Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Question 2 5 ( 1 point ) Saved The use of several databases is one of ERP s major advantages. Question 2 5 options: True
Question point
Saved
The use of several databases is one of ERPs major advantages.
Question options:
True
False
Question point
A document called a system requirements report describes the objectives for an information system.
Question options:
True
False
Question point
Application software for an information system is usually a series of preprogrammed software modules supplied by a software publisher.
Question options:
True
False
Question point
System documentation contains stepbystep instructions for performing specific tasks.
Question options:
True
False
Question point
Human errors are mistakes made by computer operators.
Question options:
True
False
Question point
Most states in the United States have data breach notification statutes that require corporations to take specific steps if a data breach exposes personally identifiable information.
Question options:
True
False
Question point
One of the ways that databases are classified is by their structure.
Question options:
True
False
Question point
A filing cabinet full of folders and papers would be classified as a structured file because every document has a unique structure.
Question options:
True
False
Question point
Data independence is a term that refers to data and program modules being so tightly interrelated that they become difficult to modify.
Question options:
True
False
Question point
Dedicated enterprise database applications may allow cosmetic changes, but they do not encourage modifications of core data structures.
Question options:
True
False
Question point
Spreadsheet software offers database capabilities for establishing relationships between different record types.
Question options:
True
False
Question point
In a casesensitive database, uppercase letters are equivalent to their lowercase counterparts.
Question options:
True
False
Question point
A database tables physical sort order is the order in which records are arranged on storage devices.
Question options:
True
False
Question point
SQL statements contain command words but do not contain data.
Question options:
True
False
Question point
The entire Internet contains about a petabyte of data.
Question options:
True
False
Question point
Relational databases store unstructured data.
Question options:
True
False
Question point
The process of planning a computer program begins with a problem statement that clearly defines the programs purpose.
Question options:
True
False
Question point
The core of a computer program is a sequence of instructions.
Question options:
True
False
Question point
Thirdgeneration languages added a level of abstraction to machine languages by substituting abbreviated command words for the strings of s and s used in machine languages.
Question options:
True
False
Question point
Prolog and other declarative languages were classified as fifthgeneration languages.
Question options:
True
False
Question point
Algorithms are usually written in a format that is specific to a particular programming language.
Question options:
True
False
Question point
An algorithm can be expressed or documented using pseudocode.
Question options:
True
False
Question point
Procedural languages encourage programmers to approach problems by breaking down the solution into a series of steps.
Question options:
True
False
Question point
A subclass is any class that inherits attributes from a superclass.
Question options:
True
False
Question point
Prolog programming is all about facts and rules.
Question options:
True
False
Question point
The order or sequence of rules in a Prolog program is usually critical.
Question options:
True
False
Question point
There are various encryption methods, but is the encryption standard currently used worldwide.
Question options:
AES Advanced Encryption Standard
DDoS distributed denial of service attacks
IMSI International Mobile Subscriber Identity
TLS Transport Layer Security
Question point
Which of the following is not an example of user authentication?
Question options:
Password
PINs
Fingerprint scanner
URLs Uniform Resource Locators
Question point
Which of the following is not a characteristic of a weak password?
Question options:
Eight characters in length and include one or more uppercase letters, numbers, and symbols
Uses default passwords such as password, admin, system, and guest
Any sequence that includes a user name
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started