Business Technology Practice Final Exam

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the correct order of primary storage from fastest to slowest?

  • Cache > Register > RAM > ROM
  • RAM > Cache > Register > ROM
  • Register > Cache > RAM > ROM (correct)
  • ROM > RAM > Cache > Register

Which of the following is an example of system software?

  • Windows (correct)
  • Microsoft Word
  • Google Chrome
  • Adobe Photoshop

Which of the following is classified as secondary storage?

  • Optical Disk (correct)
  • Cache
  • Registers
  • RAM

What distinguishes application software from system software?

<p>Application software is for end-user tasks. (B)</p> Signup and view all the answers

Which operating systems are categorized as open source?

<p>Linux, Haiku (B)</p> Signup and view all the answers

Which storage type typically has the highest access speed?

<p>SSD (B)</p> Signup and view all the answers

How is bandwidth generally measured?

<p>In bits per second (B)</p> Signup and view all the answers

Which of the following is NOT a characteristic of application software?

<p>It directly manages computer hardware. (C)</p> Signup and view all the answers

What is indicated by each leaf node in a decision tree?

<p>The final decisions or classifications based on attribute tests (A)</p> Signup and view all the answers

What is a characteristic of Reactive AI?

<p>It has predefined responses to specific inputs (D)</p> Signup and view all the answers

What does the Turing Test assess in a machine?

<p>The ability to exhibit intelligent behavior indistinguishable from a human (D)</p> Signup and view all the answers

What distinguishes Limited Memory AI from Reactive AI?

<p>Limited Memory AI can learn from past data to inform decisions (D)</p> Signup and view all the answers

Which of the following statements about AI types is true?

<p>The Turing Test was proposed to evaluate if machines can mimic human intelligence. (C)</p> Signup and view all the answers

What is a recommended characteristic of an app's name for better visibility in search results?

<p>It should be under 11 characters. (B)</p> Signup and view all the answers

Which of the following best describes how to enable selection of multiple items in an app's interface?

<p>Use a checkbox. (D)</p> Signup and view all the answers

What is the purpose of using contrast in app design?

<p>To emphasize differences between elements. (A)</p> Signup and view all the answers

What design strategy helps maintain consistency across an app's interface?

<p>Avoiding repetition. (B)</p> Signup and view all the answers

Which interface component is best suited for making a selection from a specific range of values?

<p>Slider. (B)</p> Signup and view all the answers

What type of malware disguises itself as legitimate software and allows unauthorized access once installed?

<p>Trojan horse (B)</p> Signup and view all the answers

Which of the following best describes a back door in a computer system?

<p>A hidden method for bypassing normal authentication (B)</p> Signup and view all the answers

What defines a logic bomb within a software system?

<p>Malicious code triggering actions under certain conditions (B)</p> Signup and view all the answers

Which of the following is NOT considered a key theme in emerging technologies?

<p>Legacy Software (D)</p> Signup and view all the answers

Why are emerging technologies considered important?

<p>They address complex challenges and create opportunities (C)</p> Signup and view all the answers

What can intelligent systems do in regards to data collection?

<p>Monitor and analyze data through embedded sensors (C)</p> Signup and view all the answers

Which of the following technologies is associated with creating immersive experiences?

<p>Augmented Reality (C)</p> Signup and view all the answers

What might be a result of leveraging emerging technologies in business?

<p>Competitive advantage and innovation (D)</p> Signup and view all the answers

What defines the Internet of Things (IoT)?

<p>A network of interconnected physical devices communicating over the internet. (B)</p> Signup and view all the answers

Which characteristic of cloud computing allows resources to adjust based on demand?

<p>Flexibility and elasticity. (C)</p> Signup and view all the answers

What is a blockchain primarily used for?

<p>Recording transactions (A)</p> Signup and view all the answers

Which of the following is NOT a common data type in Python?

<p>Files (C)</p> Signup and view all the answers

How does edge computing primarily differ from cloud computing?

<p>Edge computing processes data at the network's edge, reducing latency. (C)</p> Signup and view all the answers

What is an important benefit of edge computing regarding data processing?

<p>It minimizes data travel time, crucial for real-time applications. (A)</p> Signup and view all the answers

What is the primary purpose of a class in programming?

<p>To create instances of objects (A)</p> Signup and view all the answers

Which of the following is NOT a basic characteristic of cloud computing?

<p>High latency for processing. (B)</p> Signup and view all the answers

How is a function defined in Python?

<p>def function(a, b) (A)</p> Signup and view all the answers

What does the command 'print()' do in Python?

<p>Outputs text to the console (A)</p> Signup and view all the answers

What is a characteristic of edge computing related to its functionality?

<p>Distributes processing tasks near the data source. (C)</p> Signup and view all the answers

Which statement best describes the accessibility of cloud computing?

<p>It is always on and accessible from anywhere. (C)</p> Signup and view all the answers

In a for loop, 'range(0, 5, 1)' specifies which of the following?

<p>The starting value is 0, ending at 4. (D)</p> Signup and view all the answers

What type of loop will execute a block of code based on a specified condition?

<p>While loop (B)</p> Signup and view all the answers

Which statement captures a key advantage of edge computing?

<p>It reduces bandwidth usage by processing data locally. (C)</p> Signup and view all the answers

How does an object relate to a class?

<p>An object is an instance of a class. (D)</p> Signup and view all the answers

Flashcards

Primary Storage

The fastest storage, holding data actively used by the CPU.

Secondary Storage

Storage holding data that isn't actively used but can be accessed quickly, like SSD, HDD.

System Software

Programs that manage computer resources and run applications.

Application Software

Software for users to perform specific tasks, e.g., word processing, web browsing.

Signup and view all the flashcards

Open Source OS

Operating systems where the source code is available for use and modification.

Signup and view all the flashcards

Proprietary OS

Operating system whose code is a trade secret and not shared.

Signup and view all the flashcards

Bandwidth

A measure of data transfer rate in bits per second (bps).

Signup and view all the flashcards

Storage Types (Examples)

Different types of secondary storage include ROM, SSD, Magnetic Disk, Optical, Magnetic Tape.

Signup and view all the flashcards

Internet of Things (IoT)

A network of interconnected physical devices that communicate and exchange data over the internet.

Signup and view all the flashcards

Cloud Computing

The delivery of computing services (like storage, processing, software) over the internet, enabling on-demand resource access without direct user management.

Signup and view all the flashcards

Cloud Computing Characteristics

Characteristics of cloud computing systems include 'Pay as much as used and needed', 'always on, anywhere and any place', and 'flexibility and elasticity', which enables scaling up and down.

Signup and view all the flashcards

Edge Computing

Processing data closer to where it's generated, instead of in a central location (cloud).

Signup and view all the flashcards

Edge Computing vs. Cloud Computing

Edge computing processes data locally reducing latency and bandwidth use, unlike cloud computing, which handles data in centralized data centers.

Signup and view all the flashcards

Edge Computing Characteristics

Edge computing characteristics include decentralized processing near data source, low latency for real-time apps, and scalability enabling distribution of processing tasks.

Signup and view all the flashcards

Decentralized Processing

Data processing near the source of the data, minimizing the need for central servers.

Signup and view all the flashcards

Low Latency

Minimizing the time it takes for data to travel, crucial for real-time applications.

Signup and view all the flashcards

Leaf Node

A terminal node in a decision tree representing the final decision or classification. It signifies an outcome based on the attribute tests leading to it.

Signup and view all the flashcards

Turing Test

A test proposed by Alan Turing to assess a machine's ability to exhibit intelligent behavior indistinguishable from a human. An evaluator interacts with both a machine and a human without knowing which is which. If the evaluator can't reliably tell them apart, the machine passes.

Signup and view all the flashcards

Reactive AI

Basic AI that responds to specific inputs with predefined responses. It lacks memory and the ability to learn from past experiences.

Signup and view all the flashcards

Limited Memory AI

AI that can use past experiences to inform current decisions. However, its learning and memory capabilities are limited to a short period.

Signup and view all the flashcards

What are the four types of AI?

The four types of AI are Reactive AI, Limited Memory AI, Theory of Mind AI, and Self-Aware AI. These represent different levels of complexity and capabilities in AI systems.

Signup and view all the flashcards

Dashboard

A central overview of key data and metrics, displayed visually for quick understanding and decision-making.

Signup and view all the flashcards

Live search

A search feature that displays results instantaneously as the user types, providing real-time feedback.

Signup and view all the flashcards

Menu of operations

A list of available actions, commands, or features within an application.

Signup and view all the flashcards

Radio button

A UI element for selecting only one option from a set of choices.

Signup and view all the flashcards

Slider

A UI control allowing users to choose a value from a range, by sliding a handle along a track.

Signup and view all the flashcards

Trojan Horse Malware

A type of malware that disguises itself as legitimate software but grants unauthorized access to a user's system once installed.

Signup and view all the flashcards

Backdoor Access

A method of bypassing normal authentication or security measures to remotely access a computer undetected.

Signup and view all the flashcards

Logic Bomb

Malicious code that triggers harmful actions when certain conditions are met, like a specific date or user action.

Signup and view all the flashcards

Emerging Technologies

Innovative technologies in their early stages of adoption, with potential for significant impact on society, economy, and various industries.

Signup and view all the flashcards

Importance of Emerging Technologies

Emerging technologies drive innovation, create competitive advantage, address challenges, and open new opportunities for progress.

Signup and view all the flashcards

5 Key Themes in Emerging Technologies

  1. Intelligent Systems, 2. Smart Cities, 3. Augmented/Immersive Technologies, 4. Quantum Computing, 5. 3D Printing.
Signup and view all the flashcards

Examples of Intelligent Systems

Intelligent Sensors and Wireless Sensor Networks.

Signup and view all the flashcards

What are some attacks by a programmer developing a system?

Trojan horse, backdoor, logic bomb.

Signup and view all the flashcards

Blockchain

A public ledger that records transactions securely and transparently.

Signup and view all the flashcards

Variable

A named storage location that holds a value which can be changed during program execution.

Signup and view all the flashcards

Data Types

Categories of data that determine the type of values a variable can hold. Common types in Python include: Integers (numbers), Strings (text), Lists (ordered collections), Booleans (True/False), and Objects.

Signup and view all the flashcards

Objects and Classes

Objects are instances of a class. A class is a blueprint that defines the properties and behaviors of objects. Objects are like individual copies of the blueprint.

Signup and view all the flashcards

Function Syntax

A function is declared using the keyword def, followed by the function name, parentheses with any parameters, and a colon. The function block is indented.

Signup and view all the flashcards

Input & Output Functions

Input() function reads user input, which is used for interactive programs. Print() displays information to the user.

Signup and view all the flashcards

For Loop Notation

A for loop iterates through a sequence of values. The syntax is for x in range(start, end, step):, where start is the initial value, end is the final value (exclusive), and step indicates the increment.

Signup and view all the flashcards

While Loop

A while loop repeatedly executes a block of code as long as a specified condition remains true.

Signup and view all the flashcards

Study Notes

CPU (Central Processing Unit)

  • The internal operating unit of a computer
  • Temporarily stores data and program instructions during processing

Primary Storage

  • RAM (Random Access Memory): Temporary storage for current data and programs. Volatile (data lost when power off).
  • ROM (Read-Only Memory): Permanent storage for firmware and system software. Non-volatile (data remains when power off).
  • Registers: Small, fast storage locations within the CPU for immediate data manipulation. Volatile (data lost when power off).
  • Cache Memory: High-speed memory that stores frequently accessed data for quick retrieval. Volatile (data lost when power off).

Secondary Storage

  • Storage remote to the CPU that permanently holds data, even when the computer is turned off (e.g., hard drive).

Secondary Storage Types

  • Magnetic Tape: Sequential access, high storage capacity, low cost per unit, used for backups and archiving.
  • Magnetic Discs (HDDs): Random access, high storage capacity, cost-effective for large storage, moving parts (spinning platters and read/write heads).
  • Solid State Drives (SSDs): No moving parts, faster data access, more durable, lower power consumption.
  • Optical Storage (CDs, DVDs, Blu-ray): Use laser technology, portable, relatively lower storage capacity compared to HDDs and SSDs, good for media storage.
  • Flash Memory: Non-volatile, no moving parts, used in USB drives, memory cards, and SSDs, quick data access, portable.

Input Technologies

  • Keyboard, mouse, microphone, touch screen, camera

Output Technologies

  • Monitor, speakers, projector, headphones

Byte Sizes (in order)

  • Byte (B) < Kilobyte (KB) < Megabyte (MB) < Gigabyte (GB) < Terabyte (TB) < Petabyte (PB)

Binary ASCII Conversion

  • Convert the ASCII value to binary by repeatedly dividing by 2 and recording the remainder until reaching 0.
  • Example: 'A' (ASCII 65) = 01000001 in binary. (Dividing successively by 2 until result is 0)

Cost, Size, and Speed Relationship

  • Moving from Register to Magnetic Tape: Cost decreases, speed decreases, size increases.

Operating Systems

  • Open Source: Linux, Haiku
  • Proprietary: Microsoft Windows, macOS, iOS, Android

Bandwidth and Broadband Measurement

  • Bandwidth: Measured in bits per second (bps).
  • Broadband: Measured in megabits per second (mbps)

Personal Area Networks (PAN)

  • Bluetooth headsets connected to a smartphone
  • Wireless keyboards and mice connected to a computer
  • Fitness trackers syncing with a smartphone

Local Area Networks (LAN)

  • Home Wi-Fi network connecting multiple devices (computers, smartphones, TVs).
  • Office network connecting employees' computers, printers, and servers within a building

Clients and Servers

  • Clients: Computers that request network resources/services
  • Servers: Computers that manage and provide network resources/services to clients

Wired Communication Media

  • Twisted-Pair Wire (Common, affordable, low-speed - 1 Mbps to 100 Mbps)
  • Coaxial Cable (Faster than twisted-pair, moderate cost - 10 Mbps to 100 Mbps, 12 Mbps to 100 Mbps)
  • Fiber Optics (High-speed, high-cost - 10 Mbps to 1 Gbps, 100 Mbps to 10+ Gbps)

Satellite Speeds

  • General range for satellite speeds: 12 Mbps to 100 Mbps

Electromagnetic Spectrum

  • Microwaves is the most common wavelength.

Telecommunications Satellites

  • Geostationary Earth Orbit (GEO): High altitude (~35,786 km), continuous area coverage, high latency, expensive.
  • Middle Earth Orbit (MEO): ~2000-35,786 km, lower latency, moderately priced, needs more sats.
  • Low Earth Orbit (LEO): ~160-2000 km, low latency, least expensive, needs the most sats.

Internet of Things (IoT)

  • Network of interrelated physical devices that communicate and exchange data over the internet.

Cloud Computing

  • Delivery of computing services (storage, processing, software) over the internet, allowing on-demand access to resources without active management.

Basic Cloud Characteristics

  • "No need to know"
  • "Flexibility and elasticity"
  • "Pay as much as used and needed"
  • "Always on, anywhere and anytime"

Edge Computing

  • Processing data closer to its source, reducing latency and bandwidth costs. Typically at the "edge" of a network.

Web 1.0, 2.0, and 3.0

  • Web 1.0: Primarily reading information
  • Web 2.0: Publishing content and building communities
  • Web 3.0: Internet of value (publish, own digital content, execute digital agreements)

Ledger

  • A comprehensive record-keeping book for all financial transactions

Blockchain Creation

  • Distributed database with shared copies.
  • Transactions recorded as blocks
  • Blocks processed sequentially.
  • All participants approve new blocks
  • Blocks linked with cryptographic hashes
  • Digital signatures for recording.

Crypto Currency and Cryptography

  • Cryptocurrency: Digital or virtual currency that uses cryptography for security and operates independently of a central bank.
  • Cryptography: Securing information with codes, so that only intended recipients can read and process it

Common Python Data Types

  • Numbers
  • Strings
  • Lists
  • Booleans
  • Variables

Objects and Classes

  • Objects are instances of a class.
  • A class is a collection of objects that share the same variables.

Function Syntax

  • def function(a, b):

Input and Output Functions

  • Input()
  • Print()

For Loops Notation

  • for x in range (start, stop, step)
    • Start: Starting value.
    • Stop: Ending value (exclusive)
    • Step: Increment between values

While Loops

  • Execute a code block as long as a condition remains true.
    • while condition:
      • # code block

Business Intelligence (BI)

  • Wide category of applications, technologies, and processes to gather, store, access, and analyze data to enhance decision-making.

Data Mining Operations

  • Predicting trends and behaviors
  • Identifying previously unknown patterns and relationships

Decision Trees

  • A model for decision-making and predictive analysis.

Turing Test

  • Measure of a machine's ability to exhibit intelligent behavior indistinguishable from a human's.

Types of AI

  • Reactive AI: Reacts to specific inputs with predefined responses, without memory.
  • Limited Memory AI: Uses past experiences to inform current decisions.
  • Theory of Mind AI: Understands mental states of itself and others.
  • Self-Aware AI: Possesses self-consciousness and awareness.

Expert Systems Components

  • Knowledge base
  • Inference engine
  • User Interface

Expert System Benefits

  • Increased output and productivity
  • Increased quality
  • Capture and dissemination of scarce resources
  • Operation in hazardous environments
  • Transfer of expert knowledge

Expert System Difficulties

  • Transfer of human expertise
  • Potential liability
  • Automating the process may not be possible

Neural Networks

  • Artificial intelligence modeled after the human brain.
  • Input Layer: Receives input data
  • Hidden Layers: Process inputs using weighted connections and activation functions.
  • Output Layer: Produces final output based on processing from hidden layers.

Information Security Vulnerabilities

  • Lack of management support
  • Smaller, faster, and cheaper computers and storage devices

Unintentional Information System Threats

  • Most significant: Human Error

Communication Controls

  • Firewalls, anti-malware systems, and encryption.

Remote Software Attacks Requiring User Action

  • Phishing attacks
  • Spear phishing attacks
  • Denial of service attacks

Remote Attacks Needing No User Action

  • Viruses, worms

What are some attacks by a programmer developing a system?

  • Logic bombs, back doors

Define Emerging Technologies

  • Cutting-edge technologies in the early stages of adoption, poised to significantly impact society, economy, and industries.

Importance of Emerging Technologies

  • Drive innovation
  • Create competitive advantage
  • Address complex challenges
  • Engine for transformative changes

Five Key Themes in Emerging Technologies

  • Intelligent systems
  • Smart cities
  • Augmented experiences / immersive technologies
  • Quantum computing
  • 3D printing

Examples of Intelligent Systems

  • Wearable internet
  • Intelligent cars & smart highways
  • Intelligent sensors and wireless networks

Smart Cities

  • Many cities connecting services, utilities, and roads to the internet.

Augmented Reality (AR) key features:

  • Interactivity in real time
  • Integration of 3D digital content
  • Enhance perception
  • Provide contextual info about the physical world

Immersive Technologies (VR, MR):

  • VR transports users to virtual environments (e.g., Oculus).
  • MR combines virtual and physical worlds (e.g., Apple Vision Pro).

Quantum Computing Key Concepts

  • Quantum bits (qubits)
  • Superposition

3D Printing

  • Manufacturing process creating 3D objects by adding material layer by layer.

Gartner Hype Cycle Phases

  • Innovation trigger
  • Peak of inflated expectations
  • Trough of disillusionment
  • Slope of enlightenment
  • Plateau of productivity

Gartner Magic Quadrant

  • Niche players
  • Challengers
  • Visionaries
  • Leaders

Websites vs. Apps

  • Websites: Accessed via browser, often free with internet connection.
  • Apps: Downloaded, installed, often require internet access, may be device-specific.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

BTE 210 Final Exam Review PDF

More Like This

Computer Fundamentals Quiz
40 questions

Computer Fundamentals Quiz

HospitableSanDiego8355 avatar
HospitableSanDiego8355
CPU components and data storage
10 questions

CPU components and data storage

SpiritedSwaneeWhistle avatar
SpiritedSwaneeWhistle
Use Quizgecko on...
Browser
Browser