Information Systems Management Test 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is the difference between a DDoS attack and a DoS attack?

A DoS is carried out with one source device and a DDoS attack is carried out with many source devices.

List characteristics of computer viruses. More than one answer may be correct.

A computer virus is software that infects computers and is created using computer code, Viruses can destroy programs or alter the operations of a computer or network.

Which of the following describe cloud computing in today's business environment? More than one answer may be correct

A majority of global companies are using the cloud to backup and store data and information, Due to the cost-effective nature of clous storage many businesses use it to back up data

The infection of a digital device by a computer virus happens in stages. What is the second step in this process?

An action such as running or opening a file activates a virus.

Why do organizations need to determine their highest priority security risk? More than on answer may be correct.

An organization may not have the resources to protect all of its data, The level of protection provided may be determined by the priority level

a technology called ____ may change the way doctors treat HIV, cancer, and antibiotic resistant bacterial infections

CRISPR

One of Google's companies that is investigating AI and machine learning is called

DeepMind

The second step in the PDLC is to create the plan or algorithm. This plan is usually written as a flowchart and is written in____

English

the three-step data visualization process is comprised of which of the following

Explore data sets for patterns, create your visuals, planning for visuals

One noted disadvantage of cloud computing is the issue of over collaboration between users

False

Although not a programming language technically,___relates to the protocols that enable content to be displayed on the Internet

HTML

organ on a chip (OOC) technology allows scientists to develop drugs without animal or human testing. select the three companies that are developing OOC

Hepregen, Organovo, Nortis

A project manager needs to assess how much progress her team has made on the project, to provide executives with a weekly update. Which collaboration software program will be most useful for assessing the project's status?

Trello

Although not a programming language technically,___ pertains to the protocols that enable content to be displayed on the internet

XML

improving decision making, customer service, production and operations processes are just a few of the trends in data___

analystics

The programming language of the third generation learned by most students when most computers used MS DOS was____

basic

allowing people to share a digital ledger accross a network of computers, ___ uses computer code to create concatenated (linked together) blocks of transactions

blockchain

SQL is quite useful when working with large data sets and is widely used in today;s business environment. It allows the user to query that data contained in a ____

database

There are almost always errors after the code has been written. The PDLC's fourth step involves finding and correcting these errors in a process. The process is called____

debugging

Trying to answer questions such as, "what happened?" or, "what is occurring?" or "what was the ROI?", is the role of ___.

descriptive analytics

An initial value process, a process and a test condition which can potentially return to the initial value is called a _____

loop

A(n)_____-oriented assesment operates well when inputs can readily be put into distinct categories or classes

object

A major trend in data analytics is the us of artificial intelligence to focus on small data which is more precise, using small datasets that are caoable of impacting decisions in the present. this is known as ____AI.

scalable

pulsed laser technology called LIDAR to detect and monitor the environment is an integral part of

self-driving trucks

while every election has its losers, one big winner in the 2016 US presidential election was ____ madia

social

How can packet sniffers, roofkits and denial-of-service (DoS) actions impact MIS systems? More than one answer may be correct.

Used with ill intent these can cause financial losses, lost productivity, and downtime, System damage can occur if plans for monitoring, detection, and remediation are not in place.

An alternative term for programming language is programming___

code

measurable and counted data that can have almost any numeric value is called___data

continuous

in the statement: SELECT * FROM Customers, the asterisk (*) indicates that the user wants to extract all the columns of data FROM the ____ table

customers

Converting a task into commands that a computer can use to perform the task is one definition of ____

programming

5g cellular technology offers the promise of download speeds as high as 20 gbps. this will likely require more antenna arrays with each antenna sending out ____ microwave signals

weaker

Select the statements that describe a conputer programmer's algorithm

written in a natural language, such as English, written in the form of a flowchart so that it will be more easily converted into a programming language

How does a Network Address Translation (NAT) type of firewall work?

It hides internal IP addresses

Which of the following are tips to avoid falling victim to a social engineering attack?

Make sure to research the facts contained in an email message, Slow down and think about the scenario. Be mindful of web searched to make sure you are landing on legitimate sites.

Describe how ransomware attacks work. More than one answer may be correct.

Ransomware is malware that makes a computer's data inaccessible until a ransom is paid, Ransomware attacks invade computers via trojan horse programs of worms, One of the most popular methods used in ransomware attacks is phishing.

data analysts must blend facts and data with knowledge about the

business or organization

A company just recieved a government contract to provide onboarding services targeted towards people who want to sign up for Medicare. They will be handling sensitive information, including the users' Social Security numbers and home addresses and will host the login page where people will access their Medicare account online. Which of the following are considered major cloud service providers?

cloud services security

Which type of colaboration software could best help an organization increase engagement between remote employees and those who are "in-house" or organization-based?

cloud-based forums, messaging, and meeting apps

Collaboration software leads to better collaboration by enabling people from across the organization and in the same time zone to share content in real time.

false

Trello is a collaboration hub that is composed if channels where teams and members of the organization can communicate, thus replacing email and making communication seamless.

false

Describe the benefits of cloud computing. More than one answer may be correct.

flexibility, cost savings, collaboration

use of data analytics include which three of the following

improved decision making, improved patient experiences and internal procedures in healthcare, improved customer service

when selecting the right data, it is important to be aware of the source of the data. for example, data is considered ____ data

third-party

Platform as a service is a cloud-based computing model where cloud service providers host the hardware and software needed for development on their own infrastructure, removing the need for developers to install this on their devices

true

Collaboration software is designed to increase collaboration and productivity primarily by enabling team members to

view, edit, and add shared information in real time, from anywhere


Conjuntos de estudio relacionados

Phylogenetic Trees & Collatagram

View Set

Insurance exam: Missed questions

View Set

Ch.7: Love and Romantic Relationships

View Set

The Basic Problems in Economics.

View Set