CGS 3300 Week 4 Final Exam 1 (100 out of 100 points)

$25.00

Category: Tag:

Description

CGS 3300 Final Exam – Question and Answers

  1. The science of encryption is called __________.
  2. __________ has gained widespread acceptance, as it allows for representing characters and scripts beyond the Latin alphabet, including Chinese, Cyrillic, Hebrew, and Arabic.
  3. Which of the following methods uses high-frequency light waves to transmit signals on an unobstructed path between nodes?
  4. Which of the following object-oriented programming concepts allows programmers to group objects of the same properties and behavior together?
  5. Google Docs is a Web-based e-mail client allowing users to send large attachments and offering large storage space and superior filing and search capabilities.
  6. __________ codes are represented as a series of ones and zeros and are used to relay data and instructions to and from the central processing unit (CPU) of a computer.
  7. With __________ , employees may be identified by fingerprints, retinal patterns in the eye, facial features, or other bodily characteristics before being granted access to use a computer or to enter a facility.
  8. The electronic circuit that generates pulses at a rapid rate to set the pace for processing events to take place within a computer is known as the __________.
  9. Which of the following is a valid observation about encryption?
  10. __________ can be used to visualize user-generated content on a site.
  11. Controls that are used to assess whether anything went wrong, such as unauthorized access attempts, are called __________ controls.
  12. Information systems __________ is done to obtain an understanding of the threats to the confidentiality, integrity, and availability of data and systems.
  13. __________ are false messages circulated online about new viruses, earthquakes, kids in trouble, cancer causes, or any other topic of public interest.
  14. The total cost of ownership is focused on understanding not only the total cost of acquisition, but also all costs associated with ongoing use and maintenance of a system.
  15. __________ is an attempt to trick financial account and credit card holders into giving away their authentication information, usually by sending spam messages to literally millions of e-mail accounts.
  16. Business analytics augments business intelligence by using predictive analysis to help identify trends or predict business outcomes.
  17. A firewall is a part of a computer system designed to detect intrusion and prevent unauthorized access to or from a private network.
  18. Systems benchmarking is the use of standardized performance tests to facilitate comparison between systems.
  19. __________ is a programming language used to develop applications in artificial intelligence and high-speed arcade graphics.
  20. __________ refers to the use of analytical techniques for extracting information from textual documents.
  21. Which of the following types of computer software utilities is used to archive files from hard disks to tapes, flash drives, or other storage devices?
  22. A net-present-value analysis is an analysis of the relevant cash flow streams associated with the system at the organization’s discount rate.
  23. Processing logic is often expressed in __________ which is independent of the actual programming language being used.
  24. Spam filters are used to reduce the amount of spam processed by central e-mail servers.
  25. A break-even analysis is a type of cost-benefit analysis to identify at what point tangible benefits equal tangible costs.