BMIS 311 Final Ch. 5-6
Which of the following is the foundation technology for web services? A. XML B. SCSI C. SOAP D. HTML E. UDDI
A. XML
Firms that allow employees to use their own devices are embracing which of the following? A. BYOD B. Cloud computing C. Mobile consolidation D. Self computing E. Wearable computing
A. BYOD
Which of the following is an example of a legacy system? A. Transaction processing system running on a mainframe B. Scalable grid computing system C. Web services running on a cloud computing platform D. MDM software E. Quantum computing system
A. Transaction processing system running on a mainframe
Which of the following factors does not help explain why computing resources today are even more available than in previous decades? A. Widespread rejection of technology standards B. Moore's law C. Law of mass digital storage D. Declining communications costs and the Internet E. Network economics
A. Widespread rejection of technology standards
Running a Java program on a computer requires: A. a Java Virtual Machine to be installed on that computer. B. a Java Virtual Machine to be installed on the server hosting the Java applet. C. the Mozilla Firefox browser and no other browsers. D. a miniature program to be downloaded to the user's computer. E. no specialized software, as Java is platform-independent.
A. a Java Virtual Machine to be installed on that computer.
A(n) ________ is an integrated circuit to which two or more processors have been attached for enhanced performance and reduced power consumption. A. multicore processor B. legacy processor C. scalable processor D. aggregate circuit E. green circuit
A. multicore processor
In a multi-tiered network: A. the work of the entire network is balanced over several levels of servers. B. the work of the entire network is centralized. C. processing is located in the cloud. D. processing is handled by multiple, geographically-remote clients. E. processing is split between clients and servers.
A. the work of the entire network is balanced over several levels of servers.
________ creates confusion that hampers the creation of information systems that integrate data from different sources. A.Data redundancy B.Batch processing C.Data quality D.Data independence E.Online processing
A.Data redundancy
In data mining, which of the following involves using a series of existing values to determine what other future values will be? A.Forecasting B.Associations C.Classifications D.Clustering E.Sequence
A.Forecasting
The fact that a traditional file system cannot respond to unanticipated information requirements in a timely fashion is an example of which of the following issues with traditional file systems? A.Lack of flexibility B.Lack of data sharing C.Program-data dependence D.Data redundancy E.Poor security
A.Lack of flexibility
Which of the following best illustrates the relationship between entities and attributes? A.The entity CUSTOMER with the attribute PURCHASE B.The entity PURCHASE with the attribute CUSTOMER C.The entity CUSTOMER with the attribute PRODUCT D.The entity PRODUCT with the attribute CUSTOMER E.The entity PRODUCT with the attribute PURCHASE
A.The entity CUSTOMER with the attribute PURCHASE
Data mining allows users to: A.find hidden relationships in data. B.summarize massive amounts of data into much smaller, traditional reports. C.access the vast amounts of data in a data warehouse. D.quickly compare transaction data gathered over many years. E.obtain online answers to ad-hoc questions in a rapid amount of time.
A.find hidden relationships in data.
A ________ is an example of pre-digital data storage that is comparable to a database. A.library card catalog B.cash register receipt C.schedule of due dates on a project outline D.list of sales totals on a spreadsheet E.doctor's office invoice
A.library card catalog
Which of the following is the network standard for connecting desktop computers into local area networks that enabled the widespread adoption of client/server computing and local area networks and further stimulated the adoption of personal computers? A. COBOL B. Ethernet C. ASCII D. TCP/IP E. Linux
B. Ethernet
_________ states that the value or power of a network grows exponentially as a function of the number of network members. A. Law of networks B. Metcalfe's Law C. Law of scalability D. Law of outsourcing E. Moore's Law
B. Metcalfe's Law
Which of the following is a recent addition to the mobile digital platform? A. Quantum computing devices B. Wearable computing devices C. Green computing devices D. Grid computing devices E. Cloud computing devices
B. Wearable computing devices
Today's nanotechnology-produced computer transistors are roughly equivalent in size to: A. a human hair. B. a virus. C. the width of a fingernail. D. a grain of sand. E. an atom.
B. a virus.
Interpretations of Moore's law assert that: A. data storage costs decrease by 50% every 18 months. B. computing power doubles every 18 months. C. transistors decrease in size 50% every two years. D. computing power will eventually level off. E. PCs decrease in market share by 9% every 5 years.
B. computing power doubles every 18 months.
The practice of contracting custom software development to an outside firm is commonly referred to as: A. service-oriented architecture. B. outsourcing. C. application integration. D. utility computing. E. scaling.
B. outsourcing.
A client computer networked to a server computer, with processing split between the two types of machines, is called a(n): A. on-demand architecture. B. two-tiered client/server architecture. C. service-oriented architecture. D. divided architecture. E. multi-tiered client/server architecture.
B. two-tiered client/server architecture.
You are creating a database to store temperature and wind data from various airports. Which of the following fields is the most likely candidate to use as the basis for a primary key in the Airport table? A.Address B.Airport code C.Day D.City E.State
B.Airport code
Which of the following is an automated or manual file that stores information about data elements and data characteristics such as usage, physical representation, ownership, authorization, and security? A.Data table B.Data dictionary C.Entity-relationship diagram D.Data definition diagram E.Relationship dictionary
B.Data dictionary
Which of the following occurs when the same attribute in related data files has different values? A.Data duplication B.Data inconsistency C.Data redundancy D.Data discrepancy E.Data dependence
B.Data inconsistency
Which of the following is a grouping of characters into a word, a group of words, or a complete number? A.Tuple B.Field C.Table D.File E.Entity
B.Field
The term big datarefers to all of the following except: A.data from Web traffic. B.datasets with fewer than a billion records. C.datasets with unstructured data. D.machine-generated data (i.e. from sensors). E.data created by social media (i.e. tweets, Facebook Likes).
B.datasets with fewer than a billion records.
A DBMS makes the: A.relational database available for different analytic views. B.physical database available for different logical views. C.logical database available for different analytic views. D.physical database available for different analytic views. E.relational database available for different logical views.
B.physical database available for different logical views.
OLAP enables A.users to view both logical and physical views of data. B.users to obtain online answers to ad-hoc questions in a rapid amount of time. C.programmers to normalize data. D.users to quickly generate summary reports. E.programmers to quickly diagram data relationships.
B.users to obtain online answers to ad-hoc questions in a rapid amount of time.
DBMSs typically include report generating tools in order to: A.display data in graphs. B.retrieve and display data. C.display data in an easier-to-read format. D.analyze the database's performance. E.perform predictive analysis.
C.display data in an easier-to-read format.
A formal contract between customers and their service providers that outlines the specific responsibilities of the service provider and to the customer is called a(n): A. SOA. B. TCO. C. SLA. D. SaaS. E. RFQ.
C. SLA.
The introduction of the minicomputer: A. strengthened centralized computing. B. was dominated by IBM. C. allowed computers to be customized to the specific needs of departments or business units. D. represented the rise of Microsoft. E. offered new, powerful machines at higher prices than mainframes.
C. allowed computers to be customized to the specific needs of departments or business units.
Specifications that establish the compatibility of products and the ability to communicate in a network are called: A. network standards. B. Internet standards. C. technology standards. D. compatibility standards. E. telecommunications standards.
C. technology standards.
Which of the following technologies would you use to analyze the social media data collected by a major online retailer? A.OLAP B.Data mart C.Hadoop D.DBMS E.Data warehouse
C.Hadoop
Which of the following tools enables users to view the same data in different ways using multiple dimensions? A.Data mining B.Hadoop C.OLAP D.Predictive analysis E.SQL
C.OLAP
________tools are used to analyze large unstructured data sets, such as e-mail, memos, and survey responses to discover patterns and relationships. A.OLAP B.Classification C.Text mining D.In-memory E.Clustering
C.Text mining
Which of the following involves practices and technologies to minimize the environmental effects of manufacturing and managing computing devices? A. Cloud computing B. Capacity planning C. Utility computing D. Green computing E. On-demand computing
D. Green computing
Which type of infrastructure service provides data, voice and video connectivity to employees, customers, and suppliers? A. Networking B. Telephone C. Data management D. Telecommunications E. VOIP
D. Telecommunications
All of the following are current hardware platform trends except: A. quantum computing. B. cloud computing. C. virtualization. D. Unix. E. green computing.
D. Unix.
Which of the following enables a single physical resource (such as a server or a storage device) to appear to the user as multiple logical resources? A. Multicore processing B. Ubiquitous computing C. Autonomic computing D. Virtualization E. Cloud computing
D. Virtualization
A software program with a graphical user interface for displaying web pages and for accessing the web and other Internet resources is called a web: A. client. B. service. C. beacon. D. browser. E. app.
D. browser.
The ability to be in multiple states at once, dramatically increasing processing power, is a hallmark of: A. co-location. B. edge computing. C. grid computing. D. quantum computing. E. utility computing.
D. quantum computing.
Prewritten, commercially available sets of software programs that eliminate the need for a firm to write its own software programs for certain functions, are referred to as: A. service level agreements. B. open-source software. C. mashups. D. software packages. E. outsourced software.
D. software packages.
A household appliances manufacturer has hired you to help analyze its social media datasets to determine which of its refrigerators are seen as the most reliable. Which of the following tools would you use to analyze this data? A.Data mining software B.Data governance software C.Text mining tools D.Sentiment analysis software E.Web mining technologies
D.Sentiment analysis software
Which of the following is not one of the techniques used in web mining? A.Content mining B.Structure mining C.Data mining D.Server mining E.Usage mining
D.Server mining
A characteristic or quality that describes a particular database entity is called a(n): A.field. B.key field. C.tuple. D.attribute. E.relationship
D.attribute.
All of the following are technologies used to analyze and manage big data except: A.noSQL. B.Hadoop. C.analytic platforms. D.cloud computing. E.in-memory computing.
D.cloud computing.
A schematic of the entire database that describes the relationships in a database is called a(n): A.data definition diagram. B.data analysis table. C.intersection relationship diagram. D.entity-relationship diagram. E.data dictionary.
D.entity-relationship diagram.
A data warehouse is composed of: A.internal and external data sources. B.current data. C.historic external data. D.historic and current internal data. E.historical data from legacy systems.
D.historic and current internal data.
In a table for customers, the information about a single customer resides in a single: A.field. B.column. C.table. D.row. E.entity.
D.row.
________ are computers consisting of a circuit board with processors, memory, and network connections that are stored in racks. A. Mainframes B. Hybrid servers C. Rack servers D. Cloud servers E. Blade servers
E. Blade servers
________ uses individual atoms and molecules to create computer chips and other devices. A. A minicomputer B. On-demand computing C. Virtualization D. Quantum computing E. Nanotechnology
E. Nanotechnology
Which of the following types of computing involves purchasing computing power from a remote provider and paying only for the computing power used? A. Grid B. Quantum C. Edge D. Autonomic E. On-demand
E. On-demand
SaaS refers to: A. easy-to-use software tools for displaying Web pages. B. managing combinations of applications, networks, systems, storage, and security as well as providing Web site and systems performance monitoring to subscribers over the Internet. C. self-contained services that communicate with each other to create a working software application. D. supplying online access over networks to storage devices and storage area network technology. E. hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.
E. hosting and managing access to software applications delivered over the Internet to clients on a subscription basis.
Software that manages the resources of the computer is called: A. network software. B. web services software. C. data management software. D. application software. E. operating system software.
E. operating system software.
A SAN is a ________ network. A. service-oriented architecture B. scalable architecture C. server area D. software arrangement E. storage area
E. storage area
Detecting and correcting data in a database or file that are incorrect, incomplete, improperly formatted, or redundant is called: A.data normalization. B.data auditing. C.data optimization. D.defragmentation. E.data scrubbing
E.data scrubbing
All of the following are issues with the traditional file environment except: A.data sharing. B.poor security. C.data inconsistency. D.lack of flexibility in creating ad-hoc reports. E.inability to develop specialized applications for functional areas.
E.inability to develop specialized applications for functional areas.
An organization's rules for sharing, disseminating, acquiring, standardizing, classifying, and inventorying information is called a(n): A.data governance policy. B.data policy. C.data quality audit. D.data definition file. E.information policy.
E.information policy.
The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called: A.data defining. B.data scrubbing. C.optimization. D.data cleansing. E.normalization
E.normalization
The logical view of a database: A.allows the creation of supplementary reports. B.includes a digital dashboard. C.displays the organization and structure of data on the physical storage media. D.enables users to manipulate the logical structure of the database. E.presents data as they would be perceived by end users.
E.presents data as they would be perceived by end users.
A field identified in a table as holding the unique identifier of the table's records is called the: A.primary entity. B.unique ID. C.primary field. D.key field. E.primary key.
E.primary key.