Exam 2 Information Systems 220

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is a type of ambient data?

A file deleted from a hard disk

________ is spyware that logs and transmits everything a user types.

A keylogger

The Internet is based on which three key technologies?

Client/server computing, packet switching, and the development of communications standards for linking networks and computers

Which of the following best describes the importance of creating an accurate data model for your business's database?

It is critical, as without one, your data may be inaccurate, incomplete, or difficult to retrieve.

Which of the following enables users to view the same data in different ways using multiple dimensions?

OLAP

You are working in the IT department of a small paper supply company and planning a new database that monitors employee benefits and productivity. What would be the relationship you need to establish between Employee_ID in the Employee table and Parking_spot_number in the Perks table?

One-to-one

Which of the following is not an essential characteristic of cloud computing?

Open source software

An analysis of an information system that rates the likelihood of a security incident occurring and its cost would be included in which of the following?

Risk assessment

Which of the following is a device that sends packets of data through different networks assuring they go to the correct address?

Router

In order to manage their relationship with an outsourcer or technology service provider, firms need a contract that includes a(n):

SLA.

All of the following are tools or technologies for extracting information from unstructured data sets except:

SQL queries.

________ identify the access points in a Wi-Fi network.

SSIDs

Which of the following types of computers are used for weather forecasting on a national or worldwide scale?

Supercomputer

In which method of encryption is a single encryption key sent to the receiver so both sender and receiver share the same key?

Symmetric key encryption

On which of the following protocols is the Internet based?

TCP/IP

The toy manufacturer you work for wants to exchange data with a chain of toy stores in order to improve its distribution and speed to market. The toy stores use different software than your firm. Which of the following tools or technologies presents the best solution?

Web services

ipRealty, which combines Google Maps with real estate data, is an example of:

a mashup

Two-factor authentication utilizes a(n):

a multistep process of authentication.

Linux is

an example of open source software.

All of the following are physical components of an RFID system except:

bar codes.

Evil twins are:

bogus wireless network access points that look legitimate to users.

IPv6 has been developed in order to:

create more IP addresses.

Client/server computing is a:

distributed computing model where clients are linked to one another through a network that is controlled by a network server computer.

A firewall allows the organization to:

enforce a security policy on data exchanged between its network and the Internet.

Data mining is a tool for allowing users to:

find hidden relationships in data.

Connecting geographically remote computers in a single network to create a "virtual supercomputer" is called:

grid computing.

One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as:

hotspots.

A VPN:

is an encrypted private network configured within a public network.

A data mart usually can be constructed more rapidly and at lower cost than a data warehouse because:

it typically focuses on a single subject area or line of business.

Software applications that combine different components of online software applications are referred to as:

mashups.

The process of streamlining data to minimize redundancy and awkward many-to-many relationships is called:

normalization.

In terms of the data relationships found by data mining, associations refers to:

occurrences linked to a single event.

Predictive search in Google's search engine:

predicts what you are looking for as you enter words into the query box.

The logical view of a database:

presents data as they would be perceived by end users.

Software that manages the resources of the computer is called:

system software.

Businesses use ________ tools to search and analyze unstructured data sets, such as emails and memos.

text mining

In a multitiered network

the work of the entire network is balanced over several levels of servers.

The domain .gov is a(n):

top-level domain

An authentication system in which a user must provide two types of identification, such as a bank card and PIN, is called:

two-factor authentication.

A digital certificate system:

uses third party CAs to validate a user's identity.


Conjuntos de estudio relacionados

Разговорные фразы

View Set

AP Psychology Sensation and Perception

View Set

history of rock and roll final chapter 6

View Set

Chapter 04: Skin and Body Membranes

View Set

Chapter 24, Nursing Care of the Newborn and Family

View Set

Abeka 7th Grade History of the World Test 5 (Chapters 13-15)

View Set

Chemistry q2 - Intermolecular forces

View Set

Biology II -- Chapter 32 Study Module

View Set

NCSBN Practice Questions 121-131

View Set