cis test 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

Software that allows an organization to manage and provide access to data is a​

database management system​ (DBMS)

SQL injection attacks are related to

databases

​A(n) ________ is a collection of data organized to serve many applications efficiently.

database

The size of a nanotube is about​ ________ thinner than a human hair.

10,000 times

is the standard for wireless technologies

802.11

Bluetooth is another name for the​ ________ wireless networking standard.

802.15

A network that spans between Montana and Washington is​ a(n)

wide area network

is a markup language that allows for tagging selected elements of the content of documents for their meanings and is used for transferring data

xml

Regarding the IT infrastructure​ ecosystem, data management includes​

​Oracle, SQL​ Server, and MySQL

802.11 is also known as

​Wi-Fi

Regarding IS​ security, DoS represents​

denial of service

A(n) ________ signal is a​ discrete, binary waveform.

digital

are data files used to identify and protect online transactions using a trusted third party

digital certificates

MasterCard having a duplicate computer center in multiple cities is an example of​ ________ in case operations at one location are disrupted.

disaster recovery planning

Regarding the IT infrastructure​ ecosystem, SAP is an example of​

enterprise software applications

A(n) ________ is the most popular method to model a database.

entity-relationship (ER) model

Competitor​ firms' IT services is​ a(n) ________ of the competitive forces model for IT infrastructure.

external part

According to​ Moore's Law​ (1965), the ratio of price to performance has​

fallen

A​ ________ is a component in the computer system data hierarchy that includes content such as Student ID​ 100, Course IS​ 101, and Grade A.

field

A​ ________ is a component in the computer system data hierarchy consists of multiple records of the same type.

file

A​ ________ provides the link from one table to another​ table's primary key.

foreign key

IS security firewalls are an example of a

gatekeeper

Salesforce.com's Force.com is an example of​

platform as a sevice​ (PaaS)

Another term for a key field is a​

primary key

The field that uniquely identifies a row in a relational database table is called a​

primary key

Infrastructure as a service​ (IaaS) provides​

processing, storage, and networking resources

A positive regarding cloud computing includes​

rapid elasticity

If a computer is sending a​ file, and a packet being sent is​ damaged, the​ ________ computer asks the​ ________ computer to retransmit it.

receiving; sending

Another term for a database row is​ a(n)

record

On a​ client/server system, most of the powerful processing is handled by the​

server

A​ ________ is a program that monitors information traveling over a network and​

sniffer; can be used for criminal purpose

Google Apps are an example of​

software as a service​ (SaaS)

TCP/IP was original developed in the 1970s to support​

the Department of Defense

The domain extension .mil represents​

the U.S. Military

The Law of Mass Digital Storage suggests​

the amount of digital information doubles each year

Public key encryption uses​ ________ key(s).

two

​A(n) ________ uses the Internet to create a secure network connection.

virtual private network​ (VPN)

Setting up a system so that it is not restricted by physical configuration or geographic location is an example of​

virtualization

help(s) ensure that important network traffic receives high​ priority, and​ less-critical network traffic receives lower priority.

Deep packet inspection​ (DPI)

Viruses differ from worms because worms​

can operate on their own without attaching to other computer program files

If someone asks you to stay home and click advertising without being interested in the product or​ service, they may be asking you to commit​

click fraud

computing emerged in 1983

client/server

computing emerged in 2000

cloud

Coaxial cable is​ a(n) ________ for linking network components.

connection medium

The​ ________ is the​ world's most​ extensive, public communication system.

internet

The​ world's largest network is the​

internet

An Internet Protocol​ (IP) address

is a​ 32-bit number assigned to every computer on the Internet

If someone loads a program that tracks everything you​ type, the specific spyware is a​

key logger

A small business that connects personal devices within a​ 500-meter radius is​ a(n)

local area network

The typical computing configuration in 1960 was​

mainframe

includes computer​ viruses, worms, and Trojan horses.

malware

According to​ McAfee, ________ now pose the greatest security risks

mobile devices

is a widely used open source DBMS.

my SQL

A​ ________ links two or more computers which enable the sharing of information

network

An emerging​ non-relational database management system is called​

noSQl

The formal process to remove data problems such as repeating groups is called​

normalization

Regarding the IT infrastructure​ ecosystem, Microsoft​ Windows, Unix, and Mac OS X are examples of

operating systems platforms

Slicing digital messages into parcels is called

packet switching

A router is a communications processer used to route​ ________ through different networks.

packets of data

The most commonly used authentication technique used for end users is​ a(n)

password

Although​ "Big Data"​ doesn't refer to a specific amount of​ data, it usually does involve

petabytes

If someone sends you an email trying to appear as a normal site you commonly visit to obtain unauthorized​ information, they are

phishing

is defined as the shared technology resources that provide the platform for the​ firm's specific information systems applications.

Information technology infrastructure

EarthLink and NetZero are examples of​

Internet service providers

The SQL​ ________ statement allows you to combine two different tables

JOIN

is the most​ well-known open source operating system.

Linux

In​ 2002, the​ ________ Act was passed to help protect investors with new financial statements reforms

Sarbanes-Oxley

An information systems​ ________ examines a​ firm's overall security environment and determines if the organization is properly prepared to address threats

audit

​Microsoft's DBMS that includes​ built-in report generation and reporting is called​

Access

Amazon is one of the first to provide cloud computing relational databases. This effort is called

Amazon Relational Database Service

is used to ensure the person is who​ he/she claims to be

Authentication

For​ DBMS's that do NOT include a reports​ generator, ________ is a popular option for large corporate DBMS.

Crystal Reports

was passed in 1996 to protect medical records.

HIPAA

is a page description language for generating Web pages​ (e.g., text, dynamic​ links).

HTML

is the most popular NoSQL DBMS

Hadoop

According to your​ reading, Macy's uses​ ________ technology to track individual items for sale on store shelves

RFID

are used to track movements of products through the supply chain.

RFID's

​Microsoft's most powerful DBMS is​

SQL SERVER

is a method for encrypting network traffic on the Web.

SSL

SQL stands for​

Structured Query Language

services ensure that a​ firm's new infrastructure works with the​ firm's older systems and that all parts of the​ firm's infrastructure work together.

System integration

A​ ________ is a software program that mimics another program and often causes damage.

Trojan horse

​A(n) ________ outlines acceptable uses of information systems assets.

acceptable use policy

A(n) ________ signal is represented by a continuous waveform that passes through a communications medium

analog

Another name for a database field is​ a(n)

attribute

Using your handprint to access a safe deposit box is an example of​ ________ authentication.

biometric

A​ ________ is the smallest component in the computer system data hierarchy

bit

Digital information transfer speeds are measured in​

bits per second

A​ ________ is a component in the computer system data hierarchy that represents an ASCII character.

byte

A cloud

can be private or public

Data​ cleansing, working to identify and fix incorrect​ data, is also called​

data scrubbing

The Domain Name System​ (DNS) converts​ ________ to​ ________.

domain​ names; IP addresses

Someone who intends to gain unauthorized access to a computer system is considered to be a

hacker

An IT infrastructure includes​

hardware, software, and services

An intrusion detection system​ (IDS)

helps protect a system using​ full-time monitoring tools

The number of cycles per second that can be sent through a network medium is calculated in​

hertz

Enterprise software applications represent a​ ________ industry

hundreds of billions of dollars per year

​A(n) ________ is an important resource for an organization to​ create, illustrating rules on how data is organized and who has access to what data.

information policy

Your​ firm's IT strategy is​ a(n) ________ of the competitive forces model for IT infrastructure

internal part

Your​ firm's business strategy is​ a(n) ________ of the competitive forces model for IT infrastructure.

internal part


Conjuntos de estudio relacionados

BIOLOGY MUSCLES THAT MOVE THE FOOT

View Set

Chapter 38: Agents to Control Blood Glucose Levels #3

View Set

Chapter 52: Alterations in Musculoskeletal Function: Rheumatic Disorders

View Set

CFA: Books 1 & 2 (Ethics, stats, econ)

View Set

S65 Client Investment Recommendations/Strats (Units 15-18, 21-23)

View Set