CIS Test 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

Select all that apply Select the three primary wireless business applications. Multiple select question. - WPA - GPS - WEP - GIS - RFID

- GPS - GIS - RFID

Select all that apply Select the four key areas of technology recovery strategies. Multiple select question. - Business continuity plan - Client/Server - Hardware - Data center - Networking - Software

- Hardware - Data Center - Networking - Software

Select all that apply Select two items a disaster recovery cost curve charts. Multiple select question. - The cost to the company of replacing the enterprise architect. - The cost to the company of recovering from a disaster over time. - The cost to the company of hiring new employees. - The cost to the company of the unavailability of information and technology

- The cost to the company of recovering from a disaster over time - The cost to the company of the unavailability of information and technology

Select all that apply Which of the following are answers to tough business questions BI can answer? (Choose all that apply) Multiple select question. - Where is the business going? - What is the best selling product? - Who is the best sales representative? - Where has the business been? - Where is the business now?

- Where is the business going? - Where has the business been? - Where is the business now

Select all that apply Select three information MIS infrastructure components. Multiple select question. - Cloud computing - Business continuity planning - Disaster recovery - Accessibility - Backup

- business continuity plan - disaster recovery - backup

Select all that apply List the three primary elements of an information MIS infrastructure. Multiple select question. - Grid computing plan - Business continuity plan - Cloud computing plan - Disaster recovery plan - Backup and recovery plan

- business continuity plan - disaster recovery plan - backup and recovery plan

Select all that apply Identify the three mobile device management policies. Multiple select question. - Choose Your Own Device - Bring Your Own Device - Dual Persona Technology - Company-Issued, Personally Enabled - Containerization

- choose your own device - bring your own device - company-issued, personally enabled

Select all that apply Select two terms that describe the process for weeding out, fixing, or discarding inconsistent, incorrect, or incomplete data. Multiple select question. - Data cube - Data key - Data cleansing - Data integrity - Data scrubbing

- data cleaning - data scrubbing

Select all that apply Select the four primary traits of the value of data. Multiple select question. - Data level - Data quality - Data governance - Data timeliness - Data type - Data granularity

- data quality - data governance - data timeliness - data type

Select all that apply Select the four business continuity planning focus areas. Multiple select question. - Employee accessibility plan - Emergency notification systems - Business impact analysis - Cloud computing impact analysis - Disaster recovery plan - Technology recovery strategies

- emergency notification systems - business impact analysis - disaster recovery plan - technology recovery strategies

Select all that apply Select the three ways a data center can become more sustainable. Multiple select question. - Find locations where resources are inexpensive, clean, and available - Store greater amounts of information in less space - Find locations where resources are expensive, clean, and unavailable - Store fewer amounts of information in less space - Increase energy consumption - Reduce energy consumption

- find locations where resources are inexpensive, clean, and available - store greater amounts of information in less space - reduce energy consumption

Select all that apply Select the three terms that identify the geographic location of features and boundaries on Earth, such as natural or constructed features, oceans, and more. Multiple select question. - Geographic information - Geospatial data - Edge matching - Spatial data - Rubber sheeting

- geographic information - geospatial data - spatial data

Select all that apply Select the three benefits of cloud services. Multiple select question. - Improved accessibility - Greater reliability - Higher availability - Less reliability - Lower availability - Less efficient accessibility

- improved accessibility - greater reliability - higher availability

Select all that apply Which of the following are problems associated with dirty data? (Choose all that apply) Multiple select question. - Incorrect data - Accurate data - Non-formatted data - Duplicate data - Integrated data

- incorrect data - non-formatted data - duplicate data

Select all that apply Select the three primary side effects of businesses' expanded use of technology. Multiple select question. - Reduced electronic waste - Reduced energy consumption - Reduced carbon emissions - Increased carbon emissions - Increased electronic waste - Increased energy consumption

- increased carbon emission - increased electronic waste - increased energy consumption

Select all that apply Select three measurements of bandwidth. Multiple select question. - DSL - T1 - Dial-up - Kilobits - Megabits - Gigabits - Cable

- kilobits - megabits - gigabits

Select all that apply Select three common uses of GIS in a business. Multiple select question. - Updating website publishing - Mapping quantities - Finding what is nearby - Sending information alerts - Advanced connectivity and capacity

- mapping quantities - finding what is nearby - sending information alerts

Select all that apply Identify the three primary areas of an enterprise mobility strategy. Multiple select question. - Pervasive computing management - Mobile information management - Mobile device management - Dual persona technology - Mobile application management - IT consumerization management

- mobile information management - mobile device management - mobile application management

Select the four primary reasons low-quality data occurs in a system. Multiple select question. - Third-party and external data contains inconsistencies and errors. - Data-entry personnel enter inaccurate data to receive higher bonuses. - Different systems use consistent data entry standards and formats. - Data-entry personnel enter abbreviated data to save time. - Different systems have different data entry standards and formats. - Online customers intentionally enter inaccurate data to protect their privacy.

- third-party and external data contains inconsistencies and errors - data-entry personnel enter abbreviated data to save time - different systems have different data entry standards and formats - online customers intentionally enter inaccurate data to protect their privacy

Select all that apply Select the four functions that a database management system can perform on data in a database? Multiple select question. - Govern data - Update data - Create data - Delete data - Analyze data - Read data

- update data - create data - delete data - read data

Select all that apply List three sustainable MIS infrastructure components. Multiple select question. - Availability - Virtualization - Cloud computing - Business continuity planning - Grid computing

- virtualization - cloud computing - grid computing

Select all that apply Select three terms that represent the event that occurs when paper maps are laid edge to edge and items that run across maps but do not match are reconfigured to match. Multiple select question. - Warping - Edge matching - Geographic information - Rubber sheeting - Geospatial data

- warping - edge matching - rubber sheeting

Select the statement below that accurately reflects a database. Multiple choice question. - While a database has only one physical view, it can easily support multiple logical views that provides for flexibility. - While a database has only one logical view, it can easily support multiple physical views that provides for flexibility - A database has only one physical view and one logical view.

- while a database has only one physical view, it can easily support multiple logical views that provides for flexibility

Select all that apply Select the two accurate statements about mobility and wireless communications. Multiple select question. - Wireless refers to any type of operation accomplished without the use of a hard-wired connection. - Wireless means the technology can travel with the user - Mobile means the technology can travel with the user. - Mobile refers to any type of operation accomplished without the use of a hard-wired connection.

- wireless refers to any type of operation accomplished without the use of a hard-wired connection - mobile means the technology can travel with the user

the original analog cell phone network

1G

digital cell phone service

2G

broadband internet services over cellular networks; added MMS (multimedia message services) or pictures message services

3G

high-speed access, anywhere, anytime, to anything digital - audio, video, text

4G

What is the fifth-generation wireless broadband technology based on the 802.11ac standard engineered to greatly increase the speed and responsiveness of wireless networks?

5G

superior data communication rate; expected to provide artificial intelligence capabilities on wearable devices

5G

___________ uses GPS tracking to track vehicles. (use acronym)

AVL

_________ MIS Infrastructure includes the hardware, software, and telecommunications equipment that, when combined, provides the underlying foundation to support the organization's goals.

Agile

__________ is a wireless PAN technology that transmits signals over short distances among cell phones, computers, and other devices.

Bluetooth

multi tenancy, off-premise, several organizations, Hospital

Community cloud

____________ is the time of day of an expected arrival at a certain destination and is typically used for navigation applications. (Please use the acronym)

ETA

_________ is the time remaining before reaching a destination using the present speed and is typically used for navigation applications. (Please use the acronym)

ETE

A(n) ________ stores, views, and analyzes geographic data creating, multidimensional charts or maps.

GIS

What links business assets to a centralized system where they can be tracked and monitored over time?

GIS map automation

______ consumerization is the blending of personal and business use of technology devices and applications.

IT

What is the blending of personal and business use of technology devices and applications?

IT consumerization

Wireless _________ is a local area network that uses radio signals to transmit and receive data over distances of a few hundred feet.

LAN

____________ applications use location information to provide a service. (use acronym)

LBS

Which technology has multiple transmitters and receivers, allowing them to send and receive greater amounts of data than traditional networking devices?

MIMO

What includes the plans for how a firm will build, deploy, use, and share its data, processes, and MIS assets?

MIS infrastructure

_______ Law refers to the computer chip performance per dollar doubles every 18 months.

Moores

What provides communication for devices owned by a single user that work over a short distance?

PAN

What uses electronic tags and labels to identify objects wirelessly over short distances?

RFID

What is a transmitter/receiver that reads the contents of RFID tags in the area?

RFID reader

What is a combination of HTTP and SSL to provide encryption and secure identification of an Internet server?

SHTTP or HTTPS

___________ is a standard security technology for establishing an encrypted link between a web server and a browser, ensuring that all data passed between them remain private. (Please use the acronym)

SSL

What requires an electronic document that confirms the identity of a website or server and verifies that a public key belongs to a trustworthy individual or company?

SSL certificate

What uses IP technology to transmit telephone calls?

Voice over IP (VoIP)

What is an encryption algorithm designed to protect wireless transmission data?

WEP

What is a wireless security protocol to protect Wi-Fi networks?

WPA

_______ is a communications technology aimed at providing high-speed wireless data over metropolitan area networks.

WiMAX

What spans a large geographic area such as a state, province, or country?

Wide area network

The RFID ____________ is a device that measures the acceleration (the rate of change of velocity) of an item and is used to track truck speeds or taxi cab speeds.

accelerometer

What is a device that can measure the force of acceleration, whether caused by gravity or by movement?

accelerometer

What is the computer or network device that serves as an interface between devices and the network?

access point

Web ___________ initiative (WAI) brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the web accessible to people with disabilities, including auditory, cognitive, neurological, physical, speech, and visual disabilities.

accessibility

___________ refers to the varying levels that define what a user can access, view, or perform when operating a system.

accessibility

Is there an incorrect value in the data?

accurate

A(n) _______ is an entity that is capable of participating in an action or a network.

actor

What is an entity that is capable of participating in an action or a network?

actor

IP __________ is a unique number that identifies where computers are located on the network.

address

___________ access is unrestricted access to the entire system.

administrator

Data _______ is the collection of data from various sources for the purpose of data processing.

aggregation

What occurs when the user goes into an emotional state of over analyzing (or over-thinking) a situation so that a decision or action is never taken, in effect paralyzing the outcome?

analysis paralysis

encompasses all organizational data, and its primary purpose is to support the performing of managerial analysis tasks

analytical data

Mobile _________ management is a security strategy that administers and enforces corporate epolicies for applications on mobile devices.

application

An enterprise ___________ is a person grounded in technology, fluent in business, and able to provide the important bridge between MIS and the business.

architect

A data _________ is a business analytics specialist who uses visual tools to help people understand complex data.

artist

___________ tracking occurs when a company places active or semi-passive RFID tags on expensive products or assets to gather data on the items' location with little or no manual intervention.

asset

What represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or because of radio interference or physical obstructions such as walls?

attenuation

____________ represents the loss of a network signal strength measured in decibels (dB) and occurs because the transmissions gradually dissipate in strength over longer distances or because of radio interference or physical obstructions such as walls.

attenuation

___________ refers to the time frames when the system is operational.

availability

A ________ is an exact copy of a system's information.

backup

What is the maximum amount of data that can pass from one point to another in a unit of time?

bandwidth

__________ is the maximum amount of data that can pass from one point to another in a unit of time.

bandwidth

____________ measures network performance and represents the maximum amount of data that can pass from one point to another in a unit of time.

bandwidth

What offers a cloud-based Big Data service to help organizations analyze massive amounts of data to solve business dilemmas?

big data as a service

A(n) _________ is the smallest element of data and has a value of either 0 or 1.

bit

What is the smallest element of data and has a value of either 0 or 1?

bit

____ rate is the number of bits transferred or received per unit of time.

bit

________ is a type of digital currency in which a record of transactions is maintained and new units of currency are generated by the computational solution of mathematical problems and which operates independently of a central bank.

bitcoin

What is a type of distributed ledger, consisting of blocks of data that maintain a permanent and tamper-proof record of transactional data?

blockchain

A blockchain is formed by linking together ___________, data structures containing a hash, previous hash, and data.

blocks

employees use their own device

bring your own device

______ is a high-speed Internet connection that is always connected.

broadband

What is another name for cable modem?

broadband modem

What technology makes possible high-speed Internet access over ordinary residential electrical lines and offers an alternative to DSL or high-speed cable modems?

broadband over power line (BPL)

Cloud __________ is when a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for peak load requirements, ensuring a sudden spike in usage does not result in poor performance or system crashes.

bursting

What identifies all critical business functions and the effect that a specific disaster may have upon them?

business impact analysis

The problem of being data rich and information poor results from an inability to turn business data into ______.

business intelligence

What defines how a company performs certain aspects of its business and typically results in either a yes/no or true/false answer?

business rule

What enforces business rules vital to an organization's success and often require more insight and knowledge than relational integrity constraints?

business-critical integrity constraints

What is a type of digital modem used with high-speed cable Internet service?

cable modem

__________ planning determines future environmental infrastructure requirements to ensure high-quality system performance.

capacity

___________ represents the maximum throughput a system can deliver; for example, the capacity of a hard drive represents its size or volume.

capacity

What determines future environmental infrastructure requirements to ensure high-quality system performance?

capacity planning

_______ emissions includes the carbon dioxide and carbon monoxide produced by business processes and systems.

carbon

___________ is the science and art of making an illustrated map or chart.

cartography

War ____________ is the practice of tagging pavement with codes displaying where Wi-Fi access is available.

chalking

____________ RFID tags use plastic or conductive polymers instead of silicon-based microchips, allowing them to be washed or exposed to water without damaging the chip.

chipless

employees choose a company approved and configured device

choose your own device

________ computing is a subset of sustainable MIS which refers to the environmentally responsible use, manufacture, and disposal of technology products and computer equipment.

clean

A(n) ___________ is a computer designed to request information from a server.

client

What is a computer designed to request information from a server?

client

What occurs when a company uses its own computing infrastructure for normal usage and accesses the cloud when it needs to scale for peak load requirements, ensuring a sudden spike in usage does not result in poor performance or system crashes?

cloud bursting

What stores, manages, and processes data and applications over the Internet rather than on a personal computer or server?

cloud computing

What is the software that makes possible the benefits of cloud computing, such as multi-tenancy?

cloud fabric

What is a nonprofit organization that promotes research into best practices for securing cloud computing and cloud delivery models?

cloud security alliance

A(n) _________ site is a separate facility that does not have any computer equipment but is a place where employees can move after a disaster.

cold

a separate facility that does not have any computer equipment, but is a place where employees can move after a disaster

cold site

____________ cloud serves a specific community with common business models, security requirements, and compliance considerations.

community

employees provided with corporate devices

company issued, personally enabled

What can compare two or more datasets to identify patterns and trends?

comparative analysis

_________ monitoring occurs when a company keeps tabs of competitor's activities on the web using software that automatically tracks all competitor website activities such as discounts and new products.

competitive

Is a value missing from the data?

complete

Is aggregate or summary data in agreement with detailed data?

consistent

Energy ___________ is the amount of energy consumed by business processes and systems.

consumption

What isolates corporate applications from personal applications on a device?

containerization

Business ____________ planning details how a company recovers and restores critical business operations and systems after a disaster or extended disruption.

continuity

A cloud fabric ___________ is an individual who monitors and provisions cloud resources, similar to a server administrator at an individual company.

controller

Network ________ is the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures.

convergence

What is a company's acknowledged responsibility to society?

corporate social responsibility

A data _______ is the common term for the representation of multidimensional data.

cube

Business intelligence ________ track corporate metrics such as critical success factors and key performance indicators and include advanced capabilities such as interactive controls allowing users to manipulate data for analysis.

dashboards

A __________ center is a facility used to house management information systems and associated components, such as telecommunications and storage systems.

data

A bad actor is an entity that is participating with ill-intentions. Users have no way to ensure that a bad actor is on the network intercepting, reading, or modifying __________.

data

transactional data sender, receiver, number of coins

data

facilitates the accessibility of business-critical data in a timely, secure, and affordable manner

data as a service (DaaS)

What is the common term for the representation of multidimensional data?

data cube

What is the smallest or basic unit of data?

data element

Select a term that is a synonym for data element, the smallest or basic unit of data in a database.

data field

What occurs when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps or where missing data might exist?

data gap analysis

What is a measure of the quality of data?

data integrity

What is a storage repository that holds a vast amount of raw data in its original format until the business needs it?

data lake

What is the time it takes for data to be stored or retrieved?

data latency

What contains a subset of data warehouse data?

data mart

What is an individual item on a graph or a chart?

data point

What is the duplication of data, or the storage of the same data in multiple places?

data redundancy

Select the statement that accurately describes a situation in which there is too much data to properly understand or make use of it.

data rich and information poor

What is the management and oversight of an organization's data assets to help provide business users with high-quality data that is easily accessible in a consistent manner?

data stewardship

A(n) _________ maintains data about various types of objects (inventory), events (transactions), people (employees), and places (warehouses).

database

What maintains data about various types of objects (inventory), events (transactions), people (employees), and places (warehouses)?

database

What creates, reads, updates, and deletes data in a database while controlling access and security?

database management system

What is an organized collection of data?

dataset

Data-driven _______ management is an approach to business governance that values decisions that can be backed up with verifiable data.

decision

A data ____________ compiles all of the metadata about the data elements in the data model.

dictionary

_________ subscriber line (DSL) provides high-speed digital data transmission over standard telephone lines using broadband modem technology, allowing both Internet and telephone services to work over the same phone lines.

digital (DSL)

What is a worldwide gap giving advantage to those with access to technology?

digital divide

What provides high-speed digital data transmission over standard telephone lines using broadband modem technology, allowing both Internet and telephone services to work over the same phone lines?

digital subscriber line (DSL)

What is erroneous or flawed data?

dirty data

A ___________ recovery plan is a detailed process for recovering information or a system in the event of a catastrophic disaster.

disaster

__________ Recovery as a Service (DRaaS) offers backup services that use cloud resources to protect applications and data from disruption caused by disaster.

disaster

_________ computing processes and manages algorithms across many machines in a computing environment.

distributed

What processes and manages algorithms across many machines in a computing environment?

distributed computing

What converts IP addresses into domains, or identifying labels that use a variety of recognizable naming conventions?

domain name system (DNS)

War ________ is deliberately searching for Wi-Fi signals while driving by in a vehicle.

driving

What creates two completely separate user interfaces one the same device, one for work and one for personal use?

dual persona technology

_________ scaling means the MIS infrastructure can be automatically scaled up or down based on needed requirements

dynamic

What allows dynamic IP address allocation so users do not have to have a preconfigured IP address to use the network?

dynamic host configuration protocol (DHCP)

What means the MIS infrastructure can be automatically scaled up or down based on needed requirement?

dynamic scaling

A(n) __________ is a sudden, unexpected event requiring immediate action due to potential threat to health and safety, the environment, or property.

emergency

What is an infrastructure built for notifying people in the event of an emergency?

emergency notification system

What is an enterprisewide security strategy to enforce corporate epolicies while enabling employee use of mobile devices such as smart phones and tablets?

enterprise mobility management

Attributes are the data elements associated with an ________.

entity

Select the term that refers to the table used to store data about a person, place, thing, transaction, or event.

entity

Which data element stores a single piece of data about a person, place, thing, transaction, or event?

entity

What refers to discarded, obsolete, or broken electronic devices?

ewaste

___________, transformation, and loading is a process that extracts data from internal and external databases, transforms it using a common set of enterprise definitions, and loads it into a data warehouse.

extraction

What is an extension of an intranet that is available only to authorized outsiders, such as customers, partners, and suppliers?

extranet

The cloud ___________ is the software that makes possible the benefits of cloud computing, such as multi-tenancy.

fabric

___________ occurs when the primary machine recovers and resumes operations, taking over from the secondary server.

failback

What occurs when a redundant storage server offers an exact replica of the real-time data, and if the primary server crashes, the users are automatically directed to the secondary server or backup server?

failover

A technology _________ occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage.

failure

What is the application of big data analytics to smaller data sets in near-real or real-time in order to solve a problem or create business value?

fast data

__________ tolerance is the ability for a system to respond to unexpected failures or system crashes as the backup system immediately and automatically takes over with no loss of service.

fault

______ transfer protocol is a simple network protocol that allows the transfer of files between two computers on the Internet.

file (FTP)

Packet _______ represents the end of the packet or transmission end.

footer

A data ________ analysis occurs when a company examines its data to determine if it can meet business expectations, while identifying possible data gaps or where missing data might exist.

gap

What is the first block created in the blockchain?

genesis block

__________ is a GPS technology adventure game that posts the longitude and latitude location for an item on the Internet for users to find.

geocache

What is a coding process in spatial databases that assigns a digital map feature to an attribute that serves as a unique ID (tract number, node number) or classification (soil type, zoning category)?

geocoding

What term describes a round coin-sized object that is uniquely numbered and hidden in geocache?

geocoin

What stores, views, and analyzes geographic data creating, multidimensional charts or maps?

geographic information system (GIS)

What is a satellite-based navigation system providing extremely accurate position, time, and speed information?

global positioning system (GPS)

A _________ personal computer is built using environment friendly materials and designed to save energy.

green

What is built using environment friendly materials and designed to save energy?

green personal computer

________ computing is a collection of computers, often geographically dispersed, that are coordinated to solve a common problem.

grid

_________ consists of the physical devices associated with a computer system, and software is the set of instructions the hardware executes to carry out specific tasks.

hardware

A _____ is a function that converts an input of letters and numbers into an encrypted output of a fixed length.

hash

the blocks unique identifier like a fingerprint

hash

_________-speed Internet cable connections provides Internet access using a cable television company's infrastructure and a special cable modem.

high

____________ availability occurs when a system is continuously operational at all times.

high

What provides Internet access using a cable television company's infrastructure and a special cable modem?

high-speed Internet cable connections

What is a separate and fully equipped facility where the company can move immediately after a disaster and resume business?

hot site

a separate and fully equipped facility where the company can move immediately after a disaster and resume business

hot site

What are designated locations where Wi-Fi access points are publicly available?

hotspots

What is the correlation between Moore's law and energy consumption?

huge increases in technology from Moore's law have greatly amplified energy consumption

___________ cloud includes two or more private, public, or community clouds, but each cloud remains separate and is only linked by technology that enables data and application portability.

hybrid

mix of private, public, and community

hybrid cloud

What uses both on-site and off-site resources to store corporate data?

hybrid cloud storage

What is a broad administrative area that deals with identifying individuals in a system and controlling their access to resources within that system by associating user rights and restrictions with the established identity?

identity management

What simply means unchangeable?

immutable

Users could not get the data they needed; what was collected was not always useful for intended purposes.

inadequate data usefulness

What is the term that refers to an unplanned interruption of a service?

incident

What is the process responsible for managing how incidents are identified and corrected?

incident management

Every department had its own method for recording data so when trying to share information, data did not match and users did not get the data they really needed.

inconsistent data definitions

A data point is an _________ item on a graph or a chart.

individual

Most data stored in operational databases did not allow users direct access; users had to wait to have their queries or questions answered by MIS professionals who could code SQL.

ineffective direct data access

What presents the results of data analysis, displaying the patterns, relationships, and trends in a graphical format?

infographics

Wi-Fi ____________ includes the inner workings of a Wi-Fi service or utility, including the signal transmitters, towers, or poles, along with additional equipment required to send out a Wi-Fi signal.

infrastructure

offers computer hardware and networking equipment on a pay-per-use basis

infrastructure as a service (IaaS)

What are rules that help ensure the quality of data?

integrity contraints

What distributes digital video content using IP across the Internet and private IP networks?

internet protocol TV (IPTV)

What is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, web publishing, and the support of business processes?

intranet

_________ is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, web publishing, and the support of business processes.

intranet

Managers need to perform cross-functional analysis using data from all departments, which differed in granularities, formats, and levels.

lack of data standards

__________ represents a north/south measurement of position.

latitude

Usability is the degree to which a system is easy to _______ and efficient and satisfying to use.

learn

A _______ records classified and summarized transactional data

ledger

What connects a group of computers in close proximity, such as in an office building, school, or home?

local area network

Which applications use location information to provide a service?

location-based services

What represents an east/west measurement of position?

longitude

What refers to how quickly a system can transform to support environmental changes?

maintainability

Identity ____________ is a broad administrative area that deals with identifying individuals in a system and controlling their access to resources within that system by associating user rights and restrictions with the established identity.

management

_________ data management is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems.

master

What is the practice of gathering data and ensuring that it is uniform, accurate, consistent, and complete, including such entities as customers, suppliers, products, sales, employees, and other critical entities that are commonly integrated across organizational systems?

master data management

___________ provides details about data.

metadata

A(n) _________ area network is a large computer network usually spanning a city.

metropolitan

A(n) ___________ area network is a large computer network usually spanning a city.

metropolitan

What is the set of processes and procedures involved in writing software for use on wireless devices?

mobile application development

What is a security strategy that administers and enforces corporate epolicies for applications on mobile devices?

mobile application management

What is the ability to purchase goods and services through a wireless Internet-enabled device?

mobile business

What is a security strategy comprised of products and services that offer remote support for mobile devices, such as smart phones, laptops, and tablets?

mobile device management

What is a security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it?

mobile information management

A(n) _______ is a device that enables a computer to transmit and receive data.

modem

What is a device that enables a computer to transmit and receive data?

modem

____________ -tenancy in the cloud means that a single instance of a system serves multiple customers.

multi

What is about ensuring that everyone has equal access to the Internet?

net neutrality

DSL, cable modem, broadband

network access technologies

VoIP, UC, IPTV

network convergence

What is the efficient coexistence of telephone, video, and data communication within a single network, offering convenience and flexibility not possible with separate infrastructures?

network convergence

TCP/IP, FTP, DHCP

network protocols

ISP, NSP, RSP

network providers

What combines networks by splitting the available bandwidth into independent channels that can be assigned in real time to a specific device?

network virtualization

LAN, WAN, MAN

networking categories

What refers to a multi-tenancy co-tenant that monopolizes bandwidth, servers, CPUs, and other resources that cause network performance issues?

noisy neighbor

One primary goal of a database is to eliminate data redundancy by recording each piece of data in _______ place(s) in the database.

only one

What is a single unit of binary data routed through a network?

packet

What lists the destination (for example, in IP packets the destination is the IP address) along with the length of the message data?

packet header

_________ RFID tags do not have a power source, whereas active RFID tags have their own transmitter and a power source (typically a battery).

passive

______________ is a computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server.

peer-to-peer (P2P)

What measures how quickly a system performs a process or transaction?

performance

A(n) __________ area network provides communication for devices owned by a single user that work over a short distance.

personal

_________ computing is the growing trend of embedding computer capabilities into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user's need to interact with computers as computers.

pervasive

offers hardware, networking, and applications on a pay-per-use basis

platform as a service (PaaS)

The data, if available, were often incorrect or incomplete. Therefore, users could not rely on the data to make decisions.

poor data quality

What refers to the ability of an application to operate on different devices or software platforms, such as different operating systems?

portability

Emergency ___________ ensures a company is ready to respond to an emergency in an organized, timely, and effective manner.

preparedness

hash of the previous block in the blockchain

previous hash

A(n) ________ key is a field (or group of fields) that uniquely identifies a given record in a table.

primary

What is a field that uniquely identifies a given record in a table?

primary key

_________ cloud serves only one customer or organization and can be located on the customer's premises or off the customer's premises.

private

single tenancy, on-premise, one organization, Bank

private cloud

A __________ web application is a website that looks and behaves as if it is a mobile application but it is just a normal website.

progressive

What is a way to validate transactions and achieve the distributed consensus?

proof-of-stake

Wi-Fi __________ access is a wireless security protocol to protect Wi-Fi networks.

protected

_________ is a standard that specifies the format of data as well as the rules to be followed during transmission.

protocol

What is software that prevents direct communication between a sending and receiving computer and is used to monitor packets for security reasons?

proxy

_________ cloud promotes massive, global, and industrywide applications offered to the general public.

public

multi tenancy, off-premise, Amazon EC2

public cloud

Many firms complete data ___________ audits to determine the accuracy and completeness of its data.

quality

A(n) ___________ -by-example tool helps users graphically design the answer to a question against a database.

query

Which tool helps users graphically design the answer to a question against a database?

query-by-example

A _______ access network is a technology that connects individual devices to other parts of a network through radio connections.

radio

What is a technology that connects individual devices to other parts of a network through radio connections?

radio access network

_______ data is data that has not been processed for use.

raw

What is data that has not been processed for use?

raw data

Which system provides real-time data in response to requests?

real-time

A(n) _________ is a collection of related data elements.

record

An incident ___________ contains all of the details of an incident.

record

Technology _________ strategies focus specifically on prioritizing the order for restoring hardware, software, and data across the organization that best meets business recovery requirements.

recovery

What is the ability to get a system up and running in the event of a system crash or failure that includes restoring the information backup?

recovery

What offers Internet service by connecting to NSPs, but they also can connect directly to each other?

regional service providers

__________ integrity constraints are rules that enforce basic and fundamental information-based constraints.

relational

Which of the following are rules that enforce basic and fundamental information-based constraints, such as not creating an order for a nonexistent customer?

relational integrity constraints

___________ ensures a system is functioning correctly and providing accurate information.

reliability

A(n) __________ receives and repeats a signal to extend its attenuation or range.

repeater

What receives and repeats a signal to extend its attenuation or range?

repeater

Containerization isolates corporate applications from personal applications on a device. What is another name for containerization?

sandboxing

What is a space station that orbits the Earth receiving and transmitting signals from Earth-based stations over a wide area?

satellite

What describes how well a system can scale up, or adapt to the increased demands of growth?

scalability

involves applications such as anti-virus software delivered over the Internet with constant virus definition updates that are not reliant on user compliance

security as a service (SaaS)

___________ -passive RFID tags use a battery to run the microchip's circuitry, but communicate by drawing power from the RFID reader.

semi

A(n) _______ is a computer dedicated to providing information in response to requests.

server

__________ virtualization combines the physical resources, such as servers, processors, and operating systems, from the applications.

server

___________ is how quickly a third party can change a system to ensure it meets user needs and the terms of any contracts, including agreed levels of reliability, maintainability, or availability.

serviceability

System virtualization is the ability to present the resources of a _______ computer as if it is a collection of separate computers ("virtual machines"), each with its own virtual CPUs, network interfaces, storage, and operating system?

single

What implies that each customer or tenant must purchase and maintain an individual system?

single-tenancy

___________ offer more advanced computing ability and connectivity than basic cell phones.

smartphones

___________ as a Service delivers applications over the cloud using a pay-per-use revenue model.

software

offers applications on a pay-per-use basis

software as a service (SaaS)

_____ data identifies the primary location where data is collected.

source

What identifies the primary location where data is collected?

source data

Proof-of-______ is a way to validate transactions and achieve the distributed consensus.

stake

______ packet formats include a packet header, packet body containing the original message, and packet footer.

standard

What includes a packet header, packet body containing the original message, and packet footer?

standard packet formats

Data ___________ is the management and oversight of an organization's data assets to help provide business users with high-quality data that is easily accessible in a consistent manner.

stewardship

______ virtualization combines multiple network storage devices so they appear to be a single storage device.

storage

What combines multiple network storage devices so they appear to be a single storage device?

storage virtualization

What is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred?

streaming

_____ data is a method of sending audio and video files over the Internet in such a way that the user can view the file while it is being transferred.

streaming

What refers to the safe disposal of MIS assets at the end of their life cycle?

sustainable MIS disposal

What identifies ways that a company can grow in terms of computing resources while simultaneously becoming less dependent on hardware and energy consumption?

sustainable MIS infrastructure

An RFID ________ is an electronic identification device that is made up of a chip and antenna.

tag

A data map is a technique for establishing a match, or balance, between the source data and the ______ data warehouse.

target

What occurs when the ability of a company to operate is impaired because of a hardware, software, or data outage?

technology failure

What allows users to work from remote locations, such as home or a hotel, using high-speed Internet to access business applications and data?

telecommuting (virtual workforce)

Is the data current with respect to business needs?

timely

What is a utility application that monitors the network path of packet data sent to a remote computer?

traceroute

____________ is a utility application that monitors the network path of packet data sent to a remote computer.

traceroute

encompasses all of the data contained within a single business process or unit of work, and its primary purpose is to support daily operational tasks

transactional data

What provides the technical foundation for the public Internet as well as for large numbers of private networks?

transmission control protocol/Internet protocol (TCP/IP)

True or false: Business-critical integrity constraints tend to mirror the very rules by which an organization achieves success.

true

True or false: Cloud computing offers new ways to store, access, process, and analyze information and connect people and resources from any location in the world where an Internet connection is available. For this reason cloud computing offers greater sustainability.

true

True or false: Companies should choose a backup and recovery strategy in line with their goals and operational needs.

true

True or false: Gender, for instance can be referred to in many ways (Male, Female, M/F, 1/0), but it should be standardized on a data warehouse with one common way of referring to each data element that stores gender (M/F).

true

True or false: The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and cloud delivery models. CSA offers tools, documentation, and reports on cloud computing services, security education, and security best practices for implementing cloud models.

true

True or false: The characteristics of agile MIS infrastructures can help ensure your systems can meet and perform under any unexpected or unplanned changes.

true

True or false: Virtualization is also one of the easiest and quickest ways to achieve a sustainable MIS infrastructure because it reduces power consumption and requires less equipment that needs to be manufactured, maintained, and later disposed of safely. Managers no longer have to assign servers, storage, or network capacity permanently to single applications. Instead, they can assign the hardware resources when and where they are needed, achieving the availability, flexibility, and scalability a company needs to thrive and grow.

true

What is a system called when it is not operating and cannot be used?

unavailable

What is the integration of communication channels into a single service?

unified communications (UC)

offers enterprise communication and collaboration services over the Internet such as instant messaging systems, online meeting, and video conferencing

unified communications as a service (UCaaS)

Is each transaction and event represented only once in the data?

unique

An _______ reuses or refurbishes ewaste and creates a new product.

upcycle

What offers a pay-per-use revenue model similar to a metered service such as gas or electricity?

utility computing

Why does a database offer increased information security?

various security features of databases ensure that individuals have only certain types of access to certain types of data

A(n) ________ private network occurs when a company creates a direct private network that links among themselves or creates private, secure Internet access, in effect a private tunnel within the Internet.

virtual

What is it called when a company creates a direct private network that links among themselves or creates private, secure Internet access, in effect a private tunnel within the Internet?

virtual private network

What is another name for telecommuting?

virtual workforce

What creates a virtual version of computing resources, such as an operating system, a server, a storage device, or network resources?

virtualized system

Data __________ tools move beyond Excel graphs and charts into sophisticated analysis techniques such as pie charts, controls, instruments, maps, time-series graphs, and more.

visualization

Data ___________ describes technologies that allow users to "see" or visualize data to transform information into a business perspective.

visualization

_________ over LTE allows mobile voice calls to be made over broadband networks, creating—under the right network conditions—clearer audio and fewer dropped calls.

voice

A ____________ is a system weakness, such as a password that is never changed or a system left on while an employee goes to lunch, that can be exploited by a threat.

vulnerability

What is the practice of tagging pavement with codes displaying where Wi-Fi access is available?

war chalking

A data ________ is a logical collection of data, gathered from many different operational databases, that supports business analysis activities and decision-making tasks.

warehouse

A(n) __________ site is a separate facility with computer equipment that requires installation and configuration.

warm

a separate facility with computer equipment that requires installation and configuration

warm site

What means that people with disabilities, including visual, auditory, physical, speech, cognitive, and neurological disabilities, can use the web?

web accessibility

Where on a disaster recovery cost curve is the optimal place to operate in terms of cost and time?

where the curve between time from disaster to recovery and cost intersect

A(n) _______ area network spans a large geographic area such as a state, province, or country.

wide

A(n) ___________-WAN is a wide area network that uses radio signals to transmit and receive data.

wireless

Mobile business is the ability to purchase goods and services through a ________ Internet-enabled device.

wireless

What is a metropolitan area network that uses radio signals to transmit and receive data?

wireless MAN (WMAN)

What enables devices to connect to a wireless network to communicate with each other?

wireless access point

What is a means by which portable devices can connect wirelessly to a local area network, using access points that send and receive data via radio waves?

wireless fidelity

Proof-of-_________ is a requirement to define an expensive computer calculation, also called mining, that needs to be performed in order to create a new group of trustless transactions on the distributed ledger or blockchain.

work


Conjuntos de estudio relacionados

Who is the WTO? Who are the League of Nations and the United Nations? What national security theory did Woodrow Wilson believe in?

View Set

Biology Cellular Respiration and Photosynthesis

View Set

Pharmacology, Ch. 3: Toxic Effects of Drugs

View Set

Chapter: Basic Insurance Concepts and Principles

View Set

Chapter 16 Control Systems and Quality Management: Techniques for Enhancing Organizational Effectiveness

View Set

NX BASIC DESIGN KNOWLEDGE CHECKS

View Set