Generations of computer languages

Assignment Help Basic Computer Science
Reference no: EM13767019

• Question 1 The are 6 generations of computer languages
Selected Answer: 1- True 2- False

• Question 2 As discussed in class the computer memory can be divided in RAM and REM
Selected Answer: 1- True 2- False

• Question 3 URL stands for Universal Resource Locator
Selected Answer: 1- True 2- False

• Question 4 RAM stands for Read Accurate Memory
Selected Answer: 1- True 2- False

• Question 5 HTTP stands for Hyper Transfer Text Protocol

Selected Answer: 1- True 2- False

• Question 6 As referred in class accuracy means a computer have the capacity to save large quantities of data
Selected Answer: 1- True 2- False

• Question 7 In class we discussed 3 methods for accesing files: sequential, random, and interconnected
Selected Answer: 1- True 2- False

• Question 8 The operations that can be performed in a database record are (CRUD): create, read, update, and delete
Selected Answer: 1- True 2- False

• Question 9 Data hierarchy includes files, records, and fields
Selected Answer: 1- True 2- False

• Question 10 OLAP stands for online analitycal processing system
Selected Answer: 1- True 2- False

• Question 11 The primary key is unique
Selected Answer: 1- True 2- False

• Question 12 Keyloggers monitor and record network traffic
Selected Answer: 1- True 2- False

• Question 13 Patents protects product names and identifying marks
Selected Answer: 1- True 2- False

• Question 14 Spoofing are unsolicited e-mails sent for advertising purpose that are sent in bulk by using automated mailing software
Selected Answer: 1- True 2- False

• Question 15 Spamming are unsolicited e-mails sent for advertising purpose that are sent in bulk by using automated mailing software
Selected Answer: 1- True 2- False

• Question 16 Adware is a form of phishing
Selected Answer: 1- True 2- False

• Question 17 Most databases are managed with a DBMS
Selected Answer: 1- True 2- False

• Question 18 A BI system can be described as an organized integration of hardware and software technologies, data, processes, and human elements
Selected Answer: 1- True 2- False

• Question 19 A BI systems usually provides historical, current, and predictive views of business operations and environments
Selected Answer: 1- True 2- False

• Question 20 In the design phase the best and most effective course of action is chosen
Selected Answer: 1- True 2- False

• Question 21 In the intelligence phase alternatives are generated to meet the criteria of the decision
Selected Answer: 1- True 2- False

• Question 22 As discussed in class; there are 5 phases in the decision making process
Selected Answer: 1- True 2- False

• Question 23 In the implementation phase organization devises a plan for carrying out the alternative selected in the choice phase
Selected Answer: 1- True 2- False

• Question 24 Semi-structured decisions can't be automated
Selected Answer: 1- True 2- False

• Question 25 A data driven web site usually allows users to enter data
Selected Answer: 1- True 2- False

• Question 26 In an SAP implementation the developers are usually responsible for installing the DB and the application software
Selected Answer: 1- True 2- False

• Question 27 A SAP implementation team usually consists of technical, operational analysts, and developers

Selected Answer: 1- True 2- False

• Question 28 When installing an SAP system installing a DB installation is not required
Selected Answer: 1- True 2- False

• Question 29 SAP implementations projects are usually supervised by a project manager
Selected Answer: 1- True 2- False

• Question 30 In an SAP implementation the technical consultant or analysts are usually responsible for installing the DB and the application software
Selected Answer: 1- True 2- False

• Question 31 In an SAP implementation the technical consultants or analysts are usually responsible for analyzing the business processes of the company and configure the software according to the business needs and objectives
Selected Answer: 1- True 2- False

Reference no: EM13767019

Questions Cloud

Write summary of the role of men and women in good cripple : Write summary of The Role of Men and Women in The Good Cripple.
Define relevant systems analysis and design : Relevant systems analysis and design. Scholarly research should exist performed within the last few years that develop timely and appropriate procedures for an information systems analysis and design.
Identify and describe a global market : Identify and describe a global market and analyze pros and cons of entering this specific market
Area of accurately forecasting resources : What steps of action would you recommend to an organization who is experiencing this over and over again as part of their culture?
Generations of computer languages : Question 2 As discussed in class the computer memory can be divided in RAM and REM ,Question 3 URL stands for Universal Resource Locato.
List the types and uses of date rape drugs : List the types and uses of date rape drugs. Describe the victim-offender relationship, including the following: How victims are viewed by perpetrators of date rape, The special problems of date rape prosecutions
Identify what kind of telecommunications : Telecommunication needs - identify what kind of telecommunications will be needed for the solution, including local connectivity inside UMUC Haircuts and internet access, if appropriate, and whether it will be used for data, voice and/or video.
Is international free trade beneficial or detrimental : Is international free trade beneficial or detrimental to the US economy? What are some of the arguments on both sides of the issue?
Personal items for safe keeping : It's a good idea to have an inventory of your personal items for safe keeping. Design a worksheet that will keep track of your personal items divided by category; for example: living room, dining room, bedroom, and so forth.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the accuracy of a two-bit predictor

What is the accuracy of a two-bit predictor, assuming the predictor starts off in the bottom left state? What if the pattern repeats forever?

  The key desirable characteristics is robustness

Regardless of the operating system used, from MS-DOS to Macintosh OS X, from Windows to Linux, to OS/400, one of the key desirable characteristics is robustness of the operating system.

  Create class includes instance variables automatic propertie

Create a class called Employee that includes three pieces of information as either instance variables or automatic properties - a firstname (type string), a last name (type string) and a monthly salary (decimal)

  A priority encoder has 2^n inputs

A priority encoder has 2^n inputs. It produces an N-bit binary output indiciating the most significant bit of the input that is TRUE, or 0 if none of the inputs are TRUE

  What will the following code fragment print

What will the following code fragment print?

  Distinguish between baseband and broadband transmission

Distinguish in detail between baseband and broadband transmission?

  Develop a program that will allow the district sales manager

You have been asked to develop a program that will allow the district sales manager to input each of the dealership's ID along with their four quarterly sales volumes for the year, calculate and display each quarter's rebate and the sales bonus fo..

  Critical success factor of enterprise systems implementation

Critical success factors of enterprise systems implementations. You are free to choose the specific questions, analytical approach, inferences, and conclusions. The body of the paper should include headings and subheadings as are appropriate t..

  Find the order of t

Let T(n) be the running time of Yum(n). Find the order of T (that is find a function f(n) such that T?0(f)). (Assume that the real arithmetic is carried out exactly and is not subject to floating point round off errors.)

  Elway business services

You have been asked by Elway Business Services Inc. to evaluate the possible financial loss that could be accrued by threats to its servers. You decide to use the ALE equation to estimate this cost. As a starting point, EBS provides the follow..

  Demonstrate ability to collaborate with peers to analyse and

Demonstrate ability to collaborate with peers to analyse and solve business problems with information technologies, and present the solution in a team report.

  Find a recurrence relation for the number

Find a recurrence relation for the number of bit strings that contain the string 01 . what are the initial condition , and how many bit strings of length seven contain the string 01. please explain it fully step by step to better undestand

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd