that is, operating and maintaining the database system—is an important IT function.
Give this one a try later!
database administration
What does the abbreviation SQL stand for?
Give this one a try later!
Structured Query Language
,Which of the following types of malware hides within a legitimate program or data
file?
Give this one a try later!
Trojan horse
Which of the following statements does not describe a fuzzy logic system?
Give this one a try later!
It demands precise yes/no or numerical information.
A single value, such as an address, is an example of a _____ in a database.
Give this one a try later!
field
In which of the following environments is RPG commonly used?
Give this one a try later!
business
,True or False: A worm is a malicious code string that attaches itself to an executable
file so that the file becomes "infected."
Give this one a try later!
FALSE (VIRUS/TROJAN)
Many warehouse systems use which of the following technologies to enhance
inventory tracking and placement?
Give this one a try later!
radio frequency identification (RFID)
In addition to discovering meaningful patterns in data, _____ includes communicating
insights about data, such as the spending behavior of a group of customers.
Give this one a try later!
analytics
Retrieving data from a database and performing some type of operation on it is
called
Give this one a try later!
, file processing
A disaster recovery plan typically does not answer which of these questions?
Give this one a try later!
How will users' identities be confirmed?
A(n) _____ is sometimes called a software robot, or bot.
Give this one a try later!
intelligent agent
_____ is the use of printer-like technology to output three-dimensional objects using
one of a variety of materials.
Give this one a try later!
Additive manufacturing
Using the _____ technique, a programmer thinks in terms of creating groups of
instructions, rather than simply executing lines one after another and writing code line
by line.