Description
CGS 3300 Final Exam – Question and Answers
- The science of encryption is called __________.
- __________ has gained widespread acceptance, as it allows for representing characters and scripts beyond the Latin alphabet, including Chinese, Cyrillic, Hebrew, and Arabic.
- Which of the following methods uses high-frequency light waves to transmit signals on an unobstructed path between nodes?
- Which of the following object-oriented programming concepts allows programmers to group objects of the same properties and behavior together?
- Google Docs is a Web-based e-mail client allowing users to send large attachments and offering large storage space and superior filing and search capabilities.
- __________ codes are represented as a series of ones and zeros and are used to relay data and instructions to and from the central processing unit (CPU) of a computer.
- With __________ , employees may be identified by fingerprints, retinal patterns in the eye, facial features, or other bodily characteristics before being granted access to use a computer or to enter a facility.
- The electronic circuit that generates pulses at a rapid rate to set the pace for processing events to take place within a computer is known as the __________.
- Which of the following is a valid observation about encryption?
- __________ can be used to visualize user-generated content on a site.
- Controls that are used to assess whether anything went wrong, such as unauthorized access attempts, are called __________ controls.
- Information systems __________ is done to obtain an understanding of the threats to the confidentiality, integrity, and availability of data and systems.
- __________ are false messages circulated online about new viruses, earthquakes, kids in trouble, cancer causes, or any other topic of public interest.
- The total cost of ownership is focused on understanding not only the total cost of acquisition, but also all costs associated with ongoing use and maintenance of a system.
- __________ is an attempt to trick financial account and credit card holders into giving away their authentication information, usually by sending spam messages to literally millions of e-mail accounts.
- Business analytics augments business intelligence by using predictive analysis to help identify trends or predict business outcomes.
- A firewall is a part of a computer system designed to detect intrusion and prevent unauthorized access to or from a private network.
- Systems benchmarking is the use of standardized performance tests to facilitate comparison between systems.
- __________ is a programming language used to develop applications in artificial intelligence and high-speed arcade graphics.
- __________ refers to the use of analytical techniques for extracting information from textual documents.
- Which of the following types of computer software utilities is used to archive files from hard disks to tapes, flash drives, or other storage devices?
- A net-present-value analysis is an analysis of the relevant cash flow streams associated with the system at the organization’s discount rate.
- Processing logic is often expressed in __________ which is independent of the actual programming language being used.
- Spam filters are used to reduce the amount of spam processed by central e-mail servers.
- A break-even analysis is a type of cost-benefit analysis to identify at what point tangible benefits equal tangible costs.