data packet
token
matching: data broken into a small segment with an address to which it is sent
packet
matching: sends data between different collision domains
bridge
matching: makes decisions as the where data are to be sent and rebroadcasts them to the appropriate node
switch
matching: device that sends information between two networks
router
matching: protocol that signs dynamic IP addresses
DHCP
matching: used for transmission of email messages across the internet
SMTP
matching: transfers data from servers to browsers
HTTP
matching: an operating system for network servers
NOS
matching: adapter card that connects a computer to a network
NIC
matching: translates a domain name into an IP address
DNS